TANDBERG Border Controller User Guide
Page 3 of 118
4.7.
Alternates..................................................................................................................................23
4.8.
Call Processing Overview..........................................................................................................25
5.
Transforming Destination Aliases
27
5.1.
Alias Transforms .......................................................................................................................27
5.2.
Zone Transforms.......................................................................................................................28
6.
Unregistered Endpoints
29
6.1.
Calling from an Unregistered Endpoint ....................................................................................29
6.2.
Calling to an Unregistered Endpoint.........................................................................................29
7.
Firewall Traversal
31
7.1.
Traversal Protocols and Ports...................................................................................................31
7.2.
Traversal Zones ........................................................................................................................32
8.
Bandwidth Control
33
8.1.
About Bandwidth Control..........................................................................................................33
8.2.
Subzones ..................................................................................................................................33
8.2.1.
Subzone Bandwidths.......................................................................................................................... 34
8.2.2.
Subzone links ...................................................................................................................................... 34
8.2.3.
Pipes..................................................................................................................................................... 34
8.3.
Insufficient Bandwidth..............................................................................................................35
8.3.1.
Insufficient bandwidth........................................................................................................................ 35
8.4.
Bandwidth Control and Firewall Traversal................................................................................36
8.5.
Bandwidth Control Examples....................................................................................................37
8.5.1.
Example without a firewall ................................................................................................................. 37
8.5.2.
Example with a firewall....................................................................................................................... 37
9.
Registration Control
39
9.1.
Setting Registration Restriction Policy .....................................................................................39
9.1.1.
Viewing the Allow and Deny lists ....................................................................................................... 39
9.1.2.
Activating use of Allow or Deny lists.................................................................................................. 39
9.1.3.
Managing entries in the Allow and Deny lists .................................................................................. 40
9.2.
Authentication...........................................................................................................................41
9.2.1.
Authentication and NTP ..................................................................................................................... 41
9.2.2.
Authentication using a local database ............................................................................................. 41
9.2.3.
Authentication using an LDAP server ............................................................................................... 41
9.2.4.
Enforced dial plans ............................................................................................................................. 43
9.2.5.
Securing the LDAP connection with TLS........................................................................................... 44
9.2.6.
Setting the Border Controller’s own authentication credentials .................................................... 44
10.
URI Dialing
45
10.1.
About URI Dialing ......................................................................................................................45
10.2.
Making a Call Using URI Dialing ...............................................................................................45
10.2.1.
Enabling URI dialing............................................................................................................................ 45
10.2.2.
Configuring DNS server(s).................................................................................................................. 45
10.2.3.
Configuring the domain name ........................................................................................................... 45
10.2.4.
URI dialing and firewall traversal....................................................................................................... 45
10.3.
Receiving a Call Using URI Dialing............................................................................................46
10.4.
DNS Records.............................................................................................................................47
11.
ENUM Dialing
48
11.1.
About ENUM Dialing..................................................................................................................48
11.2.
Configuring ENUM.....................................................................................................................48
11.2.1.
Enabling ENUM support ..................................................................................................................... 48
11.2.2.
Managing ENUM DNS zones.............................................................................................................. 48