VCS creat search rules

I want to creat research rules on my VCSC and VCS ex to call this kind of model [email protected]/ * / or [email protected] / * /

exactly, I have to do to ensure that the rules on vcs and VCS ex

Hi Mohamed!

This is a pretty standard deployment.

Please read carefully:

http://www.Cisco.com/en/us/docs/Telepresence/infrastructure/VCs/config_guide/Cisco_VCS_Basic_Configuration_Cisco_VCS_Control_with_Cisco_VCS_Expressway_Deployment_Guide_X7-1.PDF

and configure your VCS accordingly. It covers how to configure VCS for IP my calls as well in what concerns the DNS.

Martin

Mohamed: Please note the answers using the star under the messages!

Tags: Cisco Support

Similar Questions

  • VCS - numbering of the IPS 'known' search rules

    Hello

    We have a standard configuration of VCS-C/VCS-E, with VCS - C, the value 'indirect', VCS-E the 'direct' for calls to unknown IP addresses. It works very well.

    The problem is we have a second remote desktop on MPLS which points of Polycom endpoints (not enrolled in the VCS) and they can be reached via IP address, but they are inside the LAN. I can only call them if I change the 'direct' VCS - C since I see no way to create a search rule targeting a specific range of IP addresses - it will not allow the models for comparison with IP addresses!

    Am I missing something here?

    (Edit: Alok beat me to it)

    Thomas,

    on the VCS - C, you can create one or more subfields with 'subnet' membership of type rules where you add IP addresses or subnets that you want to be able to deal directly via the VCS - C.

    No matter what IP address that corresponds to a membership rule subarea for a subzone is considered "Known" VCS in question, which allows VCS to make the call to this IP address directly.

    This is described in the VCS Administrator's guide in component IP "section:

    The VCS considers that an IP address to be "known" if she is:

    -is the IP of a locally registered endpoint
    -Beach one of the membership rules configured subarea on the VCS to address intellectual property statement

    In addition to this, need a search rule "AnyIPAddress" for the local area on the RESUME said.

    Hope this helps,

    Andreas

  • Is it possible to create a rule for mail Search mail?

    I am trying to create a set of rules that would allow already read messages in folders by year. I can quickly find e-mail a year in research, it would be nice if I could create a rule right out of the research. I don't see this feature, but how can I create a rule which will find all the emails for a given year, and move them to a folder?

    Rules are usually set up for actions that are make again and again. What you describe will be just once, right?

    Do a search for the year you want, select all results, drag them to an appropriate folder.

  • Setup search rule of venture capital to Lync Server

    Hi Experts,

    I'm still learning on how to implement rules research on the RESUME. However, currently, I make the VCS with Lync Server integration.

    The installer is: -.

    1. transport server) edge

    2. end of Sling pool)

    (3.) what a single control VCs running X7.1

    Network video SIP domain of my client configured on VCS's [email protected] / * / and it is the same for the field of Lync here.

    Video endpoints and lync so same domain clients.

    I'm confused about how I would install search rule on the RESUME that will target the Lync server. (I'm following VCS-Lync Deployment Guide) when the domain is same.

    Could you please help me, how the rule search would look like?

    Thank you

    Saurabh

    check an additional link for this...

    https://supportforums.Cisco.com/message/3586039#3586039

    a nice thread where Andreas eliminated many things...

    Thank you

    Alok

  • Can SOUL I create a rule list creation and category for your Info?

    Hello

    I created two rules.

    1st rule create the list of approvers to approve leaves either supervisor and department heads.

    Until this whole thing goes very good transaction are getting approved by both approvers and leave is packed in Application.

    Now I create 2nd rule to send a notification of FYI to HR Administrator.

    When Appling for leave employee shows the list of approvers correctly i.e. supervisor, head of Department as approvers and HR Administrator FYI notify.

    Now HR Administrator opens the notification and close the notification and the approvers approved the transaction. Transaction PPROBLEM IS not becomes narrow and therefore leave is not to create in application. _

    Published by: SHEIKHG on August 28, 2009 21:11

    Hello
    Your worklfow may have to wait for background engine. Check the status via Administrator workflow > key of the element to search > activity history

    Check the current status of activities.

    Please post here the status of the activity if you're still having trouble.

    ~ Amol

  • Is it necessary to create additional rules not permitted for uses such as Regedit.exe etc when applying software restriction policy?

    Is it necessary to create additional rules not permitted for uses such as Regedit.exe etc when applying software restriction policy?

    Hello

    Please visit the following link. This should explain the software restriction policies in detail.

    http://TechNet.Microsoft.com/en-us/library/bb457006.aspx

  • Can we create a rule to capture the URL string in the Hits in the APM cartridge.

    Hi team,

    We have an obligation to create a rule/alarm alert when there is string "File not found" are there in the 'LINK' when we capture the Hits. Please let me know is possible to create this kind of rule in Foglight.

    Thank you

    Shashank Soni.

    To follow on what David said, you can find this useful guide:

    Configuration of the analyzers of success

    Hope this helps,

    Shay

  • Create a rule / older instant alarm

    Hello

    I am creating a rule / alarm, this updated fire for snapshots when have more than X days.

    I use the topology: VMWareSnapshot.

    Using an adaptation of the function to create the older snapshot report, I tried to create the rule.

    creationSnapshot = scope.creationTime.getTime ();

    now = new Date () .getTime ();

    diffHours = (now - creationSnapshot) / 3600000;

    diffDays = diffHours 24;

    (diffDays > = registry ("VMW:Old.) Snapshot.Warning'));

    When I test the condition in the script console, and in the rule condition, it works fine, but when the rule never fired.

    I forgot something?

    Thanks for any help or ideas

    Kind regards

    Alexander Ortiz

    Strategic Solutions Consultant

    Reference Dell | MCLA APM software, group

    Office + 57 312 568 4791, mobile + 57 312 568 4791
    E-mail [email protected]

    Hi Alex

    Yes, I'll try

    The rule definition:

    Only the State of alert is enabled:

    Condition

    Article: vBundle-1 VM Snap Shot age

    First - check VM list ignore

    Second - check VM has Snap Active

    Check the third - instant age

    List skip from reading the registry

    def IgnoreList is registry ("vBundle.vm.snapshot.age.ignore.list");.

    Get the name of VM

    def VMName1 = scope.get ("name");

    def boolean found = false;

    If (IgnoreList! = null) {}

    Found = IgnoreList.contains (VMName1) ;}

    If (found) return false;

    Check if the virtual machine has a snapshot active

    if(Scope.currentSnapshot == null) {}

    return false}

    Estimate the age of the snapshot

    def NumOfDays is registry ("vBundle.vm.snapshot.age.warning.days");.

    try {}

    creationTime = scope.currentSnapshot.get("creationTime").getTime ();

    If (creationTime == null) return false;

    now = new Date () .getTime ();

    diffHours = (now - creationTime) / 3600000;

    diffDays = diffHours 24;

    If (diffDays > = NumOfDays)

    Returns true;

    Otherwise, return false}

    catch (System.Exception e) {return false ;}

    Alarm message:

    [Warning] Virtual Machine: '@VMName' has a named snapshot: '@SnapshotName', it is longer than @WarningDays days. Remove the old clichés.

    There is no variable defined severity level.

    The Action is an EmailAction:

    mail.message

    VM (@VMName) has a snapshot that is @WarningDays the old days

    Discovers the alarm to: @foglight_rule_alarm_link

    mail. Subject

    [Warning] VM (@VMName) has an old cliché

    Behavior:

    Rule variables:

    Expression CriticalDays return register ("vBundle.vm.snapshot.age.critical.days");

    Expression FatalDays return register ("vBundle.vm.snapshot.age.fatal.days");

    Expression Nom_snapshot scope.currentSnapshot.name;

    VMName expression return scope.get ("name");

    Expression WarningDays return register ("vBundle.vm.snapshot.age.warning.days");

    Registry settings:

    vBundle.vm.snapshot.age.ignore.list

    vBundle.vm.snapshot.age.warning.days

    The days of warning STANDARD are 7 (Disclaimer), 14 (critic) and 30 (fatal).

    I hope this is clear for you

    If you want the critical and Fatal situation, let me know.

    Brian

  • Need help to create a rule to monitor the "DSDeviceTotalLatency" under "VMWDatastore".

    Hello all, I am very new to vFoglight and tasked to create a rule to control the property 'DSDeviceTotalLatency' of type 'VMWDatastore' topology.  Looking at existing rules, I see that I need to write a mini script on the tab 'Conditions and Actions '.  The problem is that I do not know how to reference this property and the command to use to recover.  Thank you in advance.

    At, it is simple, can be as simple as:

    scope of the rule to the VMWDatastore type on the tab 1

    condition on tab 2:

    If (#totalLatency # 10 >) {return true;}

    return false

  • How to create the rule to trigger only 5 and 20th of each month in Foglight

    Hi team,

    One needs to create a rule in Foglight that fire only a day as the 5th and 20th of each month and check the status. I tried to create it, but I've not found an option less create rule. I think we can do it by Time Driven option or calendar drove but I'm confuse. Can someone let me know how or the document where it mentioned.

    Thank you for your help in advance.

    Thank you

    Shashank Soni.

    That sounds more like a rule-based program.  First, create a new calendar and choose the monthly option and enter one of the days of the month.  I think it might be difficult to get a calendar to be true on two different days, you may create two programs and then create a rule for each.  We can be one simple copy of the other.  Once the calendar is created, you can create a rule, choose led calendar and choose one of your two annexes.

    Maybe someone can be smarter about how to create a monthly calendar for two different dates.

    I hope this helps.
    Jeff (I work for Dell)

  • Create a rule to delete Inbox mail

    How to create a rule to delete Inbox mail after so many days?

    The old version has allowed users to set for example mail to remove after 10 days or when a new mail from the sender received.

    I can't find how to do this on the new version, please help!

    Thank you

    I found it!

    This was previously the title of 'rules' and is now under "sweep".

    Thank you

  • Creating custom rules of MARCH

    I want to be able to create a rule on:

    [Info/UncommonTraffic/Chat]

    [Info, UncommonTraffic, Chat, FileTransfer]

    [Info/UncommonTraffic/Chat/Proxy]

    .. .but be able to use the 'KEYWORD' field to trap on words like SSN / DOB and other keywords to trigger an e-mail action. Im guessing that this is not how the KEYWORD was intended to be used, but it is sure that looked like it when I put up. But as you may have guessed his does not work.

    Can someone tell me what im doing wrong or how can I achieve this to trap for PHI in our Organization.

    I've included a screenshot which may help to explain what page I'm looking at.

    http://razors-edge.org/dropbox/screenshot.jpg

    Thanks in advance.

    Jim,

    Good question! You did the correct support you use the 'keyword' option incorrectly. A device of MARCH is designed to parse and messages of aggregates of the declaration of the devices. In the example of "UncommonTraffic/Info/chat", typical features of statement are firewalls and IDS/IPS solutions. These all simply report on the presence of 'cat' traffic, no report the actual textual conversation. Unforunately the unit in MARCH is not really designed to work the way you want. Is this possible? Yes... you must have an application that is able to decode chat conversations before messages to MARS. In all honesty, it's a lot of work to make the MARCH camera doing something it's not designed to do. I hope this helps and don't forget to check my blog below for examples on how to use 'keywords' in a custom rule!

    -Mike

    http://CS-Mars.blogspot.com

  • How to create a rule of action to subtract from the Ips event log manager console express?

    How to create a rule of action to subtract from the Ips event log manager express console?, some unknown has a guide?

    Thank you.

    Sent by Cisco Support technique iPad App

    Hello

    http://www.Cisco.com/en/us/products/sw/secursw/ps2113/products_tech_note09186a0080bc7910.shtml

    HTH

    Luis Silva

    "If you need IDP (planning, design, implementation) assistance do not hesitate to contact us.

    http://www.Cisco.com/Web/partners/tools/pdihd.html

  • Understanding search rules - Source.

    I have a scenario very very simple just to learn more about the rules of research & transformations and how they work.

    I can't get the search rules to work with areas sources of some how restrict conversions based on the source.

    I understand the benefits of using one or the other for simple conversions, etc.

    At the moment I only use search with no transformations on the VCSC rules.

    Scenario:

    EX90 - [email protected]/ * / (recorded with VCSC)

    VCSC - 172.16.246.92

    VCSe - 172.16.246.93

    VCSe - 10.0.0.230 (NAT - PublicIP)

    FWLocal - 10.0.0.1

    FWInet - publicIP

    Jabber - [email protected] / * / (recorded with VCSe)

    Jabber - [email protected] / * / (Findme on VCSe)

    EX90--CSCV--VCSe--FW--Internet--Jabber Video.

    Everything works fine if I dial for example 8095556631 Jabber in the EX90 video.

    Demand of the VCSe to the VCSC happens like this: [email protected] / * /(VCSe)--> [email protected]/ * / (VCSC).

    This work without any intervention from the rules of the VCSC research because join '@172.16.246.92' of the VCSe.

    Everything works fine if I dial for example * EX90 6631 to video of Jabber.

    The request of the VCSC to the VCSe arrives like this: [email protected]/ * / (VCSC)--> [email protected] / * /.

    This is done using search with localZone.GetDaylightChanges source rules to the destination TraversalZone.

    It does not work! If I dial for example 6631 (Extension) to the EX90 Jabber video.

    Demand of the VCSe to the VCSC happens like this: [email protected] / * / (VCSe)--> [email protected]/ * / (VCSC). (That's what I want to change to [email protected]/ * / without using transformations on the VCSC and using the rule of research with source TraversalZone).

    The rule search:

    Name Desde VCSe

    40 priority (like right now)

    Any protocol

    Source TraversalZone

    Auth                            No

    Alias fashion model

    Model Regex

    Pattern string (\d{4})(@172.16.246.92)

    Replace patter behavior - 809555\1\2

    To stop the game

    Target localZone.GetDaylightChanges

    Newspapers:

    Detail = "" send H.225 ReleaseComplete Q.931 Cause: absent subscriber, H.225 Cause: non-registered party called, Info: not found additional Destination "(!)" @# $ I understand this one. $# @!)

    "Module-level =" Network.Search' = 'INFO': detail = "given to search the rule"LocalZoneMatch"objective 'LocalZone.GetDaylightChanges' to '100' of priority with alias [email protected]/ * /' ' (! @# $ I understand this one. $# @!)

    "Module-level =" Network.Search' = 'INFO': detail = "search rule"Hacía CUCM"does not match destination alias [email protected]/ * /' ' (! @# $ I understand this one. $# @!)

    "Module-level =" Network.Search' = 'INFO': detail = "search rule 'Hacía VCSe' does not match destination alias [email protected]/ * /' ' (! @# $ I understand this one. $# @!)

    Module level = "Network.Search' = 'INFO': detail = 'Rule"Desde VCSe"ignored due to the filtering of search source' (! @# $ I DO NOT understand this one. $# @!)"

    Module level = "Network.Search' = 'INFO': detail = 'search"Hacía CUCM - Extension"rule ignored due to the filtering source' (! @# $ I understand this one. $# @!)"

    Module = "Network.H323" Level = "INFO": Dst - ip = "172.16.246.93" Dst-port = "15070" detail = "Send H.225 procedure" "

    Module = "Network.H323" Level = "INFO": ip - Src = "172.16.246.93" Src-port "15070" = "

    Detail = "kbps of bandwidth: 5952 H.225 Setup H.323v6 DestAlias receipt:[email protected]/ * / DestCSAddr: ['IPv4"TCP"172.16.246.92:1720']" vendor: TANDBERG ' "

    I do not understand how to select Source: TraversalZone the source of the application gives me "ignored due to filtering of the source.

    Seems I am missing some basics on how to find work for incoming requests not generated rules locally.

    THX in adv.

    The guides were less concerning research and own deployment, which also lie to the use of the domain

    To quote the guide:

    The routing configuration in this document searches for destination aliases that have valid SIP URIs (that is, using a valid SIP domain, such as [email protected]/* */).

    Please set up and use a domain name, your rules might address and test again.

    I would stick to a - z, 0-9,-. for the part of the user and the domain of the sip uri!

    I will most likely see because without a propert domain name it does not.

    I would also be careful with many changes, rewrites and search you may see problems with the presence and other things.

  • Creating exception rules

    I need to create an exception rule for bttray.exe whose political office of the CSA is refusing to run. BTTray is essentially a system tray icon that shows the user what bluetooth connections that it opened.

    Now, if I simply create an exception rule, a virus or malicious code could in the future to copy originally bttray.exe and run itself, since the CSA would allow.

    How to work around this capture-20?

    I would say that creating a rule to allow this executable to run does not create a catch-22. If some malware was introduced using this executable it would try to make something like the access to the registry, access the network etc. In this case, CSA he would cease to operate the new business. I can't give you the actual section in the Administrator's guide, but it has been my experience. Once I created an exception based on an alert the executable is allowed to do what he originally tried to do and nothing else. Once he tried something else CSA arrested.

    Does anyone else have some input?

    Hope this helps

    Be sure to note all the answers.

Maybe you are looking for

  • Satellite A300 - starts, but I don't know why

    I recently bought a Toshiba Satellite A300 and the following events occur: I turn off the phone properly, I close the lid, and sometimes with the valve closed the laptop starts normally, both the battery and without. I went through all the power opti

  • Software malware/adware removal instructions

    OS: 10.11.3 Symptoms: popup on chrome (wonderlandads) I search on google and found pop - up for wonderlandads is adware/malware. I scanned my system with Avast / avira and malware bytes. He did not find anything I checked the extension and did not fi

  • V220: Motorola Phone Tools V3.0

    I'm looking to get Motorola Phone Tools V3.0. I have a V220 phone and need to transfer a picture to a computer and then transfer them to a phone Motorpla EM 330, Mark (Forum Manager) says: don't post personal information such as an email address. Rat

  • How can I put more pictures on the SD disk to frame my photo gallery

    I have a few photos on my 2 GB SD drive in my frame.  I will add more pictures on photo gallery SD drive.  How this is done?

  • Files Windows media vidieo

    I get wmv files but it still come application not found. I'm using VISTA HOME BASIC. I used to be able to read them, but this has now ceased.