Environmental Issues............................................................................................................. iii
Operator Safety Summary .....................................................................................................iv
1
Introduction......................................................................................................................... 1
1.1
2
Installation .......................................................................................................................... 3
2.1
Unpacking ................................................................................................................... 3
2.2
Mounting...................................................................................................................... 4
2.3
Connecting Cables...................................................................................................... 4
2.4
Switching on the System............................................................................................. 4
2.5
3
Using the Gatekeeper ........................................................................................................ 7
3.1
System Administration ................................................................................................ 7
3.2
Registration ................................................................................................................. 7
3.3
Neighbor Gatekeepers ................................................................................................ 8
3.4
Alternate Gatekeepers ................................................................................................ 9
3.5
Call Control................................................................................................................ 11
3.6
Bandwidth Control..................................................................................................... 14
3.6.1
3.6.2
3.7
Registration Control .................................................................................................. 19
3.7.1
3.7.2
Authentication .................................................................................................... 20
3.8
H.235 Authentication................................................................................................. 20
3.8.1
3.8.2
3.9
URI Dialing ................................................................................................................ 23
3.9.1
3.9.2
3.10
Firewall traversal ................................................................................................... 24
3.10.1
3.11
Call Policy.............................................................................................................. 25
3.11.1
3.11.2
CPL Script Actions ............................................................................................. 27
3.11.3
3.11.4
CPL Examples ................................................................................................... 28
4
Software Upgrade ............................................................................................................ 30
Table Of Contents
v