Cisco CTS-500 Configuration Manual page 170

Configuration guide for the cisco telepresence system
Table of Contents

Advertisement

Glossary
Secure Hash Algorithm. A set of cryptographic hash functions designed by the National Security
SHA
Agency (NSA) and published by the NIST as a U.S. Federal Information Processing Standard. The
three SHA algorithms are structured differently and are distinguished as SHA-0, SHA-1, and SHA-2.
Session Initiation Protocol. Protocol designed to signal the setup of voice and multimedia calls over IP
SIP
networks.
Simple Network Management Protocol. Network management protocol used almost exclusively in
SNMP
TCP/IP networks as a means to monitor and control network devices, and to manage configurations,
statistics collection, performance, and security.
Simple Object Access Protocol. XML-based protocol to let applications exchange information over
SOAP
HTTP.
System Status Collection Daemon. The daemon gathers statistics about the system it is running on and
SSCD
stores this information. Those statistics can then be used to find current performance bottlenecks
(performance analysis, for example) and predict future system load (capacity planning, for example).
System Operation (sysop) Logs. Sysop messages describe system activity. Some messages can help you
Sysop
identify and resolve system operation problems. These messages are available to the user.
System Logs (syslog). Debugging logs that are collected from your system and used by Cisco technical
Syslog
response to diagnose and resolve issues. These messages are not ordinarily seen by the user.
T
An SNMP trap is a message which is initiated by a network element and sent to the network
trap
management system. See
A Cisco TelePresence (CTS) 3000 or CTS 3200 system featuring three displays.
triple system
Trivial File Transfer Protocol. Simplified version of FTP that allows files to be transferred from one
TFTP
computer to another over a network, usually without the use of client authentication (for example,
username and password).
U
Unique device identification.
UDI
V
A graphical standard supported by PC graphics hardware that serves as a base onto which
VGA
device-specific drivers are loaded into the computer.
A virtual machine (VM) is a software implementation of a machine (a computer, for example) that
virtual machine
executes programs like a physical machine does. A system virtual machine provides a complete system
platform which supports the execution of a complete operating system (OS).
Cisco Unified Communications Manager Configuration Guide for the Cisco TelePresence System
GL-8
MIBs, RFCs, and SNMP Trap Messages for the Cisco TelePresence
System.
OL-21851-01

Advertisement

Table of Contents
loading

This manual is also suitable for:

Unified communications manager

Table of Contents