User ManualTable of ContentsTable of Contents2Disclaimer, Copyrights and License Agreements8Safety Instructions and Approvals9Environmental Issues10Introduction12About the TANDBERG Video Communication Server12Main Product Features12Standard Features12Optional Features12About this Administrator Guide12Getting Started13What’s in the Box?13Connecting the Cables13Installation Site Preparations13General Installation Precautions13Powering on the VCS14Initial Configuration via Serial Cable14System Administrator Access15About Administrator Access15Configuring Administrator Access15Security Considerations15Administrator Account Password15Default Administrator Password15Changing the Administrator Password15Resetting the Administrator Password15Session Timeout15Root Account15Using the Web Interface16Supported Browsers16Using the Command Line Interface (CLI)17Viewing System Overview18Viewing the Overview Page18Understanding the Overview Page18System Configuration19System Administration Configuration19Configuring System Settings19About the System Name19About Admin Access settings19Ethernet Configuration20Configuring Ethernet Settings20About Ethernet Speed20IP Configuration21Configuring IP Settings21About IPv4 to IPv6 Gatewaying21DNS Configuration22Configuring DNS Settings22About DNS Servers22About the DNS Domain Name22NTP Configuration23Configuring NTP Settings23About the NTP Server23Setting the Time Zone23SNMP Configuration24Configuring SNMP Settings24About SNMP Settings24External Manager Configuration25Configuring External Manager Settings25About the External Manager25Backing up Configuration Settings26Logging27Logging Overview27About Logging27About Remote Logging27Enabling Remote Logging27About Event Log Levels27Setting the Event Log Level27Event Log28Viewing the Event Log28Event Log Format28Message Details Field28Events Logged at Level 129Events Logged at Level 230Events Logged at Level 330Event Data Fields31Working with H.32333H.323 Overview33About H.323 on the VCS33Using the VCS as an H.323 Gatekeeper33Configuring H.323 Ports33H.323 Endpoint Registration33Overview33Registration Conflict Mode33Auto Discover33Time to Live33Call Time to Live33Configuring H.32334Working with SIP35SIP Overview35About SIP on the VCS35Using the VCS as a SIP Registrar35Proxying Registration Requests35SIP Registration Expiry35Using the VCS as a SIP Proxy Server35SIP protocols and ports35Configuring SIP - Registrations, Protocols and Ports36Configuring SIP - Domains37Interworking38Overview38About Interworking38Configuring Interworking38Registration Control39Registration Overview39Endpoint Registration39Registrations on a VCS Border Controller39MCU, Gateway and Content Server Registration39Finding a VCS with which to Register40SIP40H.32340Authentication41About Authentication41Configuring Authentication41Authentication using an LDAP Server42Configuring the LDAP Server Directory42Securing the LDAP Connection with TLS42Alias Origin Setting42Configuring LDAP Server settings43Authentication using a Local Database44Configuring the Local Database44Registering Aliases45About Alias Registration45H.323 Alias Registration45SIP Alias Registration45Attempts to Register using an Existing Alias45H.32345SIP45Allow and Deny Lists46About Allow and Deny Lists46Patterns and Pattern Types46Activating use of Allow or Deny Lists46Managing Entries in the Allow List47Managing Entries in the Deny List48Managing Zones, Neighbors and Alternates49Overview49About your Video Communications Network49Example49Local Zone and Subzones50About the Local Zone and its Subzones50Configuring the Local Zone and its Subzones50Zones51About Zones51ENUM Zone51DNS Zone51Traversal Client Zone51Neighbor Zone51Traversal Server Zone51Default Zone51Adding Zones52Configuring Zones52Configuring Zones - All Types53Configuring Neighbor Zones54Configuring Traversal Client Zones55Configuring Traversal Server Zones56Configuring ENUM Zones57Configuring DNS Zones57About Alternates58Configuring Alternates58Setting up a Dial Plan59About Dial Plans59Flat Dial Plan59Structured Dial Plan59Hierarchical Dial Plan59Call Processing60Locating a Destination Endpoint60Overview60Process60Dialing by Address Types61About the Different Address Types61Dialing by IP Address61Dialing by H.323 ID or E.164 alias61Dialing by H.323 or SIP URI61Dialing by ENUM61Hop Counts62About Hop Counts62Configuring Hop Counts62Administrator Policy63Overview63About Administrator Policy63Administrator Policy and Authentication63Enabling the use of Administrator Policy64Configuring Administrator Policy via the Web Interface65Configuring Administrator Policy via a CPL script66Uploading a CPL Script66About CPL XSD files66Downloading policy files66User Policy67About User Policy67What is User Policy?67How are Devices Specified?67Process Overview67Who Must do What Before FindMe™ Can Be Used?67Recommendations When Deploying FindMe67User Policy Manager67Enabling User Policy on the VCS68Configuring User Policy Manager68Managing FindMe User Accounts69About User Accounts69Creating a New User Account69Changing a User Password70Viewing Existing User Account Settings70Managing FindMe User Accounts71Deleting a User Account71Using TANDBERG’s FindMe™72About your FindMe User Account72About FindMe™72FindMe User Accounts72Individual versus Group FindMe72Accessing the FindMe Configuration Page72Configuring your FindMe User Account73Alias Searching and Transforming74Overview of Searches and Transforms74About Searches74About Transforms74Transforming an Alias Before Searching Locally74About Local Alias Transforms74Local Alias Transform Process74If the Transformed Alias is Not Found Locally74Configuring Local Alias Transforms75Zone Searching and Transforming76About Zone Searching76Mode76Priority76About Zone Transforms76Using Zone Searches and Transforms Together76Zone Search and Transform Process76Configuring Zone Searches and Transforms77Default Settings77Examples78Combining Match Types and Priorities78Never Query a Zone78Always Query a Zone, Never Apply Transforms78Filter Queries to a Zone Without Transforming79Changing the Prefix or Suffix Before Querying79Query a Zone for Both Original and Transformed Alias80Query a Zone for Two or More Transformed Aliases80URI Dialing81URI Dialing Overview81About URI Dialing81URI Resolution Process via DNS81Enabling URI Dialing via the VCS81Outgoing Calls81Incoming Calls81Firewall Traversal Calls81URI Dialing for Outgoing Calls82Process82Configuring Matches for DNS Zones82Adding and Configuring DNS Zones83Configuring DNS Servers84URI Dialing for Incoming Calls85Types of DNS Records Required85Process85SRV Record Format85Configuring H.323 SRV Records85Location SRV Records85Call SRV Records85Configuring SIP SRV Records85Example DNS Record Configuration86URI Dialing and Firewall Traversal86Recommended Configuration86ENUM Dialing87ENUM Dialing Overview87About ENUM Dialing87ENUM Process87Enabling ENUM Dialing87Outgoing Calls87Incoming Calls87ENUM Dialing for Outgoing Calls88Prerequisites88Process88Example88Configuring Matches for ENUM Zones89Example89Configuring Transforms for ENUM Zones89Example89Configuring ENUM Zones90Configuring DNS Servers91ENUM Dialing for Incoming Calls92Prerequisites92About DNS Domains for ENUM92Configuring DNS NAPTR Records92Example92Calls to and from Unregistered Endpoints93About Unregistered Endpoints93Calls to an Unregistered Endpoint93Overview93Configuration93Calls from an Unregistered Endpoint93Recommended Configuration for Firewall Traversal93Fallback Alias94Fallback Alias94Overview94Configuration94Example Use of a Fallback Alias94Disconnecting calls95Overview95About the Call Control API95Identifying a Particular Call95Call ID Number95Call Serial Number95Obtaining the Call ID/Serial Number95Disconnecting a Call via the Web Interface96Disconnecting a Call via the CLI96Issues when Disconnecting SIP Calls96Firewall Traversal97Firewall Traversal Overview97About Firewall Traversal97VCS and Firewall Traversal97VCS as a Firewall Traversal Client97VCS as a Firewall Traversal Server97Firewall Traversal Protocols and Ports98Overview98Process98Ports for Initial Connections from Traversal Clients98H.323 Firewall Traversal Protocols98Assent Ports98H.460.18/19 Ports98SIP Ports98Ports for Connections out to the Public Internet99STUN Ports99Firewall Configuration99Firewall Traversal and Authentication100Overview100Client Type and Client Settings100Server Type and Server Settings100Configuring the VCS as a Traversal Client101Overview101Adding a New Traversal Client Zone101Configuring a Traversal Client Zone102Configuring the VCS as a Traversal Server103Overview103Adding a New Traversal Server Zone103Configuring a Traversal Server Zone104Configuring Traversal for Endpoints105Configuring Traversal Server Ports106STUN Services107About STUN107About ICE107STUN Binding Discovery107STUN Relay107Configuring STUN Services108Bandwidth Control109Overview109About Bandwidth Control109Example Network Deployment109Subzones110About Subzones110About the Default Subzone110Specifying the IP Address Range of a Subzone110About the Traversal Subzone110Default Settings110Traversal Calls110Bandwidth Consumption of Traversal Calls110Creating a Subzone111Configuring a Subzone112Applying Bandwidth Limitations to Subzones113Types of Limitations113How Different Bandwidth Limitations are Managed113About Pipes114Creating Pipes114Editing Pipes115About Links116Default Links116Creating Links116Editing Links117Applying Pipes to Links118One Pipe, One Link118One Pipe, Two or More Links118Two Pipes, One Link118Default Links118About Default Links118Pre-Configured Links118Automatically Created Links118Default Call Bandwidth, Insufficient Bandwidth and Downspeeding119About the Default Call Bandwidth119About Downspeeding119Configuring the Default Call Bandwidth and Downspeeding119Bandwidth Control Examples120Example Without a Firewall120Example With a Firewall121VCS Border Controller Subzone Configuration121Enterprise VCS Subzone Configuration121Maintenance122Upgrading Software122About Upgrading the VCS Software122Prerequisites122Backing up the Existing Configuration Before Upgrading122Upgrading Using SCP/PSCP122Upgrading via the Web Interface123Option Keys124About Adding Extra Options124Adding Options via the CLI124Adding Options via the Web Interface125Security126About Security126Enabling Security126Passwords127Changing the Administrator Password127System Snapshot127About the System Snapshot127Creating a System Snapshot127Restarting128About Restarting128Shutting Down128About Shutting Down128Command Reference - xConfiguration129Command Reference - xCommand149Command Reference - xStatus157CPL Reference170Overview170CPL Examples174Call Screening of Authenticated Users174Call Screening Based on Alias174Call Screening Based on Domain175Change of Domain Name175Allow Calls from Locally Registered Endpoints Only176Block Calls from Default Zone and Default Subzone176Restricting Access to a Local Gateway177Regular Expression Reference178About Regular Expressions178DNS Configuration179Overview179Verifying the SRV Record179Microsoft DNS Server179BIND 8 & 9179LDAP Configuration180About the LDAP Databases180Downloading the H.350 schemas180Microsoft Active Directory181Prerequisites181Installing the H.350 Schemas181Adding H.350 Objects181Securing with TLS181OpenLDAP182Prerequisites182Installing the H.350 Schemas182Adding H.350 Objects182Securing with TLS182Bibliography183Glossary184Size: 17.7 MBPages: 187Language: EnglishOpen manual