7
D14049.07
March 2010
Grey Headline
(continued)
Appendices
CPL reference ..................................................................... 180
Overview of CPL on the VCS .......................................... 180
address-switch ............................................................. 180
address ................................................................. 180
field........................................................................ 181
subfield .................................................................. 182
otherwise ..................................................................... 182
not-present ................................................................... 182
location ........................................................................ 183
rule-switch .................................................................... 183
proxy ........................................................................... 184
reject .......................................................................... 184
Unsupported CPL elements ........................................... 184
CPL examples ............................................................... 185
Call screening of authenticated users ...................... 185
Call screening based on alias .................................. 185
Call screening based on domain .............................. 186
Change of domain name.......................................... 186
Allow calls from locally registered endpoints only ..... 187
Block calls from Default Zone and Default Subzone .. 187
Restricting access to a local gateway ....................... 188
Using the address-switch node .......................... 188
Using the taa:rule-switch node ........................... 188
Redirecting failed calls based on status code........... 189
Reject attempts to subscribe to a presentity ............ 190
Regular expression reference .............................................. 191
Pattern variable reference ................................................... 192
VCS port reference ............................................................. 193
DNS configuration ............................................................... 196
Overview ...................................................................... 196
Verifying the SRV record .......................................... 196
Microsoft DNS server .................................................... 196
BIND 8 & 9 .................................................................. 196
LDAP configuration for device authentication ........................ 197
About the LDAP databases ............................................ 197
Downloading the H.350 schemas .................................. 197
Microsoft Active Directory ............................................ 197
Prerequisites ......................................................... 197
Installing the H.350 schemas .................................. 197
Adding H.350 objects ............................................ 198
Securing with TLS .................................................. 198
OpenLDAP .................................................................... 199
Prerequisites ......................................................... 199
Installing the H.350 schemas ................................. 199
Adding H.350 objects ............................................ 200
Securing with TLS .................................................. 200
Command reference - xConfiguration ................................... 201
Command reference - xCommand ........................................ 248
Command reference - xStatus ............................................. 265
Warnings ............................................................................ 284
Bibliography ....................................................................... 287
Glossary............................................................................. 289
Legal notices ...................................................................... 295
Contact information ............................................................ 296
TANDBERG
VIDEO COMMUNICATION SERVER
ADMINISTRATOR GUIDE
Introduction
Overview and
status
System
configuration
VCS
configuration
Zones and
neighbors
Clustering and
peers
Call
processing
Bandwidth
control
Firewall
traversal
Appendices
Applications
Maintenance
What’s in this manual?