TANDBERG Video Communication Server Administrator's Manual page 9

Table of Contents

Advertisement

Grey Headline (continued)
What's in this manual?
Tools .................................................................................. 165
Check pattern ............................................................... 165
Locate .......................................................................... 165
Port usage .................................................................... 166
Overview ................................................................ 166
Local VCS inbound ports ......................................... 166
Local VCS outbound ports ....................................... 166
Remote listening ports ............................................ 166
Restarting and shutting down .............................................. 167
Restarting .................................................................... 167
Restarting using the web interface .......................... 167
Restarting using the CLI .......................................... 167
Shutting down .............................................................. 167
Shutting down using the web interface ..................... 167
Shutting down using the CLI .................................... 167
Restoring default configuration ............................................ 168
Overview ...................................................................... 168
DefaultValuesSet level 3 ............................................... 168
Password encryption ............................................................171
Overview .......................................................................171
Web interface ..........................................................171
Command line interface (CLI) ...................................171
Maximum length of passwords .......................................171
Overview and
Introduction
Getting started
status
D14049.05
February 2009
Appendices
CPL reference ......................................................................173
Overview of CPL on the VCS ...........................................173
address-switch ..............................................................173
Overview .................................................................173
address ..................................................................173
field.........................................................................174
subfield ...................................................................175
otherwise ......................................................................175
not-present ....................................................................175
location .........................................................................176
rule-switch .....................................................................176
proxy ............................................................................176
reject ...........................................................................176
Unsupported CPL elements ............................................176
CPL examples ................................................................177
Call screening of authenticated users .......................177
Call screening based on alias ...................................177
Call screening based on domain ...............................178
Change of domain name...........................................178
Restricting access to a local gateway ....................... 180
Using the address-switch node .......................... 180
Using the rule-switch node ................................ 180
Regular expression reference .............................................. 182
Overview ...................................................................... 182
Common regular expressions ........................................ 182
Pattern variable reference ................................................... 183
Overview ...................................................................... 183
Valid variable strings ..................................................... 183
System
VCS
Zones and
configuration
configuration
neighbors
VCS port reference ............................................................. 184
DNS configuration ............................................................... 187
LDAP configuration .............................................................. 188
Command reference - xConfiguration ................................... 192
Command reference - xCommand ........................................ 228
Command reference - xStatus ............................................. 242
Bibliography ....................................................................... 260
Glossary............................................................................. 261
Contact information ............................................................ 266
Call
Bandwidth
Firewall
processing
control
traversal
9
ADMINISTRATOR GUIDE
Overview ...................................................................... 184
VCS ports ..................................................................... 184
Overview ...................................................................... 187
Verifying the SRV record .......................................... 187
Microsoft DNS server .................................................... 187
BIND 8 & 9 .................................................................. 187
About the LDAP databases ............................................ 188
Downloading the H.350 schemas .................................. 188
Microsoft Active Directory ............................................ 188
Prerequisites ......................................................... 188
Installing the H.350 schemas .................................. 188
Adding H.350 objects ............................................ 189
Create the organizational hierarchy ................... 189
Add the H.350 objects ..................................... 189
Securing with TLS .................................................. 189
OpenLDAP .................................................................... 190
Prerequisites ......................................................... 190
Installing the H.350 schemas ................................. 190
Adding H.350 objects ............................................ 191
Create the organizational hierarchy ................... 191
Add the H.350 objects ..................................... 191
Securing with TLS .................................................. 191
Applications
Maintenance
Appendices

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the Video Communication Server and is the answer not in the manual?

Subscribe to Our Youtube Channel

Table of Contents