Contents

Yealink Meeting Server v8 Administrator Guide PDF

1 of 157
1 of 157

Summary of Content for Yealink Meeting Server v8 Administrator Guide PDF

Yealink Meeting Server Administrator Guide V23.0.0.11

| Contents | ii

Contents

About This Guide..................................................................................................... 7 Targeted Audience................................................................................................................................................ 7 Related Documents............................................................................................................................................... 7 Basic Concepts......................................................................................................................................................7 Icon Introduction...................................................................................................................................................8 Summary of Changes........................................................................................................................................... 8

Changes for Release 23, Guide Version 23.0.0.11...................................................................................8 Changes for Release 22, Guide Version 22.0.0.10...................................................................................9 Changes for Release 21, Guide Version 21.0.0.10...................................................................................9

Introduction of Yealink Meeting Server...............................................................10 Specifications...................................................................................................................................................... 10 Router Port Requirements.................................................................................................................................. 12 Browser Requirement......................................................................................................................................... 14 Distributed Structure...........................................................................................................................................14

Benefits of YMS Distributed Structure..................................................................................................14 Components of YMS Distributed Structure...........................................................................................15 Handling the Signaling and the Media.................................................................................................. 15

Basic Operations..................................................................................................... 16 Logging into Yealink Meeting Server................................................................................................................16 Setting the Session Timeout............................................................................................................................... 17 Enabling Forced Https Authentication............................................................................................................... 17 Changing the Display Language for the Website.............................................................................................. 17 Setting the Setup Wizard....................................................................................................................................17 Introduction of the Home Page.......................................................................................................................... 18 Managing Account Information......................................................................................................................... 18

Editing the Login Password................................................................................................................... 19 Editing the Registered Email..................................................................................................................19

Adding a Sub Admin Account...........................................................................................................................19 Logging out of YMS.......................................................................................................................................... 20

System Setting......................................................................................................... 20 Configuring the Node......................................................................................................................................... 21

Setting the Network................................................................................................................................21 Setting DNS Server................................................................................................................................ 21 Setting Routing Rules.............................................................................................................................22

Configuring the Address Port Mapping............................................................................................................. 22 Viewing the Node Information...........................................................................................................................22 Configuring SNTP.............................................................................................................................................. 23 Setting the Time Zone........................................................................................................................................ 23 Configuring the SMTP Mailbox........................................................................................................................ 24 Activating a License........................................................................................................................................... 24

Importing the Device Certificate to the Server......................................................................................25 Activating a License Online...................................................................................................................25 Activating a License Offline.................................................................................................................. 25

| Contents | iii

Disassociating the License..................................................................................................................................26 Importing the Trusted CA Certificate................................................................................................................ 26 Importing the HTTPS Certificate.......................................................................................................................27 Importing the TLS Certificate............................................................................................................................ 27 Setting the Primary Domain Name.................................................................................................................... 27 Setting the Web Service Address....................................................................................................................... 28 Setting the Log Service Address........................................................................................................................28 Configuring the Port........................................................................................................................................... 29 Setting the Data Space....................................................................................................................................... 30 Allocating the Number Resource....................................................................................................................... 30 Setting the IP Property....................................................................................................................................... 31 Configuring Intelligent Security Strategy.......................................................................................................... 31 Adding a Security Group................................................................................................................................... 32 Deleting the Abnormal IP.................................................................................................................................. 33 Applying for the Accesskey............................................................................................................................... 33 Adding the User-Agent Blacklist....................................................................................................................... 33 Adding the User-Agent Compatible List........................................................................................................... 34 Setting the Display on the Web Page................................................................................................................ 35 Configuring the Email Template........................................................................................................................ 41 Configuring SIP Trunk IVR...............................................................................................................................41 Configuring the Audio IVR............................................................................................................................... 41

Managing Services.................................................................................................. 42 Configuring the Registration Service................................................................................................................. 42 Configuring the Redirection Service..................................................................................................................44 Configuring the Third-Party Registration Service............................................................................................. 44 Configuring the GK Service...............................................................................................................................46 Broadcasting Interactive Conference..................................................................................................................48

Configuring the Broadcast Media Service............................................................................................. 48 Enabling the Broadcasting Interactive....................................................................................................49

Configuring Interactive Media Service.............................................................................................................. 49 Yealink Recording Service................................................................................................................................. 50

Setting the Recording Service................................................................................................................ 50 Managing the Recording........................................................................................................................ 51

Enabling Conference Recording (Third-Party Recording Server)..................................................................... 57 Configuring the Traversal Service......................................................................................................................58 Collaboration Service..........................................................................................................................................58

Setting Collaboration Service.................................................................................................................59 Managing Collaboration......................................................................................................................... 59

Configuring the Media Bypass Service............................................................................................................. 60 Alibaba Cloud RTMP Live................................................................................................................................ 61

Configuring the RTMP Media Service.................................................................................................. 62 Configuring the RTMP Live.................................................................................................................. 62

Yealink Live Service...........................................................................................................................................63 Enabling Live Service............................................................................................................................ 64 Configuring YMS System RTMP Live..................................................................................................64

Call Routing Rule............................................................................................................................................... 65 Process of Call Routing..........................................................................................................................65 Regular Expressions................................................................................................................................66 Adding a Call Routing Rule...................................................................................................................68 Configuring the Call Routing Rule........................................................................................................ 70 Restricting the Dialed Number...............................................................................................................71

Communicating with Other Devices via IP Call............................................................................................... 72 Configuring the IP Call Service.............................................................................................................72

Communicating with PSTN................................................................................................................................74

| Contents | iv

Configuring the PSTN Gateway Service............................................................................................... 74 Configuring the Peer Trunk Service.................................................................................................................. 76 Configuring the REG Trunk Service..................................................................................................................79 Communicating with Skype for Business Server.............................................................................................. 81

Communicating with the Local SfB Server........................................................................................... 82 Communicating with Microsoft Office 365........................................................................................... 85 Communicating with Other Enterprise SfB Servers.............................................................................. 88 Configuring the SFB Gateway............................................................................................................... 93 Configuring the SfB Gateway Media Service....................................................................................... 97

Configuring the H.323 Gateway........................................................................................................................ 98 Port Consumption............................................................................................................................................. 100

Call Settings...........................................................................................................102 Call Control Policy........................................................................................................................................... 102

Setting the Video and the Content Resolution.....................................................................................103 Configuring the Call Bandwidth.......................................................................................................... 103 Configuring the Max Video Parties per Conference............................................................................103 Configuring the Max Audio-Only Parties per Conference.................................................................. 104 Setting IVR language............................................................................................................................104 Configuring the Time for Joining Conference Beforehand................................................................. 104 Enabling Auto Dialing..........................................................................................................................104 Enabling the Auto Redialing................................................................................................................ 105 Enabling Mute Participants upon Entry............................................................................................... 105 Configuring the Audio Prompt When Participants Join or Leave Conferences...................................105 Displaying the Native Video................................................................................................................ 106 Setting the Last Participant Backstop Timeout....................................................................................106 Setting the Auto End Conference Without Moderator.........................................................................107 Enabling the Content Only...................................................................................................................107 Enabling Join with APP Awakened by Browser..................................................................................107 Enabling Receiving Ringtone Receipt..................................................................................................108 Enabling External/Internal Network Access WebRTC Authentication................................................108 Disabling the Roll Call Setting............................................................................................................ 109 Configuring the iOS Push Address...................................................................................................... 110 Setting the QoS.....................................................................................................................................110

Video Display Policy........................................................................................................................................110 Setting the Default Layout................................................................................................................... 110 Displaying the Participant Name..........................................................................................................112 Display Participant Status.....................................................................................................................113 Displaying the Participant Quantity..................................................................................................... 113 Displaying the Audio-Only Participant................................................................................................ 113

Managing Accounts.............................................................................................. 113 User Accounts, Room System Accounts and Other Accounts........................................................................ 114 Managing Groups..............................................................................................................................................114

Adding a Group.................................................................................................................................... 114 Editing/Deleting the Group.................................................................................................................. 114

Adding Accounts.............................................................................................................................................. 115 Parameters of User Account.................................................................................................................115 Parameters of Room System Account..................................................................................................118 Parameters of Other Devices................................................................................................................120 Adding an Account Manually.............................................................................................................. 121 Adding a Batch of Accounts................................................................................................................ 121

Sending Emails to YMS Accounts.................................................................................................................. 122 Adjusting the Account Group.......................................................................................................................... 122

| Contents | v

Editing the Authority........................................................................................................................................122 Editing the GK Registration Parameter............................................................................................................123 Editing a Batch of Accounts............................................................................................................................ 123 Configuring the LDAP..................................................................................................................................... 123 Setting the Password Policy............................................................................................................................. 126

Managing Devices................................................................................................. 127 Prerequisites for the Devices Automatically Connected to YMS....................................................................127 Device Status.................................................................................................................................................... 127 Managing Devices by Groups (Optional)........................................................................................................ 128 Pushing the Configuration................................................................................................................................ 128 Pushing Firmware............................................................................................................................................. 130 Diagnosing Devices.......................................................................................................................................... 131 Managing T49 Devices.....................................................................................................................................132

Managing Meeting Rooms................................................................................... 133 The Entity Meeting Room and the Virtual Meeting Room............................................................................. 133 Managing Groups of Meeting Room............................................................................................................... 134

Adding Groups of Meeting Room....................................................................................................... 134 Editing/Deleting the Meeting Room Group......................................................................................... 134

Adding a General Meeting Room.................................................................................................................... 135 Adding a Video Meeting Room....................................................................................................................... 135 Discussion Mode and Training Mode.............................................................................................................. 135 Adding a VMR................................................................................................................................................. 137 Adjusting the Meeting Room Group................................................................................................................141 Sending Emails About Joining the Conference............................................................................................... 141

Managing Conferences......................................................................................... 142 Viewing the Conference................................................................................................................................... 142 Viewing the Meeting Room Usage.................................................................................................................. 142 Monitoring the Conference...............................................................................................................................142

Going to the Conference Monitoring Page.......................................................................................... 143 Adjusting the Output Volume...............................................................................................................143 Selecting an Audio Output Device.......................................................................................................143 Changing the Display Language.......................................................................................................... 144 Configure the Video Images in Equal NN.........................................................................................144 Setting the Video Carousel...................................................................................................................144 Displaying a Participant in a Full Screen/Exiting the Full Screen.......................................................144 Scaling the Video Image...................................................................................................................... 145 Changing Video Layouts...................................................................................................................... 145 Displaying the Conference Monitoring Page in a Full Screen/Exiting the Full Screen....................... 146

Deleting a Conference...................................................................................................................................... 146 Controlling the Conference.............................................................................................................................. 146

Conference Statistics.............................................................................................147 Viewing the MCU Resource............................................................................................................................ 147 Viewing the Conference Statistics....................................................................................................................147 Viewing the Call History..................................................................................................................................148

System Maintenance............................................................................................. 148 Upgrading the System...................................................................................................................................... 149

Updating Firmware........................................................................................................................................... 149 Enabling the Device Upgrade.............................................................................................................. 149 Adding the Firmware............................................................................................................................149 Updating the Firmware.........................................................................................................................150

Making Backups and Restoring....................................................................................................................... 150 Setting the Auto Backup...................................................................................................................... 150 Creating a Backup Manually................................................................................................................150 Downloading a Backup........................................................................................................................ 150 Backup/Restore..................................................................................................................................... 150

Rebooting the System.......................................................................................................................................151 Resetting to Factory..........................................................................................................................................151 Viewing the Operation Log.............................................................................................................................. 152 Viewing the System Log.................................................................................................................................. 152 Viewing the Device Log...................................................................................................................................152 Viewing the Recording Log............................................................................................................................. 153 Using Tools....................................................................................................................................................... 153

Pinging the Network.............................................................................................................................153 Capturing Packets................................................................................................................................. 153

Troubleshooting..................................................................................................... 153 Users Do Not Receive Emails..........................................................................................................................154 Failing to Connect to SMTP............................................................................................................................ 154 User Fail to register an Account...................................................................................................................... 155 Failing to Activating a License Online............................................................................................................155 Failing to Activating a License Offline........................................................................................................... 156 Loading the Orgainzational Structure Slowly..................................................................................................156 The Configuration of Access WebRTC Authentication Is Invalid...................................................................156

| About This Guide | 7

About This Guide

The enterprise administrator can read this guide to operate and maintain YMS.

Targeted Audience Related Documents Basic Concepts Icon Introduction Summary of Changes

Targeted Audience This guide is mainly intended for the following audiences.

The distributors The system administrator

Related Documents Apart from the administrator guide, we also provide the following documents:

Yealink Meeting Server User Guide: it introduces how to use the standard features of YMS. Yealink Meeting Server Web App User Guide for PC: it introduces how to use the browser on PC to join

conferences. Yealink Meeting Server Web App User Guide for Mobile: it introduces how to use the browser on the mobile

phone to join conferences. Yealink Meeting Server Network Deployment Guide: it introduces how to deploy and configure the network of

YMS. Yealink Meeting Server Installation Guide: it introduces how to install the software of YMS. YouTube Streaming Guide: it introduces how to stream the conference to YouTube by RTMP, so that the YouTube

user can watch the live broadcast of the conference. Yealink Meeting Server and Skype for Business Deployment Guide: it introduces how to make YMS

communicate with Skype for Business server. Yealink SIP Trunk Deployment Guide: it introduces how to deploy SIP trunk in both CUCM/3CX/FreePBX and

YMS, so the users of CUCM/3CX/FreePBX can communicate with YMS users. Yealink Federation Management Platform Guide: it introduces how to install and use Yealink federation

management platform and how YMS synchronizes and manages the data from the federation management platform.

Read the Yealink Products Regulatory Notices guide for all regulatory and safety guidance.

Basic Concepts This section introduces the basic concepts which you may encounter in this document.

Enterprise Directory: it refers to the directory which includes the user accounts, the room system accounts and other accounts.

Yealink VC devices: this concept refers to the endpoints that support YMS, including PVT950/PVT980, VC880/ VC800/VC500/VC200/VC400/VC120/VC200 video conferencing system, CP960 conference phone, SIP VP-T49G IP phone, VP59 IP phone, and VC Desktop & VC Mobile.

| About This Guide | 8

The interactive party: it refers to the participant who sends the audio or video in the broadcasting interactive conference.

The broadcasting party: it refers to the participant who only receives but does not send the audio or video in the broadcasting interactive conference.

Content: It refers to the documents, the pictures or the videos shared by the moderator and the lecturer.

Node: One YMS is one node, in either the cluster version or the stand-alone version.

Icon Introduction The icons on YMS are described as below.

Table 1:

Icon Description

Recurrence conference

RTMP live conference

General meeting room (displayed on the Meeting Room Usage page)

Video meeting room (displayed on the Meeting Room Usage page)

Summary of Changes

Changes for Release 23, Guide Version 23.0.0.11 Changes for Release 22, Guide Version 22.0.0.10 Changes for Release 21, Guide Version 21.0.0.10

Changes for Release 23, Guide Version 23.0.0.11

The following sections are new for this version:

Making Backups for Recording Files Adding Watermark for Recording Files Managing Devices Configuring the Audio Prompt When Participants Join or Leave Conferences Yealink Live Service

Major updates have occurred to the following sections:

Specifications Managing Accounts Displaying the Participant Name Parameters of the Recording Template Adding a Sub Admin Account Adding a VMR Parameters of User Account Configuring the RTMP Live

| About This Guide | 9

Changes for Release 22, Guide Version 22.0.0.10

The following sections are new for this version:

Setting Collaboration Service Managing Collaboration Files Setting the Password Policy Using Tools

Major updates have occurred to the following sections:

Setting the Video and the Content Resolution Parameters of the Recording Template Managing the Recording Files Deleting the Recording Copying the Sharing Link Disabling the Sharing Link Parameters of User Account Parameters of Room System Account Adding a VMR Displaying a Participant in a Full Screen/Exiting the Full Screen

Changes for Release 21, Guide Version 21.0.0.10

The following sections are new for this version:

Loading the Orgainzational Structure Slowly Displaying the Audio-Only Participant Enabling Receiving Ringtone Receipt Enabling Join with APP Awakened by Browser Monitoring the Conference Setting the Recording Service Managing the Recording Viewing the Recording Log Resetting to Factory

Major updates have occurred to the following sections:

Adding a Sub Admin Account Adding a VMR Adding Accounts Setting the Display on the Web Page Introduction of the Home Page Configuring the IP Call Service Configuring the PSTN Gateway Service Configuring the Peer Trunk Service Configuring the REG Trunk Service Configuring the GK Service Configuring the H.323 Gateway

| Introduction of Yealink Meeting Server | 10

Introduction of Yealink Meeting Server

Yealink Meeting Server (YMS) is a virtualized and distributed multipoint conferencing platform. As a powerful all-in- one meeting server, YMS brings together a host of key features and services: MCU, registrar server, directory server, traversal server, meeting and device management server, SIP Trunk, WebRTC server, GK & H.460 server, Microsoft SfB (Lync) gateway, recording server and collaboration server.

It provides any number of users with their VMRs to hold high definition conferences, share presentations, collaborate, and chat. Participants can use virtually any type of communication tool to join the conference over audio or video. YMS connects people with crystal-clear audio, HD video, content and web collaboration, bridging locations across any distance or device and providing users with an enjoyable conferencing experience while cutting costs and improving efficiency.

Specifications Router Port Requirements Browser Requirement Distributed Structure

Specifications

The specifications are as below:

Table 2:

Features Yealink Meeting Server

Server Module All-in-One MCU, Registrar Server, Traversal Server, Meeting and Device Management Server, Enterprise Directory Server, SIP Trunk Server (Video & Audio), WebRTC Server, GK& H.460 Server, SfB (Lync) Gateway, Recording Server, Collaboration Server

Concurrent Calls By license

Additional Audio Calls 40 ways

Concurrent VMR Unlimited

Conference Capability

Broadcasting Interactive Conference

Up to 1,500 parties from External Server

Communication Protocols SIP / H.323 / RTMP

Dual Stream Protocols BFCP / H.239 / RDP

Video Codecs H.265, H.264 High Profile, H.264, H.263+, H.263, VP8

Communication Protocols and Codecs

Audio Codecs Yealink ARES, Opus, G.722.1C, G.722.1, G.722, G.711(/ A), G.729, G.729A, G.728, G.729AB, AAC-LC

Resolution 4K, 1080P, 720P, 360P, 4CIF, CIF

Distributed Architecture Server Cluster Management & Multi-host Hot Standby

Server Federation Server Federation Management & Multi-server Cascading

MCU Features

Universal Transcoding & Continuous Presence

| Introduction of Yealink Meeting Server | 11

Features Yealink Meeting Server

MCU Stack Technology

Cascading Video Conference

Automatic Dialing & Redialing

Flexible Layouts Equal NxN (N=2, 3, 4, 5, 6, 7), onePlusN (N=0, 4, 7, 9, 12, 16, 20), twoPlusN (N=8), Overlay and Selected Speaker

Join With Browser (WebRTC)

Chrome (52+), Firefox (52+), Safari (11+)

Recording Recording, VOD and Management

Microsoft SfB Interoperability

P2P call and join conference with video, audio and content sharing

Other Functions RTMP Live, Audio IVR, Display Native Video and Content, Display audio parties, Chat in Conference

Bandwidth Dynamic Adaptive Adjustment

Anti 30% video and 70% audio packet loss, QoS

Security Protocols TLS / SRTP / HTTPS / SSH, AES-256bit

Safety and Reliability

Firewall Traversal Deploy conferencing nodes in a public DMZ: Enables deployment of privately-addressed conferencing nodes behind NAT firewalls; allowing external parties to connect directly via a public address.

Schedule Video Conference & Meeting Room

Through Web or Outlook Plugin or PC Client

Multiple Conferencings P2P Call, Meet Now, Ad Hoc, Scheduled Conferencing, VMR

Multiple Conference Mode

Training Mode, Discussion Mode and Lecturer View

Integration with Yealink VC Endpoints

Sync Conference Information, Conference Reminder, One- touch Conference Access, Apply for Speaking

Conference Control Invite/Remove, Lock/Unlock/End Conference, Conference Lobby, Conference Monitoring,Mute/Unmute Video & Audio, Block/Unblock Audio, Change Roles, Sharing Permission, Rename, Roll Call, Call Statistics, Conference Banner / Subtitle / Agenda, FECC

Meeting Management Features

Personal Layout Voice Activated Speaker, Video Carousel, Customized Layout and Application Parties

User Accounts Organizational Structure and up to 100,000accounts

Enterprise Directory Synchronization

Registrar and Traversal Features

LDAP Synchronize directory from Microsoft AD Server

| Introduction of Yealink Meeting Server | 12

Features Yealink Meeting Server

Third-party Device Registration

SIP / H.323

Traversal Features ICE / TURN / STUN / NAT / H.460

Virtualization Deployment

VMware & Hyper-V

Web Management Friendly Web UI and Setup wizard

Customization Web & Logo, Email Template, Audio IVR and SIP Trunk IVR

Administrator Authority Management

Multilevel Administrator Management Authority

System Status Monitoring Web-based real-time dashboard & data update on capacity and system information

Resource Statistics Management

Graphic display and statistics & analysis of conferences, MCU resources and CDR

System Maintenance Management

Remote Upgrade, Backup/Restore, Reboot/Factory Reset and Syslog, Network Ping, Packet Capture, SNMP

Device Remote Management

Automatic Upgrade, Reboot, Factory Reset, Packets Capture, Export Logs and Export Configuration File

System Security Management

Blacklist, Whitelist and Intelligent Security Strategy

System & Device Management

Language Support English, Russian, Portuguese, Spanish, Polish, Japanese, Simplified and Traditional Chinese

Router Port Requirements If you restrict the following ports, please open them. If you deploy YMS in the internal network, you need to map the following ports to the public network on the router, to solve the interconnection problem between the private and the public networks.

Requirements for the internal service port: make sure that the following ports in every node of the cluster can communicate with each other.

Port UDP/TCP Description

8000-10000 UDP+TCP Internal service port.

27017 UDP+TCP The port for accessing the database.

22 TCP Install or upgrade the server via ssh.

Table 3: Requirements for the external service port

Module Port UDP/TCP Description

Web port 443 TCP HTTPS port.

| Introduction of Yealink Meeting Server | 13

Module Port UDP/TCP Description

444 TCP The port that can be accessed by Yealink devices via HTTPS.

80 TCP HTTP port.

Rsyslog log service port 514 UDP/TCP YMS uses it for collecting the device log.

1719 UDP/TCP RAS listening port of the GK.

1720 UDP/TCP H.225 listening port of the Gateway.

H.323 port

1722 UDP/TCP H.225 listening port of the GK.

3478 UDP/TCP The listening port of the traversal service.

3479 UDP/TCP Backup listening port.

Turnserver port

9688 UDP/TCP As long as the IP address exists, this port should be mapped, because it might influence the traversal service.

5060 UDP/TCP YMS uses it for IP call service.

5061 UDP/TCP YMS uses it for the registration service.

SIP port

5062-5070 UDP/TCP YMS uses it for the third- party registration service, the PSTN gateway service, the peer trunk service, the registration trunk service and the Skype for business service.

Media port 10000-65535 UDP/TCP YMS uses it for the MCU service, the IVR, the BFCP/FECC, the conference stack signaling, the conference stack media, the traversal service (UDP is compulsory but TCP is optional).

| Introduction of Yealink Meeting Server | 14

Browser Requirement YMS supports the following browsers.

Browser Version

Firefox 50 or later

Google Chrome 50 or later

360 8.1 or later

Internet Explorer 10 or later

Distributed Structure YMS distributed structure possesses the following features:

Load balance: ability to realize the load balance among the service nodes in the cluster: the same conferences select the same MCU server with priority to reduce consumption and different conferences select the MCU server whose load is the smallest with priority.

Redundancy: with the feature of hot-standby failover, if one server does not work, the whole service can still work without any interruption. Because when a service node cannot work, other service nodes in the cluster can take over its service automatically within 20s. It is seamless to the conference participants.

Scalability: YMS allows you to scale up your service nodes based on your demand and supports a large number of concurrent videos.

Benefits of YMS Distributed Structure Components of YMS Distributed Structure Handling the Signaling and the Media

Benefits of YMS Distributed Structure

Centralized management of the nodes. Ability to add nodes at any time from any location without service outage. Ability to deploy dedicated edge servers for providing external services. Independent services; ability to deploy the MCU service and the traversal service in the edge node. Ability to expand your nodes and to upgrade your server seamlessly. Ability to select MCU addresses dynamically

(the same conferences select the same MCU server) to use the MCU resource optimally. Ability to hold a broadcasting interactive conference, which contains at least 1000 participants in the conference

and allows you to toggle between the broadcasting parties and the interactive parties. Customize the call routing.

| Introduction of Yealink Meeting Server | 15

Ability to be compatible with the H.323 endpoints with the built-in H.323 gateway and GK server.

Components of YMS Distributed Structure YMS consists of the master node and the business node. The master node is required and can be a business node if the hardware performance and the network meets the requirements. The business node is not required and you can scale it up according to the hardware performance and the network.

Master node: it mainly provides the Web service, for example, the data center, the discovery service, and the business data. Due to the service attributes, you cannot configure these service via web interface. You need configure the master node when the first time you deploy it and you can only run the related command line to expand.

Business node: those nodes mainly provides services, for example, SIP service, H.323 service and MCU service. You can configure and add business nodes via the web interface. You can also enable and disable these service via the web interface. Especially, for the MCU service that calls for higher hardware performance, you can add nodes.

You can deploy one or three master nodes. For one master node, when it does not work, the services are unavailable; for three master nodes, when one server fails, other two servers can still provide services. There is no limit of the business node, you can deploy as many as you need. For more about YMS deployment, refer to Yealink Meeting Server Installation Guide.

Handling the Signaling and the Media The media and the signaling for each call in YMS may take different paths, mainly depending on the function and capacity of the node. Take the deployment of 1+3 as an example to introduce the rule of handling the media and the signaling.

The incoming calls are assigned to the corresponding nodes according to DNS and the signaling is sent to these nodes.

YMS selects the MCU media service dynamically. The same conferences select the same MCU with priority, and different conferences select the MCU with the lowest load.

The signaling flow from the endpoints in the internal network is sent to the master node and then the master node assigns the media service dynamically.

The interaction process of the signaling flow between the endpoints in the internal and the external network: the endpoints in the internal network->the master node->the edge node->the endpoints in the external network.

The interaction process of the media flow between the endpoints in the internal and the external network: the master node->the business node (dynamic assignment)->the edge node->the endpoints in the external network.

| Basic Operations | 16

Basic Operations

This chapter provides basic operations for the enterprise administrator to use YMS.

Logging into Yealink Meeting Server Setting the Session Timeout Enabling Forced Https Authentication Changing the Display Language for the Website Setting the Setup Wizard Introduction of the Home Page Managing Account Information Adding a Sub Admin Account Logging out of YMS

Logging into Yealink Meeting Server

Procedure

1. Open a web browser. 2. Enter the IP address or the domain name of YMS in the address bar to go to the Login page.

If you log in via HTTPS, the page might prompt that the access is insecure, you can Importing the HTTPS Certificate to solve this problem.

3. Click Admin Login. 4. Enter the username and the password of the admin account.

Note: By default, the username is admin and the password is v12345678.

5. Click Log In.

Note: If it is the first time you log into YMS, you are required to change the password.

| Basic Operations | 17

Setting the Session Timeout By default, YMS interface session times out after 30-minute inactivity, after that, you need to log into YMS again.

Procedure

1. Click System Setting > Customization > Web and Conference. 2. In the Session timeout field, click Change, and enter the desired value. 3. Click Save.

Enabling Forced Https Authentication For the security reason, you can enable this feature, so that HTTP requests become HTTPS requests compulsorily. For example, the HTTP request of accessing the website, WebRTC, live broadcasting or others.

Procedure

1. Click System Setting > Customization > Web and Conference. 2. Turn on Enable forced Https authentication.

Changing the Display Language for the Website Seven languages are available on YMS.

Procedure

In the top-right corner, select the desired language from the drop-down menu of Language.

Setting the Setup Wizard To meet the basic call demand, you can go to the Setup Wizard to configure YMS.

About this task When you log into YMS for the first time, the setup wizard will pop up automatically.

Procedure

1. If you close the setup wizard, you can click Setup Wizard at the top of the page to open it again. 2. Setting the Primary Domain Name . 3. Editing the Login Password . 4. Configuring SNTP . 5. Configuring the SMTP Mailbox . 6. Configuring the Node . 7. Configuring the Registration Service . 8. Configuring the Traversal Service . 9. Configuring Interactive Media Service . 10. Activating a License .

| Basic Operations | 18

Introduction of the Home Page If you want to familiarize yourself with various operation interfaces and system notifications, you can know the layout of the Home page. YMS supports the management with different privileges. The system administrator has the highest operation privilege on YMS. Accounts with different privilege will see different Home pages. Here is the Home page viewed by the system administrator account.

Table 4:

NumberDescription

1 Go to the Home page quickly.

2 Go to the Setup Wizard.

3 Join the conference by browser. For more information, refer to Yealink Web App User Guide.

4 The navigation bar.

5 View the number of the online users, the ongoing conferences and the online room system accounts.

Go to the corresponding module quickly.

6 Click Check to go to the Licenses page. View the related port information, including the capacity, the validity and the usage.

7 View the system information of the corresponding node.

View the server CPU, the memory, the network, and the disk space. You can click Check to view the detail information.

View the information of the software version.

Managing Account Information

Editing the Login Password Editing the Registered Email

| Basic Operations | 19

Editing the Login Password For account security, we recommend that you change your password regularly.

Procedure

1. Click the account name in the top-right corner. 2. In the Password field, click Change. 3. Enter the current password, and enter the new password twice. 4. Click OK.

Editing the Registered Email You can edit the registered email. This email is used to receive information, such as resetting password, system alarm and so on.

About this task The registered email is admin@yealink.com by default.

Procedure

1. Click the account name in the top-right corner. 2. In the Mailbox field, click Change. 3. Enter the new email address. 4. Click OK.

Adding a Sub Admin Account For the system security, you can add different sub admin accounts, and assign the desired module or permission to them.

About this task There are five types of the sub admin account: the conference manager, the conference operator, the operation manager, the enterprise administrator, and the customization. You can add up to 100 sub admin accounts.

Note: For the enterprise administrator, you need to contact Yealink technical support engineers to enable it.

Procedure

1. Click System Setting > Sub Admin Account. 2. Add a sub admin account.

| System Setting | 20

Tip: The password of the sub admin account is v12345678 by default.

Logging out of YMS If you want to use other accounts to log into YMS, you can log out of the current account first.

Procedure

Click Exit in the top-right corner to return to the Login page.

System Setting

Configuring the Node Configuring the Address Port Mapping Viewing the Node Information Configuring SNTP Setting the Time Zone Configuring the SMTP Mailbox Activating a License Disassociating the License Importing the Trusted CA Certificate Importing the HTTPS Certificate Importing the TLS Certificate Setting the Primary Domain Name Setting the Web Service Address

| System Setting | 21

Setting the Log Service Address Configuring the Port Setting the Data Space Allocating the Number Resource Setting the IP Property Configuring Intelligent Security Strategy Adding a Security Group Deleting the Abnormal IP Applying for the Accesskey Adding the User-Agent Blacklist Adding the User-Agent Compatible List Setting the Display on the Web Page Configuring the Email Template Configuring SIP Trunk IVR Configuring the Audio IVR

Configuring the Node You can configure the basic network information of the server node to get a smooth network.

Setting the Network Setting DNS Server Setting Routing Rules

Setting the Network Generally, you configure one IP address for one node. However, when you deploy the network in one adapter with NAT, you should configure two IP addresses for one node. For more information about network deployment, refer to Yealink Meeting Server Network Deployment Guide.

Procedure

1. Click System Settings > Node Management. 2.

Click on the right side of the desired node and edit the parameters.

Note: If your YMS is the cluster version, you cannot edit the IP address of the master node on the management platform. However, you can edit it in the installation file and re-install it. For more information about YMS installation, refer to Yealink Meeting Server Installation Guide.

When there are several nodes, the name of the node should be identifiable. 3. Optional: Click Add to add the second IP address. 4. If you want the external users to access this IP address, enable Public IP.

What to do next If you want the internal IP address to provide service for the external users, Configuring the Address Port Mapping

Setting DNS Server When setting SNTP server, the log server, or others, if you want to replace the IP address with the domain name, you need to configure DNS server.

Procedure

1. Click System Settings > Node Management.

| System Setting | 22

2. Click on the right side of the desired node.

3. Click DNS and enter the IP address of the DNS server.

Setting Routing Rules Routing rules enable the node to reach the network that cannot be reached via the default gateway. You can configure the routing rule on each node, so that the node can communicate with other endpoints in the local network or in the Internet.

Procedure

1. Click System Settings > Node Management. 2.

Click on the right side of the desired node. 3. Click Routing Rule, and then click Add to add a routing rule.

Pay attention to the following when adding routing rules:

The server generates a routing to itself, and this routing rule cannot be deleted, otherwise other routing rules will be abnormal. When the adapter has one internal IP address and one external IP address, the source IP of the routing rule to the server itself should be the internal IP, and the gateway should be empty.

You can only configure one default routing rule. When the adapter has one internal IP address and one external IP address, the source IP of the default routing rule should be directed to the external IP.

When the adapter has one internal IP address and one external IP address, the source IP of all routing rules should be specified.

The smaller the number is, the higher the priority is.

Configuring the Address Port Mapping You can map the IP address and port of the internal network to the external network, so that the external user can access the service provided by the IP address and port of the internal network.

Procedure

1. Click System Setting > Address Port Mapping > Add. 2. Configure the parameters of the address port mapping.

The address port mapping should be the same as the mapping on the router. 3. Click Save. 4. Operate according to the prompts, and click OK.

Viewing the Node Information You can view the status of the server and the service, the information of the progress, the port and the disk.

Procedure

1. Click System Settings > Node Management. 2.

Click on the right side of the desired node.

| System Setting | 23

Configuring SNTP By default, YMS use SNTP server to obtain accurate system time.

About this task

Note: This is necessary to ensure that the service can work normally.

Procedure

1. Click System Settings > Common Settings > Time. 2. Configure the parameters.

Table 5: Time parameter

Parameter Description

Time access Select the desired method to obtain the system time.

SNTP Date & time configuration

Default: SNTP.

Server domain If you select SNTP, configure the SNTP server.

Note: the first server address is the primary server by default, and its default value is pool.ntp.org.

Date & time If you select Date & time configuration, configure the time and date manually.

Auto adjust conference DST Configure the type of DST.

EnabledYMSuses the corresponding DST automatically according to the time zone you set. When users schedule conferences in countries using the DST, the DST is enabled by default.

CloseDST is disabled.

Default: disabled.

3. Click Save. 4. Click OK, and the system will reboot.

Setting the Time Zone The time displayed in the YMS administrator interface is the local time (except for the time of the server system), for example, the operational log and the system log. This time is obtained from the time zone configured on the computer which is used for accessing the administrator interface.

About this task When users schedule conferences, the conference date and the time will use the local time.

| System Setting | 24

Procedure

1. Click System Settings > Common Settings > Time. 2. Select the corresponding time zone. 3. Click Save. 4. Click OK to reboot the system.

The current time of the server system will change in real time.

Configuring the SMTP Mailbox You can use the SMTP mailbox to inform users about the related information. For example, the account information.

Procedure

1. Click System Settings > Common Settings > SMTP Mailbox. 2. Configure the parameters.

3. Click Test Mailbox Setting. 4. Enter the email address of the recipient in the Test mailbox field. 5. Click OK.

If the mailbox connection is successful, the prompt Operation success is popped up. 6. Click Save.

Related information Failing to Connect to SMTP

Activating a License You can activate the license to make sure that the video conference service works normally.

Follow the steps to activate the license: 1. Import the device certificate. 2. Activate the license online or offline.

Importing the Device Certificate to the Server Activating a License Online Activating a License Offline

Related tasks Enabling the Broadcasting Interactive

| System Setting | 25

Importing the Device Certificate to the Server You need to import a device certificate which is associated with the server uniquely.

Before you begin You provide the enterprise name, the distributor and the country for Yealink. Yealink will generate a device certificate according to the information you provide.

Procedure

1. Click System Setting > License > Refresh. 2. Select the device certificate.

Note: One device certificate for one YMS, that is, if you have imported the device certificate to one YMS, you cannot import this certificate to another YMS.

3. Click OK.

Results If the association between the device ID and the server succeeds, the page will display as below:

Activating a License Online If the server can access the public network, you can activate the license online.

Before you begin

If Importing the Device Certificate to the Server is finished, the hardware information will be sent to Yealink License server automatically.

You provide the device ID, the license type, the concurrent number and the validity for Yealink. Yealink will generate the authentication based on the above information.

Procedure

Click System Setting > License > Refresh.

Results After the authentication, you can see the license in the list.

What to do next If the authorization expires, you can apply for a new one from Yealink and refresh the page. Related information Failing to Activating a License Online

Activating a License Offline If the server cannot access the public network, you can activate the license offline.

About this task

Importing the Device Certificate to the Server is finished. You provide the device ID, the license type, the concurrent number and the validity for Yealink. Yealink will

generate the authentication based on the above information.

| System Setting | 26

Procedure

1. Click System Setting > License > Offline Activation License. 2. Click Export, and send the exported REQ file to Yealink. Yealink will generate the authentication after importing

the REQ file. Yealink will generate the LIC authentication file and send it to you. 3. Click the area with the dotted box to upload the authorization file obtained from Yealink.

Note: The authentication file is unique, that is, different YMSs correspond to different authentication files. You cannot activate your server by importing the authentication files of other YMSs.

Results The license is displayed in the list.

What to do next If the authorization expires, you can apply for a new one from Yealink and import the new one. Related information Failing to Activating a License Offline

Disassociating the License If you accidentally import the wrong device license, you can disassociate the license from the server.

Procedure

1. Click System Setting > License > Unbind License. 2. Click OK.

Results After disassociating, you need to activate the license again (Activating a License ).

Importing the Trusted CA Certificate When YMS sends the request about TLS connection to devices, the server need to verify whether the device is reliable according to the CA certificate. There are 105 built-in CA certificates in YMS. If devices require their self- signed certificates, you need to import the custom CA certificates.

About this task

Scenario: when Configuring the SMTP Mailbox , if you select security connection, the role of the SMTP need verifying.

| System Setting | 27

Procedure

1. Click System Setting > Certificate > Trusted CA Certificate > Import. 2. Click Upload, select the desired file, and click OK. 3. Operate according to prompts, click OK, and the system will reboot to make it take effect.

Importing the HTTPS Certificate When you access YMS by HTTPS, the browser might prompt that it is insecure. To solve this problem, you can import the certificate trusted by the browser.

Before you begin You have obtained the device certificate issued by CA and the certificate can match the server address.

Procedure

1. Click System Setting > Certificate > HTTPS Certificate > Import. 2. Click Upload, and select the desired file. 3. Click OK.

Importing the TLS Certificate When the device sends request of TLS connection to YMS, the device will verify whether YMS is reliable according to the TLS certificate sent by YMS.

About this task

Scenario: when Configuring the SFB Gateway , you need to import the device license and then the SfB server will verify YMS.

Procedure

1. Click System Setting > Certificate > TLS Certificate > Import. 2. Click Upload, and select the desired file. 3. Click OK.

Setting the Primary Domain Name You can configure the domain name for authentication or accessing the domain name. When you log into an account on devices, the server address you enter is this domain name.

Procedure

1. Click System Settings > Common Settings > Network Association. 2. Enter the address in the Primary Domain field, and the domain name can be directed to any server node IP.

The default domain name is .xip.io and xip.io is an open domain name. By default, the domain name is resolved as the IP address before xip.io, for example, 10.10.10.10.xip.io is resolved as 10.10.10.10 via DNS.

3. Click Save. 4. Operate according to the prompts, and click OK.

| System Setting | 28

Setting the Web Service Address In cluster deployment, to make the device access the Web service address (for example, when the device accesses contacts or downloads firmware), you can set the service URL for the internal and the external network respectively, and then the server will send the corresponding address to the device according to the network where the device locates in (see Setting the Network ).

About this task

Note: This feature is not subject to accessing YMS. If the device fails to access contacts, check the IP address and the port number.

Procedure

1. Click System Settings > Common Settings > Network Association. 2. In the WEB service address field, click Add service address. 3. In the Service network field, select Internal network/External network.

If the domain name is resolved to the internal network and the external network, you can select All. 4. In the Service URL field, enter the URL.

The URL contains the protocol, the address and the port. The address of the internal service URL is the address of the master node, and the address of the external service URL is the mapped address of the public network.

Note: If you have mapped port 80/443, URL should be added to the mapped port.

5. Click Save. 6. Operate according to the prompts, and click OK.

Setting the Log Service Address In cluster deployment, to make devices access the address of the log server, you can set the log URL for the internal and the external network respectively, and the server will send the corresponding address to the device according to the network where the device locates in (see Setting the Network ).

About this task If you do not configure the log service address, the address is the same as the Web service address.

Note: If there is no device log being collected, check the IP address and the port number.

Procedure

1. Click System Settings > Common Settings > Network Association. 2. In the Log service address field, click Add service address.

| System Setting | 29

3. In the Service network field, select Internal network/External network. If the domain name is resolved to the internal network and the external network, you can select All.

4. In Transmission type field, select UDP. 5. In the IP address field, enter the IP address of the node to which the device uploads the log.

The IP address of the internal network is the master node, and the IP address of the external network is the mapped address of the public network.

6. Click Save. 7. Operate according to the prompts, and click OK.

Configuring the Port When the default port range fails to satisfy the actual demand, you can set the IVR port, the BFCP/FECC port, the stack signaling port, and the stack media port.

About this task To avoid the port conflict, the gap between the maximum port and the minimum port should not be less than 200. For example, you set 10000 as the minimum IVR port, the maximum IVR port should not be less than 10199.

Procedure

1. Click System Settings > Common Settings > Network Association. 2. Configure the port parameters.

Table 6:

Parameter Description

IVR port Specify the start and the end values of the IVR port range.

Default port range: from 10000 to 19999.

BFCP/FECC port Specify the start and the end values of the BFCP/ FECC port range.

Default port range: from 11000 to 12999.

Stack signaling port If you want to configure two or more MCU services, you need to configure the stack signaling port.

Default port range: from 13000 to 13199.

Stack media port If you want to configure two or more MCU services, you need to configure the stack media port.

Default port range: from 13200 to 13399.

3. Click Save. 4. Operate according to the prompts, and click OK.

| System Setting | 30

Setting the Data Space You can manually allocate the space quota for the Syslog, the Device log, the Backup space, the Device firmware, and the Collaboration file.

Before you begin The space quota should be an integer value, and the space quota of each part should not be less than its default space quota.

Procedure

1. Click System Settings > Common Settings > Data Space. 2. Enter the desired quota in the corresponding field. 3. Click Save.

Allocating the Number Resource You can customize the range for the account number or the conference number to meet the enterprise need.

About this task Edit the number resource allocation with caution, because it may cause the allocated number unavailable to use.

Procedure

1. Click System Settings > Common Settings > Number Resource Allocation > Add. 2. Configure the parameters.

Table 7: Parameters of the number

Parameter Description

Number type Specify the type of the number.

The supported types are as follows:

System account: it contains the user accounts and the room system accounts.

All conference: it contains the numbers of scheduled conferences, Meet Now conferences and VMRs.

Meet Now Scheduled conference VMR

Note: if you set All conference and Meet Now, the system will use the Meet Now with priority. This can also be applied to Scheduled conference and VMR.

Origin section Specify the origin section.

Rear section Specify the rear section.

Description Add the notes.

3. Click OK.

| System Setting | 31

Setting the IP Property If there are multiple operators to choose for the external address, you can set the IP property, making the traversal server, the MCU server and the registration server use the same operator, so that users can have a better conference experience.

About this task

Note: If there are only one external address or you use the same operator for the external address, you do not need to configure IP property.

Procedure

1. Click System Setting > Address Port Mapping > IP Property > Add. 2. Configure the parameters.

Table 8:

Parameter Description

IP address Specify the IP address for the external network.

Operator Select the operator type.

Note: If it is an operator other than China Telecom, China Unicom, China Mobile and Education Network (China Netcom), choose BGP.

3. Click Save. 4. Operate according to the prompts, and click OK.

Configuring Intelligent Security Strategy You can configure the security strategy, for example, the strategy for identifying or blocking the attacking IP.

About this task

Note: If you want to unblock the abnormal IP in advance, refer to Deleting the Abnormal IP .

Procedure

1. Click System Setting > Security > Intelligent Security Strategy. 2. Configure the parameters.

Table 9: Intelligent Security Strategy

Parameter Description

Attack detection cycle Specify the cycle for detecting attack.

Default: 25 seconds.

| System Setting | 32

Parameter Description

Max frequency of IP call or auth failure It instructs YMS to block any source IP address, which fails several times to place calls to YMS or log into YMS during the attack detection cycle.

Default: 10 times.

Suspected attack banned duration Specify the duration of blocking the suspected attack.

Default: 10 minutes.

Max suspected attacks frequency within 24 hours

It instructs YMS to block any source IP address where the suspected attacks come from, within 24 hours.

Default: 3 times.

Long term banned duration Specify the banned duration.

Default: 7 days.

Max concurrent IP call per node Specify the maximum concurrent calls to YMS placed by one IP from one node. When the number of concurrent IP calls exceeds the maximum number on a single node, the IP will be blocked.

Default: 30.

3. In the Whitelist field, select the desired security group or Adding a Security Group , and devices in this group will not be affected by the security strategy.

4. Click Save.

Adding a Security Group You can add security groups, which are applied to the whitelist and the blacklist of various services, to secure the server.

About this task

The service includes the following:

Configuring the Registration Service

Configuring the Third-Party Registration Service

Configuring the IP Call Service

Configuring the PSTN Gateway Service

Configuring the Peer Trunk Service

Configuring the SFB Gateway

Procedure

1. Click System Setting > Security > Security Group > Add. 2. Configure the parameters.

| System Setting | 33

Table 10: Parameters of the security group

Parameter Description

Name Specify the name of this security group.

Type Specify the type of this security group.

Single IP Section IP

IP Address Enter the IP address or the IP address range.

3. Click Save.

Deleting the Abnormal IP The duration of blocking the abnormal IP depends on the attack result, but you can also manually delete the abnormal IP address.

About this task For the reason of abnormal IP, refer to Configuring Intelligent Security Strategy .

Procedure

1. Click System Setting > Security > Abnormal IP. 2. Select the desired account, and click Delete. 3. Click OK.

Applying for the Accesskey YMS allows the third parties to call the API to integrate with their systems. Before calling the API, you need to apply for the AccessKey for the authentication. For more information, refer to API for Yealink Meeting Server.

Procedure

1. Click System Setting > Security > Accesskey. 2. Click Apply, then AccessKey ID and AccessKey Secret will be generated by automatically.

Adding the User-Agent Blacklist If you know the User-Agent of the attack and you want to forbid devices of this type to call into YMS or to register YMS accounts, you can add them into the blacklist.

Procedure

1. Click System Setting > Security > User-Agent Blacklist > Add. 2. Configure the parameters.

| System Setting | 34

Table 11:

Parameter Description

Enable Enable or disable this blacklist.

Default: enabled.

Regular expression The Perl Compatible Regular Expressions (PCRE).

Note: For example, if you set the regular expression as ^T49, all User-Agent of the endpoints whose model types start with T49 cannot call into YMS.

Description Add optional description for this list.

3. Click OK.

Adding the User-Agent Compatible List To be compatible with Yealink OEM devices in old version and to allow these devices to call into YMS or to register YMS accounts, you can add them into the compatible list.

About this task

Note: The type of the device in new version is decided by Client-Info head filed, and no configuration is required.

Procedure

1. Click System Setting > Security > User-Agent Compatible List > Add. 2. Configure the parameters.

| System Setting | 35

Table 12:

Parameter Description

Enable Enable or disable this compatible list.

Default: enabled.

Regular expression The Perl Compatible Regular Expressions (PCRE).

Note: For example, if you set the PCRE as ^polycom, all User-Agent devices whose model types start with polycom can call into YMS.

Description Add optional description for this list.

3. Click OK.

Setting the Display on the Web Page According to the enterprise need, you can customize the following parameters, for example, the enterprise logo, the background image of WebRTC, and the display image of the video conference.

About this task The parameters are described as below:

Table 13: Parameters of the Logo

Parameter Effect

Portal logo

Tab logo

| System Setting | 36

Table 14: Parameters of the Web Portal

Parameter Effect

Background image

Email header logo

Enterprise name

Platform name

Display copyright

Display Outlook plug-in download

| System Setting | 37

Table 15: Parameters of the WebRTC Portal

Parameter Effect

Enable WebRTC Allow or refuse the user to join the conference via browser.

Background image for WebRTC home screen

Background image of WebRTC end page

Extension download address

The address for downloading Yealink content sharing plugin when you use Google Chrome to visit Yealink Web App, and share contents with the remote.

Display PC soft- client download

Windows The address for downloading Yealink VC Desktop for Windows.

Mac The address for downloading Yealink VC Desktop for Mac.

| System Setting | 38

Table 16: Parameters of the Video Conference

Parameter Effect

Audio call image

License limited image

No video data image

| System Setting | 39

Parameter Effect

Camera OFF image

Welcome screen image

The sole video call party image

| System Setting | 40

Parameter Effect

Conference lobby image

Waiting for the lecturer image

Waiting image

Procedure

1. Click System Setting > Customization > Email Template. 2. Configure the logo. 3. Configure the parameter of web portal. 4. Configure the parameter of WebRTC portal. 5. Configure the parameter of the video conference.

If the device negotiates with the server to use the resolution of 360P, 720P, and 1080P, the video conference is displayed in 16:9; if they negotiate to use the resolution of CIF and 4CIF, the video conference is displayed in 4:3.

| System Setting | 41

Configuring the Email Template You can customize the email template for different uses, for administrators, they receive the emails about the system alarm, SMTP mailbox testing or other; for users, they receive the emails about the conferences that they are invited or initiate, about the recording or other.

About this task You cannot modify the string that starts with $ in the Subject and Content, otherwise, you might fail to send the email.

Procedure

1. Click System Setting > Customization > Email Template. 2. Configure the parameters. 3. Click Save.

Configuring SIP Trunk IVR You can customize the SIP trunk IVR so that the user can join conferences or place calls according to the voice prompts.

About this task Dial main_ivr@server domain name to go to the SIP trunk IVR.

Procedure

1. Click System Setting > Customization > SIP Trunk IVR. 2. Configure the receptionist greetings, and do one of the following:

Select Default Greeting. The language depends on the IVR language. For more information, refer to Setting IVR language .

Select Personal Greeting.

Click Upload to upload the desired file.

(Optional:) if you want to dial extension directly without pressing the key, select the Enable first-level extension dialing check box.

Select the desired key, enter the description and the operation which contains transferring to extension/ conference, extension IVR dialing, conference IVR dialing, and repeating menu.

3. Click Save.

Configuring the Audio IVR You can customize the audio IVR so that the user can join the conference according to the voice prompt.

About this task Dial conference_ivr@server domain name to go to the audio IVR.

Procedure

1. Click System Setting > Customization > Audio IVR. 2. Configure the voice prompt, and do one of the following:

| Managing Services | 42

Select Default Greeting. The language depends on the IVR language. Select Personal Greeting.

Click Upload to upload the desired file. 3. Click Save.

Managing Services

Configuring the Registration Service Configuring the Redirection Service Configuring the Third-Party Registration Service Configuring the GK Service Broadcasting Interactive Conference Configuring Interactive Media Service Yealink Recording Service Enabling Conference Recording (Third-Party Recording Server) Configuring the Traversal Service Collaboration Service Configuring the Media Bypass Service Alibaba Cloud RTMP Live Yealink Live Service Call Routing Rule Communicating with Other Devices via IP Call Communicating with PSTN Configuring the Peer Trunk Service Configuring the REG Trunk Service Communicating with Skype for Business Server Configuring the H.323 Gateway Port Consumption

Configuring the Registration Service You need to configure the registration service, so that the user in the internal network and the external network can register YMS accounts. When you are registering an endpoint with an account, the proxy server directs to this node.

About this task If you want to connect YMS and LDAP server to synchronize the LDAP account to YMS, you need to configure the LDAP first (Configuring the LDAP ).

Note: If you map a node to the internal and the external network IP, you need to configure the registration service for the internal and the external network respectively.

Procedure

1. Click Service > SIP Service > Registration Service > Add. 2. Configure the basic parameters.

| Managing Services | 43

Table 17: Basic Parameters

Parameter Description

Enable Enable or disable this service.

Default: enabled.

Name Specify the service name.

Node Specify the node used by this service.

3. Configure the parameters of the service address.

Table 18: Parameters of the Service Address

Parameter Description

Network Specify the IP address used by this node.

Note: you need to select the corresponding IP address according to the information of the internal and the external network of this node.

TLS Port The TLS port used by this node.

Note: only TLS registration is available.

4. Configure the security policy.

Table 19: Parameters of the Security Policy

Parameter Description

Enable security policy Enable or disable the security policy.

Default: disabled.

Mode Select a mode.

Whitelist: allow the device in the security group to register.

Blacklist: forbid the device in the security group to call into.

Security Group Select a security group.

5. Click Save. 6. Operate according to the prompts, and click OK.

Related tasks Adding a Security Group

| Managing Services | 44

Configuring the Redirection Service If you use the cluster version, when there are multiple registration services, you only need to configure the redirection service. When you are registering an account with the endpoint, the proxy server directs to the redirection server. When the IP of the registration server is changed, you do not need to change the configuration on the endpoint.

Before you begin Configuring the Registration Service .

Procedure

1. Click Service > SIP Service > Redirect Service > Add. 2. Configure the corresponding parameters.

Table 20: Basic Parameters

Parameter Description

Enabled Enable or disable this service.

Default: enabled.

Name Specify the service name.

Node Specify the node used by this service.

Note: you has configured the node of the registration service.

3. Configure the parameters of the service address.

Table 21: Service address

Parameter Description

Network Specify the IP address used by this node.

TLS port The TLS port used by this node.

Note: only TLS registration is available.

4. Click Save. 5. Operate according to the prompts, and click OK.

Configuring the Third-Party Registration Service To solve the compatibility problem with the third-party devices, you can configure the third-party REG service. If there is an abnormal situation when all third-party devices are registered in a server, you only need to edit the third- party REG service of this service.

About this task Using TLS to register third-party devices on the server is not supported.

Procedure

1. Click Service > SIP Service > Third Party REG Service > Add. 2. Configure the basic parameters.

| Managing Services | 45

Table 22: Basic Parameters

Parameter Description

Enable Enable or disable this service.

Default: enabled.

Name Specify the service name.

Node Specify the node used by this service.

3. Configure the parameters of the service address.

Table 23: Parameters of the Service Address

Parameter Description

Network Specify the IP address used by this node.

UDP/TCP Port The UDP/TCP port used by this node.

4. Enable Support video, so that you can place video calls to the remote that supports video call. It is enabled by default.

5. Enable Support content sharing, so that you can share contents with the remote that supports receiving or sending contents. It is enabled by default.

6. Enable Media Bypass to improve the server performance and to support a larger number of participants in the conference. Note that the third-party devices have a lower compatibility. If Support video is enabled, Media Bypass is recommended to be enabled. If Media Bypass is enabled, Media bypass service should be enabled too. For more information, refer to Configuring the Media Bypass Service .

7. Configure the security policy.

Table 24: Parameters of the Security Policy

Parameter Description

Enable security policy Enable or disable the security policy.

Default: disabled.

Mode Select a mode.

The supported modes are as follows:

Whitelist: allow the device in the security group to register.

Blacklist: forbid the device in the security group to register.

Security Group Select a security group.

8. Click Save. 9. Operate according to the prompts, and click OK.

Related tasks Adding a Security Group

| Managing Services | 46

Configuring the GK Service You can configure the GK service for registering YMS accounts in the H.323 device, so that the H.323 devices can call each other, join conferences, and communicate with the SIP devices.

Procedure

1. Click Service > H.323 Service > Embedded GK Server > Add. 2. Configure the basic parameters.

Table 25: Basic Parameters

Parameter Description

Enable Allow the server to send registration request to the GK server or not.

Default: enabled.

Name The server name.

Node The server

GK ID The network ID of the GK server on which YMS is registered.

TTL timeout duration After YMS is registered on the GK server, it will periodically send handshake messages (Registration Request) to the GK server to maintain the registration status. If the GK server does not receive the handshake messages when the time is out, it means this GK server does not exist, and the YMS will log out of this server automatically.

Default: 600 seconds.

TTL timeout duration The GK can decide whether or not the server can be called according to IRR (Information Request Response) sent by the server.

Default: 120 seconds.

RAS broadcast port (UDP) It defaults to 1718 and is not configurable.

RAS port (UDP) It defaults to 1719 and is not configurable.

H.225 listening port (TCP) It defaults to 1722 and is not configurable.

Q.931/H.245(TCP) Specify the start and the end values of the Q931/ H.245 port range.

Default port range: from 20000 to 23999. To avoid the port conflict, the gap between the maximum port and the minimum port should not be less than 200. For example, you set 20000 as the minimum port, the maximum port should not be less than 20199.

| Managing Services | 47

Parameter Description

Media forwarding port (UDP) Specify the start and the end values of this port range.

Default port range: from 20000 to 29999. To avoid the port conflict, the gap between the maximum port and the minimum port should not be less than 200. For example, you set 20000 as the minimum port, the maximum port should not be less than 20199.

H.225 listener It defaults to 1721 and is not configurable.

Q.931/H.245(TCP) Specify the start and the end values of this port range.

Default port range: from 24000 to 26999. To avoid the port conflict, the gap between the maximum port and the minimum port should not be less than 200. For example, you set 24000 as the minimum port, the maximum port should not be less than 24199.

H.235 encryption The supported types are as follows:

Optionalnegotiate with the remote whether or not H.235 encryption can be used in H.323 calls.

CompulsoryH.235 encryption has to be used in H.323 calls.

DisableH.235 encryption cannot be used in H.323 calls.

Default: Optional.

H.239 Enable or disable the H.239.

Default: enabled. When the H.323 devices call into YMS to join in video conferences via H.323, H.239 is used to receive and send contents.

Conference media ByPass Enable it to improve the server performance and to support a larger number of participants in the conference. Note that the third-party devices have a lower compatibility.

Default: disabled.

If Conference media ByPass is enabled, Media bypass service should be enabled too. For more information, refer to Configuring the Media Bypass Service .

3. Click Save. 4. Operate according to the prompts, and click OK.

| Managing Services | 48

Broadcasting Interactive Conference The broadcasting interactive conference can contain hundreds or thousands of participants or venues, which is suitable for large trainings. It is also applicable to different administrative areas. There are the interactive parties and the broadcasting parties. The broadcasting parties only receive the audio, the video and the content, which meet the demand of some venues.

You can follow the steps below to enable the broadcasting interactive conference.

Configuring the Broadcast Media Service

Configuring Interactive Media Service

Enabling the Broadcasting Interactive , enable this feature globally.

Adding a VMR , enable this feature when you are adding VMRs or when you are scheduling conferences, for more information, refer to Yealink Meeting Server User Guide.

Configuring the Broadcast Media Service Enabling the Broadcasting Interactive

Configuring the Broadcast Media Service If you want to use the broadcasting interactive, you need to configure the broadcast media service.

Procedure

1. Click Service > MCU Service > Broadcast Media Service > Add. 2. Configuring the basic parameters.

Table 26: Basic Parameters

Parameter Description

Enable Enable or disable this service.

Default: enabled.

Name Specify the name of the server.

Node Specify the node used by this service.

External media port Specify the start and the end values of the port range used by the server to send the broadcast media service.

Default port range: from 55000 to 59999. To avoid the port conflict, the gap between the maximum port and the minimum port should not be less than 200. For example, you set 55000 as the minimum port, the maximum port should not be less than 55199.

All local networks Specify the IP address used by this service.

3. Click Save. 4. Operate according to the prompts, and click OK.

Related tasks Enabling the Broadcasting Interactive

| Managing Services | 49

Enabling the Broadcasting Interactive If you want to create a conference with a larger number of participants, you can enable the broadcasting interactive.

Before you begin

You have enabled the broadcast license, refer to Activating a License . Configuring the Broadcast Media Service and Configuring the Broadcast Media Service are finished.

Procedure

1. Click Call Configuration > Call Control Policy. 2. Enable Broadcasting interactive. 3. Click Save. 4. Operate according to the prompts, and click OK.

Related tasks Configuring the Broadcast Media Service Related information Activating a License

Configuring Interactive Media Service You need to configure the interactive media service to ensure that the user can join the conference.

Procedure

1. Click Service > MCU Service > RTMP Media Service > Add. 2. Configure the basic parameters of the interactive media service.

Table 27: Basic Parameters

Parameter Description

Enable Enable or disable this service.

Default: enabled.

Name Specify the name of the server.

Node Specify the node used by this service.

External media port Specify the start and the end values of the port range used by the server to send the interactive media service.

Default port range: from 50000 to 54999. To avoid the port conflict, the gap between the maximum port and the minimum port should not be less than 200. For example, you set 50000 as the minimum port, the maximum port should not be less than 50199.

All local networks Specify the IP address used by this service.

3. Click Save. 4. Operate according to the prompts, and click OK.

| Managing Services | 50

Yealink Recording Service Yealink recording service can allows you to record conferences, play recorded videos on demand, and manage recorded files. Users can record multiple concurrent conferences at the same time. You can follow the steps below to record conferences:

1. Setting the Recording Service .

2. For scheduled conferences or Meet Now conferences, you can enable the recording permission, configure the recording space, and select the recording template when adding user accounts (Adding Accounts ), so that users have the permission to record conferences.

3. For VMRs (Adding a VMR ), you can configure the recording privilege. When users schedule conferences, configure the recording privilege. For more information, refer to Yealink Meeting Server User Guide.

4. Customize the recording parameters, for example, Recording Template , Adding Watermark for Recording Files , and Displaying the Recording Icon during Recording .

For more information, refer to Managing the Recording .

5. The conference moderator goes to the Conference Control page, and start recording the conference. For more information, refer to Yealink Meeting Server User Guide. If you enable Auto recording feature in step 3, you can skip this step.

6. Manage the generated recording files, for example, Managing the Recording Files , Making Backups for Recording Files , and Copying the Sharing Link . For more information, refer to Managing the Recording .

Setting the Recording Service Managing the Recording

Setting the Recording Service If you want to use the recording service of YMS, you need to configure the recording service.

Before you begin

Example scenario: Adding Accounts , enabling the recording privilege. The account with the recording privilege can record the conference on the device or the web page. For more information, refer to Yealink Meeting Server User Guide.

Activating a License is finished. The disk space of the node home directory used by this service should not be less than 50G.

Procedure

1. Click Service > Recording Service > Add. 2. Configure the corresponding parameters of the recording server.

Table 28: Basic Parameters

Parameter Description

Enabled Enable or disable this service.

Default: enabled.

Name Specify the name of the server.

Node Specify the node used by this service.

| Managing Services | 51

Parameter Description

External media port Specify the start and the end values of the port range used by the server to send the recording service.

Default port range: from 65000 to 65499. To avoid the port conflict, the gap between the maximum port and the minimum port should not be less than 200. For example, you set 65000 as the minimum port, the maximum port should not be less than 65199.

All local networks Specify the IP address used by this service.

3. Click Save. 4. Operate according to the prompts, and click OK.

Managing the Recording

The video, the audio and the shared content in the conference will be recorded completely and be saved on YMS recording server which you can configure the recording space (see Setting the Data Space ).

Before you begin: Setting the Recording Service

Note: If you use third-party recording server, this chapter is not applicable.

Displaying the Recording Icon during Recording Adding Watermark for Recording Files Recording Template Viewing the Usage Editing the Recording Parameters of User Account Managing the Recording Files Making Backups for Recording Files Deleting the Recording Copying the Sharing Link Disabling the Sharing Link

Displaying the Recording Icon during Recording During the recording, if you want to display the recording icon and the recording duration in the MCU image, you can enable Show recording icon.

Procedure

1. Click Media file management > Recording Setting. 2. Enable Show recording icon.

Adding Watermark for Recording Files If you enable Add watermark to recording file, the watermark will be displayed in the top-right corner of the generated recording file.

Procedure

1. Click Media file management > Recording Setting. 2. Enable Add watermark to recording file.

Default watermark

| Managing Services | 52

Customization

Recording Template

After you successfully configure the recording server, the server will automatically generate a default recording template. When you enable recording privileges for users, you can use the default recording template or you can use the custom one. The recording template of the organizer decides the type of the recording file.

Parameters of the Recording Template Adding the Recording Template and Applying it to Users Editing the Recording Template Changing the Application Parties of the Recording Template Deleting the Recording Template

Parameters of the Recording Template Before adding or editing the recording template, you need to familiarize yourself with the parameters of the recording template.

Table 29:

Parameter Description

Template name The name of this template.

Video resolution Set the maximum video resolution for the recording file.

Default: 720P/30FPS.

Audio and video code rate Set the maximum bandwidth for the recording file.

Default: 2 Mbps. If you set the Video resolution as 360P and the Audio and video code rate as 4M, you can only record a 360P file even though the bandwidth is 4M.

| Managing Services | 53

Parameter Description

Layout Configure the layout of the recording file.

If no participants share content, the video layout of the recorded video is displayed in 1+N format with the voice-activated feature enabled. The current speaker is displayed in the large video image and up to 1+N participants are displayed in live thumbnails which will be switched automatically.

If a participant is sharing content, the video layout of the recorded video is displayed in 1+4 format with the content as the large video image. Up to 1+4 participants are displayed in live thumbnails which will be switched automatically. The maximum number of N is 20.

Default: 1+4.

Recording File If you select this feature, when you finish the recording, a file including the audio, the video, and the images will be generated.

If you and select this feature, when you finish the recording, an audio-only file will be generated.

Speech-to-text If you enable this feature, when you finish the recording, a text (the conference summary) will be generated. You can contact Yealink technical support engineer to subscribe to this service.

Generate multiple files with different resolutions If you enable this feature, when you finish the recording, video files with different resolutions will be generated. Users can select any video file.

If the resolution in the recording template is set to 1080P, recording files with the resolution of 1080P and 720P are generated.

If the resolution in the recording template is set to 720P, recording files with the resolution of 720P and 360P are generated.

Display time stamp in the video file If you enable this configuration, a time stamp with the format as xxxx-xx-xx xx:xx:xx, will be displayed in the top-right corner of the generated recording files, for example, 2019-07-22 17:40:04.

File format MP4 and AVI are available.

Related concepts Parameters of User Account Parameters of Room System Account

Adding the Recording Template and Applying it to Users

Procedure

1. Click Media file management > Recording Setting.

| Managing Services | 54

2. Click Add Template. 3. Configure the parameters of the recording template. 4. Click Save. 5. According to the prompts, click OK and the window for applying the template to users will pop up. 6. Select the desired users. 7. Click Save.

Editing the Recording Template

Procedure

1. Click Media file management > Recording Setting. 2. Click on the right of the default template. 3. Click Modify Configurations. 4. Edit the template parameters. 5. Click OK.

Changing the Application Parties of the Recording Template

Procedure

1. Click Media file management > Recording Setting. 2. Click on the right side of the template. 3. Click View application object. 4. Select the desired account, and click Save.

Deleting the Recording Template

Procedure

1. Click Media file management > Recording Setting. 2. Click on the right side of the template. 3. Click Delete. 4. Operate according to the prompts, and click OK.

Viewing the Usage You can view the usage of the recording space of the user accounts and room system accounts, the number of the recording file and the number of the shared link.

Procedure

Click Media file management > Recording usage.

Editing the Recording Parameters of User Account You can edit the recording authority, the recording space and the template for the user accounts and the room system accounts.

Procedure

1. Click Media file management > Recording usage.

| Managing Services | 55

2. On the right side of the desired account, click .

3. Edit the recording parameters. 4. Click Save.

Related concepts Parameters of User Account

Managing the Recording Files You can view, edit and share the recording files created by any user account and room system account.

Procedure

1. Click Media file management > File Management > Recordings. 2. Click the corresponding recording file. 3. Do the following:

Play the recording file.

Click on the right side of Remarks and add your remark. Click Share URL in the top-right corner, and share the link with others or set the link authority. Click Delete in the top-right corner, and delete the recording according to the prompts. Click Conference file, and click on the right side of the desired file to download it.

Note: The type of the conference file depends on the privilege opened in the recording template of the account.

Click Conference info, and view the conference subject, ID, the start time, the location and the participants.

Related tasks Copying the Sharing Link Disabling the Sharing Link

Making Backups for Recording Files

Before you begin The FTP server is available.

Procedure

1. Click Media file management > FTP Backup. 2. Add the FTP server.

If you do not configure the path or keep it blank, the recording files will be stored to the root directory of the FTP server.

| Managing Services | 56

3. Click .

Deleting the Recording You can delete the recording file of any account.

About this task The account contains the user accounts and the room system accounts.

Procedure

1. Click Media file management > File Management > Collaboration file. 2. Select the desired recording files. 3. Click Delete. 4. Operate according to the prompts, and click OK.

| Managing Services | 57

Copying the Sharing Link You can copy the link that are sharing and send it to the people who want to view the recording file.

Procedure

1. Click Media file management > File Management > URL Share MGMT. 2.

On the right side of the desired link, click .

Related tasks Managing the Recording Files

Disabling the Sharing Link

Before you begin You share the link with others. Refer to Managing the Recording Files .

Procedure

1. Click Media file management > File Management > URL Share MGMT. 2.

On the right side of the desired link, click . 3. Operate according to the prompts, and click OK.

Related tasks Managing the Recording Files

Enabling Conference Recording (Third-Party Recording Server) You can enable this feature and configure the third-party recording server to record conferences.

About this task

Note: If you want to use the recording feature of YMS, no configuration is required.

Before you configure the third-party recording server, make sure Yealink technical support engineer has deployed the third-party recording server. If the recording server is deployed, you need to obtain the corresponding information of the recording server from the Yealink technical support engineer.

Procedure

1. Click Call Configuration > Call Control Policy. 2. Enable Recording. 3. Enter the corresponding information of the recording server. 4. Click Save. 5. Operate according to the prompts, and click OK.

| Managing Services | 58

Configuring the Traversal Service You need to configure the traversal service for the network traversal of the call media. If the server is deployed in the internal network, you also need to configure the traversal service to ensure that the device can place calls, including placing point-to-point calls and joining conferences.

About this task

If you use cluster YMS and all nodes are deployed in the intranet, you must add the traversal service on the master node.

If you use cluster YMS and it need to be available for the registration and joining conference both in the intranet and the extranet, you must add the traversal service on the business node (in both the intranet and the extranet). Adding the traversal service in only the intranet node is not allowed. If not, there will be an abnormal situation in the traversal service.

Procedure

1. Click Service > Traversal Service > Add. 2. Configure the basic parameters.

Table 30: Basic Parameters

Parameter Description

Enable Enable or disable this service.

Default: enabled.

Name Specify the name of the server.

Node Specify the node used by this service.

Listener (UDP & TCP) Select the desired listener.

Default: 3478.

Spare listener (UDP & TCP) Select the desired spare listener.

Default: 3479.

Relay port range Configure the range of the range port.

Default port range: from 40000 to 49999. To avoid the port conflict, the gap between the maximum port and the minimum port should not be less than 200. For example, you set 40000 as the minimum port, the maximum port should not be less than 40199.

3. Click Save. 4. Operate according to the prompts, and click OK.

Collaboration Service

Setting Collaboration Service Managing Collaboration

| Managing Services | 59

Setting Collaboration Service If you want to use the collaboration features (whiteboard collaboration and making notes on the shared contents), you need to enable collaboration service.

About this task The devices that support collaboration features are VC880&VC800&VC500&VC200 video conferencing system in version X.41.0.10 or later.

Procedure

1. Click Service > MCU Service > Collaboration service > Add. 2. Configure the corresponding parameters.

Table 31: Basic Parameters

Parameter Description

Enabled Enable or disable this service.

Default: enabled.

Name Specify the name of the server.

Node Specify the node used by this service.

External media port Specify the start and the end values of the port range used by the server to send the collaboration service.

Note: the default port range is from 63000 to 63999. To avoid the port conflict, the gap between the maximum port and the minimum port should not be less than 200. For example, you set 63000 as the minimum port, the maximum port should not be less than 63199.

All local networks Specify the IP address used by this service.

3. Click Save. 4. Operate according to the prompts, and click OK.

Managing Collaboration

Before you begin:Setting Collaboration Service

Managing Collaboration Files Deleting Recording and Collaboration Files Copying the Sharing Link Disabling the Sharing Link

Managing Collaboration Files After you use the supported device to initiate whiteboard collaboration or make notes on the shared contents, those files will be stored under the collaboration files in YMS. You can view, edit and share the collaboration files generated by all user accounts and room system accounts.

Procedure

1. Click Media file management > File Management > Collaboration file.

| Managing Services | 60

2. Click the corresponding collaboration file. 3.

Click in the top-right corner of the file. 4. Do one of the following:

Click Share URL, and share the link with others and set the link parameter. Click Delete, and delete the file according to the prompts. Click Download, and download the file according to the prompts.

Deleting Recording and Collaboration Files You can delete any collaboration file of any account.

About this task The account contains the user accounts and the room system accounts.

Procedure

1. Click Media file management > File Management > Collaboration file. 2. Select the desired recording files. 3. Click Delete. 4. Operate according to the prompts, and click OK.

Copying the Sharing Link You can copy the link and send it to the people who want to view the collaboration file.

Procedure

1. Click Media file management > File Management > URL Share MGMT. 2.

On the right side of the desired link, click .

Disabling the Sharing Link

Before you begin You share the link with others. Refer to Managing Collaboration Files .

Procedure

1. Click Media file management > File Management > URL Share MGMT. 2.

On the right side of the desired link, click . 3. Operate according to the prompts, and click OK.

Configuring the Media Bypass Service If you enable this feature, it can not only reduce the usage of ports , but also improve the media experience and allow more concurrency since the media does not require the secondary encoding and decoding. If you want to know the port consumption in different situations, see Port Consumption .

Before you begin If you want to use this service, you also need to enable the media Bypass feature for the corresponding services.

Configuring the Third-Party Registration Service

| Managing Services | 61

Configuring the IP Call Service

Configuring the Peer Trunk Service

Configuring the REG Trunk Service

Configuring the H.323 Gateway

Procedure

1. Click Service > MCU Service > Media Bypass Service > Add. 2. Configure the basic parameters.

Table 32: Basic Parameters

Parameter Description

Enable Enable or disable this service.

Default: enabled.

Name Specify the name of the server.

Node Specify the node used by this service.

External media port Specify the start and the end values of the port range used by the server to send the media bypass service.

Default port range: from 64000 to 64999. To avoid the port conflict, the gap between the maximum port and the minimum port should not be less than 200. For example, you set 64000 as the minimum port, the maximum port should not be less than 64199.

All local networks Specify the IP address used by this service.

3. Click Save. 4. Operate according to the prompts, and click OK.

Alibaba Cloud RTMP Live Some activities, for example lectures or training, have large audiences but limited interaction between the lecturers and the audience, moreover, the cost is high and it takes a lot of video port resource if it is held by the general video conferences. In this situation, the audience who do not need to join the activity can choose to watch the live broadcast.

Note: The number of the participants that can concurrently watch the webcast depends on the authorized license.

You can following the steps below to configure RTMP media service. For more information, refer to RTMP Configuration Guide

1. Configuring the RTMP Media Service

2. Configuring the RTMP Live

3. Enable RTMP live when you are adding VMRs (Adding a VMR ) or scheduling video conferences, and the conference moderator can configure the video layout. For more information, refer to Yealink Meeting Server User Guide.

| Managing Services | 62

4. The conference moderator goes to the Conference Control page, and start the live broadcast. For more information, refer to Yealink Meeting Server User Guide.

If you want to use RTMP media service, make sure that the network is available and check the following:

The server can access the external network. If your company has limitation to the web surfing, make sure that the server has the video privilege.

You can also stream the conference to YouTube, so that users can watch the live broadcast. For more information, refer to Yealink Meeting Server Streaming Guide.

Configuring the RTMP Media Service Configuring the RTMP Live

Configuring the RTMP Media Service If you want to use the RTMP live broadcast, you need to configure the RTMP media service.

Procedure

1. Click Service > MCU Service > RTMP Media Service > Add. 2. Configuring the parameters.

Related tasks Configuring the RTMP Live

Configuring the RTMP Live You can enable the RTMP live feature, so that users can stream the conference to live platform service and watch the live broadcast of the conference.

Before you begin

You can obtain the information about Alibaba Cloud. Configuring the RTMP Media Service .

About this task For more information about RTMP Live, refer to http://support.yealink.com/documentFront/ forwardToDocumentFrontDisplayPage

Procedure

1. Click Call Configuration > Call Control Policy.

| Managing Services | 63

2. Enable Alibaba Cloud RTMP live. 3. Configure the parameters.

Table 33: RTMP live parameters

Parameter Description

Organizer Logo Specify the logo displayed on the Live Broadcast page.

Domain Specify the domain name of the server.

Application name The application name in the authentication URL.

Live domain Specify the domain name.

Edge Ingest Specify the streaming method.

Note: if your domain name for watching is added after February 21, 2019, you cannot use the Live Center Ingest method.

Enable authentication Enable or disable the authentication.

Default: disabled.

Authentication key Specify the authentication password.

4. Click Save. 5. Operate according to the prompts, and click OK.

Related tasks Configuring the RTMP Media Service

Yealink Live Service Some activities, for example lectures or training, have large audiences but limited interaction between the lecturers and the audience, moreover, the cost is high and it takes a lot of video port resource if it is held by the general video conferences. In this situation, the audience who do not need to join the activity can choose to watch the live broadcast.

Yealink Live service provides the live broadcast service and ports, which allows the user to watch the live broadcast of the conference. You can following the steps below:

1. Enabling Live Service

2. Configuring YMS System RTMP Live

3. Enable RTMP live when you are adding VMRs (Adding a VMR ) or scheduling video conferences, and the conference moderator can configure the video layout. For more information, refer to Yealink Meeting Server User Guide.

4. The conference moderator goes to the Conference Control page, and start the live broadcast. For more information, refer to Yealink Meeting Server User Guide.

If you want to use the RTMP Live service, make sure that the network is available and check the following:

The server can access the external network. If your company has limitation to the web surfing, make sure that the server has the video privilege.

Enabling Live Service Configuring YMS System RTMP Live

| Managing Services | 64

Enabling Live Service If you want to use the feature of Yealink System RTMP live , you need to configure the live service.

Procedure

1. Click Service > Live Service > Add. 2. Configure the parameters.

Configuring YMS System RTMP Live You can enable the System RTMP live feature, so that users can webcast the conference and watch the live broadcast of the conference.

Before you begin

Activating a License . Enabling Live Service .

Procedure

1. Click Call Configuration > Call Control Policy. 2. Enable System RTMP live.

| Managing Services | 65

Call Routing Rule Call routing rule is used for routing the incoming calls to YMS and the outgoing calls made by YMS to a destination. For the incoming calls from a gateway, you need to configure the inbound rule and the number translation rule to match this gateway. Likewise, you need to configure the outbound rule and the number translation rule for the outgoing calls to match the desired gateway.

If you use the following gateway for the incoming/outgoing calls, you need to configure the corresponding number translation rule.

Configuring the IP Call Service

Configuring the PSTN Gateway Service

Configuring the Peer Trunk Service

Configuring the REG Trunk Service

Configuring the SFB Gateway

Configuring the H.323 Gateway

Process of Call Routing Regular Expressions Adding a Call Routing Rule Configuring the Call Routing Rule Restricting the Dialed Number

Process of Call Routing Familiar yourself with the following terms:

Call routing rule: it applies to the outgoing calls and matches the outgoing-number translation rule of the gateway.

Incoming-number translation rule: it matches the incoming calls when the calls are routed through the gateway.

Outgoing-number translation rule: it matches the outgoing calls when the calls are routed through the gateway.

| Managing Services | 66

Regular Expressions Regular expressions can be used for configuring the call routing rules and the number translation rules.

Metacharacters Common Regular Expressions and Replacement Strings

Metacharacters

Table 34: Metacharacters in regular expressions

Characters Description

^ Matches the starting position of a line.

$ Matches the ending position of a line.

* Matches zero or more times of the preceding character or expression.

+ Matches one or more times of the preceding character or expression.

? Matches zero or one time of the preceding character or expression.

| Managing Services | 67

Characters Description

| Matches either the expression before or the expression after the choice operator.

{n} Matches n times of the preceding character or expression.

{n,} Matches at least n times of the preceding character or expression.

{n,m} Matches n to m times of the preceding character or expression.

[xyz] Matches any character specified in the brackets.

[^xyz] Matches anything except the character specified in the brackets.

[a-z] Matches the characters within the range specified in the brackets.

[^a-z] Matches anything except the characters within the range specified in the brackets.

\d Matches a digit character.

\D Matches a non-digit character.

Common Regular Expressions and Replacement Strings

Table 35: Common Regular Expressions and Replacement Strings

PCRE Description

.+ Matches any character except for \n.

^(1\d{10})$ Matches the 11-digit number which starts with 1.

For example, 12345678912

^0(\d+)$ Matches the number with 2 or more digits which starts with 0.

For example, 02, 0157

^(13[0-9]|14[5|7]|15[0|1|2|3|5|6|7|8|9]|18[0|1|2|3|5|6| 7|8|9])\d{8}$

Matches 11-digit mobile phone number, the first 3 digits includes the following types, and the last 8 digits can be any digits:

Start with 13 and the third number is any digit from 0 to 9

Start with 14 and the third number is 5/7 Start with 15 and the third number is

0/1/2/3/5/6/7/8/9 Start with 18 and the third number is

0/1/2/3/5/6/7/8/9

For example, 13012345678, 14512345678, 15987654321 or 18243218765

| Managing Services | 68

PCRE Description

^(\d{3,4}-)?\d{7,8}$ Matches the following number format:

XXX-XXXXXXX, 10-digit XXX-XXXXXXXX, 11-digit XXXX-XXXXXXX, 11-digit XXXX-XXXXXXXX, 12-digit XXXXXXX, 7-digit XXXXXXXX, 8-digit

For example, XXXX-XXXXXXX represents 07311234567 or other 7-digit number

\d{3}-\d{8}|\d{4}-\d{7} Matches the following number format:

XXX-XXXXXXXX, 11-digit XXXX-XXXXXXX, 11-digit

For example, XXX-XXXXXXXX represents 012-12345678 or other 11-digit number, XXXX- XXXXXXX represents 0123-1234567 or other 11- digit number

(\d{11})|((\d{3,4})-)?(\d{7,8})(-(\d{1,4}))? Matches the following number format:

11-digit mobile phone number XXXXXXXX, 8-digit number XXXXXXX, 7-digit number XXX/XXXX-XXXXXXX/XXXXXXXX, 4

formats in total XXX/XXXX-XXXXXXX/XXXXXXXX-X/XX/

XXX/XXXX, 16 formats in total XXXXXXX/XXXXXXXX-X/XX/XXX/XXXX, 8

formats in total

For example, XXXX-XXXXXXX represents 0731-8784888 or other 11-digit number

Table 36: Regex replace string

PCRE Description

$1@$2 Takes the content in the first and the second parentheses of the regular expression.

For example, the regular expression is avmcu\. (\d{1,10})@(xiamen.yealinksfb\.com), and the regex replace string is (\d{1,10}@(xiamen.yealinksfb \.com).

Adding a Call Routing Rule

Procedure

1. Click Call Configuration > Call Routing > Add.

| Managing Services | 69

2. Configure the parameters of the call routing rules.

Table 37: Parameters of the Call Routing Rule

Parameter Description

Enable Enable or disable the call routing rule.

Default: enabled.

All the disabled rules are ignored, though they are displayed in the rule list.

Name Specify the name of the call routing rule.

Priority The priority of the call routing rule. The smaller the number is, the higher the priority is.

When you place a call, the server will look up the first appropriate call routing rule according the priority in ascending order.

Destination regex match The Perl Compatible Regular Expressions (PCRE) is used to match the target call number.

If the match succeeds, the server will use this call routing rule.

3. If you want to restrict the number you call, enable Caller filtering policy, and configure the parameters.

Table 38:

Parameter Description

Mode Select a mode.

The supported modes are as follows:

Whitelist: if a call number in this whitelist matches the target regular expression, it will be called by this call routing rule.

Blacklist: even if a number in this blacklist matches the target regular expression, it will not be dialed out via this call routing rule.

Caller filtering policy Select the filtering policy. For more information, refer to Add a Number Filter .

4. Configure the parameter of the outgoing location.

| Managing Services | 70

Table 39:

Parameter Description

Call target The call target.

Reject IP Call Federation service Peer Trunk PSTN SfB Register Trunk H.323 GW

Outgoing location The gateway used to place the call.

If the call number matches this call routing rule, it is called via this gateway.

5. Click Save. 6. Operate according to the prompts, and click OK.

Related tasks Add a Number Filter

Configuring the Call Routing Rule You can add the call routing rules for rejecting the outgoing calls, when the number you call meets the regular expression set in the call routing rule, your call will be reject.

Procedure

1. Click Call Configuration > Call Routing Rule > Add. 2. Configure the parameters of the call routing rule.

3. If you want to restrict the number you call, enable Caller filtering policy, and configure the parameters. For example, if you want to reject the call placed by the YMS account whose number is not within 5555 to 9999, you can put the number within 5555 to 9999 into the blacklist. Otherwise, you can put the number into the whitelist.

| Managing Services | 71

4. In the Call target field, select Reject. 5. Click Save. 6. Operate according to the prompts, and click OK.

Restricting the Dialed Number

You can restrict the dialed number.

Restrict the dialed number: 1. Add a Number Filter is used to configure the dialed number; 2. Adding a Call Routing Rule specifies the service type used by the number filter rules.

Add a Number Filter

Add a Number Filter

Procedure

1. Click Call Configuration > Number Filter > Add. 2. Configure the basic parameters.

Table 40: Basic Parameters

Parameter Description

Enable Enable or disable this rule.

Default: enabled.

Name The rule name.

Note The additional description of this rule.

3. Click Add, configure the number filter, and click OK.

Table 41:

Parameter Description

Type The match type of this number.

Extension section Regular expression

| Managing Services | 72

Parameter Description

Origin extension, Rear extension These two extensions should have the same length.

Regular expression The Perl Compatible Regular Expressions (PCRE).

Description The additional description of this rule.

4. Click Save.

Related concepts Common Regular Expressions and Replacement Strings Related tasks Adding a Call Routing Rule

Communicating with Other Devices via IP Call For convenience, you can set the rules for the incoming and outgoing IP calls, and you need Configuring the IP Call Service and Adding a Call Routing Rule (if you set the outgoing call rules).

Configuring the IP Call Service

Configuring the IP Call Service For friendly calls, you can configure the outgoing and the incoming call rules in the IP call service.

About this task

Note: If you want to make IP calls on your VCD/VCM, you need to sign out your YMS account first.

Procedure

1. Click Service > SIP Service > IP Call Service > Add. 2. Configure the basic parameters of the IP call service.

Table 42: Basic Parameters

Parameter Description

Enable Enable or disable this service.

Default: enabled.

Name Specify the service name.

Node Specify the node used by this service.

Outgoing protocol Select a protocol for transmitting the SIP signaling.

The supported protocols are as follows:

UDP the optimal protocol for transmitting SIP signaling.

TCPthe reliable protocol for transmitting SIP signaling.

Default: UDP.

| Managing Services | 73

3. Configure the parameters of the service address.

Table 43: Parameters of the Service Address

Parameter Description

Network Specify the IP address used by this node.

UDP/TCP Port The UDP/TCP port used by this node.

Note: 5060 port is compulsory.

TLS Port The TLS port used by this node.

Default: port 5062.

4. Enable Support video, so that you can place a video call to the remote that supports video call. It is enabled by default.

5. Enable Support content sharing, so that you can share the content with the remote that supports receiving or sending contents. It is enabled by default.

6. Enable Replace the calling domain with the local IP, so that when you invite the device to join the conference by IP call, the device will display the server IP address as the caller ID. It is enabled by default.

7. Enable Media Bypass to improve the server performance and to support a larger number of participants in the conference. Note that third-party devices have a lower compatibility. If Support video is enabled, Media Bypass is recommended to be enabled. If Media Bypass is enabled, Media bypass service should be enabled too. For more information, refer to Configuring the Media Bypass Service .

8. Configure the security policy.

Table 44: Security policy parameter

Parameter Description

Enable security policy Enable or disable the security policy.

Default: disabled.

Mode Select a mode.

The supported modes are as follows:

Whitelist: allow the device in the security group to call into.

Blacklist: forbid the device in the security group to call into.

Security Group Select a security group.

9. Configure the outgoing call rule.

| Managing Services | 74

10. Configure the incoming call rule.

11. Click Save. 12. Operate according to the prompts, and click OK.

Related concepts Common Regular Expressions and Replacement Strings Related tasks Adding a Security Group

Communicating with PSTN To communicate with Microsoft PSTN, you need to do the following: Configuring the PSTN Gateway Service and Adding a Call Routing Rule .

Configuring the PSTN Gateway Service

Configuring the PSTN Gateway Service To communicate with the device in PSTN (such as the fixed line), you need to configure the PSTN gateway.

Procedure

1. Click Service > SIP Service > PSTN Gateway Service > Add. 2. Configure the basic parameters.

| Managing Services | 75

Table 45: Basic Parameters

Parameter Description

Enable Enable or disable this service.

Default: enabled.

Name Specify the service name.

Node Specify the node used by this service.

Network The IP address of this node.

Port Specify the source port on YMS for connecting to PSTN gateway.

Note: the value can be any integer from 0 to 65535.

Gateway address Specify the IP address or the domain name of the gateway.

Gateway Port Specify the port of the PSTN gateway.

Default port: 5060. The value can be any integer from 0 to 65535.

Transport protocol Select a protocol for transmitting the SIP signaling.

The supported protocols are as follows:

UDP the optimal protocol for transmitting the SIP signaling.

TCPthe reliable protocol for transmitting the SIP signaling.

Default: UDP.

Support video Enable it if the PSTN gateway supports video.

Default: disabled.

Support content sharing Enable it if the PSTN gateway supports receiving or sending contents.

Default: disabled.

3. Configure the security policy.

Table 46: Security policy parameter

Parameter Description

Enable security policy Enable or disable the security policy.

Default: disabled.

| Managing Services | 76

Parameter Description

Mode Select a mode.

The supported modes are as follows:

Whitelist: allow the account in the security group to call into via PSTN gateway.

Blacklist: forbid the account in the security group to call into via PSTN gateway.

Security Group Select a security group.

4. Configure the outgoing call rule.

5. Configure the incoming call rule.

6. Click Save. 7. Operate according to the prompts, and click OK.

Related concepts Common Regular Expressions and Replacement Strings Related tasks Adding a Security Group

Configuring the Peer Trunk Service To route calls between accounts registered in two different servers (for example, CUCM accounts and YMS accounts), you need to configure peer trunk service and Adding a Call Routing Rule .

Procedure

1. Click Service > SIP Service > Peer Trunk Service > Add. 2. Configure the basic parameters.

| Managing Services | 77

Table 47: Basic Parameters

Parameter Description

Enable Enable or disable this service.

Default: enabled.

Name Specify the service name.

Node Specify the node used by this service.

Network Specify the IP address of this node.

Port Specify the source port on YMS for connecting to another system.

Note: the value can be any integer from 0 to 65535.

Transport protocol Select a protocol for transmitting the SIP signaling.

The supported protocols are as follows:

UDP the optimal protocol for transmitting SIP signaling.

TCPthe reliable protocol for transmitting SIP signaling.

Default: UDP.

Outbound proxy Enable or disable the outbound proxy server.

Default: disabled.

Proxy address The IP address or domain name of the other system.

Proxy port Specify the port used by the other system.

Note: the value can be any integer from 0 to 65535.

Support video If the other system supports the video, you can enable this.

Default: enabled.

Support content sharing If the other system supports receiving or sending the content, you can enable this.

Default: enabled.

| Managing Services | 78

Parameter Description

Media Bypass Enable it to improve the server performance and to support a larger number of participants in the conference. Note that third-party devices have a lower compatibility.

Note: it is disabled by default. If Support video is enabled, Media Bypass is recommended to be enabled.

If Media Bypass is enabled, Media bypass service should be enabled too. For more information, refer to Configuring the Media Bypass Service .

3. Configure the security policy.

Table 48: Security policy parameter

Parameter Description

Enable security policy Enable or disable the security policy.

Default: disabled.

Mode Select a mode.

The supported modes are as follows:

Whitelist: allow the security group of another system to call into.

Blacklist: forbid the security group of another system to call into.

Security Group Select a security group.

4. Configure the outgoing call rule.

5. Configure the incoming call rule.

| Managing Services | 79

6. Click Save. 7. Operate according to the prompts, and click OK.

Related concepts Common Regular Expressions and Replacement Strings Related tasks Adding a Security Group

Configuring the REG Trunk Service To communicate with the third-party PBX, you need to configure the REG trunk service and add call routing rules (refer to Adding a Call Routing Rule ). For example, when communicating with 3CX or BSFT server, YMS need to register a 3CX or BSFT account.

About this task

YMS accounts can call third-party accounts directly, while third-party accounts can only call into YMS conferences but cannot place P2P calls to YMS accounts (the call can only be transmitted by third-party accounts registered in YMS).

Procedure

1. Click Service > SIP Service > REG Trunk Service > Add. 2. Configure the basic parameters.

Table 49: Basic Parameters

Parameter Description

Enable Enable or disable this service.

Default: enabled.

Name Specify the service name.

Node Specify the node used by this service.

Network The IP address of this node.

Port Specify the source port on YMS for communicating with the third-party server.

Note: the value can be any integer from 0 to 65535.

| Managing Services | 80

Parameter Description

Transport protocol Select a protocol for transmitting the SIP signaling.

The supported protocols are as follows:

UDP the optimal protocol for transmitting the SIP signaling.

TCPthe reliable protocol for transmitting the SIP signaling.

TLSthe safe protocol for transmitting the SIP signaling. TLS is available only when the YMS is registered at a SIP audio gateway that supports TLS.

Default: UDP.

Outbound proxy Enable or disable the outbound proxy server.

Default: disabled.

Proxy address Specify the IP address or the domain name of the third-party server.

Proxy port Specify the port of the third-party server.

Note: the value can be any integer from 0 to 65535.

Display name The name of the third-party server account.

URL The IP address or the domain name of the third- party server.

Auth name The authentication name of the third-party server account.

Auth domain The authentication domain name of the third-party server account.

Password The password of the third-party server account.

Expires Specify the registration timeout (in seconds) on YMS.

If the time is out, YMS will send the registration request to the third-party server again.

Default: 3600 seconds.

Support video Enable it if the remote supports video.

Default: disabled.

Support content sharing Enable it if the remote supports receiving or sending contents.

Default: disabled.

| Managing Services | 81

Parameter Description

Media Bypass Enable it to improve the server performance and to support a larger number of participants in the conference. Note that third-party devices have a lower compatibility.

Note: it is disabled by default. If Support video is enabled, Media Bypass is recommended to be enabled.

If Media Bypass is enabled, Media bypass service should be enabled too. For more information, refer to Configuring the Media Bypass Service .

3. Configure the outgoing call rule.

4. Configure the incoming call rule.

5. Click Save. 6. Operate according to the prompts, and click OK.

Related concepts Common Regular Expressions and Replacement Strings

Communicating with Skype for Business Server YMS can communicate with the local Skype for Business (SfB) server, Microsoft Office 365 and SfB server of other enterprise.

Note: SfB 2016 and 2015 are supported by YMS.

For more information about the deployment of YMS with SfB, refer to Skype for Business and Yealink Meeting Server Deployment Guide.

Communicating with the Local SfB Server

| Managing Services | 82

Communicating with Microsoft Office 365 Communicating with Other Enterprise SfB Servers Configuring the SFB Gateway Configuring the SfB Gateway Media Service

Communicating with the Local SfB Server To make the YMS and SfB in the intranet communicate with each other and the user in the intranet use both of them, you can deploy YMS to communicate with the SfB.

To communicate with the local SfB server, you need to do the following steps: Configuring the Local SfB Server , Importing the TLS Certificate , Configuring the SFB Gateway Configuring the SfB Gateway Media Service , and Adding a Call Routing Rule .

Configuring the Local SfB Server

Configuring the Local SfB Server If you need your YMS to communicate with the local SfB server, you can follow the steps below to add YMS to the SfB server topology in the SfB front-end server.

About this task

Take the local environment as an example, you need to run the example command below to complete the configuration:

If you use YMS cluster version and you plan to use the business node in YMS to connect to SfB, the FQDN of this node is sfb1.5060.space and the A record of this business node is added to the DNS server.

The FQDN of the SfB Front-End Pool is xiamenpool.xiamen.yealinksfb.com, and the A record of this SfB pool is added to the DNS server.

Procedure

Run the command below to add YMS to the Front-End Pool generated by SfB server via powershell: Note that only the accounts in the Front-End Pool can communicate with YMS after the integration. For more information about the command, refer to https://docs.microsoft.com/en-us/powershell/module/skype/? view=skype-ps.

Table 50:

Procedure Command Syntax description

1. Get the Site ID of SfB Front-End Pool.

Get-CsSite None

| Managing Services | 83

Procedure Command Syntax description

2. Add YMS into the trusted application pool created by the SfB server.

New-CsTrustedApplicationPool -Identity -ComputerFqdn < YMS DNS FQDN > -Registrar -Site < Site ID> - RequiresReplication $false -ThrottleAsServer $true -TreatAsAuthenticated $true

Example command:

New-CsTrustedApplicationPool -Identity sfb1.5060.space -ComputerFqdn sfb1.5060.space

-Registrar xiamenpool.xiamen.yealinksfb.com -Site 5 -RequiresReplication $false - ThrottleAsServer $true -TreatAsAuthenticated $true

Syntax explanation:

-Identity: defines the DNS FQDN of the YMS group that belongs to the trusted application pool.

-ComputerFqdn: defines the DNS FQDN of the YMS which communicates with the SfB in the trusted application pool.

The name of the trusted application pool should be consistent with the name of YMS, because when integrating SfB with YMS, there is only one YMS.

-Registrar: defines the DNS FQDN of the SfB Front-End Pool to which this trusted application pool belongs.

-Site: defines the SfB Site ID to which this trusted application pool belongs. Run command Get-CsSite to get the Site ID.

Others are the same with the default value.

Note: When creating a trusted application pool (and a trusted application computer in the next step) in this way, SfB/ Lync will issue a warning state: "WARNING: Machine sfb1.5060.space from the topology you are publishing was not found in Active Directory and will result in errors during Enable- CsTopology as it tries to prepare Active Directory entries for the topology machines." This warning can be safely ignored as YMS is non- domain-joined, and you should answer Yes to this warning.

| Managing Services | 84

Procedure Command Syntax description

3. Add other trusted applications to the trusted application pool.

New-CsTrustedApplication -ApplicationId -TrustedApplicationPoolFqdn -Port

Example command:

New-CsTrustedApplication -ApplicationId sfb1 -TrustedApplicationPoolFqdn sfb1.5060.space.space -Port 5067

Syntax explanation:

-ApplicationId: defines a friendly identifier for the YMS devices. You can customize the name and it is unique.

-TrustedApplicationPoolFqdn: defines the trusted application pool to which this YMS belongs.

-Port: defines the source port on YMS that communicates with SfB server. It can be any unoccupied port from 0 to 65535. The default port is 5067 in YMS, and we recommend that the Port you configure is consistent with the port in YMS.

4. View the trusted application to ensure that YMS is added into the trusted application pool.

Get-CsTrustedApplication None

5. View information about whether or not there is the registrar to which you want to add static routing configuration. If there is no an existing Identity that matches the desired registrar, run the next command.

Get-CsStaticRoutingConfiguration None

6. Create a new static routing configuration for the desired registrar.

New- CsStaticRoutingConfiguration Identity "Service:Registar: "

Example command:

New- CsStaticRoutingConfiguration Identity "Service:Registrar:xiamenpool.xiamen.yealinksfb.com"

Syntax explanation:

-Identity: defines the registrar to which we want to apply the static route object.

| Managing Services | 85

Procedure Command Syntax description

7. Create the static SIP domain route, and associate this route with a trusted application.

$newroute = New-CsStaticRoute -TLSRoute - Destination -Port -MatchUri < YMS DNS FQDN> - UseDefaultCertificate $true

Example command:

$newroute = New-CsStaticRoute -TLSRoute -Destination "sfb1.5060.space" -Port 5067 -MatchUri "sfb1.5060.space" - UseDefaultCertificate $true

Syntax explanation:

-Destination: defines the YMS DNS FQDN where SfB should send SIP requests matching the domain specified in -MatchUri.

-Port: defines the source port on YMS that communicates with SfB server. It can be any unoccupied port from 0 to 65535. The default port is 5067 in YMS, and we recommend that the Port you configure is consistent with the port in YMS.

-MatchUri: defines the matched YMS DNS FQDN.

8. Apply your required static route to your registrars' static routing configuration.

Set-CsStaticRoutingConfiguration -Identity "Service:Registar: " -Route @{Add=$newroute}

Example command:

Set-CsStaticRoutingConfiguration -Identity "Service:Registrar:xiamenpool.xiamen.yealinksfb.com" -Route @{Add=$newroute}

Syntax explanation:

-Identity: defines the registrar to which we want to apply the static route object.

Others are the same with the default value.

9. View all routes in your static routing configuration to ensure that your required static route is added successfully.

Get-CsStaticRoutingConfiguration | Select-Object -ExpandProperty Route

None

10. Enable the new topology.

Enable-CsTopology None

Communicating with Microsoft Office 365 To communicate with Microsoft Office 365, you need to do the following: Configuring Microsoft Office 365 , Importing the TLS Certificate , Configuring the SFB Gateway , Configuring the SfB Gateway Media Service , and Adding a Call Routing Rule .

Note that you need to enable the federation on Microsoft Office 365.

Configuring Microsoft Office 365

Configuring Microsoft Office 365

Procedure

1. Make sure that the SRV record and the A record of YMS and SfB are configured on the public DNS server.

| Managing Services | 86

2. If you add a domain name in Office 365, and use the suffix of the added domain name to build a federation with YMS, you need to add CNAME record and SRV record to the DNS server which the added domain belongs to.

3. If you use the suffix onmicrosoft.com of Office 365 or use the suffix of the added domain name to build a federation with YMS, you can do one of the following to check whether the external access is allowed:

If you (using the legacy portal of Office 365) want to create the federation between Office365 and all the external YMSs, you need to select On except for blocked domains in the External access field on Office 365.

If you (using the legacy portal of Office 365) want to create the federation between Office 365 and one YMS, you need to select On only for allowed domains in the External access field on Office 365 and DNS FQDN of YMS is added to the allowed domain.

If you (using the new Office 365) want to build the federation between Office 365 and one YMS, you should enable the switches displayed as below and make sure that the DNSFQDN of is added to the allowed domain.

| Managing Services | 87

If you (using the new Office 365) want to build the federation between Office 365 and one YMS, you should enable the switches displayed as below and make sure that the DNSFQDN of YMS is added to the allowed domain.

| Managing Services | 88

Communicating with Other Enterprise SfB Servers

If you need your YMS device to communicate with the SfB device via the public network, you can configure the YMS to communicate with other enterprise SfB servers.

To communicate with the other enterprise SfB servers, you need to do the following: Configuring Other Enterprise SfB Servers , Importing the TLS Certificate , Configuring the SFB Gateway , Configuring the SfB Gateway Media Service , and Adding a Call Routing Rule .

YMS communicates with the edge servers of other enterprise SfB via the SfB gateway. Note that edge servers of other enterprise SfB should enable the federation.

Configuring Other Enterprise SfB Servers

Configuring Other Enterprise SfB Servers

Procedure

1. Make sure that other enterprise SfB servers have edge servers, and the IP address of the public network is configured on these edge servers or the IP addresses of these edge server are mapped to the public network by NAT. Do one of the following:

Verify the public DNS FQDN of the SfB edge server on the Command Prompt, for example, ping sip.yealinksfb.com. If the verification fails, you need to check the DNS A record of the SfB edge server.

| Managing Services | 89

View the information of the SfB edge server in the Front End topology. The information includes whether or not the federation is enabled on the SfB edge server.

2. Make sure that the SRV record and the A record of YMS and SfB are configured on the public DNS server.

Log into the public DNS server where the SfB edge server is located to view the SRV record and the A record. The host machine record must be_sipfederationtls_tcp in the SRV record.

| Managing Services | 90

Log into the public DNS server where YMS is located to view the SRV record and the A record. The host machine record must be_sipfederationtls_tcp in the SRV record.

3. Make sure that you purchase the certificate of the SfB edge server from a trusted third-party organization. The procedure of importing the certificate is described as below: a) Go to the Deployment Wizard of the Lync Server, and click Install or Update Skype for Business Server

System.

b) Click Run Again.

| Managing Services | 91

c) Click Import Certificate and import the external edge certificate.

After importing, the page is shown as below:

| Managing Services | 92

d) Select the imported edge server certificate, click View, and make sure that the user name (commonName attribute) or the user optional name (altNames attribute) must contain the FDQN name of the edge server.

4. Configure the federation information on the SfB and YMS. a) Open the Control Panel in the SfB Front End, click Federation and External Access, and add the YMS

FQDN that connects to the SfB business node to the SIP FEDERATION DOMAINS field.

| Managing Services | 93

Configuring the SFB Gateway To route calls correctly to the specified SfB server, you need to add a SfB gateway on YMS, providing the destination gateway for the call routing.

Before you begin Make the SfB server trust this YMS by Importing the TLS Certificate on this YMS.

The methods of obtaining the certification are described as follows:

If it is the local SfB server, you can use a certificate issued by a public CA, or a certificate issued by the organization's internal CA (trusted by SfB and YMS).

If it is Microsoft office 365 or other enterprise SfB servers, you can use the certificate issued by a public CA.

| Managing Services | 94

The certificate should meet the following:

The Subject name (commonName attribute) or the Subject Alternative Name (altNames attribute) of the certificate should contain the DNS FQDN name of YMS service node.

The certificate should contain the public key and the private key.

Procedure

1. Click Service > SIP Service > Skype for Business > Add. 2. Configure the basic parameters.

| Managing Services | 95

Table 51: Basic Parameters

Parameter Description

Enable Enable or disable the SfB gateway server.

Default: enabled.

Name Specify the name of SfB gateway.

Node Specify the node used by this SfB gateway.

Network Specify the IP address of this node.

Transport protocol Only TLS is available if communicating with SfB.

FQDN Specify the name of YMS. Example: sfb1.5060.space

Method: add this domain name on DNS server which the A record of YMS is added to.

Port Specify the source port of YMS to communicate with SfB server.

Note: the value can be any integer from 0 to 65535. This port must be consistent with the port configured in SfB server and cannot be occupied.

Default: 5067.

If the SfB enables federation, this port should be 5061. First of all, change the registration port to other port, and make the port as 5061, otherwise, the port will be closed by the firewall.

Domain The domain name of SfB server. For example, xiamen.yealinksfb.com.

Port Specify the source port of the SfB server to communicate with YMS.

Default: 5061.

Federation Enable or disable the federation.

Default: disabled.

According to different SfB servers, you can enable or disable the federation in one of the following scenarios:

If the SfB server is the local SfB server, you can disable the federation.

If the SfB server is Microsoft Office 365 or other enterprise SfB servers, you can enable federation.

Outbound proxy Enable or disable it to allow the SfB server to send requests to the outbound proxy server.

Default: disabled.

| Managing Services | 96

Parameter Description

Proxy address Specify the IP address or the domain name of this outbound proxy server.

Proxy port Specify the port of this outbound proxy server.

Note: the value can be any integer from 0 to 65535.

Support video If you enable this, you can place video calls to the remote that supports video call.

Default: enabled.

3. Configure the security policy.

Table 52: Parameters of the Security Policy

Parameter Description

Enable security policy Enable or disable the security policy.

Default: disabled.

Mode Select a mode.

The supported modes are as follows:

Whitelist: allow the security group of this SfB Server to call into.

Blacklist: forbid the security group of this SfB Server to call into.

Security Group Select a security group.

4. Configure the outgoing call rule.

5. Configure the incoming call rule.

| Managing Services | 97

6. In the SfB certificate field, select the desired certificate to make the SfB server trust this YMS. 7. Click Save. 8. Operate according to the prompts, and click OK.

Related concepts Common Regular Expressions and Replacement Strings Related tasks Adding a Security Group

Configuring the SfB Gateway Media Service If you want to communicate with the SfB server, you need to configure the SfB gateway media service.

Procedure

1. Click Service > MCU Service > SfB Gateway Media Service > Add. 2. Configure the basic parameters.

Table 53: Basic Parameters

Parameter Description

Enable Enable or disable this service.

Default: enabled.

Name Specify the name of the server.

Node Specify the node used by this service.

External media port Specify the start and the end values of this port range.

Default port range: 61000-63999. To avoid the port conflict, the gap between the maximum port and the minimum port should be more than 200. For example, you set 61000 as the minimum port, and the maximum port should be more than 61199.

All local networks Specify the IP address used by this service.

3. Click Save. 4. Operate according to the prompts, and click OK.

| Managing Services | 98

Configuring the H.323 Gateway You can configure the H.323 gateway and add call routing rules (refer to Adding a Call Routing Rule ), which can be used for the H.323 devices to join the conference via IP call (the listener port is 1720). You can also take the gateway as a device and register the gateway on the third-party GK server for communication.

Procedure

1. Click Service > H.323 Service > H.323 Gateway > Add. 2. Configure the basic parameters of the H.323 gateway.

Table 54: Basic Parameters

Parameter Description

Enable Enable or disable the H.323 gateway server.

Default: enabled.

Name Specify the server name.

Node Specify the server.

Username Specify the authentication ID used by this gateway.

GK address Configure the IP address and domain name of the GK server.

GK authentication Enable or disable the GK authentication.

Default: disabled.

GK auth name Specify the account for the GK server authentication.

GK auth password Specify the password for the GK server authentication.

H.225 listening port (TCP) Configure the H.225 listening port.

Default: 1720.

Q.931/H.245(TCP) Specify the start and the end values of the Q931/ H.245 port range.

Note: the default port range is from 27000 to 29999. To avoid the port conflict, the gap between the maximum port and the minimum port should not be less than 200. For example, you set 27000 as the minimum port, the maximum port should not be less than 27199.

| Managing Services | 99

Parameter Description

H.235 encryption The supported types are as follows:

Optionalnegotiate with the remote whether or not H.235 encryption can be used in H.323 calls.

CompulsoryH.235 encryption has to be used in H.323 calls.

DisableH.235 encryption cannot be used in H.323 calls.

Default: Optional.

H.239 Enable or disable the H.239.

Default: enabled. When the H.323 devices call into YMS to join in video conferences via H.323, H.239 is used to receive and send contents.

H.460 Enable the H.460 protocol to support firewall traversal for H.323 signaling or not.

Conference media ByPass Enable it to improve the server performance and to support a larger number of participants in the conference. Note that the third-party devices have a lower compatibility.

Default: disabled.

If Conference media ByPass is enabled, Media bypass service should be enabled too. For more information, refer to Configuring the Media Bypass Service .

3. Click Advance Option, and configure the outgoing call rule.

4. Configure the incoming call rule.

| Managing Services | 100

5. If the gateway is as the device and registered on the third-party GK server, configure the GW prefix matching rules. The H.323 account on the server can directly call the conference ID to join the conference, but the conference ID should meet the prefix matching rule.

6. Click Save. 7. Operate according to the prompts, and click OK.

Note: If the H.323 devices fail to join conference by IP call, make sure that Configuring Interactive Media Service is correct.

Related concepts Common Regular Expressions and Replacement Strings

Port Consumption The table below lists the port consumption in different situations.

Note:

Full HD call (1080P) requires approximately the double port consumption of HD call (720P). However, for the live broadcast, Full HD call (1080P) requires 3 interactive ports and 1 webcast port.

The default value of the broadcast interactive conference is HD call (720P), and it cannot be edited. For VOD(video on demand), the loading process might consume some ports, for example, downloading

the audio and the video files or accessing the audio and the video files via the web interface. Once the loading is finished, the port consumption is finished too.

| Managing Services | 101

Table 55: Port Consumption

No. Situation The consumed video ports (720P)

The consumed broadcasting ports

The consumed webcast ports (720P)

The consumed recording ports (720P)

The consumed VOD ports

1 In a broadcasting interactive conference, when one participant joins the conference

23 participants joining the conference consumes 1 port

1 NA NA NA

2 Enable Alibaba Cloud RTMP live

2 NA 1 audience watching the webcast consumes 1 port

NA NA

3 Enable Yealink RTMP live

2 NA 1 audience watching the webcast consumes 1 port

NA NA

3 Enable recording 1 NA NA 2 1 audience watching the recording online consumes 1 port

4 Establish a call between your peer trunk and the third- party MCU (you need to configure the peer trunk first)

Bypass disabled: 3; Bypass enabled: 1

NA NA NA NA

5 Establish a call between your registration trunk and the third-party MCU (you need to configure the registration trunk first)

Bypass disabled: 3; Bypass enabled: 1

NA NA NA NA

6 Place a call to SfB client

3 (Bypass not supported)

NA NA NA NA

7 YMS joins a SfB conference

3 (Bypass not supported)

NA NA NA NA

8 Lync joins the YMS conference

3 (Bypass not supported)

NA NA NA NA

| Call Settings | 102

No. Situation The consumed video ports (720P)

The consumed broadcasting ports

The consumed webcast ports (720P)

The consumed recording ports (720P)

The consumed VOD ports

9 Invite user to join the conference via IP call (IVR/URL/ IP)

Bypass disabled: 3; Bypass enabled: 1

NA NA NA NA

10 H.323 user joins the conference

Bypass disabled: 3; Bypass enabled: 1

NA NA NA NA

11 H.323 users call SIP users or SIP users call H.323 users

Bypass disabled: 3; Bypass enabled: 1

NA NA NA NA

Call Settings

Call Control Policy Video Display Policy

Call Control Policy

Setting the Video and the Content Resolution Configuring the Call Bandwidth Configuring the Max Video Parties per Conference Configuring the Max Audio-Only Parties per Conference Setting IVR language Configuring the Time for Joining Conference Beforehand Enabling Auto Dialing Enabling the Auto Redialing Enabling Mute Participants upon Entry Configuring the Audio Prompt When Participants Join or Leave Conferences Displaying the Native Video Setting the Last Participant Backstop Timeout Setting the Auto End Conference Without Moderator Enabling the Content Only Enabling Join with APP Awakened by Browser Enabling Receiving Ringtone Receipt Enabling External/Internal Network Access WebRTC Authentication Disabling the Roll Call Setting Configuring the iOS Push Address Setting the QoS

| Call Settings | 103

Setting the Video and the Content Resolution Due to the limit of the enterprise bandwidth, you can set the maximum video resolution and maximum content sharing resolution for a better video definition.

Procedure

1. Click Call Configuration > Call Control Policy. 2. Configure the parameters of the video and the content resolution.

Table 56: Parameters of video resolution

Parameter Description

Max video resolution You can set the maximum video resolution.

Default: 720P/30FPS.

Max content sharing resolution Configure the maximum content sharing resolution.

Default: 1080P/5FPS

3. Click Save. 4. Operate according to the prompts, and click OK.

Configuring the Call Bandwidth According to the limit of enterprise bandwidth, you can limit the media bandwidth sent by YMS to conference participants. For example, if you set the call bandwidth as 2M and the bandwidth of a participant is 4M, when he joins the conference and his devices negotiate with the server, he can only receive the bandwidth of 2M.

Procedure

1. Click Call Configuration > Call Control Policy. 2. In Max call bandwidth field, select the desired bandwidth.

Defaults to 2Mbps. 3. Click Save. 4. Operate according to the prompts, and click OK.

Configuring the Max Video Parties per Conference You can limit the max audio-only parties per conference, to meet the concurrent needs of other important conferences. If the number of the video parties exceeds the max number, users cannot place video calls to join the conference (except the VMR).

Procedure

1. Click Call Configuration > Call Control Policy. 2. Enter the desired number in the Max video parties per conference field.

The default value is 1500 party. 3. Click Save. 4. Operate according to the prompts, and click OK.

| Call Settings | 104

Configuring the Max Audio-Only Parties per Conference You can limit the max audio-only parties per conference, to meet the concurrent needs of other important conferences. If the number of audio-only parties exceeds the max number, users cannot place audio calls to join the conference (except the VMR).

Procedure

1. Click Call Configuration > Call Control Policy. 2. Enter the desired number in the Max audio-only parties per conference field.

The default value is 1500 party. 3. Click Save. 4. Operate according to the prompts, and click OK.

Setting IVR language You can set the voice prompt language for IVR service.

Procedure

1. Click Call Configuration > Call Control Policy. 2. Select a language from the drop-down menu of Audio IVR language. 3. Click Save. 4. Operate according to the prompts, and click OK.

Configuring the Time for Joining Conference Beforehand You can specify the time when users can join the scheduled conferences in advance.

Procedure

1. Click Call Configuration > Call Control Policy. 2. In the Join conference beforehand field, enter the desired value.

The default value is 60 minutes. 3. Click Save. 4. Operate according to the prompts, and click OK.

Enabling Auto Dialing You can enable Auto dialing feature. When the scheduled conference begins, the devices with invited accounts registered in will receive call invitations from YMS.

About this task

The supported devices are PVT950/PVT980, VC880/VC800/VC500/VC400/VC200/VC120/VC110 video conferencing system, SIP VP-T49G and VP59 IP phone, and third-party devices.

Procedure

1. Click Call Configuration > Call Control Policy. 2. Enable Auto dialing.

It is enabled by default. 3. In the Device field, select the device type.

When scheduling conferences, if you want to invite third parties, select the check box of Third party.

| Call Settings | 105

4. Click Save. 5. Operate according to the prompts, and click OK.

What to do next For more information about enabling Auto dialing when scheduling conferences, refer to Yealink Meeting Server Installation Guide.

Enabling the Auto Redialing During a scheduled conference, if the device you invite disconnects with YMS, you can enable the Auto redialing, so that the system can invite it to join the conference again after the account is registered in the device again. This feature is not available to the broadcasting parties.

Before you begin Enabling Auto Dialing is done.

Procedure

1. Click Call Configuration > Call Control Policy. 2. Enable Auto redialing.

It is enabled by default. 3. Click Save. 4. Operate according to the prompts, and click OK.

What to do next For more information about enabling this feature when scheduling conferences, refer to Yealink Meeting Server User Guide.

Enabling Mute Participants upon Entry You can enable Mute participants upon entry. When the conference begins, participants will be muted automatically when they join the conference.

Procedure

1. Click Call Configuration > Call Control Policy. 2. Enable Mute Participants upon Entry.

What to do next When users schedule conference, they can enable Mute Participants upon Entry. For more information, refer to Yealink Meeting Server User Guide.

Configuring the Audio Prompt When Participants Join or Leave Conferences You can configure the audio prompt for different participants.

Note:

For scheduled conferences or Meeting Now conferences:

When users schedule conferences or create Meet Now conferences, if you set Play sound when participants join or leave as Close, the Conference Control page does not display this configuration.

During the conference, if you change the configuration of Play sound when participants join or leave, it does not take effect to the ongoing conferences but to the later scheduled conferences or created Meet Now conferences.

For VMRs:

| Call Settings | 106

When adding or editing VMRs, if you set Play sound when participants join or leave as Close, the Conference Control page does not display this configuration.

During the conference, if you change the configuration of Play sound when participants join or leave, it does not take effect to the ongoing conferences.

For more information about the configuration of the audio prompt on the Conference Control page, refer to Yealink Meeting Server User Guide.

Configure the audio prompt for scheduled conferences and Meet Now conferences

1. Click Call Configuration > Call Control Policy.

Configure the audio prompt for VMRs

1. Click Meeting Room > Virtual Meeting Room and do one of the following:

If you want to add a VMR, click Add Meeting Room.

In the Permission setting field, configure the audio prompts.

If you want to edit a VMR, click .

In the Permission setting field, configure the audio prompts.

Displaying the Native Video If you enable this feature, you can see the native video image displayed in the MCU image. During a conference, if the native video image covers some parts of the MCU image, you can hide the native video image, but you can still see it in the MCU image.

Procedure

1. Click Call Configuration > Call Control Policy. 2. Enable Display native video. 3. Click Save. 4. Operate according to the prompts, and click OK.

Setting the Last Participant Backstop Timeout The length of time for which a conference will continue when only one participant remains, and you can set this time to manage the useless conference and free up the server resource.

Procedure

1. Click Call Configuration > Call Control Policy. 2. Enable Last participant backstop timeout.

It is enabled by default. 3. Configure the timeout.

The default value is 30 minutes.

| Call Settings | 107

4. Click Save. 5. Operate according to the prompts, and click OK.

Setting the Auto End Conference Without Moderator When there is no moderator in the Meet Now conference, you can configure the auto-timeout to end the useless conference and free up the server resource.

Procedure

1. Click Call Configuration > Call Control Policy. 2. Enable Auto End Conference Without Moderator. 3. Configure the timeout. 4. Click Save. 5. Operate according to the prompts, and click OK.

Enabling the Content Only If you want the device that does not support dual-stream protocol receive the content, you can enable Content only. When the devices share content in a call, these devices can only receive the content and the audio. If you disable this feature, these devices can only receive video images.

About this task

Note: The device can receive the audio, whatever you enable or disable this feature.

Procedure

1. Click Call Configuration > Call Control Policy. 2. Enable Content Only.

It is enabled by default. 3. Click Save. 4. Operate according to the prompts, and click OK.

Enabling Join with APP Awakened by Browser If you want to get the entrance to Yealink VC Desktop when you join the conference by browser, you can enable Join with APP awakened by browser.

About this task If this feature is enabled, the Home page of Yealink Web App is displayed as below:

| Call Settings | 108

Procedure

1. Click Call Configuration > Call Control Policy. 2. Enable Join with APP awakened by browser. 3. Click Save. 4. Operate according to the prompts, and click OK.

Enabling Receiving Ringtone Receipt If you want to hear the Ringback Tone of the callee when you place the call via PSTN (for example, the fixed line), you can enable this feature.

Procedure

1. Click Call Configuration > Call Control Policy. 2. Enable Receiving ringtone receipt. 3. Click Save. 4. Operate according to the prompts, and click OK.

Enabling External/Internal Network Access WebRTC Authentication You can enable external/internal network access WebRTC authentication, after you enable it, users need to enter the YMS accounts and the passwords to join conferences via browser.

About this task

The page is shown as below:

| Call Settings | 109

Procedure

1. Click Call Configuration > Call Control Policy. 2. Enable External network access WebRTC authentication/Intranet access WebRTC authentication. 3. Click Save. 4. Operate according to the prompts, and click OK.

Related information The Configuration of Access WebRTC Authentication Is Invalid

Disabling the Roll Call Setting If you enable this feature, during the roll call, the called party is unmuted by default. If other participants do not want to hear the voice of the called party who is muted at that moment, you can disable this feature.

About this task

Example scenario: call the roll. For more information, refer to Yealink Meeting Server User Guide.

Note: This feature is only applicable to the training mode conference.

Procedure

1. Click Call Configuration > Call Control Policy. 2. Disable Roll call setting.

It is enabled by default. 3. Click Save. 4. Operate according to the prompts, and click OK.

| Call Settings | 110

Configuring the iOS Push Address You can configure the iOS push address, so that the user can receive the incoming calls or conference notifications when Yealink VC Mobile for iOS is running in the background or exited.

About this task You use YMS account to log into Yealink VC Mobile for iOS.

Procedure

1. Click Call Configuration > Call Control Policy. 2. In the iOS push address field, enter the push address.

Default: https://ios.push.yealinkvc.com:8443. 3. Click Save. 4. Operate according to the prompts, and click OK.

Setting the QoS You can set Differentiated Services Code Points (DSCP) for the audio or video packets, which can be used to adjust the traffic and modify the flaw in the process of transmitting the audio and video packets. The DSCP value should be consistent with the one set in the switch or the one set in the network topology, to ensure that the data packet is not lost during the transmission.

Procedure

1. Click Call Configuration > Call Control Policy. 2. Enter the corresponding value in the Video QoS field.

The default value is 34. 3. Enter the corresponding value in the Audio QoS field.

The default value is 63. 4. Operate according to the prompts, and click OK.

Video Display Policy

Setting the Default Layout Displaying the Participant Name Display Participant Status Displaying the Participant Quantity Displaying the Audio-Only Participant

Setting the Default Layout You can set the conference default layout, and the MCU image received by the participants is subject to the default layout you set.

About this task

The conference moderator can change the layout. For more information, refer to Yealink Meeting Server User Guide.

Procedure

1. Click Call Configuration > Video Display Policy. 2. Select a default layout.

| Call Settings | 111

Table 57: Parameters of the Default Layout

Parameter Description

Default layout The supported layouts are as follows:

Equal NN: the video images of participants are displayed in equal parts.

1+N: the video image of the first participant who joins the conference is displayed in a large screen, and the video images of other participants are displayed in small screens around the first participant.

Default: 1+N.

3. Click Save.

Setting Video Layout of 1+N Setting the Video Layout of Equal NN

Setting Video Layout of 1+N In the video layout of 1+N, if current participants exceed the maximum number of the video images per screen, the video carousel is enabled by default and the system will switch among the video images of participants automatically. You can set the rules per carousel and the interval of auto-switching video images. You can use the voice-activated feature so that the system will automatically identify the speaking participant. When the participant continues speaking during the preconfigured voice-activated time, his video image will be displayed in the large screen, and the video images of other participants will be displayed in small screens.

Procedure

1. Click Call Configuration > Video Display Policy. 2. Configure parameters of 1+N Video Layout.

Table 58: Parameters of 1+N Video Layout

Parameter Description

Configure the maximum video images of videos on screen.

Default: 1+7.

Set the carousel interval.

Configure the number of video images per carousel. The maximum video image depends on the N in 1+N video layout.

1+N

Configure the voice-activated time.

3. Click Save.

| Call Settings | 112

Setting the Video Layout of Equal NN In the video layout of Equal NN, if current participants exceed the maximum number of the video images per screen, the video carousel is enabled automatically and the system will switch among the video images of participants automatically. You can set the rules for each carousel and the interval of auto-switching video images.

Procedure

1. Click Call Configuration > Video Display Policy. 2. Configure the Equal NN video layout.

Table 59: Parameters of Equal NN video layout

Parameter Description

Configure the maximum number of video images per screen in Equal NN mode.

Default: 4*4.

Equal NN

Set the carousel interval.

3. Click Save.

Displaying the Participant Name To display the participant name in the MCU video image, you can enable this feature.

About this task

When users schedule conferences and create Meet Now conferences, if you disabled Display participant name, the Conference Control page will not display this configuration and the MCU video image will not display the participant name.

During the conference, if you enable Display participant name, the Conference Control page displays the configuration.

During the conference, if you disable Display participant name, the Conference Control page does not display this configuration and the MCU video image will not display the participant name.

During the conference, if you edit the display position of Display participant name, it does not take effect to the ongoing conferences but to the later scheduled conferences, created Meet Now conferences, and created VMRs.

For more information about the configuration of the participant name on the Conference Control page, refer to Yealink Meeting Server User Guide.

Procedure

1. Click Call Configuration > Video Display Policy. 2. Configure the parameters.

3. Click Save.

| Managing Accounts | 113

Display Participant Status If you want to view the status in the MCU image, for example the participant is muted or blocked, you can enable Display participant status.

Procedure

1. Click Call Configuration > Video Display Policy. 2. Enable Display participant status.

It is enabled by default. 3. Click Confirm.

During the conference, if you disable this configuration, the Conference Control page would not display this configuration and the MCU video image would not display the participant status.

Displaying the Participant Quantity If you want to view the number of participants that join the conference by audio or video, you can enable the Display Participant Quantity.

Procedure

1. Click Call Configuration > Video Display Policy. 2. Enable Display participant quantity.

It is enabled by default. 3. In the Type field, select the audio or video. 4. Click Save.

Displaying the Audio-Only Participant If you want to display the video images of audio-only participants in the MCU image, you can enable Display audio- only participants.

Procedure

1. Click Call Configuration > Video Display Policy. 2. Enable Display the audio-only participants.

It is disabled by default. 3. Click Save.

Managing Accounts

You can manage the user account, the room system accounts, and other accounts by group, and you can add, edit, and delete the above accounts.

User Accounts, Room System Accounts and Other Accounts Managing Groups Adding Accounts Sending Emails to YMS Accounts Adjusting the Account Group Editing the Authority Editing the GK Registration Parameter

| Managing Accounts | 114

Editing a Batch of Accounts Configuring the LDAP Setting the Password Policy

User Accounts, Room System Accounts and Other Accounts The differences among user accounts, room system accounts and other accounts are as follows.

Type Description Note

User account It can be used to log into YMS. The same user account can be logged into 5 devices at most at the same time.

Room system account The account is used to associate with the device in the video meeting room. The same room system account can be logged into 5 devices at most at the same time.

They are called as YMS accounts.

Other account Enter the IP address or URL to add devices, and you can invite these added devices during a conference. YMS accounts are not assigned to these devices.

No limit.

Managing Groups If you want to manage users accounts, room system accounts and other accounts by group, you can customize the group according to the enterprise organization.

The organization root is the enterprise name by default. You can manage users accounts, room system accounts and other accounts of your group and the subordinate groups.

Adding a Group Editing/Deleting the Group

Adding a Group You can add groups according to enterprise department to manage accounts.

Procedure

1. Click Account > User Account/Room System Account/Other Account > Adding Group. 2. In Group name field, enter the group name. 3. In Upper group field, select a upper group. 4. Click Save.

Editing/Deleting the Group

About this task If a group has no subordinated groups, you not delete this group.

| Managing Accounts | 115

Procedure

1. Click Account > User Account/Room System Account/Other Account. 2.

In the Organization list, select the desired group, and click to edit this group or click to delete this group.

Adding Accounts You can add user accounts, room system accounts and other accounts.

Parameters of User Account Parameters of Room System Account Parameters of Other Devices Adding an Account Manually Adding a Batch of Accounts

Parameters of User Account Before adding user account, you need to know parameters of the user account first.

Method Parameter Description

Name Specify the user name.

Account Specify the account required to log into the YMS.

Password You can customize the password. The password is generated randomly if you leave it blank.

AD account If Obtain from AD server is selected, it is the account on AD server used to obtain the AD account name and account number.

The account on AD server can be obtained from the AD server administrator.

Adding Manually or adding in batch

Group Specify the name of the department which the user belongs to.

| Managing Accounts | 116

Method Parameter Description

Authority The user authority.

The available rights are as follows:

A: this account can see all user accounts, room system accounts, and permanent VMRs synced to the directory.

B: this account can see only the user accounts, the room system accounts, and the permanent VMRs (synced to the directory) in his group and in the same level group. If the user is in root node, this account can also see the third-party devices.

C: this account can see only the user accounts, the room system accounts, and the permanent VMRs (synced to the directory) in his group.

D: this account canonly see himself, and cannot see any meeting room when scheduling conferences.

Custom: you can customize the authority for this account.

Email The email address of the user. It is used to receive the initial password and the conference notification.

Account Information If the LDAP feature is enabled, select the way to add account.

The supported ways are as follows:

Manual: you need to add account information manually.

Obtain from AD server: you can obtain the account information from the specified AD server.

Obtain Obtain the AD account name and account number from the specified account on AD server.

Adding Manually

Enable schedule Enable or disable this account to schedule meeting room or video conference.

Default: enabled.

| Managing Accounts | 117

Method Parameter Description

Enable Meet Now Enable or disable this account to create a Meet Now conference.

Default: enabled.

Enable Schedule Virtual Meeting Room

If you enable this configuration and this account is the moderator of a VMR, this account can only schedule VMRs via Outlook. If you enable this configuration but this account is not the moderator of a VMR, this account has no privilege to schedule VMRs via Outlook.

Note: only when you contact Yealink technical support engineers to enable this configuration can you see this configuration.

Enable call authority If this feature is enabled, this account can only call the contacts which are visible to him.

Default: disabled.

Enable Recording If this feature is enabled, this account can record the conference.

Enable live caption privilege If you enable this feature, the live caption is available on the conference scheduled by this account. You can contact Yealink technical support engineer to subscribe to this service.

Default: disabled. The voice transfer server should support this feature. For more information about it, contact Yealink technical support engineer.

Support H.323 registration If Configuring the GK Service is finished, you can allow or refuse this account to register in a device via H.323.

Default: disabled.

GK REG If this feature is enabled, you need a password to register this account in the GK server.

Note: it is recommended to enable.

| Managing Accounts | 118

Method Parameter Description

Recording space Set the maximum recording space for this account. If you select Customization, the maximum recording space cannot be larger than the storage space of the server.

Note: no limit.

Recording Template When this account is the organizer of the conference or the VMR, his recording template is applied when recording. For more information about permanent VMRs, refer to Parameters of the Recording Template .

Related tasks Adding an Account Manually Adding a Batch of Accounts Configuring the LDAP Editing the Authority

Parameters of Room System Account You need to know the parameters before adding the room system accounts.

Method Parameter Description

Name The user name.

Name The account required to log into the YMS.

Password Customize the password for YMS accounts. The password is generated randomly if you leave it blank.

AD account If Obtain from AD server is selected, specify the AD account which is used to obtain the AD account name and account number.

The AD account can be obtained from the AD server administrator.

Add manually or batch add

Group The name of the department to which the user belongs to.

| Managing Accounts | 119

Method Parameter Description

Authority The authorities owned by this account.

The available authorities are as below:

A: this account can see all user accounts, room system accounts, VMRs (synced to the directory), and other accounts.

B: this account can only see the user accounts, the room system accounts, and the VMRs (synced to the directory) in his group and in the same level groups. If the user belongs to the root node, this account can also see the third-party devices.

C: this account can only see the user accounts, the room system accounts, and the VMRs (synced to the directory) in his group.

D: this account can only see himself, and cannot see any meeting room when scheduling conferences.

Custom: you can customize the authority for this account.

Email The email address of the user. This email address is used to receive the initial password and the conference notifications.

Account Information If the LDAP feature is enabled, specify the way of adding accounts.

The available ways are as below:

Manual: add names and accounts manually.

Obtain from AD server: according to the AD account you specified,you can obtain names and accounts from AD server.

Add manually

Obtaining account information Obtain the name and number of AD account from the specified account.

| Managing Accounts | 120

Method Parameter Description

Enable schedule Allow or refuse this account to schedule conferences.

Default: enabled.

Enable Meet Now Allow or refuse this account to create Meet Now conferences.

Default: enabled.

Enable call authority If this feature is enabled, this account can only call the contacts which are visible to him.

Default: disabled.

Enable Recording If this feature is enabled, this account can record the conference.

Enable live caption privilege If you enable this feature, the live caption is available on the conference scheduled by this account. You can contact Yealink technical support engineer to subscribe to this service.

Default: disabled. The voice transfer server should support this feature. For more information about it, contact Yealink technical support engineer.

Recording space Set the maximum recording space for this account. If you select Customization, the maximum recording space cannot be more than the storage space of the server.

Note: no limit.

Recording Template When this account is the organizer of the conference or the VMR, the recording template of the organizer is applied when recording. For more information about permanent VMRs, refer to Parameters of the Recording Template .

Parameters of Other Devices Before adding other devices, you need to know parameters of other devices.

Table 60: Parameters of Other Devices

Parameter Description

Name The name of this device.

| Managing Accounts | 121

Parameter Description

Protocol The call protocol used by the device.

Number The URL of this device.

Group The name of the group to which the device belongs.

Email The email address of the device owner. This email is used to receive conference notifications.

Related tasks Adding Other Account Manually Adding a Batch of Other Accounts

Adding an Account Manually If you can add an account manually.

Procedure

1. Do one of the following:

If you want to add user accounts, click Account > User Account > Add Account. If you want to add room system accounts, click Account Management > Room System Account > Add. If you want to add other accounts, click Account > Other Account > Add Account.

2. Configure the account parameters, and save them. 3. If you enter the email address, click Send email, the account information will be sent to the user by email. 4. Click OK.

Note: If you do not add email addresses when adding the user or room system accounts, you need to send the initial passwords to the corresponding users, and remind them to change the passwords promptly.

Related concepts Parameters of User Account

Adding a Batch of Accounts If you want to add a batch of accounts at the same time, you can import the accounts by the template (excel file). Note that you cannot customize the template, you need to download a blank template.

Procedure

1. Click Account > User Account/Room System Account/Other Account > Import. 2. Click Download Template to download the template. 3. Enter the account parameters in the template and save it to your computer. 4. Click the field in the dotted box, and select the desired excel file to upload. 5. Click OK.

Related concepts Parameters of User Account

| Managing Accounts | 122

Sending Emails to YMS Accounts You can send the account information to corresponding users by email.

Procedure

1. Click Account > User Account/Room System Account. 2. Select the desired account, and click Email.

Adjusting the Account Group If the group of the user accounts and other accounts changes, you can adjust the group.

Procedure

1. Click Account > User Account/Other Account. 2. Select the desired meeting room, and click Adjust Grouping.

3. Select the group, and click Save.

Editing the Authority You can configure the visible account range for the user accounts and the room system accounts, the scheduling conferences authority, the creating Meet Now conferences authority, and the call authority.

Procedure

1. Click Account > User Account/Room System Account. 2. Select the desired account, and click Modify Authority. 3. Edit the authority parameters. 4. Click Save.

Related concepts Parameters of User Account Related tasks Adding a Room System Account

| Managing Accounts | 123

Editing the GK Registration Parameter You can edit the GK registration parameter of the user accounts and the room system account. GK registration parameter includes whether or not the account can be registered in the device by H.323 protocol, and whether or not the account needs the password to register in the GK server.

Procedure

1. Click Account > User Account/Room System Account. 2. Select the desired account, and click GK REG. 3. Configure the GK registration parameter. 4. Click Save.

Editing a Batch of Accounts If you want to edit a batch of user accounts or other accounts, you can export excel file of all user account or other accounts, and download it on your computer, edit details in the excel file and import the edited file.

About this task

If you add a batch of user accounts and other accounts by importing template, you can edit account details in the template, and import this template to YMS to complete editing.

Procedure

1. Click Account > User Account/Room System Account/Other Account > Export. 2. Edit the parameters in the exported file. 3. Click Import. 4. Click the field in the dotted box, and select the desired excel file to upload. 5. Click OK.

Configuring the LDAP You can connect YMS to LDAP server that supports LDAPv3, so that the devices which register in YMS via standard SIP/H.323 can obtain YMS contacts. Microsoft Active Directory is supported.

About this task Because the AD server can only be read, the accounts should be created on both YMS and AD server and be associated with each other. Take the image below as an example: the accounts created on AD server and the accounts created on YMS, they should follow the same rule to create their account names and account numbers. The account name should be less than 64 characters, and the account number should be within the number range of the system account (refer to Allocating the Number Resource ). When creating an account on YMS, you can enter the corresponding AD account, and the system can get the account information automatically from AD server. The device registered in YMS can sync the YMS contacts from AD server to realize the 4-digit number call among YMS contacts, the conference invitation and so on.

| Managing Accounts | 124

Note: When the AD server administrator edits the AD account number and account name, the corresponding account on YMS will sync the account name but not the account number.

The organizational structure of YMS and LDAP server are independent. If you want to edit the organizational structure, the organizational structure viewed by the third-party devices should be edited via AD server, and the organizational structure viewed by YMS devices should be edited via YMS.

Procedure

1. Click Account > LDAP. 2. Configure the parameters.

Table 61: LDAP parameters

Parameter Description

Enable Enable or disable the LDAP.

Default: disabled.

Server address Specify the domain name or the IP address of the AD server.

Port Specify the port of the AD server.

| Managing Accounts | 125

Parameter Description

Base DN Specify the root path for YMS obtaining the LDAP account.

For example, OU=test_yms,DC=ldap,DC=yealink,DC=cn

Obtaining method: the image below is the directory of AD server, if YMS wants to obtain the user information under this contents, right click test_yms- >Attribute->Attribute Editor->View distinguishedname, and the value is OU=test_yms,DC=ldap,DC=yealink,DC=cn. Enter the value in the Base field on YMSS.

Username Specify the username used to log into the AD server.

Note: The user name is provided by the AD server administrator.

For example, the chensheng account in the test_yms contents.

The user in the test_yms contents is all acceptable. Username is chensheng@ldap.yealink.cn.

| Managing Accounts | 126

Parameter Description

Password Specify the password used to log into the LDAP server.

Note: The password is provided by the LDAP server administrator.

For example, the AD username is chensheng@ldap.yealink.cn.

Enter the password of this username.

Name attribute Specify the name attribute of the returned AD account.

For example, name or cn. For example, when the name attribute is name and when you create a YMS account by obtaining from the AD server, the name of the YMS account equals to the corresponding value of AD user name attribute.

Number attribute

Configure the number attribute of each record returned by the LDAP server.

For example, telephoneNumber, mobile, or ipPhone and so on, when the number attribute is telephoneNumber and when you create a YMS account by obtaining from the AD server, the number of the YMS account equals to the corresponding value of AD account telephoneNumber attribute. In additionally, the corresponding value of telephoneNumber should be within the number range of the system account (refer to Allocating the Number Resource ) and cannot be empty. If it does not meet the condition, there will be an error when creating a YMS account by obtaining from the AD server.

AD account attribute

Specify the account attribute in AD server.

For example, sAMAccountName

Mailbox Property

Configure the property name of the mailbox in the LDAP server.

For example, mail or email

Web portal login with AD is preferred

If users often use the LDAP account to log into YMS, you can enable this feature. If you enable it, users will go to the AD Login when they access the Login page. Otherwise, they will go to the User Login by default.

3. Click Connection Test. If the configuration is correct, the prompt Connection successful will pop up.

4. Click Save.

Related concepts Parameters of User Account

Setting the Password Policy You can set a maximum password age. When it is reached, the system will remind users to change their passwords.

Procedure

1. Click Account > Password. 2. Select the check box of Max valid period, and enter the value. 3. Click Save.

| Managing Devices | 127

Managing Devices

You can manage YMS-registered devices on YMS, including viewing the device statistics, viewing the device details, adding groups for devices, adding/editing/pushing/deleting/exporting configuration, adding/editing/pushing/deleting/ downloading configuration, rebooting devices, resetting devices to factory settings, capturing packets, exporting logs, managing T49 devices and so on.

Note: You need contact Yealink technical support engineers to enable these features except for managing T49 devices.

Prerequisites for the Devices Automatically Connected to YMS Device Status Managing Devices by Groups (Optional) Pushing the Configuration Pushing Firmware Diagnosing Devices Managing T49 Devices

Prerequisites for the Devices Automatically Connected to YMS YMS-registered devices can automatically be connected to YMS device management platform. However, there are prerequisites.

Table 62:

Prerequisites

YMS Version 23.0.0.11 or later.

For YMS 1.X version, you need to upgrade it to YMS 2.X version first and then upgrade it to version 23.0.0.11.

PVT980/PVT950: 1345.32.0.40 or later

VC880/VC800/VC500: 63.32.0.40 or later

VC200: 80.32.0.40 or later

Supported Device and Its Version

VP59: 91.332.0.19 or later

Device Status

You can familiarize yourself with the following status when YMS-registered devices are connected to YMS.

Offline: the device is disconnected from YMS. The reason might be the device being powered off or the device being disconnected from the network or others.

Registered: the device is connected to YMS and a YMS account is registered on the device. Unregistered: the device is connected to YMS but the YMS account is signed out.

Note: YMS will refresh the device status every 5 minutes.

| Managing Devices | 128

Managing Devices by Groups (Optional) If you are used to manage the devices by groups, you can create groups.

Procedure

1. Click Device management > Group management. 2. Add a group.

3. Go to the Device management page.

Pushing the Configuration

About this task

Before pushing the configuration, you need to know the device status first (Device Status ):

When the device is in a call, the configuration will not be pushed until the call is finished. When the device is offline, configuration pushing is not available. When the device is unregistered or registered, the configuration will be pushed.

Procedure

1. Click Device management > Configuration management. 2. Add the configuration.

| Managing Devices | 129

3. Do one of the following operations:

On the page of Configuration management, click Push configurations on the right side of the added configuration to go to the page of Push configurations.

Go to the Device management page.

| Managing Devices | 130

Pushing Firmware You can push a firmware to upgrade an old device firmware or downgrade a new firmware.

About this task

Before pushing the firmware, you need to know the device status first (Device Status ):

When the device is in a call, the firmware will not be pushed until the call is finished. When the device is offline, firmware pushing is not available. When the device is unregistered or registered, the firmware will be pushed.

Procedure

1. Click Device management > Firmware management. 2. Add the firmware.

3. Do one of the following:

On the page of Firmware management, click Push firmware on the right side of the added firmware to go to the page of Push firmware.

| Managing Devices | 131

Go to the Device management page.

Diagnosing Devices When problems occurs to the devices, you can diagnose the device via YMS.

Procedure

1. Click Device management > .

2. In the Diagnosis tool field, select the desired method, and click OK.

| Managing Devices | 132

Managing T49 Devices You can upgrade the firmware, enable the device log, or export the device log.

Pushing Firmware

1. Click Device management > Old device management > Device Upgrade. 2. Click Add to add firmware.

3. Select the Enable check box and enable Up to Date.

Results: YMS will push the newest version to the device if the version of the device firmware is lower.

| Managing Meeting Rooms | 133

Enabling the Device Log

After you enable the device log, the device will upload the log automatically.

1. Click Device management > Old device management > Device Log. 2. Select the Enable check box.

Exporting the Device Log

1. Click Device management > Old device management > Device Log. 2.

Select the time and click .

Note:

You can only select the latest 7 days for exporting the log because YMS only save logs in the latest 7 days. Besides, you cannot select the start date and the end date between two different months.

If the page prompts the file does not exist, it means that there is no device log during the time.

Managing Meeting Rooms

You can view, edit and delete entity meeting rooms and VMRs.

The Entity Meeting Room and the Virtual Meeting Room Managing Groups of Meeting Room Adding a General Meeting Room Adding a Video Meeting Room Discussion Mode and Training Mode Adding a VMR Adjusting the Meeting Room Group Sending Emails About Joining the Conference

The Entity Meeting Room and the Virtual Meeting Room The meeting room includes the entity meeting room and the virtual meeting room (VMR).

Difference Type Description

Entity meeting room The entity meeting rooms can be used to schedule OA conferences. For more information, refer to Yealink Meeting Server User Guide.

Definition

VMR Users can join the VMR at any time. But the VMR cannot be used to schedule conferences.

| Managing Meeting Rooms | 134

Difference Type Description

General meeting room The general meeting room is not deployed with devices.

Entity meeting room

Video meeting room The video meeting room is deployed with devices.

Classification

VMR No

Managing Groups of Meeting Room According to the meeting room locations, you can customize the organization relationship to manage meeting rooms by groups.

The organization root is the enterprise name by default. You can manage meeting rooms in your group and the subordinate groups.

Adding Groups of Meeting Room Editing/Deleting the Meeting Room Group

Adding Groups of Meeting Room You can add groups according to the location of meeting room.

Procedure

1. Click Meeting Room > Entity Meeting Room/Virtual Meeting Room > Add Group. 2. In the Name field, enter the group name. 3. In the Group field, select the upper group. 4. Click Save.

Editing/Deleting the Meeting Room Group

About this task If the group has subordinated groups, you cannot delete this group.

Procedure

1. Click Meeting Room > Entity Meeting Room/Virtual Meeting Room. 2.

In the Organization list, select the desired group, and click to edit this group or click to delete this group.

| Managing Meeting Rooms | 135

Adding a General Meeting Room If the user wants to initiate conferences in an entity meeting room without devices, you can add a general meeting room.

Before you begin You add the meeting room group.

Procedure

1. Click Meeting Room > Entity Meeting Room > Add Meeting Room. 2. In the Type field, select Common. 3. In the Name field, enter the meeting room name. 4. In Group field, select the desired group. 5. Click Save.

Adding a Video Meeting Room If the user wants to initiate conference in an entity meeting room with devices, you can add a video meeting room.

Before you begin You have add the group of meeting room, the room system accounts or other accounts.

Procedure

1. Click Meeting Room > Entity Meeting Room > Add Meeting Room. 2. In Type field, select Video. 3. In the Name field, enter the meeting room name. 4. In Group field, select the desired group. 5. Select the desired account from the drop-down menu of Account bound. 6. Click Save.

Discussion Mode and Training Mode The differences between these two modes are listed as below:

Table 63:

Difference Discussion Mode Training Mode

ModeratorYou can set any participants in the enterprise directory as moderators. Moderator

You can set any participants in the enterprise directory as moderators.

If the broadcasting interactive feature is enabled, the moderators are the interactive parties by default.

Participant Role

Guest It refers to the participants who join the VMR but are not set as moderators.

Lecturer Moderators can set any moderators or guests as lecturers during the conference.

| Managing Meeting Rooms | 136

Difference Discussion Mode Training Mode

Guest

It refers to the participants who join the VMR but are not set as moderators.

If the broadcasting interactive feature is enabled, the guests are the broadcasting parties by default.

Moderators can configure the layout during the discussion mode conferences or meet now conferences.

Moderators can configure the layout in the training mode conference, they can also allow/ reject the participant application for speaking, make the roll call, export the roll call result, and switch the roles between lecturers and moderators/guests.

Moderators can edit and delete conferences, and during the conference, they can also send messages, invite participants, invite participants by email, invite the third parties, share the conference information, call participants, call participants from the call history, hang up participants, move the participants into the waiting center, allow/reject the participant to join the conference, mute/unmute participants, turn on/off the camera, block/unblock the voice, switch the roles between the moderators and guests, control the far-end camera, lock or unlock conferences, manage the recording file, manage the share link, turn on/off RTMP Live, and leave or end conferences.

Feature Privilege

Other participants can only view the conference details.

Layout Moderators and guests can view all participants. For setting the default layout, refer to Setting the Default Layout .

The moderators can view all participants by default. For setting the default layout, refer to Setting the Default Layout .

If the broadcasting interactive feature is enabled, the moderators can view all interactive parties by default.

For guest, all lecturers are given equal prominence in the layout by default. If there is no lecturer, all guests can view the reminder of waiting for the lecturer.

If broadcasting interactive feature is enabled, the broadcasting parties will see that all lecturers are displayed in equal video images by default If there are no lecturers, all broadcasting parties can view the reminder of waiting for the lecturer.

Speaking rule Free speaking.

All guests and moderators are muted by default. After cancelling the mute status, the moderators can speak. Guests can speak only when the moderators allow their application for speaking.

Contents All moderators and guests can share contents by default.

Only moderators and lecturers can share contents. Guests cannot share contents.

Related tasks Adding a VMR

| Managing Meeting Rooms | 137

Adding a VMR You can add a VMR, so that users can call into the VMR to join the video conference at any time.

Before you begin The meeting room group is added.

Procedure

1. Click Meeting Room > Virtual Meeting Room > Adding Meeting Room. 2. Configure the parameters of VMR.

Table 64: Parameters of VMR

Parameter Description

Alias Set the alias for this VMR. The call rules based on the alias will be generated after you create the VMR. Prerequisites: Communicating with Other Devices via IP Call or Configuring the H.323 Gateway .

For example, if the alias of the VMR is test and the meeting room ID is 88888, the call rules will be generated automatically in the IP call service and gateway service. Users can directly dial test@domain name to call into 88888.

Mode Specify the mode of the VMR. For more information, refer to Discussion Mode and Training Mode .

Conference ID The conference ID used to call into this meeting room.

Default range: from 20000 to 89999.

Password Enable or disable the password required to join the conference.

If it is enabled, a password is required to join the conference.

Default: disabled.

Group Specify the group name of this meeting room.

Organizer If a conference is created in this VMR, the recording template of the conference organizer will be used to record the conference, and the generated recording and the collaboration files are stored under the personal folder of this organizer.

Note: if the owner of the recording file is deleted, the recording template of this VMR becomes the default template, and the administrator will manage the generated recording and the collaboration files.

Moderator They can control the VMR at any time.

For more information about, refer to Yealink Meeting Server User Guide.

Favorites During a conference, users can call the desired favorites to invite them to join the VMR.

| Managing Meeting Rooms | 138

Parameter Description

Sync contacts Sync this meeting room to the enterprise directory or not.

Default: enabled.

Max video parties The max video parties of this meeting room. Reserving the video party can meet the concurrent needs of other important conferences. If the number of video parties in this meeting room exceeds the max number, the user cannot place a video call to this meeting room.

Max audio-only parties The max audio-only parties of this meeting room. Reserving the audio party can meet the concurrent needs of other important conferences. If the number of audio-only parties in this meeting room exceeds the max number, the participants cannot place an audio call to this meeting room.

Max video resolution The max video resolution.

Default: 720P/30FPS.

Max content resolution Specify the max content resolution.

Default: 1080P/5FPS

Max call bandwidth According to the limit of the enterprise bandwidth, you can limit the media bandwidth sent by YMS to conference participants.

Default layout The default layout, which takes effect for the participants in VMRs of discussion mode and for the moderators in VMRs of training mode.

Display native video Enable or disable the native video to be displayed in the conference.

Default: disabled.

Content Only If the device does not support dual-stream protocol, you can enable Content only feature. When other devices share contents in a call, this kind device can only receive the content and the audio.

Default: enabled.

Mute participants upon entry In discussion mode, enable or disable this configuration.

If you enable this configuration, the participant will be muted automatically when he joins the conference.

Enable live caption privilege If you enable this feature, live caption is available on this VMR. You can contact Yealink technical support engineer to subscribe to this service.

Default: disabled. The voice transfer server should support this feature. For more information about it, contact Yealink technical support engineer.

| Managing Meeting Rooms | 139

Parameter Description

Roll call setting In Training mode, enable it to unmute the participant whose name is called out on the list or not.

If the participants do not want to hear the voice of the participant whose name is called out on the list, you can disable the Roll call setting.

Default: enabled.

Broadcasting interactive In Training mode, enable it to create a broadcasting interactive conference or not.

If it is enabled, you can create a conference with a large number of participants.

Enable or disable the RTMP live broadcast. If it is enabled, the users can watch the live broadcast of the conference.

Default: disabled.

RTMP Live

Definition It refers to the video resolution that the MCU sends to live streaming platform.

The supported video resolution are as below:

1080P(1080P) HD(720P)

Default: HD.

| Managing Meeting Rooms | 140

Parameter Description

Layout Configure the video layout displayed in the webcast.

Supported video options are as follows:

1+N: the video layout of the live broadcast is displayed in 1+N format with the voice- activated feature enabled. If no participants share content, the current speaker is displayed in a large video image, otherwise, the shared content is displayed in the large video image. Up to 1+N participants are displayed in a single row of live thumbnails at the bottom, that is, the video images in the row are switched automatically.

Picture in picture: the video layout of the live broadcast is displayed in Picture in picture format. If no participants share content, the current speaker is displayed in a large video image. Otherwise, the shared content is displayed in the large video image and the video image of the current speaker is reduced to a thumbnail at the bottom-right corner.

Selected speaker: the video layout of the live broadcast is displayed in Selected speaker format. If no participants share content, the current speaker is displayed in a large video image. Otherwise, the shared content is displayed in the large video image.

Event details It refers to the text displayed on the Live page.

IP Call Blacklist If it is enabled, the user can join the conference by IP call.

Join with browser If it is enabled, the user can join the conference by Yealink Web app.

| Managing Meeting Rooms | 141

Parameter Description

Auto recording When the conference starts, the conference is recorded automatically.

Auto redialing During the conference, if YMS-registered devices is offline and it logs in again, the system will automatically redial the device to join the conference.

Note: This feature is not available to the broadcasting parties.

Table 65: Advanced Option

Parameter Description

Video port resource reservation To ensure that important conferences can proceed successfully without being occupied by other conferences, you can enable this configuration to reserve video ports.

Default: 3. The maximum number of the video port resource reservation cannot exceed the total number of the video ports and the broadcasting ports that are available in the license.

Recording Privilege Specify the desired participant that has the privilege to record the conference.

3. Click Save.

Related concepts Discussion Mode and Training Mode

Adjusting the Meeting Room Group If the group of the entity meeting rooms and the VMRs change, you can adjust the group.

Procedure

1. Click Meeting Room > Entity Meeting Room/Virtual Meeting Room. 2. Select the desired meeting room, and click Adjust Grouping. 3. Select the group, and click Save.

Sending Emails About Joining the Conference If you want to create a one-off conference in the VMR, you can inform the corresponding participants about the information by email.

Procedure

1. Click Meeting Room > Virtual Meeting Room. 2.

Click icon on the right side. 3. Configure the email information. 4. Click Send.

| Managing Conferences | 142

Managing Conferences

You can view, delete and control video conferences. The video conferences include scheduled conferences, Meet Now conferences and VMRs.

Viewing the Conference Viewing the Meeting Room Usage Monitoring the Conference Deleting a Conference Controlling the Conference

Viewing the Conference You can view the ongoing conference, the scheduled conference that can join in advance (refer to Configuring the Time for Joining Conference Beforehand ) and the free VMRs. Conference information contains the subject, the type, the number, the password, the organizer, the start time and the duration.

Procedure

Click Conference > Conference Control.

Viewing the Meeting Room Usage You can view the details of the free entity meeting rooms and the occupied meeting rooms to know the usage of meeting rooms.

Procedure

Click Conference > Meeting Room Usage.

Monitoring the Conference You can monitor the unoccupied VMRs, the ongoing conference, and the scheduled conference that can join in advance (refer to Configuring the Time for Joining Conference Beforehand ). You can subscribe to this service from Yealink technical support.

If you go to the Conference Monitoring page, you can view the video and the shared contents, listen to the participants but you will not be displayed in the MCU image and included in the participant list.

Going to the Conference Monitoring Page

| Managing Conferences | 143

Adjusting the Output Volume Selecting an Audio Output Device Changing the Display Language Configure the Video Images in Equal NN Setting the Video Carousel Displaying a Participant in a Full Screen/Exiting the Full Screen Scaling the Video Image Changing Video Layouts Displaying the Conference Monitoring Page in a Full Screen/Exiting the Full Screen

Going to the Conference Monitoring Page If you want to monitor the conference, you need to go to the Conference Monitoring page first.

Procedure

1. Click Conference > Conference Control. 2. Select Ongoing, Scheduled, and VMR. 3. On the right side of the desired conference, click to go to the Conference Monitoring page.

Adjusting the Output Volume

Before you begin Going to the Conference Monitoring page.

Procedure

1. Click Settings. 2. In the Volume field, drag the adjuster to the desired value.

The device volume you adjust is only applicable to the conference monitor. 3. Click the icon below to mute the device.

Selecting an Audio Output Device If you use the new audio or video device during a conference, the new device will not be enabled automatically. You need manually enable the new audio or video device.

Before you begin Going to the Conference Monitoring page via Chrome.

| Managing Conferences | 144

Procedure

1. Click Settings. 2. Select the available device from the drop-down menu of the Audio Output. 3. Click Play test sound, and you can adjust the volume when the music is playing.

Changing the Display Language The supported languages are Simplified Chinese, Traditional Chinese, English, Russian, Polish, Spanish and Portuguese.

Before you begin Going to the Conference Monitoring page.

Procedure

1. Click Settings. 2. Select the desired language from the drop-down menu of Language Setting.

Configure the Video Images in Equal NN

Before you begin Going to the Conference Monitoring page.

Procedure

1. Click Layout. 2. Select the desired value from the drop-down menu of Equal NN.

The default value is 4x4. 3. Click SAVE.

Setting the Video Carousel If the number of participants exceeds the maximum number of video images per screen, you can enable the video carousel, and the system will switch among the video images of the participants automatically.

Before you begin Going to the Conference Monitoring page.

Procedure

1. Click Layout. 2. Enable Video carousel. 3. Select videos switch or Full screen switches. 4. Click SAVE.

Displaying a Participant in a Full Screen/Exiting the Full Screen

Before you begin Going to the Conference Monitoring page.

| Managing Conferences | 145

Procedure

1. Click Participants. 2. On the right of the desired participant, click Zoom In. 3. Do one of the following:

Click Participants view, you can view the local video of this participants enlarged to a large window. Click Participants video, you can view the MCU image applied to this participant enlarged to a large

window.

The icon appears beside the participant after you zoom the participant in. 4. If you want to toggle the full-screen mode, click , and select Switch to participants video/Switch to

participants view; if you want to exit the full-screen mode, click Zoom Quit.

Scaling the Video Image When you click an item such as Settings on the menu bar, the pop-up pane may cover some parts of the video image. Therefore, you can enable Scale Video to Fit View to get a better visual experience.

Before you begin Going to the Conference Monitoring page.

Procedure

1. Click Settings. 2. Enable Scale Video to Fit View.

Changing Video Layouts

Hiding/Showing the Conference Video Switching Between the Video Window and the Content Window

Hiding/Showing the Conference Video You can hide or display the conference video.

Before you begin Going to the Conference Monitoring page.

About this task

By default, when participants are sharing contents, the received content is displayed in a large window, and the main video window is reduced to thumbnail in the bottom-left corner.

Procedure

Click in the top-right corner of the main video window or click Remote video in the bottom-left corner of the screen.

Switching Between the Video Window and the Content Window By default, when participants are sharing contents, the received content is displayed in a large window, and the main video is reduced to a thumbnail in the bottom-left corner.

Before you begin Going to the Conference Monitoring page.

| Managing Conferences | 146

About this task

To view the conference video more clearly, you can display the conference video in the large window.

Procedure

Click the conference video displayed in the small window. The main video will be displayed in a large window, and the received content is displayed in a thumbnail in the bottom-left corner.

Displaying the Conference Monitoring Page in a Full Screen/Exiting the Full Screen You can display the Conference Monitoring page in a full screen or exit the full screen.

Before you begin Going to the Conference Monitoring page.

About this task By default, the conference video is displayed in window.

Procedure

Do one of the following:

Click Full Screen/Exit Full Screen. Double click the large window to display it in full screen or exit the full screen.

Deleting a Conference You can delete the ongoing conference and the scheduled conference that can join in advance (refer to Configuring the Time for Joining Conference Beforehand ).

About this task If you delete an ongoing conference, the conference ends immediately.

Procedure

1. Click Conference > Conference Control > Ongoing/Scheduled. 2.

On the right side of the desired conference, click . 3. If you delete the recurrence conference, click Cancel occurrence/Cancel series. 4. If you want to delete a single conference, click OK.

Controlling the Conference You can control the unoccupied VMRs, the ongoing conference, and the scheduled conference that can join in advance (refer to Configuring the Time for Joining Conference Beforehand ) as the moderator. The conference control includes configuring the conference layout, configuring messages, managing conference participants and so on.

Procedure

1. Click Conference > Conference Control. 2. Select Ongoing, Scheduled, and VMR.

| Conference Statistics | 147

3. On the right side of the desired conference, click to go to the Conference Control page.

4. Control the conference. For more information, refer to Yealink Meeting Server User Guide.

Conference Statistics

You can view the MCU resource and the historical statistics of YMS, you can also view the records of different call types.

Viewing the MCU Resource Viewing the Conference Statistics Viewing the Call History

Viewing the MCU Resource You can view the max concurrent port, the usage of the video port, the broadcast port and the audio-only port.

Procedure

Click Statistics > MCU Resource.

Viewing the Conference Statistics You can view the call duration and the times.

Procedure

Click Statistics > Historical Statistics.

| System Maintenance | 148

Related tasks Viewing the Call History

Viewing the Call History If you want to know the information of conferences and participants, you can view the call history.

Procedure

1. Click Statistics > CDR. 2. Select the desired period. 3. Select Video Conference or P2P. 4. Do the following:

Click on the right side of the desired conference to view the participant information.

Click the on the right side of the desired conference, to export the statistics to your computer to view the participant information.

If you want to view conferences or calls of the specified type in the specified period, click Export to export them on your computer.

Related tasks Viewing the Conference Statistics

System Maintenance

Upgrading the System Updating Firmware Making Backups and Restoring Rebooting the System Resetting to Factory Viewing the Operation Log Viewing the System Log

| System Maintenance | 149

Viewing the Device Log Viewing the Recording Log Using Tools

Upgrading the System When a new version is available, you can upgrade your YMS. The latest version can be obtained from Yealink.

About this task

Note: For YMS version 2.0 or later, you can update them seamlessly via the web page.

Procedure

1. Click Maintenance > Upgrade. 2. Click Update, and select the desired software version.

Updating Firmware You can remotely update the devices on YMS. The supported devices are PVT950/PVT980, VC880/VC800/VC500/ VC400/VC200/VC120/VC110 video conferencing system, SIP VP-T49G and VP59 IP phone, and CP960 conference phone.

Enabling the Device Upgrade Adding the Firmware Updating the Firmware

Enabling the Device Upgrade You can enable this feature.

Procedure

1. Click Maintenance > Upgrade > Device Upgrade. 2. Select the Enable check box.

Adding the Firmware Before upgrading the firmware, you need to add it. If the device has accessories and you want to upgrade the device, as well as its accessories, you need to add the firmware of the accessories.

Procedure

1. Click Maintenance > Upgrade > Device Upgrade > Add. 2. Click Upload to upload the desired file. 3. If you also want to upgrade the accessory firmware, select the desired one in the Accessory firmware field.

| System Maintenance | 150

4. Click Save.

Updating the Firmware You can update the firmware manually or automatically.

Procedure

1. Click Maintenance > Upgrade > Device Upgrade. 2. Select the desired firmware, enable Up to Date. If the firmware version of a device is different from the specified

version, it will be updated automatically. 3.

If you want to update the firmware manually, click . 4. Click OK, and then the devices of the same types will be updated automatically.

Making Backups and Restoring When the space for backup is sufficient, you can make backup for the server data, including the user accounts and the conference information.

Setting the Auto Backup Creating a Backup Manually Downloading a Backup Backup/Restore

Setting the Auto Backup

Procedure

1. Click Maintenance > Backup/Restore > Setting. 2. Configure the parameters. 3. Click OK.

Creating a Backup Manually

Procedure

1. Click Maintenance > Backup/Restore > Add. 2. Enter the file name. 3. Click OK.

Downloading a Backup

Procedure

1. Click Maintenance > Backup/Restore. 2.

Click on the right side of the desired file.

Backup/Restore

When the server is restoring, it will return to the pre-restoring status if it is powered off and then powered on.

| System Maintenance | 151

Restoring a backup by Selecting a Backup Directly Restoring a backup by Uploading a Backup

Restoring a backup by Selecting a Backup Directly In the backup list, you can select the desired backup file to restore.

Procedure

1. Click Maintenance > Backup/Restore. 2.

Click on the right side of the desired file. 3. Click OK.

Restoring a backup by Uploading a Backup When an exception occurs to the server or the data is lost by accidental operation, you can restore the data by the backup file to keep the server working normally.

Procedure

1. Click Maintenance > Backup/Restore > Upload. 2. Click Upload, and select the desired file. 3. If you succeed in uploading, click OK, and the file will be restored immediately.

Rebooting the System When YMS fails to upgrade, for example it remains on a certain page, you can reboot the system.

Procedure

1. Click Maintenance > System Restart. 2. select the node, and click Restart. 3. Click OK.

Resetting to Factory You might need to clear up all the user data, the system settings, the call records, the log and the recording files to solve the problem occurred to the YMS.

Procedure

1. Click Maintenance > Restore to factory setting. 2. Select the data type. 3. Click Restore to Factory Settings. 4. Operate according to the prompts, and click OK.

| System Maintenance | 152

Viewing the Operation Log The operation log keeps a record of the changes, including the visit record and the configuration record.

Procedure

Click Maintenance > Operation Log > Operation Log.

Tip: You can also click Export Log in the top right corner to view the log.

Viewing the System Log You can view the system log to find out the reason when a problem occurs to the server. For example, someone removes the cable from the server, or the server is restarted because of being powered off.

Procedure

1. Click Maintenance > Operation Log > System Log. 2. Select the time, the module, and the node to export the log. 3. Click Export Syslog.

Viewing the Device Log To view the SIP information communicated between the device and the server, for example, the device registration, you can enable the device log.

About this task

After you enable it, the device logs will occupy a certain amount of bandwidth. The server performance may vary according to the number of devices.

For offline devices, you cannot view their log.

Procedure

1. Click Maintenance > Operation Log > Device Log. 2. Select the Enable check box.

3. Click on the right side of the desired file.

| Troubleshooting | 153

Viewing the Recording Log You can view the recording file name, the file size, the time the file is generated and the file owner via the recording log.

Procedure

Click Maintenance > Operation Log > Recording log.

Tip: You can also click Export Log in the top right corner to view the log.

Using Tools Ping and packetcapture are available on YMS to test the network.

Pinging the Network Capturing Packets

Pinging the Network You can ping the network to test network performance from the node to the destination.

Procedure

1. Click Maintenance > Tools > Ping. 2. Select the desired node. 3. Enter the IP address or domain name of the destination. 4. Select the desired number of request. 5. Click Start.

Capturing Packets You can analyze the network traffic sent or received by the nodes by capturing packets.

About this task If you encounter problems with the YMS, Yealink technical support engineers will solve the problem with the packets you captured.

Procedure

1. Click Maintenance > Tools > Packetcapture. 2. Select the desired node. 3. Enter the file name.

Only 64 characters are allowed, and the file name can only be made up of characters, numbers, _ and $. 4. Select the desired network adapter. 5. Click Packetcapture settings, and set the file size and the total size. 6. Click Capture now or Schedule capture.

Troubleshooting

| Troubleshooting | 154

Users Do Not Receive Emails Failing to Connect to SMTP User Fail to register an Account Failing to Activating a License Online Failing to Activating a License Offline Loading the Orgainzational Structure Slowly The Configuration of Access WebRTC Authentication Is Invalid

Users Do Not Receive Emails

Situation:

When you send user account information to users by email, but users do not receive any emails.

Cause:

You do not add the email address when Configuring the SMTP Mailbox or you do not add the email address when adding user accounts.

The emails may be in the spam folders. The emails may be intercepted by the back-end server.

Solution:

Procedure

1. Configuring the SMTP Mailbox . 2. Remind users to check the spam folders. 3. Contact the enterprise IT staff to check the back-end server.

Failing to Connect to SMTP

Situation:

When setting the SMTP, it prompts failing to connect to SMTP server.

Cause:

The connection between YMS and SMTP server cannot work. The setting of SMTP is incorrect. If you enable secure connection, YMS might fail to verify SMTP server.

Solution:

Procedure

1. Pinging the Network to make sure that the connection to SMTP server can work. 2. Contact your IT staff to make sure the setting of SMTP is correct. 3. If the SMTP server uses self-signed certificate, you need Importing the Trusted CA Certificate .

| Troubleshooting | 155

User Fail to register an Account

Situation:

User fail to register an account.

Cause:

The user may enter the wrong registration information. The user IP address is set as abnormal IP address.

Solution:

Procedure

1. Check the registration information. 2. Check whether or not the user IP address is set as abnormal IP address. If it is, Deleting the Abnormal IP need to

be done.

Failing to Activating a License Online

Situation:

Click Refresh, and the prompt Unable to connect to LicenseServer due to network problem is popped up.

Cause:

Network configuration error. The license was used by other YMS, or the CPU, the network adapter or the motherboard on YMS is changed, that

causing the mismatch between the license and the YMS hardware information.

Solution:

Procedure

1. Check whether or not the network cable of the YMS server physical machine is connected. a) Click System Settings > Node Management. b)

Click on the right side of desired node, to view the network status.

2. If you use a Linux console, execute the command "ping license.yealink.com".

If it fails, there is a problem with the DNS or gateway route configured on the network. If it succeeds but takes a long time, the reason may be the DNS configuration problem, or the poor network.

3. Make sure that the server license is not used by other YMS, or the CPU, the network adapter or the motherboard on YMS is not changed. If the above remedy cannot work, you can contact Yealink to get the license again.

Related tasks Activating a License Online

| Troubleshooting | 156

Failing to Activating a License Offline

Situation:

Import the authority file obtained from Yealink, but the page prompts Certificate import failed.

Cause:

Authority file error. The license was used by other YMS, or the CPU, the network adapter or the motherboard on YMS is changed, that

causing the mismatch between the license and the YMS hardware information.

Solution:

Procedure

1. Contact Yealink to confirm whether or not the authority file can match the serial number associated with your YMS.

2. Make sure that the server license is not used by other YMS, or the CPU, the network adapter or the motherboard on YMS is not changed. If the above remedy cannot work, you can contact Yealink to get the license again.

Related tasks Activating a License Offline

Loading the Orgainzational Structure Slowly

Situation:

If you use the stand-alone version, wherever there is the organizational structure, when the number of the staff reaches 25,000, the speed of loading the data may become slower.

Cause:

Large amount of data.

Solution:

Procedure

Contact Yealink technical support engineers to modify the contact push mechanism.

The Configuration of Access WebRTC Authentication Is Invalid

Condition

You have enabled the feature of internal network access WebRTC authentication, but when users join a conference via the browser, users are not required to enter the login information of YMS account.

Cause

The server fails to identify whether the IP address is an internal one or an external one.

| Troubleshooting | 157

Remedy

Procedure

1. Check whether you enable Public IP for the IP address used by the us

Manualsnet FAQs

If you want to find out how the Meeting Server Yealink works, you can view and download the Yealink Meeting Server v8 Administrator Guide on the Manualsnet website.

Yes, we have the Administrator Guide for Yealink Meeting Server as well as other Yealink manuals. All you need to do is to use our search bar and find the user manual that you are looking for.

The Administrator Guide should include all the details that are needed to use a Yealink Meeting Server. Full manuals and user guide PDFs can be downloaded from Manualsnet.com.

The best way to navigate the Yealink Meeting Server v8 Administrator Guide is by checking the Table of Contents at the top of the page where available. This allows you to navigate a manual by jumping to the section you are looking for.

This Yealink Meeting Server v8 Administrator Guide consists of sections like Table of Contents, to name a few. For easier navigation, use the Table of Contents in the upper left corner.

You can download Yealink Meeting Server v8 Administrator Guide free of charge simply by clicking the “download” button in the upper right corner of any manuals page. This feature allows you to download any manual in a couple of seconds and is generally in PDF format. You can also save a manual for later by adding it to your saved documents in the user profile.

To be able to print Yealink Meeting Server v8 Administrator Guide, simply download the document to your computer. Once downloaded, open the PDF file and print the Yealink Meeting Server v8 Administrator Guide as you would any other document. This can usually be achieved by clicking on “File” and then “Print” from the menu bar.