TANDBERG Gatekeeper User Manual Page 1

Browse online or download User Manual for IP phones TANDBERG Gatekeeper. TANDBERG Gatekeeper User's Manual

  • Download
  • Add to my manuals
  • Print
  • Page
    / 105
  • Table of contents
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 0
TANDBERG Gatekeeper
User Guide
Software version N5.1
D13381.07
January 2007
This document is not to be reproduced in whole or in part without permission in writing from:
Page view 0
1 2 3 4 5 6 ... 104 105

Summary of Contents

Page 1 - User Guide

TANDBERG Gatekeeper User Guide Software version N5.1 D13381.07 January 2007 This document is not to be reproduced in whole or in part withou

Page 2 - Contents

TANDBERG Gatekeeper User Guide Page 10 of 105 1.4. Operator Safety Summary For your protection please read these safety instructions completely befor

Page 3

TANDBERG Gatekeeper User Guide Page 100 of 105 20. Appendix D: Technical data 20.1. Technical Specifications 20.1.1. System Capacity  2500 regist

Page 4 - 16. Command Reference 68

TANDBERG Gatekeeper User Guide Page 101 of 105 20.1.9. Hardware MTBF  Hardware MTBF: 80,479 hours 20.1.10. Power Supply  250 Watt  90-264V

Page 5 - Page 5 of 105

TANDBERG Gatekeeper User Guide Page 102 of 105 21. Bibliography 1 ITU Specification: H.235 Security and encryption for H-Series (H.323 and other H.

Page 6

TANDBERG Gatekeeper User Guide Page 103 of 105 22. Glossary Alias The name an endpoint uses when registering with the Gatekeeper. Other endpoints ca

Page 7 - Index 104

TANDBERG Gatekeeper User Guide Page 104 of 105 23. Index —A— about ...93 accoun

Page 8 - 1. Product Information

TANDBERG Gatekeeper User Guide Page 105 of 105 LDAP ... 38, 69 LDAP over TLS...

Page 9

TANDBERG Gatekeeper User Guide Page 11 of 105 1.4.7. Power connection and Hazardous voltage  The product may have hazardous voltage inside. Never

Page 10

TANDBERG Gatekeeper User Guide Page 12 of 105 2. Introduction This User Manual is provided to help you make the best use of your TANDBERG Gatekeeper.

Page 11

TANDBERG Gatekeeper User Guide Page 13 of 105 Figure 1: Front panel of Gatekeeper On the back of the Gatekeeper (see Figure 2) there are:  a power

Page 12 - 2. Introduction

TANDBERG Gatekeeper User Guide Page 14 of 105 3. Installation 3.1. Precautions  Never install communication equipment during a lightning storm. 

Page 13 -  a power switch

TANDBERG Gatekeeper User Guide Page 15 of 105 3.3. Unpacking The TANDBERG Gatekeeper is delivered in a special shipping box which should contain the

Page 14 - 3. Installation

TANDBERG Gatekeeper User Guide Page 16 of 105 4. Getting started 4.1. Initial Configuration The TANDBERG Gatekeeper requires some configuration befo

Page 15 - 3.5. Connecting the Cables

TANDBERG Gatekeeper User Guide Page 17 of 105 9. Review other system settings. You may want to set the following: a. The name of the Gatekeeper. Th

Page 16 - 4. Getting started

TANDBERG Gatekeeper User Guide Page 18 of 105 You will be presented with the Overview screen: Note: HTTP and HTTPS must be enabled in order to use t

Page 17 - 4.2. System Administration

TANDBERG Gatekeeper User Guide Page 19 of 105 Note: SSH and/or Telnet access must be enabled in order to use the command line interface. This is done

Page 18

TANDBERG Gatekeeper User Guide Page 2 of 105 Contents 1. Product Information 8 1.1. Trademarks and Copyright ...

Page 19 - 4.3. Backups

TANDBERG Gatekeeper User Guide Page 20 of 105 4.4. IP Configuration The Gatekeeper may be configured to use IPv4, IPv6 or both protocols. If using bo

Page 20 - 4.5. Endpoint Registration

TANDBERG Gatekeeper User Guide Page 21 of 105 When registering, the endpoint registers with one or more of the following:  One or more H.323 IDs 

Page 21 - 4.6. Neighbor Gatekeepers

TANDBERG Gatekeeper User Guide Page 22 of 105 Hierarchical dial plan One Gatekeeper is nominated as the directory gatekeeper for the deployment. All B

Page 22

TANDBERG Gatekeeper User Guide Page 23 of 105 4.7. Alternates Alternate Gatekeeper support is provided to increase the reliability of your deployment

Page 23 - 4.7. Alternates

TANDBERG Gatekeeper User Guide Page 24 of 105 4.8. Call Processing Overview Figure 6 illustrates the process the Gatekeeper performs when receiving c

Page 24 - Page 24 of 105

TANDBERG Gatekeeper User Guide Page 25 of 105 When an endpoint wants to call another endpoint it presents the address it wants to call to the Gatekeep

Page 25

TANDBERG Gatekeeper User Guide Page 26 of 105 5. Transforming Destination Aliases 5.1. Alias Transforms The Alias Transforms function takes any alia

Page 26 - 5.1. Alias Transforms

TANDBERG Gatekeeper User Guide Page 27 of 105 5.2. Zone Transforms It is possible to direct an incoming location request to a different alias by repl

Page 27 - 5.2. Zone Transforms

TANDBERG Gatekeeper User Guide Page 28 of 105 6. Unregistered Endpoints Although most calls are made between endpoints registered with a Gatekeeper

Page 28 - 6. Unregistered Endpoints

TANDBERG Gatekeeper User Guide Page 29 of 105 When the Gatekeeper is used with a Border Controller for firewall traversal, you will typically set Call

Page 29

TANDBERG Gatekeeper User Guide Page 3 of 105 4.7. Alternates...

Page 30 - 7. Bandwidth Control

TANDBERG Gatekeeper User Guide Page 30 of 105 7. Bandwidth Control 7.1. About Bandwidth Control The TANDBERG Gatekeeper allows you to control endpoi

Page 31

TANDBERG Gatekeeper User Guide Page 31 of 105 Figure 10: Configuring a SubZone 7.2.1. Subzone links Subzones may be configured with links joining th

Page 32 - 7.3. Insufficient Bandwidth

TANDBERG Gatekeeper User Guide Page 32 of 105 Figure 11: Configuring a pipe Pipes may be shared between one or more links. This is used to model the

Page 33

TANDBERG Gatekeeper User Guide Page 33 of 105 Figure 12: Configuring downspeeding options 7.4. Bandwidth Control and Firewall Traversal When a Borde

Page 34

TANDBERG Gatekeeper User Guide Page 34 of 105 7.5. Bandwidth Control Examples 7.5.1. Example without a firewall One possible configuration for the d

Page 35

TANDBERG Gatekeeper User Guide Page 35 of 105 Figure 15: Border Controller example configuration Figure 15 shows how the Border Controller could be c

Page 36 - 8. Registration Control

TANDBERG Gatekeeper User Guide Page 36 of 105 8. Registration Control The TANDBERG Gatekeeper can control which endpoints are allowed to register wi

Page 37

TANDBERG Gatekeeper User Guide Page 37 of 105 Figure 17: Configuring registration restrictions 8.1.3. Managing entries in the Allow and Deny lists W

Page 38 - 8.2. Authentication

TANDBERG Gatekeeper User Guide Page 38 of 105 8.2. Authentication The TANDBERG Gatekeeper can use a user name and password based challenge-response

Page 39

TANDBERG Gatekeeper User Guide Page 39 of 105 Configuring LDAP base DN The Gatekeeper needs to be configured with the area of the directory which will

Page 40

TANDBERG Gatekeeper User Guide Page 4 of 105 11.2. Enterprise Gatekeepers ...

Page 41 - 9. URI Dialing

TANDBERG Gatekeeper User Guide Page 40 of 105 8.2.4. Securing the LDAP connection with TLS The traffic between the Gatekeeper and the LDAP server ca

Page 42 -  [email protected]

TANDBERG Gatekeeper User Guide Page 41 of 105 9. URI Dialing 9.1. About URI Dialing If an alias is not located in the Gatekeeper's list of reg

Page 43 - 9.4. DNS Records

TANDBERG Gatekeeper User Guide Page 42 of 105 In addition, the DNS records should be updated with the address of the Border Controller as the authorit

Page 44 - 10. ENUM Dialing

TANDBERG Gatekeeper User Guide Page 43 of 105 9.4. DNS Records URI dialing relies on the presence of records in the DNS information for the zone. For

Page 45 - Page 45 of 105

TANDBERG Gatekeeper User Guide Page 44 of 105 10. ENUM Dialing 10.1. About ENUM Dialing ENUM provides another DNS-based dialing scheme. Users dial a

Page 46

TANDBERG Gatekeeper User Guide Page 45 of 105 Figure 19: Setting the ENUM Zone

Page 47

TANDBERG Gatekeeper User Guide Page 46 of 105 10.3. Configuring DNS NAPTR Records ENUM relies on the presence of NAPTR records, as defined by RFC 29

Page 48

TANDBERG Gatekeeper User Guide Page 47 of 105 11. Example Traversal Deployments 11.1. Simple Enterprise Deployment Figure 20: Simple enterprise de

Page 49

TANDBERG Gatekeeper User Guide Page 48 of 105 11.1.2. Enabling incoming URI calls In order to be able to receive calls placed to example.com using UR

Page 50

TANDBERG Gatekeeper User Guide Page 49 of 105 11.3. Dialing Public IP Addresses Figure 22: Dialing a public IP address Figure 22 shows a private end

Page 51 - 12.3. Transferring a Call

TANDBERG Gatekeeper User Guide Page 5 of 105 16.1.7. IP ...

Page 52 - 12.4. Disconnecting a Call

TANDBERG Gatekeeper User Guide Page 50 of 105 11.5. URI Dialing from within the Enterprise In this example, we want to set up our system so that user

Page 53 - 13. Call Policy

TANDBERG Gatekeeper User Guide Page 51 of 105 12. Third Party Call Control 12.1. About Third Party Call Control The Gatekeeper provides a third part

Page 54

TANDBERG Gatekeeper User Guide Page 52 of 105 12.3.2. Enabling call transfer To enable call transfer, either: issue the command: xConfiguration Serv

Page 55 - 13.3. CPL Script Actions

TANDBERG Gatekeeper User Guide Page 53 of 105 13. Call Policy 13.1. About Call Policy Your TANDBERG Gatekeeper allows you to set up policy to contro

Page 56 - 13.5. CPL Examples

TANDBERG Gatekeeper User Guide Page 54 of 105 13.2. Making Decisions Based on Addresses 13.2.1. address-switch The address-switch node allows the s

Page 57

TANDBERG Gatekeeper User Guide Page 55 of 105 address The address construct is used within an address-switch to specify addresses to match. It suppor

Page 58 - 14. Logging

TANDBERG Gatekeeper User Guide Page 56 of 105 13.3.2. proxy On executing a proxy node the Gatekeeper will attempt to forward the call to the locatio

Page 59 - 14.4. Event Log Format

TANDBERG Gatekeeper User Guide Page 57 of 105 13.5.2. Call screening based on domain In this example, user fred will not accept calls from anyone at

Page 60 - 14.5. Logged Events

TANDBERG Gatekeeper User Guide Page 58 of 105 14. Logging 14.1. About Logging The Gatekeeper provides logging for troubleshooting and auditing purpo

Page 61

TANDBERG Gatekeeper User Guide Page 59 of 105 14.4. Event Log Format The event log is displayed in an extension of the UNIX syslog format: date time

Page 62

TANDBERG Gatekeeper User Guide Page 6 of 105 16.3.26. SubZoneDelete ...

Page 63

TANDBERG Gatekeeper User Guide Page 60 of 105 14.5. Logged Events Events logged at level 1 Event Description Eventlog Cleared An operator cleared

Page 64 - 14.6. Remote Logging

TANDBERG Gatekeeper User Guide Page 61 of 105 Event Description External Server Communication Failure Communication with an external server failed u

Page 65 - 15. Software Upgrading

TANDBERG Gatekeeper User Guide Page 62 of 105 Event data fields Each Event has associated data fields. Fields are listed below in the order in which t

Page 66

TANDBERG Gatekeeper User Guide Page 63 of 105 Field Description Applicable Events Src-ip Specifies the source IP address (the IP address of the

Page 67

TANDBERG Gatekeeper User Guide Page 64 of 105 Field Description Applicable Events Time A full UTC timestamp in YYYY/MM/DD-HH:MM:SS format. Using

Page 68 - 16. Command Reference

TANDBERG Gatekeeper User Guide Page 65 of 105 15. Software Upgrading 15.1. About Software Upgrading Software upgrade can be done in one of two ways

Page 69

TANDBERG Gatekeeper User Guide Page 66 of 105 3. Browse to the file containing the software and select Install. You will see a page indicating that

Page 70

TANDBERG Gatekeeper User Guide Page 67 of 105 To upgrade using SCP or PSCP: 1. Make sure the system is turned on and available on IP. 2. Upload th

Page 71

TANDBERG Gatekeeper User Guide Page 68 of 105 16. Command Reference This chapter lists the basic usage of each command. The commands also support mo

Page 72 - 16.2. Configuration

TANDBERG Gatekeeper User Guide Page 69 of 105 16.1.5. ExternalManager xstatus ExternalManager Returns information about the external manager. The E

Page 73

TANDBERG Gatekeeper User Guide Page 7 of 105 21. Bibliography 102 22. Glossary 103 23. Index 104

Page 74

TANDBERG Gatekeeper User Guide Page 70 of 105 16.1.9. Links xstatus Links Reports call and bandwidth information for all links on the system. xsta

Page 75

TANDBERG Gatekeeper User Guide Page 71 of 105 16.1.13. ResourceUsage xstatus ResourceUsage Returns information about the usage of system resources.

Page 76

TANDBERG Gatekeeper User Guide Page 72 of 105 16.1.16. Zones xstatus Zones Returns call and bandwidth information for all zones on the system. Also

Page 77

TANDBERG Gatekeeper User Guide Page 73 of 105 xconfiguration Authentication Mode: <On/Off> Specifies whether or not to use H.235 authentication

Page 78

TANDBERG Gatekeeper User Guide Page 74 of 105 xconfiguration Gatekeeper CallsToUnknownIPAddresses: <Off/Direct/Indirect> Specifies whether or n

Page 79

TANDBERG Gatekeeper User Guide Page 75 of 105 xconfiguration Gatekeeper Registration AllowList [1..1000] Pattern: <pattern> Specifies a pattern

Page 80

TANDBERG Gatekeeper User Guide Page 76 of 105 16.2.5. HTTP/HTTPS Commands under the HTTP and HTTPS nodes control web access to the Gatekeeper. xCon

Page 81

TANDBERG Gatekeeper User Guide Page 77 of 105 xconfiguration IP DNS Domain Name: <name> Specifies the name to be appended to the domain name be

Page 82

TANDBERG Gatekeeper User Guide Page 78 of 105 16.2.10. NTP xconfiguration NTP Address: <IPAddress> Sets the IP address of the NTP server to b

Page 83

TANDBERG Gatekeeper User Guide Page 79 of 105 16.2.14. Session xconfiguration Session TimeOut: <0..65534> Controls how long an administration

Page 84 - 16.3. Command

TANDBERG Gatekeeper User Guide Page 8 of 105 1. Product Information 1.1. Trademarks and Copyright Copyright 1993-2006 TANDBERG ASA. All rights reser

Page 85

TANDBERG Gatekeeper User Guide Page 80 of 105 xconfiguration SubZones TraversalSubZone Bandwidth PerCall Limit: <1..100000000> Per-call bandwidt

Page 86

TANDBERG Gatekeeper User Guide Page 81 of 105 16.2.18. SystemUnit xconfiguration SystemUnit Name: <name> The name of the unit. Choose a name

Page 87

TANDBERG Gatekeeper User Guide Page 82 of 105 xconfiguration Zones TraversalZone Match [1..5] Mode: <AlwaysMatch/PatternMatch/Disabled> The zon

Page 88

TANDBERG Gatekeeper User Guide Page 83 of 105 xconfiguration Zones Zone [1..100] Match [1..5] Pattern String: <pattern> The pattern to be used

Page 89

TANDBERG Gatekeeper User Guide Page 84 of 105 16.3. Command The command root command, xcommand, is used to execute commands on the Gatekeeper. To li

Page 90 - 16.4. History

TANDBERG Gatekeeper User Guide Page 85 of 105 16.3.7. CredentialDelete xCommand CredentialDelete <index> Deletes the indexed credential. 16.

Page 91 - 16.5. Feedback

TANDBERG Gatekeeper User Guide Page 86 of 105 16.3.12. Dial xCommand Dial <callsrc> <calldst> Bandwidth: <bandwidth> Places call

Page 92

TANDBERG Gatekeeper User Guide Page 87 of 105 16.3.15. FeedbackDeregister xCommand FeedbackDeregister <ID> Deregisters the specified Feedback

Page 93 - 16.6. Other Commands

TANDBERG Gatekeeper User Guide Page 88 of 105 16.3.23. PipeDelete xCommand PipeDelete <index> Deletes the pipe with the specified index. 16.

Page 94 - 17.1. Microsoft DNS Server

TANDBERG Gatekeeper User Guide Page 89 of 105 16.3.28. TransformDelete xCommand TransformDelete <index> Deletes the transform with the specifi

Page 95

TANDBERG Gatekeeper User Guide Page 9 of 105 1.3.2. European Environmental Directives As a manufacturer of electrical and electronic equipment TANDB

Page 96 - 18.2. OpenLDAP

TANDBERG Gatekeeper User Guide Page 90 of 105 16.4. History The history root command, xhistory, is used to display historical data on the Gatekeeper.

Page 97

TANDBERG Gatekeeper User Guide Page 91 of 105 16.5. Feedback The feedback root command, xfeedback, is used to control notifications of events and sta

Page 98

TANDBERG Gatekeeper User Guide Page 92 of 105 16.5.3. Register event xfeedback Register Event Registers for all available Events. xfeedback Register

Page 99

TANDBERG Gatekeeper User Guide Page 93 of 105 16.6. Other Commands 16.6.1. about about Returns information about the software version installed on

Page 100

TANDBERG Gatekeeper User Guide Page 94 of 105 17. Appendix A: Configuring DNS Servers In the examples below, we set up an SRV record to handle H.323

Page 101 - 20.2. Approvals

TANDBERG Gatekeeper User Guide Page 95 of 105 18. Appendix B: Configuring LDAP Servers 18.1. Microsoft Active Directory 18.1.1. Prerequisites The

Page 102 - 21. Bibliography

TANDBERG Gatekeeper User Guide Page 96 of 105 18.1.3. Securing with TLS To enable Active Directory to use TLS, you must request and install a certif

Page 103 - 22. Glossary

TANDBERG Gatekeeper User Guide Page 97 of 105 18.2.3. Adding H.350 objects 1. Create the organizational hierarchy Create an ldif file with the fo

Page 104 - 23. Index

TANDBERG Gatekeeper User Guide Page 98 of 105 18.2.4. Securing with TLS The connection to the LDAP server can be encrypted by enabling Transport Lev

Page 105

TANDBERG Gatekeeper User Guide Page 99 of 105 19. Appendix C: Regular Expression Reference Regular expressions can be used in conjunction with a numb

Comments to this Manuals

No comments