Tandberg Data N3 Bedienungsanleitung

Stöbern Sie online oder laden Sie Bedienungsanleitung nach Vernetzung Tandberg Data N3 herunter. Tandberg Data N3 User's Manual Benutzerhandbuch

  • Herunterladen
  • Zu meinen Handbüchern hinzufügen
  • Drucken
  • Seite
    / 59
  • Inhaltsverzeichnis
  • LESEZEICHEN
  • Bewertet. / 5. Basierend auf Kundenbewertungen
Seitenansicht 0
TANDBERG Gatekeeper User
Manual
Software version N3
D13381.03
This document is not to be reproduced in whole or in part without permission in writing from:
Seitenansicht 0
1 2 3 4 5 6 ... 58 59

Inhaltsverzeichnis

Seite 1 - TANDBERG Gatekeeper User

TANDBERG Gatekeeper User Manual Software version N3 D13381.03 This document is not to be reproduced in whole or in part without permission in wri

Seite 2 - Trademarks and copyright

TANDBERG Gatekeeper User Manual 4  Do not place heavy objects directly on top of the Gatekeeper.  Do not place hot objects directly on top, or di

Seite 3 - Environmental Issues

5 2.5 Gatekeeper Initial Configuration The TANDBERG Gatekeeper requires some configuration before it can be used. This must be done using a PC conne

Seite 4 - Operator Safety Summary

TANDBERG Gatekeeper User Manual 6 xConfiguration Gatekeeper AutoDiscovery command in section 5.2 for more information. 12. Reboot the Gatekeeper by ty

Seite 5 - Table Of Contents

7 3 Using the Gatekeeper The Gatekeeper is used by H.323 terminals, Gateways and MCUs. These devices register with the Gatekeeper and the Gatekeepe

Seite 6

TANDBERG Gatekeeper User Manual 8 NOTE Automatic discovery is a function that allows the Gatekeeper to reply to multicast Gatekeeper discovery message

Seite 7 - 1 Introduction

9 Remote zones can be configured through the web interface of the TANDBERG Gatekeeper by navigating to Gatekeeper Configuration > Gatekeeper. See

Seite 8 - Overview

TANDBERG Gatekeeper User Manual 10 When a Gatekeeper receives a Location Request, if it cannot respond from its own registration database, it will que

Seite 9 - 2.1 Unpacking

11 3.5 Call Control When an end-point wants to call another endpoint it presents the address it wants to call to the Gatekeeper using a protocol kno

Seite 10 - 2.3 Connecting Cables

TANDBERG Gatekeeper User Manual 12 Figure 3 Admission Request Processing

Seite 11

13 Figure 4 Location Request Processing

Seite 12

TANDBERG Gatekeeper User Manual ii Trademarks and copyright Copyright 1993-2005 TANDBERG ASA. All rights reserved. This document contains information

Seite 13 - 3.2 Registration

TANDBERG Gatekeeper User Manual 14 3.6 Bandwidth Control The TANDBERG Gatekeeper allows you to control endpoints’ use of bandwidth on your network. F

Seite 14 - 3.3 Neighbor Gatekeepers

15 xConfiguration Links Link [1..100] Pipe2 Name Each subzone may be configured with its own bandwidth limits. Calls placed between two endpoints in

Seite 15 - 3.4 Alternate Gatekeepers

TANDBERG Gatekeeper User Manual 16 Figure 6 Configuration of a SubZone through the web interface Figure 7 Adding a new Pipe through the web interfac

Seite 16

17 3.6.2 Bandwidth Control Examples One possible configuration for the deployment in Figure 5 is shown in Figure 9. Each of the offices is represent

Seite 17 - 3.5 Call Control

TANDBERG Gatekeeper User Manual 18 In Figure , the endpoints in the enterprise register with the Gatekeeper, whilst those in the branch and home offic

Seite 18

19 Figure 12 Gatekeeper example configuration All of the endpoints in the enterprise will be assigned to the default subzone. The Traversal subzone

Seite 19

TANDBERG Gatekeeper User Manual 20 match an entry on the DenyList. Allow lists and Deny lists are mutually exclusive: only one may be in use at any gi

Seite 20 - 3.6 Bandwidth Control

21 To configure the Gatekeeper to use the local database of credentials during authentication issue the following commands xConfiguration Authenticat

Seite 21

TANDBERG Gatekeeper User Manual 22 xConfiguration LDAP UserDN: "Your user DN" xConfiguration LDAP Password: "password" The status

Seite 22

23 Figure 16 Configuring the Gatekeeper to authenticate with an LDAP server using TLS encryption 3.9 URI Dialing If an alias is not located in the

Seite 23

TANDBERG Gatekeeper User Manual iii Environmental Issues Thank you for buying a product which contributes to a reduction in pollution, and thereby he

Seite 24

TANDBERG Gatekeeper User Manual 24 Figure 17 IP Configuration Screen 3.9.1 URI Dialing and firewall traversal If URI dialing is being used in conjun

Seite 25 - 3.7 Registration Control

25 To configure the Gatekeeper for firewall traversal, use the Web or console interface (see Figure 18 for this configuration screen on the web inter

Seite 26 - 3.8 H.235 Authentication

TANDBERG Gatekeeper User Manual 26 xConfiguration Gatekeeper Policy Mode <On/Off> Policy interacts with authentication (section 3.7.2, Authentic

Seite 27

27 “display” Not defined for any alias types address The address construct is used within an address-switch to specify addresses to match. Please n

Seite 28

TANDBERG Gatekeeper User Manual 28 an E.164 number. proxy On executing a proxy node the Gatekeeper will attempt to forward the call to the locations s

Seite 29 - 3.9 URI Dialing

29 User "fred" will not accept calls from anyone at "annoying.com", or from any unauthenticated users. All other users will allow

Seite 30 - 3.10 Firewall traversal

TANDBERG Gatekeeper User Manual 30 4 Software Upgrade Software upgrade can be done in one of two ways:  Using a web browser (HTTP/HTTPS).  Using

Seite 31 - 3.11 Call Policy

31 4. Enter the release key and press Install Software. You will get a new screen where you can upload the software image: 5. Browse to the file c

Seite 32

TANDBERG Gatekeeper User Manual 32 NOTE Make sure you transfer the release key file before transferring the software image. Also make sure you name th

Seite 33 - 3.11.2 CPL Script Actions

33 5 Configuring the Gatekeeper This chapter lists the basic usage of each command. The commands also support more advanced usage, which is outside

Seite 34 - 3.11.4 CPL Examples

TANDBERG Gatekeeper User Manual iv Operator Safety Summary For your protection, please read these safety instructions completely before operating the

Seite 35 - Call Redirection

TANDBERG Gatekeeper User Manual 34 Command Usage Description ResourceUsage xstatus ResourceUsage Reports usage of system resources. Registrations:

Seite 36 - 4 Software Upgrade

35 xconfiguration ? To list all configuration data, type xconfiguration To show a specific configuration value, type xconfiguration <name> To

Seite 37 - 4.2 Upgrading Using SCP

TANDBERG Gatekeeper User Manual 36 Configuration commands Description xConfiguration Gatekeeper AlternateGK [1..5]: <IPAddr> List of Alternate

Seite 38

37 Configuration commands Description xConfiguration HTTPS Mode: <On/Off> Enables/disables HTTPS support. Note that HTTP must also be enabled.

Seite 39 - 5.1 Status

TANDBERG Gatekeeper User Manual 38 Configuration commands Description xConfiguration Pipes Pipe [1..100] Bandwidth Total Limit: <1..100000000>

Seite 40 - 5.2 Configuration

39 Configuration commands Description xConfiguration SubZones TraversalSubZone Bandwidth Total Mode: <None/Limited/Unlimited> Whether or not t

Seite 41

TANDBERG Gatekeeper User Manual 40 Configuration commands Description xConfiguration Zones Zone [1..100] Gatekeeper IP Port: <1..65534> Specifi

Seite 42

41 Command Usage Description DenyListAdd xCommand DenyListAdd <denied_alias> Add an entry to the deny list, used by the registration restrict

Seite 43

TANDBERG Gatekeeper User Manual 42 Command Usage Description SubZoneDelete xCommand SubZoneDelete: <index> Deletes the indexed subzone. ZoneAd

Seite 44

43 xfeedback list To register a feedback expression, type xfeedback register <expression> To deregister the feedback expression with index <

Seite 45

v Table Of Contents TANDBERG Gatekeeper User Manual ...i Trademar

Seite 46 - 5.3 Command

TANDBERG Gatekeeper User Manual 44 Command Usage Description relkey Relkey Displays the release key that this software has been installed with. syslo

Seite 47 - Command Usage Description

45 6 Appendix: Configuring DNS Servers In the examples below, we set up an SRV record to handle H.323 URIs of the form [email protected]. These are ha

Seite 48 - 5.5 Feedback

TANDBERG Gatekeeper User Manual 46 then instruct named to reload the files kill –s SIGHUP pid 4. Check the log files for any discrepancies tail /var/

Seite 49 - 5.6 Other commands

47 7 Appendix: Configuring LDAP Servers 7.1 Microsoft Active Directory 7.1.1 Prerequisites These comprehensive step by step instructions assume tha

Seite 50 - Usage Description

TANDBERG Gatekeeper User Manual 48 commUniqueId: comm1 h323Identityh323-ID: MeetingRoom1 h323IdentitydialedDigits: 626262 h235IdentityEndpointID: meet

Seite 51 - 6.2 BIND 8 & 9

49  H.350.2 – Directory services architecture for H.235 - An LDAP schema to represent H.235 elements. The schemas can be downloaded in ldif format

Seite 52

TANDBERG Gatekeeper User Manual 50 commUniqueId: comm1 h323Identityh323-ID: MeetingRoom1 h323IdentitydialedDigits: 626262 h235IdentityEndpointID: meet

Seite 53 - 7 Appendix: Configuring LDAP

51 8 Approvals The product has been approved by various international approval agencies, among others: UL and Nemko. According to their Follow-Up In

Seite 54 - 7.2 OpenLDAP

TANDBERG Gatekeeper User Manual 52 9 Technical Specifications System Capacity 100-1000 registered endpoints 25-200 concurrent calls 0-100 traversal

Seite 55 - 7.2.3 Adding H.350 objects

53 10 Index AllowList, 19, 36, 40 Alternate, 9, 24, 36 Authentication LDAP, 35 local database, 35 Bandwidth Control, 37 CPL, 25, 36 examples, 28 uns

Seite 56 - 7.2.4 Securing with TLS

TANDBERG Gatekeeper User Manual vi 4.1 Upgrading Using HTTP(S) ...

Seite 57 - 8 Approvals

1 1 Introduction This User Manual is provided to help you make the best use of your TANDBERG Gatekeeper. A Gatekeeper is a central part of an H.323

Seite 58 - 9 Technical Specifications

TANDBERG Gatekeeper User Manual 2 1.1 TANDBERG Gatekeeper Overview On the front of the Gatekeeper there are three LAN interfaces, a serial port (Da

Seite 59 - 10 Index

3 2 Installation Precautions:  Never install communication equipment during a lightning storm.  Never install jacks for communication cables in

Kommentare zu diesen Handbüchern

Keine Kommentare