VIDEO
COMMUNICATION
SERVER
ADMINISTRATOR
GUIDE
Software version X1.0
D14049.01
July 2007
D14049.01
07.2007
Download from Www.Soanuals.coꢀm. All Manuals Search And Download.
TANDBERG VIDEO COMMUNICATION SERVER
ADMINISTRATOR GUIDE
Table of Contents
D14049.01
07.2007
Download from Www.Soanuals.co3m. All Manuals Search And Download.
TANDBERG VIDEO COMMUNICATION SERVER
ADMINISTRATOR GUIDE
Table of Contents
D14049.01
07.2007
Download from Www.Soanuals.co4m. All Manuals Search And Download.
TANDBERG VIDEO COMMUNICATION SERVER
ADMINISTRATOR GUIDE
Table of Contents
D14049.01
07.2007
Download from Www.Soanuals.co5m. All Manuals Search And Download.
TANDBERG VIDEO COMMUNICATION SERVER
ADMINISTRATOR GUIDE
Table of Contents
D14049.01
07.2007
Download from Www.Soanuals.co6m. All Manuals Search And Download.
TANDBERG VIDEO COMMUNICATION SERVER
ADMINISTRATOR GUIDE
Trademarks and Copyright
All rights reserved. This document contains information that
is proprietary to TANDBERG. No part of this publication may
be reproduced, stored in a retrieval system, or transmitted,
in any form, or by any means, electronically, mechanically,
by photocopying, or otherwise, without the prior written
permission of TANDBERG. Nationally and internationally
recognized trademarks and trade names are the property of
their respective holders and are hereby acknowledged.
COPYRIGHT © 2007, TANDBERG
Philip Pedersens vei 22
1366 Lysaker, Norway
Tel:
+47 67125 125
Fax: +47 67125 234
e-mail: [email protected]
D14049.01
07.2007
Download from Www.Soanuals.co7m. All Manuals Search And Download.
TANDBERG VIDEO COMMUNICATION SERVER
ADMINISTRATOR GUIDE
Disclaimer, Copyrights and License Agreements
Disclaimer
Copyright Notice
Patent Information
Tandberg software in this product is protected under the
copyright and patent laws.
The information in this document is furnished for informational
purposes only, is subject to change without prior notice, and
should not be construed as a commitment by TANDBERG.
TANDBERG technology described in this manual is protected by
one or more of the following:
Copyright © 2007 Tandberg Telecom AS. All rights reserved.
Patents pending in the U.S.
U.S. Patent Nos.
• 5,600,646
• 5,768,263
• 5,838,664
• 5,991,277
• 6,584,077
• 6,590,603
• 7,010,119
• 7,034,860
TANDBERG reserves the right to amend any of the information
given in this document in order to take account of new
developments.
This product includes copyrighted software licensed from
others. A list of the copyright notices and the terms and
conditions of use can be found at:
Every effort has been made to supply complete and accurate
information, however, TANDBERG assumes no responsibility or
liability for any errors or inaccuracies that may appear in this
document, nor for any infringements of patents or other rights
of third parties resulting from its use. No license is granted
under any patents or patent rights of TANDBERG.
and
U.S. Patent Application Nos.
• 10/332.785
• 10/432.468
• 11/008.150
IMPORTANT: USE OF THIS PRODUCT IS SUBJECT IN ALL CASES
TO THE COPYRIGHT RIGHTS AND THE TERMS AND CONDITIONS
OF USE REFERRED TO ABOVE. USE OF THIS PRODUCT
CONSTITUTES AGREEMENT TO SUCH TERMS AND CONDITIONS.
Other patents pending.
D14049.01
07.2007
Download from Www.Soanuals.co8m. All Manuals Search And Download.
TANDBERG VIDEO COMMUNICATION SERVER
ADMINISTRATOR GUIDE
Safety Instructions and Approvals
Safety Instructions
Approvals
For your protection please read these safety
instructions completely before you connect
the equipment to the power source. Carefully
observe all warnings, precautions and
instructions both on the apparatus and in these
operating instructions. Retain this manual for
future reference.
• If the provided plug does not fit into your
Electromagnetic Compatibility (EMC)
Lightning
Never use this apparatus, or connect/
disconnect communication cables or power
cables during lightning storms.
outlet, consult an electrician.
This is a Class A product. In a domestic
environment this product may cause radio
interference in which case the user may be
required to take adequate measures.
• Never install cables, or any peripherals,
without first unplugging the device from it's
power source.
Dust
Servicing
EC Declaration of Conformity
Manufacturer: TANDBERG Telecom AS
Do not operate the apparatus in areas with high
concentration of dust.
• Do not attempt to service the apparatus
yourself as opening or removing covers may
expose you to dangerous voltages or other
hazards, and will void the warranty. Refer all
servicing to qualified service personnel.
Water and Moisture
Product Name: TANDBERG Video
Communication Server
• Do not operate the apparatus under or near
water – for example near a bathtub, kitchen
sink, or laundry tub, in a wet basement,
near a swimming pool or in other areas with
high humidity.
Vibration
Type Number: TTC2-04
Do not operate the apparatus in areas with
vibration or place it on an unstable surface.
Description:
Network unit
• Unplug the apparatus from its power source
and refer servicing to qualified personnel
under the following conditions:
This product complies with Commission
Directives:
• Never install jacks for communication
cables in wet locations unless the jack is
specifically designed for wet locations.
Power Connection and Hazardous
Voltage
• The product may have hazardous voltage
inside. Never attempt to open this product,
or any peripherals connected to the product,
where this action requires a tool.
• LVD 73/23/EEC
• EMC 89/336/EEC
This product complies with harmonized
Standards:
• If the power cord or plug is damaged or
frayed.
• Do not touch the product with wet hands.
• If liquid has been spilled into the
apparatus.
Cleaning
• If objects have fallen into the apparatus.
• EN 60950-1 : 2001, A11
• EN 55022 : 1994, A1/A2
• EN 55024 : 1998, A1/A2
• EN 61000-3-2 : 2000
• EN 61000-3-3 : 1995, A1
Technical Construction File No.: X13526
Year which the CE mark was affixed: 2007
• This product should always be powered from
• Unplug the apparatus from communication
lines, mains power-outlet or any power
source before cleaning or polishing.
• If the apparatus has been exposed to rain
an earthed power outlet.
or moisture
• Never connect attached power supply cord
• If the apparatus has been subjected to
to other products.
• Do not use liquid cleaners or aerosol
cleaners. Use a lint-free cloth lightly
moistened with water for cleaning the
exterior of the apparatus.
excessive shock by being dropped.
• In case any parts of the product has visual
damage never attempt to connect mains
power, or any other power source, before
consulting service personnel
• If the cabinet has been damaged.
• If the apparatus seems to be overheated.
• If the apparatus emits smoke or
For an official, signed version of this
document, or details regarding documentation
from the technical construction file, please
contact TANDBERG.
abnormal odor.
Ventilation
• The plug connecting the power cord to the
product/power supply serves as the main
disconnect device for this equipment.
The power cord must always be easily
accessible.
• If the apparatus fails to operate
in accordance with the operating
instructions.
• Do not block any of the ventilation openings
of the apparatus. Never cover the slots and
openings with a cloth or other material.
Never install the apparatus near heat
sources such as radiators, heat registers,
stoves, or other apparatus (including
amplifiers) that produce heat.
JATE Approval (Japan only)
This unit must be connected to the public
internet via a router/switch that has JATE
approval.
• Route the power cord so as to avoid it being
walked on or pinched by items placed upon
or against it. Pay particular attention to the
plugs, receptacles and the point where the
cord exits from the apparatus.
Accessories
Use only accessories specified by the
manufacturer, or sold with the apparatus.
• Do not place the product in direct sunlight or
close to a surface directly heated by the sun.
• Do not tug the power cord.
D14049.01
07.2007
Download from Www.Soanuals.co9m. All Manuals Search And Download.
TANDBERG VIDEO COMMUNICATION SERVER
ADMINISTRATOR GUIDE
Environmental Issues
Thank you for buying a product which contributes to a reduction
in pollution, and thereby helps save the environment. Our
products reduce the need for travel and transport and thereby
reduce pollution. Our products have either none or few
consumable parts (chemicals, toner, gas, paper). Our products
are low energy consuming products.
European Environmental Directives
Information for Recyclers
As a manufacturer of electrical and electronic equipment
TANDBERG is responsible for compliance with the requirements
in the European Directives 2002/96/EC (WEEE) and 2002/95/EC
(RoHS).
As part of compliance with the European WEEE Directive,
TANDBERG provides recycling information on request for all
types of new equipment put on the market in Europe after
August 13th 2005.
The primary aim of the WEEE Directive and RoHS Directive is
to reduce the impact of disposal of electrical and electronic
equipment at end-of-life. The WEEE Directive aims to reduce
the amount of WEEE sent for disposal to landfill or incineration
by requiring producers to arrange for collection and recycling.
The RoHS Directive bans the use of certain heavy metals and
brominated flame retardants to reduce the environmental impact
of WEEE which is landfilled or incinerated.
Please contact TANDBERG and provide the following details
for the product for which you would like to receive recycling
information:
TANDBERG’s Environmental Policy
Environmental stewardship is important to TANDBERG’s culture.
As a global company with strong corporate values, TANDBERG
is committed to following international environmental legislation
and designing technologies that help companies, individuals and
communities creatively address environmental challenges.
• Model number of TANDBERG product
• Your company’s name
• Contact name
• Address
• Telephone number
• E-mail.
TANDBERG has implemented necessary process changes to
comply with the European RoHS Directive (2002/95/EC) and the
European WEEE Directive (2002/96/EC).
TANDBERG’s environmental objectives are to:
• Develop products that reduce energy consumption, CO2
emissions, and traffic congestion
Digital User Guides
• Provide products and services that improve quality of life for
TANDBERG is pleased to announce that we have replaced the
printed versions of our User Guides with a digital CD version.
Instead of a range of different user manuals, there is now one
CD – which can be used with all TANDBERG products – in a
variety of languages. The environmental benefits of this are
significant. The CDs are recyclable and the savings on paper
are huge. A simple web-based search feature helps you directly
access the information you need. In addition, the TANDBERG
video systems now have an intuitive on-page help function,
which provides a range of useful features and tips. The contents
of the CD can still be printed locally, whenever needed.
our customers
Waste Handling
• Produce products that can be recycled or disposed of safely
at the end of product life
• Comply with all relevant environmental legislation.
In order to avoid the dissemination of hazardous substances
in our environment and to diminish the pressure on natural
resources, we encourage you to use the appropriate take-back
systems in your area. Those systems will reuse or recycle most
of the materials of your end of life equipment in a sound way.
TANDBERG products put on the market after August
2005 are marked with a crossed-out wheelie bin
symbol that invites you to use those take-back
systems.
Please contact your local supplier, the regional waste
need more information on the collection and recycling system in
your area.
D14049.01
07.2007
Download from Www.Soanuals.c
ꢀ
om. All Manuals Search And Download.
0
TANDBERG VIDEO COMMUNICATION SERVER
ADMINISTRATOR GUIDE
Environmental Issues
D14049.01
07.2007
Download from Www.Soanuals.c
ꢀ
om. All Manuals Search And Download.
ꢀ
TANDBERG VIDEO COMMUNICATION SERVER
ADMINISTRATOR GUIDE
Introduction
About the TANDBERG Video Communication Server
About this Administrator Guide
The TANDBERG Video Communication Server (VCS) is a key component of your video communications network. It allows you to
manage endpoint registrations and calls, and control the bandwidth being used within your network. The VCS also offers advanced
call policy that allows you to accept, reject and re-route calls, and can optionally include TANDBERG’s FindMe™, which allows users to
have a single alias on which they can be contacted regardless of location,
This Administrator Guide is provided to help you make the best
use of your TANDBERG VCS.
Your approach to this documentation depends on what you
want to do and how much you already know.
The VCS forms part of TANDBERG’s Expressway™ firewall traversal solution, allowing you to securely connect to other video networks
and equipment from your secured private network.
The Administrator Guide has been divided into several
sections, each providing different information. In some places
information is duplicated between sections to let you have all
the relevant information in one place.
The VCS also acts as a gateway between SIP and H.323 protocols, and between IPv4 and IPv6, allowing you to make the most use of
your existing video communications investment.
This document does not have an index - this is intentional. If
the Table of Contents does not direct you to the information you
need, you can use the Find function in Adobe Reader to search
the text for keywords.
Note that the Administrator Guide describes a fully equipped
version. Your version may not have all the described extensions
installed.
Main Product Features
Our main objective with this Guide is to address your goals and
needs. Please let us know how well we succeeded!
• Supports up to 5 Alternate VCSs for redundancy purposes
• Optional endpoint authentication
• Control over which endpoints are allowed to register
• Administrator Policy including support for CPL
Standard Features
• H.323 gatekeeper
• SIP Proxy/Registrar
In this Administrator Guide, instructions for performing a
task via the web interface are shown in the format:
• SIP and H.323 support, including SIP/H.323 gatewaying for
• Menu option1 > Menu option2
followed by the Name of the page that you will be taken to. In
most cases the page will be shown adjacent, with callouts
describing each of the configurable options.
locally registered endpoints
• Embedded setup wizard via a serial port for initial
configuration
• IPv4 and IPv6 support, including IPv4/IPv6 gatewaying
• Bandwidth management on both a per-call and a total usage
basis, configurable separately for calls within the local
subzones and to neighboring systems and zones
• System administration via a web interface or RS-232, Telnet,
SSH, and HTTPS
• Can be managed with TANDBERG Management Suite 11.8 or
In this Administrator Guide, instructions for performing a
task using the command line interface are shown in the
format:
newer
• Automatic downspeeding option for calls that exceed the
available bandwidth
• URI and ENUM dialing via DNS, enabling global connectivity
• Up to 2500 registrations
• Up to 500 non-traversal calls
• Up to 100 traversal calls
• Up to 200 neighboring zones
Optional Features
• xConfiguration CommandName
• Firewall traversal server functionality, allowing secure
The command is hyperlinked to the Command Reference table
at the back of this Guide; clicking on the hyperlink will take you
to the appropriate section of the table showing all the available
sub-commands and parameters.
traversal of any firewall or NAT
• Registration of traversal-enabled endpoints
• STUN Discovery and STUN Relay services
• User Policy (TANDBERG FindMe™)
Typing the command into the CLI without any parameters will
return a full list of parameters available for that command.
• Flexible zone configuration with prefix, suffix and regex
support
• SIP/H.323 gatewaying for non-registered endpoints
Typing a ?after the command will return information about the
purpose of that command or group of commands.
• Can function as a stand-alone VCS or be neighbored with
other systems such as VCSs, Border Controllers, gatekeepers
and SIP proxies
D14049.01
07.2007
Download from Www.Soanuals.c
ꢀ
om. All Manuals Search And Download.
ꢁ
TANDBERG VIDEO COMMUNICATION SERVER
ADMINISTRATOR GUIDE
Getting Started
What’s in the Box?
Installation Site Preparations
General Installation Precautions
To avoid damage to the unit during transportation, the
TANDBERG VCS is delivered in a special shipping box, which
should contain the following components:
• Make sure that the VCS is accessible and that all cables can
• The socket outlet shall be installed near to the equipment
be easily connected.
and shall be easily accessible.
• For ventilation: leave a space of at least 10cm (4 inches)
behind the VCS’s rear panel and 10cm (4 inches) in front of
the front panel.
• Never install cables without first switching the power OFF.
• TANDBERG VCS
• CD containing VCS Administrator Guide and other
documentation
• The room in which you install the VCS should have an
ambient temperature between 0ºC and 35ºC (32ºF and
95ºF) and between 10% and 90% non-condensing relative
humidity.
• Installation Sheet
• Registration card
• Rack-ears and screws
• Cables:
• Do not place heavy objects directly on top of the VCS.
• Do not place hot objects directly on top, or directly beneath
• power cables
the VCS.
• ethernet cable
• Use a grounded AC power outlet for the VCS.
• shielded serial cable
Please report any discrepancies to your TANDBERG
representative immediately.
A brief yet detailed description of the procedure to get
you up and going can be found in the Installation
Sheet accompanying your TANDBERG product.
Connecting the Cables
Power switch
Ethernet cable.
Shielded serial cable
wer cable
o use the VCS over IP,
onnect the ethernet cable
To control the VCS using a
direct connection to a PC,
connect the serial cable
between the VCS’s DATA port
and the COM port on a PC.
nnect the system power
ble to an electrical
tribution socket.
rom the LAN1 port on the
CS to your network. The
AN2, 3 and 4 connectors
are not used and should be
left open.
Sower button
D14049.01
07.2007
Download from Www.Soanuals.c
ꢀ
om. All Manuals Search And Download.
3
TANDBERG VIDEO COMMUNICATION SERVER
ADMINISTRATOR GUIDE
Getting Started
Powering on the VCS
Initial Configuration via Serial Cable
To start the VCS:
The VCS requires some initial configuration
before it can be used. This must be done
using a PC connected to the DATA port or by
connecting to the system’s default IP address:
192.168.0.100.
Type yand press Enter.
Once it has rebooted, the VCS is ready to use.
You can continue to use the serial connection,
or you can connect to the system remotely over
IP using either or both:
ꢀ. Ensure the power cable is connected.
6. Follow the prompts given by the install
wizard to specify the following:
ꢁ. Ensure the LAN cable is connected to the
LAN1 port.
a. The password you want to use for your
system. See Administrator Account
Password for details.
We recommend that you now configure the
following:
3. Turn on the power switch on the back right
The IP address, subnet mask and default
gateway must be configured before use.
Consult your network administrator for
information on which addresses to use. Note
that the VCS must use a static IP address.
of the unit (adjacent to the power cable).
b. Whether you wish to use IPv4 or IPv6.
4. Press the soft power button on the back
left of the unit.
c. The IP address of the system.
d. The IP subnet mask of the system.
e. The IP default gateway of the system.
• The system name of the VCS. This is used
by the TANDBERG Management Suite (TMS)
System Name for more information.
The system will start up and the lights on the
front of the unit will flash.
To set the initial configuration via a PC
connected to the DATA port:
5. Wait until:
ꢀ. Connect the supplied serial cable from the
DATA port on the VCS to the COM port on
a PC.
• the green PWR LED on the front of the
• Automatic discovery. If you have multiple
VCSs in the same network you may want
to disable automatic discovery on some
information.
unit is a steady green color
g. Whether you want to use SSH to
• the red ALM LED on the front of the unit
administer the system.
ꢁ. Start a terminal emulator program on the
PC and configure it to use the DATA port as
follows:
has gone out.
h. Whether you want to use Telnet to
• the IP address is showing in the display
administer the system.
panel on the front of the unit.
• The DNS server address (if URI dialing
or FQDNs are to be used). See DNS
configuration for more information.
8. Once the wizard is finished you will be
• baud rate 115200
• data bits: 8
• parity: none
Once this has happened, the system is ready
to configure.
prompted to log in again.
Login with the username admin and your
new password.
• stop bits: 1
• flow control: none.
3. Power on the unit (if it is not already on).
9. You will again get the install wizard prompt;
this time select n and press Enter in order
to skip the wizard.
A welcome message similar to the following
will appear:
The terminal emulator program will display
start up information.
Welcome to
After approximately 2 minutes you will get
the login prompt (if the unit is already on,
press Enter to get the login prompt):
TANDBERG Video Communication
Server Release X1.0
SW Release Date: 2007-07-20
OK
tandberg login:
4. Enter the username admin and press Enter.
You will get the password prompt:
Password:
ꢀ0. You must now reboot the system in order
for the new settings take effect. To do this,
type the command:
5. Enter the default password of TANDBERG
xCommand boot
and press Enter.
You will get the install wizard prompt:
Run install wizard [n]:
D14049.01
07.2007
Download from Www.Soanuals.c
ꢀ
om. All Manuals Search And Download.
4
TANDBERG VIDEO COMMUNICATION SERVER
ADMINISTRATOR GUIDE
Getting Started
System Administrator Access
Administrator Account Password
About Administrator Access
Session Timeout
While it is possible to administer the TANDBERG VCS via a PC
connected directly to the unit via a serial cable, you may wish to
access the system remotely over IP.
All administration requires you to log in to the administration
account with the username admin (all lower case) and a
password.
By default, Administrator sessions do not time out – they
remain active until you logout.
However, you can set the system to timeout an Administrator
session after a set number of minutes of inactivity. The timeout
period will apply to Administrator sessions using both the Web
Interface and the Command Line Interface.
You can do this using either or both:
By default, access via HTTPS and SSH is enabled; access via
Telnet is disabled.
Both the username and password are case-sensitive.
Default Administrator Password
The default password is TANDBERG (all upper case). You
should change this as soon as possible. Choose a strong
password, particularly if administration over IP is enabled.
To set the timeout period:
• System Configuration > System.
You will be taken to the System Administration page.
In the Admin Access section, in the Session time out
(minutes) box, enter the number of minutes of inactivity after
which an administrator session should time out.
You can also enable access via HTTP. However, this mode
works by redirecting HTTP calls to the HTTPS port, so HTTPS
must also be enabled for access via HTTP to function.
Changing the Administrator Password
To change the administrator password:
Values must be between 0 and 10,000. A value of 0 means
that Administrator sessions will never time out.
• Maintenance > Passwords.
You will be taken to the Passwords page.
In the Administrator Password section, enter and then retype
the new password.
TMS accesses the VCS via the web server. If HTTPS
!
mode is turned off, TMS will not be able to access it.
To set an empty password type:
You must restart the system for changes to take effect.
Configuring Administrator Access
To configure the ways in which your system is accessed:
xConfiguration SystemUnit Password: “”
• System Configuration > System.
Resetting the Administrator Password
If you forget your password, it is possible to set a new password
using the following procedure:
Root Account
You will be taken to the System Administration page.
In the Admin Access section, select Off or On from the drop-
down boxes for each service.
The VCS provides a root account with the same password as
the Admin account. This account should not be used in normal
operation, and in particular system configuration should not be
conducted using this account. Use the admin account instead.
ꢀ. Reboot the VCS.
ꢁ. Connect to the VCS using the serial cable.
3. Login with the username pwrec. No password is required.
You will be prompted for a new password.
You must restart the system for changes to take effect.
The pwrec account is only active for one minute
following a restart. Beyond that time you will have to
restart the system again to change the password.
Security Considerations
To securely manage the VCS you should disable Telnet, using
the encrypted HTTPS and SSH protocols instead.
Because access to the serial port allows the password
to be reset, it is recommended that you install the VCS
in a physically secure environment.
For further security, disable HTTPS and SSH as well and use
the serial port to manage the system.
!
D14049.01
07.2007
Download from Www.Soanuals.c
ꢀ
om. All Manuals Search And Download.
5
TANDBERG VIDEO COMMUNICATION SERVER
ADMINISTRATOR GUIDE
Getting Started
System Administrator Access
Using the Web Interface
To use the web interface:
Information
This icon appears to the
right of most input fields in
the web interface.
ꢀ. Open a browser window and in the address line type either:
• the IP address of the system
• the FQDN of the system.
Clicking on this icon will
activate a pop-up box which
gives you information about
that particular field.
ꢁ. Select Administrator Login.
3. Enter the Username admin and your system password and
select Login.
You will be presented with the Overview page.
View manual
This icon appears on the top
right corner of every screen.
Clicking on this icon will
take you directly to the
latest version of the VCS
Administrator Guide on the
TANDBERG website.
Supported Browsers
The VCS web interface is designed for use with Internet
Explorer (6 and up) or Firefox (1.5 and up). It may work with
Opera and Safari, but you may encounter unexpected behavior.
Javascript must be enabled to use the VCS web interface.
Log out
This icon appears on the top
right corner of every page.
Clicking on this icon will end
your Administrator session.
You will be taken to the
In this Administrator Guide, instructions for performing a
task via the web interface are shown in the format:
• Menu option1 > Menu option2
Administrator Login page.
followed by the Name of the page that you will be taken to
in order to perform the task. In most cases the page will
be shown adjacent with callouts describing each of the
configurable options.
D14049.01
07.2007
Download from Www.Soanuals.c
ꢀ
om. All Manuals Search And Download.
6
TANDBERG VIDEO COMMUNICATION SERVER
ADMINISTRATOR GUIDE
Getting Started
System Administrator Access
Using the Command Line Interface (CLI)
The command line interface is available over SSH, Telnet and
through the serial port.
To use the command line interface:
ꢀ. Start a SSH or Telnet session.
ꢁ. Enter the IP address or FQDN of the VCS.
3. Login with a username of admin and your system password.
Commands are divided into different groups according to their
function:
xStatus
These commands return information
about the current status of the system.
Information such as current calls and
registrations is available through this
command group.
xConfiguration
These commands allow you to add and
edit single items of data such as IP
address and zones.
xCommand
xHistory
xFeedback
These commands allow you to add and
configure items and obtain information.
These commands provide historical
information about calls and registrations.
These commands provide information
about events as they happen, such as
calls and registrations.
commands available on the VCS.
In this Administrator Guide, instructions for performing a
task using the command line interface are shown in the
format:
• xConfiguration CommandName
Typing the given command into the CLI will return a full list of
options and parameters available for that command.
Typing a ?after the command will return information about the
purpose of that command or group of commands.
D14049.01
07.2007
Download from Www.Soanuals.c
ꢀ
om. All Manuals Search And Download.
7
TANDBERG VIDEO COMMUNICATION SERVER
ADMINISTRATOR GUIDE
ViewingSystem Overview
Viewing the Overview Page
Understanding the Overview Page
The Overview page summarizes the current
configuration and status of your system.
Traversal calls
Current: The number of traversal calls going
through the VCS at this moment.
The Overview page opens automatically when
you first log on to the web interface.
Max (peak): The highest number of
concurrent traversal calls handled by the VCS
since it was last restarted.
You can also access it at any time by clicking
on the Overview link at the top left of the
page.
Total: The total number of traversal calls
handled by the VCS since it was last
restarted.
System name
This shows the name that has been assigned
to the VCS.
Non-traversal calls
Current: The number of non-traversal calls
going through the VCS at this moment.
Software version
Max (peak): The highest number of concurrent
non-traversal calls handled by the VCS since it
was last restarted.
This shows the version of software that is
currently installed on the VCS.
Total: The total number of non-traversal
calls handled by the VCS since it was last
restarted.
IPv4 address
This shows the VCS’s IPv4 address.
Registrations
Current: The number of endpoints registered
to the VCS at this moment.
IPv6 address
This shows the VCS’s IPv6 address.
Max (peak): The highest number of endpoints
concurrently registered to the VCS since it
was last restarted.
Total: The total number of registrations on the
VCS since it was last restarted.
Options
This shows all the additional options that are
currently installed on the VCS.
D14049.01
07.2007
Download from Www.Soanuals.c
ꢀ
om. All Manuals Search And Download.
8
TANDBERG VIDEO COMMUNICATION SERVER
System Configuration
ADMINISTRATOR GUIDE
System Administration Configuration
System name
Configuring System Settings
Defines the name of the VCS. Choose a name
that uniquely identifies the system.
To configure the VCS’s system administration
settings:
• System Configuration > System.
You will be taken to the System
Administration page.
Session time out (minutes)
Sets the number of minutes that an
administration session (HTTPS, Telnet or SSH)
may be inactive before the session is timed
out. A value of 0 turns session time outs off.
About the System Name
The system name is used to identify the VCS,
for example in TMS.
Telnet service
Determines whether the VCS can be accessed
via Telnet.
It appears in various places in the web
interface, and in the display on the front panel
of the unit, so that you can identify it when it
is in a rack with other boxes. If no name is
specified, these fields/display will be blank.
SSH service
Determines whether the VCS can be accessed
via SSH and SCP.
We recommend that you give the VCS a name
that allows you to easily and uniquely identify
it.
HTTP service
Determines whether HTTP calls will be
redirected to the HTTPS port.
About Admin Access settings
While it is possible to administer the
TANDBERG VCS via a PC connected directly
to the unit via a serial cable, you may wish to
access the system remotely over IP.
HTTPS service
Determines whether the VCS can be accessed
via the web server. This must be On to enable
both web interface and TMS access.
You can do this using either or both:
Save
Restart
By default, access via HTTPS and SSH
is enabled; access via Telnet is
disabled. To securely manage the VCS
Telnet.
!
Click here to save your changes.
Click here to restart the system.
By default, access via HTTPS and SSH is
enabled; access via Telnet is disabled.
you should disable Telnet, using the encrypted
HTTPS and SSH protocols instead. For further
security, disable HTTPS and SSH as well and
use the serial port to manage the system.
You can also enable access via HTTP.
You must save your changes and
restart the system for changes to take
effect.
TMS accesses the VCS via the web
server. If HTTPS mode is turned off,
TMS will not be able to access it.
However, this mode works by redirecting HTTP
calls to the HTTPS port, so HTTPS must also
be enabled for access via HTTP to function.
D14049.01
07.2007
Download from Www.Soanuals.c
ꢀ
om. All Manuals Search And Download.
9
TANDBERG VIDEO COMMUNICATION SERVER
System Configuration
ADMINISTRATOR GUIDE
Ethernet Configuration
Ethernet speed
Configuring Ethernet Settings
Sets the speed of the connection between the
VCS and the ethernet switch.
To configure the VCS’s Ethernet settings:
• System Configuration >Ethernet.
You will be taken to the Ethernet page.
About Ethernet Speed
The Ethernet speed setting determines the
speed of the connection between the VCS
and the ethernet switch. It must be set to the
same value on both systems.
The default is Auto. We recommend that you
do not change the default value unless the
switch to which you are connecting is unable
to auto-negotiate.
You must save your changes and
restart the system for changes to take
effect.
Restart
Click here to restart the system.
Save
Click here to save your changes.
D14049.01
07.2007
Download from Www.Soanuals.c
ꢁ
om. All Manuals Search And Download.
0
TANDBERG VIDEO COMMUNICATION SERVER
System Configuration
ADMINISTRATOR GUIDE
IP Configuration
IP protocol
Configuring IP Settings
You can configure the VCS to use IPv4, IPv6 or
Both protocols. The default is Both.
To configure the VCS’s IP settings:
• System Configuration > IP.
You will be taken to the IP page.
IPv4: The VCS will only accept registrations
from endpoints using an IPv4 address, and
will only take calls between two endpoints
communicating via IPv4. It will communicate
with other systems via IPv4 only.
IPv6: The VCS will only accept registrations
from endpoints using an IPv6 address, and
will only take calls between two endpoints
communicating via IPv6. It will communicate
with other systems via IPv6 only.
The VCS is shipped with a default
IP address of 192.168.0.100. This
allows you to connect the VCS to your
network and access it via the default address
so that you can configure it remotely.
Both: The VCS will accept registrations
from endpoints using either an IPv4 or IPv6
address, and will take calls using either
protocol. If a call is between an IPv4-only and
an IPv6-only endpoint, the VCS will act as an
IPv4 to IPv6 gateway. It can communicate with
other systems via either protocol.
About IPv4 to IPv6 Gatewaying
The VCS can act as a gateway between IPv4
and IPv6 calls.
To configure the VCS to act as a gateway
between the two protocols, select an
IP Protocol of Both.
IPv4 address
Specifies the IPv4 address of the system.
IPv4 subnet mask
Calls for which the VCS is acting as an
IPv4 to IPv6 gateway count as traversal
calls for the purposes of licensing.
Specifies the IPv4 subnet mask of the system.
IPv4 gateway
Specifies the IPv4 gateway of the system.
Some endpoints support both IPv4 and
IPv6, however an endpoint can use
only one protocol when registering with
the VCS. Which protocol it uses will be
determined by the format used to specify the
IP address of the VCS on the endpoint. Once
the endpoint has registered using one
IPv6 address
Specifies the IPv6 address of the system.
Save
Restart
IPv6 gateway
You must save your changes and
restart the system for changes to take
effect.
protocol, calls to it from an endpoint using the
other protocol will be gatewayed by the VCS.
Click here to save your
changes.
Click here to restart the
system.
Specifies the IPv6 gateway
of the system.
D14049.01
07.2007
Download from Www.Soanuals.c
ꢁ
om. All Manuals Search And Download.
ꢀ
TANDBERG VIDEO COMMUNICATION SERVER
System Configuration
ADMINISTRATOR GUIDE
DNS Configuration
Address 1 to Address 5
Configuring DNS Settings
Sets the IP address of a DNS server to be
queried when resolving domain names.
To configure the VCS’s DNS settings:
• System Configuration > DNS.
You will be taken to the DNS page.
About DNS Servers
you must specify a DNS server to be queried
for address resolution. You can specify up to
5 DNS servers. Normally only the first DNS
server will be queried, but if it fails to respond,
all DNS servers will be queried.
Domain name
About the DNS Domain Name
Specifies the name to be appended to the
host name before a query to the DNS server
is executed.
The DNS Domain Name is used when
attempting to resolve server addresses
configured on the VCS that are not fully
qualified. It applies only to the following:
• LDAP server
• NTP server
• External Manager server.
The DNS Domain Name is appended to the
server address before a query to the DNS
server is executed. Note however that DNS
will also be queried for the server address as
configured, without the DNS Domain Name
appended. For this reason we recommend
that all server addresses use a FQDN.
Save
The DNS Domain name plays no part in URI
dialing.
Click here to save your changes.
D14049.01
07.2007
Download from Www.Soanuals.c
ꢁ
om. All Manuals Search And Download.
ꢁ
TANDBERG VIDEO COMMUNICATION SERVER
System Configuration
ADMINISTRATOR GUIDE
NTP Configuration
NTP server
Configuring NTP Settings
Sets the IP address or FQDN of the NTP server
to be used when synchronizing system time.
To configure the VCS’s NTP settings:
• System Configuration > NTP
You will be taken to the NTP page.
About the NTP Server
Accurate timestamps play an important part in
authentication, helping to guard against replay
attacks. For this reason, we recommend that
you use an NTP server to synchronize the
system time.
Time zone
Sets the local time zone of the VCS.
Setting the Time Zone
All events are recorded using the local date
and time as well as UTC time. The local time
is determined by the Time Zone set on the
VCS.
Save
Click here to save your changes.
D14049.01
07.2007
Download from Www.Soanuals.c
ꢁ
om. All Manuals Search And Download.
3
TANDBERG VIDEO COMMUNICATION SERVER
System Configuration
ADMINISTRATOR GUIDE
SNMP Configuration
Enabled
Configuring SNMP Settings
Select On to enable SNMP support.
To configure the VCS’s SNMP settings:
• System Configuration > SNMP
You will be taken to the SNMP page.
You must save your changes and
restart the system for any changes to
take effect.
SNMP community name
About SNMP Settings
The VCS offers basic support for SNMP.
Sets the VCS’s SNMP community name.
Tools such as TANDBERG Management Suite
(TMS) or HP OpenView may act as SNMP
network management systems (NMS). They
allow you to monitor your network devices,
including the VCS, for conditions that might
require administrative attention.
System contact
Specifies the name of the person who can be
contacted regarding issues with the VCS.
To allow the VCS to be monitored by a SNMP
NMS, you must enable SNMP on the VCS and
provide the name of the SNMP community
within which it resides. You may optionally
provide the name of a System contact and the
physical Location of the system for reference
by administrators when following up on
queries.
Location
Specifies the physical location of the VCS.
By default, SNMP is Enabled with a SNMP
community name of public.
Note: the VCS does not support SNMP traps,
therefore it cannot be managed via SNMP.
Restart
Click here to restart the system.
Save
Click here to save your changes.
D14049.01
07.2007
Download from Www.Soanuals.c
ꢁ
om. All Manuals Search And Download.
4
TANDBERG VIDEO COMMUNICATION SERVER
System Configuration
ADMINISTRATOR GUIDE
External Manager Configuration
Address
Configuring External Manager Settings
Sets the IP address or FQDN of the External
Manager.
To configure the VCS’s External Manager
settings:
• System Configuration > External Manager.
You will be taken to the External Manager
page.
About the External Manager
An External Manager is a remote system, such
as the TANDBERG Management Suite (TMS),
used to monitor events occurring on the VCS,
for example call attempts, connections and
disconnections.
Path
Sets the path of the External Manager.
The use of an External Manager is optional.
In order to use an External Manager, you must
configure the VCS with the IP address or host
name and path of the External Manager to be
used.
If you are using TMS as your external
manager, use the default path of
tms/public/ external/management/
SystemManagementService.asmx.
Save
Click here to save your changes.
D14049.01
07.2007
Download from Www.Soanuals.c
ꢁ
om. All Manuals Search And Download.
5
TANDBERG VIDEO COMMUNICATION SERVER
System Configuration
ADMINISTRATOR GUIDE
Backing up Configuration Settings
You are recommended to maintain a backup of your VCS configuration. To do this:
ꢀ. Use the command line interface to log on to the VCS.
ꢁ. Issue the command xConfiguration.
3. Save the resulting output to a file, using cut-and-paste or some other means provided by your
terminal emulator.
To restore your configuration:
ꢀ. Remove the *cfrom in front of each command.
ꢁ. Paste this information back in to the command line interface.
D14049.01
07.2007
Download from Www.Soanuals.c
ꢁ
om. All Manuals Search And Download.
6
TANDBERG VIDEO COMMUNICATION SERVER
ADMINISTRATOR GUIDE
Logging
Logging Overview
About Logging
About Event Log Levels
Setting the Event Log Level
The VCS provides a logging facility for
troubleshooting and auditing purposes. The
event log contains information about such
things as calls, registrations, and messages
sent and received.
All events have an associated level in the range 1-3, with level 1 events considered the most
important. The table below gives an overview of the levels assigned to different events.
You can control which events are logged by
the VCS by setting the log level. All events
with a level numerically equal to and lower
than the specified logging level are recorded
in the event log.
complete tables of the events logged at each level.
The VCS logging facility allows you to:
To set the log level:
Level
Level 1
(User)
Assigned Events
• specify the amount of information that is
• System Configuration > Logging.
High-level events such as registration requests and call attempts. Easily
human readable. For example:
logged by changing the event log level,
You will be taken to the Logging page.
• specify an external server to which a copy
• call attempt/connected/disconnected
of the log is written.
• registration attempt/accepted/rejected.
Logs of protocol messages sent and received (H.323, LDAP, etc.) excluding
noisy messages such as H.460.18 keepalives and H.245 video fast-
updates.
Level 2
(Protocol)
About Remote Logging
The event log is stored locally on the VCS.
However, it is often convenient to collect
copies of all event logs from various systems
in a single location. A computer running
a BSD-style syslog server, as defined in
server.
Level 3
(Protocol Verbose)
Protocol keepalives are suppressed at Level 2. At logging Level 3,
keepalives are also logged.
Remote syslog server
Enter the IP address or FQDN of the server to
which the log will be written.
A VCS will not act as a central logging
server for other systems.
Enabling Remote Logging
To enable remote logging, you must configure
the VCS with the address of the central log
server. To do this:
Log level
Select the level of logging you require.
The default is 1.
• System Configuration > Logging.
You will be taken to the Logging page.
Save
Events will be always logged locally
regardless of whether or not remote
logging has been enabled.
Click here to save your changes.
D14049.01
07.2007
Download from Www.Soanuals.c
ꢁ
om. All Manuals Search And Download.
7
TANDBERG VIDEO COMMUNICATION SERVER
ADMINISTRATOR GUIDE
Logging
Event Log
Search the last
Viewing the Event Log
Select the number of events you wish to view
or search.
To view the event log:
• Status > Event Log.
You will be taken to the Event Log page,
where you can search and view the Event
Log.
Lines for entries containing
• eventlog
If you wish to filter your search, enter the text
that you wish to search for here.
Display in order
Select whether you want the oldest or newest
items to appear at the top of the log.
Search Event Log
Click here once you have configured your
search options. The event log will be
displayed below the Information field.
Event Log Format
Message Details Field
The event log is displayed in an extension of the UNIX syslog format:
date time host_name facility_name <PID>: message_details
where:
For all messages logged from the tandbergprocess the field is structured to allow easy parsing.
It consists of a number of human-readable name=valuepairs, separated by a space.
The first field is always:
Field Example
Description
The event which caused the log message to be
generated.
Field
date
Description
Event=RegistrationRequest
Event
the local date on which the message was logged
the local time at which the message was logged
the name of the system generating the log message
the name of the program generating the log message. This will be
tandberg for all messages originating from TANDBERG processes, but
will differ for messages from third party processes which are used in the
VCS product
time
host_name
facility_name
and the last fields of the message are always:
Field Example
Description
The level of the event being logged.
The UTC date and time at which the event was
generated.
Level=1
Level
Time=2006/20/01-14:02:17
Time
message_details
information)
D14049.01
07.2007
Download from Www.Soanuals.c
ꢁ
om. All Manuals Search And Download.
8
TANDBERG VIDEO COMMUNICATION SERVER
ADMINISTRATOR GUIDE
Logging
Events Logged at Level ꢀ
Event
Description
Eventlog Cleared
Admin Session Start
Admin Session Finish
System Configuration Changed
An operator cleared the event log.
An administrator has logged onto the system.
An administrator has logged off the system.
An item of configuration on the system has changed.
The Detailevent parameter contains the name of the changed configuration item and its new value.
A policy file has been updated.
Policy Change
Registration Requested
Registration Accepted
Registration Rejected
A registration has been requested.
A registration request has been accepted.
A registration request has been rejected.
The Reasonevent parameter contains the H.225 cause code. Optionally, the Detailevent parameter may contain a textual representation of the
H.225 additional cause code.
Registration Removed
A registration has been removed by the VCS.
The Reasonevent parameter specifies the reason why the registration was removed. This is one of:
• Authentication change
• Conflicting zones
• Operator forced removal
• Operator forced removal (all registrations removed)
A request to refresh a registration has been rejected.
An unregistration request has been received.
An unregistration request has been rejected.
An attempt to answer a call has been made.
A call has been attempted.
Registration Refresh Rejected
Unregistration Requested
Unregistration Rejected
Call Answer Attempted
Call Attempted
Call Connected
A call has been connected.
Call Disconnected
A call has been disconnected.
Call Rejected
A call has been rejected.
The Reasonevent parameter contains a textual representation of the H.225 additional cause code.
The bandwidth of a call has changed.
Call Bandwidth Changed
External Server Communication
Failure
Communication with an external server failed unexpectedly. The event detail data should differentiate between ‘no response’ and ‘request rejected’.
Servers concerned are:
• DNS
• LDAP servers
• Neighbor Gatekeeper
• NTP servers
The operating system has started.
System Start
D14049.01
07.2007
Download from Www.Soanuals.c
ꢁ
om. All Manuals Search And Download.
9
TANDBERG VIDEO COMMUNICATION SERVER
ADMINISTRATOR GUIDE
Logging
Events Logged at Level ꢀ cont...
Event
Description
System Shutdown
The operating system was shutdown.
Application Start
The VCS has started.
Further detail may be provided in the event data Detailfield.
The VCS application is out of service due to an unexpected failure.
Licensing limits for a given feature have been reached.
Application Failed
License Limit Reached
The event detail field specifies the facility/limits concerned. Possible values for the detail field are:
• Non Traversal Call Limit Reached
• Traversal Call Limit Reached
A syntax error was encountered when decoding a SIP message.
Decode Error
TLS Negotiation Error
Transport Layer Security (TLS) connection failed to negotiate.
Events Logged at Level ꢁ
Event
Description
Message Received
(H.323) An incoming message has been received.
(H.323) An outgoing message has been sent.
A request to refresh a registration has been received.
A request to refresh a registration has been accepted.
A SIP request has been received.
Message Sent
Registration Refresh Request
Registration Refresh Accepted
Request Received
Request Sent
A SIP request has been sent.
Response Received
Response Sent
A SIP response has been received.
A SIP response has been sent.
Events Logged at Level 3
Event
Description
Message Received
(SIP) An incoming message has been received.
Message Sent
(SIP) An outgoing message has been sent.
D14049.01
07.2007
Download from Www.Soanuals.c
3
om. All Manuals Search And Download.
0
TANDBERG VIDEO COMMUNICATION SERVER
ADMINISTRATOR GUIDE
Logging
Event Data Fields
Field
Description
Protocol
Specifies which protocol was used for the communication.
Valid values are:
• TCP
• UDP
• TLS
Reason
Textual string containing any reason information associated with an event.
Service
Specifies which protocol was used for the communication.
A service entry is one of:
• H.323
• SIP
• H.225
• H.245
• NTP
• DNS
• LDAP
• Q.931
• Neighbor Gatekeeper
Message Type
ResponseCode
Src-ip
Specifies the type of the message.
SIP response code.
Specifies the source IP address (the IP address of the device attempting to establish communications).
The source IP is recorded in the dotted decimal format: (number).(number).(number).(number) or the IPv6 colon separated format.
Specifies the destination IP address (the IP address of the destination for a communication attempt).
Dst-ip
The destination IP is recorded in the same format as Src-ip.
Dst-port
Src-port
Src-Alias
Specifies the destination port: the IP port of the destination for a communication attempt.
Specifies the source port: the IP port of the device attempting to establish communications.
If present, the first H.323 Alias associated with the originator of the message
If present, the first E.164 Alias associated with the originator of the message
If present, the first H.323 Alias associated with the recipient of the message
Dst-Alias
If present, the first E.164 Alias associated with the recipient of the message
Whether call attempt has been authenticated successfully.
SIP method (INVITE, BYE, UPDATE, REGISTER, SUBSCRIBE, etc)
Contact: header from REGISTER
Auth
Method
Contact
AOR
Address of record
D14049.01
07.2007
Download from Www.Soanuals.c
3
om. All Manuals Search And Download.
ꢀ
TANDBERG VIDEO COMMUNICATION SERVER
ADMINISTRATOR GUIDE
Logging
Event Data Fields cont...
Field
Description
Call-Id
To
The Call-ID header field uniquely identifies a particular invitation or all registrations of a particular client.
(for REGISTER requests): the AOR for the REGISTER request.
RequestURI
NumBytes
Duration
Time
The SIP or SIPS URI indicating the user or service to which this request is being addressed.
The number of bytes sent/received in the message.
Request/granted registration expiry duration
A full UTC timestamp in YYYY/MM/DD-HH:MM:SS format. Using this format permits simple ASCII text sorting/ordering to naturally sort by time. This is included due to
the limitations of standard syslog timestamps.
Level
The level of the event as defined in section 16.3.1.
In addition to the events described above, a syslog.infoevent containing the string MARKwill be logged once an hour to provide confirmation that logging is still active.
D14049.01
07.2007
Download from Www.Soanuals.c
3
om. All Manuals Search And Download.
ꢁ
TANDBERG VIDEO COMMUNICATION SERVER
ADMINISTRATOR GUIDE
WorkingwithH.3ꢁ3
H.3ꢁ3 Overview
H.3ꢁ3 Endpoint Registration
Auto Discover
About H.3ꢁ3 on the VCS
Overview
The VCS supports the H.323 protocol: it is an H.323
gatekeeper, and will provide interworking between H.323 and
SIP calls. In order to support H.323, the H.323 mode must be
enabled.
H.323 endpoints in your network must register with the VCS in
order to use it as their gatekeeper.
The VCS has an Auto discover setting which determines
whether it will respond to the Gatekeeper Discovery Requests
sent out by endpoints.
There are two ways an H.323 endpoint can locate a VCS
with which to register: manually or automatically. The option
is configured on the endpoint itself under the Gatekeeper
Discovery setting (consult your endpoint manual for how to
access this setting).
To prevent H.323 endpoints being able to register automatically
with the VCS, set Auto Discover to Off. This will mean that
endpoints will be able to register with the VCS only if they have
been configured with the VCS’s IP address.
• If the mode is set to automatic, the endpoint will try to
register with any VCS it can find. It does this by sending out
a Gatekeeper Discovery Request, to which eligible VCSs will
respond.
• If the mode is set to manual, the you must specify the IP
address of the VCS with which you wish your endpoint to
register, and the endpoint will attempt to register with that
VCS only.
Using the VCS as an H.3ꢁ3 Gatekeeper
As an H.323 gatekeeper, the VCS accepts registrations from
H.323 endpoints and provides call control functions such as
address translation and admission control.
Time to Live
H.323 endpoints must periodically re-register with the VCS in
order to confirm that they are still functioning. The VCS allows
you to configure the interval between these re-registrations,
known as the Time to Live.
Registration Conflict Mode
An H.323 endpoint may attempt to register with the VCS using
an alias that has already been registered on the VCS from
another IP address. The reasons for this could include:
Some older endpoints do not support the ability to
periodically re-register with the system. In this case,
and in any other situation where the system has not had
a confirmation from the endpoint within the specified period, it
will send an IRQ to the endpoint to verify that it is still
functioning.
• two endpoints at different IP addresses are attempting to
register using the same alias
• a single endpoint has previously registered using a particular
alias. The IP address allocated to the endpoint then
changes, and the endpoint is attempting to re-register using
the same alias.
Configuring H.3ꢁ3 Ports
The VCS enables you to configure the listening port for H.323
registrations and call signaling, and the range of ports to be
used by H.323 calls once they are established.
Call Time to Live
Once the endpoint is in a call, the VCS will periodically poll it
to confirm whether it is still in the call. The VCS allows you to
configure the interval at which the endpoints are polled, known
as the Call Time to Live.
You can determine how the VCS will behave in this situation by
configuring the Registration Conflict Mode. The options are:
The default VCS configuration uses standard port numbers so
you can use H.323 services out of the box without having to
first set these up.
• Reject: denies the registration.
• Overwrite: deletes the original registration and replaces it
with the new registration.
The system will poll endpoints in a call regardless of
whether the call type is traversal or non-traversal.
D14049.01
07.2007
Download from Www.Soanuals.c
3
om. All Manuals Search And Download.
3
TANDBERG VIDEO COMMUNICATION SERVER
ADMINISTRATOR GUIDE
WorkingwithH.3ꢁ3
Configuring H.3ꢁ3
H.323 settings are configured via:
Registration conflict mode
• VCS Configuration > Protocols > H.323.
Determines how the system will behave if
an endpoint attempts to register an alias
currently registered from another IP address.
You will be taken to the H.323 page.
Reject: denies the registration.
Overwrite: deletes the original registration and
replaces it with the new registration.
H.323 Mode
Determines whether or not the VCS will
provide H.323 gatekeeper functionality.
Registration UDP port
Time to live
Specifies the port to be used for H.323 UDP
registrations.
Specifies the interval (in seconds) at which an
H.323 endpoint must re-register with the VCS
in order to confirm that it is still functioning.
Call signaling TCP port
Specifies the port that listens for H.323 call
signaling.
Call time to live
Call signaling port range start
Specifies the interval (in seconds) at which
the VCS polls the endpoints in a call to verify
that they are still in the call.
Specifies the lower port in the range to
be used by H.323 calls once they are
established.
Call signaling port range end
Specifies the upper port in the range to
be used by H.323 calls once they are
established.
Auto discover
Determines whether or not the VCS responds
to gatekeeper discovery requests from
endpoints.
Save
Click here to save your changes.
D14049.01
07.2007
Download from Www.Soanuals.c
3
om. All Manuals Search And Download.
4
TANDBERG VIDEO COMMUNICATION SERVER
ADMINISTRATOR GUIDE
WorkingwithSIP
SIP Overview
Using the VCS as a SIP Proxy Server
About SIP on the VCS
The VCS supports the SIP protocol: it is both a SIP Proxy and SIP Registrar, and will provide
interworking between SIP and H.323 calls. In order to support SIP, SIP mode must be enabled
and at least one of the SIP transport protocols must be active.
When in SIP mode, the VCS may act as a SIP Proxy Server. The role of a Proxy Server is to forward
requests (such as REGISTER and INVITE) from endpoints or other Proxy Servers. These requests
are forwarded on to other Proxy Servers or to the destination endpoint.
Whether or not the VCS acts as a SIP Proxy Server, and its exact behavior when proxying requests,
is determined by the SIP Registration Proxy Mode setting. This in turn depends on the presence
of Route Set information in the request header and whether or not the Proxy Server from which the
request was received is a Neighbor of the VCS.
Using the VCS as a SIP Registrar
In order for a SIP endpoint to be contactable via its registered alias, it must register its location
with a SIP Registrar. The VCS can act as a SIP Registrar for up to 20 domains.
A Route Set can specify the path that must be taken when requests are being proxied between
an endpoint and its Registrar. For example, when a REGISTER request is proxied by a VCS, the
VCS adds a Path header component to the request which signals that the VCS must be included
on any call to that endpoint. The information is usually required in situations where firewalls exist
and the media must follow a specified path in order to successfully traverse the firewall. For more
SIP aliases always take the form username@domain. To enable the VCS to act as a SIP Registrar,
you must configure it with the SIP Domain(s) for which it will be authoritative. It will then accept
registration requests for any endpoints attempting to register with an alias that includes that
domain.
If no Domains are configured, then the VCS will not act as a SIP Registrar.
When the VCS proxies a request that contains existing Route Set information, it will forward it
directly to the URI specified in the path. Any call policy configured on the VCS will therefore be
bypassed. This may present a security risk if the information in the Route Set cannot be trusted.
For this reason, you can configure the VCS with three different behaviors when proxying requests,
as follows:
Proxying Registration Requests
If the VCS has no domains configured, or it receives a registration request for a domain for which
it is not acting as a Registrar, then the VCS may proxy the registration request. This depends on
the SIP Registration Proxy Mode setting, as follows;
• If the SIP Registration Proxy Mode setting is Off, the VCS will not proxy any requests that have
an existing Route Set. Requests that do not have an existing Route Set will still be proxied in
accordance with existing call policy (e.g. zone searches and transforms). This setting provides
the highest level of security.
• Off: the VCS will not proxy any registration requests. The request will be rejected with a “403
Forbidden” message.
• Proxy to Known Only: the VCS will proxy the registration request but only to its neighbors.
• If the setting is Proxy to Known Only, the VCS will proxy requests with an existing Route Set
only if the request was received from a Neighbor zone (including Traversal Client and Traversal
Server zones). Requests that do not have an existing Route Set will be proxied in accordance
with existing call policy.
• Proxy to any: the VCS will proxy the registration requests in accordance with its call policy (e.g.
• If the setting is Proxy to any, the VCS will proxy all requests. Those with existing Route Sets
will be proxied to the specified URI; those without will be proxied in accordance with existing
call policy.
SIP Registration Expiry
SIP protocols and ports
SIP endpoints must periodically re-register with the SIP Registrar in order to prevent their
registration expiring. You can determine the interval with which SIP endpoints must register with
the VCS.
The VCS supports SIP over UDP, TCP and TLS transport protocols. You can configure whether or
not incoming calls using each protocol are supported, and if so, the ports on which the VCS will
listen for such calls.
This setting applies only when the VCS is acting as a SIP Registrar, and to endpoints
registered with the VCS. It does not apply to endpoints whose registrations are being
proxied through the VCS.
At least one of these protocols must be set to a Mode of On in order for SIP functionality to
be supported.
D14049.01
07.2007
Download from Www.Soanuals.c
3
om. All Manuals Search And Download.
5
TANDBERG VIDEO COMMUNICATION SERVER
ADMINISTRATOR GUIDE
WorkingwithSIP
Configuring SIP - Registrations, Protocols and Ports
SIP settings are configured via:
UDP mode
• VCS Configuration > Protocols > SIP >
Configuration.
Determines whether or not incoming SIP calls
using the UDP protocol will be allowed.
You will be taken to the SIP page.
The default is On.
UDP port
Specifies the listening port for incoming SIP
calls over UDP.
SIP mode
Determines whether or not the VCS will
provide SIP functionality (i.e. SIP Registrar and
SIP proxy services).
The default is 5060.
Registration expire delta
TCP mode
Specifies the period within which a SIP
endpoint must re-register to prevent its
registration expiring.
Determines whether or not incoming SIP calls
using the TCP protocol will be allowed.
The default is On.
SIP registration proxy mode
Specifies how proxied registrations and invites
will be handled.
TCP port
Specifies the listening port for incoming SIP
calls over TCP.
Off: Registration requests will not be proxied
(but will still be permitted locally if the VCS is
authoritative for that domain). Invite requests
with existing Route Sets will be rejected.
The default is 5060.
Proxy to known only: Registration requests will
be proxied, and invite requests will be proxied
only if the Route Set contains the URI(s) of
Neighbors
TLS mode
Determines whether or not incoming SIP calls
using the TLS protocol will be allowed.
The default is On.
Proxy to any: Registration requests and invite
requests will always be proxied.
TLS port
Save
Specifies the listening port for incoming SIP
calls over TLS.
Click here to save your changes.
The default is 5061.
D14049.01
07.2007
Download from Www.Soanuals.c
3
om. All Manuals Search And Download.
6
TANDBERG VIDEO COMMUNICATION SERVER
ADMINISTRATOR GUIDE
WorkingwithSIP
Configuring SIP - Domains
SIP domains are configured via:
View/Edit
• VCS Configuration > Protocols >SIP >
Domains.
Click here to change the domain name or
delete the domain.
You will be taken to the Domains page.
• To add a new domain, click New.
You will be taken to the Create Domain
page.
Enter the domain in the Name field and
click Create Domain.
The new domain will be added and you
will be returned to the Domains page.
• To edit the name of an existing domain,
click View/Edit.
You will be taken to the Edit Domain
page.
Edit the Name of the domain and click
Save.
The name of the domain will be changed.
Name
Specifies a domain for which the VCS is
authoritative.
The VCS will act as a SIP Registrar for this
domain, and will accept registration requests
for any SIP endpoints attempting to register
with an alias that includes this domain.
• To delete an existing domain, click
View/Edit.
You will be taken to the Edit Domain
page.
Click Delete.
The domain will be deleted and you will
be returned to the Domains page.
Cancel
Click here to return to the Domains page
without saving your changes.
Delete
Click here to delete the domain and return to
the Domains page.
Save
Click here to save your changes.
D14049.01
07.2007
Download from Www.Soanuals.c
3
om. All Manuals Search And Download.
7
TANDBERG VIDEO COMMUNICATION SERVER
ADMINISTRATOR GUIDE
Interworking
Overview
Configuring Interworking
Interworking is enabled via:
About Interworking
• VCS Configuration > Protocols > Interworking.
The VCS is able to act as a gateway between
SIP and H.323, translating calls from one
protocol to the other. This is known as
“interworking”.
You will be taken to the Interworking page.
By default, the VCS will act as a SIP-H.323
gateway but only if at least one of the
endpoints is locally registered.
You can add an additional option key that will
allow the VCS to act as SIP-H.323 gateway
regardless of whether the endpoints are
locally registered. Contact your TANDBERG
representative for further information.
In either case, you also always have the option
to disable interworking.
An interworking call is a traversal call, and will
therefore consume one traversal licence for
the duration of the call.
A call between two H.323 endpoints
each registered to a different VCS may
!
be routed in such a way that it is
interworked from H.323 to SIP and back to
H.323. (For example, if the two VCSs are only
able to connect via SIP.) In this case, the two
H.323 endpoints involved must support H.263
video. If they do not (for example, if H.263
has been disabled) the call will still be
Save
H.323 <-> SIP interworking mode
Click here to save your changes.
Determines whether or not the VCS will act as a gateway between SIP and H.323 calls.
Off: the VCS will not act as a SIP-H.323 gateway.
RegisteredOnly: the VCS will act as a SIP-H.323 gateway but only if at least one of the endpoints is
locally registered.
established but it will be audio only.
On: the VCS will act as SIP-H.323 gateway regardless of whether the endpoints are locally
registered. You must have the appropriate option key enabled to use this feature.
D14049.01
07.2007
Download from Www.Soanuals.c
3
om. All Manuals Search And Download.
8
TANDBERG VIDEO COMMUNICATION SERVER
ADMINISTRATOR GUIDE
RegistrationControl
Registration Overview
Endpoint Registration
Registrations on a VCS Border Controller
MCU, Gateway and Content Server Registration
In order for an endpoint to use the TANDBERG VCS, the
endpoint must first register with the VCS. The VCS can be
configured to control which devices are allowed to register with
it. Two separate mechanisms are provided:
If a traversal-enabled endpoint registers directly with
a VCS Border Controller, the VCS Border Controller will
provide VCS services to that endpoint in addition to firewall
traversal. Traversal-enabled endpoints include all TANDBERG
Expressway™ endpoints and third party endpoints which
support the ITU H.460.18 and H.460.19 standards.
H.323 systems such as gateways, MCUs and Content Servers
can also register with a VCS. They are known as locally
registered services. These systems are configured with their
own prefix, which they provide to the VCS when registering. The
VCS will then know to route all calls that begin with that prefix
to the gateway, MCU or Content Server as appropriate. These
prefixes can also be used to control registrations.
password supplied by the endpoint
Endpoints that are not traversal-enabled can still register with a
VCS Border Controller, but they may not be able to make and/or
receive calls through the firewall successfully. This will depend
on a number of factors:
Lists or Deny Lists to specify which aliases can and cannot
register with the VCS.
SIP devices cannot register prefixes. If your dial plan dictates
that a SIP device should be reached via a particular prefix, then
you should add the device as a neighbor zone with a pattern
match equal to the prefix to be used.
It is possible to use both mechanisms together. For example,
you can use authentication to verify an endpoint’s identity from
a corporate directory, and registration restriction to control
which of those authenticated endpoints may register with a
particular VCS.
• whether the endpoint is using SIP or H.323
• the endpoint’s position in relation to the firewall
• whether there is a NAT in use
• whether the endpoint is using a public IP address
For example, if an endpoint is behind a NAT and/or firewall. it
may not be able to receive incoming calls and may not be able
to receive media for calls they have initiated.
This section gives an overview of how endpoints and other
devices register with the VCS, and then describes the two
mechanisms by which registrations can be restricted.
D14049.01
07.2007
Download from Www.Soanuals.c
3
om. All Manuals Search And Download.
9
TANDBERG VIDEO COMMUNICATION SERVER
ADMINISTRATOR GUIDE
RegistrationControl
Registration Overview
H.3ꢁ3
Finding a VCS with which to Register
Before an endpoint can register with a VCS, it must determine which VCS it can or should be
registering with. This setting is configured on the endpoint, and the process is different for SIP
and H.323.
There are two ways an H.323 endpoint can locate a VCS with which to register: manually or
automatically. The option is configured on the endpoint itself under the Gatekeeper Discovery
setting (consult your endpoint manual for how to access this setting).
• If the mode is set to automatic, the endpoint will try to register with any VCS it can find. It does
this by sending out a Gatekeeper Discovery Request, to which eligible VCSs will respond.
• If the mode is set to manual, you must specify the IP address of the VCS with which you wish
SIP
your endpoint to register, and the endpoint will attempt to register with that VCS only.
SIP endpoints must find a SIP Registrar with which to register. The SIP Registrar maintains a
record of the endpoint’s details against the endpoint’s Address of Record (AOR). When a call is
received for that AOR, the SIP Registrar refers to the record in order to find the endpoint to which
it corresponds. (Note that the same AOR can be used by more than one SIP endpoint at the same
time.)
Preventing automatic registrations
You can prevent H.323 endpoints being able to register automatically with the VCS by disabling
Auto Discovery on the VCS. The Auto Discovery setting determines whether the VCS responds to
the Gatekeeper Discovery requests sent out by endpoints.
The SIP Registrar will only accept registrations for domains for which it is authoritative.
There are two ways a SIP endpoint can locate a Registrar with which to register: manually or
automatically. The option is configured on the endpoint itself under the SIP Server Discovery
option (consult your endpoint user guide for how to access this setting).
To configure the Auto Discovery setting:
• VCS Configuration > Protocols > H.323.
You will be taken to the H.323 page.
• If the mode is set to automatic, the endpoint will send a REGISTER message to its SIP
Server. This will be forwarded (via DNS if necessary) to the Registrar that is authoritative for
the domain with which the endpoint is attempting to register. For example, if an endpoint is
Registrar authoritative for the domain example.com.
Auto discover
• If the mode is set to manual, the user must specify the IP address of the Registrar with which
On: The VCS will respond
to Gatekeeper discovery
requests.
they wish to register, and the endpoint will attempt to register with that Registrar only.
The VCS is a SIP Server for endpoints in its local zone, and can also act as a SIP Registrar.
Off: The VCS will not
• If the VCS is acting as the endpoint’s SIP Server and SIP Registrar, when the registration
request is received from the endpoint it will be accepted by the VCS and the endpoint will be
information.
respond to Gatekeeper
discovery requests. H.323
endpoints will be able to
register with the VCS only if
their Gatekeeper Discovery
setting is Manual and they
have entered the IP address
of the VCS.
• If the VCS is acting as the endpoint’s SIP server but is not a SIP Registrar, it will proxy the
D14049.01
07.2007
Download from Www.Soanuals.c
4
om. All Manuals Search And Download.
0
TANDBERG VIDEO COMMUNICATION SERVER
ADMINISTRATOR GUIDE
RegistrationControl
Authentication
Mode
About Authentication
Configuring Authentication
On: all endpoints must authenticate with the
VCS before registering.
The VCS can be configured to use a username
and password-based challenge-response
scheme to permit endpoint registrations. This
process is known as authentication.
To configure Authentication options:
• VCS Configuration > Authentication > Configuration
Off: no authentication is required for
endpoints.
You will be taken to the Authentication Configuration page (shown below).
In order to authenticate with the VCS, the
endpoint must supply it with a username.
For TANDBERG endpoints using H.323, the
username is the endpoint’s Authentication ID;
for TANDBERG endpoints using SIP it is the
endpoint’s Authentication Username.
The default is Off.
Authentication database
Determines which database the VCS will use
during authentication.
For details of how to configure
endpoints with a username and
password, please consult the
endpoint manual.
LocalDatabase: the local database is used.
this option.
In order to verify the identity of the device,
the VCS needs access to a database on
which all authentication credential information
(usernames, passwords, and other relevant
information) is stored. This database may
be located either locally on the VCS, or on
an LDAP Directory Server. The VCS looks up
the endpoint’s username in the database
and retrieves the authentication credentials
for that entry. If the credentials match those
supplied by the endpoint, the registration is
allowed to proceed.
LDAP: A remote LDAP database is used. You
ption.
he default is LocalDatabase.
Authentication password
Specifies the password to be used by the
VCS (in conjunction with the Authentication
username) when the VCS is authenticating
with another system.
The VCS supports the ITU H.235 specification
network devices with which it communicates.
Authentication username
The Authentication Username is the name that the VCS uses when authenticating with other systems. For example, when forwarding an invite from an
endpoint to another VCS, that other system may have authentication enabled and will therefore require your local VCS to provide it with a username
and password. Traversal clients must always successfully authenticate with traversal servers before they can be used.
The authentication username and password for your local VCS must be stored on either the local database or LDAP database (depending on which has
been enabled), along with all the other authentication usernames and passwords. When your local VCS receives an authentication request, it looks up
its own username in the database and sends the corresponding authentication credentials, along with the username, to the system that requested it.
If the username and authentication credentials match those stored on the requesting system’s database, the communication can continue.
D14049.01
07.2007
Download from Www.Soanuals.c
4
om. All Manuals Search And Download.
ꢀ
TANDBERG VIDEO COMMUNICATION SERVER
ADMINISTRATOR GUIDE
RegistrationControl
Authentication
Alias Origin Setting
Authentication using an LDAP Server
If the VCS is using an LDAP server for authentication, the process is as follows:
This setting determines the alias(es) with which the endpoint will attempt to register.
ꢀ. The endpoint presents its username and authentication credentials (these are generated using
its password) to the VCS, and the alias(es) with which it wishes to register
LDAP
ꢁ. The VCS looks up the username in the LDAP database and obtains the authentication and alias
The alias(es) presented by the endpoint will be used as long as they are listed in the LDAP
database for the endpoint’s username.
information for that entry.
3. If the authentication credentials match those supplied by the endpoint, the registration will
• If an endpoint presents an alias that is listed in the LDAP database, it will be registered with
continue.
that alias.
The VCS will then determine which alias(es) the endpoint will be allowed to attempt to register
with, based on the alias origin setting. For H.323 endpoints, you can use this setting to override
the aliases presented by the endpoint with those in the H.350 directory, or you can use them
in addition to the endpoint’s aliases. For SIP endpoints, you can use this setting to reject a
registration if the endpoint’s AOR does not match that in the LDAP database.
• If more than one alias is listed in the LDAP database for that username, the endpoint will be
registered with only those aliases that it has presented.
• If an endpoint presents an alias that is not in the LDAP database, it will not be registered with
that alias.
• If an endpoint presents more than one alias but none are listed in the LDAP database, it will
not be allowed to register.
• If no aliases are presented by the endpoint, it will be registered with all the aliases listed in the
LDAP database for its username. (This is to allow for MCUs which additively register aliases
for conferences, for example the TANDBERG MPS (J4.0 and later) which registers ad-hoc
conferences.)
Configuring the LDAP
Server Directory
The directory on the LDAP
server should be configured
to implement the ITU
to store credentials for
devices with which the VCS
communicates. The directory
should also be configured
with the aliases of endpoints
that will register with the
VCS.
Securing the LDAP Connection with TLS
The traffic between the VCS and the LDAP server can be
encrypted using Transport Layer Security (TLS).
• If no aliases are listed in the LDAP database for the endpoint’s username, then the endpoint
To use TLS:
will be registered with all the aliases it presented.
• LDAP encryption must be set to TLS
• the LDAP server must have a valid certificate installed,
Combined
verifying its identity
The alias(es) presented by the endpoint will be used in addition to any that are listed in the LDAP
database for the endpoint’s username. In other words, this is the same as for LDAP, with one
exception:
• The VCS must trust the certificate installed on the LDAP
server.
• If an endpoint presents an alias that is not in the LDAP database, it will be allowed to register
with that alias.
TLS can be difficult to configure, so we recommend
that you confirm that your LDAP database is working
!
Endpoint
correctly before you attempt to secure the connection
with TLS. We also recommend that you use a third party LDAP
browser to verify that your LDAP server is correctly configured to
use TLS.
The alias(es) presented by the endpoint will be used; any in the LDAP database will be ignored.
• If no aliases are presented by the endpoint, it will not be allowed to register.
For information on how to configure the VCS to trust the
For instructions on
how to configure
common LDAP
servers, see the Appendix
D14049.01
07.2007
Download from Www.Soanuals.c
4
om. All Manuals Search And Download.
ꢁ
TANDBERG VIDEO COMMUNICATION SERVER
ADMINISTRATOR GUIDE
RegistrationControl
Authentication
Server IP address
Configuring LDAP Server settings
The IP address or FQDN of the LDAP server.
To configure the settings for accessing the
LDAP server:
• VCS Configuration > Authentication > LDAP
ort
> Configuration.
You will be taken to the LDAP Configuration
page.
he IP port of the LDAP server.
serDN
he user distinguished name to be used by
he VCS when binding to the LDAP server.
assword
he password to be used by the VCS when
nding to the LDAP server.
Base DN
The area of the directory on the LDAP server
to be searched for the credential information.
This should be specified as the Distinguished
Name (DN) in the LDAP directory under which
the H.350 objects reside.
Alias origin
Determines the source of the alias(es) with
which the endpoint will be registered.
LDAP: The aliases listed in the LDAP database
for the endpoint’s username will be used;
those presented by the endpoint will be
ignored.
Encryption
Determines whether the connection to the
LDAP server will be encrypted. (For more
information on configuring encryption, see
Endpoint: The aliases presented by the
endpoint will be used; any in the LDAP
database will be ignored.
TLS: TLS Encryption will be used for the
connection with the LDAP server.
Combined: The endpoint will be registered
both with the aliases which it has presented
and with those configured in the LDAP
database.
Off: No encryption will be used.
The default is Off.
The default is LDAP.
D14049.01
07.2007
Download from Www.Soanuals.c
4
om. All Manuals Search And Download.
3
TANDBERG VIDEO COMMUNICATION SERVER
ADMINISTRATOR GUIDE
RegistrationControl
Authentication
Credentials
Authentication using a Local
Database
The local database is included as part of
your VCS system. It consists of a list of
usernames and passwords, which you add
via the web interface and/or the CLI. The
database can hold up to 2500 entries.
The Credentials page shows all the existing
entries in the Local Database.
You can sort these entries by clicking
on the Name column heading.
Configuring the Local Database
To manage entries in the Local Database:
• VCS Configuration > Authentication >
Local Database.
View/Edit
Select View/Edit to add a make changes to
an existing entry. You will be taken to the Edit
Credential page.
You will be taken to the Credentials page.
Cancel
Returns you to the Credentials page without
saving your changes.
New
Select New to add a new entry to the Local
Database. You will be taken to the Create
Credential page.
Delete
Removes the entry from the Local Database
and returns you to the Credentials page.
Name
The username used by the endpoint when
authenticating with the VCS.
Save
Password
Saves the changes you have made.
The password used by the endpoint when
authenticating with the VCS.
Create Credential
The same credentials can be used by
more than one endpoint - you do not
need to have a separate entry in the
database for each endpoint.
Select Create Credential to add the new
entry to the Local Database and return to the
Credentials page.
D14049.01
07.2007
Download from Www.Soanuals.c
4
om. All Manuals Search And Download.
4
TANDBERG VIDEO COMMUNICATION SERVER
ADMINISTRATOR GUIDE
RegistrationControl
Registering Aliases
About Alias Registration
Attempts to Register using an Existing Alias
SIP
Once the authentication process (if required) has been
completed, the endpoint will then attempt to register its
alias(es) with the VCS.
An endpoint may attempt to register with the VCS using an alias
that is already registered to the system. How this is managed
depends on how the VCS is configured and whether the
endpoint is SIP or H.323.
A SIP endpoint will always be allowed to register using an alias
that is already in use from another IP address. When a call is
received for this alias, all endpoints registered using that alias
will be called simultaneously. This SIP feature is known as
“forking”.
H.3ꢁ3 Alias Registration
When registering, the H.323 endpoint presents the VCS with
one or more of the following:
H.3ꢁ3
An H.323 endpoint may attempt to register with the VCS using an alias that has already been registered on the VCS from another IP
address. The reasons for this could include:
• one or more H.323 IDs
• one or more E.164 aliases
• one or more URIs.
• two endpoints at different IP addresses are attempting to register using the same alias
• a single endpoint has previously registered using a particular alias. The IP address allocated to the endpoint then changes, and
the endpoint is attempting to re-register using the same alias.
Users of other registered endpoints can then call the endpoint
by dialing any of these aliases.
You can determine how the VCS will behave in this situation by configuring the Registration Conflict Mode. This is done via:
• VCS Configuration > Protocols > H.323. You will be taken to the H.323 page.
Registration conflict mode
We recommended that you register your H.323
endpoints using a URI. This facilitates interworking
between SIP and H.323, as SIP endpoints register using
a URI as standard.
Determines what will happen when an H.323
endpoint attempts to register using an alias
that has already been registered from another
IP address.
Reject: The registration from the new IP
address will be rejected. This is useful if your
priority is to prevent two users registering with
the same alias.
We recommended that you do not use aliases that
reveal sensitive information. Due to the nature of
H.323, call setup information is exchanged in an
unencrypted form.
Overwrite: The existing registration will be
overwritten using the new IP address. This is
useful if your network is such that endpoints
are often allocated new IP addresses,
because it will prevent unwanted registration
rejections.
SIP Alias Registration
When registering, the SIP endpoint presents the VCS with its
contact address (IP address) and logical address (Address of
Record). The logical address is considered to be its alias, and
will generally be in the form of a URI.
The default is Reject.
D14049.01
07.2007
Download from Www.Soanuals.c
4
om. All Manuals Search And Download.
5
TANDBERG VIDEO COMMUNICATION SERVER
ADMINISTRATOR GUIDE
RegistrationControl
Allow and Deny Lists
Activating use of Allow or Deny Lists
About Allow and Deny Lists
When an endpoint attempts to register with
the VCS it presents a list of aliases. You can
control which endpoints are allowed to register
by setting the Restriction Policy to AllowList
or DenyList and then including any one of the
endpoint’s aliases on the Allow List or the
Deny list as appropriate. Each list can contain
up to 2,500 entries. When an endpoint
attempts to register, each of its aliases is
compared with the patterns in the relevant list
to see if it matches. Only one of the aliases
needs to appear in the Allow List or the Deny
List for the registration to be allowed or
denied.
To activate the use of Allow or Deny lists to determine which aliases are allowed to register with the VCS:
• VCS Configuration > Registration > Configuration.
You will be taken to the Registration Configuration page.
For example, If the Registration Restriction
policy is set to DenyList and an endpoint
attempts to register using three aliases, one
of which matches a pattern on the Deny list,
that endpoint’s registration will be denied.
Likewise, if the Registration Restriction policy
is set to AllowList, only one of the endpoint’s
aliases needs to match a pattern on the Allow
list for it to be allowed to register using all its
aliases.
Patterns and Pattern Types
Entries on the Allow List and Deny List are a
combination of Pattern and Type. The Pattern
specifies the string to be matched; the Type
determines whether that string;
• must match the Pattern exactly (Exact)
• must appear at the start of the alias
Restriction policy
Save
(Prefix)
Specifies the policy to be used when determining which endpoints may register with the VCS.
None: Any endpoint may register.
Click here to save your changes.
• must appear at the end of the alias (Suffix)
• is in the form of a Regular Expression
(Regex).
AllowList: Only those endpoints with an alias that matches an entry in the Allow List may register.
DenyList: All endpoints may register, unless they match an entry on the Deny List.
The default is None.
Allow Lists and Deny Lists are mutually
exclusive: only one may be in use at
any given time.
D14049.01
07.2007
Download from Www.Soanuals.c
4
om. All Manuals Search And Download.
6
TANDBERG VIDEO COMMUNICATION SERVER
ADMINISTRATOR GUIDE
RegistrationControl
Allow and Deny lists
Registration Allow List
Managing Entries in the Allow List
This page shows all the existing entries in the
Allow List.
To view and manage the entries in the Allow
List:
• VCS Configuration > Registration > Allow
List.
You can sort these entries by clicking
on the relevant column heading.
You will be taken to the Registration Allow
List page.
View/Edit
Select View/Edit to make changes to an
existing entry. You will be taken to the Edit
Allow Pattern page.
New
Click here to add a new entry to the Allow List.
You will be taken to the Create Allow Pattern
page.
Pattern
Edit the pattern.
Pattern
Enter the pattern you wish to add to the Allow
List.
Type
Edit the type.
Type
Select the way in which the Pattern must
match the alias for the registration to be
allowed. Options are:
Cancel
Select Cancel to return to the Registration
Allow List page without saving your changes.
Exact: the alias must match the Pattern
exactly.
Prefix: the alias must begin with the Pattern.
Suffix: the alias must end with the Pattern.
Delete
Regex: the Pattern is a regular expression.
information.
Select Delete to remove the registration from
the list.
Add Allow List Pattern
Save
Click here to save the entry and return to the
Registration Allow List page.
Select Save to save your changes.
D14049.01
07.2007
Download from Www.Soanuals.c
4
om. All Manuals Search And Download.
7
TANDBERG VIDEO COMMUNICATION SERVER
ADMINISTRATOR GUIDE
RegistrationControl
Allow and Deny lists
Registration Deny List
Managing Entries in the Deny List
This page shows all the existing entries in the
Deny List.
To view and manage the entries in the Deny
List:
• VCS Configuration > Registration > Deny
List.
You can sort these entries by clicking
on the relevant column heading.
You will be taken to the Registration Deny
List page.
View/Edit
Select View/Edit to make changes to an
existing entry. You will be taken to the Edit
Deny Pattern page.
New
Click here to add a new entry to the Deny List.
You will be taken to the Create Deny Pattern
page.
Pattern
Edit the pattern.
Pattern
Enter the pattern you wish to add to the Deny
List.
Type
Edit the type.
Type
Select the way in which the Pattern must
match the alias for the registration to be
denied. Options are:
Cancel
Select Cancel to return to the Registration
Deny List page without saving your changes.
Exact: the alias must match the Pattern
exactly.
Prefix: the alias must begin with the Pattern.
Suffix: the alias must end with the Pattern.
Delete
Regex: the Pattern is a regular expression.
information.
Select Delete to remove the registration from
the list.
Add Deny List Pattern
Save
Click here to save the entry and return to the
Registration Deny List page.
Select Save to save your changes.
D14049.01
07.2007
Download from Www.Soanuals.c
4
om. All Manuals Search And Download.
8
TANDBERG VIDEO COMMUNICATION SERVER
ADMINISTRATOR GUIDE
Managing Zones, Neighbors and Alternates
Overview
About your Video Communications
Network
The most basic implementation of a
TANDBERG video communications network is a
single VCS connected to the internet with one
or more endpoints registered to it. However,
depending on the size and complexity of
your enterprise the VCS may be part of a
network of endpoints, other VCSs and other
network infrastructure devices, with one or
more firewalls between it and the internet. In
addition, you may wish to apply restrictions to
the amount of bandwidth used by and between
different parts of your network.
This section will give you an overview of the
different parts of the video communications
network and the ways in which they can be
connected. This information should allow you
to configure your VCS to best suit your own
infrastructure.
Example
The diagram opposite shows how the different
components of the network fit together.
These components are described in more
detail in the sections that follow.
D14049.01
07.2007
Download from Www.Soanuals.c
4
om. All Manuals Search And Download.
9
TANDBERG VIDEO COMMUNICATION SERVER
ADMINISTRATOR GUIDE
Managing Zones, Neighbors and Alternates
Local Zone and Subzones
About the Local Zone and its Subzones
Configuring the Local Zone and its Subzones
The collection of all endpoints, gateways, MCUs and Content Servers registered with the VCS
make up its Local Zone.
The Local Zone and its subzones exist for the purposes of bandwidth management. For full details
of how to create and configure subzones, and apply bandwidth limitations to these and the Default
The Local Zone is made up of subzones. These include an automatically created Default Subzone
and up to 100 manually configurable subzones. Each manually configured subzone specifies a
range of IP addresses. When an endpoint registers with the VCS it is allocated to the appropriate
subzone based on its IP address. If the endpoint’s IP address does not match any of the
subzones, it is assigned to the Default Subzone.
Subzones are used for the purposes of bandwidth management. Once you have set up your
subzones you can apply bandwidth limits to:
• individual calls between two endpoints within the subzone
• individual calls between an endpoint within the subzone and another endpoint outside of the
subzone
• the total of calls to or from endpoints within the subzone.
The VCS also has a special type of subzone known as the Traversal Subzone. This is a conceptual
subzone; no endpoints can be registered to it, but all traversal calls (i.e. calls for which the VCS is
taking the media in addition to the signaling) must pass through it. The Traversal Subzone exists
in order to allow you to control the amount of bandwidth used by traversal calls, as these can be
particularly resource-intensive.
The Local Zone may be independent of network topology, and may be comprised of multiple
network segments.
D14049.01
07.2007
Download from Www.Soanuals.c
5
om. All Manuals Search And Download.
0
TANDBERG VIDEO COMMUNICATION SERVER
ADMINISTRATOR GUIDE
Managing Zones, Neighbors and Alternates
Zones
About Zones
Traversal Client Zone
Traversal Server Zone
A zone is a collection of endpoints, either all registered to a
single system (e.g. VCS, gatekeeper or Border Controller), or
of a certain type such as ENUM or DNS. The use of zones
enables you to:
In order to be able to traverse a firewall, the VCS must be
neighbored with a traversal server (for example a TANDBERG
Border Controller or another VCS with the Border Controller
option enabled).
The VCS may be enabled to act as a traversal server by
installing the Border Controller option (contact your TANDBERG
representative for further information).
In order to act as a traversal server, the local VCS must be
neighbored with each system (e.g. VCS or gatekeeper) that will
be its traversal client. To do this, you create a traversal server
zone on your local VCS and configure it with the details of the
corresponding zone on the traversal client.
• use links to determine whether calls can be made between
In this situation your local VCS is a traversal client, so you
neighbor with the traversal server by creating a traversal client
zone on your local VCS. You then configure it with details of the
corresponding zone on the traversal server.
your local subzones and these other zones
• manage the bandwidth of calls between your local subzones
and endpoints in other zones
Once you have neighbored with the traversal server you can:
• use the neighbor as a traversal server
• query the traversal server about its endpoints
Once you have neighbored with the traversal client you can:
• provide firewall traversal services to the traversal client
• query the traversal client about its endpoints
• more easily search for aliases that are not registered locally
• apply transforms to aliases before searching for them.
Your VCS allows you to configure up to 200 zones of 5 different
types. It also has a non-configurable Default Zone.
• apply transforms to any queries before they are sent to the
• apply transforms to any queries before they are sent to the
traversal server
traversal client
• control the bandwidth used for calls between your local VCS
• control the bandwidth used for calls between your local VCS
and the traversal server.
and the traversal client.
ENUM Zone
ENUM zones allow you to locate endpoints via an ENUM lookup.
You can create one or more ENUM zones based on the ENUM
DNS suffix used and/or by pattern matching of the endpoints’
aliases.
In order for firewall traversal to work, the traversal
server and the traversal client must each be configured
with the other’s details.
Default Zone
Any incoming calls from endpoints that are not recognized as
belonging to any of the existing configured zones are deemed to
be coming from the Default Zone.
Once you have configured one or more ENUM zones, you can:
• apply transforms to alias search requests directed to that
group of endpoints
The VCS comes pre-configured with the Default Zone and
default links between it and both the Default Subzone and the
Traversal Subzone.
Neighbor Zone
• control the bandwidth used for calls between your local VCS
A Neighbor zone could be a collection of endpoints registered
to another system (e.g. VCS, gatekeeper, or Border Controller),
or it could be a SIP device. The other system is referred to
as a neighbor. Neighbors can be part of your own enterprise
network, part of a separate network, or even stand-alone
systems.
and each group of ENUM endpoints.
The purpose of the Default Zone is to allow you to manage
incoming calls from unrecognized endpoints to the VCS. You
can do this by:
DNS Zone
• deleting the default links. This will prevent any incoming
DNS zones allow you to locate endpoints via a DNS lookup.
You can create one or more DNS zones based on pattern
matching of the endpoints’ aliases.
calls from unrecognized endpoints
You create a neighbor relationship with the other system by
adding it as a neighbor zone on your local VCS. Once you have
added it, you can:
• applying pipes to the default links. This will allow you to
control the bandwidth consumed by incoming calls from
unrecognized endpoints.
Once you have configured one or more DNS zones, you can:
• query the neighbor about its endpoints
• apply transforms to alias search requests directed to that
• apply transforms to any queries before they are sent to the
group of endpoints
neighbor
The default links can be reinstated at any time via the
command:
• control the bandwidth used for calls between your local VCS
• control the bandwidth used for calls between your local VCS
and each group of DNS endpoints.
and the neighbor zone.
D14049.01
07.2007
Download from Www.Soanuals.c
5
om. All Manuals Search And Download.
ꢀ
TANDBERG VIDEO COMMUNICATION SERVER
ADMINISTRATOR GUIDE
Managing Zones, Neighbors and Alternates
Adding Zones
Configuring Zones
In order to neighbor with another system
(e.g. VCS, gatekeeper or Border Controller) or
create an ENUM or DNS zone, you must add
a new zone on the local VCS. When adding a
new zone you will be asked to specify its Type;
this will determine which configuration options
will then be available.
Once you have created a new zone on the
local VCS you must configure it appropriately.
For traversal server zones, traversal client
zones and neighbor zones this will include
providing information about the neighbor
system such as IP address and ports.
Zones are configured via the Edit Zone page.
You will be taken to this page automatically
upon creation of a new zone. To access this
page for an existing zone:
To create a new zone:
• VCS Configuration > Zones.
You will be taken to the Zones page.
Click New.
• VCS Configuration > Zones.
You will be taken to the Zones page.
Click on the name of the zone you wish to
configure.
You will be taken to the Create Zone page.
You will be taken to the Edit Zone page.
Name
The sections that follow describe the
configuration options available for each zone
type.
Enter the name you wish to give to this zone.
The name acts as a unique identifier, allowing
you to distinguish between zones of the same
type.
Type
From the Type drop-down menu, select the
type of zone you wish to add.
Once the zone has been created, the Type
cannot be changed.
Create Zone
Click here to create the zone. You will be
taken directly to the Edit Zone page.
Cancel
Click here to return to the Zones page without
creating the zone.
D14049.01
07.2007
Download from Www.Soanuals.c
5
om. All Manuals Search And Download.
ꢁ
TANDBERG VIDEO COMMUNICATION SERVER
ADMINISTRATOR GUIDE
Managing Zones, Neighbors and Alternates
Configuring Zones - All Types
Name
Assigns a name to the zone. The name acts as a unique
identifier, allowing you to distinguish between zones of the
same type.
Type
Determines the nature of the specified zone in relation to the
Local Zone.
Neighbor: the new zone will be a neighbor of the Local Zone.
TraversalClient: there is a firewall between the zones, and the
Local Zone is a traversal client of the new zone.
TraversalServer: there is a firewall between the zones and the
Local Zone is a traversal server for the new zone.
ENUM: the new zone contains endpoints discoverable by ENUM
lookup.
DNS: the new zone contains endpoints discoverable by DNS
lookup.
Once the zone has been created, the Type cannot be changed.
Hop count
The hop count is the number of times a search request will be
forwarded to a neighbor gatekeeper or proxy (see Hop Counts
for more information). This field specifies the hop count to be
used when sending an alias search request to this particular
zone.
If the search request was received from another zone
and already has a hop count assigned, the lower of the
two values will be used.
Match1 - Match5
The Match sections allow you to configure when and how
search requests will be sent to this zone, and also whether any
transforms will be applied to aliases being searched for in this
D14049.01
07.2007
Download from Www.Soanuals.c
5
om. All Manuals Search And Download.
3
TANDBERG VIDEO COMMUNICATION SERVER
ADMINISTRATOR GUIDE
Managing Zones, Neighbors and Alternates
Configuring Neighbor Zones
H.323 mode
Determines whether H.323 calls will be
allowed to and from the neighbor zone.
H.323 port
Specifies the port on the neighbor system to
be used for H.323 calls to and from the local
VCS.
This must be the same port number as
that configured on the neighbor system
as its H.323 UDP port.
SIP mode
Determines whether SIP calls will be allowed
to and from the neighbor zone.
SIP port
Specifies the port on the neighbor system
to be used for SIP calls to and from the local
VCS.
This must be the same port number as
that configured on the neighbor system
as its SIP TCP or SIP TLS port
(depending on which SIP transport mode is in
use).
SIP transport
Primary address
Alternate 1 to Alternate 5 address
Determines which transport type will be used for SIP calls to
and from the neighbor zone.
Enter the IP address or FQDN of the neighbor system.
Enter the IP addresses or FQDNs of all Alternates configured on
the neighbor system.
D14049.01
07.2007
Download from Www.Soanuals.c
5
om. All Manuals Search And Download.
4
TANDBERG VIDEO COMMUNICATION SERVER
ADMINISTRATOR GUIDE
Managing Zones, Neighbors and Alternates
Configuring Traversal Client Zones
Retry interval
SIP mode
Specifies the interval in seconds with which a
failed attempt to establish a connection to the
traversal server should be retried.
Determines whether SIP calls will be allowed
to and from this zone.
H.323 mode
SIP port
Determines whether H.323 calls will be
allowed to and from the traversal server.
Specifies the port on the traversal server to
be used for SIP calls to and from the VCS.
H.323 protocol
Determines which of the two firewall traversal
protocols (Assent or H.460.18) to use for calls
to the traversal server. (See Firewall Traversal
Protocols for more information.)
SIP transport
Determines which transport type will be used
for SIP calls to and from the traversal server.
H.323 port
Specifies the port on the traversal server to
be used for H.323 calls to and from the local
VCS.
For firewall traversal to work via SIP,
the traversal server must have a
traversal server zone configured on it
to represent this VCS, using this same
transport type and port number.
For firewall traversal to work via
H.323, the traversal server must have
a traversal server zone configured on it
to represent this VCS, using this same port
number.
Primary address
Specifies the IP address or FQDN of the
traversal server.
For full details on how traversal client
zones and traversal server zones work
together to achieve firewall traversal,
Alternate 1 to Alternate 5 address
Specifies the IP addresses or FQDNs of any
alternates configured on the traversal server.
D14049.01
07.2007
Download from Www.Soanuals.c
5
om. All Manuals Search And Download.
5
TANDBERG VIDEO COMMUNICATION SERVER
ADMINISTRATOR GUIDE
Managing Zones, Neighbors and Alternates
Configuring Traversal Server Zones
Authentication
username
SIP mode
There must
be an entry
in the local
Determines whether SIP calls will be allowed
to and from this zone.
If the traversal client
is a VCS, this is
VCS’s
Authentication
its Authentication
Username. If the
traversal client is a
gatekeeper, this is
its System Name.
database for this
username. See
Authentication for
more information.
SIP port
Specifies the port on the local VCS Border
Controller to be used for SIP calls to and from
the traversal client.
H.323 mode
SIP transport
Determines whether H.323 calls will be
allowed to and from the traversal client.
Determines which transport type will be used
for SIP calls to and from the traversal client.
H.323 protocol
UDP retry interval
Determines the protocol (Assent or H.460.18)
to be used to traverse the firewall/NAT.
information.)
Sets the frequency (in seconds) with which the
client will send a UDP probe to the traversal
server if a keep alive confirmation has not
been received.
H.323 port
UDP retry count
Specifies the port on the local VCS to be
used for H.323 calls to and from the traversal
client.
Sets the number of times the client will
attempt to send a UDP probe to the VCS
Border Controller during call setup.
H.460.19 demultiplexing Mode
UDP keep alive interval
Determines whether or not the same two
ports can be used for media by two or more
calls.
Sets the interval (in seconds) with which the
client will send a UDP probe to the VCS Border
Controller once a call is established, in order
to keep the firewall’s NAT bindings open.
On: all calls will use the same two ports.
TCP keep alive interval
TCP retry count
TCP retry interval
Off: each call will use a separate pair of ports.
Sets the interval (in seconds)
with which the traversal
client will send a TCP probe
to the VCS once a call is
established, in order to
maintain the firewall’s NAT
bindings.
Sets the number of times
the client will attempt to
send a TCP probe to the VCS
Border Controller during call
setup.
Sets the frequency (in
seconds ) with which the
traversal client will send a
TCP probe to the VCS during
call setup.
The default UDP and TCP probe retry
intervals are suitable for most
situations. However, if you experience
problems with NAT bindings timing out, they
may need to be changed.
For full details on how traversal client
zones and traversal server zones work
together to achieve firewall traversal,
D14049.01
07.2007
Download from Www.Soanuals.c
5
om. All Manuals Search And Download.
6
TANDBERG VIDEO COMMUNICATION SERVER
ADMINISTRATOR GUIDE
Managing Zones, Neighbors and Alternates
Configuring ENUM Zones
DNS suffix
Specifies the domain to be appended to the transformed
E.164 number to create an ENUM domain for which this zone is
queried.
H.323 mode
Determines whether H.323 records will be looked up for this
zone.
SIP mode
Determines whether SIP records will be looked up for this zone.
Full details of how to use and configure ENUM zones is
Configuring DNS Zones
H.323 mode
Determines whether H.323 calls will be allowed to this zone.
SIP mode
Determines whether SIP calls will be allowed to this zone.
Full details of how to use and configure DNS zones is
D14049.01
07.2007
Download from Www.Soanuals.c
5
om. All Manuals Search And Download.
7
TANDBERG VIDEO COMMUNICATION SERVER
ADMINISTRATOR GUIDE
Managing Zones, Neighbors and Alternates
About Alternates
Configuring Alternates
The purpose of an Alternate is to provide extra
reliability.
Each VCS can be configured with the IP
addresses of up to five other VCSs that will
act as Alternates should the current VCS
become unavailable.
Each VCS can be part of a pool of up to 6
Alternate VCSs that act as backups to each
other in case one becomes unavailable (for
example, due to a network or power outage).
To configure Alternate VCSs:
• VCS Configuration > Alternates.
All the Alternates in a pool are configured
similarly and share responsibility for their
endpoint community. When an endpoint
registers with the VCS, it is given the
IP addresses of all the VCS’s Alternates. If
the endpoint loses contact with the initial
VCS, it will seek to register with one of the
Alternates. This may result in your endpoint
community’s registrations being spread over
all the Alternates.
You will be taken to the Alternates page.
When the VCS receives a Location Request,
if it cannot respond from its own registration
database, it will query all of its Alternates
before responding. This allows the pool
of endpoints to be treated as if they were
registered with a single VCS.
You must configure all Alternates in a
pool identically for all registration and
!
call features such as authentication,
bandwidth control and policy. If you do not do
this, endpoint behavior will vary unpredictably
depending on which Alternate it is currently
registered with. Alternates should also be
deployed on the same LAN as each other so
that they may be configured with the same
routing information such as local domain
names and local domain subnet masks.
Alternates are periodically interrogated
to ensure that they are still
functioning. In order to prevent delays
during call setup, any non-functioning
Alternates will not receive Location Requests.
When configuring your VCS with the
details of the system it will be using as
a traversal server, you are given the
opportunity to include details of any Alternates
of that traversal server. Adding this
information to your VCS will ensure that, if the
original traversal server becomes unavailable,
your VCS can use one of its Alternates
instead.
Save
Alternate 1 to Alternate 5 IP address
Alternates are not used to increase
the capacity of your network; they are
to provide redundancy. To increase
Click Save to save your
changes.
To configure another VCS as an Alternate, enter its IP address.
Up to 5 Alternates may be configured.
the capacity of your network, add one or more
additional VCSs and neighbor them together.
D14049.01
07.2007
Download from Www.Soanuals.c
5
om. All Manuals Search And Download.
8
TANDBERG VIDEO COMMUNICATION SERVER
ADMINISTRATOR GUIDE
Managing Zones, Neighbors and Alternates
Setting up a Dial Plan
About Dial Plans
Structured Dial Plan
Hierarchical Dial Plan
As you start deploying more than one VCS, it is useful to
neighbor the systems together so that they can query each
other about their registered endpoints. Before you start, you
should consider how you will structure your dial plan. This will
determine the aliases assigned to the endpoints, and the way in
which the VCSs are neighbored together. The solution you chose
will depend on the complexity of your system. Some possible
options are described below.
An alternative deployment would use a structured dial plan
whereby endpoints are assigned an alias based on the system
they are registering with.
In this type of structure one VCS is nominated as the Directory
for the deployment, and all other VCSs are neighbored with
it alone. Each VCS is configured with the Directory VCS as a
neighbor zone with a Match Mode of Always, and the Directory
VCS is configured with each VCS as a neighbor zone with a
Match Mode of Pattern and its prefix as the Pattern String.
If you are using E.164 aliases, each VCS would be assigned
an area code. When the VCSs are neighbored together, each
neighbor zone is configured with its corresponding area code
as a prefix (i.e. a Match Mode of Pattern and a Type of Prefix).
That neighbor will now only be queried for calls to numbers which
begin with its prefix.
There is no need to neighbor the VCSs with each other. Adding
a new VCS now only requires changing configuration on that
system and the Directory VCS.
Flat Dial Plan
In a URI based dial plan, similar behavior may be obtained by
configuring neighbors with a suffix to match the desired domain
name.
However, failure of the Directory VCS in this situation could
cause significant disruption to communications. Consideration
The simplest approach is to assign each endpoint a unique
alias and divide the endpoint registrations between the VCSs.
Each VCS is then configured with all the other VCS as neighbor
zones. When one VCS receives a call for an endpoint which is
not registered with it, it will send out a Location Request to all
the other neighbor VCSs.
It may be desirable to have endpoints register with just the
subscriber number -- the last part of the E.164 number. In
that case, the VCS could be configured to strip prefixes before
sending the query to that zone.
Whilst conceptually simple, this sort of flat dial plan does not
scale very well. Adding or moving a VCS requires changing the
configuration of every VCS, and one call attempt can result in
a large number of location requests. This option is therefore
most suitable for a deployment with just one or two VCSs and its
Alternates.
A structured dial plan will minimize the number of queries
issued when a call is attempted. However, it still requires a fully
connected mesh of all VCSs in your deployment. A hierarchical
dial plan can simplify this.
D14049.01
07.2007
Download from Www.Soanuals.c
5
om. All Manuals Search And Download.
9
TANDBERG VIDEO COMMUNICATION SERVER
ADMINISTRATOR GUIDE
CallProcessing
Locating a Destination Endpoint
Overview
One of the functions of the VCS is to route calls to their
appropriate destination, based on the address or alias received
by a locally registered endpoint or neighbor zone.
There are a number of steps involved in determining the
destination of a call, and some of these steps can involve
transforming the alias or redirecting the call to other aliases. It
is important to understand the process before setting up your
dial plan so you can avoid circular references.
Process
The process followed by the VCS when attempting to locate a
destination endpoint is shown in the diagram opposite.
ꢀ. The user enters into their endpoint the an alias or address
of the destination endpoint. This can be in a number of
ꢁ. The destination address is sent from the caller’s endpoint to
its local VCS (i.e. the VCS to which it is registered).
3. The VCS applies any Local Zone transforms to the alias.
4. The VCS applies any Administrator Policy to the
(transformed) alias. If this results in a new alias, the
process starts again, with the new alias checked against the
Local Zone transforms.
5. The VCS applies any User Policy to the alias. If the alias is a
FindMe name, the process will start again; all the resulting
aliases will be checked against Local Zone transforms and
Administrator Policy.
6. The VCS then checks all its local registrations and those
of its Alternates for the alias, placing the call if the alias is
found.
7. If the alias is not found locally, the VCS will then query its
zones, in priority order, to see if any of them can find the
alias. If the alias matches an ENUM zone, this may return
a URI. If so, the process starts again; the URI is checked
against any Local Zone transforms, Administrator Policy and
User Policy.
8. If the alias is found by one of the neighbor zones, the call
will be placed to that zone.
D14049.01
07.2007
60
Download from Www.Soanuals.com. All Manuals Search And Download.
TANDBERG VIDEO COMMUNICATION SERVER
ADMINISTRATOR GUIDE
CallProcessing
Dialing by Address Types
Dialing by IP Address
About the Different Address Types
Dialing by H.3ꢁ3 ID or E.ꢀ64 alias
The destination address that is entered via the caller’s
endpoint can take a number of different formats, and this
will affect the specific process that the VCS follows when
attempting to locate the destination endpoint. The address
types supported by the VCS are:
Dialing by IP address is necessary when the destination
endpoint is not registered with any system (e.g. VCS,
gatekeeper or Border Controller). If the destination endpoint
is registered with one of these systems, then it may still be
possible to call it using its IP address but we recommend that
one of the other addressing schemes should be used instead
as they are more flexible.
No special configuration is required in order to place a call
using an H.323 ID or E.164 alias. The VCS follows the usual
process and searches for the ID or alias among its local
registrations and those of its Alternates. If no match is found,
it may forward the query on to its neighbors, depending on the
match and priority settings of each.
• IP address e.g. 10.44.10.1or 3ffe:80ee:3706::10:35
• E.164 alias e.g. 441189876432or 6432
• ENUM e.g. 441189876432or 6432
Each of these address types may require some configuration
of the VCS in order for them to be supported. The following
sections describe the configuration required for each address
type.
In order to make a call by dialing the destination endpoint’s
IP address, the call must be able to be routed via a VCS that
Direct. This could be the local VCS, or it could be one of its
neighbors (in which case the local VCS would route the call to
the neighbor, which would then place the call directly to the
IP address).
Dialing by H.3ꢁ3 or SIP URI
When a user places a call using URI dialing, they will typically
URI dialing makes use of DNS to locate the destination
endpoint. In order to support URI dialing on the VCS you must
configure it with at least one DNS server and at least one DNS
zone,
However, if the destination IP address is found in a local
subzone (i.e. it is an endpoint registered to the same VCS
as the endpoint making the call), then the call will be placed
regardless of the Calls to Unknown IP Addresses setting.
Full instructions on how to configure the VCS to support URI
Endpoints registered to a VCS Border Controller
Dialing by ENUM
Calls made by dialing the IP address of an endpoint registered
directly with a VCS Border Controller will be forced to route
through the VCS Border Controller. The call will therefore be
subject to any restrictions configured on that system.
ENUM dialing allows an endpoint to be contacted by a caller
dialing an E.164 number - a telephone number - even if that
endpoint has registered using a different format of alias. The
E.164 number is converted into a URI by the DNS system, and
the rules for URI dialing are then followed to place the call.
The ENUM dialing facility allows you to retain the flexibility of
URI dialing whilst having the simplicity of being called using
just a number - particularly important if any of your callers are
restricted to dialing via a numeric keypad.
In order to support ENUM dialing on the VCS you must configure
it with at least one DNS server and the appropriate ENUM
zone(s).
We recommend that endpoints register with an H.323 ID
that is in the form of a URI.
If you are calling from an unregistered endpoint, we do
not recommend dialing the destination endpoint using
its IP address. The presence of a firewall may disrupt
the call. Instead place the call to the VCS to which the
destination endpoint is registered as described in Calls from an
Full instructions on how to configure the VCS to support ENUM
!
!
D14049.01
07.2007
6ꢀ
Download from Www.Soanuals.com. All Manuals Search And Download.
TANDBERG VIDEO COMMUNICATION SERVER
ADMINISTRATOR GUIDE
CallProcessing
Hop Counts
Configuring Hop Counts
About Hop Counts
For full details on
other zone options,
see Configuring
Each search request is assigned a hop count value by the
system that initiates the search. Every time the request is
forwarded to another neighbor gatekeeper or proxy, the hop
count value is decreased by a value of 1. When the hop count
reaches 0, it will not be forwarded on any further.
To configure the hop count for a zone:
• VCS Configuration > Zones.
You will be taken to the Zones page.
Click on the name of the zone you wish to configure.
You will be taken to the Edit Zone page.
The hop count used in search requests initiated by the local
VCS is configurable on a zone-by-zone basis. This value will
apply to search requests originating from the local VCS and
sent to that zone. It will also override any existing hop counts in
requests being forwarded to that zone if the original hop count
is higher (if the hop count is lower than that set for the zone,
the lower value will apply).
In the Configuration section, in the Hop Count field, enter the hop count value you wish to use
for this zone.
For H.323, the hop count only applies to search requests.
For SIP, the hop count applies to all requests sent to a zone,
affecting the Max-Forwards field in the request.
The hop count value can be between 1 and 255.
The default is 15.
When dialing by URI or ENUM, the hop count used is
that for the associated DNS or ENUM zone via which the
destination endpoint was found.
D14049.01
07.2007
6ꢁ
Download from Www.Soanuals.com. All Manuals Search And Download.
TANDBERG VIDEO COMMUNICATION SERVER
ADMINISTRATOR GUIDE
Administrator Policy
Overview
Administrator Policy and Authentication
About Administrator Policy
The VCS allows you to set up a set of rules to control which calls are allowed, which are rejected,
and which are to be redirected to a different destination. These rules are known as Administrator
Policy.
Administrator Policy uses the source and destination of a call to determine the action to be taken.
part of a secure environment, any policy decisions based on the source of the call should only be
made when that source can be authenticated. Whether or not the VCS considers an endpoint to
be authenticated depends on the Authentication Mode setting of the VCS.
If Administrator Policy is enabled and has been configured, each time a call is made the VCS will
execute the policy in order to decide, based on the source and destination of the call, whether to
• proxy the call to its original destination
• redirect the call to a different destination
• reject the call.
Authentication Mode On
When Authentication Mode is set to On on the VCS, all endpoints and neighbors are required to
authenticate with it before calls will be accepted. In this situation, the VCS acts as follows:
You can set up an Administrator Policy in either of two ways:
An endpoint is considered to be authenticated when:
• by configuring basic administrator policy using the web interface. (Note that this will only allow
• it is a locally registered endpoint. (Because Authentication Mode is On, the registration will
you to Allow or Reject specified calls)
have been accepted only after the endpoint authenticated successfully with the VCS.)
• by uploading a script written in the Call Processing Language (CPL).
• it is a remote endpoint that is registered to and authenticated with a Neighbor VCS, and that
Neighbor in turn has authenticated with the local VCS.
An endpoint is considered to be unauthenticated when:
• it is a remote endpoint registered to a neighbor and that neighbor has not authenticated with
the VCS. This is regardless of whether or not the endpoint authenticated with the neighbor.
If a call is received from an unauthenticated neighbor or endpoint the call’s source aliases will be
removed from the call request and replaced with an empty field before the Administrator Policy
is executed. This is because there is a possibility that the source aliases could be forged and
therefore they should not be used for policy decisions in a secure environment. This means that,
when Authentication Mode is On and you configure policy based on the source alias, it will only
apply to authenticated sources.
Only one of these two methods can be used at any one time to specify Administrator
Policy. If a CPL script has been uploaded, this will disable use of the web interface to
configure administrator policy. In order to use the web interface, you must delete the CPL
script that has been uploaded.
Authentication Mode Off
When enabled, Administrator Policy is executed for all calls going through the VCS.
When Authentication Mode is set to Off on the VCS, calls will be accepted from any endpoint or
neighbor. The assumption is that the source alias is trusted, so authentication is not required.
Use Administrator Policy to determine which callers can make or receive calls via the VCS.
D14049.01
07.2007
Download from Www.Soanuals.c
6
om. All Manuals Search And Download.
3
TANDBERG VIDEO COMMUNICATION SERVER
ADMINISTRATOR GUIDE
Administrator Policy
Enabling the use of Administrator Policy
To enable Administrator Policy:
Administrator Policy Mode
• VCS Configuration > Policy > Administrator.
You will be taken to the Administrator
Policy page.
On: Administrator Policy is enabled. If a CPL
script has been uploaded, this policy will be
used. Otherwise, the policy configured via the
Administrator Policy section will be used.
Off: Administrator Policy is not in use.
Save
You must click here for any changes to the
Administrator Policy Mode to take effect.
Once you have enabled the use of
Administrator Policy, you must define
the policy to be used. This is done
either via the web interface or by uploading a
CPL script.
If Administrator Policy is on but a policy has
not been configured, then a default policy will
be applied that allows all calls, regardless of
source or destination.
D14049.01
07.2007
Download from Www.Soanuals.c
6
om. All Manuals Search And Download.
4
TANDBERG VIDEO COMMUNICATION SERVER
ADMINISTRATOR GUIDE
Administrator Policy
Configuring Administrator Policy via the Web Interface
To configure Administrator Policy using the
web interface:
Order
Each combination of Source and Destination
is compared, in the order shown, with the
details of the call being made until a match is
found. To move a particular item to higher or
• VCS Configuration > Policy > Administrator.
You will be taken to the Administrator
Policy page.
lower in the list, click on the
respectively.
and
icons
Source
You will not be able to use the web
The alias that the calling endpoint used to
identify itself when placing the call. This field
supports Regular Expressions.
interface to configure Administrator
!
Policy if a CPL file is already in place.
If this is the case, you will have the option to
Delete Existing file. Doing so will delete the
existing Administrator Policy and enable use
of the web interface for Administrator Policy
configuration.
Unauthenticated user
Check this box if you wish the new policy to
apply to all incoming calls where the endpoint
making the call is not either:
Administrator Policy
• locally registered and authenticated with
This section shows the web-configured
Administrator policy currently in place.
the VCS, or
• registered and authenticated to a neighbor
which in turn has authenticated with the
local VCS.
Delete
To remove one or more line items from the
list, check the box to the left of the item and
then click Delete.
Destination
The alias that the endpoint dialled to
make the call. This field supports Regular
Expressions.
Add New
Click to add the new item to the Policy. A new
row with empty fields for you to complete will
appear.
Action
Whether or not the call will be permitted.
Allow: if both the Source and Destination
aliases match those listed, call processing will
continue.
Commit
Updates the existing Administrator Policy with
the changes you have made.
Add
Adds the new item to the Administrator Policy.
Cancel
Reject: if both the Source and Destination
aliases match those listed, the call will be
rejected.
Returns to the Administrator Policy page
without adding the new item.
D14049.01
07.2007
Download from Www.Soanuals.c
6
om. All Manuals Search And Download.
5
TANDBERG VIDEO COMMUNICATION SERVER
ADMINISTRATOR GUIDE
Administrator Policy
Configuring Administrator Policy via a CPL script
Downloading policy files
Uploading a CPL Script
Download Policy file
You can use CPL scripts to configure
Click here to download the Administrator
Policy that is currently in place, as an XML-
based CPL script.
advanced Administrator Policy. To do this, you
must first create and save the CPL script as a
text file, after which you upload it to the VCS.
• if Administrator Policy has been configured
using a CPL script, this will show you the
script that was uploaded
• if Administrator Policy has been configured
using the web interface, this will show you
the CPL version of the policy
The CPL script cannot be uploaded via
the command line interface.
• if Administrator Policy is On but a policy
has not been configured, this will show you
the default CPL script that allows all calls.
About CPL XSD files
You may wish to download the file in
order to take a backup copy of the
Administrator Policy, or you may want
to use the web-configured Administrator Policy
as a starting point for a more advanced CPL
script.
The CPL script must be in a format supported
by the VCS. The Administrator Policy page
allows you to download the XML schemas
which are used to check the script before it
is uploaded to the VCS, so you can check in
advance that your CPL script is valid.
If you download a web-configured
Administrator policy as a CPL script
and then upload it back to the VCS
without editing it, the VCS will recognise the
file and automatically add each rule back into
the Administrator Policy section of the web
interface.
Select the new policy file
Enter the file name or Browse to the CPL
script you wish to upload.
Upload File
Download CPL XSD file
Once you have selected the file containing the
CPL script, click here to upload it to the VCS.
Downloads the XML schema used for the CPL
script.
Download CPL Extensions XSD file
For information on the CPL syntax and
commands that are supported by the
Downloads the XML schema used for
additional CPL elements supported by the
VCS.
D14049.01
07.2007
Download from Www.Soanuals.c
6
om. All Manuals Search And Download.
6
TANDBERG VIDEO COMMUNICATION SERVER
ADMINISTRATOR GUIDE
UserPolicy
About User Policy
Process Overview
Recommendations When Deploying FindMe
What is User Policy?
When the VCS receives a call for a particular alias, it checks
to see whether User Policy has been enabled. If so, the VCS
queries the User Policy Manager to see whether that alias is
listed as a FindMe name. If so, the call is forwarded to the
endpoints according to the User Policy set up for that FindMe
alias.
• The FindMe name should be in the form of a URI, and should
User Policy is the set of rules that determines what happens to
a call for a particular user or group when it is received by the
TANDBERG VCS.
be the individual’s primary URI.
• Endpoints should not register with an alias that is the
same as an existing FindMe name. You can prevent this by
including all FindMe names on the Deny List.
The VCS’s User Policy is based on the use of TANDBERG’s
FindMe™. This feature lets you assign a single “FindMe”
name to individuals or groups in your enterprise. Users can
determine which devices will be called when their FindMe name
is dialled, and can also specify what happens if those devices
are busy or go unanswered.
For example, users at Example.com would have a FindMe
endpoints would be registered in a slightly different format,
for example their office endpoint would be registered with the
then be included in the list of devices to ring when the FindMe
name is called.
If User Policy has not been enabled, or the alias is not present
in the User Policy Manager, the VCS will continue to search for
the alias in the usual manner, i.e. first locally and then sending
the request out to neighbors.
The FindMe feature means that potential callers can be given
a single FindMe Alias on which they can contact an individual
or group in your enterprise - callers won’t have to know details
of all the devices on which that person or group might be
available.
User Policy is invoked after any Administrator Policy
configured on the VCS has been applied.
How are Devices Specified?
Who Must do What Before FindMe™ Can Be Used?
User Policy Manager
When configuring their FindMe account, users are asked to
specify the devices to which calls to their FindMe name will be
routed.
FindMe™ is an optional feature on the VCS, and you must
install the appropriate option key before it can be used.
Contact your TANDBERG representative for more information.
The User Policy Manager is the application that manages the
FindMe user accounts.
The VCS has its own User Policy Manager. However, you also
have the option to use a User Policy Manager on a remote
system.
While it is possible to specify aliases and even other FindMe
names as one of the devices, we recommend that this is not
done. Instead we recommend that users specify the physical
devices they wish to ring when their FindMe name is called.
The following steps are required for the use of FindMe one the
option has been installed:
or group who require a FindMe name.
D14049.01
07.2007
Download from Www.Soanuals.c
6
om. All Manuals Search And Download.
7
TANDBERG VIDEO COMMUNICATION SERVER
ADMINISTRATOR GUIDE
UserPolicy
Enabling User Policy on the VCS
Mode
Configuring User Policy Manager
Determines whether or not User Policy will be
enabled, and if so, the location of the User
Policy Manager.
To configure the User Policy Manager:
• VCS Configuration > Policy > User.
You will be taken to the User Policy page.
Off: User Policy is not enabled.
Local: User Policy is enabled and the VCS’s
own User Policy Manager is used.
Remote: User Policy is enabled and a User
Policy Manager located on another system
is used. If you select this option, further
configuration options will appear (see below).
Protocol
The protocol used to connect to the remote
User Policy Manager.
Address
The IP address or domain name of the remote
User Policy Manager.
Path
The URL of the remote User Policy Manager.
Username
The username used by the VCS to log in and
query the remote User Policy Manager.
Password
The password used by the VCS to log in and
query the remote User Policy Manager.
Administrator Policy will always be
applied regardless of the User Policy
mode.
Save
Click here to save your changes.
D14049.01
07.2007
Download from Www.Soanuals.c
6
om. All Manuals Search And Download.
8
TANDBERG VIDEO COMMUNICATION SERVER
ADMINISTRATOR GUIDE
UserPolicy
Managing FindMe User Accounts
Creating a New User Account
• VCS Configuration > Policy > User Accounts.
You will be taken to the User Accounts page.
Select New.
Once a new account has been created,
calls to the FindMe name for that
account will be rejected until one or
About User Accounts
FindMe user accounts must be created by
the VCS Administrator before they can be
accessed and configured by users.
!
more devices have been configured for that
account.
You will be taken to the Create User Account page.
Each user account is accessed via a
username and password associated with a
specific FindMe name.
Username
The name of the user for whom you are
creating an account. This is the name they
will use to log in when configuring their
FindMe options.
FindMe name
The FindMe name on which the user can be
contacted.
The FindMe name can be any string of up to
60 characters. However, not all endpoints are
able to dial aliases with spaces or other non-
alphanumeric characters so we recommend
that these are not used in your FindMe
names.
Initial password
The password to be used along with the
Username when logging into this account.
Confirm password
Retype the password.
Save
Cancel
Click here to create the new account and
return to the User Accounts page.
Click here to return to the User Accounts page
without creating the new account,
D14049.01
07.2007
Download from Www.Soanuals.c
6
om. All Manuals Search And Download.
9
TANDBERG VIDEO COMMUNICATION SERVER
ADMINISTRATOR GUIDE
UserPolicy
Managing FindMe User Accounts
New password
Changing a User Password
Type the new password to be used along with
the Username when logging into this account.
You can change a password on behalf of a
user without knowing their existing password.
This is useful when the user has forgotten
their password.
To change the password:
• VCS Configuration > Policy > User Accounts.
You will be taken to the User Accounts
page.
Confirm password
Click on the user account whose password
you wish to change.
Retype the new password.
You will be taken to the Edit User Account
page.
Viewing Existing User Account
Settings
To view the configuration of an existing user
account:
Cancel
Click here to return to the User Accounts page
without changing the password,
• VCS Configuration > Policy > User Accounts.
You will be taken to the User Accounts
page.
Click on the user account whose password
you wish to change.
You will be taken to the Edit User Account
page.
Restore to Default
Click here to delete any existing configuration
for this FindMe name. This will have the
effect that any calls to that FindMe name
will be rejected until one or more devices are
reconfigured for that account.
FindMe Configuration for...
This section shows you the current
configuration for the user.
Change Password
Click here to update the password and return
to the User Accounts page.
D14049.01
07.2007
Download from Www.Soanuals.c
7
om. All Manuals Search And Download.
0
TANDBERG VIDEO COMMUNICATION SERVER
ADMINISTRATOR GUIDE
UserPolicy
Managing FindMe User Accounts
Tick the box next to the account you wish to
delete.
Deleting a User Account
To change delete a FindMe user account:
• VCS Configuration > Policy > User Accounts.
You will be taken to the User Accounts
page.
Delete
Click here to delete the selected accounts.
Are you sure...?
A confirmation window will appear to ensure
that you wish to proceed. Click OK to
continue.
D14049.01
07.2007
Download from Www.Soanuals.c
7
om. All Manuals Search And Download.
ꢀ
ADMINISTRATOR GUIDE
TANDBERG VIDEO COMMUNICATION SERVER
Using TANDBERG’s FindMe™
About your FindMe User Account
About FindMe™
Accessing the FindMe Configuration Page
The FindMe feature allows you as an individual or part of a
group to have a single name on which you can always be called,
and you chose where calls to that name will be routed. You can
also determine what happens if your first choices are either
busy or unanswered after a certain period of time.
To configure your FindMe user account, you must log in via a web browser, as described below:
Go to the FindMe link
provided to you by
your system administrator.
For example, you could set up your individual FindMe name so
that it will call you on your desktop videophone first. If there’s
no answer after 10 seconds it will divert the call to your mobile
phone, and if your desktop phone is busy it will divert the call to
your colleague’s desktop videophone.
This will take you to the
Login page.
Select User Login.
Alternatively, you could have a single FindMe name for your
team, and set it up so that all the team member’s desktop
videophones will ring when anyone calls the FindMe name.
FindMe User Accounts
Each FindMe name has an associated user account. Your
FindMe user account is set up by your system administrator.
Once this has been done, you can log in to your account via a
web interface and configure it with details of the device(s) on
which you want to be contacted:
Enter the Username
and Password
provided to you by your
System Administrator.
Select Login.
• when a call is first placed to your FindMe name
• if any or all of your first choice of devices are busy
• if all of your first choice of devices are unanswered
You can update these details as often as you wish.
Individual versus Group FindMe
There are two types of FindMe names: individual and group.
You will be taken to
the FindMe page.
From here you can configure
either an individual or a
group.
The only difference between the two is what happens if one of
the devices in the initial list is busy.
For individuals, it is assumed that you will only be able to take
calls on one device at a time, therefore if any devices in your
Primary list are busy, the call will immediately divert to the
device(s) in your Busy list.
For groups, it is assumed that more than one person is
available to take calls, so the call will only divert to the device(s)
in the Busy list if all devices in the Primary list are engaged.
D14049.01
07.2007
Download from Www.Soanuals.c
7
om. All Manuals Search And Download.
ꢁ
TANDBERG VIDEO COMMUNICATION SERVER
Using TANDBERG’s FindMe™
ADMINISTRATOR GUIDE
Configuring your FindMe User Account
Primary Devices
If no devices are configured for a
FindMe name, all calls to that name
will be rejected.
!
List the all the device(s) that will ring when
your FindMe name is first dialled.
If more than one device is listed here, they will
all ring at the same time.
Username
The username for this FindMe account.
Ring the primary devices
Select the amount of time in seconds you
wish the devices in the Primary list to ring
before the call is diverted. Alternatively, you
can specify that the devices will ring until the
caller hangs up.
FindMe name
The FindMe name being configured.
Type
Select whether this FindMe name is to apply
to an individual or a group of people. This
will affect how calls are diverted to the Busy
devices.
No Answer Devices
List all the device(s) that will ring if none of the
devices in the Primary list are answered within
the specified time.
If no devices are listed here, the caller will
receive a “no answer” response if none of the
Primary devices are answered.
Change Password
Click here to change the password used to
access your FindMe account. You will be
taken to a new page where you can enter the
new password.
If you have selected a Timeout period of ring
until caller hangs up, you will not be able to
list any devices here.
Log Out
Save Changes
Click here to update your FindMe account with any changes.
Busy Devices
Ensure that none of
the Primary devices
are set to
Click here to exit the FindMe account
configuration page.
For an individual, list all the device(s) that will
ring immediately if any of the devices in the
Primary list are busy.
Autoanswer. If they are, the
system will consider the call
to have been answered when
Autoanswer is initiated, and
so it will not divert the call to
any other devices.
Adding a device to a list
Removing
For a group of people, list all the device(s) that
will ring immediately if all of the devices in the
Primary list are busy. (If some of the devices
in the Primary list are busy, the rest will
continue to ring for the specified time before
the call will divert to the devices listed here.)
a device
You can have up to five devices in each list. To add a device to any of the lists, enter one of the
following in any of the available fields:
To remove
a device
from a
list, simply
delete the
text from
the relevant
field.
• for video endpoints: enter any URL or alias with which the device is registered.
• for 3G mobile phones: to route video to your mobile phone, you must have a 3G gateway - enter
the gateway’s prefix followed by the mobile phone number. To route voice only, enter the mobile
phone number along with any prefixes required by your dial plan for external calls.
If no devices are listed in this section, the
caller will get a busy response if any/all of the
Primary devices are busy.
• for telephones: enter the extension number (for internal calls) or telephone number, along with
any necessary prefixes.
D14049.01
07.2007
Download from Www.Soanuals.c
7
om. All Manuals Search And Download.
3
TANDBERG VIDEO COMMUNICATION SERVER
AliasSearching and Transforming
ADMINISTRATOR GUIDE
Overview of Searches and Transforms
Transforming an Alias Before Searching Locally
About Searches
About Local Alias Transforms
Local zone alias
transforms will be
applied prior to any
One of the VCS’s functions is to process incoming requests to search for a particular alias. These
search requests are received from
The local alias transform function allows you to modify the alias
in an incoming search request before conducting the search
locally. It applies to all incoming search requests from locally
registered endpoints and from neighboring VCSs. It does not
apply to search requests from Alternates.
possible CPL modification
and Zone transforms. These
alias transforms will not
have any effect on aliases
presented in GRQ or RRQ
messages.
• locally registered endpoints
• Alternates
• neighbor zones, including traversal clients and traversal servers.
Regardless of the origin of the request, the VCS will always follow a set sequence of steps when
searching for an alias, stopping as soon as the alias has been found or moving on to the next step
if it has not. The steps are as follows:
Each local alias transform defines a string against which an
alias is compared, and the changes to make to the alias if it
matches that string.
ꢀ. The VCS searches its local zone to see if the alias belongs to any endpoints registered directly
to it.
ꢁ. The VCS forwards the search request to all its Alternates.
3. The VCS forwards the search request to its neighboring zones. Which zones are searched, and
Local Alias Transform Process
Up to 100 local alias transforms can be configured. Each
transform must have a unique priority number between 1 and
65534.
If you add a new
transform that has
the same priority as
an existing transform, all
transforms with a lower
priority will be moved down
the list, and the new
transform will be added with
the specified priority.
However, if there are not
enough slots left to move all
the priorities down, then you
will get an error message.
Every incoming alias is compared with each transform in order
of priority, starting with that closest to 1. If and when a match
is made, the transform is applied to the alias and no further
checks or transformations of the new alias will take place. The
new alias is then searched for locally.
About Transforms
The VCS allows you to transform the alias in a search request if it matches certain criteria. This
transformation can be applied to the alias at two points in the search process:
You can transform the alias by removing or replacing its prefix, suffix, or the entire string, and by
the use of regular expressions.
If the Transformed Alias is Not Found Locally
If the new alias is not found locally, the search is expanded first to Alternates and then to
neighbors.
• When an Alternate is queried, it will identify that the request has come from one of its own
Alternates and will search for the transformed alias locally without applying any further
transforms.
• When neighbors are queried, you can specify further transforms to be applied prior to sending
out the search request. The neighbor’s configuration may also be such that it will transform
the alias before searching for it locally.
All Alternates should be configured identically, including any local zone transforms.
However, this means that an alias that was not found locally would be transformed twice -
once before the local zone was searched and again after being sent to the Alternate,
before the Alternate searched its own local zone. To prevent this, a VCS is able to determine
whether a search request has come from one of its Alternates and if so will not transform the alias
before searching for it locally.
D14049.01
07.2007
Download from Www.Soanuals.c
7
om. All Manuals Search And Download.
4
TANDBERG VIDEO COMMUNICATION SERVER
AliasSearching and Transforming
ADMINISTRATOR GUIDE
Transforming an Alias Before Searching Locally: Configuration
Pattern string
Configuring Local Alias Transforms
Specifies the pattern against which the alias
is compared.
To configure local alias transforms:
• VCS Configuration > Transforms.
You will be taken to the Transforms page.
Click New.
You will be taken to the Create Transform
page.
Priority
Assigns a priority to this transform.
Transforms are applied in order of priority,
and the priority must be unique for each
transform.
Pattern type
Determines the way in which the string must
match the alias. Options are:
Exact: the string must match the alias
character for character.
Prefix: the string must appear at the beginning
of the alias.
Suffix: the string must appear at the end of
the alias.
Regex: the string will be treated as a regular
expression.
Pattern behavior
Determines how the matched part of the alias
will be modified. Options are:
Strip: the matching prefix or suffix will be
removed from the alias.
Create Transform
Cancel
Replace string
(applies only if Pattern
Behavior is set to Replace)
Local transforms support the use of
Regular Expressions. See the
Appendix Regular Expression
Replace: the matching part of the alias will be
substituted with the text in the Replace String.
Click here to save the
transform and return to the
Transforms page.
Click here to return to the
Transforms page without
adding the new transform.
Reference for more information.
Specifies the string to be
used as a substitution for
the part of the alias that
matched the pattern.
D14049.01
07.2007
Download from Www.Soanuals.c
7
om. All Manuals Search And Download.
5
ADMINISTRATOR GUIDE
TANDBERG VIDEO COMMUNICATION SERVER
AliasSearching and Transforming
Zone Searching and Transforming
About Zone Searching
About Zone Transforms
Zone Search and Transform Process
The VCS allows you to filter the search requests sent to each
zone, and prioritize the order in which zones are searched. This
allows you to reduce the potential number of search requests
sent out, and speed up the search process.
The VCS allows you to change the alias being searched for
before a search request is sent out to a particular zone. This
feature uses the PatternMatch mode of the zone search
function.
Zones are queried when an alias has not been found locally.
The search and transform process is as follows:
ꢀ. The VCS looks at all matches for all zones to find all those
with either:
The VCS uses the concept of zone “matches” when filtering
search requests to zones. Each zone has up to five
configurable “matches” available to it. Each match is assigned
a Mode and Priority (described below). The combination of the
two determines if and when that zone will be queried.
To set up a zone transform, you must:
• a Mode of AlwaysMatch, or
• configure the zone with a Mode of PatternMatch
• a Mode of PatternMatch and a Pattern String that
• specify the pattern that the alias to be transformed must
matches the alias being searched for.
match
ꢁ. These matches are listed in order of the Priority that has
• specify the way in which the alias will be transformed.
been assigned to them.
All searches sent to that zone that match the specified pattern
will then be transformed and the zone will be queried using the
new alias.
3. If there are any duplicates in the list, the entry with the
lower Priority is removed. (This applies to a zone with the
same pattern string and the same transform but different
priorities.)
Mode
The match Mode allows you to specify whether and how you will
filter requests to the zone. Alternatively, you can use this mode
to prevent search requests from ever being sent to the zone.
4. If there is a zone which has an AlwaysMatch as well as
a PatternMatch with no transforms, the PatternMatch is
removed from the list.
Each zone has up to five configurable matches. This
means that you can specify up to five different
transforms for each zone. This could be:
The Mode options are:
5. All zones with a Priority 1 match on the list are queried.
For AlwaysMatch matches, the query will use the original
alias; for PatternMatch matches the query will use the alias
specified by the transform rules.
AlwaysMatch: always query the zone
• one alias transformed five different ways
• five aliases each transformed individually
• a combination of both.
PatternMatch: only query the zone if the alias being searched
for matches a specified pattern
Disabled: never query the zone (this mode does not need a
corresponding Priority option).
6. If the alias is found, the call will be forwarded to that zone.
If the alias is found by more than one zone, the call will be
forwarded to the zone that responded first.
7. If the alias is not found, all zones with a Priority 2 match are
Using Zone Searches and Transforms Together
The zone searching feature and the zone transforms feature
both make use of the PatternMatch mode. You can use these
two features together or separately.
queried as per steps 5 and 6.
Priority
8. The process is repeated until either:
The match Priority allows you to specify when in the search
process that zone will be queried. Search requests are sent to
all zones with a Priority 1 match first, followed by all zones with
Priority 2 matches, and so on.
• the alias is found, or
The remainder of this section:
• all zones with a match that meets the specified criteria
have been queried.
could be used together.
It is possible for the same priority to be given to more
than one match, either in the same zone or in different
zones. In this case, all zones with that match priority
will be queried at the same time.
D14049.01
07.2007
Download from Www.Soanuals.c
7
om. All Manuals Search And Download.
6
TANDBERG VIDEO COMMUNICATION SERVER
AliasSearching and Transforming
ADMINISTRATOR GUIDE
Zone searching and alias transforming: configuration
Mode
Configuring Zone Searches and
Transforms
To configure when a zone will be searched and
any transforms that will be applied before the
search request is sent:
Determines if and when a query will be sent to
this zone. Options are:
AlwaysMatch: the zone will always be queried.
PatternMatch: the zone will only be queried
if the alias queried for matches the specified
Pattern String.
• VCS Configuration > Zones.
You will be taken to the Zones page.
Click on the zone you wish to configure.
You will be taken to the Edit Zone page.
Scroll down until you get to the Match1
section.
Disabled: the zone will never be queried.
Priority
Determines the order in which the zone
will be sent a search request. Zones with
priority 1 matches are searched first, followed
by priority 2, and so on. More than one
match can be assigned the same priority;
in this case the matches will be queried
simultaneously.
You can configure up to five different Matches
(i.e. search/transform combinations) for each
zone.
Pattern string
(Applies only if the Mode is PatternMatch.)
Specifies the pattern against which the alias
is compared.
Pattern type
(Applies only if the Mode is PatternMatch.)
Default Settings
When a new zone is created, by default
Match1 will be set to AlwaysMatch with a
Priority of 100. All remaining matches will be
set to Disabled. This means that the zone
will be queried for the original alias, with no
transforms applied.
Determines the way in which the string must
match the alias. Options are:
Exact: the string must match the alias
character for character.
Replace string
(Applies only if the Mode is PatternMatch and
Pattern Behavior is Replace.)
Pattern behavior
(Applies only if the Mode is PatternMatch.)
Prefix: the string must appear at the beginning
of the alias.
Determines if and how the matched part of
the alias will be modified. Options are:
Specifies the string to be used as a
substitution for the part of the alias that
matched the pattern.
Suffix: the string must appear at the end of
the alias.
Leave: the alias will not be modified.
Strip: the matching prefix or suffix will be
removed from the alias.
Zone transforms support the use of
Regular Expressions. See the
Appendix Regular Expression
Regex: the string will be treated as a regular
expression.
Replace: the matching part of the alias will be
substituted with the text in the Replace String.
Reference for more information.
D14049.01
07.2007
Download from Www.Soanuals.c
7
om. All Manuals Search And Download.
7
TANDBERG VIDEO COMMUNICATION SERVER
AliasSearching and Transforming
ADMINISTRATOR GUIDE
Examples
Combining Match Types and Priorities
Never Query a Zone
Always Query a Zone, Never Apply Transforms
By using both AlwaysMatch and PatternMatch matches in the
same zone, and applying the same or different priorities to each
match, you will have a great deal of flexibility in determining if
and when the zone will be queried and whether any transforms
will be applied. Some example configurations are given here.
To configure the zone so that it is never sent an alias search
request, set all 5 matches to a Mode of Disabled.
To configure the zone so that it is always sent search requests
using the original alias, set the following:
The AlwaysMatch mode does not support alias
transforms. Should you wish to always query a zone
using a different alias to that received, you will need to
use a mode of PatternMatch in combination with a regular
expression.
D14049.01
07.2007
Download from Www.Soanuals.c
7
om. All Manuals Search And Download.
8
ADMINISTRATOR GUIDE
TANDBERG VIDEO COMMUNICATION SERVER
AliasSearching and Transforming
Examples
Changing the Prefix or
Suffix Before Querying
Filter Queries to a Zone
Without Transforming
It is possible to direct an
incoming search request to
a different alias by replacing
either the prefix or the suffix
of the alias with a new
string.
It is possible to filter the
search requests sent to
a zone so that it is only
queried for aliases that
match a particular criteria.
For example, all endpoints
in your regional sales office
are registered to their
local VCS with a suffix of
@sales.example.com.
For example, your know that
endpoints in a neighbor
zone are registered to their
local VCS with aliases in two
different formats:
In this situation, it makes
sense for your head office
VCS to query the sales office
VCS only when it receives a
search request for an alias
with a suffix of @sales.
example.com. Sending any
other search requests to this
particular VCS would take up
resources unnecessarily.
You want to ensure
that if anyone dials
[email protected] from
one of your locally registered
endpoints, they will be able
to find that person at user@
example.com, and vice
versa.
To achieve this, on your local
VCS create and configure the
zone representing the sales
office VCS as shown:
To achieve this, on your
local VCS configure the zone
representing the neighbor
VCS as shown:
D14049.01
07.2007
Download from Www.Soanuals.c
7
om. All Manuals Search And Download.
9
ADMINISTRATOR GUIDE
TANDBERG VIDEO COMMUNICATION SERVER
AliasSearching and Transforming
Examples
Query a Zone for
Both Original and
Transformed Alias
Query a Zone for Two
or More Transformed
Aliases
You may wish to query a
zone for the original alias at
the same time as you query
it for a transformed alias. To
do this, configure one match
with a mode of AlwaysMatch,
and a second match with a
mode of PatternMatch along
with details of the transform
to be applied. Both matches
must be given the same
Priority level.
Zones are queried in order
of priority of the matches
configured within them.
It is possible to configure a
single zone with up to five
PatternMatch matches, each
with the same Priority and
with an identical Pattern
String to be matched,
but each with a different
replacement pattern. In this
situation, the VCS will query
that zone for each of the new
aliases simultaneously. (Any
duplicate aliases produced
by the transforms will be
removed prior to the search
requests being sent out.)
For example, you may wish
to query a neighbor zone for
both a full URI and just the
name (i.e. the URI with the
domain removed).
To achieve this, on your
local VCS configure the zone
representing the neighbor
VCS as shown:
If any of the new aliases
are found by that zone, the
call will be forwarded to
the zone. It is then up to
the controlling system to
determine the alias to which
the call will be forwarded.
D14049.01
07.2007
Download from Www.Soanuals.c
8
om. All Manuals Search And Download.
0
TANDBERG VIDEO COMMUNICATION SERVER
URIDialing
ADMINISTRATOR GUIDE
URI Dialing Overview
About URI Dialing
URI Resolution Process via DNS
Enabling URI Dialing via the VCS
where name is the alias and example.com is the domain.
When a system is attempting to locate a destination URI
address using the DNS system, the general process is as
follows:
URI dialing is enabled separately for outgoing and incoming
calls.
URI dialing makes use of DNS to enable endpoints registered
with different systems to locate and call each other. With URI
dialing, it is possible to find an endpoint by using DNS to locate
the domain in the URI address and then query that domain for
the alias.
ꢀ. The system will send a query (via its DNS server) for a
SRV record for the domain in the URL. If available, this
SRV record will return information about the authoritative
gatekeeper (H.323) or proxy (SIP) for that domain (e.g. its
FQDN and listening port).
Outgoing Calls
To enable endpoints registered to your VCS to place calls
directly using URI dialing, you must:
This is described in the section Configuring URI dialing for
Without URI dialing, you would need to neighbor all the systems
to each other in order for one system to be able to locate an
endpoint registered to another system. This does not scale
well as the number of systems grows. It is also inconvenient
for making one-off calls to endpoints registered with previously
unknown systems.
The system will then send out another query for an A/AAAA
record for the FQDN returned in the SRV record. If available,
this will return the actual IP address of the gatekeeper/
proxy. Once its IP address has been discovered, the system
will query that gatekeeper/proxy for the URI.
Incoming Calls
To enable endpoints registered to your VCS to receive calls
directly using URI dialing, you must:
ꢁ. If a relevant SRV record cannot be located, the system will
fall back to looking for an A or AAAA record for the domain in
the URL. If such a record is found, the call will be routed to
that IP address.
Endpoints must register with the VCS using a URI address in
order to be reachable using URI dialing.
• ensure all endpoints are registered with a URI address
• configure appropriate DNS records, depending on the
protocols and transport types you wish to use.
This is described in the section Configuring URI dialing for
Firewall Traversal Calls
To configure your system so that you can place and receive
calls using URI dialing through a firewall, see the section URI
If a DNS zone and/or a DNS server have not been
configured on the local VCS, calls made using URI
dialing could still be placed if the local VCS is
neighbored with another VCS that has been appropriately
configured. Any URI dialed calls will go via the neighbor. This
configuration is useful if you want all URI dialing to be made via
one particular system, e.g. a VCS Border Controller.
D14049.01
07.2007
Download from Www.Soanuals.c
8
om. All Manuals Search And Download.
ꢀ
TANDBERG VIDEO COMMUNICATION SERVER
URIDialing
ADMINISTRATOR GUIDE
URI Dialing for Outgoing Calls
Configuring Matches for DNS Zones
Process
When a user places a call using URI dialing, they will typically dial an address in the form name@
example.com from their endpoint. Below is the process that is followed when a URI address is
dialed from an endpoint registered with your VCS:
If you wish locally registered endpoints to be able to place URI calls via the VCS, then at a
minimum you should configure a DNS zone with a match that has a Mode of AlwaysMatch. This
will result in DNS always being queried, but will mean it is queried for all aliases, not just URI
addresses.
ꢀ. The VCS will check its own list of registrations, and those of its Alternates, to see if the
address is registered locally.
To filter the queries sent to the DNS server:
ꢁ. If the address is not registered locally, the VCS will check all its zones to see if any of them are
• configure a DNS zone with a match that has a Mode of PatternMatch
• use the Pattern string and Pattern type fields to define the aliases that will trigger a DNS query.
configured with either:
• an AlwaysMatch, or
For example, a match with a Pattern string of *@* and a Pattern type of Regex will mean that DNS
• a PatternMatch with a pattern that matches the URI address.
These zones will then be queried in priority order for the URI.
is only queried for aliases in the form of typical URI addresses.
To set up further filters, configure the remaining matches in the same DNS zone. You don’t need
to create new DNS zones unless you want to configure more than the maximum of 5 matches.
3. If one or more of the zones that contain a match are neighbor zones, the neighbor will be
queried for the URI. If the neighbor supports URI dialing, it may route the call itself.
You should create separate DNS zones if you want to filter based on the protocol (SIP or H.323) or
hop count to be used.
4. If one or more of the zones that contain a match are DNS zones, this will trigger the VCS to
attempt to locate the endpoint through a DNS lookup. It does this by querying the DNS server
5. If the domain part of the URI address was resolved successfully using an H.323 Location SRV
record (i.e. for _h323ls)then the address returned is queried via an LRQ for the full URI
address.
6. If the domain part of the URI address was resolved using an H.323 Call SRV record (i.e. for
_h323cs) or an A/AAAArecord lookup then the call is routed directly to the IP address
returned in that record. An exception to this is where the original dial string has a port
specified (e.g. user@example.com:1720) in which case the address returned is queried via
an LRQ for the full URI address.
7. If the domain part of the URI address was resolved successfully using a SIP SRV record (i.e. for
_sip)then the request is forwarded to the address returned.
D14049.01
07.2007
Download from Www.Soanuals.c
8
om. All Manuals Search And Download.
ꢁ
ADMINISTRATOR GUIDE
TANDBERG VIDEO COMMUNICATION SERVER
URIDialing
URI Dialing for Outgoing Calls
Name
Adding and Configuring DNS Zones
Assigns a name to this zone.
In order for locally registered endpoints to
use URI dialing through the VCS, you must
configure at least one DNS zone. To do this:
• VCS Configuration > Zones.
You will be taken to the Zones page.
Click New.
Type
For DNS zones, this will be DNS.
You will be taken to the Create Zone page.
Enter a Name for the zone and select a
Type of DNS.
Click Create Zone.
You will be taken to the Edit Zone page.
Hop count
Specifies the hop count to be used when
sending an alias search request to this zone.
If the search request was received from
another zone and already has a hop count
assigned, the lower of the two values will be
used.
H.323 mode
Determines whether or not H.323 calls will be
allowed to this zone.
SIP mode
Determines whether or not SIP calls will be
allowed to this zone.
Match1 - Match5
Normal zone pattern matching and
prioritization rules will apply to DNS
zones.
These sections allow you to specify any
filtering criteria you wish to apply to this zone.
full information on how the Match options can
be used.
When dialing by URI, the hop count
used is that configured for the DNS
zone that matches the URI address.
If there is no DNS zone configured that
matches the URI address, then the query may
be forwarded to a neighbor. In this case, the
hop count used will be that configured for the
neighbor zone.
D14049.01
07.2007
Download from Www.Soanuals.c
8
om. All Manuals Search And Download.
3
TANDBERG VIDEO COMMUNICATION SERVER
URIDialing
ADMINISTRATOR GUIDE
URI Dialing for Outgoing Calls
Address 1 to Address 5
Configuring DNS Servers
Enter the IP address(es) of up to 5 DNS
servers that the VCS will query when
attempting to locate a domain.
To configure the DNS servers to be used by
the VCS when querying DNS:
• System Configuration > DNS.
You will be taken to the DNS page.
In order for endpoints registered to the
VCS to make outgoing calls using URI
dialing, you must configure at least
one DNS server for the VCS to query. For
resilience, you can specify up to five DNS
servers.
The DNS server(s) configured here are
used as part of both the ENUM dialing
and URI dialing processes.
D14049.01
07.2007
Download from Www.Soanuals.c
8
om. All Manuals Search And Download.
4
TANDBERG VIDEO COMMUNICATION SERVER
URIDialing
ADMINISTRATOR GUIDE
URI Dialing for Incoming Calls
SRV Record Format
Types of DNS Records Required
The ability of the VCS to receive incoming calls made via URI
dialing relies on the presence of DNS records for each domain
the VCS is hosting.
_Service._Proto.Name TTL Class SRV Priority Weight Port Target
For the VCS, these will be as follows:
These records can be of various types including:
• _Service and _Proto will be different for H.323 and SIP, and will depend on the protocol and transport type being used.
• Nameis the domain in the URI that the VCS is hosting (e.g. example.com)
• Portis the port on the VCS that has been configured to listen for that particular service and protocol combination
• Targetis the FQDN of the VCS.
• A records, which provide the IPv4 address of the VCS
• AAAA records, which provide the IPv6 address of the VCS
• Service (SRV) records, which specify the FQDN of the VCS
and the port on it to be queried for a particular protocol and
transport type.
As a preference, SRV records should be used, and you should
provide an SRV record for each combination of domain hosted
and protocol and transport type enabled on the VCS.
Configuring H.3ꢁ3 SRV Records
gatekeepers and endpoints and for resolving H.323 URL aliases. It also defines
parameters for use with the H.323 URL.
Configuring SIP SRV Records
used to resolve a SIP URI into the IP address,
port, and transport protocol of the next hop to
contact.
The VCS supports two types of SRV record as defined by this Annex. These are
Location and Call, with _Serviceset to _ h323lsand _ h323csrespectively.
Process
If you wish the VCS to be contactable via
SIP URI dialing, you should configure an SRV
record for each SIP transport protocol enabled
on the VCS (i.e. UDP, TCP or TLS) as follows:
When an incoming call has been placed using URI dialing, the
VCS will have been located by the calling system via one of the
DNS record lookups described above. It will receive the request
VCS will then check its local registrations and FindMe names
and if any are an exact match, the call will be routed to the
appropriate device(s).
If you wish the VCS to be contactable via H.323 URI dialing, you should provide
at least a Location SRV record, as it provides the most flexibility and the
simplest configuration.
• _Serviceis _ sip
• _Protois one of _ udp, _tcp, or _tls
• Portis the port number that has been
configured via VCS Configuration > Protocols
> SIP as the port for that particular
transport protocol.
Location SRV Records
For each domain hosted by the VCS, you should configure a Location SRV record
as follows:
• _Serviceis _ h323ls
• _Protois _ udp
In order for locally registered endpoints to be reached
using URI dialing, they must register using a full URI.
This applies to both SIP and H.323 endpoints. If
endpoints do not register using a full URI, they will be
discoverable only by the VCS to which they are registered, and
any neighbor VCSs.
• Portis the port number that has been configured via VCS Configuration >
Protocols > H.323 as the Registration UDP port.
Call SRV Records
Call SRV records (and A/AAAA records) are intended primarily for use by
endpoints which cannot participate in a location transaction, exchanging LRQ
and LCF. The configuration of a Call SRV record should be as follows:
Several mechanisms could have been used to locate the
VCS. You may wish to enable calls placed to
user@VCS_IP_address to be routed to an existing
IP address of the VCS from the incoming URI and replace it with
the domain name of example.com.
• _Serviceis _ h323cs
• _Protois _tcp
• Portis the port number that has been configured via VCS Configuration >
Protocols > H.323 as the Call signaling TCP port.
D14049.01
07.2007
Download from Www.Soanuals.c
8
om. All Manuals Search And Download.
5
ADMINISTRATOR GUIDE
TANDBERG VIDEO COMMUNICATION SERVER
URIDialing
URI Dialing for Incoming Calls
URI Dialing and Firewall Traversal
Recommended Configuration
Example DNS Record Configuration
A company with the domain name example.com wants to enable incoming H.323 and SIP calls
FQDN vcs.example.com.
If URI dialing is being used in conjunction with firewall traversal, DNS zones and DNS Servers
should be configured on the VCS Border Controller and any VCSs on the public network only. VCSs
behind the firewall should not have any DNS zones or servers configured. This will ensure that
any outgoing URI calls made by endpoints registered with the VCS will be routed through the VCS
Border Controller.
Their DNS records would typically be as follows:
• SRV record for _h323ls._udp.example.comreturns vcs.example.com
• SRV record for _h323cs._tcp.example.comreturns vcs.example.com
• SRV record for _sip._udp.example.comreturns vcs.example.com
• SRV record for _sip._tcp.example.comreturns vcs.example.com
• SRV record for _sip._tls.example.comreturns vcs.example.com
• A record for vcs.example.comreturns the IPv4 address of the VCS
• AAAA record for vcs.example.comreturns the IPv6 address of the VCS
In addition, the DNS records should be configured with the address of the VCS Border Controller
This ensures that incoming calls placed using URI dialing enter the enterprise through the VCS
Border Controller, allowing successful traversal of the firewall.
How you add the DNS records depends on the type of DNS server you are using. Instructions for
D14049.01
07.2007
Download from Www.Soanuals.c
8
om. All Manuals Search And Download.
6
TANDBERG VIDEO COMMUNICATION SERVER
ENUMDialing
ADMINISTRATOR GUIDE
ENUM Dialing Overview
About ENUM Dialing
ENUM Process
Enabling ENUM Dialing
ENUM dialing allows an endpoint to be contacted by a caller
dialing an E.164 number - a telephone number - even if that
endpoint has registered using a different format of alias.
When a system is attempting dial a destination endpoint using
ENUM, the general process is as follows:
ENUM dialing is enabled separately for incoming and outgoing
calls.
ꢀ. The user dials the E.164 number from their endpoint.
The E.164 number is converted into a URI by the DNS system,
and the rules for URI dialing are then followed to place the call.
Outgoing Calls
To allow locally registered endpoints to dial out to other
endpoints using ENUM, you must
ꢁ. The system converts the E.164 number into an ENUM
domain as follows:
The ENUM dialing facility allows you to retain the flexibility of
URI dialing whilst having the simplicity of being called using
just a number - particularly important if any of your callers are
restricted to dialing via a numeric keypad.
a. the digits are reversed and separated by a dot
• configure at least one ENUM zone, and
• configure at least one DNS Server.
b. the name of the domain that is hosting the NAPTR
records for that E.164 number is added as a suffix.
3. DNS is then queried for the resulting ENUM domain.
4. If a NAPTR record exists for that ENUM domain, this will
advise how the number should be converted into one (or
possibly more) H.323/SIP URIs.
Incoming Calls
5. The system then sends out another DNS query for that URI.
To enable endpoints in your enterprise to receive incoming calls
from other endpoints via ENUM dialing, you must configure a
DNS NAPTR record mapping your endpoints’ E.164 numbers
dialing for incoming calls for instructions on how to do this.
The VCS supports outward ENUM dialing by allowing you
to configure ENUM zones on the VCS. When an ENUM
zone is queried, this triggers the VCS to transform the
E.164 number that was dialed into an ENUM domain which is
then queried via DNS.
If an ENUM zone and/or a DNS server have not been
configured on the local VCS, calls made using ENUM
dialing could still be placed if the local VCS is
Note however that ENUM dialing relies on the presence of
relevant DNS NAPTR records for the ENUM domain being
queried. These are the responsibility of the administrator of
that domain.
neighbored with another VCS that has been appropriately
configured. Any ENUM dialed calls will go via the neighbor. This
configuration is useful if you want all ENUM dialing from your
enterprise to be configured on one particular system.
D14049.01
07.2007
Download from Www.Soanuals.c
8
om. All Manuals Search And Download.
7
TANDBERG VIDEO COMMUNICATION SERVER
ENUMDialing
ADMINISTRATOR GUIDE
ENUM Dialing for Outgoing Calls
Prerequisites
Process
Example
In order for a local endpoint to be able to dial a remote endpoint
using ENUM via your VCS, the following three conditions must
be met:
Below is the process that is followed when an ENUM (E.164)
number is dialed from an endpoint registered with your VCS:
In this example, we wish to call Fred at Example Corp. Fred’s
but to make it easier to contact him his system administrator
has configured a DNS NAPTR record mapping this alias to his
E.164 number: +44 118 123 456.
ꢀ. The user dials the E.164 number from their endpoint.
ꢀ. There must be a NAPTR record available in DNS that maps
the remote endpoint’s E.164 number to its URI. It is the
responsibility of the administrator of the remote enterprise
to provide this record, and they will only make it available if
they wish the endpoints in their enterprise to be contactable
via ENUM dialing.
ꢁ. The VCS initiates a search for the E.164 number as dialed.
local zone transforms, then searching local and Alternate
registrations and FindMe names for the E.164 number.
We know that the NAPTR record for example.com uses the DNS
domain of e164.arpa.
ꢀ. We create an ENUM zone on our local VCS with a DNS suffix
3. If the E.164 number is not found locally, the VCS will check
of e164.arpa.
all its zones to see if any of them are configured with either:
ENUM zone must have a DNS Suffix that is the same as the
domain where the NAPTR record for the remote endpoint is
held.
ꢁ. We configure this zone with a pattern match mode of
AlwaysMatch, so that ENUM will always be queried
regardless of the format of the alias being searched for.
• an AlwaysMatch, or
• a PatternMatch with pattern that matches the E.164
number.
3. We dial 44 118 123 456from our endpoint.
These zones will then be queried in priority order.
least one DNS server that it can query for the NAPTR record
(and if necessary any resulting URI).
4. The VCS initiates a search for a registration of
44 118 123 456. Because the ENUM zone we have
configured has a match mode of AlwaysMatch, it is queried
at the same time as any other zones with a matching
priority.
4. If one or more of the zones that contain a match is a
neighbor zone, the neighbor will be queried for the E.164
number. If the neighbor supports ENUM dialing, it may route
the call itself.
5. If one or more of the zones that contain a match is an
ENUM zone, this will trigger the VCS to attempt to locate
the endpoint through ENUM. As and when each ENUM
zone configured on the VCS is queried, the E.164 number is
transformed into an ENUM domain as follows:
5. Because the zone being queried is an ENUM zone, the VCS
is automatically triggered to transform the number into an
ENUM domain as follows:
a. the digits are reversed and separated by a dot:
6.5.4.3.2.1.8.1.1.4.4
a. the digits are reversed and separated by a dot
b. the DNS Suffix configured for this ENUM zone,
b. the DNS Suffix configured for that ENUM zone is
e164.arpa, is appended.
appended.
This results in a transformed domain of
6.5.4.3.2.1.8.1.1.4.4.e164.arpa.
6. DNS is then queried for the resulting ENUM domain.
7. If the DNS server finds at that ENUM domain a NAPTR
record that matches the transformed E.164 number (i.e.,
after it has been reversed and separated by a dot), it returns
the associated URI to the VCS.
6. DNS is then queried for that ENUM domain.
7. The DNS server finds the domain and returns the
information in the associated NAPTR record. This tells the
VCS that the E.164 number we have dialed is mapped to the
8. The VCS then initiates a new search for that URI
(maintaining the existing hop count). The VCS starts at the
beginning of the search process (i.e. applying any local zone
transforms, then searching locally, then searching zones).
From this point, as it is now searching for a SIP/H.323 URI,
8. The VCS then starts another search, this time for
URI Dialing is followed, and results in the call being
forwarded to Fred’s endpoint.
D14049.01
07.2007
Download from Www.Soanuals.c
8
om. All Manuals Search And Download.
8
ADMINISTRATOR GUIDE
TANDBERG VIDEO COMMUNICATION SERVER
ENUMDialing
ENUM Dialing for Outgoing Calls
Configuring Transforms for ENUM Zones
Configuring Matches for ENUM Zones
If you wish locally registered endpoints to be able to make ENUM calls via the VCS, then at a
minimum you should configure an ENUM zone with:
You can configure transforms for ENUM zones in the same way as any other zones (see Zone
Searches and Transforms for full information).
• a match that has a Mode of AlwaysMatch
• a DNS suffix of e164.arpa (the domain specified by the ENUM standard).
If there are any transforms configured for an ENUM zone, these will be applied prior to the number
being converted to an ENUM domain.
This will result in DNS always being queried for all aliases, not just ENUMs. It will also mean that
ENUM dialing will only be successful if the enterprise being dialed uses the e164.arpa domain.
Example
For example, you want to enable ENUM dialing from your network to endpoints at a remote site
using a prefix of 8followed by the last 4 digits of the remote endpoints’ E.164 number. You would
configure an ENUM zone on your VCS that has a Match configured as follows:
To ensure successful ENUM dialing, you must configure an ENUM zone for each domain that holds
NAPTR records for endpoints that callers in your enterprise might wish to dial.
Once these ENUM zones have been created, you can filter the queries that are sent to each as
follows:
• Mode of PatternMatch
• Pattern string of 8(\d{4})
• Pattern type of Regex
• Pattern behavior of Replace
• Replace string of 44123123(\1)
• configure a match that has a Mode of PatternMatch
• use the Pattern string and Pattern type fields to define the aliases that will trigger an ENUM
lookup.
Example
With this configuration, it will be the resulting string (i.e. 44123123xxxx) that will then be
For example, you want to enable ENUM dialing from your network to a remote office in the UK
where the endpoints’ E.164 numbers start with 44. You would configure an ENUM zone on your
VCS that has a Match configured as follows:
converted into an ENUM domain and queried for via DNS.
• Mode of PatternMatch
• Pattern string of 44
• Pattern type of Prefix.
This will result in an ENUM query being sent to that zone only when someone dials a number
starting with 44.
To verify that you have configured your outward ENUM dialing correctly, use the
D14049.01
07.2007
Download from Www.Soanuals.c
8
om. All Manuals Search And Download.
9
TANDBERG VIDEO COMMUNICATION SERVER
ENUMDialing
ADMINISTRATOR GUIDE
ENUM Dialing for Outgoing Calls
Configuring ENUM Zones
Name
In order for locally registered endpoints to use
ENUM dialing, you must configure an ENUM
zone for each ENUM service used by remote
endpoints. To do this:
Assigns a name to this zone.
Type
For ENUM zones, this will be ENUM.
• VCS Configuration > Zones.
You will be taken to the Zones page.
Click New.
Hop count
You will be taken to the Create Zone page.
Specifies the hop count to be used when
sending an alias search request to this zone.
If the search request was received from
another zone and already has a hop count
assigned, the lower of the two values will be
used.
Enter the zone Name and select a Type of
ENUM.
Click Create Zone.
You will be taken to the Edit Zone page.
DNS suffix
The DNS zone that is to be queried for a
NAPTR record. This suffix is appended to the
transformed E.164 number in an attempt to
find a matching NAPTR record.
H.323 mode
Determines whether or not H.323 records will
be looked up for this zone.
SIP mode
Any number of ENUM zones may be
configured on the VCS.
Determines whether or not SIP records will be
looked up for this zone.
You should configure at least one
ENUM zone for each DNS suffix that your
endpoints may use.
Match1 - Match5
These sections allow you to specify any
filtering criteria and/or transforms you wish to
for ENUM zones for full information on how the
Match options can be applied.
Normal zone pattern matching and
prioritization rules will apply to ENUM
zones.
D14049.01
07.2007
Download from Www.Soanuals.c
9
om. All Manuals Search And Download.
0
TANDBERG VIDEO COMMUNICATION SERVER
ENUMDialing
ADMINISTRATOR GUIDE
ENUM Dialing for Outgoing Calls
Address 1 to Address 5
Configuring DNS Servers
Enter the IP address(es) of up to 5 DNS
servers that the VCS will query when
attempting to locate a domain.
To configure the DNS servers to be used by
the VCS when querying DNS:
• System Configuration > DNS.
You will be taken to the DNS page.
In order for endpoints registered to the
VCS to make outgoing calls using
ENUM dialing, you must configure at
least one DNS server for the VCS to query. For
resilience, you can specify up to five DNS
servers.
The DNS server(s) configured here are
used as part of both the ENUM dialing
and URI dialing processes.
D14049.01
07.2007
Download from Www.Soanuals.c
9
om. All Manuals Search And Download.
ꢀ
ADMINISTRATOR GUIDE
TANDBERG VIDEO COMMUNICATION SERVER
ENUMDialing
ENUM Dialing for Incoming Calls
Configuring DNS NAPTR Records
Prerequisites
Example
In order for your locally registered endpoints to be reached
using ENUM dialing, you must configure a DNS NAPTR record
that maps your endpoints’ E.164 numbers to their SIP/H.323
URIs. This record must be located at an appropriate DNS
domain where it can be found by any systems attempting to
reach you via ENUM dialing.
ENUM relies on the presence of NAPTR records, as defined by
from an E.164 number.
For example, the record:
• IN NAPTR 10 100 “u” “E2U+h323” “!^(.*)$!h323:\1@
example.com!” .
The record format that the VCS supports is:
would be interpreted as follows:
• 10is the order
• 100is the preference
• uis the flag
• E2U+h323 states that this record is for an H.323 URI
• ;; order flag preference service regex
replacement
where:
• order and preference determine the order in which
NAPTR records will be processed. The record with the
lowest orderis processed first, with those with the lowest
preferencebeing processed first in the case of matching
order.
conversion:
About DNS Domains for ENUM
ENUM relies on the presence of NAPTR records as defined
numbers and their SIP/H.323 URIs.
• !is a field separator
• flag determines the interpretation of the other fields
in this record. Only the value u(indicating that this is a
terminal rule) is currently supported, and this is mandatory.
• the first field represents the string to be converted. In
this example, ^(.*)$represents the entire E.164 number
define the ENUM standard, specifies that the domain for
ENUM - where the NAPTR records should be located for
public ENUM deployments - is e164.arpa. However, use of
this domain requires that your E.164 numbers are assigned
by an appropriate national regulatory body. Not all countries
are yet participating in ENUM, so you may wish to use an
alternative domain for your NAPTR records. This domain
could reside within your corporate network (for internal use
of ENUM) or it could use a public ENUM database such as
http://www.e164.org.
• the second field represents the H.323 URI that will be
states that the E.164 number will be concatenated with
@example.com. For example, 1234will be mapped to
• servicestates whether this record is intended to describe
E.164 to URI conversion for H.323 or for SIP. Its value must
be either E2U+h323or E2U+SIP.
• regexis a regular expression that describes the conversion
from the given E.164 number to an H.323 or SIP URI.
• . shows that the replacement field has not been used.
• replacementis not currently used by the VCS and should
be set to .(i.e. the full stop character).
Non-terminal rules in ENUM are not currently supported
by the VCS. For more information on these, see section
D14049.01
07.2007
Download from Www.Soanuals.c
9
om. All Manuals Search And Download.
ꢁ
TANDBERG VIDEO COMMUNICATION SERVER
Callstoandfrom Unregistered Endpoints
ADMINISTRATOR GUIDE
About Unregistered Endpoints
Calls from an Unregistered Endpoint
An unregistered endpoint is any device that
is not registered with an H.323 gatekeeper
or SIP Registrar (e.g. VCS, gatekeeper or
Border Controller). Although most calls are
made between endpoints each registered with
such a system, it is sometimes necessary
to place a call to, or receive a call from, an
unregistered endpoint.
An unregistered endpoint can call an endpoint registered with the local VCS.
If there are no firewalls between the unregistered endpoint and the locally registered endpoint, it is possible for the caller to place the call by dialing
the locally registered endpoint’s IP address. However, we do not recommend that callers are given IP addresses to use as the call may not always be
successful (for example if the IP address is private).
Instead, we recommend that callers from unregistered endpoints dial the IP address or the domain name (if configured) of the local VCS, prefixed by
the alias they wish to call. The VCS will then resolve the alias and place the call as normal.
Calls to an Unregistered Endpoint
Overview
Calls can be placed from an endpoint
Recommended Configuration for
Firewall Traversal
registered to the local VCS to an endpoint that
is not registered with any system in two ways:
When the VCS Border Controller is neighbored
with an internal VCS for firewall traversal,
you should typically set Calls to unknown IP
addresses to Indirect on the internal VCS and
Direct on the VCS Border Controller. When a
caller inside the firewall attempts to place a
call to an IP address outside the firewall, it
will be routed as follows:
• using an H.323 URI (if the DNS system
has been appropriately configured). If URI
dialing is used, DNS is queried for a call
signaling address and, if found, the call is
placed to that address. (See URI Dialing
for details of how to configure the Call
Signaling SRV Record.)
ꢀ. The call will go from the endpoint to the
internal VCS with which it is registered.
• dialing its IP address
ꢁ. Since the IP address being called is not
registered to that VCS, and its Calls to
unknown IP addresses setting is Indirect,
However, it is sometimes undesirable for a
system to be allowed to place a call to an
IP address directly. Instead, you may want
a neighbor to place the call on behalf of the
VCS, or not allow such calls at all. The VCS
allows you to configure this behavior.
the VCS will not place the call directly.
Instead, it will query its neighbor VCS
Border Controller to see if that system is
able to place the call on the internal VCS’s
behalf.
Calls to Unknown IP Addresses
Determines the way in which the VCS will manage calls to IP addresses which are not registered
with it or one of its neighbors.
Direct: A locally registered endpoint will be allowed to make the call to the unknown IP address
without the VCS querying any neighbors. The call setup would occur just as it would if the far end
were registered directly to the local system.
3. The VCS Border Controller receives the
call and since its Calls to unknown IP
addresses setting is Direct, it will make
the call directly to the called IP address.
Configuration
To configure the VCS’s behavior when
receiving a call for an IP address that is not
registered locally:
Indirect: Upon receiving the call the VCS will check to see if the IP address belongs to one of its
locally registered endpoints. If so, it will allow the call. If not, it will query its neighbors for the
remote address. If the neighbor’s configuration allows it to connect a call to that alias, the VCS
will pass the call to that neighbor for completion.
• VCS Configuration > Calls
You will be taken to the Calls page.
Off: This will not allow any endpoint registered locally to the VCS to call an IP address of any
system not also registered locally to that VCS.
D14049.01
07.2007
Download from Www.Soanuals.c
9
om. All Manuals Search And Download.
3
TANDBERG VIDEO COMMUNICATION SERVER
FallbackAlias
ADMINISTRATOR GUIDE
Fallback Alias
Configuration
Example Use of a Fallback Alias
Overview
To configure the Fallback Alias:
You may wish to configure your Fallback
Alias to be that of your receptionist, so that
all calls that do not specify an alias will still
be answered personally and can then be
redirected appropriately.
It is possible for the VCS to receive a call that
is destined for it but which does not specify
an alias. This could be for one of the following
reasons:
• VCS Configuration > Calls.
You will be taken to the Calls page.
• the caller has dialled the IP address of the
For example, Example Inc. has the domain of
example.com. The endpoint at reception has
VCS directly
• the caller has dialled the domain name
without giving an alias as a prefix
They configure their VCS with a fallback alias
that any calls made directly to example.com
(i.e. without being prefixed by an alias), are
the receptionist answers the call and directs it
appropriately.
• the caller has dialled the IP address or
domain name of the VCS prefixed by the
VCS’s system name as an alias.
Normally such calls would be disconnected.
However, the VCS allows you to specify an
alias to which all such calls should be routed.
This alias is known as the Fallback Alias.
Save
Fallback alias
Some endpoints do not allow users to
enter an alias and an IP address to
which the call should be placed.
If no fallback alias is configured, calls
that do not specify an alias will be
disconnected.
Click here to save your changes.
Enter the alias to which you want to forward all
calls that do not already specify an alias.
D14049.01
07.2007
Download from Www.Soanuals.c
9
om. All Manuals Search And Download.
4
TANDBERG VIDEO COMMUNICATION SERVER
Disconnectingcalls
ADMINISTRATOR GUIDE
Overview
Identifying a Particular Call
Each call that passes through the VCS is assigned a call ID number and a call serial number, both of which can be referenced when disconnecting a
call via the CLI.
About the Call Control API
The VCS provides a third party call control
API. Currently this API supports the following
feature:
Call ID Number
• disconnecting a call.
The VCS assigns each call currently in progress a different call ID number. The ID numbers start at 1 and go up to the maximum number of calls
allowed on that system.
Each time a call is made, the VCS will assign that call the lowest available call ID number. For example, if there is already a call in progress with an ID
of 1, the next call will be assigned an ID of 2. If call 1 is then disconnected, the third call to be made will be assigned an ID of 1.
The call ID number is not therefore a unique identifier: while no two calls in progress at the same time will have the same call ID number, the same
number will be assigned to more than one call over time.
Call Serial Number
The VCS assigns a unique serial number to every call passing through it. No two calls on a VCS will ever have the same serial number. However, a
single call passing through a number of VCSs will be identified by a different serial number on each system.
Obtaining the Call ID/Serial Number
To control calls using the CLI, you must
reference the call using either its call ID or
serial number. These can be obtained using
the command:
• xStatus Calls
This will return details of each call currently
in progress in order of their call ID number.
The second line of each entry will list the call
serial number.
Call ID number
Call serial number
The VCS web UI does not use the call
ID number. Calls are identified using
their call serial number only.
D14049.01
07.2007
Download from Www.Soanuals.c
9
om. All Manuals Search And Download.
5
TANDBERG VIDEO COMMUNICATION SERVER
Disconnectingcalls
ADMINISTRATOR GUIDE
Disconnecting a Call via the Web Interface
Disconnecting a Call via the CLI
To disconnect one or more existing call via the web interface:
To disconnect an existing call using the CLI, you must first obtain either the call ID number or the
call serial number. Then use either one of the following commands as appropriate:
• Status > Calls.
You will be taken to the Calls page.
• xCommand DisconnectCall Call: <ID number>
• xCommand DisconnectCall CallSerialNumber: <serial number>
While it is quicker to use the call ID number to reference the call to be disconnected, there is a
risk that in the meantime the call has already been disconnected and the call ID assigned to a new
call. For this reason, the VCS also allows you to reference the call using the longer but unique call
serial number.
Issues when Disconnecting SIP Calls
The call disconnection API works differently for H.323 and SIP calls due to differences in the way
the protocols work.
For H.323 calls, the Disconnect command will actually disconnect the call.
For SIP calls, the Disconnect command will cause the VCS to release all resources used for the
call and the call will appear on the system as disconnected. However, SIP calls are peer-to-peer
and as a SIP proxy the VCS has no authority over the endpoints. Although releasing the resources
may have the side-effect of disconnecting the SIP call, it is also possible that the call signaling,
media or both may stay up (depending on the type of call being made). The call will not actually
disconnect until the SIP endpoints involved have also cleared their resources.
Disconnect
to clear the resources of any hung SIP calls after a certain period of time. This includes all
TANDBERG endpoints.
Check the box next to the call(s) you wish to terminate and select Disconnect.
D14049.01
07.2007
Download from Www.Soanuals.c
9
om. All Manuals Search And Download.
6
TANDBERG VIDEO COMMUNICATION SERVER
ADMINISTRATOR GUIDE
Firewall Traversal
Firewall Traversal Overview
VCS and Firewall Traversal
VCS as a Firewall Traversal Client
About Firewall Traversal
The purpose of a firewall is to control the IP traffic entering your network. Firewalls will generally
block unsolicited incoming requests, meaning that any calls originating from outside your network
will be prevented. However, firewalls can be configured to allow outgoing requests to certain
trusted destinations, and to allow responses from those destinations. This principle is used by
TANDBERG’s Expressway™ solution to enable secure traversal of any firewall.
Your VCS can act as a firewall traversal client on behalf of SIP and H.323 endpoints registered to
it, and any gatekeepers that are neighbored with it.
In order to act as a firewall traversal client, the VCS must be configured with information about the
VCS as a Traversal Client for full details on how to do this.
The Expressway™ solution consists of:
• a VCS Border Controller or Border Controller located outside the firewall on the public network
The firewall traversal server used by the VCS can be another VCS with the Border Controller
option enabled, or a TANDBERG Border Controller.
or DMZ, which acts as the firewall traversal server,
• a VCS, Gatekeeper, MXP endpoint or other traversal-enabled endpoint located on the private
network, which acts as the firewall traversal client.
The two systems work together to create an environment where all connections between the two
are outbound, i.e. established from the client to the server, and thus able to successfully traverse
the firewall.
VCS as a Firewall Traversal Server
In addition to being a firewall traversal client, the VCS can be enabled to act as a firewall traversal
server. With this option enabled, the VCS will act as a traversal server for other TANDBERG
systems and any traversal-enabled endpoints that are registered directly to it. It can also provide
STUN Discovery and STUN relay services to endpoints with STUN clients.
How does it work?
The traversal client constantly sends a probe via the firewall to a designated port on the traversal
server. This keeps a connection alive between the client and server. When the traversal server
receives an incoming call for the traversal client, it uses this existing connection to send an
incoming call request to the client. The client then initiates a connection to the server and upon
receipt the server responds with the incoming call. This process ensures that from the firewall’s
point of view, all connections are initiated from the traversal client inside the firewall out to the
traversal server.
• To enable server-side firewall traversal for other systems, you must create and configure a new
traversal server zone on the VCS for every system that is its traversal client. See Configuring
the VCS as a traversal server for details on how to do this.
• To enable server-side firewall traversal for traversal-enabled endpoints (i.e. TANDBERG MXP
endpoints and any other endpoints that support the ITU H.460.18 and H.460.19 standards)
information on the options available.
To use the VCS as a traversal server, you must install the Border Controller option key on
your system. Contact your TANDBERG representative for further information.
In order for firewall traversal to function correctly, the VCS Border Controller must have a
traversal server zone configured on it for each client that is connecting to it. Likewise,
!
each VCS client must have a traversal client zone configured on it for each server that it is
connecting to. The ports and protocols configured for each pair of zones must be the same.
Because the VCS Border Controller listens for connections from the client on a specific port, we
recommend that you create the traversal server zone before you create the traversal client zone.
D14049.01
07.2007
Download from Www.Soanuals.c
9
om. All Manuals Search And Download.
7
TANDBERG VIDEO COMMUNICATION SERVER
ADMINISTRATOR GUIDE
Firewall Traversal
Firewall Traversal Protocols and Ports
Overview
Ports for Initial Connections from Traversal Clients
Assent Ports
Ports play a vital part in firewall traversal configuration. The
correct ports must be set on the VCS Border Controller,
traversal client and firewall in order for connections to be
permitted.
Each traversal server zone specifies an H.323 port and a
SIP port to be used for the initial connection from the client.
For connections to the VCS Border Controller using the Assent
protocol, the default ports are:
Each time you configure a new traversal server zone on the
VCS, you will be allocated default port numbers for these
connections:
Call signaling
• UDP/1719: listening port for RAS messages
• TCP/2776: listening port for H.225 and H.245 protocols
Media
Ports are initially configured on the VCS Border Controller and
then advised to the firewall administrator and the traversal
client administrator, who must then configure their systems to
connect to these specific ports on the server. The only port
configuration that is done on the client is the range of ports it
uses for outgoing connections; the firewall administrator will
need to know this information so that if necessary they can
configure the firewall to allow outgoing connections from those
ports.
• H.323 ports will start at 6001 and increment by 1 for every
new traversal server zone
• UDP/2776: RTP media port
• UDP/2777: RTCP media control port
• SIP ports will start at 7001 and increment by 1 for every new
traversal server zone.
You can change these default ports if necessary but you must
ensure that the ports are unique for each traversal server zone.
Once the H.323 and SIP ports have been set on the VCS
Border Controller, matching ports must be configured on the
corresponding traversal client.
H.460.ꢀ8/ꢀ9 Ports
For connections to the VCS Border Controller using the
H.460.18/19 protocols, the default ports are:
Call signaling
• UDP/1719: listening port for RAS messages
• TCP/1720: listening port for H.225 protocol
• TCP/2777: listening port for H.245 protocol
Media
Process
The default port used for the initial connections from
MXP endpoints is the same as that used for standard
RAS messages, i.e. UDP/1719. While it is possible to
change this port on the VCS server, most endpoints will not
support connections to ports other than UDP/1719. We
therefore recommend that this be left as the default.
!
• Each traversal client connects via the firewall to a unique
port on the VCS Border Controller.
• The server identifies each client by the port on which it
receives the connection, and the Authentication credentials
provided by the client.
• UDP/2776: RTP media port
• UDP/2777: RTCP media control port
• Once established, the client constantly sends a probe to the
VCS Border Controller via this connection in order to keep
the connection alive.
H.3ꢁ3 Firewall Traversal Protocols
The VCS supports two different firewall traversal protocols for
H.323: Assent and H.460.18/H.460.19.
SIP Ports
Call signaling
• When the VCS Border Controller receives an incoming call
for the client, it uses this initial connection to send an
incoming call request to the client.
SIP call signaling uses the same port as used by the initial
connection between the client and server.
• Assent is TANDBERG’s proprietary protocol.
• H.460.18 and H.460.19 are ITU standards which define
protocols for the firewall traversal of signaling and media
respectively. These standards are based on the original
TANDBERG Assent protocol.
Media
• The client then initiates a connection to the server. The
ports used for the call will differ for signaling and media,
and will depend on the protocol being used (i.e. SIP, Assent
or H.460.18/19).
Where the traversal client is a VCS or Gatekeeper, SIP media
uses Assent to traverse the firewall . The default ports are the
same as for H.323, i.e.:
In order for a traversal server and traversal client to
communicate, they must be using the same protocol.
• UDP/2776: RTP media port
• UDP/2777: RTCP media control port
The two protocols each use a slightly different range of ports.
D14049.01
07.2007
Download from Www.Soanuals.c
9
om. All Manuals Search And Download.
8
TANDBERG VIDEO COMMUNICATION SERVER
ADMINISTRATOR GUIDE
Firewall Traversal
Firewall Traversal Protocols and Ports
Firewall Configuration
In order for Expressway™ firewall traversal to function correctly,
the firewall must be configured to:
Ports for Connections out to the Public Internet
STUN Ports
In situations where the VCS Border Controller is attempting to
connect to an endpoint on the public internet, you will not know
the exact port(s) on the endpoint to which the connection will
be made. This is because the ports to be used are determined
by the endpoint and advised to the VCS Border Controller only
once the server has located the endpoint on the public internet.
This may cause problems if your VCS Border Controller is
located within a DMZ (i.e. there is a firewall between the VCS
Border Controller and the public internet) as you will not be able
to specify in advance rules that will allow you to connect out to
the endpoint’s ports.
The VCS Border Controller can be enabled to provide STUN
services (STUN Relay and STUN Binding Discovery) that can be
used by SIP endpoints which support the ICE firewall traversal
• allow initial outbound traffic from the client to the ports
being used by the VCS Border Controller
• allow return traffic from those ports on the VCS Border
Controller back to the originating client.
The ports used by these services are configurable via:
• VCS Configuration > Border Controller > STUN
The ICE clients on each of the SIP endpoints must be able to
discover these ports, either via SRV records in DNS or by direct
configuration.
TANDBERG offers a downloadable tool, the Expressway Port
Tester, that allows you to test your firewall configuration for
compatibility issues with your network and endpoints. It will
advise if necessary which ports may need to be opened on
your firewall in order for the Expressway™ solution to function
correctly. Contact your TANDBERG representative for more
information.
You can however specify the ports on the VCS Border Controller
that will be used for calls to endpoints on the public internet so
that your firewall administrator can allow connections via these
ports. The ports that can be configured for this purpose are:
H.323
• UDP/1719: signaling
• UDP/50,000-51200: media
• TCP/15,000-19999: signaling
SIP
• UDP/5060 (default): signaling
• UDP/50,000-51200: media
• TCP: a temporary port is allocated
We recommend that you turn off any H.323 and SIP
protocol support on the firewall: these are not needed in
conjunction with the TANDBERG Expressway™ solution
and may interfere with its operation.
!
D14049.01
07.2007
Download from Www.Soanuals.c
9
om. All Manuals Search And Download.
9
TANDBERG VIDEO COMMUNICATION SERVER
ADMINISTRATOR GUIDE
Firewall Traversal
Firewall Traversal and Authentication
Overview
Client Type and Client Settings
Server Type and Server Settings
In order to control usage of the VCS as a
traversal server, each VCS or Gatekeeper that
wishes to be its client must first authenticate
with it.
VCS
VCS Border Controller
• The VCS client provides its Authentication Username and
Authentication Password. These are set on the client via VCS
Configuration > Authentication > Configuration.
• The traversal server zone for that client must be configured with the
client’s Authentication Username. This is set via VCS Configuration >
Zones > Edit Zone.
Upon receiving the initial connection request
from the traversal client, the VCS Border
Controller asks the client to authenticate
itself by providing a username and password.
The server then looks up the username and
password in its own authentication database.
If a match is found, the VCS server will accept
the request from the client.
• There must also an entry in the server’s authentication database
with the corresponding username and password.
Endpoint Client
VCS Border Controller
• The endpoint client provides its Authentication ID and Authentication
• There must be an entry in the server’s authentication database with
Password.
the corresponding username and password.
Gatekeeper Client
VCS Border Controller
The settings used for authentication depend
on the combination of client and server
being used. These are detailed in the table
opposite.
• The Gatekeeper client looks up its System Name in its own
authentication database and retrieves the password for that name.
It then provides this name and password.
• The traversal server zone for the Gatekeeper client must
be configured with the Gatekeeper’s System Name
in the Authentication Username field. This is set via
VCS Configuration > Zones > Edit Zone.
• There must be an entry in the server’s authentication database with
the corresponding username and password.
VCS
Border Controller
• If Authentication is On on the Border Controller, the VCS client
provides its Authentication Username and Authentication Password.
These are set on the client via VCS Configuration > Authentication >
Configuration.
• If Authentication is On on the Border Controller, there must be
an entry in the Border Controller’s authentication database
that matches the VCS client’s Authentication Username and
Authentication Password.
• If the Border Controller is in Assent mode, the VCS client provides
its Authentication Username. This is set on the client via VCS
Configuration > Authentication > Configuration.
• If the Border Controller is in Assent mode, the traversal zone
configured on the Border Controller to represent the VCS client must
use the client’s Authentication Username in the Assent Account
name field. This is set on the Border Controller via TraversalZone >
Assent > Account name.
When acting as a VCS Border
Controller, authentication is required
from all VCS and Gatekeeper clients
regardless of the VCS’s Authentication Mode
setting. This setting will however still
determine whether or not endpoint clients are
required to authenticate.
D14049.01
07.2007
Download from Www.Soanuals
ꢀ.co0m. 0All Manuals Search And Download.
TANDBERG VIDEO COMMUNICATION SERVER
ADMINISTRATOR GUIDE
Firewall Traversal
Configuring the VCS as a Traversal Client
Adding a New Traversal Client Zone
Overview
To enable your VCS to act as a traversal
client on behalf of its endpoints and neighbor
gatekeepers, you must create a connection
between it and a traversal server (e.g. a VCS
Border Controller).
• VCS Configuration > Zones.
You will be taken to the Zones page.
Select New.
You will be taken to the Create Zone page.
You do this by adding a new traversal client
zone and configuring it with the details of the
traversal server.
Name
Enter the name you wish to give to this zone.
The name acts as a unique identifier, allowing
you to distinguish between zones of the same
type.
Type
From the Type drop-down menu, select
TraversalClient.
Create Zone
Click here to create the zone. You will be
taken directly to the Edit Zone page, where
you can configure the traversal client zone as
required.
You can create more than one
traversal client zone if you wish to
connect to multiple traversal servers.
D14049.01
07.2007
Download from Www.Soanuals
ꢀ.co0m. ꢀAll Manuals Search And Download.
TANDBERG VIDEO COMMUNICATION SERVER
ADMINISTRATOR GUIDE
Firewall Traversal
Configuring the VCS as a Traversal Client
Retry interval
Configuring a Traversal Client Zone
Specifies the interval in seconds with which a
failed attempt to establish a connection to the
traversal server should be retried.
• VCS Configuration > Zones.
You will be taken to the Zones page.
Click on the name of the zone you wish to
configure.
You will be taken to the Edit Zone page.
H.323 mode
Determines whether H.323 calls will be
allowed to and from this zone.
H.323 protocol
Determines which of the two firewall traversal
protocols to use for calls to the traversal
server.
H.323 port
Specifies the port on the traversal server to
be used for H.323 firewall traversal calls.
SIP mode
Determines whether SIP calls will be allowed
to and from this zone.
SIP port
Specifies the port on the traversal server to
be used for SIP calls from this VCS
SIP transport
Determines which transport type will be used
for SIP calls to and from the traversal server.
Primary address
Alternate 1 - Alternate 5 Address
Remember to Save your changes.
Specifies the IP address or FQDN of the
traversal server.
Specifies the IP addresses or FQDNs of any
alternates configured on the traversal server.
D14049.01
07.2007
Download from Www.Soanuals
ꢀ.co0m. ꢁAll Manuals Search And Download.
TANDBERG VIDEO COMMUNICATION SERVER
ADMINISTRATOR GUIDE
Firewall Traversal
Configuring the VCS as a Traversal Server
Adding a New Traversal Server Zone
Overview
The VCS has an optional Border Controller
feature. Once this has been enabled, you will
be able to:
• VCS Configuration > Zones.
You will be taken to the Zones page.
Select New.
You will be taken to the Create Zone page.
• Allow your VCS to act as a traversal
server for other VCSs and TANDBERG
Gatekeepers. You do this by adding a new
traversal server zone on the VCS, and
configuring it with details of the traversal
client.
• Provide firewall traversal for any TANDBERG
MXP endpoints registered directly with it.
You can configure the protocols and ports
that will be used.
• Enable and configure STUN services.
• Configure the ports used specifically for
firewall traversal services.
The following sections describe how to
configure each of the above options.
Name
Enter the name you wish to give to this zone.
The name acts as a unique identifier, allowing
you to distinguish between zones.
Type
From the Type drop-down menu, select
TraversalServer.
Create Zone
Click here to create the zone. You will be
taken directly to the Edit Zone page, where
you can configure the traversal server zone as
required.
D14049.01
07.2007
Download from Www.Soanuals
ꢀ.co0m. 3All Manuals Search And Download.
TANDBERG VIDEO COMMUNICATION SERVER
ADMINISTRATOR GUIDE
Firewall Traversal
Configuring the VCS as a Traversal Server
SIP mode
Configuring a Traversal Server Zone
Determines whether SIP calls will be allowed
to and from the traversal client.
• VCS Configuration > Zones.
You will be taken to the Zones page.
Click on the name of the zone you wish to
configure.
SIP port
You will be taken to the Edit Zones page.
Specifies the port on the VCS Border
Controller to be used for SIP calls from this
traversal client.
Authentication username
If the traversal client is a VCS, this must be
the VCS’s Authentication Username. If the
traversal client is a gatekeeper, this must be
the gatekeeper’s System Name.
SIP transport
Determines which transport type will be used
for SIP calls to and from the traversal client.
H.323 mode
UDP retry interval
Determines whether H.323 calls will be
allowed to and from the traversal client.
Sets the frequency (in seconds) with which
the traversal client will send a UDP probe to
the VCS Border Controller.
H.323 protocol
Determines which of the two firewall traversal
protocols will be used for calls through the
firewall, to and from the client. The same
protocol must be used by the client.
UDP retry count
Sets the number of times the traversal client
will attempt to send a UDP probe to the VCS
Border Controller.
H.323 port
UDP keep alive interval
Specifies the port on the VCS Border
Controller to be used for H.323 connections
from the client.
Sets the interval (in seconds) with which the
traversal client will send a UDP probe to the
VCS once a call is established, in order to
keep the firewall’s NAT bindings open.
H.460.19 demux mode
Determines whether or not the same two ports
can be used for media by two or more calls
from the traversal client.
TCP retry interval
Sets the frequency (in seconds ) with which
the traversal client will send a TCP probe to
the VCS.
TCP keep alive interval
TCP retry count
On: allows use of the same two ports for
media for all calls.
Sets the interval (in seconds) with which the
traversal client will send a TCP probe to the
VCS once a call is established, in order to
keep the firewall’s NAT bindings open.
Sets the number of times the traversal client
will attempt to send a TCP probe to the VCS.
Off: each call will use a separate pair of ports
for media.
D14049.01
07.2007
Download from Www.Soanuals
ꢀ.co0m. 4All Manuals Search And Download.
TANDBERG VIDEO COMMUNICATION SERVER
ADMINISTRATOR GUIDE
Firewall Traversal
Configuring the VCS as a Traversal Server
UDP probe retry interval
Configuring Traversal for Endpoints
Sets the frequency (in seconds) with which
locally registered endpoints will send a UDP
probe to the VCS Border Controller.
Traversal-enabled H.323 endpoints can
register directly with the VCS Border Controller
and use it for firewall traversal.
To configure the options for these endpoints:
UDP probe retry count
• VCS Configuration > Border Controller >
Locally Registered Endpoints
Sets the number of times locally registered
endpoints will attempt to send a UDP probe.
You will be taken to the Locally Registered
Endpoints page.
UDP probe keep alive interval
Sets the interval (in seconds) with which
locally registered endpoints will send a UDP
probe to the VCS once a call is established, in
order to keep the firewall’s NAT bindings open.
H.323 Assent mode
Determines whether or not H.323 calls using
Assent mode for firewall traversal will be
allowed.
TCP probe retry interval
Sets the frequency (in seconds) with which
locally registered endpoints will send a TCP
probe to the VCS.
H.460.18 mode
Determines whether or not H.323 calls using
H.460.18/19 mode for firewall traversal will
be allowed.
TCP probe retry count
Sets the number of times locally registered
endpoints will attempt to send a TCP probe to
the VCS.
H.460.19 demux mode
Determines whether the VCS will operate in
Demultiplexing mode for calls from locally
registered endpoints.
TCP probe keep alive interval
On: allows use of the same two ports for all
calls.
Sets the interval (in seconds) with which
locally registered endpoints will send a TCP
probe to the VCS once a call is established, in
order to keep the firewall’s NAT bindings open.
Off: Each call will use a separate pair of ports
for media.
H.323 preference
Save
If an endpoint supports both Assent and
H.460.18 protocols, this setting determines
which the VCS uses.
Click here to save your settings.
D14049.01
07.2007
Download from Www.Soanuals
ꢀ.co0m. 5All Manuals Search And Download.
TANDBERG VIDEO COMMUNICATION SERVER
ADMINISTRATOR GUIDE
Firewall Traversal
Configuring the VCS as a Traversal Server
Media demultiplexing RTP port
Configuring Traversal Server Ports
Specifies the port on the VCS to be used for
demultiplexing RTP media.
The VCS has specific listening ports assigned
for connections with the firewall. In most
cases the default ports should be used.
However, you have the option to change these
ports if necessary.
To configure the VCS traversal server ports:
• VCS Configuration > Border Controller >
Ports
Media demultiplexing RTCP port
You will be taken to the Ports page.
Specifies the port on the VCS to be used for
demultiplexing RTCP media.
H.323 Assent call signaling port
Specifies the port on the VCS to be used for
Assent signaling.
H.323 H.460.18 call signaling port
Specifies the port on the VCS to be used for
H.460.18 signaling.
Save
Click here to save your settings.
D14049.01
07.2007
Download from Www.Soanuals
ꢀ.co0m. 6All Manuals Search And Download.
TANDBERG VIDEO COMMUNICATION SERVER
ADMINISTRATOR GUIDE
Firewall Traversal
STUN Services
STUN Binding Discovery
About STUN
STUN Relay
STUN is a network protocol that enables a SIP or H.323 client
to communicate via UDP or TCP from behind a NAT firewall.
The STUN Binding Discovery service provides information back
to the client about the binding allocated by the NAT firewall
being traversed.
The STUN Relay service (formerly known as TURN) allows a
client to ask for data to be relayed to it from specific remote
peers via the relay server and through a single connection
between the client and the relay server.
The VCS Border Controller can be configured to provide two
types of STUN services to traversal clients. These services are
STUN Binding Discovery and STUN Relay.
How it works
How it works
A client behind a NAT firewall sends a STUN discovery request
via the firewall to the VCS Border Controller, which has been
configured as a STUN discovery server. Upon receipt of the
message, the VCS Border Controller responds to the client with
information about the allocated NAT binding, i.e. the public IP
address and the ports being used.
A client behind a NAT firewall sends a STUN Allocate request
to the VCS Border Controller which is acting as the STUN relay
server. The sending of this request opens a binding on the
firewall. Upon receipt of the request, the VCS Border Controller
opens a public IP port on behalf of the client, and reports back
to the client this IP address and port, as well as details of the
firewall binding. The client can then provide this IP address and
port to other systems which may want to reach it.
For detailed information on the base STUN protocol and
the Binding Discovery service, refer to “Session
For detailed information on the STUN Relay service, refer to
“Obtaining Relay Addresses from Simple Traversal Underneath
The client can then provide this information to other systems
which may want to reach it, allowing it to be found even though
it is not directly available on the public internet.
The client can restrict the remote address and ports from
which the relay should forward on media. Any incoming calls to
this IP address and port on the VCS server are relayed via the
allocated binding on the NAT to the client.
About ICE
Currently, the most likely users of STUN services are ICE
endpoints.
ICE (Interactive Connectivity Establishment) is a collaborative
algorithm that works together with STUN services (and other
NAT traversal techniques) to allow clients to achieve firewall
traversal. The individual techniques on their own may allow
traversal in certain network topologies but not others. Also
some techniques maybe less efficient than others, involving
extra hops (e.g. STUN Relay).
ICE involves the collecting of potential (candidate) points
of contact (IP address and port combination) via each of
the traversal techniques, the verification of peer-to-peer
connectivity via each of these points of contact and then the
selection of the “best” successful candidate point of contact
to use.
The endpoint will only be reachable if the firewall has
the Endpoint-Independent Mapping behavior as
D14049.01
07.2007
Download from Www.Soanuals
ꢀ.co0m. 7All Manuals Search And Download.
TANDBERG VIDEO COMMUNICATION SERVER
ADMINISTRATOR GUIDE
Firewall Traversal
STUN Services
STUN discovery mode
Configuring STUN Services
Determines whether the VCS will offer STUN
Discovery services to traversal clients.
To configure the STUN Binding Discovery and
STUN Relay services:
• VCS Configuration > Border Controller >
STUN.
You will be taken to the STUN page.
STUN discovery port
Specifies the port on the VCS on which it will
be listening for STUN Discovery requests.
STUN relay mode
Determines whether the VCS will offer STUN
Relay services to traversal clients.
STUN relay port
Specifies the port on the VCS on which it will
be listening for STUN relay requests.
STUN relay media port start
Specifies the lower port in the range to be
used for STUN media relay.
STUN relay media port end
Specifies the upper port in the range to be
used for STUN media relay.
Save
Click here to save your changes.
D14049.01
07.2007
Download from Www.Soanuals
ꢀ.co0m. 8All Manuals Search And Download.
TANDBERG VIDEO COMMUNICATION SERVER
ADMINISTRATOR GUIDE
BandwidthControl
Overview
About Bandwidth Control
Example Network Deployment
The TANDBERG VCS allows you to control
the use of bandwidth by endpoints on your
network. This is done by grouping endpoints
into subzones, and then applying limits to the
bandwidth that can be used:
The diagram below shows a typical network deployment:
• a broadband LAN, where high bandwidth calls are acceptable
• a pipe to the internet with restricted bandwidth
• two satellite offices, Branch and Home, each with their own restricted pipes.
In this example you should create a new subzone for each pool of endpoints, so that you can apply suitable limitations to the bandwidth used within
and between each subzone.
• within each subzone
• between a subzone and another subzone
• between a subzone and a zone.
Bandwidth limits may be set on a call-by-call
basis and/or on a total concurrent usage
basis. This flexibility allows you to set
appropriate bandwidth controls on individual
components of your network.
This section describes the different types of
subzones and how to add and configure them,
apply bandwidth controls between subzones
and zones.
D14049.01
07.2007
Download from Www.Soanuals
ꢀ.co0m. 9All Manuals Search And Download.
TANDBERG VIDEO COMMUNICATION SERVER
ADMINISTRATOR GUIDE
BandwidthControl
Subzones
About the Traversal Subzone
About Subzones
Traversal Calls
All endpoints registered with the VCS are part of its Local Zone.
The Traversal Subzone is a conceptual subzone. No endpoints
can be registered to the Traversal Subzone; its sole purpose is
A traversal call is any call passing through the VCS that includes
both the signaling (information about the call) and media (voice
and video). The only other type of call is a non-traversal call,
where the signaling passes through the VCS but the media goes
directly between the endpoints.
The Local Zone is made up of two or more subzones. The
first two subzones are automatically created for you. These
create and configure further subzones manually on the basis
of endpoints’ IP addresses: when an endpoint registers with
the VCS its IP address is checked and it is assigned to the
appropriate subzone.
All traversal calls are deemed to pass through the Traversal
Subzone, so by applying bandwidth limitations to the Traversal
Subzone you can control how much processing of media the
VCS will perform at any one time. These limitations can be
applied on a total concurrent usage basis, and/or on a per-call
basis.
Traversal calls include:
• calls that are traversing a firewall
• SIP to H.323 interworking calls
• IPv4 to IPv6 interworking calls.
The main purpose of subzones is to enable you to control the
bandwidth used by various parts of your network.
Traversal calls use more resource that non-traversal calls, and
the numbers of each type of call are licensed separately. The
VCS has one license for the maximum number of concurrent
traversal calls it can take, and another for the maximum
number of concurrent non-traversal calls.
About the Default Subzone
Default Settings
When an endpoint registers with the VCS, its IP address is
checked and it is assigned to the appropriate subzone. If no
subzones have been created, or the endpoint’s IP address does
not match any of the specified subzones, it will be assigned to
the Default Subzone.
The VCS is shipped with the Default Subzone, Traversal
Subzone and Default Zone already created, and with links
between the three. You may delete or amend these default
links if you need to model restrictions of your network.
A call is “traversal” or “non-traversal” from the point of
view of the VCS through which it is being routed at the
time. A call between two endpoints may pass through a
series of VCSs. Some of these systems may just take the
signaling, in which case the call will be a non-traversal call for
that VCS. Other systems in the route may need to take the
media as well, and so the call will count as a traversal call on
that particular VCS.
If any of these links have been deleted, they may be
automatically restored via:
The use of a Default Subzone on its own (i.e. without any
other manually configured subzones) is suitable only if you
have uniform bandwidth available between all your endpoints.
However, it is possible for a Local Zone to contain two or more
different networks with different bandwidth limitations. In this
situation, you should configure separate subzones for each
different part of the network.
To restore this link via the web interface, you must recreate it
Bandwidth Consumption of Traversal Calls
Specifying the IP Address Range of a Subzone
Traversal calls between two endpoints within a single subzone
on the VCS must, like any other traversal call, pass through
the VCS’s Traversal Subzone. This means that such calls
will consume an amount of bandwidth from the originating
subzone’s total concurrent allocation that is equal to twice the
bandwidth of the call – once for the call from the subzone to
the Traversal Subzone, and again for the call from the Traversal
Subzone back to the originating subzone.
A subzone is defined by specifying a range of IP addresses.
The VCS allocates endpoints to a subzone based on their
IP address. You specify which IP addresses are associated
with the subzone by configuring up to 5 subnets for that
subzone.
If an endpoint’s IP address matches more than one
subnet, it will be allocated to the subnet with the
narrowest range.
Calls passing through the Traversal Subzone will consume an
amount of bandwidth within the subzone equal to that of the
call.
D14049.01
07.2007
Download from Www.Soanuals
ꢀ.coꢀm. 0All Manuals Search And Download.
TANDBERG VIDEO COMMUNICATION SERVER
ADMINISTRATOR GUIDE
BandwidthControl
Creating a Subzone
To add a new subzone:
• VCS Configuration > Local Zone > Subzones.
You will be taken to the Subzones page.
Select New.
You will be taken to the Create Subzone page.
Name
Enter the name you wish to assign to the subzone. You will
refer to this name when creating Links.
Subnet
Enter the IP address of the subnet. In conjunction with the
Prefix, this will define the range of IP addresses that will belong
to this subzone.
Prefix
Enter the number of bits of the Subnet IP Address which must
match for an IP address to belong in this subzone.
For example:
255.255.0.0 is equivalent to a prefix length of 16
255.255.255.0 is equivalent to a prefix length of 24
Bandwidth
description of these fields.
Create Subzone
Click here to create the subzone and return to the subzones
page.
D14049.01
07.2007
Download from Www.Soanuals
ꢀ.coꢀm. ꢀAll Manuals Search And Download.
TANDBERG VIDEO COMMUNICATION SERVER
ADMINISTRATOR GUIDE
BandwidthControl
Configuring a Subzone
To configure a subzone:
• VCS Configuration > Local Zone > Subzones.
You will be taken to the Subzones page.
Click on the subzone you wish to configure.
You will be taken to the Edit Subzone page.
Name
Enter the name you wish to assign to the subzone. You will
refer to this name when creating Links and Pipes.
Subnet 1
Enter the subnet IP Address and Prefix, This will define the
range of IP addresses that will belong to this subzone.
Subnet 2 - 5
Use these fields to define up to 4 further subnets for this
Subzone.
Bandwidth
description of these fields.
Save
Click here to save your changes.
D14049.01
07.2007
Download from Www.Soanuals
ꢀ.coꢀm. ꢁAll Manuals Search And Download.
TANDBERG VIDEO COMMUNICATION SERVER
ADMINISTRATOR GUIDE
BandwidthControl
Applying Bandwidth Limitations to Subzones
How Different Bandwidth Limitations are Managed
Types of Limitations
In situations where there are differing bandwidth limitations applied to the same link, the lower
limit will always be the one used when routing the call and taking bandwidth limitations into
account.
You can apply bandwidth limits to the Default Subzone, Traversal Subzone and all manually
configured subzones. The types of limitations you can apply vary depending on the type of
subzone, as follows:
For example, Subzone A may have a per call inter bandwidth of 128. This means that any
calls between Subzone A and any other subzone or zone will be limited to 128kbps. However,
Subzone A also has a link configured between it and Subzone B. This link uses a pipe with a
limit of 512kbps. In this situation, the lower limit of 128kbps will apply to calls between the two,
regardless of the larger capacity of the pipe.
Limitation Description
Can be applied to
Total
Limits the total concurrent bandwidth being
• Default Subzone
• Traversal Subzone
• Manually configured subzones
• Default Subzone
• Manually configured subzones
• Default Subzone
• Traversal Subzone
• Manually configured subzones
used by all endpoints in the subzone at any
one time.
In the reverse situation, where Subzone A has a per call inter bandwidth limit of 512kbps and a
link to Subzone B with a pipe of 128, any calls between the two subzones will still be limited to
128kbps.
Per call intra Limits the bandwidth of any individual call
between two endpoints within the subzone.
Per call inter Limits the bandwidth of any individual call
between an endpoint in the subzone, and an
endpoint in another subzone or zone.
For all these settings, a bandwidth mode of:
• None will mean that no bandwidth is allocated and therefore no calls can be made.
• Limited will mean that limits are applied. You must also enter a value in the corresponding
bandwidth (kbps) field.
• Unlimited will mean that no restrictions will be applied to the amount of bandwidth being used.
Use subzone bandwidth limits if you want to configure the bandwidth available between one
specific subzone and all other subzones or zones.
A non-traversal call between two endpoints within the same subzone would consume the
amount of bandwidth of that call. A traversal call between two endpoints within the same
subzone must, like any other traversal call, pass through the Traversal Subzone. This
means that such calls will consume from the originating subzone’s total concurrent allocation
twice the bandwidth of the call – once for the call from the subzone to the Traversal Subzone, and
again for the call from the Traversal Subzone back to the originating subzone.
Use Pipes if you want to configure the bandwidth available between one specific subzone
and another specific subzone or zone.
If your bandwidth configuration is such that multiple types of bandwidth restrictions are placed on
a call (for example, if there are both subzone bandwidth limits and pipe limits), the lowest limit will
always apply to that call.
Calls passing through the Traversal Subzone consume an amount of bandwidth within the
subzone equal to that of the call.
D14049.01
07.2007
Download from Www.Soanuals
ꢀ.coꢀm. 3All Manuals Search And Download.
TANDBERG VIDEO COMMUNICATION SERVER
ADMINISTRATOR GUIDE
BandwidthControl
About Pipes
Creating Pipes
It is possible to control the amount of
bandwidth used on calls between specific
subzones and zones. The limits can be
applied to the total concurrent bandwidth used
at any one time, or to the bandwidth used by
any individual call.
Name
Enter the name you wish to give to this pipe.
You will refer to this name when creating links.
To apply these limits, you create a pipe and
configure it with the required bandwidth
limitations. You then assign the pipe to a
link. Calls using the link will then have those
bandwidth limitations applied to them.
Total bandwidth mode
Determines whether there is a limit on the
total concurrent bandwidth of this pipe.
Unlimited: no limitations are in place.
Limited: there is a limit in place; you must
enter the limit in the field below.
Creating a new pipe
None: there is no bandwidth available.
To create a pipe:
• VCS Configuration > Bandwidth > Pipes.
You will be taken to the Pipes page.
Select New.
Total bandwidth (kbps)
Sets the limit on the total concurrent
bandwidth of this pipe.
You will be taken to the Create Pipe page.
Per call bandwidth mode
Determines whether there is a limit on the
bandwidth of individual calls via this pipe.
Unlimited: no limitations are in place.
Limited: there is a limit in place; you must
enter the limit in the field below.
None: there is no bandwidth available.
Per call bandwidth (kbps)
Sets the limit on the bandwidth of individual
calls via this pipe.
Create Pipe
Click here to create the pipe and return to the
Pipes page.
D14049.01
07.2007
Download from Www.Soanuals
ꢀ.coꢀm. 4All Manuals Search And Download.
TANDBERG VIDEO COMMUNICATION SERVER
ADMINISTRATOR GUIDE
BandwidthControl
Editing Pipes
Name
Editing an Existing Pipe
Enter the name you wish to give to this pipe.
You will refer to this name when creating links.
To configure details of a pipe:
• VCS Configuration > Bandwidth > Pipes
You will be taken to the Pipes page.
Click on the pipe you wish to configure.
You will be taken to the Edit Pipe page.
Total bandwidth mode
Determines whether there is a limit on the
total concurrent bandwidth of this pipe.
Unlimited: no limitations are in place.
Limited: there is a limit in place; you must
enter the limit in the field below.
None: there is no bandwidth available.
Total bandwidth (kbps)
Sets the limit on the total concurrent
bandwidth of this pipe.
Per call bandwidth mode
Determines whether there is a limit on the
bandwidth of individual calls via this pipe.
Unlimited: no limitations are in place.
Limited: there is a limit in place; you must
enter the limit in the field below.
None: there is no bandwidth available.
Per call bandwidth (kbps)
Sets the limit on the bandwidth of individual
calls via this pipe.
Delete
Click here to delete the pipe.
Save
Click here to save the changes.
D14049.01
07.2007
Download from Www.Soanuals
ꢀ.coꢀm. 5All Manuals Search And Download.
TANDBERG VIDEO COMMUNICATION SERVER
ADMINISTRATOR GUIDE
BandwidthControl
About Links
Creating Links
Subzones are connected to other subzones
and zones via links. For a call to take place,
the endpoints involved must each reside in
subzones or zones that have a link between
them. The link does not need to be direct; the
two endpoints may be linked via one or more
intermediary subzones.
Name
Enter the name you wish to assign to this link.
Links are used to calculate how a call is
routed over the network and therefore which
zones and subzones are involved and how
much bandwidth is available. If multiple
routes are possible, your VCS will perform the
bandwidth calculations using the one with the
fewest links.
Node 1, Node 2
Select the names of the two subzones, or the
subzone and zone between which you wish to
create a link.
Creating a New Link
To create a new link:
• VCS Configuration > Bandwidth > Links.
You will be taken to the Links page.
Click New.
You will be taken to the Create Link page.
Pipe 1, Pipe 2
If you wish to apply bandwidth limitations to
this link, select the pipe(s) to be applied.
For more information, see Applying Pipes to
Default Links
If a subzone has no links configured, then
endpoints within the subzone will only be
able to call other endpoints within the same
subzone. For this reason, when a subzone is
created, it is automatically given certain links.
Create Link
Click here to create the link and return to the
Links page.
D14049.01
07.2007
Download from Www.Soanuals
ꢀ.coꢀm. 6All Manuals Search And Download.
TANDBERG VIDEO COMMUNICATION SERVER
ADMINISTRATOR GUIDE
BandwidthControl
Editing Links
Name
Enter the name you wish to assign to this link.
Editing Links
To edit a link:
• VCS Configuration > Bandwidth > Links.
You will be taken to the Links page.
Click View/Edit.
You will be taken to the Edit Link page.
Node 1, Node 2
Select the names of the two subzones, or the
subzone and zone between which you wish to
create a link.
Pipe 1, Pipe 2
If you wish to apply bandwidth limitations to
this link, select the pipe(s) to be applied.
For more information, see Applying Pipes to
Cancel
Click here to return to the Links page without
saving your changes.
Delete
Click here to delete the link.
Save
Click here to save your changes.
D14049.01
07.2007
Download from Www.Soanuals
ꢀ.coꢀm. 7All Manuals Search And Download.
TANDBERG VIDEO COMMUNICATION SERVER
ADMINISTRATOR GUIDE
Bandwidth Control
Applying Pipes to Links
Default Links
Pipes are used to restrict the bandwidth of a link. When a pipe is applied to a link, it will restrict
the bandwidth of calls made between the two nodes of the link - the restrictions will apply to calls
in either direction.
About Default Links
If a subzone has no links configured, then endpoints within the subzone will only be able to call
other endpoints within the same subzone. For this reason, the VCS comes shipped with a set
of pre-configured links and will also automatically create new links each time you create a new
subzone.
Normally a single pipe would be applied to a single link. However, one or more pipes may be
applied to one or more links, depending on how you wish to model your network.
One Pipe, One Link
Applying a single pipe to a single link is useful when you wish to apply specific limits to calls
between a subzone and another specific subzone or zone.
Pre-Configured Links
The VCS is shipped with the Default Subzone, Traversal Subzone and Default Zone already
created, and with links pre-configured between the three. You may delete or amend these default
links if you need to model restrictions of your network.
One Pipe, Two or More Links
If any of these links have been deleted, they may all be automatically restored via:
Each pipe may be applied to multiple links. This is used to model the situation where one site
communicates with several other sites over the same broadband connection to the Internet. A
pipe should be configured to represent the broadband connection, and then applied to all the
links. This will allow you to configure the bandwidth options for calls in and out of that site.
• xCommand DefaultLinksAdd
instructions on how to do this.
Two Pipes, One Link
Automatically Created Links
Each link may have up to two pipes associated with it. This is used to model the situation where
the two nodes of a link are not directly connected, for example two sites that each have their own
broadband connection to the Internet. Each connection should have its own pipe, meaning that a
link between the two nodes should be subject to the bandwidth restrictions of both pipes.
Whenever a new subzone or zone is created, links are automatically created as follows:
New zone/subzone type Default links are created to...
Subzone
Default Subzone and Traversal Subzone
Default Subzone and Traversal Subzone
Default Subzone and Traversal Subzone
Default Subzone and Traversal Subzone
Traversal Subzone
Neighbor zone
DNS Zone
ENUM Zone
Traversal Client Zone
Traversal Server Zone
Traversal Subzone
You can edit any of these default links in the same way you would edit manually configured
Calls will fail if links are not configured correctly.
!
D14049.01
07.2007
Download from Www.Soanuals
ꢀ.coꢀm. 8All Manuals Search And Download.
TANDBERG VIDEO COMMUNICATION SERVER
ADMINISTRATOR GUIDE
BandwidthControl
Default Call Bandwidth, Insufficient Bandwidth and Downspeeding
About the Default Call Bandwidth
Configuring the Default Call Bandwidth and Downspeeding
Usually, when a call is initiated the endpoint
will include in the request the amount of
bandwidth it wishes to use. For those cases
where the endpoint has not specified the
bandwidth, you can set the VCS to apply a
default bandwidth value.
The default call bandwidth and downspeeding behavior are configured via:
• VCS Configuration > Bandwidth > Configuration.
You will be taken to the Bandwidth Configuration page.
Default call bandwidth (kbps)
About Downspeeding
Enter the bandwidth value to be used for
calls for which no bandwidth value has been
specified.
If bandwidth control is in use, there may
be situations when there is insufficient
bandwidth available to place a call at the
requested rate. By default (and assuming
that there is some bandwidth still available)
the VCS will still attempt to connect the call,
but at a reduced bandwidth – this is known as
downspeeding.
This value cannot be blank. The
default value is 384 kbps.
You can turn off downspeeding, in which case
if there is insufficient bandwidth to place
the call at the originally requested rate, the
call will not be placed at all. In this situation
users will get one of the following messages,
depending on the message that initiated the
search:
Downspeed per call mode
Determines what will happen if the per-call
bandwidth restrictions on a subzone or pipe
mean that there is insufficient bandwidth
available to place a call at the requested rate.
On: the call will be downspeeded.
Off: the call will not be placed.
• Exceeds Call Capacity
• Gatekeeper Resources Unavailable
Downspeeding can be configured so that it
is applied in either or both of the following
scenarios:
Downspeed total mode
Determines what will happen if the total
bandwidth restrictions on a subzone or pipe
mean that there is insufficient bandwidth
available to place a call at the requested rate.
• when the requested bandwidth for the call
exceeds the lowest per-call limit for the
subzone or pipe(s)
On: the call will be downspeeded.
Off: the call will not be placed.
• when placing the call at the requested
bandwidth would mean that the total
bandwidth limits for that subzone or pipe(s)
would be exceeded.
Save
Click here to save your changes
D14049.01
07.2007
Download from Www.Soanuals
ꢀ.coꢀm. 9All Manuals Search And Download.
TANDBERG VIDEO COMMUNICATION SERVER
ADMINISTRATOR GUIDE
BandwidthControl
Bandwidth Control Examples
Example Without a Firewall
An example deployment is shown opposite.
Each of the three offices (Enterprise, Home and Branch) is
represented as a separate subzone on the VCS, with bandwidth
configured according to local policy.
The enterprise’s leased line connection to the Internet, and
the DSL connections to the remote offices, are modeled as
separate pipes.
There are no firewalls involved in this scenario, so we can
configure direct links between each of the offices. Each link is
then assigned two pipes, representing the Internet connections
of the offices at each end of the link.
In this scenario, a call placed between the Home Office and
Branch Office will consume bandwidth from the Home and
Branch subzones and on the Home and Branch pipes. The
Enterprise’s bandwidth budget will be unaffected by the call.
D14049.01
07.2007
Download from Www.Soanuals
ꢀ.coꢁm. 0All Manuals Search And Download.
TANDBERG VIDEO COMMUNICATION SERVER
ADMINISTRATOR GUIDE
BandwidthControl
Bandwidth Control Examples
Example With a Firewall
If we modify the previous example deployment to include
firewalls between the offices, we can use TANDBERG’s
Expressway™ firewall traversal solution to maintain
connectivity. We do this by adding a VCS Border Controller
outside the firewalls on the public internet, which will work in
conjunction with the Enterprise VCS and Home and Branch
office endpoints to traverse the firewalls.
This example, the endpoints in the enterprise register with the
Enterprise VCS, whilst those in the Branch and Home offices
register with the VCS Border Controller.
The introduction of the firewalls means that there is no longer
any direct connectivity between the Branch and Home offices.
All traffic must be routed through the VCS Border Controller.
This is shown by the absence of a link between the Home and
Branch subzones.
VCS Border Controller Subzone Configuration
The VCS Border Controller has subzones configured for the
Home Office and Branch Office. These are linked to the VCS
Border Controller’s Traversal Subzone, with pipes placed on
each link. All calls from the VCS Border Controller to the
Enterprise VCS must go through the Traversal Subzone and
will consume bandwidth from this Subzone. Note also that
calls from the Home Office to the Branch Office must also
go through the Traversal Subzone, and will also consume
bandwidth from this Subzone as well as the Home and Branch
subzones and Home Office, Branch office and Enterprise pipes.
In this example we have assumed that there is no bottleneck
on the link between the VCS Border Controller and the
Enterprise network, so have not placed a pipe on this link. If
you want to limit the amount of traffic flowing through your
firewall, you could provision a pipe on this link.
Enterprise VCS Subzone Configuration
Because the Enterprise VCS is only managing endpoints on
the LAN, its configuration is simpler. All of the endpoints in the
enterprise are assigned to the Default Subzone. This is linked
to the Traversal Subzone, through which all calls leaving the
Enterprise must pass.
D14049.01
07.2007
Download from Www.Soanuals
ꢀ.coꢁm. ꢀAll Manuals Search And Download.
TANDBERG VIDEO COMMUNICATION SERVER
ADMINISTRATOR GUIDE
Maintenance
Upgrading Software
Upgrading Using SCP/PSCP
About Upgrading the VCS Software
It is possible to install new releases of the VCS software on your existing hardware. Software
upgrade can be done in one of two ways:
To upgrade using SCP or PSCP (part of the PuTTY free Telnet/SSH package) you will need to
transfer two files to the VCS:
• a text file containing just the 16-character Release Key
• the file containing the software image.
This section describes how both of these methods are used to perform upgrades.
To upgrade using SCP or PSCP:
ꢀ. Ensure the VCS is turned on and available on IP.
ꢁ. Upload the release key file using SCP/PSCP to the /tmpfolder on the system e.g.
scp release-key root@10.0.0.1:/tmp/release-keyor
pscp release-key root@10.0.0.1:/tmp/release-key
3. Enter password when prompted.
4. Copy the software image using SCP/PSCP. The target name must be
/tmp/tandberg-image.tar.gz, e.g.
Prerequisites
scp s42100x11.tar.gz root@10.0.0.1:/tmp/tandberg-image.tar.gzor
pscp s42100x11.tar.gz root@10.0.0.1:/tmp/tandbergimage.tar.gz
The upgrade requires you to have:
• a valid Release key
• a software image file
5. Enter password when prompted.
6. Wait until the software has installed completely. This should not take more than two minutes.
7. Reboot the system.
Contact your TANDBERG representative for more information on how to obtain these.
After about four minutes the system will be ready to use.
Backing up the Existing Configuration Before Upgrading
The existing configuration will be restored after performing an upgrade. However, we recommend
that you make a backup of the existing configuration before performing the upgrade.
To do this:
ꢀ. Use the command line interface to log on to the VCS.
ꢁ. Issue the command xConfiguration.
3. Save the resulting output to a file, using cut-and-paste or some other means provided by your
terminal emulator.
You must name the files exactly as described above.
To restore your configuration:
!
ꢀ. Remove the *cfrom in front of each command.
ꢁ. Paste this information back in to the command line interface.
You must transfer the Release Key file before transferring the software image.
!
D14046.01
07.2007
Download from Www.Soanuals
ꢀ.coꢁm. ꢁAll Manuals Search And Download.
TANDBERG VIDEO COMMUNICATION SERVER
ADMINISTRATOR GUIDE
Maintenance
Upgrading
System Information
Upgrading via the Web Interface
This section tells you about the
software and hardware that currently
make up your system.
To upgrade your software via the web
interface:
• Maintenance > Upgrade.
You will be taken to the Upgrade page.
Release key
Enter the 16-character Release Key that has
been provided to you.
Install Software
Click Install Software. You will be taken to a
new page.
Select the software file
Enter the path of the software image file, or
click Browse to locate it on the network.
Install
Click here to upload the image file.
Before you start the upgrade, ensure
that the software image file has been
saved in a network location that can
be accessed via the web interface. Also
ensure that you have the 16-character
Release Key readily available.
D14046.01
07.2007
Download from Www.Soanuals
ꢀ.coꢁm. 3All Manuals Search And Download.
TANDBERG VIDEO COMMUNICATION SERVER
ADMINISTRATOR GUIDE
Maintenance
Option Keys
Adding Options via the CLI
About Adding Extra Options
The following VCS features can be added to your existing system by installing the appropriate
options:
To return the indexes of all the Option Keys that are already installed on your system:
• xStatus Options
To add a new Option Key to your system:
• Border Controller functionality
• user policy
• H.323 to SIP Interworking gateway
• the number of traversal calls allowed
• the number of non-traversal calls allowed
• the number of registrations allowed
To add any of these extra options, you need to obtain a valid Option Key and install it on your
system. Contact your TANDBERG representative for more information on how to obtain Option
Keys.
Options can be installed in either of two ways:
This section describes both methods.
When using the CLI to add an extra option key, you can use any unused option index. If you
chose an existing option index, that option will be overwritten and the extra functionality
will no longer exist.
!
D14046.01
07.2007
Download from Www.Soanuals
ꢀ.coꢁm. 4All Manuals Search And Download.
TANDBERG VIDEO COMMUNICATION SERVER
ADMINISTRATOR GUIDE
Maintenance
Option Keys
Adding Options via the Web Interface
To add options via the web interface:
This section lists the keys that are
already installed on your system along
with a description of the options they
• Maintenance > Option Keys.
provide.
You will be taken to the Option Keys page.
System Information
This section tells you about the
hardware and options that currently
make up your system.
Add option key
Enter the 20-character Option Key that has
been provided to you for the option you wish
to add.
Add Option
Click Add Option.
D14046.01
07.2007
Download from Www.Soanuals
ꢀ.coꢁm. 5All Manuals Search And Download.
TANDBERG VIDEO COMMUNICATION SERVER
ADMINISTRATOR GUIDE
Maintenance
Security
Select the file containing trusted CA...
About Security
Allows you to upload a PEM file that identifies
the list of Certificate Authorities trusted by
the VCS. The VCS will only accept certificates
signed by a CA on this list. If you are
For extra security, you may wish to have the
VCS communicate with other systems (e.g.
servers such as LDAP servers or clients such
as SIP endpoints) using TLS encryption.
connecting to an LDAP database using TLS
encryption, the certificate used by the LDAP
database must be signed by a CA on this list.
For this to work successfully in a connection
between a client and server:
• the server must have a certificate installed
that verifies its identity. This certificate
must be signed by a Certificate Authority
(CA).
Upload CA certificate
Click here once you have selected the file to
upload it.
• the client must trust the CA that signed the
certificate used by the server.
The VCS allows you to install appropriate files
so that it can act as either a client or a server
in connections using TLS.
Select the server private key file
Allows you to upload a PEM file that identifies
the private key used to encrypt the server
certificate used by the VCS. This private key
must not be password protected.
Enabling Security
The files that enable secure connections over
TLS are installed via the web interface. They
cannot be installed using the CLI.
Select the server certificate file
Allows you to uploads PEM file that
contains the server certificate used for
HTTPS connections to the VCS from user
or administrator web browsers, and by SIP
endpoints or servers connecting to the VCS
over TLS.
To enable security using the web interface:
• Maintenance > Security.
You will be taken to the Security page.
Download server certificate
Provides you with the PEM file containing the
certificate used by the VCS to identify itself to
SIP and HTTPS clients when communicating
over SSL/TLS.
Upload server certificate data
Click here once you have selected the files to
upload them.
D14046.01
07.2007
Download from Www.Soanuals
ꢀ.coꢁm. 6All Manuals Search And Download.
TANDBERG VIDEO COMMUNICATION SERVER
ADMINISTRATOR GUIDE
Maintenance
Passwords
Changing the Administrator Password
To change the password used to log in to the VCS:
• Maintenance > Passwords.
You will be taken to the Passwords page.
You must restart the system for changes to take effect.
New password
Enter your new password here.
Retype new password
Retype your new password here.
Delete password
Click here to reset the Administrator Password to a blank field.
System Snapshot
About the System Snapshot
The system snapshot is used for diagnostic purposes. It is a
file that can be sent to your system support representative at
their request to assist them in troubleshooting issues you may
be experiencing.
Creating a System Snapshot
To create a system snapshot file:
• Maintenance > System Snapshot.
You will be taken to the System Snapshot page.
Click on the Create System Snapshot button.
Save the resulting file to an appropriate location.
D14046.01
07.2007
Download from Www.Soanuals
ꢀ.coꢁm. 7All Manuals Search And Download.
TANDBERG VIDEO COMMUNICATION SERVER
ADMINISTRATOR GUIDE
Maintenance
Restarting
About Restarting
Some configuration changes will require a restart of the system
to take effect. There will be a Restart button at the bottom of
any web pages that include such options. If you do not restart
the system after making these changes, you will receive a
warning telling you the system needs to be restarted.
Restarting will cause any active calls to be terminated.
There are two ways to restart the system:
• Maintenance > Restart.
You will be taken to the Restart page.
Restart System
Do not restart the
system while the red
ALM LED on the front
of the box is flashing.
!
Click here to restart the
system.
Shutting Down
About Shutting Down
The system must be shut down before it is unplugged.
Once the system has been shut down, the only way it can be
restarted is by pressing the soft power button on the unit itself.
You must therefore have physical access to the unit if you wish
to be able to restart it after shut down.
Shutting down will cause any active calls to be terminated.
To shut down the system:
• Maintenance > Shutdown.
You will be taken to the Shutdown page.
Shutdown System
Do not shutdown the
system while the red
ALM LED on the front
!
Click here to shutdown the
system.
of the box is flashing.
D14046.01
07.2007
Download from Www.Soanuals
ꢀ.coꢁm. 8All Manuals Search And Download.
TANDBERG VIDEO COMMUNICATION SERVER
ADMINISTRATOR GUIDE
CommandReference - xConfiguration
Administration
HTTP
Mode: <On/Off>
Determines whether HTTP calls will be redirected to the HTTPS port.
On: calls will be redirected to HTTPS.
Off: no HTTP access will be available.
HTTPS
Mode: <On/Off>
Determines whether the VCS can be accessed via HTTPS. This must be On to enable both web interface and TMS access.
On: HTTPS access is enabled.
Off: HTTPS access is disabled.
SSH
Mode: <On/Off>
Determines whether the VCS can be accessed via SSH and SCP.
On: SSH/SCP access is enabled.
Off: SSH/SCP access is disabled.
Telnet
Mode: <On/Off>
Determines whether the VCS can be accessed via Telnet.
On: Telnet access is enabled.
Off: Telnet access is disabled.
TimeOut: <0..ꢀ0000>
Sets the number of minutes that an administration session (HTTPS, Telnet or SSH) may be inactive before the session is timed out. A value of 0 turns session time outs off.
Alternates
Alternate [ꢀ..5]
Address: <S: 0, ꢀꢁ8>
Specifies the IP address of an alternate VCS. Up to 5 alternates may be configured. When the VCS receives a Location Request, all alternates will also be
queried.
Authentication
Credential
[ꢀ..ꢁ500]
Name: <S: 0, ꢁ55>
Defines the name for this entry in the local authentication database.
Password: <S: 0, 50>
Defines the password for this entry in the local authentication database.
Database: <LocalDatabase/LDAPDatabase>
Selects the database to be used for the storage of password information for authentication.
LocalDatabase: the local database will be used.
LDAPDatabase: a remote LDAP repository will be used.
D14049.01
07.2007
Download from Www.Soanuals
ꢀ.coꢁm. 9All Manuals Search And Download.
TANDBERG VIDEO COMMUNICATION SERVER
ADMINISTRATOR GUIDE
CommandReference - xConfiguration
Authentication
cont...
LDAP
AliasOrigin: <LDAP/Endpoint/Combined>
Determines which aliases (i.e. from the endpoint or the database) should be used to register the endpoint.
LDAP: the alias(es) presented by the endpoint will be used as long as they are listed in the LDAP database for the endpoint’s username.
Endpoint: the alias(es) presented by the endpoint will be used; any in the LDAP database will be ignored.
Combined: the alias(es) presented by the endpoint will be used in addition to any that are listed in the LDAP database for the endpoint’s username.
BaseDN: <S: 0, ꢁ55>
Specifies the Distinguished Name to use when connecting to an LDAP server.
Mode: <On/Off>
Determines whether or not to enforce authentication for H.323 and SIP registrations.
On: authentication is required.
Off: authentication is not required.
Password: <S: 0, 50>
Specifies the password to be used by the VCS when authenticating with another system.
UserName: <S: 0, ꢁ55>
Specifies the username to be used by the VCS when authenticating with another system.
Bandwidth
Default: <64..ꢁ048>
Sets the bandwidth (in kbps) to be used on calls managed by the VCS in cases where no bandwidth has been specified by the endpoint.
Downspeed
PerCall
Total
Mode: <On/Off>
Determines whether or not the system will attempt to downspeed a call if there is insufficient per-call bandwidth available to fulfil the
request.
On: the system will attempt to place the call at a lower bandwidth.
Off: the call will be rejected.
Mode: <On/Off>
Determines whether or not the system will attempt to downspeed a call if there is insufficient total bandwidth available to fulfill the
request.
On: the system will attempt to place the call at a lower bandwidth.
Off: the call will be rejected.
D14049.01
07.2007
Download from Www.Soanuals
ꢀ.co3m. 0All Manuals Search And Download.
TANDBERG VIDEO COMMUNICATION SERVER
ADMINISTRATOR GUIDE
CommandReference - xConfiguration
Bandwidth
cont...
Link [ꢀ..400]
Name: <S: ꢀ, 50>
Assigns a name to this link.
Nodeꢀ
Nodeꢁ
Pipeꢀ
Name: <S: 0, 50>
Specifies the first zone or subzone to which this link will be applied.
Name: <S: 0, 50>
Specifies the second zone or subzone to which this link will be applied.
Name: <S: 0, 50>
Specifies the first pipe to be associated with this link.
Pipeꢁ
Name: <S: 0, 50>
Specifies the second pipe to be associated with this link.
Pipe [ꢀ..ꢀ00]
Bandwidth
PerCall
Mode: <None/Limited/Unlimited>
Determines whether or not this pipe is limiting the bandwidth of individual calls.
None: no bandwidth will be available.
Limited: there will be a limit on the bandwidth.
Unlimited: there will be no limit on the bandwidth.
Limit: <ꢀ..ꢀ000000>
If this pipe has limited per-call bandwidth, sets the maximum amount of bandwidth (in kbps) available for any
one call.
Total
Mode: <None/Limited/Unlimited>
Determines whether or not this pipe is enforcing total bandwidth restrictions.
None: no bandwidth will be available.
Limited: there will be a limit on the bandwidth.
Unlimited: there will be no limit on the bandwidth.
Limit: <ꢀ..ꢀ000000>
If this pipe has limited bandwidth, sets the maximum bandwidth (in kbps) available at any one time on the pipe.
Name: <S: ꢀ, 50>
Assigns a name to this pipe.
D14049.01
07.2007
Download from Www.Soanuals
ꢀ.co3m. ꢀAll Manuals Search And Download.
TANDBERG VIDEO COMMUNICATION SERVER
ADMINISTRATOR GUIDE
CommandReference - xConfiguration
Call
Services
CallsToUnknownIPAddresses: <Off/Direct/Indirect>
Determines the way in which the VCS will attempt to call systems which are not registered with it or one of its neighbors.
Direct: Allows an endpoint to make a call to an unknown IP address without the VCS querying any neighbors. The call setup would occur just as it would if the
far end were registered directly to the local system.
Indirect: Upon receiving a call to an unknown IP address, the VCS will query its neighbors for the remote address, relying on the response from the neighbor to
allow the ability for the call to be completed; connecting through the routing rules as it would through the neighbor relationship.
Off: This will not allow any endpoint registered directly to the VCS to call an IP address of any system not also registered directly to that VCS.
Fallback Alias: <S: 0, 60>
Specifies the alias to which incoming calls are placed for calls where the IP address or domain name of the VCS has been given but no callee alias has been
specified.
Ethernet
Speed: <Auto/ꢀ0half/ꢀ0full/ꢀ00half/ꢀ00full/ꢀ000full/None>
Sets the speed of the Ethernet link.
Auto: the VCS will automatically determine the speed to be used.
10half: a speed of 10half will be used.
10full: a speed of 10full will be used.
100half: a speed of 100half will be used.
100full: a speed of 100full will be used.
1000full: a speed of 1000full will be used.
None: the VCS will automatically determine the speed to be used.
Note: You must restart the system for any changes to take effect.
ExternalManager
Address: <S: 0, ꢀꢁ8>
Sets the IP address or FQDN of the External Manager.
Path: <S: 0, ꢁ55>
Sets the URL of the External Manager.
H3ꢁ3
Gatekeeper
AutoDiscovery
Mode: <On/Off>
Determines whether or not the VCS responds to gatekeeper discovery requests from endpoints.
On: the VCS will respond to requests.
Off: the VCS will not respond to requests.
CallSignaling
PortRange
Start: <ꢀ0ꢁ4..65534>
Specifies the lower port in the range to be used by calls once they are established.
End: <ꢀ0ꢁ4..65534>
Specifies the upper port in the rage to be used by calls once they are established.
D14049.01
07.2007
Download from Www.Soanuals
ꢀ.co3m. ꢁAll Manuals Search And Download.
TANDBERG VIDEO COMMUNICATION SERVER
ADMINISTRATOR GUIDE
CommandReference - xConfiguration
H3ꢁ3
cont...
Gatekeeper
cont...
CallSignaling
cont...
TCP
Port: <ꢀ0ꢁ4..65534>
Specifies the port that listens for H.323 call signaling.
CallTimeToLive: <60..65534>
Specifies the interval (in seconds) at which the VCS polls the endpoints in a call to verify that they are still in the call.
Registration
ConflictMode: <Reject/Overwrite>
Determines how the system will behave if an endpoint attempts to register an alias currently registered from another IP address.
Reject: denies the registration.
Overwrite: deletes the original registration and replaces it with the new registration.
UDP Port: <ꢀ0ꢁ4..65534>
Specifies the port to be used for H.323 UDP registrations.
TimeToLive: <60..65534>
Specifies the interval (in seconds) at which an H.323 endpoint must re-register with the VCS in order to confirm that it is still functioning.
Mode: <On/Off>
Determines whether or not the VCS will provide H.323 gatekeeper functionality.
On: the VCS will act as an H.323 gatekeeper.
Off: the VCS will not act as an H.323 gatekeeper.
Interworking
Mode: <On/Off/RegisteredOnly>
Determines whether or not the VCS will act as a gateway between SIP and H.323 calls.
Off: the VCS will not act as a SIP-H.323 gateway.
RegisteredOnly: the VCS will act as a SIP-H.323 gateway but only if at least one of the endpoints is locally registered.
On: the VCS will act as SIP-H.323 gateway regardless of whether the endpoints are locally registered (you must have the appropriate option key enabled to use this feature).
IP
Address: <IPAddr>
Specifies the IPv4 address of the VCS. Note: You must restart the system for any changes to take effect.
DNS
Domain
Name: <S: 0, ꢀꢁ8>
Specifies the name to be appended to the host name before a query to the DNS server is executed. Used only when attempting to
resolve a domain name which is not fully qualified for NTP, LDAP, External Manager and Log servers.
Server [ꢀ..5]
Address: <S: 0, 39>
Sets the IP address of up to 5 DNS servers to be used when resolving domain names.
Gateway: <IPAddr>
Specifies the IPv4 gateway of the VCS. Note: You must restart the system for any changes to take effect.
D14049.01
07.2007
Download from Www.Soanuals
ꢀ.co3m. 3All Manuals Search And Download.
TANDBERG VIDEO COMMUNICATION SERVER
ADMINISTRATOR GUIDE
CommandReference - xConfiguration
IP
SubnetMask: <IPAddr>
cont...
Specifies the IPv4 subnet mask of the VCS. Note: You must restart the system for any changes to take effect.
V6
Address: <S: 0, 39>
Specifies the IPv6 address of the VCS. Note: You must restart the system for any changes to take effect.
Gateway: <S: 0, 39>
Specifies the IPv6 gateway of the VCS. Note: You must restart the system for any changes to take effect.
IPProtocol: <Both/IPv4/IPv6>
Selects the IP protocol(s) supported by the VCS.
Both: the VCS will support both IPv4 and IPv6.
IPv4: the VCS will support IPv4 only.
IPv6: the VCS will support IPv6 only.
Note: You must restart the system for any changes to take effect.
LDAP
Encryption: <Off/TLS>
Sets the encryption to be used for the connection to the LDAP server.
Off: no encryption is used.
TLS: TLS encryption is used.
Password: <S: 0, ꢀꢁ8>
Sets the password to be used when binding to the LDAP server.
Server
Address: <S: 0, ꢀꢁ8>
Sets the IP address or FQDN of the LDAP server to be used when making LDAP queries.
Port: <ꢀ..65534>
Sets the IP port of the LDAP server to be used when making LDAP queries.
UserDN: <S: 0, ꢁ55>
Sets the user distinguished name to be used when binding to the LDAP server.
Log
Level: <ꢀ..3>
Controls the granularity of event logging. 1 is the least verbose, 3 the most.
Server
Address: <S: 0, ꢀꢁ8>
Specifies the IP address or FQDN of the server to which the log will be written.
NTP
Address: <S: 0, ꢀꢁ8>
Sets the IP address or FQDN of the NTP server to be used when synchronizing system time.
D14049.01
07.2007
Download from Www.Soanuals
ꢀ.co3m. 4All Manuals Search And Download.
TANDBERG VIDEO COMMUNICATION SERVER
ADMINISTRATOR GUIDE
CommandReference - xConfiguration
Option [ꢀ..64]
Key: <S: 0, 90>
Specifies the option key of your software option. These are added to the VCS in order to add extra functionality, such as increasing the VCS’s capacity. Contact your TANDBERG repre-
sentative for further information.
Policy
AdministratorPolicy
UserPolicy
Mode: <On/Off>
Enables and disables use of Administrator Policy.
On: Administrator Policy is in use.
Off: Administrator Policy is not in use.
Mode: <Off/Local/Remote>
Determines the User Policy Manager usage and location.
Off: User Policy Manager is not used.
Local: the on-box User Policy Manager is used.
Remote: the off-box User Policy Manager is used.
Server
Address: <S: 0, ꢀꢁ8>
Specifies the IP address or FQDN of the remote User Policy Manager.
Password: <S: 0, 30>
Specifies the password used by the VCS to log in and query the remote User Policy Manager
Path: <S: 0, ꢁ55>
Specifies the URL of the remote User Policy Manager.
Protocol: <HTTP/HTTPS>
Specifies the protocol used to connect to the remote User Policy Manager.
HTTP: HTTP will be used.
HTTPS: HTTPS will be used.
UserName: <S: 0, 30>
Specifies the user name used by the VCS to log in and query the remote User Policy Manager.
D14049.01
07.2007
Download from Www.Soanuals
ꢀ.co3m. 5All Manuals Search And Download.
TANDBERG VIDEO COMMUNICATION SERVER
ADMINISTRATOR GUIDE
CommandReference - xConfiguration
Registration
AllowList [ꢀ..ꢁ500]
Pattern
String: <S: 0, 60>
Specifies an entry to be added to the Allow List. If one of an endpoint’s aliases matches one of the patterns in the Allow List, the
registration will be permitted.
Type: <Exact/Prefix/Suffix/Regex>
Determines the way in which the entry in the Allow List must match the alias.
Exact: the string must match the alias character for character.
Prefix: the string must appear at the beginning of the alias.
Suffix: the string must appear at the end of the alias.
Regex: the string will be treated as a regular expression.
DenyList [ꢀ..ꢁ500]
Pattern
String: <S: 0, 60>
Specifies an entry to be added to the Deny List. If one of an endpoint’s aliases matches one of the patterns in the Deny List, the regis-
tration will not be permitted.
Type: <Exact/Prefix/Suffix/Regex>
Determines the way in which the entry in the Deny List must match the alias.
Exact: the string must match the alias character for character.
Prefix: the string must appear at the beginning of the alias.
Suffix: the string must appear at the end of the alias.
Regex: the string will be treated as a regular expression
RestrictionPolicy: <None/AllowList/DenyList>
Specifies the policy to be used when determining which endpoints may register with the system.
None: Allow Lists and Deny Lists will not be used.
AllowList: the endpoint’s alias must match an entry on the Allow List in order for it to be permitted to register.
DenyList: the endpoint will not be permitted to register if its alias matches an entry on the Deny List.
SIP
Domains
Domain [ꢀ..ꢁ0]
Name: <S: 0, ꢀꢁ8>
Specifies a domain for which this VCS is authoritative.
Mode: <On/Off>
Determines whether or not the VCS will provide SIP registrar and SIP proxy functionality.
On: the VCS will act as a SIP registrar/proxy.
Off: the VCS will not act as a SIP registrar/proxy.
Registrar
Mode: <On/Off>
Determines whether the box will act as a SIP registrar.
On: the VCS will act as a DIP registrar.
Off: the VCS will not act as a SIP registrar.
D14049.01
07.2007
Download from Www.Soanuals
ꢀ.co3m. 6All Manuals Search And Download.
TANDBERG VIDEO COMMUNICATION SERVER
ADMINISTRATOR GUIDE
CommandReference - xConfiguration
SIP
Registration
ExpireDelta: <5..7ꢁ00>
cont...
Specifies the period within which a SIP endpoint must re-register with the VCS to prevent its registration expiring.
Proxy
Mode: <Off/ProxyToKnownOnly/ProxyToAny>
Specifies how proxied registrations should be handled.
Off: registration requests will not be proxied.
ProxyToKnownOnly: registration requests will be proxied to neighbors only.
ProxyToAny: Registration requests will be proxied in accordance with the VCS’s existing call processing rules.
TCP
TLS
UDP
Mode: <On/Off>
Determines whether incoming SIP calls using the TCP protocol will be allowed.
On: SIP calls using the TCP protocol will be allowed.
Off: SIP calls using the TCP protocol will not be allowed
Port: <ꢀ0ꢁ4..65534>
Specifies the listening port for incoming SIP TCP calls.
Mode: <On/Off>
Determines whether incoming SIP calls using the TLS protocol will be allowed.
On: SIP calls using the TLS protocol will be allowed
Off: SIP calls using the TLS protocol will not be allowed
Port: <ꢀ0ꢁ4..65534>
Specifies the listening port for incoming SIP TLS calls.
Mode: <On/Off>
Determines whether incoming SIP calls using the UDP protocol will be allowed.
On: SIP calls using the UDP protocol will be allowed.
Off: SIP calls using the UDP protocol will not be allowed.
Port: <ꢀ0ꢁ4..65534>
Specifies the listening port for incoming SIP UDP calls.
D14049.01
07.2007
Download from Www.Soanuals
ꢀ.co3m. 7All Manuals Search And Download.
TANDBERG VIDEO COMMUNICATION SERVER
ADMINISTRATOR GUIDE
CommandReference - xConfiguration
SNMP
CommunityName: <S: 0, ꢀ6>
Sets the VCS’s SNMP community name.
Mode: <On/Off>
Enables or disables SNMP support.
On: SNMP support is enabled.
Off: SNMP support is not enabled.
Note: You must restart the system for any changes to take effect.
SystemContact: <S: 0, 70>
Specifies the name of the person who can be contacted regarding issues with the VCS.
SystemLocation: <S: 0, 70>
Specifies the physical location of the VCS.
SystemUnit
Name: <S: 0, 50>
Defines the name of the VCS. Choose a name that uniquely identifies the system.
Password: <S: 0, ꢀ6>
Defines the password of the VCS. The password is used to login with Telnet, HTTP(S), SSH, SCP, and on the serial port.
TimeZone
Name: <S: 0, 64>
Sets the local time zone of the VCS. Time zone names follow the POSIX naming convention e.g. Europe/London or America/New_York.
Transform [ꢀ..ꢀ00]
Pattern
String: <S: 0, 60>
Specifies the pattern against which the alias is compared.
Type: <Exact/Prefix/Suffix/Regex>
Determines the way in which the string must match the alias.
Exact: the string must match the alias character for character.
Prefix: the string must appear at the beginning of the alias.
Suffix: the string must appear at the end of the alias.
Regex: the string will be treated as a regular expression.
Behavior: <Strip/Replace>
Determines how the matched part of the alias will be modified.
Strip: the matching prefix or suffix will removed from the alias.
Replace: the matching part of the alias will be substituted with the text in the Replace string.
D14049.01
07.2007
Download from Www.Soanuals
ꢀ.co3m. 8All Manuals Search And Download.
TANDBERG VIDEO COMMUNICATION SERVER
ADMINISTRATOR GUIDE
CommandReference - xConfiguration
Transform [ꢀ..ꢀ00]
cont...
Pattern
cont...
Replace: <S: 0, 60>
(Applies only if pattern behavior is set to Replace.)
Specifies the string to be used as a substitution for the part of the alias that matched the pattern.
Priority: <ꢀ..65534>
Assigns a priority to the specified transform. Transforms are applied in order of priority, and the priority must be unique for each transform.
Traversal
Media
Port
Start: <ꢀ0ꢁ4..65534>
For traversal calls (i.e. where the VCS is taking the media as well as the signaling), specifies the lower port in the range to be used for
the media.
End: <ꢀ0ꢁ4..65534>
For traversal calls (i.e. where the VCS is taking the media as well as the signaling), specifies the upper port in the range to be used for
the media.
Server
H3ꢁ3
Assent
CallSignaling
CallSignaling
RTCP
Port: <ꢀ0ꢁ4..65534>
Specifies the port on the VCS to be used for Assent signaling.
H460ꢀ8
Port: <ꢀ0ꢁ4..65534>
Specifies the port on the VCS to be used for H.460.18 signaling.
Media
Demultiplexing
Port: <ꢀ0ꢁ4..65534>
Specifies the port on the VCS to be used for demultiplexing RTCP media. Note: You must
restart the system for any changes to take effect.
RTP
Port: <ꢀ0ꢁ4..65534>
Specifies the port on the VCS to be used for demultiplexing RTP media. Note: You must restart
the system for any changes to take effect.
STUN
Discovery
Mode: <On/Off>
Determines whether the VCS will offer STUN discovery services to traversal clients.
On: STUN discovery services are available.
Off: STUN discovery services are not available.
Port: <ꢀ0ꢁ4..65534>
Specifies the port to be used for STUN discovery services.
D14049.01
07.2007
Download from Www.Soanuals
ꢀ.co3m. 9All Manuals Search And Download.
TANDBERG VIDEO COMMUNICATION SERVER
ADMINISTRATOR GUIDE
CommandReference - xConfiguration
Traversal
cont...
Server
cont..
STUN
cont...
Relay
Mode: <On/Off>
Determines whether the VCS will offer STUN relay services to traversal clients.
On: STUN relay services are available.
Off: STUN relay services are not available.
.
Port: <ꢀ0ꢁ4..65534>
Specifies the listening port for STUN relay requests.
Media
Port
Start: <ꢀ0ꢁ4..65534>
Specifies the lower port in the range to be used for
STUN media relay.
End: <ꢀ0ꢁ4..65534>
Specifies the upper port in the range to be used for
STUN media relay.
Zones
LocalZone
DefaultSubZone
Bandwidth
PerCall
Inter
Mode: <None/Limited/Unlimited>
Determines whether there is a limit on the bandwidth
for any one call to or from an endpoint in the Default
Subzone.
None: no bandwidth will be available.
Limited: there will be a limit on the bandwidth.
Unlimited: there will be no limit on the bandwidth.
Limit: <ꢀ..ꢀ00000000>
(applies only if Mode is set to Limited)
Specifies the bandwidth limit (in kbps) for any one
call to or from an endpoint in the Default Subzone.
Intra
Mode: <None/Limited/Unlimited>
Determines whether there is a limit on the bandwidth
for any one call between two endpoints within the
Default Subzone.
None: no bandwidth will be available.
Limited: there will be a limit on the bandwidth.
Unlimited: there will be no limit on the bandwidth.
Limit: <ꢀ..ꢀ00000000>
(applies only if Mode is set to Limited)
Specifies the bandwidth limit (in kbps) for any one call
between two endpoints within the Default Subzone.
D14049.01
07.2007
Download from Www.Soanuals
ꢀ.co4m. 0All Manuals Search And Download.
TANDBERG VIDEO COMMUNICATION SERVER
ADMINISTRATOR GUIDE
CommandReference - xConfiguration
Zones
cont...
LocalZone
cont...
DefaultSubZone
cont...
Bandwidth
cont...
Total
Mode: <None/Limited/Unlimited>
Determines whether the Default Subzone has a limit on the total bandwidth being
used by its endpoints at any one time.
None: no bandwidth will be available.
Limited: there will be a limit on the bandwidth.
Unlimited: there will be no limit on the bandwidth.
Limit: <ꢀ..ꢀ00000000>
(applies only if Mode is set to Limited)
Sets the total bandwidth limit (in kbps) of the Default Subzone.
SubZone [ꢀ..ꢀ00]
Bandwidth
PerCall
Inter
Mode: <None/Limited/Unlimited>
Determines whether there is a limit on the band-
width for any one call to or from an endpoint in this
subzone.
None: no bandwidth will be available.
Limited: there will be a limit on the bandwidth.
Unlimited: there will be no limit on the bandwidth.
Limit: <ꢀ..ꢀ00000000>
(applies only if Mode is set to Limited)
Specifies the bandwidth limit (in kbps) on any one call
to or from an endpoint in this subzone
Intra
Mode: <None/Limited/Unlimited>
Determines whether there is a limit on the bandwidth
for any one call between two endpoints within this
subzone.
None: no bandwidth will be available.
Limited: there will be a limit on the bandwidth.
Unlimited: there will be no limit on the bandwidth.
Limit: <ꢀ..ꢀ00000000>
(applies only if Mode is set to Limited)
Specifies the bandwidth limit (in kbps) for any one
call between two endpoints within this subzone.
D14049.01
07.2007
Download from Www.Soanuals
ꢀ.co4m. ꢀAll Manuals Search And Download.
TANDBERG VIDEO COMMUNICATION SERVER
ADMINISTRATOR GUIDE
CommandReference - xConfiguration
Zones
cont...
LocalZone
cont...
SubZone [ꢀ..ꢀ00]
cont...
Bandwidth
cont....
Total
Mode: <None/Limited/Unlimited>
Determines whether this subzone has a limit on the total bandwidth of calls being
used by its endpoints at any one time.
None: no bandwidth will be available.
Limited: there will be a limit on the bandwidth.
Unlimited: there will be no limit on the bandwidth.
Limit: <ꢀ..ꢀ00000000>
(applies only if Mode is set to Limited)
Sets the total bandwidth limit (in kbps) of this subzone.
Name: <S: ꢀ, 50>
Assigns a name to this subzone.
Subnet [ꢀ..5]
IP
Address: <S: 0, 39>
Specifies an IP address used (in conjunction with the IP Prefix Length) to identify a subnet to be
assigned to this subzone.
PrefixLength: <0..128>
Specifies the number of bits of the Subnet IP address which must match for an IP address to
belong in this subzone.
Traversal
H3ꢁ3
Assent
Mode: <On/Off>
Determines whether or not H.323 calls using Assent mode for firewall traversal will
be allowed. Applies to traversal-enabled endpoints registered directly with the VCS.
On: calls using Assent mode will be allowed.
Off: calls using Assent mode will not be allowed.
H460ꢀ8
Mode: <On/Off>
Determines whether or not H.323 calls using H.460.18 mode for firewall traversal
will be allowed. Applies to traversal-enabled endpoints registered directly with the
VCS.
On: calls using H.460.18 mode will be allowed.
Off: calls using H.460.18 mode will not be allowed.
H460ꢀ9
Demultiplexing
Mode: <On/Off>
Determines whether the VCS will operate in Demultiplexing
mode for calls from traversal-enabled endpoints registered
directly with it.
On: allows use of the same two ports for all calls.
Off: Each call will use a separate pair of ports for media.
D14049.01
07.2007
Download from Www.Soanuals
ꢀ.co4m. ꢁAll Manuals Search And Download.
TANDBERG VIDEO COMMUNICATION SERVER
ADMINISTRATOR GUIDE
CommandReference - xConfiguration
Zones
cont...
LocalZone
cont...
Traversal
cont...
H3ꢁ3
cont...
Preference: <Assent/H460ꢀ8>
If an endpoint that is registered directly with the VCS supports both Assent and H.460.18 protocols, this setting
determines which the VCS uses.
Assent: the Assent protocol will be used.
H46018: the H.460.18 protocol will be used.
TCPProbe
KeepAliveInterval: <ꢀ..65534>
Sets the interval (in seconds) with which a traversal-enabled endpoint registered
directly with the VCS will send a TCP probe to the VCS once a call is established, in
order to keep the firewall’s NAT bindings open.
RetryCount: <ꢀ..65534>
Sets the number of times traversal-enabled endpoints registered directly with the
VCS will attempt to send a TCP probe to the VCS.
RetryInterval: <ꢀ..65534>
Sets the frequency (in seconds ) with which traversal-enabled endpoints registered
directly with the VCS will send a TCP probe to the VCS.
UDPProbe
KeepAliveInterval: <ꢀ..65534>
Sets the interval (in seconds) with which a traversal-enabled endpoint registered
directly with the VCS will send a UDP probe to the VCS once a call is established,
in order to keep the firewall’s NAT bindings open.
RetryCount: <ꢀ..65534>
Sets the number of times traversal-enabled endpoints registered directly with the
VCS will attempt to send a UDP probe to the VCS.
RetryInterval: <ꢀ..65534>
Sets the frequency (in seconds ) with which traversal-enabled endpoints registered
directly with the VCS will send a UDP probe to the VCS.
D14049.01
07.2007
Download from Www.Soanuals
ꢀ.co4m. 3All Manuals Search And Download.
TANDBERG VIDEO COMMUNICATION SERVER
ADMINISTRATOR GUIDE
CommandReference - xConfiguration
Zones
cont...
LocalZone
cont...
TraversalSubZone
Bandwidth
PerCall
Mode: <None/Limited/Unlimited>
Determines whether there is a limit on the bandwidth of any one traversal call be-
ing handled by the VCS.
None: no bandwidth will be available.
Limited: there will be a limit on the bandwidth.
Unlimited: there will be no limit on the bandwidth.
Limit: <ꢀ..ꢀ00000000>
(applies only if Mode is set to Limited)
Specifies the bandwidth limit (in kbps) applied to any one traversal call being
handled by the VCS.
Total
Mode: <None/Limited/Unlimited>
Determines whether or not there is a limit to the total bandwidth of all traversal
calls being handled by the VCS.
None: no bandwidth will be available.
Limited: there will be a limit on the bandwidth.
Unlimited: there will be no limit on the bandwidth.
Limit: <ꢀ..ꢀ00000000>
(applies only if Mode is set to Limited)
Specifies the total bandwidth (in kbps) allowed for all traversal calls being handled
by the VCS.
Zone [ꢀ..ꢁ00]
ENUM
H3ꢁ3
DNSSuffix: <S: 0, 128>
Specifies the domain to be appended to the transformed E.164 number to create an ENUM host name which this zone is then queried
for.
Mode: <On/Off>
Determines whether H.323 calls will be allowed to and from this zone.
On: H.323 calls will be allowed.
Off: H.323 calls will not be allowed.
HopCount: <ꢀ..ꢁ55>
Specifies the hop count to be used when sending an alias search request to this zone.
Note: if the search request was received from another zone and already has a hop count assigned, the lower of the two values will be used.
D14049.01
07.2007
Download from Www.Soanuals
ꢀ.co4m. 4All Manuals Search And Download.
TANDBERG VIDEO COMMUNICATION SERVER
ADMINISTRATOR GUIDE
CommandReference - xConfiguration
Zones
cont...
Zone [ꢀ..ꢁ00]
cont...
Match [ꢀ..5]
Mode: <AlwaysMatch/PatternMatch/Disabled>
Determines if and when a query will be sent to this zone.
Always: the zone will always be queried.
Pattern: the zone will only be queried if the alias queried for matches the corresponding pattern.
Disabled: the zone will never be queried.
Pattern
String: <S: 0, 60>
(applies only if the Match mode is Pattern Match)
Specifies the pattern against which the alias is compared.
Type: <Exact/Prefix/Suffix/Regex>
(applies only if the Match mode is Pattern Match)
Determines the way in which the string must match the alias.
Exact: the string must match the alias character for character.
Prefix: the string must appear at the beginning of the alias.
Suffix: the string must appear at the end of the alias.
Regex: the string will be treated as a regular expression.
Behavior: <Strip/Leave/Replace>
(applies only if the Match mode is Pattern Match)
Determines whether the matched part of the alias should be modified before an LRQ is sent to this zone.
Leave: the alias will be unmodified.
Strip: the matching prefix or suffix will be removed from the alias.
Replace: the matching part of the alias will be substituted with the text in the Replace string.
Replace: <S: 0, 60>
(applies only if the Pattern Behavior is Replace)
Specifies the string to be used as a substitution for the part of the alias that matched the pattern.
Priority: <ꢀ..65534>
Determines the order in which the zone will be sent a search request. Zones with priority 1 matches are searched first, followed by
priority 2, and so on.
Name: <S: ꢀ, 50>
Assigns a name to this zone.
D14049.01
07.2007
Download from Www.Soanuals
ꢀ.co4m. 5All Manuals Search And Download.
TANDBERG VIDEO COMMUNICATION SERVER
ADMINISTRATOR GUIDE
CommandReference - xConfiguration
Zones
cont...
Zone [ꢀ..ꢁ00]
cont...
Neighbor
Alternate [ꢀ..5]
Address: <S: 0, ꢀꢁ8>
Specifies the IP addresses or FQDNs of any Alternates configured on this neighbor.
H3ꢁ3
Port: <ꢀ0ꢁ4..65534>
Specifies the port on the neighbor to be used for H.323 calls to and from this VCS.
Primary
SIP
Address: <S: 0, ꢀꢁ8>
Specifies the IP address or FQDN of this neighbor.
Port: <ꢀ0ꢁ4..65534>
Specifies the port on the neighbor to be used for SIP calls to and from this VCS.
Transport: <TCP/TLS>
Determines which transport type will be used for SIP calls to and from this neighbor.
TCP: TCP will be used.
TLS: TLS will be used.
SIP
Mode: <On/Off>
Determines whether SIP calls will be allowed to and from this zone.
On: SIP calls will be allowed.
Off: SIP calls will not be allowed.
TraversalClient
Alternate [ꢀ..5]
H3ꢁ3
Address: <S: 0, ꢀꢁ8>
Specifies the IP address or FQDN of any Alternates of the traversal server.
Port: <ꢀ0ꢁ4..65534>
Specifies the port on the traversal server to be used for H.323 firewall traversal calls from this VCS.
Protocol: <Assent/H460ꢀ8>
Determines which of the two firewall traversal protocols to use for calls to the traversal server when both are
available.
Assent: the Assent protocol will be used.
H46018: the H.460.18 protocol will be used.
Primary Address: <S: 0, ꢀꢁ8>
Specifies the IP address or FQDN of the traversal server.
RetryInterval: <ꢀ..65534>
Specifies the interval in seconds with which a failed attempt to establish a connection to the traversal server should be retried.
D14049.01
07.2007
Download from Www.Soanuals
ꢀ.co4m. 6All Manuals Search And Download.
TANDBERG VIDEO COMMUNICATION SERVER
ADMINISTRATOR GUIDE
CommandReference - xConfiguration
Zones
cont...
Zone [ꢀ..ꢁ00]
cont...
TraversalClient
cont...
SIP
Port: <ꢀ0ꢁ4..65534>
Specifies the port on the traversal server to be used for SIP calls from this VCS.
Transport: <TCP/TLS>
Determines which transport type will be used for SIP calls to and from the traversal server.
TCP: TCP will be used.
TLS: TLS will be used.
TraversalServer
Authentication
H3ꢁ3
UserName: <S: ꢀ, ꢀꢁ8>
If the traversal client is a VCS, this must be the VCS’s Authentication User Name. If the traversal client is a
gatekeeper, this must be the gatekeeper’s System Name.
H460ꢀ9
Demultiplexing
Mode: <On/Off>
Determines whether the VCS will operate in Demulti-
plexing mode for calls from the traversal client.
On: allows use of the same two ports for all calls.
Off: Each call will use a separate pair of ports for
media.
Port: <ꢀ0ꢁ4..65534>
Specifies the port on the VCS being used for H.323 firewall traversal from this traversal client.
Protocol: <Assent/H460ꢀ8>
Determines the protocol to be used for calls from the traversal client.
Assent: the Assent protocol will be used.
H46018: the H.460.18 protocol will be used.
SIP
Port: <ꢀ0ꢁ4..65534>
Specifies the port on the VCS being used for SIP firewall traversal from this traversal client.
Transport: <TCP/TLS>
Determines which of the two transport types will be used for SIP calls between the traversal client and VCS.
TCP: TCP will be used.
TLS: TLS will be used.
D14049.01
07.2007
Download from Www.Soanuals
ꢀ.co4m. 7All Manuals Search And Download.
TANDBERG VIDEO COMMUNICATION SERVER
ADMINISTRATOR GUIDE
CommandReference - xConfiguration
Zones
cont...
Zone [ꢀ..ꢁ00]
cont...
TraversalServer
cont...
TCPProbe
KeepAliveInterval: <ꢀ..65534>
Sets the interval (in seconds) with which the traversal client will send a TCP probe to the VCS once a call is
established, in order to keep the firewall’s NAT bindings open.
RetryCount: <ꢀ..65534>
Sets the number of times the traversal client will attempt to send a TCP probe to the VCS.
RetryInterval: <ꢀ..65534>
Sets the frequency (in seconds ) with which the traversal client will send a TCP probe to the VCS.
UDPProbe
KeepAliveInterval: <ꢀ..65534>
Sets the interval (in seconds) with which the traversal client will send a UDP probe to the VCS once a call is
established, in order to keep the firewall’s NAT bindings open.
RetryCount: <ꢀ..65534>
Sets the number of times the traversal client will attempt to send a UDP probe to the VCS.
RetryInterval: <ꢀ..65534>
Sets the frequency (in seconds) with which the traversal client will send a UDP probe to the VCS.
Type: <Neighbor/TraversalClient/TraversalServer/ENUM/DNS>
Determines the nature of the specified zone, in relation to the Local Zone.
Neighbor: the new zone will be a neighbor of the Local Zone.
TraversalClient: there is a firewall between the zones, and the Local Zone is a traversal client of the new zone.
TraversalServer: there is a firewall between the zones and the Local Zone is a traversal server for the new zone.
ENUM: the new zone contains endpoints discoverable by ENUM lookup.
DNS: the new zone contains endpoints discoverable by DNS lookup.
D14049.01
07.2007
Download from Www.Soanuals
ꢀ.co4m. 8All Manuals Search And Download.
TANDBERG VIDEO COMMUNICATION SERVER
ADMINISTRATOR GUIDE
CommandReference - xCommand
xCommand
Description
Parameters
AllowListAdd
PatternString(r): <S: ꢀ, 60>
Adds an entry to the Allow List.
Specifies an entry to be added to the Allow List. If one of an endpoint’s aliases matches one of the patterns in the Allow
List, the registration will be permitted.
PatternType: <Exact/Prefix/Suffix/Regex>
Specifies whether the entry in the Allow List is a prefix, suffix, regular expression, or must be matched exactly.
AllowListDelete
AllowListId(r): <ꢀ..ꢁ500>
The index of the entry to be deleted.
Deletes an entry from the Allow List.
Reboots the VCS.
Boot
none
CheckBandwidth
Nodeꢀ(r): <S: ꢀ, 50>
The subzone or zone from which the call originates.
A diagnostic tool that returns the status and route (as a list
of nodes and links) that a call of the specified type and band-
width would take between two nodes.
Nodeꢁ(r): <S: ꢀ, 50>
The subzone or zone at which the call terminates.
Note that this command does not change any existing system
configuration.
Bandwidth(r): <ꢀ..ꢀ00000000>
The requested bandwidth of the call (in kbps).
CallType(r): <Traversal/NonTraversal>
Whether the call type is Traversal or Non Traversal.
CheckPattern
Target(r): <S: ꢀ, 60>
The original alias.
A diagnostic tool that allows you to check the result of an
alias transform (local or zone) before you configure it on the
system. Note that this command does not change any existing
system configuration.
Pattern(r): <S: ꢀ, 60>
The pattern against which the alias is to be compared.
Type(r): <Exact/Prefix/Suffix/Regex>
The way in which the pattern must match the alias in order for the transform to be applied.
Behavior(r): <Strip/Replace>
The way in which the alias will be modified.
Replace: <S: ꢀ, 60>
(Applies only if Behavior is set to Replace.)
The string to be substituted for the part of the alias that matched the pattern.
D14049.01
07.2007
Download from Www.Soanuals
ꢀ.co4m. 9All Manuals Search And Download.
TANDBERG VIDEO COMMUNICATION SERVER
ADMINISTRATOR GUIDE
CommandReference - xCommand
xCommand
Description
Parameters
CredentialAdd
CredentialName(r): <S: ꢀ, ꢀꢁ8>
Adds an entry to the local authentication database.
Defines the name for this entry in the local authentication database.
CredentialPassword(r): <S: ꢀ, ꢀꢁ8>
Defines the password for this entry in the local authentication database.
CredentialDelete
DefaultLinksAdd
DefaultValuesSet
CredentialId(r): <ꢀ..ꢁ500>
The index of the credential to be deleted.
Deletes an entry from the local authentication database.
Restores links between the Default Subzone, Traversal Sub-
zone and the Default Zone.
none
Level(r): <ꢀ..3>
Resets system parameters to default values.
The level of system parameters to be reset.
1: Resets most parameters.
2: There are currently no level 2 parameters, so setting that level has the same effect as setting level 1.
3: Resets all level 1 and 2 parameters as well as additional parameters.
DenyListAdd
PatternString(r): <S: ꢀ, 60>
Adds an entry to the Deny List.
Specifies an entry to be added to the Deny List. If one of an endpoint’s aliases matches one of the patterns in the Deny
List, the registration will not be permitted.
PatternType: <Exact/Prefix/Suffix/Regex>
Specifies whether the entry in the Deny List is a prefix, suffix, regular expression, or must be matched exactly.
DenyListDelete
DisconnectCall
DenyListId(r): <ꢀ..ꢁ500>
The index of the entry to be deleted.
Deletes an entry from the Deny List.
Disconnects a call.
Call: <ꢀ..900>
The index of the call to be disconnected.
CallSerialNumber: <S: ꢀ, ꢁ55>
The serial number of the call to be disconnected.
DomainAdd
DomainName(r): <S: ꢀ, ꢀꢁ8>
Specifies the name of the domain.
Adds a SIP domain for which this VCS is authoritative.
Deletes a domain.
DomainDelete
DomainId(r): <ꢀ..ꢁ0>
The index of the domain to be deleted.
D14049.01
07.2007
Download from Www.Soanuals
ꢀ.co5m. 0All Manuals Search And Download.
TANDBERG VIDEO COMMUNICATION SERVER
ADMINISTRATOR GUIDE
CommandReference - xCommand
xCommand
Description
Parameters
FeedbackDeregister
ID: <ꢀ..3>
Deactivates a particular feedback request.
The ID of the feedback request to be deactivated.
FeedbackRegister
ID: <ꢀ..3>
Activates notifications on the event or status change(s)
described by the Expression(s). Notifications are sent in XML
format to the specified URL. Up to 15 Expressions may be
registered for each of 3 feedback IDs.
The ID of this particular feedback request.
URL(r): <S: ꢀ, ꢁ56>
The URL to which notifications are to be sent.
Expression.ꢀ..ꢀ5: <S: ꢀ, ꢁ56>
The events or status change to be notified. Valid Expressions are:
Status/Ethernet
Status/NTP
Status/LDAP
Status/Feedback
Status/ExternalManager
Status/Calls
Status/Registrations
Status/Zones
Event/CallAttempt
Event/CallConnected
Event/CallDisconnected
Event/CallFailure
Event/RegistrationAdded
Event/RegistrationRemoved
Event/RegistrationFailure
Event/RegistrationChanged
Event/Bandwidth
Event/Locate
Event/ResourceUsage
Event/AuthenticationFailure
FindRegistration
Returns information about the registration associated with the Alias(r): <S: 1, 60>
specified alias. The alias must be registered on the VCS on
The alias that you wish to find out about.
which the command is issued.
D14049.01
07.2007
Download from Www.Soanuals
ꢀ.co5m. ꢀAll Manuals Search And Download.
TANDBERG VIDEO COMMUNICATION SERVER
ADMINISTRATOR GUIDE
CommandReference - xCommand
xCommand
Description
Parameters
LinkAdd
LinkName(r): <S: ꢀ, 50>
Adds and configures a new link.
Assigns a name to this link.
Nodeꢀ: <S: ꢀ, 50>
Specifies the first zone or subzone to which this link will be applied.
Nodeꢁ: <S: ꢀ, 50>
Specifies the second zone or subzone to which this link will be applied.
Pipeꢀ: <S: ꢀ, 50>
Specifies the first pipe to be associated with this link.
Pipeꢁ: <S: ꢀ, 50>
Specifies the second pipe to be associated with this link.
LinkDelete
Locate
LinkId(r): <ꢀ..600>
The index of the link to be deleted.
Deletes a link.
Alias(r): <S: ꢀ, 60>
The alias associated with the endpoint you wish to locate.
Runs the VCS’s location algorithm to locate the endpoint
identified by the given alias, searching locally, on neighbors,
and on systems discovered through the DNS system, within
the specified number of “hops”. Results are reported back
through the xFeedback mechanism, which must therefore
be activated before issuing this command (e.g. xFeedback
register event/locate).
HopCount(r): <0..ꢁ55>
The hop count to be used in the search.
Protocol(r): <H3ꢁ3/SIP>
The protocol used to initiate the search.
OptionKeyAdd
Key(r): <S: 0, 90>
Adds a new option key to the VCS.
Specifies the key of the software option to be added.
OptionKeyDelete
OptionKeyId(r): <ꢀ..64>
Deletes a software option key from the VCS.
Specifies the ID of the software option to be deleted.
D14049.01
07.2007
Download from Www.Soanuals
ꢀ.co5m. ꢁAll Manuals Search And Download.
TANDBERG VIDEO COMMUNICATION SERVER
ADMINISTRATOR GUIDE
CommandReference - xCommand
xCommand
Description
Parameters
PipeAdd
PipeName(r): <S: ꢀ, 50>
Adds and configures a new pipe.
Assigns a name to this pipe.
TotalMode: <None/Limited/Unlimited>
Determines whether or not this pipe is enforcing total bandwidth restrictions. None: no bandwidth available.
Total: <ꢀ..ꢀ00000000>
If this pipe has limited bandwidth, sets the maximum bandwidth (in kbps) available at any one time on the pipe.
PerCallMode: <None/Limited/Unlimited>
Determines whether or not this pipe is limiting the bandwidth of individual calls. None: no bandwidth available.
PerCall: <ꢀ..ꢀ00000000>
If this pipe has limited per-call bandwidth, sets the maximum amount of bandwidth (in kbps) available for any one call.
PipeDelete
PipeId(r): <ꢀ..ꢀ00>
Deletes a pipe.
The index of the pipe to be deleted.
RemoveRegistration
Registration: <ꢀ..3750>
Removes a registration from the VCS.
The index number of the registration to be removed.
RegistrationSerialNumber: <S: ꢀ, ꢁ55>
The serial number of the registration to be removed.
D14049.01
07.2007
Download from Www.Soanuals
ꢀ.co5m. 3All Manuals Search And Download.
TANDBERG VIDEO COMMUNICATION SERVER
ADMINISTRATOR GUIDE
CommandReference - xCommand
xCommand
Description
Parameters
SubZoneAdd
SubZoneName(r): <S: ꢀ, 50>
Adds and configures a new subzone.
Assigns a name to this subzone.
Address: <S: 0, 39>
Specifies an IP address used (in conjunction with the IP Prefix Length) to identify a subnet to be assigned to this subzone.
PrefixLength: <0..128>
Specifies the number of bits of the Subnet IP address which must match for an IP address to belong in this subzone.
TotalMode: <None/Limited/Unlimited>
Determines whether this subzone has a limit on the total bandwidth of calls being used by its endpoints at any one time.
Total: <ꢀ..ꢀ00000000>
Sets the total bandwidth limit (in kbps) of this subzone (applies only if Mode is set to Limited).
PerCallInterMode: <None/Limited/Unlimited>
Determines whether there is a limit on the bandwidth for any one call to or from an endpoint in this subzone.
PerCallInter: <ꢀ..ꢀ00000000>
Specifies the bandwidth limit (in kbps) on any one call to or from an endpoint in this subzone (applies only if Mode is set
to Limited).
PerCallIntraMode: <None/Limited/Unlimited>
Determines whether there is a limit on the bandwidth for any one call between two endpoints within this subzone.
PerCallIntra: <ꢀ..ꢀ00000000>
Specifies the bandwidth limit (in kbps) on any one call between two endpoints within this subzone.
SubZoneDelete
SubZoneId(r): <ꢀ..ꢀ00>
Deletes a subzone.
The index of the subzone to be deleted.
D14049.01
07.2007
Download from Www.Soanuals
ꢀ.co5m. 4All Manuals Search And Download.
TANDBERG VIDEO COMMUNICATION SERVER
ADMINISTRATOR GUIDE
CommandReference - xCommand
xCommand
Description
Parameters
TransformAdd
Pattern(r): <S: ꢀ, 60>
Adds and configures a new transform.
Specifies the pattern against which the alias is compared.
Type: <Exact/Prefix/Suffix/Regex>
Determines the way in which the string must match the alias.
Exact: the string must match the alias character for character.
Prefix: the string must appear at the beginning of the alias.
Suffix: the string must appear at the end of the alias.
Regex: the string will be treated as a regular expression.
Behavior: <Strip/Replace>
Determines how the matched part of the alias will be modified.
Strip: the matching prefix or suffix will removed from the alias.
Replace: the matching part of the alias will be substituted with the text in the Replace string.
Replace: <S: ꢀ, 60>
(Applies only if pattern behavior is set to Replace.)
Specifies the string to be used as a substitution for the part of the alias that matched the pattern.
Priority: <ꢀ..65534>
Assigns a priority to the specified transform. Transforms are applied in order of priority, and the priority must be unique for
each transform.
TransformDelete
ZoneAdd
TransformId(r): <ꢀ..ꢀ00>
The index of the transform to be deleted.
Deletes a transform.
ZoneName(r): <S: ꢀ, 50>
Adds and configures a new zone.
Assigns a name to this zone.
Type(r): <Neighbor/TraversalClient/TraversalServer/ENUM/DNS>
Determines the nature of the specified zone, in relation to the Local Zone.
Neighbor: the new zone will be a neighbor of the Local Zone.
TraversalClient: there is a firewall between the zones, and the Local Zone is a traversal client of the new zone.
TraversalServer: there is a firewall between the zones and the Local Zone is a traversal server for the new zone.
ENUM: the new zone contains endpoints discoverable by ENUM lookup.
DNS: the new zone contains endpoints discoverable by DNS lookup.
ZoneDelete
ZoneId(r): <ꢀ..ꢁ00>
Deletes a zone.
The index of the zone to be deleted.
D14049.01
07.2007
Download from Www.Soanuals
ꢀ.co5m. 5All Manuals Search And Download.
TANDBERG VIDEO COMMUNICATION SERVER
ADMINISTRATOR GUIDE
CommandReference - xCommand
xCommand
Description
Parameters
ZoneList
Alias(r): <S: ꢀ, 60>
The alias to be searched for.
A diagnostic tool that returns the list of zones (grouped by pri-
ority) that would be queried, and any transforms that would be
applied, in a search for a given alias. Note that this command
does not change any existing system configuration.
D14049.01
07.2007
Download from Www.Soanuals
ꢀ.co5m. 6All Manuals Search And Download.
TANDBERG VIDEO COMMUNICATION SERVER
ADMINISTRATOR GUIDE
CommandReference - xStatus
SystemUnit:
Product: “the product name”
Uptime: <Time in seconds>
SystemTime: <Time not set/date-time>
TimeZone: <GMT or one of 300 other timezones>
LocalTime: <local-date-time>
Software:
Version: “the version number”
Build: <Number/Uncontrolled>
Name: “Release”
ReleaseDate: <Date>
Configuration:
NonTraversalCalls: <0..500>
TraversalCalls: <0..100>
Registrations: <0..2500>
BorderController: <True/False>
Encryption: <True/False>
Interworking: <True/False>
UserPolicy: <True/False>
Hardware:
Version: “1.0”
SerialNumber:
Ethernet:
MacAddress: <S: 17>
Speed: <10half/10full/100half/100full/1000full/down>
Options:
Option [1-64]:
Key: <S: 1, 90>
Description: <S: 1, 128>
D14049.01
07.2007
Download from Www.Soanuals
ꢀ.co5m. 7All Manuals Search And Download.
TANDBERG VIDEO COMMUNICATION SERVER
ADMINISTRATOR GUIDE
CommandReference - xStatus
IP:
Protocol: <IPv4/IPv6/Both>
IPv4:
Address: <IPv4Addr>
SubnetMask: <IPv4Addr>
Gateway: <IPv4Addr>
IPv6:
Address: <IPv6Addr>
Gateway: <IPv6Addr>
DNS:
Server [1-5]:
Address: <IPv4Addr/IPv6Addr>
Domain: <S: 0, 128>
NTP:
Status: <Inactive/Active/Failed>
Cause: {Visible if status is Failed} <No response from NTP server/ DNS resolution failed
Address: <IPv4Addr/IPv6Addr>
Port: <1..65534>
Last Update: <date-time>
Last Correction: <Time in seconds, precision in seconds>
LDAP:
Status: <Inactive/Initializing/Active/Failed>
Cause: {Visible if status is Failed} <Failed to connect to LDAP server/ Failed to negotiate TLS with LDAP server/ Failed to perform TLS handshake with LDAP server/ Failed to authenticate with LDAP
server/ DNS resolution failed>
Address: <IPv4Addr/IPv6Addr>
Port: <1..65534>
D14049.01
07.2007
Download from Www.Soanuals
ꢀ.co5m. 8All Manuals Search And Download.
TANDBERG VIDEO COMMUNICATION SERVER
ADMINISTRATOR GUIDE
CommandReference - xStatus
External Manager:
Status: <Inactive/Initializing/Active/Failed>
Cause: {Visible if status is Failed} <DNS resolution failed >
Address: <IPv4Addr/IPv6Addr >
Protocol: HTTP
URL: <S: 0, 255>
Feedback [1..3]:
Status: <On/Off>
URL: <S: 1,255>
Expression: <S: 1,127> {0..15 entries}
ResourceUsage:
Calls:
Traversal:
Current: <0..150>
Maximum: <0..150>
Total: <0..4294967295>
NonTraversal:
Current: <0..750>
Maximum: <0..750>
Total: <0..4294967295>
Registrations:
Current: <0..3750>
Maximum: <0..3750>
Total: <0..4294967295>
D14049.01
07.2007
Download from Www.Soanuals
ꢀ.co5m. 9All Manuals Search And Download.
TANDBERG VIDEO COMMUNICATION SERVER
ADMINISTRATOR GUIDE
CommandReference - xStatus
Calls:
Call <1..900>:
SerialNumber: <S: 1,255>
State: <Connecting/Connected/Disconnecting>
StartTime: <Seconds since boot/Date Time>
Duration: <Time in seconds, precision in seconds>
Legs:
Leg [1..300]:
Protocol: <H323/SIP>
H323: {visible if Protocol = H323}
CallSignalAddress: <IPv4Addr/[IPv6Addr]>:<1..65534>
Aliases:
Alias [1..50]:
Type: <E164/H323Id>
Value: <S: 1,60>
SIP: {visible if Protocol = SIP}
Address: <IPv4Addr/[IPv6Addr]>:<1..65534>
Transport: <UDP/TCP/TLS/undefined>
Aliases:
Alias [1..50]:
Type: <URL>
Value: <S: 1,60>
Targets:
Target [1..1]:
Type: <E164/H323Id/URL>
Value: <S: 1,60>
BandwidthNode: <S: 1,50 Node name>
Registration:
ID: <1..2500>
SerialNumber: <S: 1,255>
Sessions:
Session: [1..300:]
Status: <Unknown/Searching/Failed/Cancelled/Completed/Active/Connected>
D14049.01
07.2007
Download from Www.Soanuals
ꢀ.co6m. 0All Manuals Search And Download.
TANDBERG VIDEO COMMUNICATION SERVER
ADMINISTRATOR GUIDE
CommandReference - xStatus
Calls continued...
MediaRouted: <True/False>
Participants:
Leg: <1..300> {2 entries}
Bandwidth: <0..100000000> kbps
Route:
Zone/Link: <S: 1,50 Node name> {0..150 entries}
Registrations:
Registration [1..3750]:
Protocol: <H323/SIP>
Node: <S: 1,50 Node name>
SerialNumber: <S: 1,255>
CreationTime: <Date Time>
SecondsSinceLastRefresh: <1..65534> {Visible if Protocol is SIP}
SecondsToExpiry <1..65534> {Visible if Protocol is SIP}
VendorInfo: <S: 1,255>
H323: {Visible if Protocol is H323}
Type: <Endpoint/MCU/Gateway/Gatekeeper>:
CallSignalAddresses:
Address: <IPv4Addr/[IPv6Addr]>:<1..65534>
RASAddresses:
Address: <IPv4Addr/[IPv6Addr]>:<1..65534>
Apparent: <IPv4Addr/[IPv6Addr]>:<1..65534>
Prefix: <S: 1,20> {0..50 entries}
Aliases:
Alias [1..50]:
Type: <E164/H323Id/URL/GW Prefix/MCU Prefix/Prefix/Suffix/IPAddress>
Origin: <Endpoint/LDAP/Combined>
Value: <S: 1,60>
Traversal: <Assent/H46018> {Visible for Traversal calls}
SIP: {Visible if Protocol is SIP}
AOR: <S: 1,128>
D14049.01
07.2007
Download from Www.Soanuals
ꢀ.co6m. ꢀAll Manuals Search And Download.
TANDBERG VIDEO COMMUNICATION SERVER
ADMINISTRATOR GUIDE
CommandReference - xStatus
Registrations continued...
Contact: <S: 1,255>
Path:
URI [1..10]: <S: 1,255>
Zones:
DefaultZone:
Name: “DefaultZone”
Bandwidth:
Used: <0..100000000>
Calls:
Call [0..900]: {0..900 entries}
CallSerialNumber: <S: 1,255>
LocalZone:
DefaultSubZone:
Name: “DefaultSubZone”
Bandwidth:
Used: <0..100000000>
Registrations: {0..3750 entries}
Registration: <1..3750>
SerialNumber: <S: 1,255>
Calls:
Call [0..900]: {0..900 entries}
CallSerialNumber: <S: 1,255>
TraversalSubZone:
Name: “TraversalSubZone”
Bandwidth:
Used: <0..100000000>
Calls:
Call [0..900]: {0..900 entries}
CallSerialNumber: <S: 1,255>
SubZone: [1.100]
Name: <S: 1,50 Node name>
D14049.01
07.2007
Download from Www.Soanuals
ꢀ.co6m. ꢁAll Manuals Search And Download.
TANDBERG VIDEO COMMUNICATION SERVER
ADMINISTRATOR GUIDE
CommandReference - xStatus
Zones continued...
Bandwidth:
Used: <0..100000000>
Registrations: {0..3750 entries}
Registration: <1..3750>
SerialNumber: <S: 1,255>
Calls:
Call [0..900]: {0..900 entries}
CallSerialNumber: <S: 1,255>
Searches:
Current:
Total:
Dropped:
Zone [1..200]:
Name: <S: 1,50 Node name>
Status: <Active/Failed/Warning>
Cause: {Visible if status is Failed or Warning} <No gatekeeper reachable/ Gatekeepers unreachable>
Type: <Neighbor/TraversalClient/TraversalServer/ENUM/DNS>
Neighbor: {Visible if Type is Neighbor}
Primary:
H323: {Visible if H323 Mode=On for Zone}
Status: <Unknown/Active/Failed>
Cause: {Visible if Status is Failed} <No response from neighbor/ DNS resolution failed>
Address: <IPv4Addr/IPv6Addr> {One Address line per address from DNS lookup}
Port: <1..65534>
LastStatusChange: <Time not set/Date Time>
SIP: {Visible if SIP Mode=On for Zone}
Status: <Unknown/Active/Failed>
Cause: {Visible if Status is Failed} <No response from neighbor/ DNS resolution failed>
Address: <IPv4Addr/IPv6Addr> {One Address line per address from DNS lookup}
Port: <1..65534>
LastStatusChange: <Time not set/Date Time>
Alternate [1..5]:
D14049.01
07.2007
Download from Www.Soanuals
ꢀ.co6m. 3All Manuals Search And Download.
TANDBERG VIDEO COMMUNICATION SERVER
ADMINISTRATOR GUIDE
CommandReference - xStatus
Zones continued...
H323: {Visible if H323 Mode=On for Zone}
Status: <Unknown/Active/Failed>
Cause: {Visible if Status is Failed} <No response from neighbor/ DNS resolution failed>
Address: <IPv4Addr/IPv6Addr> {One Address line per address from DNS lookup}
Port: <1..65534>
LastStatusChange: <Time not set/Date Time>
SIP: {Visible if SIP Mode=On for Zone}
Status: <Unknown/Active/Failed>
Cause: {Visible if Status is Failed} <No response from neighbor/ DNS resolution failed>
Address: <IPv4Addr/IPv6Addr> {One Address line per address from DNS lookup}
Port: <1..65534>
LastStatusChange: <Time not set/Date Time>
TraversalClient: {Visible if Type is TraversalClient}
Primary:
H323: {Visible if H323 Mode=On for Zone}
Status: <Unknown/Active/Failed>
Cause: {Visible if Status is Failed} <No response from neighbor/ DNS resolution failed>
Address: <IPv4Addr/IPv6Addr> {One Address line per address from DNS lookup}
Port: <1..65534>
LastStatusChange: <Time not set/Date Time>
SIP: {Visible if SIP Mode=On for Zone}
Status: <Unknown/Active/Failed>
Cause: {Visible if Status is Failed} <No response from neighbor/ DNS resolution failed>
Address: <IPv4Addr/IPv6Addr> {One Address line per address from DNS lookup}
Port: <1..65534>
LastStatusChange: <Time not set/Date Time>
Alternate [1..5]:
H323: {Visible if H323 Mode=On for Zone}
Status: <Unknown/Active/Failed>
Cause: {Visible if Status is Failed} <No response from neighbor/ DNS resolution failed>
Address: <IPv4Addr/IPv6Addr> {One Address line per address from DNS lookup}
Port: <1..65534>
D14049.01
07.2007
Download from Www.Soanuals
ꢀ.co6m. 4All Manuals Search And Download.
TANDBERG VIDEO COMMUNICATION SERVER
ADMINISTRATOR GUIDE
CommandReference - xStatus
Zones continued...
LastStatusChange: <Time not set/Date Time>
SIP: {Visible if SIP Mode=On for Zone}
Status: <Unknown/Active/Failed>
Cause: {Visible if Status is Failed} <No response from neighbor/ DNS resolution failed>
Address: <IPv4Addr/IPv6Addr> {One Address line per address from DNS lookup}
Port: <1..65534>
LastStatusChange: <Time not set/Date Time>
TraversalServer: {Visible if Type is TraversalServer}
SIP:
Port: <Active/Inactive>
H323:
Port: <Active/Inactive>
Primary:
H323: {Visible if H323 Mode=On for Zone}
Status: <Unknown/Active/Failed>
Cause: {Visible if Status is Failed} <No response from neighbor/ DNS resolution failed>
Address: <IPv4Addr/IPv6Addr> {One Address line per address from DNS lookup}
Port: <1..65534>
LastStatusChange: <Time not set/Date Time>
SIP: {Visible if SIP Mode=On for Zone}
Status: <Unknown/Active/Failed>
Cause: {Visible if Status is Failed} <No response from neighbor/ DNS resolution failed>
Address: <IPv4Addr/IPv6Addr> {One Address line per address from DNS lookup}
Port: <1..65534>
LastStatusChange: <Time not set/Date Time>
Alternate [1..5]:
H323: {Visible if H323 Mode=On for Zone}
Status: <Unknown/Active/Failed>
Cause: {Visible if Status is Failed} <No response from neighbor/ DNS resolution failed>
Address: <IPv4Addr/IPv6Addr> {One Address line per address from DNS lookup}
Port: <1..65534>
LastStatusChange: <Time not set/Date Time>
D14049.01
07.2007
Download from Www.Soanuals
ꢀ.co6m. 5All Manuals Search And Download.
TANDBERG VIDEO COMMUNICATION SERVER
ADMINISTRATOR GUIDE
CommandReference - xStatus
Zones continued...
SIP: {Visible if SIP Mode=On for Zone}
Status: <Unknown/Active/Failed>
Cause: {Visible if Status is Failed} <No response from neighbor/ DNS resolution failed>
Address: <IPv4Addr/IPv6Addr> {One Address line per address from DNS lookup}
Port: <1..65534>
LastStatusChange: <Time not set/Date Time>
Calls: {0..900 entries}
Call [0..900]:
CallSerialNumber: <S: 1,255>
Links:
Link [1..100]:
Name: <S: 1,50 Link name>
Bandwidth:
Used: <0..100000000>
Calls:
Call [0..900]: {0..900 entries}
CallSerialNumber: <S: 1,255>
Pipes:
Pipe [1..100]:
Name: <S: 1,50 Pipe name>
Bandwidth:
Used: <0..100000000>
Calls:
Call [0..900]: {0..900 entries}
CallSerialNumber: <S: 1,255>
D14049.01
07.2007
Download from Www.Soanuals
ꢀ.co6m. 6All Manuals Search And Download.
TANDBERG VIDEO COMMUNICATION SERVER
ADMINISTRATOR GUIDE
CommandReference - xStatus
Alternates:
Alternate [1..5]:
Status: <Active/Failed/Unknown>
Cause: {Visible if status is Failed} <No response from gatekeeper/DNS resolution failed/Invalid IP address>
Address: <IPv4Addr/IPv6Addr>
Port: <1..65534>
LastStatusChange: <Seconds since boot/Date Time>
UserPolicyManager:
Mode: <Off/Local/Remote>
Status: <Active/Inactive/Unknown> {Visible if Remote}
Address: <1..1024> {Visible if Remote}
H323:
Registration:
Status: <Active/Inactive/Failed>
IPv4: {Visible if Status=Active}
Address: <IPv4Addr>
IPv6: {Visible if Status=Active}
Address: <IPv6Addr>
CallSignaling:
Status: <Active/Inactive/Failed>
IPv4: {Visible if Status=Active}
Address: <IPv4Addr>
IPv6: {Visible if Status=Active}
Address: <IPv6Addr>
Assent:
CallSignaling:
Status: <Active/Inactive/Failed>
IPv4: {Visible if Status=Active}
Address: <IPv4Addr>
IPv6: {Visible if Status=Active}
Address: <IPv6Addr>
D14049.01
07.2007
Download from Www.Soanuals
ꢀ.co6m. 7All Manuals Search And Download.
TANDBERG VIDEO COMMUNICATION SERVER
ADMINISTRATOR GUIDE
CommandReference - xStatus
H323 continued...
H46018:
CallSignaling:
Status: <Active/Inactive/Failed>
IPv4: {Visible if Status=Active}
Address: <IPv4Addr>
IPv6: {Visible if Status=Active}
Address: <IPv6Addr>
SIP:
IPv4:
UDP:
Status: <Active/Inactive/Failed>
Address: <IPv4Addr>
TCP:
Status: <Active/Inactive/Failed>
Address: <IPv4Addr>
TLS:
Status: <Active/Inactive/Failed>
Address: <IPv4Addr>
IPv6:
UDP:
Status: <Active/Inactive/Failed>
Address: <IPv6Addr>
TCP:
Status: <Active/Inactive/Failed>
Address: <IPv6Addr>
TLS:
Status: <Active/Inactive/Failed>
Address: <IPv6Addr>
D14049.01
07.2007
Download from Www.Soanuals
ꢀ.co6m. 8All Manuals Search And Download.
TANDBERG VIDEO COMMUNICATION SERVER
ADMINISTRATOR GUIDE
CommandReference - xStatus
STUN:
Servers:
Discovery:
Status: <Active/Inactive>
Address: <IPv4Addr/IPv6Addr>
Relay:
Status: <Active/Inactive>
Address: <IPv4Addr/IPv6Addr>
Bindings:
Count: <0..800>
Binding [1..800]:
Client: <IPv4Addr/IPv6Addr>
CreationTime: <Date Time>
ExpireTime: <Date Time>
Warnings:
Warning [1..n]:
Value: <S: 1,255>
D14049.01
07.2007
Download from Www.Soanuals
ꢀ.co6m. 9All Manuals Search And Download.
TANDBERG VIDEO COMMUNICATION SERVER
ADMINISTRATOR GUIDE
CPLReference
Overview
This Appendix gives details of the VCS’s implementation of the CPL language and should be read
address-switch node
The address-switch node allows the script to run different actions based on the source or
destination aliases of the call. It specifies which fields to match and then a list of address nodes
contains the possible matches and their associated actions.
The VCS supports most of the CPL standard along with some TANDBERG-defined extensions. It
does not support the top level actions <incoming> and <outgoing> as described in RFC
3880. Instead it supports a single section of CPL within a <routed> section.
When Administrator Policy is implemented by uploading a CPL script to the VCS, the script is
checked against an XML schema to verify the syntax. There are two schemas - one for the basic
from the web interface. and used to validate your script before uploading to the VCS.
address
The address construct is used within an address-switch to specify addresses to match. It supports
The following example shows the correct use of namespaces to make the syntax acceptable:
is=string
Selected field and subfield exactly match the given string.
contains=string
Selected field and subfield contain the given string.
<?xml version=”1.0” encoding=”UTF-8” ?>
<cpl xmlns=”urn:ietf:params:xml:ns:cpl”
xmlns:taa=”http://www.tandberg.net/cpl-extensions”
xmlns:xsi=”http://www.w3.org/2001/XMLSchema-instance”
xsi:schemaLocation=”urn:ietf:params:xml:ns:cpl cpl.xsd”>
<taa:routed>
Note: The CPL standard only allows for this matching on the
display subfield; however the VCS allows it on any type of
field.
If the selected field is numeric (e.g. the telsubfield)
then this matches as a prefix; so address subdomain-
of=”555”matches 5556734etc.
subdomain-of=string
If the field is not numeric then normal domain name
matching is applied; so address subdomain-
of=”company.com”matches nodeA.company.cometc.
Selected field and subfield match the given regular
expression.
<address-switch field=”destination”>
<address is=”[email protected]”>
<proxy/>
regex=”regular expression”
</address>
</address-switch>
All address comparisons ignore upper/lower case differences so address is=”Fred”will also
match fred, freDetc.
</taa:routed>
</cpl>
otherwise node
The otherwisenode will be executed if the address specified in the address-switch was found
but none of the preceding address nodes matched.
not-present node
The not-presentnode is executed when the address specified in the address-switch was not
present in the call setup message. This form is most useful when authentication is being used.
With authentication enabled the VCS will only use authenticated aliases when running policy so
the not-presentaction can be used to take appropriate action when a call is received from an
D14049.01
07.2007
Download from Www.Soanuals
ꢀ.co7m. 0All Manuals Search And Download.
TANDBERG VIDEO COMMUNICATION SERVER
ADMINISTRATOR GUIDE
CPLReference
Overview
Field
Within the address-switch node, the mandatory field parameter specifies which address is to be considered. The supported attributes and their interpretation are as follows:
Authentication Mode: On
SIP
Authentication Mode: Off
SIP
Field
H.323
H.323
origin
The “From” and “ReplyTo” fields of the
message if it authenticated correctly,
otherwise not-present.
The source aliases from the original
LRQ or ARQ that started the call if it
authenticated correctly otherwise not-
present. Since SETUP messages are
not authenticated if we receive a setup
without a preceding RAS message the
origin will always be not-present.
The “From” and “ReplyTo” fields of the The source aliases from the original
incoming message.
LRQ or ARQ that started the call. If a
SETUP is received without a preceding
RAS message then the origin is taken
from the SETUP.
unauthenticated-origin
authenticated-origin
The “From” and “ReplyTo” fields of the
incoming message.
The source aliases from the original LRQ
or ARQ that started the call. If a SETUP
is received without a preceding RAS
message then the origin is taken from the
SETUP.
The “From” and “ReplyTo” fields of the The source aliases from the original
incoming message.
LRQ or ARQ that started the call. If a
SETUP is received without a preceding
RAS message then the origin is taken
from the SETUP.
The “From” and “ReplyTo” fields of the
message if it authenticated correctly,
otherwise not-present.
The source aliases from the original
LRQ or ARQ that started the call if
it authenticated correctly otherwise
empty. Since SETUP messages are not
authenticated if we receive a setup
without a preceding RAS message the
origin will always be not-present.
not-present
originating-zone
The name of the zone or subzone for the originating leg of the call. If the call originates from a Neighbor, Traversal Server or Traversal Client zone then this will equate to
the zone name. If it comes from an endpoint within one of the local subzones this will be the name of the subzone. If the call originates from any other locally registered
endpoint this will be “DefaultSubZone”. In all other cases this will be “DefaultZone”.
originating-user
registered-origin
destination
The username used for authentication.
not-present
If the call originates from a registered endpoint this is the list of all aliases it has registered, otherwise not-present.
The destination aliases.
The destination aliases.
original-destination
If the selected field contains multiple aliases then the VCS will attempt to match each address node with all of the aliases before proceeding to the next address node i.e. an address node matches if it
matches any alias.
D14049.01
07.2007
Download from Www.Soanuals
ꢀ.co7m. ꢀAll Manuals Search And Download.
TANDBERG VIDEO COMMUNICATION SERVER
ADMINISTRATOR GUIDE
CPLReference
Overview
Subfield
Within the address-switch node, the optional subfield parameter specifies which part of the address is to be considered. The following table gives the definition of subfields for each alias type.
If a subfield is not specified for the alias type being matched then the not-presentaction will be taken.
address-type
user
Either h323. or sip, based on the type of endpoint that originated the call.
For URI aliases this selects the username part. For H.323 IDs it is the entire ID and for E.164 numbers it is the entire number.
For URI aliases this selects the domain name part. If the alias is an IP address then this subfield is the complete address in dotted decimal form.
For E.164 numbers this selects the entire string of digits.
host
tel
alias-type
Gives a string representation of the type of alias. The type is inferred from the format of the alias. Possible types are:
• Address Type
• Result
• URI
• url-ID
• H.323 ID
• h323-ID
• Dialled Digits
• dialedDigits
D14049.01
07.2007
Download from Www.Soanuals
ꢀ.co7m. ꢁAll Manuals Search And Download.
TANDBERG VIDEO COMMUNICATION SERVER
ADMINISTRATOR GUIDE
CPLReference
Overview
rule-switch
CPL Script Actions
location
This extension to CPL is provided to simplify administrator policy scripts that need to make
decisions based on both the source and destination of the call. A rule-switch may contain any
number of rules that are tested in sequence; as soon as a match is found the CPL within that rule
element is executed. Each rule must take one of the following forms:
As the CPL script is evaluated it maintains a list of addresses (H.323 IDs, URLs and E.164
numbers) which will be used as the destination of the call if a proxy node is executed. The location
node allows the location set to be modified so that calls can be redirected to different destinations.
<rule origin=”<regular expression>” destination=”<regular expression”>
<rule authenticated-origin=”<regular expression>” destination=”<regular
expression”>
At the start of script execution the location set is initialized to empty for incoming calls and to the
original destination for outgoing calls.
<rule unauthenticated-origin=”<regular expression>” destination=”<regular
expression”>
The following attributes are supported on location nodes. It supports the use of Regular
<rule registered-origin=”<regular expression>” destination=”<regular
expression”>
Clear = “yes” |
“no”
Specifies whether to clear the current location set before adding the
new location. The default is to append this location to the end of the
set.
<rule originating-user=”<regular expression>” destination=”<regular
expression”>
url=string
The new location to be added to the location set. The given string
number.
<rule originating-zone=”<regular expression>” destination=”<regular
expression”>
The meaning of the various origin selectors is as described in the Field parameter of address-
priority=<0.0..1.0>
| “random”
Specified either as a floating point number in the range 0.0 to 1.0,
or random, which assigns a random number within the same range.
1.0 is the highest priority. Locations with the same priority are
searched in parallel.
Unsupported CPL Elements
The VCS does not currently support some elements that are described in the CPL RFC. If an
attempt is made to upload a script containing any of the following elements an error message will
be generated and the VCS will continue to use its existing policy.
regex=”<regular
expression>”
replace=”<string>”
Specifies the way in which a location matching the regular expression
is to be changed.
The following elements are not currently supported:
proxy
• time-switch
• string-switch
• language-switch
• priority-switch
• redirect
On executing a proxynode the VCS will attempt to forward the call to the locations specified in
the current location set. If multiple entries are in the location set then this results in a forked call.
If the current location set is empty the call will be forwarded to its original destination.
reject
If a rejectnode is executed the VCS stops any further script processing and rejects the current
call. The custom reject strings status=string and reason=string options are supported
• mail
• log
here.
• subaction
• lookup
• remove-location
D14049.01
07.2007
Download from Www.Soanuals
ꢀ.co7m. 3All Manuals Search And Download.
TANDBERG VIDEO COMMUNICATION SERVER
ADMINISTRATOR GUIDE
CPLReference
CPL Examples
Call Screening Based on Alias
Call Screening of Authenticated Users
In this example, only calls from users with authenticated source addresses are allowed.
In this example, user ceo will only accept calls from users vpsales, vpmarketing or
vpengineering.
<?xml version=”1.0” encoding=”UTF-8” ?>
<cpl xmlns=”urn:ietf:params:xml:ns:cpl”
<?xml version=”1.0” encoding=”UTF-8” ?>
<cpl xmlns=”urn:ietf:params:xml:ns:cpl”
xmlns:taa=”http://www.tandberg.net/cpl-extensions”
xmlns:xsi=”http://www.w3.org/2001/XMLSchema-instance”
xsi:schemaLocation=”urn:ietf:params:xml:ns:cpl cpl.xsd”>
<taa:routed>
xmlns:taa=”http://www.tandberg.net/cpl-extensions”
xmlns:xsi=”http://www.w3.org/2001/XMLSchema-instance”
xsi:schemaLocation=”urn:ietf:params:xml:ns:cpl cpl.xsd”>
<taa:routed>
<address-switch field=”destination”>
<address is=”ceo”>
<address-switch field=”origin”>
<not-present>
<address-switch field=”origin”>
<address regex=”vpsales|vpmarketing|vpengineering”>
<reject/>
<proxy/>
</address>
</not-present>
</address-switch>
<otherwise>
</taa:routed>
<reject/>
</cpl>
</otherwise>
<not-present>
<reject/>
</not-present>
</address-switch>
</address>
</address-switch>
</taa:routed>
</cpl>
D14049.01
07.2007
Download from Www.Soanuals
ꢀ.co7m. 4All Manuals Search And Download.
TANDBERG VIDEO COMMUNICATION SERVER
ADMINISTRATOR GUIDE
CPLReference
CPL Examples
Change of Domain Name
Call Screening Based on Domain
In this example, Example Inc has changed its domain from example.net to example.com. For a
period of time some users are still registered at example.net. The following script would attempt to
In this example, user fred will not accept calls from anyone at annoying.com, or from any
unauthenticated users. All other users will allow any calls.
<?xml version=”1.0” encoding=”UTF-8” ?>
<cpl xmlns=”urn:ietf:params:xml:ns:cpl”
<?xml version=”1.0” encoding=”UTF-8” ?>
<cpl xmlns=”urn:ietf:params:xml:ns:cpl”
xmlns:taa=”http://www.tandberg.net/cpl-extensions”
xmlns:xsi=”http://www.w3.org/2001/XMLSchema-instance”
xsi:schemaLocation=”urn:ietf:params:xml:ns:cpl cpl.xsd”>
<taa:routed>
xmlns:taa=”http://www.tandberg.net/cpl-extensions”
xmlns:xsi=”http://www.w3.org/2001/XMLSchema-instance”
xsi:schemaLocation=”urn:ietf:params:xml:ns:cpl cpl.xsd”>
<taa:routed>
<address-switch field=”destination”>
<address is=”fred”>
<address-switch field=”destination”>
<address regex=”(.*)@example.com”>
<proxy>
<address-switch field=”origin” subfield=”host”>
<address subdomain-of=”annoying.com”>
<reject/>
</address>
<failure>
<location clear=”yes” regex=”(.*)@example.com” replace=”\1@
example.net”>
<otherwise>
<proxy/>
<proxy/>
</location>
</otherwise>
<not-present>
<reject/>
</failure>
</proxy>
</not-present>
</address-switch>
</address>
</address>
</address-switch>
</taa:routed>
</cpl>
</address-switch>
</taa:routed>
</cpl>
D14049.01
07.2007
Download from Www.Soanuals
ꢀ.co7m. 5All Manuals Search And Download.
TANDBERG VIDEO COMMUNICATION SERVER
ADMINISTRATOR GUIDE
CPLReference
CPL Examples
Block Calls from Default Zone and Default Subzone
Allow Calls from Locally Registered Endpoints Only
In this example, the administrator only wants to allow calls that originate from locally registered
endpoints.
The same script can be extended to also allow calls from configured zones but not from the Default
Zone or Default Subzone.
<?xml version=”1.0” encoding=”UTF-8” ?>
<cpl xmlns=”urn:ietf:params:xml:ns:cpl”
xmlns:taa=”http://www.tandberg.net/cpl-extensions”
xmlns:xsi=”http://www.w3.org/2001/XMLSchema-instance”
xsi:schemaLocation=”urn:ietf:params:xml:ns:cpl cpl.xsd”>
<taa:routed>
<?xml version=”1.0” encoding=”UTF-8” ?>
<cpl xmlns=”urn:ietf:params:xml:ns:cpl”
xmlns:taa=”http://www.tandberg.net/cpl-extensions”
xmlns:xsi=”http://www.w3.org/2001/XMLSchema-instance”
xsi:schemaLocation=”urn:ietf:params:xml:ns:cpl cpl.xsd”>
<taa:routed>
<address-switch field=”registered-origin”>
<not-present>
<address-switch field=”registered-origin”>
<not-present>
<address-switch field=”originating-zone”>
<address is=”DefaultZone”>
<reject/>
<reject reason=”Only local endpoints can use this Tandberg
VCS”/>
</not-present>
</address-switch>
</taa:routed>
</cpl>
</address>
<address is=”DefaultSubZone”>
<reject/>
</address>
<otherwise>
<proxy/>
</otherwise>
</not-present>
</address-switch>
</taa:routed>
</cpl>
D14049.01
07.2007
Download from Www.Soanuals
ꢀ.co7m. 6All Manuals Search And Download.
TANDBERG VIDEO COMMUNICATION SERVER
ADMINISTRATOR GUIDE
CPLReference
CPL Examples
Restricting Access to a Local Gateway
In this example, a gateway is registered to the VCS with a prefix of 9 and the administrator wants
to stop calls from outside the organization being routed through it.
<?xml version=”1.0” encoding=”UTF-8” ?>
<cpl xmlns=”urn:ietf:params:xml:ns:cpl”
xmlns:taa=”http://www.tandberg.net/cpl-extensions”
xmlns:xsi=”http://www.w3.org/2001/XMLSchema-instance”
xsi:schemaLocation=”urn:ietf:params:xml:ns:cpl cpl.xsd”>
<taa:routed>
<address-switch field=”destination”>
<address regex=”9(.*)”>
<address-switch field=”originating-zone”>
<address is=”TraversalZone1”>
<reject/>
</address>
</address-switch>
</address>
</address-switch>
</taa:routed>
</cpl>
D14049.01
07.2007
Download from Www.Soanuals
ꢀ.co7m. 7All Manuals Search And Download.
TANDBERG VIDEO COMMUNICATION SERVER
ADMINISTRATOR GUIDE
RegularExpression Reference
About Regular Expressions
Character Description
Example
Regular expressions can be used in
conjunction with a number of VCS features
such as alias transformations, zone
transformations, CPL policy and ENUM. The
VCS uses POSIX format regular expression
syntax.
.
Matches any character.
Matches 0 or more repetitions of the previous
match.
Matches 1 or more repetitions of the previous
match.
Escapes a regular expression special character.
Matches any decimal digit, i.e. 0-9.
Matches a set of characters. Each character in
the set can be specified individually, or a range
can be specified by giving the first character in
the range followed by the -character and then the
last character in the range.
*
.* will match against any sequence of characters.
+
\
This section provides a list of commonly
used special characters in regular expression
syntax.
\d
[...]
[a-z]will match against any lower case alphabetical character.
[a-zA-Z]will match against any alphabetical character.
[0-9#*]will match against any single E.164 character - the E.164 character set is
made up of the digits 0-9plus the hash key (#) and the asterisk key (*).
You can not use special characters within the []
- they will be taken literally.
(...)
Groups a set of matching characters together.
A regular expression can be constructed to transform a URI containing a user’s full
Groups can then be referenced in order using the name to a URI based on their initials.
characters \1, \2, etc. as part of a replace string.
The regular expression (.).*_(.).*(@example.com)would match against the
user john _ smith@example.comand with a replace string of \1\2\3would
|
Matches against one expression or an alternate
expression.
.*@example.(net|com) will match against any URI for the domain
example.comor the domain example.net.
^
$
Signifies the start of a line.
Signifies the end of a line.
^\d\d\d$will match any string that is exactly 3 digits long.
(?!...)
Negative lookahead. Defines a subexpression
that must not be present in order for there to be
a match.
(?!.*@tandberg.net$).*will match any string that does not end with
@tandberg.net.
For an example of regex usage, see
For a detailed description of regular
D14049.01
07.2007
Download from Www.Soanuals
ꢀ.co7m. 8All Manuals Search And Download.
TANDBERG VIDEO COMMUNICATION SERVER
ADMINISTRATOR GUIDE
DNSConfiguration
Overview
Microsoft DNS Server
This section gives examples of DNS configuration using
Microsoft DNS Server and BIND 8 & 9.
Using Microsoft DNS Server you can add the SRV record using either the command line or the MMC snap-in.
To use the command line, on the DNS server open a command window and enter:
• dnscmd . /RecordAdd domain service _ name SRV Priority Weight Port Target
where:
In these examples we show how to set up an SRV record to
handled by the system with the fully qualified domain name of
vcs.example.com which is listening on port 1719, the default
registration port.
domain
is the domain into which you wish to insert the record
is the name of the service you’re adding
service _ name
Priority
Weight
Port
is the port on which the system hosting the domain is listening
is the FQDN of the system hosting the domain
Target
For example:
• dnscmd . /RecordAdd example.com _ h323ls._ udp SRV 1 0 1719 vcs.example.com
It is assumed that both A and AAAA records already
exist for vcs.example.com. If not, you will need to add
one.
Verifying the SRV Record
BIND 8 & 9
There are a range of tools available to investigate DNS records.
One commonly found on Microsoft Windows and UNIX platforms
is nslookup. Use this to verify that everything is working as
expected.
BIND is a commonly used DNS server on UNIX and Linux systems. Configuration is based around two sets of text files: named.conf
which describes which zones are represented by the server, and a selection of zone files which describe the detail of each zone.
BIND is sometimes run chrooted for increased security. This gives the program a new root directory, which means that the
configuration files may not appear where you expect them to be. To see if this is the case on your system, run
For example:
• nslookup -querytype=srv _ h323ls._ udp.
• ps aux grep named
example.com
This will give the command line that named (the BIND server) was invoked with. If there is a -toption, then the path following that is
the new root directory and your files will be located relative to that root.
and check the output.
In /etc/named.conflook for a directory entry within the options section. This will give the directory in which the zone files are
stored, possibly relative to a new root directory. In the appropriate zone section, a file entry will give the name of the file containing
the zone details.
D14049.01
07.2007
Download from Www.Soanuals
ꢀ.co7m. 9All Manuals Search And Download.
TANDBERG VIDEO COMMUNICATION SERVER
ADMINISTRATOR GUIDE
LDAPConfiguration
About the LDAP Databases
Downloading the H.350 schemas
The VCS can be configured to use a database on an LDAP
Directory Server to store authentication credential information
(usernames, passwords, and other relevant information)
The following ITU specification describes the schemas which are required to be installed on the LDAP server:
H.350 Directory services architecture for multimedia conferencing - An LDAP schema to represent endpoints on the network.
H.350.1 Directory services architecture for H.323 - An LDAP schema to represent H.323 endpoints.
H.350.2 Directory services architecture for H.235 - An LDAP schema to represent H.235 elements.
This section describes how to download the schemas that
must be installed on the LDAP server, and how to install and
configure two common types of LDAP servers, Microsoft Active
Directory and OpenLDAP, for use with the VCS.
The schemas can be downloaded in ldifformat from the web interface on the VCS. To do this:
ꢀ. Navigate to VCS Configuration > Authentication > LDAP > Schemas. You will see a list of downloadable schemas.
ꢁ. Click on the Download button next to each file to open it.
D14049.01
07.2007
Download from Www.Soanuals
ꢀ.co8m. 0All Manuals Search And Download.
TANDBERG VIDEO COMMUNICATION SERVER
ADMINISTRATOR GUIDE
LDAPConfiguration
Microsoft Active Directory
Adding H.350 Objects
objectClass: h323Identity
Prerequisites
These step-by-step instructions assume that Active Directory
has already been installed. For details on installing Active
Directory please consult your Windows documentation.
objectClass: h235Identity
Create the Organizational Hierarchy
commUniqueId: comm1
ꢀ. Open up the Active Directory Users and Computers MMC
h323Identityh323-ID: MeetingRoom1
h323IdentitydialedDigits: 626262
h235IdentityEndpointID: meetingroom1
h235IdentityPassword: mypassword
The following instructions are for Windows Server 2003
Enterprise Edition. If you are not using this version of Windows,
your instructions may vary.
snap-in.
ꢁ. Under your BaseDN right-click and select New Organizational
Unit.
3. Create an Organizational unit called h350.
It is good practice to keep the H.350 directory in its own
organizational unit to separate out H.350 objects from
other types of objects. This allows access controls to be
setup which only allow the VCS read access to the BaseDN and
therefore limit access to other sections of the directory.
ꢁ. Add the ldif file to the server using the command:
ldifde -i -c DC=X <ldap _ base> -f filename.
ldf
where:
<ldap _ base>is the base DN of your Active Directory
Add the H.350 Objects
Server.
ꢀ. Create an ldiffile with the following contents:
# MeetingRoom1 endpoint
Installing the H.350 Schemas
follows:
The example above will add a single H.323 endpoint with an
H.323 Id alias of MeetingRoom1 and an E.164 alias of 626262.
The entry also has H.235 credentials of id meetingroom1 and
password mypassword which are used during authentication.
dn: commUniqueId=comm1,ou=h350,DC=X
objectClass: commObject
Open a command prompt and for each file execute the following
command:
ldifde -i -c DC=X <ldap _ base> -f filename.ldf
Securing with TLS
where:
To enable Active Directory to use TLS, you must request and install a certificate on the Active Directory server. The certificate must
meet the following requirements:
<ldap _ base> is the base DN for your Active Directory
server.
• Be located in the Local Computer’s Personal certificate store. This can be seen using the Certificates MMC snap-in.
• Have the private details on how to obtain a key associated for use with it stored locally. When viewing the certificate you should
see a message saying “You have a private key that corresponds to this certificate’’.
• Have a private key that does not have strong private key protection enabled. This is an attribute that can be added to a key
request.
• The Enhanced Key Usage extension includes the Server Authentication object identifier, again this forms part of the key request.
• Issued by a CA that both the domain controller and the client trust.
• Include the Active Directory fully qualified domain name of the domain controller in the common name in the subject field and/or
the DNS entry in the subject alternative name extension.
To configure the VCS to use TLS on the connection to the LDAP server you must upload the CA’s certificate as a trusted CA
certificate. This can be done on the VCS by navigating to:
• Maintenance > Security.
D14049.01
07.2007
Download from Www.Soanuals
ꢀ.co8m. ꢀAll Manuals Search And Download.
TANDBERG VIDEO COMMUNICATION SERVER
ADMINISTRATOR GUIDE
LDAPConfiguration
OpenLDAP
Adding H.350 Objects
Add the H.350 Objects
Prerequisites
These instructions assume that an OpenLDAP server has
already been installed. For details on installing OpenLDAP see
ꢀ. Create an ldiffile with the following contents:
Create the Organizational Hierarchy
# MeetingRoom1 endpoint
ꢀ. Create an ldiffile with the following contents:
dn: commUniqueId=comm1,ou=h350,dc=my-
domain,dc=com
The following examples use a standard OpenLDAP installation
on the Linux platform. For installations on other platforms the
location of the OpenLDAP configuration files may be different.
See the OpenLDAP installation documentation for details.
# This example creates a single
# organizational unit to contain the H.350
# objects
objectClass: commObject
objectClass: h323Identity
dn: ou=h350,dc=my-domain,dc=com
objectClass: organizationalUnit
ou: h350
objectClass: h235Identity
commUniqueId: comm1
h323Identityh323-ID: MeetingRoom1
h323IdentitydialedDigits: 626262
h235IdentityEndpointID: meetingroom1
h235IdentityPassword: mypassword
ꢁ. Add the ldiffile to the server using the command:
slapadd -l <ldif _file>
ꢁ. Add the ldif file to the server using the command:
slapadd -l <ldif _file>
This organizational unit will form the BaseDN to which the
VCS will issue searches. In this example the BaseDN will be:
ou=h350,dc=my-domain,dc=com.
Installing the H.350 Schemas
ꢀ. Copy the OpenLDAP files to the OpenLDAP schema directory:
/etc/openldap/schemas/commobject.ldif
/etc/openldap/schemas/h323identity.ldif
/etc/openldap/schemas/h235identity.ldif
/etc/openldap/schemas/sipidentity.ldif
It is good practice to keep the H.350 directory in its own
organizational unit to separate out H.350 objects from
other types of objects. This allows access controls to be
setup which only allow the VCS read access to the BaseDN and
therefore limit access to other sections of the directory.
This will add a single H.323 endpoint with an H.323 Id alias
of MeetingRoom1 and an E.164 alias of 626262. The entry
also has H.235 credentials of id meetingroom1 and password
mypassword which are used during authentication.
ꢁ. Edit /etc/openldap/slapd.conf to add the new
schemas. You will need to add the following lines:
Securing with TLS
ꢀ. Edit /etc/openldap/slapd.conf and add the following
include /etc/openldap/schemas/commobject.ldif
The connection to the LDAP server can be encrypted by enabling
Transport Level Security (TLS) on the connection. To do this you
must create an X.509 certificate for the LDAP server to allow
the VCS to verify the server’s identity. Once the certificate has
been created you will need to install the following three files
associated with the certificate onto the LDAP server:
three lines:
include /etc/openldap/schemas/h323identity.
ldif
TLSCACertificateFile <path to CA certificate>
TLSCertificateFile <path to LDAP server
certificate>
include /etc/openldap/schemas/h235identity.
ldif
TLSCertificateKeyFile <path to LDAP private
key>
include /etc/openldap/schemas/sipidentity.ldif
• The certificate for the LDAP server.
• The private key for the LDAP server.
The OpenLDAP daemon (slapd) must be restarted for the new
schemas to take effect.
The OpenLDAP daemon (slapd) must be restarted for the TLS
settings to take effect.
• The certificate of the Certificate Authority (CA) that was used
to sign the LDAP server’s certificate.
To configure the VCS to use TLS on the connection to the LDAP
server you must upload the CA’s certificate as a trusted CA
certificate. This can be done on the VCS by navigating to:
All three files should be in PEM file format.
The LDAP server must be configured to use the certificate. To do
this:
• Maintenance > Security.
D14049.01
07.2007
Download from Www.Soanuals
ꢀ.co8m. ꢁAll Manuals Search And Download.
TANDBERG VIDEO COMMUNICATION SERVER
ADMINISTRATOR GUIDE
Bibliography
Reference Title
Link
1
ITU Specification: H.235 Security and encryption for H-Series (H.323 and other H.245-based) multimedia
http://www.itu.int/rec/T-REC-H.235/en
terminals
2
3
4
5
6
7
8
ITU Specification: H.350 Directory services architecture for multimedia conferencing
RFC 2782: A DNS RR for specifying the location of services (DNS SRV)
RFC 3164: The BSD syslog Protocol
RFC 3880: Call Processing Language (CPL): A Language for User Control of Internet Telephony Services
DNS and BIND Fourth Edition, Albitz and Liu, O’Reilly and Associates, ISBN: 0-596-00158-4
RFC 2915: The Naming Authority Pointer (NAPTR) DNS Resource Record
http://www.itu.int/rec/T-REC-H.350/en
http://www.ietf.org/rfc/rfc2782.txt
http://www.ietf.org/rfc/rfc3164.txt
http://www.ietf.org/rfc/rfc3880.txt
http://www.ietf.org/rfc/rfc2915.txt
http://www.ietf.org/rfc/rfc3761.txt
RFC 3761: The E.164 to Uniform Resource Identifiers (URI) Dynamic Delegation Discovery System (DDDS)
Application (ENUM)
9
Mastering Regular Expressions, Jeffrey E.F. Friedl, O’Reilly and Associates, ISBN: 1-56592-257-3
RFC 3327: Session Initiation Protocol (SIP) Extension Header Field for Registering Non-Adjacent Contacts
Session Traversal Utilities for (NAT) (STUN)
10
11
12
http://www.ietf.org/rfc/rfc3327.txt
http://www.ietf.org/internet-drafts/draft-ietf-behave-rfc3489bis-06.txt
http://www.ietf.org/internet-drafts/draft-ietf-behave-turn-03.txt
Obtaining Relay Addresses from Simple Traversal Underneath NAT (STUN)
13
14
15
16
RFC 4787: Network Address Translation (NAT) Behavioral Requirements for Unicast UDP
RFC 4028: Session Timers in the Session Initiation Protocol (SIP)
http://www.ietf.org/rfc/rfc4787.txt
http://www.ietf.org/rfc/rfc4028.txt
http://www.itu.int/rec/T-REC-H.323/en
http://www.ietf.org/rfc/rfc3263.txt
ITU Specification: H.323: Packet-based multimedia communications systems
RFC 3263: Session Initiation Protocol (SIP): Locating SIP Servers
17
18
19
20
21
RFC 3550: RTP: A Transport Protocol for Real-Time Applications
RFC 791: Internet Protocol
http://www.ietf.org/rfc/rfc3550.txt
http://www.ietf.org/rfc/rfc791.txt
http://www.ietf.org/rfc/rfc2460.txt
http://www.ietf.org/rfc/rfc3261.txt
RFC 2460: Internet Protocol, Version 6 (IPv6) Specification
RFC 3261: SIP: Session Initiation Protocol
RFC 3489: STUN - Simple Traversal of User Datagram Protocol (UDP) Through Network Address Translators (NATs) http://www.ietf.org/rfc/rfc3489.txt
D14049.01
07.2007
Download from Www.Soanuals
ꢀ.co8m. 3All Manuals Search And Download.
TANDBERG VIDEO COMMUNICATION SERVER
ADMINISTRATOR GUIDE
Glossary
Term
A record
Definition
A type of DNS record that maps a domain name to an IPv4 address.
AAAA record
Administrator Policy
A type of DNS record that maps a domain name to an IPv6 address.
In relation to the VCS, the set of rules configured system-wide (either via the web interface or CPL script) that determine the action(s) to be applied to calls matching
a given criteria.
Alias
Alternate
ARQ
The name an endpoint uses when registering with the VCS. Other endpoints can then use this name to call it.
One or more VCSs configured to support the same zone in order to provide redundancy.
An endpoint RAS request to make or answer a call.
Admission Request
Assent
TANDBERG’s proprietary protocol for firewall traversal.
Border Controller
Call Policy
CLI
A TANDBERG device used to control multimedia networks and firewall traversal.
The set of rules (administrator policy, user policy and transforms) that are applied to a single call to determine whether and how it is placed.
A text-based user interface used to access the VCS.
Command Line Interface
CPL
A distributed database linking domain names to IP addresses.
Call Processing Language
DNS
Domain Name System
DNS zone
E.164
On the VCS, a zone used to configure access to endpoints located via a DNS lookup.
An ITU standard for structured telephone numbers. Each telephone number consists of a country code, area code and subscriber number. For example, TANDBERG’s
European Headquarters’ phone number is +47 67 125125, corresponding to a country code of 47 for Norway, area code of 67 for Lysaker and finally 125125 to
determine which phone line in Lysaker.
ENUM
A means of mapping E.164 numbers to URIs using DNS.
tElephone NUmber Mapping
ENUM zone
On the VCS, a zone used to configure access to endpoints located via ENUM.
External Manager
Firewall traversal
FindMe™
The remote system that is used to manage endpoints and network infrastructure. The TANDBERG Management Suite (TMS) is an example of an external manager.
Crossing a firewall or NAT device.
A TANDBERG feature that allows users to have a single alias on which they can be reached regardless of the endpoint(s) they are currently using.
A domain name that specifies the node’s position in the DNS tree absolutely, uniquely identifying the system or device.
FQDN
Fully Qualified Domain Name
Gatekeeper
Gatekeeper Zone
H.323
A device used to control H.323 multimedia networks. An example is the TANDBERG Gatekeeper.
A collection of all the endpoints, gateways and MCUs managed by a single gatekeeper.
A standard that defines the protocols used for packet-based multimedia communications systems.
A protocol used for communications over the internet.
HTTP
Hypertext Transfer Protocol
HTTPS
A protocol used for secure communications over the internet, combining HTTP with TLS.
Hop count
ICE
The number of times a location request may be forwarded to a gatekeeper or proxy before it is deemed to have failed.
A collaborative algorithm that works together with STUN services (and other NAT traversal techniques) to allow clients to achieve firewall traversal.
Interactive Connectivity Establishment
IETF
An organization that defines (via documents such as RFCs) the protocol standards and best practices relating to the design, use and management of the internet.
Internet Engineering Task Force
D14049.01
07.2007
Download from Www.Soanuals
ꢀ.co8m. 4All Manuals Search And Download.
TANDBERG VIDEO COMMUNICATION SERVER
ADMINISTRATOR GUIDE
Glossary
Term
Interworking
Definition
Allowing H.323 systems to connect to SIP systems.
IPv4
Internet Protocol version 4
IPv6
Internet Protocol version 6
IRQ
A request sent to an endpoint requesting information about its status.
A geographically limited computer network, usually with a high bandwidth throughput.
A protocol for accessing on-line directories running over TCP/IP.
Information Request
LAN
Local Area Network
LDAP
Lightweight Directory Access Protocol
Link
In relation to the VCS, a connection between two nodes.
LRQ
A RAS query between gatekeepers to determine the location of an endpoint.
Location Request
NAPTR record
A type of DNS record.
NAT
Also known as IP masquerading. Rewriting source and destination addresses as the IP packet passes through the NAT device.
Network Address Translation
Node
NTP
In relation to the VCS, a node is one end of a link. A node can be a local subzone or a zone.
A protocol used for synchronizing clocks.
Network Time Protocol
Pipe
In relation to the VCS, a means of controlling the bandwidth used on a link.
Proxy, Proxy Server
In SIP, an intermediary entity that acts as both a server and a client for the purpose of making requests on behalf of other clients. A proxy server primarily plays the
role of routing, which means its job is to ensure that a request is sent to another entity “closer” to the targeted user. Proxies are also useful for enforcing policy
(for example, making sure a user is allowed to make a call). A proxy interprets, and, if necessary, rewrites specific parts of a request message before forwarding it.
While a proxy can set up calls between SIP endpoints, it does not participate in the call once it is set up.
RAS
A protocol used between H.323 endpoints and a gatekeeper to register and place calls.
Registration, Admission and Status
Registrar
In SIP, a server that accepts REGISTER requests and places the information it receives in those requests into the location service for the domain it handles. This
information is used to advise other SIP Proxies/Registrars where to send calls for that endpoint.
Regex
A pattern used to match text strings according to a POSIX-defined syntax.
Regular Expression
RFC
A process and result used by the IETF for Internet standards.
Request for Comments
RS-232
RTCP
A commonly used standard for computer serial ports.
RTP Control Protocol
RTP
An encrypted protocol used to provide a secure CLI.
Real-time Transport Protocol
SSH
Secure Shell
D14049.01
07.2007
Download from Www.Soanuals
ꢀ.co8m. 5All Manuals Search And Download.
TANDBERG VIDEO COMMUNICATION SERVER
ADMINISTRATOR GUIDE
Glossary
Term
SIP
Definition
Session Initiation Protocol
SNMP
A protocol used to monitor network devices.
Simple Network Management Protocol
Source Alias
The alias present in the “source” field of a message.
A type of DNS record.
SRV record
Service record
STUN
Simple Traversal of UDP through NATs
Subzone
A segment of a VCS zone.
TCP
Transmission Control Protocol
Telnet
TLS
A network protocol used on the internet or Local Area Networks (LANs).
A protocol that provides secure communications over the internet.
Transport Layer Security
Transform
In relation to the VCS, the process of changing the alias being searched for.
Traversal call
Traversal Client
Traversal Server
Any call where both signaling and media are routed through the VCS.
A traversal entity on the private side of a firewall. Examples are a TANDBERG Gatekeeper or TANDBERG VCS.
A traversal entity on the public side of a firewall. Examples are the TANDBERG Border Controller and the TANDBERG VCS with the Border Controller option enabled.
Traversal-enabled endpoint
UDP
Any endpoint that supports the Assent and/or ITU H.460.18 and H.460.19 standards for firewall traversal. This includes all TANDBERG MXP endpoints.
User Datagram Protocol
URI
A formatted string used to identify a resource, typically on the internet.
Uniform Resource Identifier
User Policy
VCS Border Controller
Zone
The set of rules that determine the action(s) to be applied to calls for a particular user or group.
A VCS with the Border Controller option added. This allows the VCS to act as a firewall traversal server.
A collection of endpoints.
D14049.01
07.2007
Download from Www.Soanuals
ꢀ.co8m. 6All Manuals Search And Download.
TANDBERG VIDEO COMMUNICATION SERVER
ADMINISTRATOR GUIDE
Philip Pedersens vei 22, 1366 Lysaker, Norway
Telephone: +47 67 125 125
Fax: +47 67 125 234
Video: +47 67 117 777
E-mail: [email protected]
D14049.01
07.2007
Download from Www.Soanuals
ꢀ.co8m. 7All Manuals Search And Download.
|