advertisement
TANDBERG Gatekeeper User Guide
21.
Bibliography
1 ITU Specification: H.235 Security and encryption for H-Series (H.323 and other H.245-based) multimedia terminals http://www.itu.int/rec/T-REC-H.235/en
2 ITU Specification: H.350 Directory services architecture for multimedia conferencing http://www.itu.int/rec/T-REC-H.350/en
3 RFC 2782: A DNS RR for specifying the location of services (DNS SRV) http://www.ietf.org/rfc/rfc2782.txt
4 RFC 3164:The BSD syslog Protocol http://www.ietf.org/rfc/rfc3164.txt
5 RFC 3880: Call Processing Language (CPL): A Language for User Control of Internet Telephony
Services http://www.ietf.org/rfc/rfc3880.txt
6
DNS and BIND
Fourth Edition, Albitz and Liu, O'Reilly and Associates, ISBN: 0-596-00158-4
7 RFC 2915:The Naming Authority Pointer (NAPTR) DNS Resource Record http://www.ietf.org/rfc/rfc2915.txt
8
9
RFC 3761: The E.164 to Uniform Resource Identifiers (URI) Dynamic Delegation Discovery
System (DDDS) Application (ENUM) http://www.ietf.org/rfc/rfc3761.txt
Mastering Regular Expressions,
Jeffrey E.F. Friedl, O'Reilly and Associates, ISBN: 1-56592-257-
3
Page 102 of 105
advertisement
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Related manuals
advertisement
Table of contents
- 8
- 8 Trademarks and Copyright
- 8 Disclaimer
- 8 Environmental Issues
- 8 TANDBERG's Environmental Policy
- 9 European Environmental Directives
- 9 Waste Handling
- 9 Information for Recyclers
- 9 Digital User Guides
- 10 Operator Safety Summary
- 10 Water and Moisture
- 10 Cleaning
- 10 Ventilation
- 10 Lightning
- 10 Dust
- 10 Vibration
- 11 Power connection and Hazardous voltage
- 11 Servicing
- 11 Accessories
- 11 Communication lines
- 12 Introduction
- 12 Main Features
- 12 Hardware Overview
- 14 Installation
- 14 Precautions
- 14 Preparing the Installation Site
- 15 Unpacking
- 15 Mounting
- 15 Connecting the Cables
- 15 Power cable
- 15 LAN cable
- 15 Null-modem RS-232 cable
- 15 Switching on the System
- 16 Getting started
- 16 Initial Configuration
- 17 System Administration
- 17 Web interface
- 18 Command line interface
- 19 Session timeout
- 19 Administrator Account
- 19 Root Account
- 19 Backups
- 20 IP Configuration
- 20 Endpoint Registration
- 21 Neighbor Gatekeepers
- 21 Neighboring and dial plans
- 22 Adding Neighbors and configuring zones
- 22 Search Order
- 23 Alternates
- 24 Call Processing Overview
- 26 Transforming Destination Aliases
- 26 Alias Transforms
- 27 Zone Transforms
- 28 Unregistered Endpoints
- 28 Calling from an Unregistered Endpoint
- 28 Calling to an Unregistered Endpoint
- 30 Bandwidth Control
- 30 About Bandwidth Control
- 30 Subzones
- 31 Subzone links
- 31 Pipes
- 32 Insufficient Bandwidth
- 32 Insufficient bandwidth
- 33 Bandwidth Control and Firewall Traversal
- 34 Bandwidth Control Examples
- 34 Example without a firewall
- 34 Example with a firewall
- 36 Registration Control
- 36 Setting Registration Restriction Policy
- 36 Viewing the Allow and Deny lists
- 36 Activating use of Allow or Deny lists
- 37 Managing entries in the Allow and Deny lists
- 38 Authentication
- 38 Authentication using a local database
- 38 Authentication using an LDAP server
- 39 Enforced dial plans
- 40 Securing the LDAP connection with TLS
- 41 URI Dialing
- 41 About URI Dialing
- 41 Making a Call Using URI Dialing
- 41 Enabling URI dialing
- 41 Configuring DNS server(s)
- 41 Configuring the domain name
- 41 URI dialing and firewall traversal
- 42 Receiving a Call Using URI Dialing
- 43 DNS Records
- 44 ENUM Dialing
- 44 About ENUM Dialing
- 44 Configuring ENUM
- 44 Enabling ENUM support
- 44 Managing ENUM DNS zones
- 46 Configuring DNS NAPTR Records
- 47 Example Traversal Deployments
- 47 Simple Enterprise Deployment
- 47 Enabling outgoing URI calls
- 48 Enabling incoming URI calls
- 48 Enterprise Gatekeepers
- 49 Dialing Public IP Addresses
- 49 Neighbored Enterprises
- 50 URI Dialing from within the Enterprise
- 51 Third Party Call Control
- 51 About Third Party Call Control
- 51 Placing a Call
- 51 Transferring a Call
- 51 Enabling call routed mode
- 52 Enabling call transfer
- 52 Disconnecting a Call
- 53 Call Policy
- 53 About Call Policy
- 53 Uploading the CPL script
- 53 Enabling use of the CPL script
- 53 Call Policy and Authentication
- 53 CPL Standard
- 54 Making Decisions Based on Addresses
- 54 address-switch
- 55 CPL Script Actions
- 55 location
- 56 proxy
- 56 reject
- 56 Unsupported CPL Elements
- 56 CPL Examples
- 56 Call screening of authenticated users
- 57 Call screening based on domain
- 57 Call redirection
- 57 Call screening based on alias
- 58 Logging
- 58 About Logging
- 58 Viewing the event log
- 58 Controlling what is Logged
- 58 About Event levels
- 58 Setting the log level
- 59 Event Log Format
- 60 Logged Events
- 64 Remote Logging
- 64 Enabling remote logging
- 65 Software Upgrading
- 65 About Software Upgrading
- 65 Upgrading Using HTTP(S)
- 66 Upgrading Using SCP/PSCP
- 68 Command Reference
- 68 Status
- 68 Listing all status information
- 68 Listing all status commands
- 68 Calls
- 68 Ethernet
- 69 ExternalManager
- 69 Feedback
- 69 IP
- 69 LDAP
- 70 Links
- 70 NTP
- 70 Pipes
- 70 Registrations
- 71 ResourceUsage
- 71 SubZones
- 71 SystemUnit
- 72 Zones
- 72 Configuration
- 72 Authentication
- 73 Ethernet
- 73 ExternalManager
- 73 Gatekeeper
- 76 HTTP/HTTPS
- 76 IP
- 77 LDAP
- 77 Links
- 77 Log
- 78 NTP
- 78 Option Key
- 78 Pipes
- 78 Services
- 79 Session
- 79 SNMP
- 79 SSH
- 79 Subzones
- 81 SystemUnit
- 81 Telnet
- 81 TimeZone
- 81 Traversal
- 81 Zones
- 84 Command
- 84 AllowListAdd
- 84 AllowListDelete
- 84 Boot
- 84 CallTransfer
- 84 CheckBandwidth
- 84 CredentialAdd
- 85 CredentialDelete
- 85 DefaultLinksAdd
- 85 DefaultValuesSet
- 85 DenyListAdd
- 85 DenyListDelete
- 86 Dial
- 86 DisconnectCall
- 86 FeedbackRegister
- 87 FeedbackDeregister
- 87 FindRegistration
- 87 LinkAdd
- 87 LinkDelete
- 87 Locate
- 87 OptionKeyAdd
- 87 OptionKeyDelete
- 87 PipeAdd
- 88 PipeDelete
- 88 RemoveRegistration
- 88 SubZoneAdd
- 88 SubZoneDelete
- 88 TransformAdd
- 89 TransformDelete
- 89 ZoneAdd
- 89 ZoneDelete
- 90 History
- 90 calls
- 90 registrations
- 91 Feedback
- 91 Register status
- 91 Register History
- 92 Register event
- 93 Other Commands
- 93 about
- 93 clear
- 93 eventlog
- 93 license
- 93 relkey
- 93 Syslog
- 94 Appendix A: Configuring DNS Servers
- 94 Microsoft DNS Server
- 94 BIND 8 & 9
- 94 Verifying the SRV Record
- 95 Appendix B: Configuring LDAP Servers
- 95 Microsoft Active Directory
- 95 Prerequisites
- 95 Adding H.350 objects
- 96 Securing with TLS
- 96 OpenLDAP
- 96 Prerequisites
- 96 Installing the H.350 schemas
- 97 Adding H.350 objects
- 98 Securing with TLS
- 99 Appendix C: Regular Expression Reference
- 100 Appendix D: Technical data
- 100 Technical Specifications
- 100 System Capacity
- 100 Ethernet Interfaces
- 100 System Console Port
- 100 ITU Standards
- 100 Security Features
- 100 System Management
- 100 Environmental Data
- 100 Physical Dimensions
- 101 Hardware MTBF
- 101 Power Supply
- 101 Certification
- 101 Approvals
- 101 EMC Emission - Radiated Electromagnetic Interference
- 101 EMC Immunity
- 101 Electrical Safety
- 101 ICSA certification
- 102 Bibliography
- 103 Glossary
- 104 Index