TANDBERG Gatekeeper User Manual page 3

Tandberg gatekeeper user guide
Hide thumbs Also See for Gatekeeper:
Table of Contents

Advertisement

4.7.
Alternates.............................................................................................................................. 23
4.8.
Call Processing Overview....................................................................................................... 24
5.
5.1.
Alias Transforms ................................................................................................................... 26
5.2.
Zone Transforms ................................................................................................................... 27
6.
6.1.
Calling from an Unregistered Endpoint.................................................................................. 28
6.2.
Calling to an Unregistered Endpoint...................................................................................... 28
7.
7.1.
About Bandwidth Control ...................................................................................................... 30
7.2.
Subzones .............................................................................................................................. 30
7.2.1.
Subzone links...................................................................................................................................31
7.2.2.
Pipes.................................................................................................................................................31
7.3.
Insufficient Bandwidth .......................................................................................................... 32
7.3.1.
Insufficient bandwidth.....................................................................................................................32
7.4.
Bandwidth Control and Firewall Traversal ............................................................................. 33
7.5.
Bandwidth Control Examples ................................................................................................ 34
7.5.1.
Example without a firewall ..............................................................................................................34
7.5.2.
Example with a firewall ...................................................................................................................34
8.
8.1.
Setting Registration Restriction Policy................................................................................... 36
8.1.1.
Viewing the Allow and Deny lists.....................................................................................................36
8.1.2.
Activating use of Allow or Deny lists ...............................................................................................36
8.1.3.
Managing entries in the Allow and Deny lists ................................................................................37
8.2.
Authentication....................................................................................................................... 38
8.2.1.
Authentication using a local database ...........................................................................................38
8.2.2.
Authentication using an LDAP server .............................................................................................38
8.2.3.
Enforced dial plans..........................................................................................................................39
8.2.4.
Securing the LDAP connection with TLS ........................................................................................40
9.
9.1.
About URI Dialing .................................................................................................................. 41
9.2.
Making a Call Using URI Dialing ............................................................................................ 41
9.2.1.
Enabling URI dialing ........................................................................................................................41
9.2.2.
Configuring DNS server(s)...............................................................................................................41
9.2.3.
Configuring the domain name ........................................................................................................41
9.2.4.
URI dialing and firewall traversal....................................................................................................41
9.3.
Receiving a Call Using URI Dialing......................................................................................... 42
9.4.
DNS Records......................................................................................................................... 43
10.1.
About ENUM Dialing .............................................................................................................. 44
10.2.
Configuring ENUM ................................................................................................................. 44
10.2.1.
Enabling ENUM support ..................................................................................................................44
10.2.2.
Managing ENUM DNS zones...........................................................................................................44
10.3.
Configuring DNS NAPTR Records .......................................................................................... 46
11.1.
Simple Enterprise Deployment.............................................................................................. 47
11.1.1.
Enabling outgoing URI calls ............................................................................................................47
11.1.2.
Enabling incoming URI calls............................................................................................................48
TANDBERG Gatekeeper User Guide
Page 3 of 105
26
28
30
36
41
44
47

Advertisement

Table of Contents
loading

Table of Contents