We are using Meet-me for internal conferencing, but finding there is some complaints coming from Executives who have had staff members "drop in" on sessions unexpectedly. Are there any ways to secure individual Meet-me sessions either by password or some other means? I have seen the suggestions about putting users into different "partitions", but that seems impractical. Any suggestions would greatly be appreciated.
You dont need to create more partitions and assign them to users. All you need to create is two separate CSS, one for authorized users (executives) and one for non-authorized users.
Create a partition Meetme, assign meetme number 1600 to that partition and put that partition only in the CSS of Executives or other users who are authorized to join the conference.
Another suggestion, would be to setup another route point say 1601 and give that as Meetme access number to non-authorized employees. When they dial 1601, it should hit an IPCC script which basically prompts them for a pin number. The pin they enter can be compared against some static pins (stored in variables in the script) and then if the pin entered is correct, the call can be transferred to 1600 (The actual meetme number).
This requires creating two separate partitions, required CSS as well as IPCC to make it all happen.
You have reached the Cisco Logistics Support Center.. To Check Status of
your RMA, visit Product Returns & Replacements (RMA). Need help? Contact
us by Phone or Email. North Americas Phone: 1800 553 2447 Option 4
Email: firstname.lastname@example.org Europe Phone: +3...
The short answer is that you don't.... That isn't entirely true while at
the same time it kind of is, but for the most part you don't configure
the softkeys. You enable or disable them via TCL. Here is the long
answer. Be sure to read the whole thing or e...
Topology: IP Phone > Switches > Microsoft NPS setup to forward 802.1x
proxy to > ISE 2.1 patch 3 Authentication: EAP-TLS using Cisco MIC SANs
Phone Models 802.1X support? 802.1x flavor Addtl Comment EAP-MD5 EAP-TLS
Cisco 3905 Y Y N Cisco 6911 Y Y N Cisco ...