TANDBERG Security Camera Security Camera User Manual


 
7
D14049.03
MAY 2008
Grey Headline (continued)
H.460.18/19 Ports ....................................................... 149
Call signaling .......................................................... 149
Media ..................................................................... 149
STUN Ports ................................................................... 149
Ports for Connections out to the Public Internet ............. 149
Firewall Traversal and Authentication ................................... 150
Overview ...................................................................... 150
Authentication and NTP ................................................. 150
Other Issues ...................................................................... 151
Firewall Traversal and Dual Network Interfaces............... 151
Firewall Conguration .................................................... 151
Conguring the VCS as a Traversal Client ............................. 152
Overview ...................................................................... 152
Adding a New Traversal Client Zone ............................... 152
Conguring a Traversal Client Zone ................................ 153
Conguring the VCS as a Traversal Server ............................ 154
Overview ...................................................................... 154
Adding a New Traversal Server Zone .............................. 154
Conguring a Traversal Server Zone ............................... 155
Conguring Traversal for Endpoints ................................ 156
Overview ................................................................ 156
Conguring Traversal Server Ports ................................. 157
Overview ................................................................ 157
STUN Services .............................................................. 158
About STUN ............................................................ 158
About ICE ............................................................... 158
STUN Binding Discovery .......................................... 158
How it works ..................................................... 158
STUN Relay............................................................. 158
How it works ..................................................... 158
Conguring STUN Services ...................................... 159
Restoring Default Conguration ............................................170
Overview .......................................................................170
DefaultValuesSet Level 3 ...............................................170
Appendices
CPL Reference .....................................................................172
Overview of CPL on the VCS ...........................................172
address-switch ..............................................................172
Overview .................................................................172
address ..................................................................172
eld.........................................................................173
subeld ...................................................................174
otherwise ......................................................................174
not-present ....................................................................174
location .........................................................................175
rule-switch .....................................................................175
proxy ............................................................................175
reject ...........................................................................175
Unsupported CPL Elements ............................................175
CPL Examples................................................................176
Call Screening of Authenticated Users ......................176
Call Screening Based on Alias ..................................176
Call Screening Based on Domain ..............................177
Change of Domain Name ..........................................177
Allow Calls from Locally Registered Endpoints Only ....178
Block Calls from Default Zone and Default Subzone ..178
Restricting Access to a Local Gateway ......................179
Using the address-switch node ...........................179
Using the rule-switch node .................................179
Regular Expression Reference ............................................. 180
Overview ...................................................................... 180
Common Regular Expressions ....................................... 180
Maintenance
Upgrading Software ............................................................ 161
Overview ...................................................................... 161
Prerequisites .......................................................... 161
Installing and Restarting ......................................... 161
Backing up Existing Conguration Before Upgrading . 161
Upgrading and Option Keys ..................................... 161
Upgrading Using SCP/PSCP ........................................... 161
Upgrading via the Web Interface .................................... 162
Option Keys ........................................................................ 163
Overview ...................................................................... 163
Adding Options via the CLI............................................. 163
Adding Options via the Web Interface ............................ 164
Security ............................................................................. 165
Overview ...................................................................... 165
For extra security, you may wish to have the VCS
communicate with other systems (e.g. servers such as
LDAP servers or clients such as SIP endpoints) using
TLS encryption. ....................................................... 165
Enabling Security .......................................................... 165
Passwords ......................................................................... 166
Overview ...................................................................... 166
Conguring Administrator Password ............................... 166
System Snapshot ............................................................... 167
Overview ...................................................................... 167
Creating a System Snapshot ......................................... 167
Error Reports ................................................................ 167
Restarting .......................................................................... 168
Overview ...................................................................... 168
Restarting the VCS ....................................................... 168
Shutting Down .................................................................... 169
Overview ...................................................................... 169
Shutting Down .............................................................. 169
TANDBERG VIDEO COMMUNICATIONS SERVER
ADMINISTRATOR GUIDE
Introduction Getting Started
Overview and
Status
System
Conguration
VCS
Conguration
Zones and
Neighbors
Call
Processing
Bandwidth
Control
Firewall
Traversal
Maintenance Appendices
What’s in this Manual?