6
Introduction Getting
Started
System
Overview
System
Configuration
H.323 & SIP
Configuration
Registration
Control
Zones and
Neighbors
Call
Processing
Firewall
Traversal
Bandwidth
Control Maintenance Appe ndices
Introduction
Applying Pipes to Links ........................................................118
One Pipe, One Link ........................................................... 118
One Pipe, Two or More Links ..............................................118
Two Pipes, One Link ..........................................................118
Default Links....................................................................... 118
About Default Links ...........................................................118
Pre-Configured Lin ks .........................................................118
Automatically Created Links .............................................. 118
Default Call Bandwidth, Insu fficient Bandwidth a nd
Downspeeding .................................................................... 119
About the Default Call Bandw idth ......................................119
About Downspeeding ........................................................ 119
Configuring the Default Cal l Bandwidth and Downspee ding .119
Bandwidth Control Exam ples ...............................................120
Example Without a Firewall ................................................120
Example With a Firewall .....................................................121
VCS Border Controller Subzone C onfiguration ................121
Enterprise VCS Subzone Confi guration ..........................121
Maintenance 122
Upgrading Software .............................................................122
About Upgrading the VCS Sof tware ....................................122
Prerequisites ...............................................................1 22
Backing up the Existing Con figuration Before Upgra ding .122
Upgrading Using SCP/PSCP ...............................................122
Upgrading via the Web Inter face ........................................123
Option Keys ........................................................................124
About Adding Extra Op tions ...............................................124
Adding Options via the CLI .................................................124
Adding Options via the Web Inter face .................................125
Security ..............................................................................126
About Security ..................................................................12 6
Enabling Security ..............................................................12 6
Passwords ..........................................................................127
Changing the Administrator P assword ................................127
System Snapshot ................................................................127
About the System Snapshot .............................................. 127
Creating a System Snapshot ............................................. 127
Restarting ...........................................................................128
About Restarting ...............................................................128
Shutting Down .................................................................... 128
About Shutting Down ........................................................ 128
Command Reference - xConfiguration 129Command Reference - xCommand 149Command Reference - xStatus 157CPL Reference 170
Overview ..............................................................................170
CPL Examples ......................................................................174
Call Screening of Authentica ted Users ................................174
Call Screening Based on Alias ............................................174
Call Screening Based on Domai n ........................................175
Change of Domain Name ....................................................175
Allow Calls from Locally Register ed Endpoints Only ..............176
Block Calls from Default Zone an d Default Subzone ............176
Restricting Access to a Loca l Gateway ...............................177
Regular Expression Reference 178
About Regular Expressions .................................................178
DNS Configuration 179
Overview ..............................................................................179
Verifying the SRV Record ....................................................179
Microsoft DNS Server ...........................................................179
BIND 8 & 9 .........................................................................179
LDAP Configuration 180
About the LDAP Databases ..................................................180
Downloading the H.350 sche mas ........................................180
Microsoft Active Direct ory ...................................................181
Prerequisites ..............................................................181
Installing the H.350 Schemas ...................................... 181
Adding H.350 Objects ................................................. 181
Securing with TLS ........................................................ 181
OpenLDAP...........................................................................182
Prerequisites ..............................................................182
Installing the H.350 Schemas ..................................... 182
Adding H.350 Objects ................................................. 182
Securing with TLS ........................................................ 182
Bibliography 18 3Glossary 184
TANDBERG VIDEO COMMUNICATION SERVER
ADMINISTRATOR GUIDE
D 14049.01
07.2007
Table of Contents