TANDBERG D13691.03 user manual Contents

Page 6

TANDBERG Border Controller User Manual

Contents

1

Introduction

1

 

1.1

TANDBERG Border Controller Overview

2

2

Installation

3

 

2.1

Precautions

3

 

2.2

Unpacking

3

 

2.3

Mounting

4

 

2.4

Connecting Cables

4

 

2.5

Switching on the System

4

 

2.6

Border Controller Initial Configuration

5

3

Getting started

7

 

3.1

System Administration

7

 

3.2

Registration

8

 

3.3

Neighbor Gatekeepers

8

 

3.4

Alternate Border Controllers

10

 

3.5

Call Control

11

 

3.6

Firewall Traversal

13

4

Bandwidth Control

14

 

4.1

Bandwidth Control and Firewall Traversal

16

 

4.2

Bandwidth Control Examples

17

5

Registration Control

20

 

5.1

Registration Restriction Policy

20

 

5.2

Authentication

21

6

URI Dialing

23

 

6.1

Creating DNS SRV records

23

7

Example Traversal deployments

25

 

7.1

Simple Enterprise deployment

25

 

7.2

Enterprise Gatekeepers

26

 

7.3

Dialing Public IP addresses

26

 

7.4

Neighbored enterprises

27

 

7.5

URI dialing from within the enterprise

27

8

Call Policy

29

 

8.1

Making Decisions Based on Addresses

29

 

8.2

CPL Script Actions

31

 

8.3

Unsupported CPL Elements

32

 

8.4

CPL Examples

32

9

Logging

34

 

9.1

Controlling what is logged

34

 

9.2

Event log format

34

 

9.3

Event Levels

35

v

Image 6
Contents Tandberg Border Controller Trademarks and copyright Disclaimer Environmental Issues TANDBERG’s Environmental Policy Environmental Considerations Operator Safety Summary Page Contents Software Upgrade Introduction Tandberg Border Controller Overview Installation PrecautionsUnpacking Installation site preparations Connecting CablesSwitching on the System MountingBorder Controller Initial Configuration Page System Administration Administrator AccountGetting started Registration Neighbor GatekeepersRoot Account Search Order Alternate Border Controllers Call Control Location decision flow diagram Firewall Traversal Bandwidth Control Page Bandwidth Control and Firewall Traversal Bandwidth Control Examples Network Deployment with firewalls Page Registration Control Registration Restriction PolicyAuthentication Authentication using a local databaseAuthentication using an Ldap server Securing the Ldap connection with TLS URI Dialing Creating DNS SRV recordsPage Example Traversal deployments Simple Enterprise deploymentEnterprise Gatekeepers Dialing Public IP addressesNeighbored enterprises URI dialing from within the enterprisePage Address-switch Call PolicyMaking Decisions Based on Addresses Subfield Proxy CPL Script ActionsLocation RejectCall screening Unsupported CPL ElementsCPL Examples Selective Call ScreeningCall Redirection Controlling what is logged LoggingEvent log format Event Levels Logged EventsDNS Event data 245,NTP,DNS,LDAPPage Remote Logging YYYY/MM/DD-HHMMSSSoftware Upgrade Upgrading Using HttpsUpgrading Using SCP Page Calls Command ReferenceStatus Ethernet11.1.5 IP ExternalmanagerFeedback LdapRegistrations 11.1.8 NTPPipes ResourceUsageSystemUnit Authentication11.2 Configuration ZonesGatekeeper Page HTTP/HTTPS 11.2.6 IPLdap 11.2.9 Log 11.2.10 NTPOption Key Session Snmp11.2.15 SSH Subzones Telnet TimeZoneTraversal Zones Command AllowListDelete BootAllowListAdd CheckBandwidthDenyListAdd DefaultLinksAddDefaultValuesSet DenyListDeleteFindRegistration FeedbackRegisterFeedbackDeregister LinkAddPipeAdd OptionKeyAddOptionKeyDelete PipeDeleteHistory Feedback Clear Other commandsAbout EventlogRelkey SyslogVerifying the SRV record Appendix Configuring DNS ServersMicrosoft DNS Server Bind 8As expected Prerequisites Appendix Configuring Ldap ServersMicrosoft Active Directory Adding H.350 objectsOpenLDAP Securing with TLSInstalling the H.350 schemas Add the H.350 objects EMC Emission Radiated Electromagnetic Interference Electrical SafetyApprovals EMC ImmunityTechnical Specifications Physical Dimensions Power supplyCertification References Glossary Index