Tandberg Data N3 User Manual

Page 5

Advertising
background image

v

Table Of Contents

TANDBERG Gatekeeper User Manual .......................................................................................i

Trademarks and copyright ...................................................................................................... ii

Environmental Issues............................................................................................................. iii

Operator Safety Summary ..................................................................................................... iv

1

Introduction......................................................................................................................... 1

1.1

TANDBERG Gatekeeper Overview ............................................................................ 2

2

Installation .......................................................................................................................... 3

2.1

Unpacking ................................................................................................................... 3

2.2

Mounting...................................................................................................................... 4

2.3

Connecting Cables...................................................................................................... 4

2.4

Switching on the System............................................................................................. 4

2.5

Gatekeeper Initial Configuration ................................................................................. 5

3

Using the Gatekeeper ........................................................................................................ 7

3.1

System Administration ................................................................................................ 7

3.2

Registration ................................................................................................................. 7

3.3

Neighbor Gatekeepers ................................................................................................ 8

3.4

Alternate Gatekeepers ................................................................................................ 9

3.5

Call Control................................................................................................................ 11

3.6

Bandwidth Control..................................................................................................... 14

3.6.1

Bandwidth Control and Firewall Traversal ......................................................... 16

3.6.2

Bandwidth Control Examples............................................................................. 17

3.7

Registration Control .................................................................................................. 19

3.7.1

Registration Restriction Policy ........................................................................... 19

3.7.2

Authentication .................................................................................................... 20

3.8

H.235 Authentication................................................................................................. 20

3.8.1

Authentication using a local database ............................................................... 20

3.8.2

Authentication using an LDAP server ................................................................ 21

3.9

URI Dialing ................................................................................................................ 23

3.9.1

URI Dialing and firewall traversal....................................................................... 24

3.9.2

Creating DNS SRV records ............................................................................... 24

3.10

Firewall traversal ................................................................................................... 24

3.10.1

Calling unregistered endpoints .......................................................................... 25

3.11

Call Policy.............................................................................................................. 25

3.11.1

Making Decisions Based on Addresses ............................................................ 26

3.11.2

CPL Script Actions ............................................................................................. 27

3.11.3

Unsupported CPL Elements .............................................................................. 28

3.11.4

CPL Examples ................................................................................................... 28

4

Software Upgrade ............................................................................................................ 30

Advertising