TANDBERG D13691.03 user manual Call Control

Page 18

TANDBERG Border Controller User Manual

Figure 2: Alternate Border Controller configuration

3.5Call Control

When an endpoint wants to call another endpoint it presents the address it wants to call to the Border Controller using a protocol knows as RAS. The Border Controller tries to resolve this address and supplies the calling endpoint with information about the called endpoint. The destination address can take several forms: IP address, H.323 ID, E.164 alias or a full H.323 URI.

When an H.323 ID or E.164 alias is used, the Border Controller looks for a match between the dialed address and the aliases registered by its endpoints. If no match is found, it may query other Gatekeepers and Border Controllers.

When dialing by H.323 URI, the destination address resembles an email address. The Border Controller first follows the procedure for matching H.323 IDs. If that fails it looks for a Gatekeeper or Border Controller responsible for the domain (the part of the URI following the @ symbol) and queries that device.

Dialing by IP address is necessary when the destination endpoint is not registered with a Gatekeeper or Border Controller. If it is registered, then one of the other addressing schemes should be used instead as they are more flexible. From your registered endpoint, dial the IP address of the endpoint you wish to call. This requires that the Border Controller has xConfiguration Gatekeeper CallToUnknownIPAddresses correctly configured.

It is not possible to dial endpoints behind a Border Controller by IP address. Calls should be made using an E.164 or H.323 alias.

Figure 3 illustrates the process the Border Controller performs when receiving call requests:

11

Image 18
Contents Tandberg Border Controller Trademarks and copyright DisclaimerEnvironmental Issues TANDBERG’s Environmental PolicyEnvironmental Considerations Operator Safety Summary Page Contents Software Upgrade Introduction Tandberg Border Controller Overview Installation PrecautionsUnpacking Installation site preparations Connecting CablesSwitching on the System MountingBorder Controller Initial Configuration Page System Administration Administrator AccountGetting started Registration Neighbor Gatekeepers Root Account Search Order Alternate Border Controllers Call Control Location decision flow diagram Firewall Traversal Bandwidth Control Page Bandwidth Control and Firewall Traversal Bandwidth Control Examples Network Deployment with firewalls Page Registration Control Registration Restriction PolicyAuthentication Authentication using a local databaseAuthentication using an Ldap server Securing the Ldap connection with TLS URI Dialing Creating DNS SRV recordsPage Example Traversal deployments Simple Enterprise deploymentEnterprise Gatekeepers Dialing Public IP addressesNeighbored enterprises URI dialing from within the enterprisePage Address-switch Call PolicyMaking Decisions Based on Addresses Subfield Proxy CPL Script ActionsLocation RejectCall screening Unsupported CPL ElementsCPL Examples Selective Call ScreeningCall Redirection Controlling what is logged LoggingEvent log format Event Levels Logged EventsDNS Event data 245,NTP,DNS,LDAPPage Remote Logging YYYY/MM/DD-HHMMSSSoftware Upgrade Upgrading Using HttpsUpgrading Using SCP Page Calls Command ReferenceStatus Ethernet11.1.5 IP ExternalmanagerFeedback LdapRegistrations 11.1.8 NTPPipes ResourceUsageSystemUnit Authentication11.2 Configuration ZonesGatekeeper Page HTTP/HTTPS 11.2.6 IPLdap 11.2.9 Log 11.2.10 NTPOption Key Session Snmp11.2.15 SSH Subzones Telnet TimeZoneTraversal Zones Command AllowListDelete BootAllowListAdd CheckBandwidthDenyListAdd DefaultLinksAddDefaultValuesSet DenyListDeleteFindRegistration FeedbackRegisterFeedbackDeregister LinkAddPipeAdd OptionKeyAddOptionKeyDelete PipeDeleteHistory Feedback Clear Other commandsAbout EventlogRelkey SyslogVerifying the SRV record Appendix Configuring DNS ServersMicrosoft DNS Server Bind 8As expected Prerequisites Appendix Configuring Ldap ServersMicrosoft Active Directory Adding H.350 objectsOpenLDAP Securing with TLSInstalling the H.350 schemas Add the H.350 objects EMC Emission Radiated Electromagnetic Interference Electrical SafetyApprovals EMC ImmunityTechnical Specifications Physical Dimensions Power supplyCertification References Glossary Index