
TANDBERG Gatekeeper User Guide
Page 4 of 105
11.2. Enterprise Gatekeepers........................................................................................................ 48
11.3. Dialing Public IP Addresses...................................................................................................49
11.4. Neighbored Enterprises.........................................................................................................49
11.5. URI Dialing from within the Enterprise..................................................................................50
12. Third Party Call Control 51
12.1. About Third Party Call Control................................................................................................51
12.2. Placing a Call.........................................................................................................................51
12.3. Transferring a Call.................................................................................................................51
12.3.1. Enabling call routed mode..............................................................................................................51
12.3.2. Enabling call transfer......................................................................................................................52
12.4. Disconnecting a Call..............................................................................................................52
13. Call Policy 53
13.1. About Call Policy....................................................................................................................53
13.1.1. Uploading the CPL script.................................................................................................................53
13.1.2. Enabling use of the CPL script........................................................................................................53
13.1.3. Call Policy and Authentication........................................................................................................53
13.1.4. CPL Standard...................................................................................................................................53
13.2. Making Decisions Based on Addresses.................................................................................54
13.2.1. address-switch.................................................................................................................................54
13.3. CPL Script Actions.................................................................................................................55
13.3.1. location............................................................................................................................................55
13.3.2. proxy.................................................................................................................................................56
13.3.3. reject................................................................................................................................................56
13.4. Unsupported CPL Elements...................................................................................................56
13.5. CPL Examples....................................................................................................................... 56
13.5.1. Call screening of authenticated users............................................................................................56
13.5.2. Call screening based on domain....................................................................................................57
13.5.3. Call redirection.................................................................................................................................57
13.5.4. Call screening based on alias.........................................................................................................57
14. Logging 58
14.1. About Logging....................................................................................................................... 58
14.2. Viewing the event log............................................................................................................ 58
14.3. Controlling what is Logged.................................................................................................... 58
14.3.1. About Event levels...........................................................................................................................58
14.3.2. Setting the log level.........................................................................................................................58
14.4. Event Log Format..................................................................................................................59
14.5. Logged Events.......................................................................................................................60
14.6. Remote Logging....................................................................................................................64
14.6.1. Enabling remote logging.................................................................................................................64
15. Software Upgrading 65
15.1. About Software Upgrading.....................................................................................................65
15.2. Upgrading Using HTTP(S).......................................................................................................65
15.3. Upgrading Using SCP/PSCP.................................................................................................. 66
16. Command Reference 68
16.1. Status....................................................................................................................................68
16.1.1. Listing all status information..........................................................................................................68
16.1.2. Listing all status commands...........................................................................................................68
16.1.3. Calls..................................................................................................................................................68
16.1.4. Ethernet...........................................................................................................................................68
16.1.5. ExternalManager.............................................................................................................................69
16.1.6. Feedback.........................................................................................................................................69