background image

TANDBERG Border Controller User Manual

Figure 11: Gatekeeper example configuration

network. The default links may be restored by running the command:

xCommand DefaultLinksAdd

19

Содержание D13691.03

Страница 1: ...TANDBERG Border Controller User Manual Software version Q3 0 D13691 03 This document is not to be reproduced in whole or in part without permission in writing from...

Страница 2: ...and are hereby acknowledged Portions of this software are licensed under 3rd party licenses See the CD accompanying this product for details Disclaimer The information in this document is furnished f...

Страница 3: ...from less use of polluting transport TANDBERG s wide use of the concepts of outsourcing makes the company itself a company with a low rate of emissions and effects on the environment TANDBERG s polic...

Страница 4: ...grounding type plug A polarized plug has two blades with one wider than the other A grounding type plug has two blades and a third grounding prong The wide blade or third prong is provided for your sa...

Страница 5: ...er Controller User Manual If the apparatus has been subjected to excessive shock by being dropped or the cabinet has been damaged If the apparatus fails to operate in accordance with the operating ins...

Страница 6: ...ol 14 4 1 Bandwidth Control and Firewall Traversal 16 4 2 Bandwidth Control Examples 17 5 Registration Control 20 5 1 Registration Restriction Policy 20 5 2 Authentication 21 6 URI Dialing 23 6 1 Crea...

Страница 7: ...d Reference 43 11 1 Status 43 11 2 Configuration 46 11 3 Command 56 11 4 History 61 11 5 Feedback 62 11 6 Other commands 63 A Appendix Configuring DNS Servers 65 A 1 Microsoft DNS Server 65 A 2 Verify...

Страница 8: ...l or NAT Up to 100 traversal calls Supports up to 100 neighboring zones Flexible zone configuration with prefix and suffix support URI dialing with DNS enabling global connectivity Can function as a s...

Страница 9: ...owing the power status of the system The LAN 1 interface is used for connecting the system to your network LAN interface 2 and 3 are disabled The serial port Data 1 is for connection to a PC and power...

Страница 10: ...sk of electrical shock from lightning Do not use communication equipment to report a gas leak in the vicinity of the leak The socket outlet shall be installed near to the equipment and shall be easily...

Страница 11: ...ts for mounting in standard 19 racks Before starting the rack mounting please make sure the TANDBERG Border Controller is placed securely on a hard flat surface 1 Disconnect the AC power cable 2 Make...

Страница 12: ...program and configure it to use the serial port with baud rate 115200 8 data bits no parity 1 stop bit no flow control 3 Power on the unit if it is not already on 4 You should see the unit display sta...

Страница 13: ...Configuration Gatekeeper AutoDiscovery command in section 11 2 4 c The DNS server address and the domain name if the Border Controller will be configured with hostnames instead of IP address or if URI...

Страница 14: ...torical information about calls and registrations xfeedback An event interface providing information about calls and registrations A command reference is given in section 11 3 1 1 Administrator Accoun...

Страница 15: ...t the endpoint documentation for information on how to configure it with a Gatekeeper NOTE Only traversal enabled endpoints can register with a TANDBERG Border Controller All other registration reques...

Страница 16: ...n your deployment A hierarchical dial plan can simplify this One Gatekeeper is nominated as the directory gatekeeper for the deployment All Border Controllers and public Gatekeepers are neighbored wit...

Страница 17: ...Each Border Controller may be configured with the IP addresses of up to five Alternates When an endpoint registers with the Border Controller it is presented with the IP addresses of all the Alternat...

Страница 18: ...he destination address resembles an email address The Border Controller first follows the procedure for matching H 323 IDs If that fails it looks for a Gatekeeper or Border Controller responsible for...

Страница 19: ...TANDBERG Border Controller User Manual Figure 3 Location decision flow diagram 12...

Страница 20: ...rewall only accept incoming data from the IP address and port to which data has already been sent allows you to maintain a secure network behind the firewall unsolicited incoming data will not be acce...

Страница 21: ...al zone is made up of one or more subzones When an endpoint registers with the Border Controller it is assigned to a subzone based on its IP address By default all endpoints registering with the Borde...

Страница 22: ...sing the following command line commands xConfiguration SubZones SubZone 1 100 Bandwidth Total Mode xConfiguration SubZones SubZone 1 100 Bandwidth Total Limit xConfiguration SubZones SubZone 1 100 Ba...

Страница 23: ...h control is in use there are two possible behaviors when a call cannot be placed at the bandwidth requested By default the call will be connected at a reduced bandwidth down speeding assuming that th...

Страница 24: ...n the offices we can use the firewall traversal capability of the TANDBERG Gatekeeper and Border Controller to maintain connectivity In Figure 9 the endpoints in the enterprise register with the Gatek...

Страница 25: ...ng through the Gatekeeper whilst the Traversal Zone controls all traffic traversing the enterprise firewall and passing on to the Border Controller Both subzones and the Traversal zone are linked the...

Страница 26: ...TANDBERG Border Controller User Manual Figure 11 Gatekeeper example configuration network The default links may be restored by running the command xCommand DefaultLinksAdd 19...

Страница 27: ...onPolicy None AllowList DenyList or by using the web interface on the Border Controller Configuration Restrictions page see Figure 12 for a screenshot of the Registration Restrictions Configuration If...

Страница 28: ...uthentication Mode On xConfiguration Authentication Database LocalDatabase Each credential in the local database has a username and a password To manage the credentials in the local database use the f...

Страница 29: ...verified using the command xstatus LDAP The details of the LDAP server can also be configured via the web interface on the Border Controller Configuration Gatekeeper page 5 2 3 Securing the LDAP conn...

Страница 30: ...ion screen If you want others to be able to reach you using URI dialing add a record to your DNS information as described in Appendix A Endpoints will typically register with the Border Controller wit...

Страница 31: ...se Service is defined by the H 323 protocol suite to be h323ls and Proto is udp Name corresponds to the host part of the H 323 URI How you add the SRV record depends on the type of DNS server you are...

Страница 32: ...should register with the Gatekeeper Endpoint 1003 will register with the Border Controller The Gatekeeper will be configured to register with the Border Controller and the Border Controller set with a...

Страница 33: ...neighbored with the existing enterprise Gatekeeper as shown in Figure 16 The Enterprise Gatekeeper is also neighbored with the TANDBERG Gatekeeper Figure 16 Neighboring with an enterprise gatekeeper...

Страница 34: ...s may be neighbored to allow calls to be placed from one enterprise to another Neighboring will reduce call setup time compared to URI dialing described in section 6 The disadvantage of neighboring is...

Страница 35: ...d route it accordingly URI dialing will send all queries for a particular domain to the same Border Controller If you want to have URI dialing covering multiple Border Controllers nominate one as the...

Страница 36: ...ated Gatekeeper the call s source aliases will be removed from the call request before it is passed to the policy engine This is because the unauthenticated source aliases could be forged and so shoul...

Страница 37: ...pe Result URI url ID H 323 ID h323 ID Dialed Digits dialedDigits display Not defined for any alias types address The address construct is used within an address switch to specify addresses to match Pl...

Страница 38: ...original destination for outgoing calls The following attributes are supported on location nodes Clear yes no Specifies whether to clear the current location set before adding the new location The de...

Страница 39: ...switch language switch time switch priority switch redirect mail log subaction lookup remove location 8 4 CPL Examples 8 4 1 Call screening Only allow calls from users with authenticated source addre...

Страница 40: ...e proxy otherwise not present reject not present address switch address address switch incoming cpl 8 4 3 Call Redirection Redirect all calls to user barney to voicemail cpl incoming address switch fi...

Страница 41: ...log is displayed in an extension of the UNIX syslog format date time host name facility name PID message details date and time represent the local time at which the message was logged host name is the...

Страница 42: ...4 Logged Events The Events logged as are follows Table 2 Events logged at level 1 Event Description Eventlog Cleared An operator cleared the event log Admin Session Start An administrator has logged...

Страница 43: ...cause code Call Bandwidth Changed The bandwidth of a call has changed External Server Communication Failure Communication with an external server failed unexpectedly The event detail data should diffe...

Страница 44: ...idth Changed Call Connected Call Disconnected Call Rejected External Server Communi cation Failure Incoming Message Outgoing Message Policy Change Registration Accepted Registration Rejected Registrat...

Страница 45: ...ed Dst ip Specifies the destination IP ad dress the IP address of the des tination for a communication at tempt The destination IP is recorded in the same format as Src ip As Src ip Dst port Specifies...

Страница 46: ...MM SS format Using this format permits simple ASCII text sort ing ordering to naturally sort by time This is included due to the limitations of standard syslog timestamps All Events Level The level of...

Страница 47: ...nfiguration using the TANDBERG Management Suite before performing the upgrade 10 1 Upgrading Using HTTP S To upgrade using HTTP S do the following Point your browser at the IP address of the Border Co...

Страница 48: ...oftware image NOTE Make sure you transfer the release key file before transferring the software image Also make sure you name the files exactly as described below NOTE The release key file should cont...

Страница 49: ...troller User Manual Enter password when prompted Wait until the software has installed completely This should not take more than two minutes Reboot the system After about four minutes the system will...

Страница 50: ...s possible to reduce the amount of information returned by xstatus by specifying a more detailed status command To list all xstatus commands available at the root level type xstatus 11 1 1 calls xstat...

Страница 51: ...xpression at index n 11 1 5 IP xstatus IP Returns the active IP configuration of the system with IP address subnet mask and gateway If you have changed the IP configuration without rebooting xstatus I...

Страница 52: ...trations Total number of currently registered endpoints and services See glossary for definition MaxPortRegistrations Maximum number of registered endpoints and services since system start TraversalCa...

Страница 53: ...gatekeeper in the zone 11 2 Configuration The configuration root command xconfiguration is used to set configuration settings To list all xconfiguration commands type xconfiguration To list all confi...

Страница 54: ...11 2 2 Ethernet xConfiguration Ethernet Speed Auto 10half 10full 100half 100full Sets the speed of the Ethernet link Use auto to automatically configure the speed To get the current speed use xstatus...

Страница 55: ...is Indirect xConfiguration Gatekeeper CallTimeToLive 60 65534 Interval in seconds at which endpoints are polled to verify that they are still in a call The default is 120 seconds xConfiguration Gateke...

Страница 56: ...ing Specified in seconds The default is 1800 seconds 11 2 5 HTTP HTTPS Command under the HTTP and HTTPS nodes control web access to the Border Controller xConfiguration HTTP Mode On Off Enables disabl...

Страница 57: ...ameter is only used when attempting to resolve server addresses such as LDAP servers NTP servers etc It plays no part in URI dialing see xconfiguration gatekeeper localdomain 11 2 7 LDAP Parameters un...

Страница 58: ...ith the traversal link 11 2 9 Log xConfiguration Log Level 1 3 Controls the granularity of event logging with 1 being the least verbose 3 the most 11 2 10 NTP xConfiguration NTP Address IPAddr Sets th...

Страница 59: ...e system for changes to take effect 11 2 14 SNMP xConfiguration SNMP CommunityName name SNMP Community names are used to authenticate SNMP requests SNMP requests must have this password in order to re...

Страница 60: ...raversal subzone xConfiguration SubZones TraversalSubZone Bandwidth PerCall Mode None Limited Unlimited Whether or not the traversal subzone is enforcing per call bandwidth restrictions None corre spo...

Страница 61: ...identifies the system xConfiguration SystemUnit Password password Specify the password of the unit The password is used to login with Telnet HTTP S SSH SCP and on the serial port To set an empty pass...

Страница 62: ...which it is cooperating with to provide firewall traversal xConfiguration Zones TraversalZone 1 50 Name name Sets the name of the TANDBERG Gatekeeper which is allowed to connect to this Border Control...

Страница 63: ...be marked as inactive xConfiguration Zones Zone 1 100 Match 1 5 Mode AlwaysMatch PatternMatch Disabled The zone match mode determines when an LRQ will be sent to gatekeepers in the zone If the mode is...

Страница 64: ...t xCommand Boot Reboots the Border Controller This takes approximately 2 minutes to complete 11 3 4 CheckBandwidth xCommand CheckBandwidth node1 node2 bandwidth calltype Diagnostic function for verify...

Страница 65: ...speed The default IP address is 192 168 0 100 COM port baud rate speed data bits parity stop bits SNMP community name and host address system name password option key release key Note that DefaltValu...

Страница 66: ...istory Registrations The following would be a typical use Back slashes are used to indicate continuation lines xCommand FeedbackRegister ID 1 URL http 10 1 1 1 SystemManagementService asmx Expression...

Страница 67: ...ed pipe 11 3 21 RemoveRegistration xCommand RemoveRegistration regid Removes the specified registration 11 3 22 SubZoneAdd xCommand SubZoneAdd name address prefixlength totalmode total percallmode per...

Страница 68: ...aversalZoneDelete xCommand TraversalZoneDelete index Removes the traversal zone with the specified index 11 3 26 ZoneAdd xCommand ZoneAdd name address Adds a new zone with the specified name and IP ad...

Страница 69: ...Feedback Expression describes an interesting event or change in status When a Feedback Expression is registered a notification will be displayed in the shell for each occurrence of the event described...

Страница 70: ...of the ResourceUsage fields changes ResourceUsage fields consist of Registrations MaxRegistrations PortRegistrations MaxPortRegistrations TraversalCalls MaxTraversalCalls TotalTraversalCalls 11 6 Othe...

Страница 71: ...ftware has been installed with 11 6 5 Syslog syslog level ipaddr ipaddr Enables tracing to the console level Specifies the detail at which to trace 0 3 3 gives most logging ipaddr Specify up to 10 IP...

Страница 72: ...Linux systems Configuration is based around two sets of text files named conf which describes which zones are represented by the server and a selection of zone files which describe the detail of each...

Страница 73: ...TANDBERG Border Controller User Manual as expected nslookup querytype srv h323ls udp example com and check the output 66...

Страница 74: ...if format from the web interface on the Border Controller To do this navigate to the Border Controller Configuration Files page and click on the links for the schemas Copy the downloaded schemas to th...

Страница 75: ...sociated for use with it stored locally When viewing the certificate you should see a message saying You have a private key that corresponds to this certificate Have a private key that does not have s...

Страница 76: ...d conf to add the new schemas You will need to add the following lines include etc openldap schemas commobject ldif include etc openldap schemas h323identity ldif include etc openldap schemas h235iden...

Страница 77: ...the Border Controller to verify the server s identity Once the certificate has been created you will need to install the following three files associated with the certificate onto the LDAP server The...

Страница 78: ...nt The test reports and certificates issued for the product show that the TANDBERG Border Controller Type number TTC2 02 complies with the following standards EMC Emission Radiated Electromagnetic Int...

Страница 79: ...rt 2 x COM ports front and rear RS 323 DB 9 connector 2 x USB disabled ITU standards ITU T H 323 version 4 including Annex O ITU T H 460 18 H 460 19 ITU T H 235 ITU T H 350 Security Features IP Admini...

Страница 80: ...ler User Manual Physical Dimensions Height 4 35 cm 1 72 inches Width 42 6 cm 16 8 inches Depth 22 86 cm 9 inches 1U rack mounted chassis Power supply 90 264V full range 47 63 Hz Certification LVD 73 2...

Страница 81: ...other H 245 based multimedia terminals 2 ITU Specification H 350 Directory services architecture for multimedia conferencing 3 http www ietf org rfc rfc2782 txt 4 http www ietf org rfc rfc3164 txt 5 h...

Страница 82: ...rollers to determine the location of an endpoint PortRegistration A measure of the number of systems and aliases registered with the Border Controller Each endpoint may register one alias of each type...

Страница 83: ...ecord 23 65 down speed 16 48 E 164 9 11 75 ethernet 47 event log 34 39 remote 39 verbosity 34 eventlog 63 Expressway 1 external manager 44 47 feedback 44 62 63 firewall 13 16 75 gatekeeper discovery 6...

Страница 84: ...e to live 49 release key 40 RestrictionPolicy 49 RFC 2782 23 RFC 3164 39 scp 52 upgrade using 41 42 serial cable 4 5 serial interface 7 serial port 2 5 7 SNMP 52 ssh 5 7 52 54 subzone 14 15 17 52 54 d...

Отзывы: