TANDBERG Security Camera Security Camera User Manual


 
4
D14049.03
MAY 2008
Grey Headline (continued)
SIP ....................................................................................... 62
SIP Overview .................................................................. 62
About SIP on the VCS ................................................ 62
Using the VCS as a SIP Registrar ............................... 62
Proxying Registration Requests ........................... 62
SIP Registration Expiry .............................................. 62
Using the VCS as a SIP Proxy Server .......................... 63
SIP protocols and ports ............................................. 63
Conguring SIP - Registrations, Protocols and Ports ......... 64
Conguring SIP - Domains ............................................... 65
Interworking ......................................................................... 66
Overview ........................................................................ 66
About Interworking .................................................... 66
Conguring Interworking .................................................. 66
Registration Control .............................................................. 67
Registration Overview ..................................................... 67
Endpoint Registration ................................................ 67
Registrations on a VCS Expressway ........................... 67
MCU, Gateway and Content Server Registration ......... 67
Finding a VCS with which to Register .......................... 68
SIP ..................................................................... 68
H.323................................................................. 68
Preventing automatic registrations ....................... 68
Authentication ................................................................ 69
About Authentication for Local Registrations .............. 69
Conguring Authentication for Local Registrations ...... 69
About External Registration Credentials ..................... 70
Conguring External Registration Credentials ............. 70
Authentication Databases ................................................71
Alias Origin Setting ....................................................71
LDAP ...................................................................71
Combined ............................................................71
Endpoint ..............................................................71
Traversal Server Zone ..................................................... 81
ENUM Zone .................................................................... 82
DNS Zone ....................................................................... 82
Default Zone................................................................... 82
Adding Zones .................................................................. 83
Conguring Zones ........................................................... 83
Conguring Zones - All Types ........................................... 84
Conguring Neighbor Zones ............................................. 85
Conguring Traversal Client Zones ................................... 86
Conguring Traversal Server Zones .................................. 87
Conguring ENUM Zones ................................................. 88
Conguring DNS Zones ................................................... 88
Alternates ............................................................................ 89
About Alternates ............................................................. 89
Conguring Alternates ..................................................... 89
Dial Plans ............................................................................. 90
About Dial Plans ............................................................. 90
Flat Dial Plan .................................................................. 90
Structured Dial Plan ........................................................ 90
Hierarchical Dial Plan ...................................................... 90
Call Processing
Introduction .......................................................................... 92
Call Processing Diagram ................................................. 92
Search Process ........................................................ 92
Dialing by Address Types ....................................................... 93
About the Different Address Types ................................... 93
Dialing by IP Address ...................................................... 93
Endpoints registered to a VCS Expressway ........... 93
Dialing by H.323 ID or E.164 alias ................................... 93
Dialing by H.323 or SIP URI ............................................. 93
Dialing by ENUM ............................................................. 93
Authentication using an LDAP Server .........................71
Conguring the LDAP Server Directory ...................71
Securing the LDAP Connection with TLS ...............71
Conguring LDAP Server settings ......................... 72
Authentication using a Local Database ..................... 73
Conguring the Local Database ........................... 73
Registering Aliases ..........................................................74
About Alias Registration .............................................74
H.323 Alias Registration ......................................74
SIP Alias Registration ...........................................74
Attempts to Register using an Existing Alias ................74
H.323..................................................................74
SIP ......................................................................74
Allow and Deny Lists ....................................................... 75
About Allow and Deny Lists ....................................... 75
Patterns and Pattern Types ................................. 75
Activating use of Allow or Deny Lists .......................... 75
Managing Entries in the Allow List ............................. 76
Managing Entries in the Deny List .............................. 77
Zones and Neighbors
Introduction .......................................................................... 79
About your Video Communications Network ..................... 79
Example Network Diagram ........................................ 79
Local Zone and Subzones ..................................................... 80
Overview ........................................................................ 80
Conguring the Local Zone and its Subzones ................... 80
Traversal Subzone........................................................... 80
What are traversal calls? ........................................... 80
Conguring the Traversal Subzone Ports .................... 80
Zones .................................................................................. 81
About Zones ................................................................... 81
Neighbor Zone ................................................................ 81
Traversal Client Zone ...................................................... 81
TANDBERG VIDEO COMMUNICATIONS SERVER
ADMINISTRATOR GUIDE
Introduction Getting Started
Overview and
Status
System
Conguration
VCS
Conguration
Zones and
Neighbors
Call
Processing
Bandwidth
Control
Firewall
Traversal
Maintenance Appendices
What’s in this Manual?