TANDBERG D13691.03 user manual

Page 22

TANDBERG Border Controller User Manual

Figure 5: Configuring a SubZone

Links may be configured through the web interface on the Border Controller Configuration → Links page, or through the command line using the following commands:

xConfiguration Links Link [1..100] Name

xConfiguration Links Link [1..100] Node1 Name

xConfiguration Links Link [1..100] Node2 Name

xConfiguration Links Link [1..100] Pipe1 Name

xConfiguration Links Link [1..100] Pipe2 Name

Each subzone may be configured with its own bandwidth limits. Calls placed between two endpoints in the same subzone consume resource from the subzone’s allocation. Subzone bandwidths are configured on the Border Controller Configuration → SubZones page (see Figure

6 for a screenshot of the configuration) or using the following command line commands:

xConfiguration SubZones SubZone [1..100] Bandwidth Total Mode xConfiguration SubZones SubZone [1..100] Bandwidth Total Limit xConfiguration SubZones SubZone [1..100] Bandwidth PerCall Mode xConfiguration SubZones SubZone [1..100] Bandwidth PerCall Limit

When calls are placed between endpoints in different subzones, it is possible to control the bandwidth used on the link between them. To do this, create a pipe and configure it with the required bandwidth characteristics. This pipe is then assigned to a link. Calls traversing the link will now take the pipe’s bandwidth allocation into consideration. Pipes are created and configured on the Border Controller Configuration → Pipes page (Figure 6) or using the following command line commands:

Figure 6: Configuring a pipe

xConfiguration Pipes Pipe [1..100] Name

xConfiguration Pipes Pipe [1..100] Bandwidth Total Mode xConfiguration Pipes Pipe [1..100] Bandwidth Total Limit

15

Image 22
Contents Tandberg Border Controller Trademarks and copyright DisclaimerTANDBERG’s Environmental Policy Environmental IssuesEnvironmental Considerations Operator Safety Summary Page Contents Software Upgrade Introduction Tandberg Border Controller Overview Precautions InstallationUnpacking Installation site preparations Connecting CablesSwitching on the System MountingBorder Controller Initial Configuration Page Administrator Account System AdministrationGetting started Neighbor Gatekeepers RegistrationRoot Account Search Order Alternate Border Controllers Call Control Location decision flow diagram Firewall Traversal Bandwidth Control Page Bandwidth Control and Firewall Traversal Bandwidth Control Examples Network Deployment with firewalls Page Registration Control Registration Restriction PolicyAuthentication using a local database AuthenticationAuthentication using an Ldap server Securing the Ldap connection with TLS URI Dialing Creating DNS SRV recordsPage Example Traversal deployments Simple Enterprise deploymentEnterprise Gatekeepers Dialing Public IP addressesNeighbored enterprises URI dialing from within the enterprisePage Call Policy Address-switchMaking Decisions Based on Addresses Subfield Proxy CPL Script ActionsLocation RejectCall screening Unsupported CPL ElementsCPL Examples Selective Call ScreeningCall Redirection Logging Controlling what is loggedEvent log format Event Levels Logged EventsDNS Event data 245,NTP,DNS,LDAPPage Remote Logging YYYY/MM/DD-HHMMSSSoftware Upgrade Upgrading Using HttpsUpgrading Using SCP Page Calls Command ReferenceStatus Ethernet11.1.5 IP ExternalmanagerFeedback LdapRegistrations 11.1.8 NTPPipes ResourceUsageSystemUnit Authentication11.2 Configuration ZonesGatekeeper Page HTTP/HTTPS 11.2.6 IPLdap 11.2.10 NTP 11.2.9 LogOption Key Snmp Session11.2.15 SSH Subzones TimeZone TelnetTraversal Zones Command AllowListDelete BootAllowListAdd CheckBandwidthDenyListAdd DefaultLinksAddDefaultValuesSet DenyListDeleteFindRegistration FeedbackRegisterFeedbackDeregister LinkAddPipeAdd OptionKeyAddOptionKeyDelete PipeDeleteHistory Feedback Clear Other commandsAbout EventlogRelkey SyslogVerifying the SRV record Appendix Configuring DNS ServersMicrosoft DNS Server Bind 8As expected Prerequisites Appendix Configuring Ldap ServersMicrosoft Active Directory Adding H.350 objectsOpenLDAP Securing with TLSInstalling the H.350 schemas Add the H.350 objects EMC Emission Radiated Electromagnetic Interference Electrical SafetyApprovals EMC ImmunityTechnical Specifications Power supply Physical DimensionsCertification References Glossary Index