TANDBERG Gatekeeper User Manual Software version N3 D13381.03 This document is not to be reproduced in whole or in part without permission in wri
TANDBERG Gatekeeper User Manual 4 Do not place heavy objects directly on top of the Gatekeeper. Do not place hot objects directly on top, or di
5 2.5 Gatekeeper Initial Configuration The TANDBERG Gatekeeper requires some configuration before it can be used. This must be done using a PC conne
TANDBERG Gatekeeper User Manual 6 xConfiguration Gatekeeper AutoDiscovery command in section 5.2 for more information. 12. Reboot the Gatekeeper by ty
7 3 Using the Gatekeeper The Gatekeeper is used by H.323 terminals, Gateways and MCUs. These devices register with the Gatekeeper and the Gatekeepe
TANDBERG Gatekeeper User Manual 8 NOTE Automatic discovery is a function that allows the Gatekeeper to reply to multicast Gatekeeper discovery message
9 Remote zones can be configured through the web interface of the TANDBERG Gatekeeper by navigating to Gatekeeper Configuration > Gatekeeper. See
TANDBERG Gatekeeper User Manual 10 When a Gatekeeper receives a Location Request, if it cannot respond from its own registration database, it will que
11 3.5 Call Control When an end-point wants to call another endpoint it presents the address it wants to call to the Gatekeeper using a protocol kno
TANDBERG Gatekeeper User Manual 12 Figure 3 Admission Request Processing
13 Figure 4 Location Request Processing
TANDBERG Gatekeeper User Manual ii Trademarks and copyright Copyright 1993-2005 TANDBERG ASA. All rights reserved. This document contains information
TANDBERG Gatekeeper User Manual 14 3.6 Bandwidth Control The TANDBERG Gatekeeper allows you to control endpoints’ use of bandwidth on your network. F
15 xConfiguration Links Link [1..100] Pipe2 Name Each subzone may be configured with its own bandwidth limits. Calls placed between two endpoints in
TANDBERG Gatekeeper User Manual 16 Figure 6 Configuration of a SubZone through the web interface Figure 7 Adding a new Pipe through the web interfac
17 3.6.2 Bandwidth Control Examples One possible configuration for the deployment in Figure 5 is shown in Figure 9. Each of the offices is represent
TANDBERG Gatekeeper User Manual 18 In Figure , the endpoints in the enterprise register with the Gatekeeper, whilst those in the branch and home offic
19 Figure 12 Gatekeeper example configuration All of the endpoints in the enterprise will be assigned to the default subzone. The Traversal subzone
TANDBERG Gatekeeper User Manual 20 match an entry on the DenyList. Allow lists and Deny lists are mutually exclusive: only one may be in use at any gi
21 To configure the Gatekeeper to use the local database of credentials during authentication issue the following commands xConfiguration Authenticat
TANDBERG Gatekeeper User Manual 22 xConfiguration LDAP UserDN: "Your user DN" xConfiguration LDAP Password: "password" The status
23 Figure 16 Configuring the Gatekeeper to authenticate with an LDAP server using TLS encryption 3.9 URI Dialing If an alias is not located in the
TANDBERG Gatekeeper User Manual iii Environmental Issues Thank you for buying a product which contributes to a reduction in pollution, and thereby he
TANDBERG Gatekeeper User Manual 24 Figure 17 IP Configuration Screen 3.9.1 URI Dialing and firewall traversal If URI dialing is being used in conjun
25 To configure the Gatekeeper for firewall traversal, use the Web or console interface (see Figure 18 for this configuration screen on the web inter
TANDBERG Gatekeeper User Manual 26 xConfiguration Gatekeeper Policy Mode <On/Off> Policy interacts with authentication (section 3.7.2, Authentic
27 “display” Not defined for any alias types address The address construct is used within an address-switch to specify addresses to match. Please n
TANDBERG Gatekeeper User Manual 28 an E.164 number. proxy On executing a proxy node the Gatekeeper will attempt to forward the call to the locations s
29 User "fred" will not accept calls from anyone at "annoying.com", or from any unauthenticated users. All other users will allow
TANDBERG Gatekeeper User Manual 30 4 Software Upgrade Software upgrade can be done in one of two ways: Using a web browser (HTTP/HTTPS). Using
31 4. Enter the release key and press Install Software. You will get a new screen where you can upload the software image: 5. Browse to the file c
TANDBERG Gatekeeper User Manual 32 NOTE Make sure you transfer the release key file before transferring the software image. Also make sure you name th
33 5 Configuring the Gatekeeper This chapter lists the basic usage of each command. The commands also support more advanced usage, which is outside
TANDBERG Gatekeeper User Manual iv Operator Safety Summary For your protection, please read these safety instructions completely before operating the
TANDBERG Gatekeeper User Manual 34 Command Usage Description ResourceUsage xstatus ResourceUsage Reports usage of system resources. Registrations:
35 xconfiguration ? To list all configuration data, type xconfiguration To show a specific configuration value, type xconfiguration <name> To
TANDBERG Gatekeeper User Manual 36 Configuration commands Description xConfiguration Gatekeeper AlternateGK [1..5]: <IPAddr> List of Alternate
37 Configuration commands Description xConfiguration HTTPS Mode: <On/Off> Enables/disables HTTPS support. Note that HTTP must also be enabled.
TANDBERG Gatekeeper User Manual 38 Configuration commands Description xConfiguration Pipes Pipe [1..100] Bandwidth Total Limit: <1..100000000>
39 Configuration commands Description xConfiguration SubZones TraversalSubZone Bandwidth Total Mode: <None/Limited/Unlimited> Whether or not t
TANDBERG Gatekeeper User Manual 40 Configuration commands Description xConfiguration Zones Zone [1..100] Gatekeeper IP Port: <1..65534> Specifi
41 Command Usage Description DenyListAdd xCommand DenyListAdd <denied_alias> Add an entry to the deny list, used by the registration restrict
TANDBERG Gatekeeper User Manual 42 Command Usage Description SubZoneDelete xCommand SubZoneDelete: <index> Deletes the indexed subzone. ZoneAd
43 xfeedback list To register a feedback expression, type xfeedback register <expression> To deregister the feedback expression with index <
v Table Of Contents TANDBERG Gatekeeper User Manual ...i Trademar
TANDBERG Gatekeeper User Manual 44 Command Usage Description relkey Relkey Displays the release key that this software has been installed with. syslo
45 6 Appendix: Configuring DNS Servers In the examples below, we set up an SRV record to handle H.323 URIs of the form [email protected]. These are ha
TANDBERG Gatekeeper User Manual 46 then instruct named to reload the files kill –s SIGHUP pid 4. Check the log files for any discrepancies tail /var/
47 7 Appendix: Configuring LDAP Servers 7.1 Microsoft Active Directory 7.1.1 Prerequisites These comprehensive step by step instructions assume tha
TANDBERG Gatekeeper User Manual 48 commUniqueId: comm1 h323Identityh323-ID: MeetingRoom1 h323IdentitydialedDigits: 626262 h235IdentityEndpointID: meet
49 H.350.2 – Directory services architecture for H.235 - An LDAP schema to represent H.235 elements. The schemas can be downloaded in ldif format
TANDBERG Gatekeeper User Manual 50 commUniqueId: comm1 h323Identityh323-ID: MeetingRoom1 h323IdentitydialedDigits: 626262 h235IdentityEndpointID: meet
51 8 Approvals The product has been approved by various international approval agencies, among others: UL and Nemko. According to their Follow-Up In
TANDBERG Gatekeeper User Manual 52 9 Technical Specifications System Capacity 100-1000 registered endpoints 25-200 concurrent calls 0-100 traversal
53 10 Index AllowList, 19, 36, 40 Alternate, 9, 24, 36 Authentication LDAP, 35 local database, 35 Bandwidth Control, 37 CPL, 25, 36 examples, 28 uns
TANDBERG Gatekeeper User Manual vi 4.1 Upgrading Using HTTP(S) ...
1 1 Introduction This User Manual is provided to help you make the best use of your TANDBERG Gatekeeper. A Gatekeeper is a central part of an H.323
TANDBERG Gatekeeper User Manual 2 1.1 TANDBERG Gatekeeper Overview On the front of the Gatekeeper there are three LAN interfaces, a serial port (Da
3 2 Installation Precautions: Never install communication equipment during a lightning storm. Never install jacks for communication cables in
Komentáře k této Příručce