
TANDBERG Gatekeeper User Guide
Page 3 of 105
4.7. Alternates..............................................................................................................................23
4.8. Call Processing Overview.......................................................................................................24
5. Transforming Destination Aliases 26
5.1. Alias Transforms...................................................................................................................26
5.2. Zone Transforms...................................................................................................................27
6. Unregistered Endpoints 28
6.1. Calling from an Unregistered Endpoint..................................................................................28
6.2. Calling to an Unregistered Endpoint......................................................................................28
7. Bandwidth Control 30
7.1. About Bandwidth Control...................................................................................................... 30
7.2. Subzones.............................................................................................................................. 30
7.2.1. Subzone links...................................................................................................................................31
7.2.2. Pipes.................................................................................................................................................31
7.3. Insufficient Bandwidth.......................................................................................................... 32
7.3.1. Insufficient bandwidth.....................................................................................................................32
7.4. Bandwidth Control and Firewall Traversal............................................................................. 33
7.5. Bandwidth Control Examples................................................................................................ 34
7.5.1. Example without a firewall..............................................................................................................34
7.5.2. Example with a firewall...................................................................................................................34
8. Registration Control 36
8.1. Setting Registration Restriction Policy...................................................................................36
8.1.1. Viewing the Allow and Deny lists.....................................................................................................36
8.1.2. Activating use of Allow or Deny lists...............................................................................................36
8.1.3. Managing entries in the Allow and Deny lists................................................................................37
8.2. Authentication.......................................................................................................................38
8.2.1. Authentication using a local database...........................................................................................38
8.2.2. Authentication using an LDAP server.............................................................................................38
8.2.3. Enforced dial plans..........................................................................................................................39
8.2.4. Securing the LDAP connection with TLS........................................................................................40
9. URI Dialing 41
9.1. About URI Dialing..................................................................................................................41
9.2. Making a Call Using URI Dialing............................................................................................ 41
9.2.1. Enabling URI dialing........................................................................................................................41
9.2.2. Configuring DNS server(s)...............................................................................................................41
9.2.3. Configuring the domain name........................................................................................................41
9.2.4. URI dialing and firewall traversal....................................................................................................41
9.3. Receiving a Call Using URI Dialing.........................................................................................42
9.4. DNS Records.........................................................................................................................43
10. ENUM Dialing 44
10.1. About ENUM Dialing..............................................................................................................44
10.2. Configuring ENUM.................................................................................................................44
10.2.1. Enabling ENUM support..................................................................................................................44
10.2.2. Managing ENUM DNS zones...........................................................................................................44
10.3. Configuring DNS NAPTR Records.......................................................................................... 46
11. Example Traversal Deployments 47
11.1. Simple Enterprise Deployment..............................................................................................47
11.1.1. Enabling outgoing URI calls............................................................................................................47
11.1.2. Enabling incoming URI calls............................................................................................................48