TANDBERG D13691.03 user manual CPL Script Actions, Location, Proxy, Reject

Page 38

TANDBERG Border Controller User Manual

The not-present node is executed when the address specified in the address-switch was not present in the call setup message. This form is most useful when authentication is being used. With authentication enabled the Border Controller will only use authenticated aliases when running policy so the not-present action can be used to take appropriate action when a call is received from an unauthenticated user (see example in section 8.4).

8.2CPL Script Actions

8.2.1 location

As the CPL script runs it maintains a list of addresses (H.323 IDs, URLs and E.164 numbers) which will be used as the destination of the call if a proxy node is executed. The location node allows the location set to be modified so that calls can be redirected to different destinations.

At the start of script execution the location set is initialized to empty for incoming calls and to the original destination for outgoing calls.

The following attributes are supported on location nodes

Clear = "yes" "no"

Specifies whether to clear the current location set before adding the new location. The default is to append this location to the end of the set.

url=string

The new location to be added to the location set. The given string can specify a URL (user@domain.com), H.323 ID or an E.164 number.

8.2.2 proxy

On executing a proxy node the Border Controller will attempt to forward the call to the locations specified in the current location set. If multiple entries are in the location set then they are treated as different aliases for the same destination and are all placed in the destination alias field. If the current location set is empty the call will be forwarded to its original destination.

It is important to note that when a proxy node is executed script execution stops immediately i.e. there is currently no support for the proxy outputs busy, noanswer etc.

8.2.3 reject

If a reject node is executed the Border Controller stops any further script processing and rejects the current call.

31

Image 38
Contents Tandberg Border Controller Trademarks and copyright DisclaimerEnvironmental Considerations Environmental IssuesTANDBERG’s Environmental Policy Operator Safety Summary Page Contents Software Upgrade Introduction Tandberg Border Controller Overview Unpacking InstallationPrecautions Installation site preparations Connecting CablesSwitching on the System MountingBorder Controller Initial Configuration Page Getting started System AdministrationAdministrator Account Root Account RegistrationNeighbor Gatekeepers Search Order Alternate Border Controllers Call Control Location decision flow diagram Firewall Traversal Bandwidth Control Page Bandwidth Control and Firewall Traversal Bandwidth Control Examples Network Deployment with firewalls Page Registration Control Registration Restriction PolicyAuthentication using an Ldap server AuthenticationAuthentication using a local database Securing the Ldap connection with TLS URI Dialing Creating DNS SRV recordsPage Example Traversal deployments Simple Enterprise deploymentEnterprise Gatekeepers Dialing Public IP addressesNeighbored enterprises URI dialing from within the enterprisePage Making Decisions Based on Addresses Address-switchCall Policy Subfield Proxy CPL Script ActionsLocation RejectCall screening Unsupported CPL ElementsCPL Examples Selective Call ScreeningCall Redirection Event log format Controlling what is loggedLogging Event Levels Logged EventsDNS Event data 245,NTP,DNS,LDAPPage Remote Logging YYYY/MM/DD-HHMMSSSoftware Upgrade Upgrading Using HttpsUpgrading Using SCP Page Calls Command ReferenceStatus Ethernet11.1.5 IP ExternalmanagerFeedback LdapRegistrations 11.1.8 NTPPipes ResourceUsageSystemUnit Authentication11.2 Configuration ZonesGatekeeper Page HTTP/HTTPS 11.2.6 IPLdap Option Key 11.2.9 Log11.2.10 NTP 11.2.15 SSH SessionSnmp Subzones Traversal TelnetTimeZone Zones Command AllowListDelete BootAllowListAdd CheckBandwidthDenyListAdd DefaultLinksAddDefaultValuesSet DenyListDeleteFindRegistration FeedbackRegisterFeedbackDeregister LinkAddPipeAdd OptionKeyAddOptionKeyDelete PipeDeleteHistory Feedback Clear Other commandsAbout EventlogRelkey SyslogVerifying the SRV record Appendix Configuring DNS ServersMicrosoft DNS Server Bind 8As expected Prerequisites Appendix Configuring Ldap ServersMicrosoft Active Directory Adding H.350 objectsOpenLDAP Securing with TLSInstalling the H.350 schemas Add the H.350 objects EMC Emission Radiated Electromagnetic Interference Electrical SafetyApprovals EMC ImmunityTechnical Specifications Certification Physical DimensionsPower supply References Glossary Index