© Polycom, Inc. 2003 xv
List of Tables
Table 1-1.Key features of the ViewStation EX system ..................................................... 18
Table 4-1.Dialing rules used by the Global Address Book............................................ 126
Table 5-1.Remote Control Functionality .......................................................................... 145
Table 5-2.Graphic cursor function and remote control.................................................. 179
Table 6-1.Multipoint Dialing Speeds................................................................................ 183
Table 6-2.Mixed Protocol Dialing Speeds........................................................................ 184
Table 6-3.Firewall TCP/UDP Ports in Multipoint Calls................................................ 186
Table 6-4.MCU Meeting Password Protection................................................................ 199
Table 6-5.Dial-In Calling with an Existing Point-to-Point Call..................................... 206
Table 6-6.Dial-In Calling with no Existing Point-to-Point Call .................................... 206
Table 7-1.Password Usage with PMAC ........................................................................... 251
Table B-1.H.320 Endpoint Interoperability...................................................................... 317
Table B-2H.323 Endpoint Interoperability....................................................................... 318
Table B-3.MCU H.320 Interoperability............................................................................. 319
Table B-4.MCU H.323 Interoperability............................................................................. 319
Table B-5.Gateway/Gatekeeper/T120 Server Interoperability.................................... 320
Table B-6.Firewall/NAT Interoperability........................................................................ 321
Table C-1.ViewStation EX Technical Specifications....................................................... 323
Table C-2............................................................................................................................... 329
Table D-1.Password Usage with PMAC .......................................................................... 334