Table Of Contents - TANDBERG N3 User Manual

Tandberg gatekeeper user manual
Table of Contents

Advertisement

TANDBERG Gatekeeper User Manual .......................................................................................i
Environmental Issues............................................................................................................. iii
Operator Safety Summary .....................................................................................................iv
1
Introduction......................................................................................................................... 1
1.1
TANDBERG Gatekeeper Overview ............................................................................ 2
2
Installation .......................................................................................................................... 3
2.1
Unpacking ................................................................................................................... 3
2.2
Mounting...................................................................................................................... 4
2.3
Connecting Cables...................................................................................................... 4
2.4
Switching on the System............................................................................................. 4
2.5
Gatekeeper Initial Configuration ................................................................................. 5
3
Using the Gatekeeper ........................................................................................................ 7
3.1
System Administration ................................................................................................ 7
3.2
Registration ................................................................................................................. 7
3.3
Neighbor Gatekeepers ................................................................................................ 8
3.4
Alternate Gatekeepers ................................................................................................ 9
3.5
Call Control................................................................................................................ 11
3.6
Bandwidth Control..................................................................................................... 14
3.6.1
Bandwidth Control and Firewall Traversal ......................................................... 16
3.6.2
Bandwidth Control Examples............................................................................. 17
3.7
Registration Control .................................................................................................. 19
3.7.1
Registration Restriction Policy ........................................................................... 19
3.7.2
Authentication .................................................................................................... 20
3.8
H.235 Authentication................................................................................................. 20
3.8.1
Authentication using a local database ............................................................... 20
3.8.2
Authentication using an LDAP server ................................................................ 21
3.9
URI Dialing ................................................................................................................ 23
3.9.1
URI Dialing and firewall traversal....................................................................... 24
3.9.2
Creating DNS SRV records ............................................................................... 24
3.10
Firewall traversal ................................................................................................... 24
3.10.1
Calling unregistered endpoints .......................................................................... 25
3.11
Call Policy.............................................................................................................. 25
3.11.1
Making Decisions Based on Addresses ............................................................ 26
3.11.2
CPL Script Actions ............................................................................................. 27
3.11.3
Unsupported CPL Elements .............................................................................. 28
3.11.4
CPL Examples ................................................................................................... 28
4
Software Upgrade ............................................................................................................ 30

Table Of Contents

v

Advertisement

Table of Contents
loading

This manual is also suitable for:

Gatekeeper

Table of Contents