TANDBERG D13691.03 user manual Installation, Precautions, Unpacking

Page 10

TANDBERG Border Controller User Manual

2Installation

2.1Precautions

Never install communication equipment during a lightning storm.

Never install jacks for communication cables in wet locations unless the jack is specifically designed for wet locations.

Never touch uninstalled communication wires or terminals unless the communication line has been disconnected at the network interface.

Use caution when installing or modifying communication lines.

Avoid using communication equipment (other than a cordless type) during an electrical storm.

There may be a remote risk of electrical shock from lightning.

Do not use communication equipment to report a gas leak in the vicinity of the leak.

The socket outlet shall be installed near to the equipment and shall be easily accessible.

Never install cables without first switching the power OFF.

This product complies with directives: LVD 73/23/EC and EMC 89/366/EEC.

Power must be switched off before power supplies can be removed from or installed into the unit.

2.2Unpacking

The TANDBERG Border Controller is delivered in a special shipping box which should contain the following components:

Border Controller unit

Installation sheet

User manual and other documentation on CD

Rack-ears and screws

Kit with 4 rubber feet

Cables:

Power cables

One Ethernet cable

One null-modem RS-232 cable

3

Image 10
Contents Tandberg Border Controller Trademarks and copyright DisclaimerTANDBERG’s Environmental Policy Environmental IssuesEnvironmental Considerations Operator Safety Summary Page Contents Software Upgrade Introduction Tandberg Border Controller Overview Precautions InstallationUnpacking Installation site preparations Connecting CablesSwitching on the System MountingBorder Controller Initial Configuration Page Administrator Account System AdministrationGetting started Neighbor Gatekeepers RegistrationRoot Account Search Order Alternate Border Controllers Call Control Location decision flow diagram Firewall Traversal Bandwidth Control Page Bandwidth Control and Firewall Traversal Bandwidth Control Examples Network Deployment with firewalls Page Registration Control Registration Restriction PolicyAuthentication using a local database AuthenticationAuthentication using an Ldap server Securing the Ldap connection with TLS URI Dialing Creating DNS SRV recordsPage Example Traversal deployments Simple Enterprise deploymentEnterprise Gatekeepers Dialing Public IP addressesNeighbored enterprises URI dialing from within the enterprisePage Call Policy Address-switchMaking Decisions Based on Addresses Subfield Proxy CPL Script ActionsLocation RejectCall screening Unsupported CPL ElementsCPL Examples Selective Call ScreeningCall Redirection Logging Controlling what is loggedEvent log format Event Levels Logged EventsDNS Event data 245,NTP,DNS,LDAPPage Remote Logging YYYY/MM/DD-HHMMSSSoftware Upgrade Upgrading Using HttpsUpgrading Using SCP Page Calls Command ReferenceStatus Ethernet11.1.5 IP ExternalmanagerFeedback LdapRegistrations 11.1.8 NTPPipes ResourceUsageSystemUnit Authentication11.2 Configuration ZonesGatekeeper Page HTTP/HTTPS 11.2.6 IPLdap 11.2.10 NTP 11.2.9 LogOption Key Snmp Session11.2.15 SSH Subzones TimeZone TelnetTraversal Zones Command AllowListDelete BootAllowListAdd CheckBandwidthDenyListAdd DefaultLinksAddDefaultValuesSet DenyListDeleteFindRegistration FeedbackRegisterFeedbackDeregister LinkAddPipeAdd OptionKeyAddOptionKeyDelete PipeDeleteHistory Feedback Clear Other commandsAbout EventlogRelkey SyslogVerifying the SRV record Appendix Configuring DNS ServersMicrosoft DNS Server Bind 8As expected Prerequisites Appendix Configuring Ldap ServersMicrosoft Active Directory Adding H.350 objectsOpenLDAP Securing with TLSInstalling the H.350 schemas Add the H.350 objects EMC Emission Radiated Electromagnetic Interference Electrical SafetyApprovals EMC ImmunityTechnical Specifications Power supply Physical DimensionsCertification References Glossary Index