v
Table Of Contents
TANDBERG Gatekeeper User Manual .......................................................................................i
Trademarks and copyright ......................................................................................................ii
Environmental Issues.............................................................................................................iii
Operator Safety Summary .....................................................................................................iv
1 Introduction......................................................................................................................... 1
1.1 TANDBERG Gatekeeper Overview ............................................................................ 2
2 Installation .......................................................................................................................... 3
2.1 Unpacking ................................................................................................................... 3
2.2 Mounting...................................................................................................................... 4
2.3 Connecting Cables......................................................................................................4
2.4 Switching on the System.............................................................................................4
2.5 Gatekeeper Initial Configuration ................................................................................. 5
3 Using the Gatekeeper ........................................................................................................ 7
3.1 System Administration ................................................................................................ 7
3.2 Registration.................................................................................................................7
3.3 Neighbor Gatekeepers................................................................................................8
3.4 Alternate Gatekeepers ................................................................................................9
3.5 Call Control................................................................................................................ 11
3.6 Bandwidth Control.....................................................................................................14
3.6.1 Bandwidth Control and Firewall Traversal......................................................... 16
3.6.2 Bandwidth Control Examples.............................................................................17
3.7 Registration Control .................................................................................................. 19
3.7.1 Registration Restriction Policy........................................................................... 19
3.7.2 Authentication .................................................................................................... 20
3.8 H.235 Authentication.................................................................................................20
3.8.1 Authentication using a local database ............................................................... 20
3.8.2 Authentication using an LDAP server................................................................ 21
3.9 URI Dialing................................................................................................................23
3.9.1 URI Dialing and firewall traversal.......................................................................24
3.9.2 Creating DNS SRV records ............................................................................... 24
3.10 Firewall traversal ................................................................................................... 24
3.10.1 Calling unregistered endpoints .......................................................................... 25
3.11 Call Policy..............................................................................................................25
3.11.1 Making Decisions Based on Addresses ............................................................ 26
3.11.2 CPL Script Actions.............................................................................................27
3.11.3 Unsupported CPL Elements .............................................................................. 28
3.11.4 CPL Examples ................................................................................................... 28
4 Software Upgrade ............................................................................................................ 30