25
To configure the Gatekeeper for firewall traversal, use the Web or console interface (see
Figure 18 for this configuration screen on the web interface). You will need to set the IP
address of the Border Controller
xConfiguration Traversal Server Address: <ip_address>
You will need to enter the name of your Gatekeeper onto the Border Controller. This name
can be determined on the Gatekeeper with the command
xConfiguration System UnitName
and set on this on the Border Controller with the command
xConfiguration Traversal Client Name: <name>
Figure 18 Traversal Configuration

3.10.1 Calling unregistered endpoints

If an endpoint is not registered with a Gatekeeper or Border Controller, calls may still be
placed to it via the TANDBERG Gatekeeper. From your registered endpoint, enter the IP
address of the endpoint you wish to call.
If a Border Controller and Gatekeeper are being used for firewall traversal, it is necessary to
enter information that allows the Border Controller and Gatekeeper to determine which
address space the destination endpoint is in. This is described in the Border Controller
manual.
3.11 Call Policy
Your TANDBERG Gatekeeper allows you to set up policy to control which calls are allowed
and even redirect selected calls to different destinations. You specify this policy by uploading
a script written in the Call Processing Language (CPL) 5. Each time a call is made the
Gatekeeper executes the script to decide, based on the source and destination of the call,
whether to
Proxy the call to its original destination
Redirect the call to a different destination
Reject the call.
The CPL script is uploaded via the Web interface under the Gatekeeper Configuration > Files
web page.
The execution of the CPL script is controlled by the setting
5 http://www.ietf.org/rfc/rfc3880.txt