Tandberg Data N3 Uživatelský manuál

Procházejte online nebo si stáhněte Uživatelský manuál pro Sítě Tandberg Data N3. Tandberg Data N3 User's Manual Uživatelská příručka

  • Stažení
  • Přidat do mých příruček
  • Tisk
  • Strana
    / 59
  • Tabulka s obsahem
  • KNIHY
  • Hodnocené. / 5. Na základě hodnocení zákazníků
Zobrazit stránku 0
TANDBERG Gatekeeper User
Manual
Software version N3
D13381.03
This document is not to be reproduced in whole or in part without permission in writing from:
Zobrazit stránku 0
1 2 3 4 5 6 ... 58 59

Shrnutí obsahu

Strany 1 - TANDBERG Gatekeeper User

TANDBERG Gatekeeper User Manual Software version N3 D13381.03 This document is not to be reproduced in whole or in part without permission in wri

Strany 2 - Trademarks and copyright

TANDBERG Gatekeeper User Manual 4  Do not place heavy objects directly on top of the Gatekeeper.  Do not place hot objects directly on top, or di

Strany 3 - Environmental Issues

5 2.5 Gatekeeper Initial Configuration The TANDBERG Gatekeeper requires some configuration before it can be used. This must be done using a PC conne

Strany 4 - Operator Safety Summary

TANDBERG Gatekeeper User Manual 6 xConfiguration Gatekeeper AutoDiscovery command in section 5.2 for more information. 12. Reboot the Gatekeeper by ty

Strany 5 - Table Of Contents

7 3 Using the Gatekeeper The Gatekeeper is used by H.323 terminals, Gateways and MCUs. These devices register with the Gatekeeper and the Gatekeepe

Strany 6

TANDBERG Gatekeeper User Manual 8 NOTE Automatic discovery is a function that allows the Gatekeeper to reply to multicast Gatekeeper discovery message

Strany 7 - 1 Introduction

9 Remote zones can be configured through the web interface of the TANDBERG Gatekeeper by navigating to Gatekeeper Configuration > Gatekeeper. See

Strany 8 - Overview

TANDBERG Gatekeeper User Manual 10 When a Gatekeeper receives a Location Request, if it cannot respond from its own registration database, it will que

Strany 9 - 2.1 Unpacking

11 3.5 Call Control When an end-point wants to call another endpoint it presents the address it wants to call to the Gatekeeper using a protocol kno

Strany 10 - 2.3 Connecting Cables

TANDBERG Gatekeeper User Manual 12 Figure 3 Admission Request Processing

Strany 11

13 Figure 4 Location Request Processing

Strany 12

TANDBERG Gatekeeper User Manual ii Trademarks and copyright Copyright 1993-2005 TANDBERG ASA. All rights reserved. This document contains information

Strany 13 - 3.2 Registration

TANDBERG Gatekeeper User Manual 14 3.6 Bandwidth Control The TANDBERG Gatekeeper allows you to control endpoints’ use of bandwidth on your network. F

Strany 14 - 3.3 Neighbor Gatekeepers

15 xConfiguration Links Link [1..100] Pipe2 Name Each subzone may be configured with its own bandwidth limits. Calls placed between two endpoints in

Strany 15 - 3.4 Alternate Gatekeepers

TANDBERG Gatekeeper User Manual 16 Figure 6 Configuration of a SubZone through the web interface Figure 7 Adding a new Pipe through the web interfac

Strany 16

17 3.6.2 Bandwidth Control Examples One possible configuration for the deployment in Figure 5 is shown in Figure 9. Each of the offices is represent

Strany 17 - 3.5 Call Control

TANDBERG Gatekeeper User Manual 18 In Figure , the endpoints in the enterprise register with the Gatekeeper, whilst those in the branch and home offic

Strany 18

19 Figure 12 Gatekeeper example configuration All of the endpoints in the enterprise will be assigned to the default subzone. The Traversal subzone

Strany 19

TANDBERG Gatekeeper User Manual 20 match an entry on the DenyList. Allow lists and Deny lists are mutually exclusive: only one may be in use at any gi

Strany 20 - 3.6 Bandwidth Control

21 To configure the Gatekeeper to use the local database of credentials during authentication issue the following commands xConfiguration Authenticat

Strany 21

TANDBERG Gatekeeper User Manual 22 xConfiguration LDAP UserDN: "Your user DN" xConfiguration LDAP Password: "password" The status

Strany 22

23 Figure 16 Configuring the Gatekeeper to authenticate with an LDAP server using TLS encryption 3.9 URI Dialing If an alias is not located in the

Strany 23

TANDBERG Gatekeeper User Manual iii Environmental Issues Thank you for buying a product which contributes to a reduction in pollution, and thereby he

Strany 24

TANDBERG Gatekeeper User Manual 24 Figure 17 IP Configuration Screen 3.9.1 URI Dialing and firewall traversal If URI dialing is being used in conjun

Strany 25 - 3.7 Registration Control

25 To configure the Gatekeeper for firewall traversal, use the Web or console interface (see Figure 18 for this configuration screen on the web inter

Strany 26 - 3.8 H.235 Authentication

TANDBERG Gatekeeper User Manual 26 xConfiguration Gatekeeper Policy Mode <On/Off> Policy interacts with authentication (section 3.7.2, Authentic

Strany 27

27 “display” Not defined for any alias types address The address construct is used within an address-switch to specify addresses to match. Please n

Strany 28

TANDBERG Gatekeeper User Manual 28 an E.164 number. proxy On executing a proxy node the Gatekeeper will attempt to forward the call to the locations s

Strany 29 - 3.9 URI Dialing

29 User "fred" will not accept calls from anyone at "annoying.com", or from any unauthenticated users. All other users will allow

Strany 30 - 3.10 Firewall traversal

TANDBERG Gatekeeper User Manual 30 4 Software Upgrade Software upgrade can be done in one of two ways:  Using a web browser (HTTP/HTTPS).  Using

Strany 31 - 3.11 Call Policy

31 4. Enter the release key and press Install Software. You will get a new screen where you can upload the software image: 5. Browse to the file c

Strany 32

TANDBERG Gatekeeper User Manual 32 NOTE Make sure you transfer the release key file before transferring the software image. Also make sure you name th

Strany 33 - 3.11.2 CPL Script Actions

33 5 Configuring the Gatekeeper This chapter lists the basic usage of each command. The commands also support more advanced usage, which is outside

Strany 34 - 3.11.4 CPL Examples

TANDBERG Gatekeeper User Manual iv Operator Safety Summary For your protection, please read these safety instructions completely before operating the

Strany 35 - Call Redirection

TANDBERG Gatekeeper User Manual 34 Command Usage Description ResourceUsage xstatus ResourceUsage Reports usage of system resources. Registrations:

Strany 36 - 4 Software Upgrade

35 xconfiguration ? To list all configuration data, type xconfiguration To show a specific configuration value, type xconfiguration <name> To

Strany 37 - 4.2 Upgrading Using SCP

TANDBERG Gatekeeper User Manual 36 Configuration commands Description xConfiguration Gatekeeper AlternateGK [1..5]: <IPAddr> List of Alternate

Strany 38

37 Configuration commands Description xConfiguration HTTPS Mode: <On/Off> Enables/disables HTTPS support. Note that HTTP must also be enabled.

Strany 39 - 5.1 Status

TANDBERG Gatekeeper User Manual 38 Configuration commands Description xConfiguration Pipes Pipe [1..100] Bandwidth Total Limit: <1..100000000>

Strany 40 - 5.2 Configuration

39 Configuration commands Description xConfiguration SubZones TraversalSubZone Bandwidth Total Mode: <None/Limited/Unlimited> Whether or not t

Strany 41

TANDBERG Gatekeeper User Manual 40 Configuration commands Description xConfiguration Zones Zone [1..100] Gatekeeper IP Port: <1..65534> Specifi

Strany 42

41 Command Usage Description DenyListAdd xCommand DenyListAdd <denied_alias> Add an entry to the deny list, used by the registration restrict

Strany 43

TANDBERG Gatekeeper User Manual 42 Command Usage Description SubZoneDelete xCommand SubZoneDelete: <index> Deletes the indexed subzone. ZoneAd

Strany 44

43 xfeedback list To register a feedback expression, type xfeedback register <expression> To deregister the feedback expression with index <

Strany 45

v Table Of Contents TANDBERG Gatekeeper User Manual ...i Trademar

Strany 46 - 5.3 Command

TANDBERG Gatekeeper User Manual 44 Command Usage Description relkey Relkey Displays the release key that this software has been installed with. syslo

Strany 47 - Command Usage Description

45 6 Appendix: Configuring DNS Servers In the examples below, we set up an SRV record to handle H.323 URIs of the form [email protected]. These are ha

Strany 48 - 5.5 Feedback

TANDBERG Gatekeeper User Manual 46 then instruct named to reload the files kill –s SIGHUP pid 4. Check the log files for any discrepancies tail /var/

Strany 49 - 5.6 Other commands

47 7 Appendix: Configuring LDAP Servers 7.1 Microsoft Active Directory 7.1.1 Prerequisites These comprehensive step by step instructions assume tha

Strany 50 - Usage Description

TANDBERG Gatekeeper User Manual 48 commUniqueId: comm1 h323Identityh323-ID: MeetingRoom1 h323IdentitydialedDigits: 626262 h235IdentityEndpointID: meet

Strany 51 - 6.2 BIND 8 & 9

49  H.350.2 – Directory services architecture for H.235 - An LDAP schema to represent H.235 elements. The schemas can be downloaded in ldif format

Strany 52

TANDBERG Gatekeeper User Manual 50 commUniqueId: comm1 h323Identityh323-ID: MeetingRoom1 h323IdentitydialedDigits: 626262 h235IdentityEndpointID: meet

Strany 53 - 7 Appendix: Configuring LDAP

51 8 Approvals The product has been approved by various international approval agencies, among others: UL and Nemko. According to their Follow-Up In

Strany 54 - 7.2 OpenLDAP

TANDBERG Gatekeeper User Manual 52 9 Technical Specifications System Capacity 100-1000 registered endpoints 25-200 concurrent calls 0-100 traversal

Strany 55 - 7.2.3 Adding H.350 objects

53 10 Index AllowList, 19, 36, 40 Alternate, 9, 24, 36 Authentication LDAP, 35 local database, 35 Bandwidth Control, 37 CPL, 25, 36 examples, 28 uns

Strany 56 - 7.2.4 Securing with TLS

TANDBERG Gatekeeper User Manual vi 4.1 Upgrading Using HTTP(S) ...

Strany 57 - 8 Approvals

1 1 Introduction This User Manual is provided to help you make the best use of your TANDBERG Gatekeeper. A Gatekeeper is a central part of an H.323

Strany 58 - 9 Technical Specifications

TANDBERG Gatekeeper User Manual 2 1.1 TANDBERG Gatekeeper Overview On the front of the Gatekeeper there are three LAN interfaces, a serial port (Da

Strany 59 - 10 Index

3 2 Installation Precautions:  Never install communication equipment during a lightning storm.  Never install jacks for communication cables in

Komentáře k této Příručce

Žádné komentáře