7
D14049.03
MAY 2008
Grey Headline (continued)
H.460.18/19 Ports ....................................................... 149
Call signaling .......................................................... 149
Media ..................................................................... 149
STUN Ports ................................................................... 149
Ports for Connections out to the Public Internet ............. 149
Firewall Traversal and Authentication ................................... 150
Overview ...................................................................... 150
Authentication and NTP ................................................. 150
Other Issues ...................................................................... 151
Firewall Traversal and Dual Network Interfaces............... 151
Firewall Conguration .................................................... 151
Conguring the VCS as a Traversal Client ............................. 152
Overview ...................................................................... 152
Adding a New Traversal Client Zone ............................... 152
Conguring a Traversal Client Zone ................................ 153
Conguring the VCS as a Traversal Server ............................ 154
Overview ...................................................................... 154
Adding a New Traversal Server Zone .............................. 154
Conguring a Traversal Server Zone ............................... 155
Conguring Traversal for Endpoints ................................ 156
Overview ................................................................ 156
Conguring Traversal Server Ports ................................. 157
Overview ................................................................ 157
STUN Services .............................................................. 158
About STUN ............................................................ 158
About ICE ............................................................... 158
STUN Binding Discovery .......................................... 158
How it works ..................................................... 158
STUN Relay............................................................. 158
How it works ..................................................... 158
Conguring STUN Services ...................................... 159
Restoring Default Conguration ............................................170
Overview .......................................................................170
DefaultValuesSet Level 3 ...............................................170
Appendices
CPL Reference .....................................................................172
Overview of CPL on the VCS ...........................................172
address-switch ..............................................................172
Overview .................................................................172
address ..................................................................172
eld.........................................................................173
subeld ...................................................................174
otherwise ......................................................................174
not-present ....................................................................174
location .........................................................................175
rule-switch .....................................................................175
proxy ............................................................................175
reject ...........................................................................175
Unsupported CPL Elements ............................................175
CPL Examples................................................................176
Call Screening of Authenticated Users ......................176
Call Screening Based on Alias ..................................176
Call Screening Based on Domain ..............................177
Change of Domain Name ..........................................177
Allow Calls from Locally Registered Endpoints Only ....178
Block Calls from Default Zone and Default Subzone ..178
Restricting Access to a Local Gateway ......................179
Using the address-switch node ...........................179
Using the rule-switch node .................................179
Regular Expression Reference ............................................. 180
Overview ...................................................................... 180
Common Regular Expressions ....................................... 180
Maintenance
Upgrading Software ............................................................ 161
Overview ...................................................................... 161
Prerequisites .......................................................... 161
Installing and Restarting ......................................... 161
Backing up Existing Conguration Before Upgrading . 161
Upgrading and Option Keys ..................................... 161
Upgrading Using SCP/PSCP ........................................... 161
Upgrading via the Web Interface .................................... 162
Option Keys ........................................................................ 163
Overview ...................................................................... 163
Adding Options via the CLI............................................. 163
Adding Options via the Web Interface ............................ 164
Security ............................................................................. 165
Overview ...................................................................... 165
For extra security, you may wish to have the VCS
communicate with other systems (e.g. servers such as
LDAP servers or clients such as SIP endpoints) using
TLS encryption. ....................................................... 165
Enabling Security .......................................................... 165
Passwords ......................................................................... 166
Overview ...................................................................... 166
Conguring Administrator Password ............................... 166
System Snapshot ............................................................... 167
Overview ...................................................................... 167
Creating a System Snapshot ......................................... 167
Error Reports ................................................................ 167
Restarting .......................................................................... 168
Overview ...................................................................... 168
Restarting the VCS ....................................................... 168
Shutting Down .................................................................... 169
Overview ...................................................................... 169
Shutting Down .............................................................. 169
TANDBERG VIDEO COMMUNICATIONS SERVER
ADMINISTRATOR GUIDE
Introduction Getting Started
Overview and
Status
System
Conguration
VCS
Conguration
Zones and
Neighbors
Call
Processing
Bandwidth
Control
Firewall
Traversal
Maintenance Appendices
What’s in this Manual?