background image

TANDBERG Border Controller

User Manual

Software version Q3.0

D13691.03

This document is not to be reproduced in whole or in part without permission in writing from:

Summary of Contents for D13691.03

Page 1: ...TANDBERG Border Controller User Manual Software version Q3 0 D13691 03 This document is not to be reproduced in whole or in part without permission in writing from...

Page 2: ...and are hereby acknowledged Portions of this software are licensed under 3rd party licenses See the CD accompanying this product for details Disclaimer The information in this document is furnished f...

Page 3: ...from less use of polluting transport TANDBERG s wide use of the concepts of outsourcing makes the company itself a company with a low rate of emissions and effects on the environment TANDBERG s polic...

Page 4: ...grounding type plug A polarized plug has two blades with one wider than the other A grounding type plug has two blades and a third grounding prong The wide blade or third prong is provided for your sa...

Page 5: ...er Controller User Manual If the apparatus has been subjected to excessive shock by being dropped or the cabinet has been damaged If the apparatus fails to operate in accordance with the operating ins...

Page 6: ...ol 14 4 1 Bandwidth Control and Firewall Traversal 16 4 2 Bandwidth Control Examples 17 5 Registration Control 20 5 1 Registration Restriction Policy 20 5 2 Authentication 21 6 URI Dialing 23 6 1 Crea...

Page 7: ...d Reference 43 11 1 Status 43 11 2 Configuration 46 11 3 Command 56 11 4 History 61 11 5 Feedback 62 11 6 Other commands 63 A Appendix Configuring DNS Servers 65 A 1 Microsoft DNS Server 65 A 2 Verify...

Page 8: ...l or NAT Up to 100 traversal calls Supports up to 100 neighboring zones Flexible zone configuration with prefix and suffix support URI dialing with DNS enabling global connectivity Can function as a s...

Page 9: ...owing the power status of the system The LAN 1 interface is used for connecting the system to your network LAN interface 2 and 3 are disabled The serial port Data 1 is for connection to a PC and power...

Page 10: ...sk of electrical shock from lightning Do not use communication equipment to report a gas leak in the vicinity of the leak The socket outlet shall be installed near to the equipment and shall be easily...

Page 11: ...ts for mounting in standard 19 racks Before starting the rack mounting please make sure the TANDBERG Border Controller is placed securely on a hard flat surface 1 Disconnect the AC power cable 2 Make...

Page 12: ...program and configure it to use the serial port with baud rate 115200 8 data bits no parity 1 stop bit no flow control 3 Power on the unit if it is not already on 4 You should see the unit display sta...

Page 13: ...Configuration Gatekeeper AutoDiscovery command in section 11 2 4 c The DNS server address and the domain name if the Border Controller will be configured with hostnames instead of IP address or if URI...

Page 14: ...torical information about calls and registrations xfeedback An event interface providing information about calls and registrations A command reference is given in section 11 3 1 1 Administrator Accoun...

Page 15: ...t the endpoint documentation for information on how to configure it with a Gatekeeper NOTE Only traversal enabled endpoints can register with a TANDBERG Border Controller All other registration reques...

Page 16: ...n your deployment A hierarchical dial plan can simplify this One Gatekeeper is nominated as the directory gatekeeper for the deployment All Border Controllers and public Gatekeepers are neighbored wit...

Page 17: ...Each Border Controller may be configured with the IP addresses of up to five Alternates When an endpoint registers with the Border Controller it is presented with the IP addresses of all the Alternat...

Page 18: ...he destination address resembles an email address The Border Controller first follows the procedure for matching H 323 IDs If that fails it looks for a Gatekeeper or Border Controller responsible for...

Page 19: ...TANDBERG Border Controller User Manual Figure 3 Location decision flow diagram 12...

Page 20: ...rewall only accept incoming data from the IP address and port to which data has already been sent allows you to maintain a secure network behind the firewall unsolicited incoming data will not be acce...

Page 21: ...al zone is made up of one or more subzones When an endpoint registers with the Border Controller it is assigned to a subzone based on its IP address By default all endpoints registering with the Borde...

Page 22: ...sing the following command line commands xConfiguration SubZones SubZone 1 100 Bandwidth Total Mode xConfiguration SubZones SubZone 1 100 Bandwidth Total Limit xConfiguration SubZones SubZone 1 100 Ba...

Page 23: ...h control is in use there are two possible behaviors when a call cannot be placed at the bandwidth requested By default the call will be connected at a reduced bandwidth down speeding assuming that th...

Page 24: ...n the offices we can use the firewall traversal capability of the TANDBERG Gatekeeper and Border Controller to maintain connectivity In Figure 9 the endpoints in the enterprise register with the Gatek...

Page 25: ...ng through the Gatekeeper whilst the Traversal Zone controls all traffic traversing the enterprise firewall and passing on to the Border Controller Both subzones and the Traversal zone are linked the...

Page 26: ...TANDBERG Border Controller User Manual Figure 11 Gatekeeper example configuration network The default links may be restored by running the command xCommand DefaultLinksAdd 19...

Page 27: ...onPolicy None AllowList DenyList or by using the web interface on the Border Controller Configuration Restrictions page see Figure 12 for a screenshot of the Registration Restrictions Configuration If...

Page 28: ...uthentication Mode On xConfiguration Authentication Database LocalDatabase Each credential in the local database has a username and a password To manage the credentials in the local database use the f...

Page 29: ...verified using the command xstatus LDAP The details of the LDAP server can also be configured via the web interface on the Border Controller Configuration Gatekeeper page 5 2 3 Securing the LDAP conn...

Page 30: ...ion screen If you want others to be able to reach you using URI dialing add a record to your DNS information as described in Appendix A Endpoints will typically register with the Border Controller wit...

Page 31: ...se Service is defined by the H 323 protocol suite to be h323ls and Proto is udp Name corresponds to the host part of the H 323 URI How you add the SRV record depends on the type of DNS server you are...

Page 32: ...should register with the Gatekeeper Endpoint 1003 will register with the Border Controller The Gatekeeper will be configured to register with the Border Controller and the Border Controller set with a...

Page 33: ...neighbored with the existing enterprise Gatekeeper as shown in Figure 16 The Enterprise Gatekeeper is also neighbored with the TANDBERG Gatekeeper Figure 16 Neighboring with an enterprise gatekeeper...

Page 34: ...s may be neighbored to allow calls to be placed from one enterprise to another Neighboring will reduce call setup time compared to URI dialing described in section 6 The disadvantage of neighboring is...

Page 35: ...d route it accordingly URI dialing will send all queries for a particular domain to the same Border Controller If you want to have URI dialing covering multiple Border Controllers nominate one as the...

Page 36: ...ated Gatekeeper the call s source aliases will be removed from the call request before it is passed to the policy engine This is because the unauthenticated source aliases could be forged and so shoul...

Page 37: ...pe Result URI url ID H 323 ID h323 ID Dialed Digits dialedDigits display Not defined for any alias types address The address construct is used within an address switch to specify addresses to match Pl...

Page 38: ...original destination for outgoing calls The following attributes are supported on location nodes Clear yes no Specifies whether to clear the current location set before adding the new location The de...

Page 39: ...switch language switch time switch priority switch redirect mail log subaction lookup remove location 8 4 CPL Examples 8 4 1 Call screening Only allow calls from users with authenticated source addre...

Page 40: ...e proxy otherwise not present reject not present address switch address address switch incoming cpl 8 4 3 Call Redirection Redirect all calls to user barney to voicemail cpl incoming address switch fi...

Page 41: ...log is displayed in an extension of the UNIX syslog format date time host name facility name PID message details date and time represent the local time at which the message was logged host name is the...

Page 42: ...4 Logged Events The Events logged as are follows Table 2 Events logged at level 1 Event Description Eventlog Cleared An operator cleared the event log Admin Session Start An administrator has logged...

Page 43: ...cause code Call Bandwidth Changed The bandwidth of a call has changed External Server Communication Failure Communication with an external server failed unexpectedly The event detail data should diffe...

Page 44: ...idth Changed Call Connected Call Disconnected Call Rejected External Server Communi cation Failure Incoming Message Outgoing Message Policy Change Registration Accepted Registration Rejected Registrat...

Page 45: ...ed Dst ip Specifies the destination IP ad dress the IP address of the des tination for a communication at tempt The destination IP is recorded in the same format as Src ip As Src ip Dst port Specifies...

Page 46: ...MM SS format Using this format permits simple ASCII text sort ing ordering to naturally sort by time This is included due to the limitations of standard syslog timestamps All Events Level The level of...

Page 47: ...nfiguration using the TANDBERG Management Suite before performing the upgrade 10 1 Upgrading Using HTTP S To upgrade using HTTP S do the following Point your browser at the IP address of the Border Co...

Page 48: ...oftware image NOTE Make sure you transfer the release key file before transferring the software image Also make sure you name the files exactly as described below NOTE The release key file should cont...

Page 49: ...troller User Manual Enter password when prompted Wait until the software has installed completely This should not take more than two minutes Reboot the system After about four minutes the system will...

Page 50: ...s possible to reduce the amount of information returned by xstatus by specifying a more detailed status command To list all xstatus commands available at the root level type xstatus 11 1 1 calls xstat...

Page 51: ...xpression at index n 11 1 5 IP xstatus IP Returns the active IP configuration of the system with IP address subnet mask and gateway If you have changed the IP configuration without rebooting xstatus I...

Page 52: ...trations Total number of currently registered endpoints and services See glossary for definition MaxPortRegistrations Maximum number of registered endpoints and services since system start TraversalCa...

Page 53: ...gatekeeper in the zone 11 2 Configuration The configuration root command xconfiguration is used to set configuration settings To list all xconfiguration commands type xconfiguration To list all confi...

Page 54: ...11 2 2 Ethernet xConfiguration Ethernet Speed Auto 10half 10full 100half 100full Sets the speed of the Ethernet link Use auto to automatically configure the speed To get the current speed use xstatus...

Page 55: ...is Indirect xConfiguration Gatekeeper CallTimeToLive 60 65534 Interval in seconds at which endpoints are polled to verify that they are still in a call The default is 120 seconds xConfiguration Gateke...

Page 56: ...ing Specified in seconds The default is 1800 seconds 11 2 5 HTTP HTTPS Command under the HTTP and HTTPS nodes control web access to the Border Controller xConfiguration HTTP Mode On Off Enables disabl...

Page 57: ...ameter is only used when attempting to resolve server addresses such as LDAP servers NTP servers etc It plays no part in URI dialing see xconfiguration gatekeeper localdomain 11 2 7 LDAP Parameters un...

Page 58: ...ith the traversal link 11 2 9 Log xConfiguration Log Level 1 3 Controls the granularity of event logging with 1 being the least verbose 3 the most 11 2 10 NTP xConfiguration NTP Address IPAddr Sets th...

Page 59: ...e system for changes to take effect 11 2 14 SNMP xConfiguration SNMP CommunityName name SNMP Community names are used to authenticate SNMP requests SNMP requests must have this password in order to re...

Page 60: ...raversal subzone xConfiguration SubZones TraversalSubZone Bandwidth PerCall Mode None Limited Unlimited Whether or not the traversal subzone is enforcing per call bandwidth restrictions None corre spo...

Page 61: ...identifies the system xConfiguration SystemUnit Password password Specify the password of the unit The password is used to login with Telnet HTTP S SSH SCP and on the serial port To set an empty pass...

Page 62: ...which it is cooperating with to provide firewall traversal xConfiguration Zones TraversalZone 1 50 Name name Sets the name of the TANDBERG Gatekeeper which is allowed to connect to this Border Control...

Page 63: ...be marked as inactive xConfiguration Zones Zone 1 100 Match 1 5 Mode AlwaysMatch PatternMatch Disabled The zone match mode determines when an LRQ will be sent to gatekeepers in the zone If the mode is...

Page 64: ...t xCommand Boot Reboots the Border Controller This takes approximately 2 minutes to complete 11 3 4 CheckBandwidth xCommand CheckBandwidth node1 node2 bandwidth calltype Diagnostic function for verify...

Page 65: ...speed The default IP address is 192 168 0 100 COM port baud rate speed data bits parity stop bits SNMP community name and host address system name password option key release key Note that DefaltValu...

Page 66: ...istory Registrations The following would be a typical use Back slashes are used to indicate continuation lines xCommand FeedbackRegister ID 1 URL http 10 1 1 1 SystemManagementService asmx Expression...

Page 67: ...ed pipe 11 3 21 RemoveRegistration xCommand RemoveRegistration regid Removes the specified registration 11 3 22 SubZoneAdd xCommand SubZoneAdd name address prefixlength totalmode total percallmode per...

Page 68: ...aversalZoneDelete xCommand TraversalZoneDelete index Removes the traversal zone with the specified index 11 3 26 ZoneAdd xCommand ZoneAdd name address Adds a new zone with the specified name and IP ad...

Page 69: ...Feedback Expression describes an interesting event or change in status When a Feedback Expression is registered a notification will be displayed in the shell for each occurrence of the event described...

Page 70: ...of the ResourceUsage fields changes ResourceUsage fields consist of Registrations MaxRegistrations PortRegistrations MaxPortRegistrations TraversalCalls MaxTraversalCalls TotalTraversalCalls 11 6 Othe...

Page 71: ...ftware has been installed with 11 6 5 Syslog syslog level ipaddr ipaddr Enables tracing to the console level Specifies the detail at which to trace 0 3 3 gives most logging ipaddr Specify up to 10 IP...

Page 72: ...Linux systems Configuration is based around two sets of text files named conf which describes which zones are represented by the server and a selection of zone files which describe the detail of each...

Page 73: ...TANDBERG Border Controller User Manual as expected nslookup querytype srv h323ls udp example com and check the output 66...

Page 74: ...if format from the web interface on the Border Controller To do this navigate to the Border Controller Configuration Files page and click on the links for the schemas Copy the downloaded schemas to th...

Page 75: ...sociated for use with it stored locally When viewing the certificate you should see a message saying You have a private key that corresponds to this certificate Have a private key that does not have s...

Page 76: ...d conf to add the new schemas You will need to add the following lines include etc openldap schemas commobject ldif include etc openldap schemas h323identity ldif include etc openldap schemas h235iden...

Page 77: ...the Border Controller to verify the server s identity Once the certificate has been created you will need to install the following three files associated with the certificate onto the LDAP server The...

Page 78: ...nt The test reports and certificates issued for the product show that the TANDBERG Border Controller Type number TTC2 02 complies with the following standards EMC Emission Radiated Electromagnetic Int...

Page 79: ...rt 2 x COM ports front and rear RS 323 DB 9 connector 2 x USB disabled ITU standards ITU T H 323 version 4 including Annex O ITU T H 460 18 H 460 19 ITU T H 235 ITU T H 350 Security Features IP Admini...

Page 80: ...ler User Manual Physical Dimensions Height 4 35 cm 1 72 inches Width 42 6 cm 16 8 inches Depth 22 86 cm 9 inches 1U rack mounted chassis Power supply 90 264V full range 47 63 Hz Certification LVD 73 2...

Page 81: ...other H 245 based multimedia terminals 2 ITU Specification H 350 Directory services architecture for multimedia conferencing 3 http www ietf org rfc rfc2782 txt 4 http www ietf org rfc rfc3164 txt 5 h...

Page 82: ...rollers to determine the location of an endpoint PortRegistration A measure of the number of systems and aliases registered with the Border Controller Each endpoint may register one alias of each type...

Page 83: ...ecord 23 65 down speed 16 48 E 164 9 11 75 ethernet 47 event log 34 39 remote 39 verbosity 34 eventlog 63 Expressway 1 external manager 44 47 feedback 44 62 63 firewall 13 16 75 gatekeeper discovery 6...

Page 84: ...e to live 49 release key 40 RestrictionPolicy 49 RFC 2782 23 RFC 3164 39 scp 52 upgrade using 41 42 serial cable 4 5 serial interface 7 serial port 2 5 7 SNMP 52 ssh 5 7 52 54 subzone 14 15 17 52 54 d...

Reviews: