v
Table Of Contents
TANDBERG Gatekeeper User Manual .......................................................................................i
Trademarks and copyright......................................................................................................ii
Environmental Issues.............................................................................................................iii
Operator Safety Summary.....................................................................................................iv
1 Introduction.........................................................................................................................1
1.1 TANDBERG Gatekeeper Overview ............................................................................2
2 Installation.......................................................................................................................... 3
2.1 Unpacking................................................................................................................... 3
2.2 Mounting......................................................................................................................4
2.3 Connecting Cables...................................................................................................... 4
2.4 Switching on the System............................................................................................. 4
2.5 Gatekeeper Initial Configuration .................................................................................5
3 Using the Gatekeeper ........................................................................................................7
3.1 System Administration ................................................................................................7
3.2 Registration................................................................................................................. 7
3.3 Neighbor Gatekeepers................................................................................................ 8
3.4 Alternate Gatekeepers................................................................................................ 9
3.5 Call Control................................................................................................................11
3.6 Bandwidth Control..................................................................................................... 14
3.6.1 Bandwidth Control and Firewall Traversal......................................................... 16
3.6.2 Bandwidth Control Examples............................................................................. 17
3.7 Registration Control ..................................................................................................19
3.7.1 Registration Restriction Policy........................................................................... 19
3.7.2 Authentication.................................................................................................... 20
3.8 H.235 Authentication................................................................................................. 20
3.8.1 Authentication using a local database............................................................... 20
3.8.2 Authentication using an LDAP server................................................................ 21
3.9 URI Dialing................................................................................................................ 23
3.9.1 URI Dialing and firewall traversal....................................................................... 24
3.9.2 Creating DNS SRV records ...............................................................................24
3.10 Firewall traversal ...................................................................................................24
3.10.1 Calling unregistered endpoints ..........................................................................25
3.11 Call Policy.............................................................................................................. 25
3.11.1 Making Decisions Based on Addresses ............................................................26
3.11.2 CPL Script Actions............................................................................................. 27
3.11.3 Unsupported CPL Elements ..............................................................................28
3.11.4 CPL Examples................................................................................................... 28
4 Software Upgrade ............................................................................................................30