TANDBERG Compliance Appliance Deployment Manual - page 4
7.2
What is secure and what isn’t ..................................................................... 19
8
Creating the policy file ........................................................................................ 20
8.1
Specifying which endpoints to record ......................................................... 20
8.2
How the policy file directs these calls to the TCA ....................................... 20
8.3
Commented policy file (all calls recorded) .................................................. 22
8.4
Route selected calls to TCA ....................................................................... 24
9
Deployment scenarios ........................................................................................ 27
9.1
Scenario 1 – basic deployment .................................................................. 27
9.2
Scenario 2 – deployment across a WAN .................................................... 28
9.3
Scenario 3 – deployment to cater to regional variations in regulations....... 29
9.4
Scenario 4 – non-participating VCS ........................................................... 30
9.5
Scenario 5 – external organization ............................................................. 31
9.6
Scenario 6 – VCS cluster ........................................................................... 32
10
Sample TCA calculator ....................................................................................... 33
11
Call Flow within TCA ........................................................................................... 34