TANDBERG D13691.03 user manual Border Controller Initial Configuration

Page 12

TANDBERG Border Controller User Manual

Then switch the power switch button on the back of the unit to ‘1’.

On the front of the chassis you will see the Power LED being lit.

2.6Border Controller Initial Configuration

The TANDBERG Border Controller requires some configuration before it can be used. This must be done using a PC connected to the serial port (Data 1) or by connecting to the system’s default IP address: 192.168.0.100.

The IP address, subnet mask and gateway must be configured before use. The Border Controller has to be configured with a static IP address. Consult your network administrator for information on which addresses to use.

To set the initial configuration, do the following:

1.Connect the supplied null-modem RS-232 cable from Data 1 to a PC running a terminal program.

2.Start a terminal program and configure it to use the serial port with baud rate 115200, 8 data bits, no parity, 1 stop bit, no flow control.

3.Power on the unit if it is not already on.

4.You should see the unit display start up information.

5.After approximately 2 minutes you will get a login prompt.

6.Enter username admin and your password. The default password is TANDBERG.

7.You will be prompted if you want to run the install wizard. Type y and press Enter.

(none) login: admin Password:

Run install wizard [n]: y

8.Specify the following:

(a)The password you want to use for your system. See section 3.1.1 for account details.

(b)The IP address of the system.

(c)The IP subnet mask of the system.

(d)The IP default gateway of the system.

(e)The Ethernet speed.

(f)The local zone prefix, if any, you want to use for the zone controlled by this system.

(g)Whether you want to use SSH to administer the system.

(h)Whether you want to use Telnet to administer the system.

9.You will be prompted to login again. You should see a welcome message like this:

5

Image 12
Contents Tandberg Border Controller Trademarks and copyright DisclaimerEnvironmental Issues TANDBERG’s Environmental PolicyEnvironmental Considerations Operator Safety Summary Page Contents Software Upgrade Introduction Tandberg Border Controller Overview Installation PrecautionsUnpacking Connecting Cables Switching on the SystemInstallation site preparations MountingBorder Controller Initial Configuration Page System Administration Administrator AccountGetting started Registration Neighbor GatekeepersRoot Account Search Order Alternate Border Controllers Call Control Location decision flow diagram Firewall Traversal Bandwidth Control Page Bandwidth Control and Firewall Traversal Bandwidth Control Examples Network Deployment with firewalls Page Registration Control Registration Restriction PolicyAuthentication Authentication using a local databaseAuthentication using an Ldap server Securing the Ldap connection with TLS URI Dialing Creating DNS SRV recordsPage Example Traversal deployments Simple Enterprise deploymentEnterprise Gatekeepers Dialing Public IP addressesNeighbored enterprises URI dialing from within the enterprisePage Address-switch Call PolicyMaking Decisions Based on Addresses Subfield CPL Script Actions LocationProxy RejectUnsupported CPL Elements CPL ExamplesCall screening Selective Call ScreeningCall Redirection Controlling what is logged LoggingEvent log format Event Levels Logged EventsDNS Event data 245,NTP,DNS,LDAPPage Remote Logging YYYY/MM/DD-HHMMSSSoftware Upgrade Upgrading Using HttpsUpgrading Using SCP Page Command Reference StatusCalls EthernetExternalmanager Feedback11.1.5 IP Ldap11.1.8 NTP PipesRegistrations ResourceUsageAuthentication 11.2 ConfigurationSystemUnit ZonesGatekeeper Page HTTP/HTTPS 11.2.6 IPLdap 11.2.9 Log 11.2.10 NTPOption Key Session Snmp11.2.15 SSH Subzones Telnet TimeZoneTraversal Zones Command Boot AllowListAddAllowListDelete CheckBandwidthDefaultLinksAdd DefaultValuesSetDenyListAdd DenyListDeleteFeedbackRegister FeedbackDeregisterFindRegistration LinkAddOptionKeyAdd OptionKeyDeletePipeAdd PipeDeleteHistory Feedback Other commands AboutClear EventlogRelkey SyslogAppendix Configuring DNS Servers Microsoft DNS ServerVerifying the SRV record Bind 8As expected Appendix Configuring Ldap Servers Microsoft Active DirectoryPrerequisites Adding H.350 objectsOpenLDAP Securing with TLSInstalling the H.350 schemas Add the H.350 objects Electrical Safety ApprovalsEMC Emission Radiated Electromagnetic Interference EMC ImmunityTechnical Specifications Physical Dimensions Power supplyCertification References Glossary Index