9
D14049.05
February 2009
Grey Headline
(continued)
Tools .................................................................................. 165
Check pattern ............................................................... 165
Locate .......................................................................... 165
Port usage .................................................................... 166
Overview ................................................................ 166
Local VCS inbound ports ......................................... 166
Local VCS outbound ports ....................................... 166
Remote listening ports ............................................ 166
Restarting and shutting down .............................................. 167
Restarting .................................................................... 167
Restarting using the web interface .......................... 167
Restarting using the CLI .......................................... 167
Shutting down .............................................................. 167
Shutting down using the web interface ..................... 167
Shutting down using the CLI .................................... 167
Restoring default configuration
............................................ 168
Overview ...................................................................... 168
DefaultValuesSet level 3 ............................................... 168
Password encryption ............................................................171
Overview .......................................................................171
Web interface ..........................................................171
Command line interface (CLI) ...................................171
Maximum length of passwords .......................................171
Appendices
CPL reference ......................................................................173
Overview of CPL on the VCS ...........................................173
address-switch ..............................................................173
Overview .................................................................173
address ..................................................................173
field
......................................................................... 174
subfield
...................................................................175
otherwise ......................................................................175
not-present ....................................................................175
location .........................................................................176
rule-switch .....................................................................176
proxy ............................................................................176
reject ...........................................................................176
Unsupported CPL elements ............................................176
CPL examples ................................................................177
Call screening of authenticated users .......................177
Call screening based on alias ...................................177
Call screening based on domain ...............................178
Change of domain name...........................................178
Allow calls from locally registered endpoints only ......179
Block calls from Default Zone and Default Subzone ...179
Restricting access to a local gateway ....................... 180
Using the address-switch node .......................... 180
Using the rule-switch node ................................ 180
Redirecting failed calls based on status code........... 181
Regular expression reference .............................................. 182
Overview ...................................................................... 182
Common regular expressions ........................................ 182
Pattern variable reference ................................................... 183
Overview ...................................................................... 183
Valid variable strings ..................................................... 183
VCS port reference ............................................................. 184
Overview ...................................................................... 184
VCS ports ..................................................................... 184
DNS configuration
............................................................... 187
Overview ...................................................................... 187
Verifying the SRV record .......................................... 187
Microsoft DNS server .................................................... 187
BIND 8 & 9 .................................................................. 187
LDAP configuration
.............................................................. 188
About the LDAP databases ............................................ 188
Downloading the H.350 schemas .................................. 188
Microsoft Active Directory ............................................ 188
Prerequisites ......................................................... 188
Installing the H.350 schemas .................................. 188
Adding H.350 objects ............................................ 189
Create the organizational hierarchy ................... 189
Add the H.350 objects ..................................... 189
Securing with TLS .................................................. 189
OpenLDAP .................................................................... 190
Prerequisites ......................................................... 190
Installing the H.350 schemas ................................. 190
Adding H.350 objects ............................................ 191
Create the organizational hierarchy ................... 191
Add the H.350 objects ..................................... 191
Securing with TLS .................................................. 191
Command reference - xConfiguration
................................... 192
Command reference - xCommand ........................................ 228
Command reference - xStatus ............................................. 242
Bibliography ....................................................................... 260
Glossary............................................................................. 261
Contact information ............................................................ 266
TANDBERG
VIDEO COMMUNICATIONS SERVER
ADMINISTRATOR GUIDE
Introduction
Getting started
Overview and
status
System
configuration
VCS
configuration
Zones and
neighbors
Call
processing
Bandwidth
control
Firewall
traversal
Appendices
Applications
Maintenance
What’s in this manual?