TANDBERG Border Controller User Manual
Contents
1 | Introduction | 1 | |
| 1.1 | TANDBERG Border Controller Overview | 2 |
2 | Installation | 3 | |
| 2.1 | Precautions | 3 |
| 2.2 | Unpacking | 3 |
| 2.3 | Mounting | 4 |
| 2.4 | Connecting Cables | 4 |
| 2.5 | Switching on the System | 4 |
| 2.6 | Border Controller Initial Configuration | 5 |
3 | Getting started | 7 | |
| 3.1 | System Administration | 7 |
| 3.2 | Registration | 8 |
| 3.3 | Neighbor Gatekeepers | 8 |
| 3.4 | Alternate Border Controllers | 10 |
| 3.5 | Call Control | 11 |
| 3.6 | Firewall Traversal | 13 |
4 | Bandwidth Control | 14 | |
| 4.1 | Bandwidth Control and Firewall Traversal | 16 |
| 4.2 | Bandwidth Control Examples | 17 |
5 | Registration Control | 20 | |
| 5.1 | Registration Restriction Policy | 20 |
| 5.2 | Authentication | 21 |
6 | URI Dialing | 23 | |
| 6.1 | Creating DNS SRV records | 23 |
7 | Example Traversal deployments | 25 | |
| 7.1 | Simple Enterprise deployment | 25 |
| 7.2 | Enterprise Gatekeepers | 26 |
| 7.3 | Dialing Public IP addresses | 26 |
| 7.4 | Neighbored enterprises | 27 |
| 7.5 | URI dialing from within the enterprise | 27 |
8 | Call Policy | 29 | |
| 8.1 | Making Decisions Based on Addresses | 29 |
| 8.2 | CPL Script Actions | 31 |
| 8.3 | Unsupported CPL Elements | 32 |
| 8.4 | CPL Examples | 32 |
9 | Logging | 34 | |
| 9.1 | Controlling what is logged | 34 |
| 9.2 | Event log format | 34 |
| 9.3 | Event Levels | 35 |
v