Manuel D’UtilisationTable des matièresTrademarks and Copyright8Disclaimer8Environmental Issues8TANDBERG's Environmental Policy8European Environmental Directives9Waste Handling9Information for Recyclers9Digital User Guides9Operator Safety Summary10Water and Moisture10Cleaning10Ventilation10Lightning10Dust10Vibration10Power connection and Hazardous voltage11Servicing11Accessories11Communication lines11Introduction12Main Features12Hardware Overview12Installation14Precautions14Preparing the Installation Site14Unpacking15Mounting15Connecting the Cables15Power cable15LAN cable15Null-modem RS-232 cable15Switching on the System15Getting started16Initial Configuration16System Administration17Web interface17Command line interface18Session timeout19Administrator Account19Root Account19Backups19IP Configuration20Endpoint Registration20Neighbor Gatekeepers21Neighboring and dial plans21Adding Neighbors and configuring zones22Search Order22Alternates23Call Processing Overview24Transforming Destination Aliases26Alias Transforms26Zone Transforms27Unregistered Endpoints28Calling from an Unregistered Endpoint28Calling to an Unregistered Endpoint28Bandwidth Control30About Bandwidth Control30Subzones30Subzone links31Pipes31Insufficient Bandwidth32Insufficient bandwidth32Bandwidth Control and Firewall Traversal33Bandwidth Control Examples34Example without a firewall34Example with a firewall34Registration Control36Setting Registration Restriction Policy36Viewing the Allow and Deny lists36Activating use of Allow or Deny lists36Managing entries in the Allow and Deny lists37Authentication38Authentication using a local database38Authentication using an LDAP server38Enforced dial plans39Securing the LDAP connection with TLS40URI Dialing41About URI Dialing41Making a Call Using URI Dialing41Enabling URI dialing41Configuring DNS server(s)41Configuring the domain name41URI dialing and firewall traversal41Receiving a Call Using URI Dialing42DNS Records43ENUM Dialing44About ENUM Dialing44Configuring ENUM44Enabling ENUM support44Managing ENUM DNS zones44Configuring DNS NAPTR Records46Example Traversal Deployments47Simple Enterprise Deployment47Enabling outgoing URI calls47Enabling incoming URI calls48Enterprise Gatekeepers48Dialing Public IP Addresses49Neighbored Enterprises49URI Dialing from within the Enterprise50Third Party Call Control51About Third Party Call Control51Placing a Call51Transferring a Call51Enabling call routed mode51Enabling call transfer52Disconnecting a Call52Call Policy53About Call Policy53Uploading the CPL script53Enabling use of the CPL script53Call Policy and Authentication53CPL Standard53Making Decisions Based on Addresses54address-switch54CPL Script Actions55location55proxy56reject56Unsupported CPL Elements56CPL Examples56Call screening of authenticated users56Call screening based on domain57Call redirection57Call screening based on alias57Logging58About Logging58Viewing the event log58Controlling what is Logged58About Event levels58Setting the log level58Event Log Format59Logged Events60Remote Logging64Enabling remote logging64Software Upgrading65About Software Upgrading65Upgrading Using HTTP(S)65Upgrading Using SCP/PSCP66Command Reference68Status68Listing all status information68Listing all status commands68Calls68Ethernet68ExternalManager69Feedback69IP69LDAP69Links70NTP70Pipes70Registrations70ResourceUsage71SubZones71SystemUnit71Zones72Configuration72Authentication72Ethernet73ExternalManager73Gatekeeper73HTTP/HTTPS76IP76LDAP77Links77Log77NTP78Option Key78Pipes78Services78Session79SNMP79SSH79Subzones79SystemUnit81Telnet81TimeZone81Traversal81Zones81Command84AllowListAdd84AllowListDelete84Boot84CallTransfer84CheckBandwidth84CredentialAdd84CredentialDelete85DefaultLinksAdd85DefaultValuesSet85DenyListAdd85DenyListDelete85Dial86DisconnectCall86FeedbackRegister86FeedbackDeregister87FindRegistration87LinkAdd87LinkDelete87Locate87OptionKeyAdd87OptionKeyDelete87PipeAdd87PipeDelete88RemoveRegistration88SubZoneAdd88SubZoneDelete88TransformAdd88TransformDelete89ZoneAdd89ZoneDelete89History90calls90registrations90Feedback91Register status91Register History91Register event92Other Commands93about93clear93eventlog93license93relkey93Syslog93Appendix A: Configuring DNS Servers94Microsoft DNS Server94BIND 8 & 994Verifying the SRV Record94Appendix B: Configuring LDAP Servers95Microsoft Active Directory95Prerequisites95Adding H.350 objects95Securing with TLS96OpenLDAP96Prerequisites96Installing the H.350 schemas96Adding H.350 objects97Securing with TLS98Appendix C: Regular Expression Reference99Appendix D: Technical data100Technical Specifications100System Capacity100Ethernet Interfaces100System Console Port100ITU Standards100Security Features100System Management100Environmental Data100Physical Dimensions100Hardware MTBF101Power Supply101Certification101Approvals101EMC Emission - Radiated Electromagnetic Interference101EMC Immunity101Electrical Safety101ICSA certification101Bibliography102Glossary103Index104Taille: 3,7 MoPages: 105Language: EnglishOuvrir le manuel