TANDBERG Border Controller User Guide
Page 4 of 118
11.3.
Configuring DNS NAPTR Records .............................................................................................50
12.
Example Traversal Deployments
51
12.1.
Simple Enterprise Deployment.................................................................................................51
12.2.
Enterprise Gatekeepers............................................................................................................52
12.3.
Dialing Public IP Addresses ......................................................................................................52
12.4.
Neighbored Enterprises............................................................................................................53
12.4.1.
Enabling outgoing URI calls ............................................................................................................... 53
12.4.2.
Enabling incoming URI calls .............................................................................................................. 54
13.
Third Party Call Control
55
13.1.
About Third Party Call Control...................................................................................................55
13.2.
Placing a Call ............................................................................................................................55
13.3.
Transferring a Call ....................................................................................................................55
13.3.1.
Enabling call routed mode ................................................................................................................. 55
13.3.2.
Enabling call transfer ......................................................................................................................... 56
13.4.
Disconnecting a Call .................................................................................................................56
14.
Multiway
57
14.1.
About Multiway .........................................................................................................................57
14.2.
Requirements ...........................................................................................................................57
14.3.
Process .....................................................................................................................................57
14.4.
Configuration ............................................................................................................................58
15.
Call Policy
59
15.1.
About Call Policy .......................................................................................................................59
15.1.1.
Uploading the CPL script .................................................................................................................... 59
15.1.2.
Enabling use of the CPL script........................................................................................................... 59
15.1.3.
Call Policy and Authentication ........................................................................................................... 59
15.1.4.
CPL Standard ...................................................................................................................................... 59
15.2.
Making Decisions Based on Addresses ...................................................................................60
15.2.1.
address-switch .................................................................................................................................... 60
15.3.
CPL Script Actions.....................................................................................................................62
15.3.1.
location ................................................................................................................................................ 62
15.3.2.
proxy..................................................................................................................................................... 63
15.3.3.
reject .................................................................................................................................................... 63
15.4.
Unsupported CPL Elements......................................................................................................63
15.5.
CPL Examples ...........................................................................................................................63
15.5.1.
Call screening of authenticated users .............................................................................................. 63
15.5.2.
Call screening based on domain ....................................................................................................... 64
15.5.3.
Call redirection .................................................................................................................................... 64
15.5.4.
Call screening based on alias............................................................................................................ 64
15.5.5.
Prevent external use of Gateway....................................................................................................... 65
16.
Logging
66
16.1.
About Logging ...........................................................................................................................66
16.2.
Viewing the event log................................................................................................................66
16.3.
Controlling what is Logged........................................................................................................66
16.3.1.
About Event levels............................................................................................................................... 66
16.3.2.
Setting the log level ............................................................................................................................ 66
16.4.
Event Log Format......................................................................................................................67
16.5.
Logged Events ..........................................................................................................................68
16.6.
Remote Logging........................................................................................................................72
16.6.1.
Enabling remote logging .................................................................................................................... 72