TANDBERG D14049.04 Network Card User Manual


 
9
D14049.04
JULY 2008
Grey Headline (continued)
Password Encryption ...........................................................192
Overview ...................................................................... 192
Web Interface ......................................................... 192
Command Line Interface ......................................... 192
Maximum length of Passwords ...................................... 192
Appendices
CPL Reference .................................................................... 194
Overview of CPL on the VCS .......................................... 194
address-switch ............................................................. 194
Overview ................................................................194
address ................................................................. 194
eld........................................................................ 195
subeld .................................................................. 196
otherwise ..................................................................... 196
not-present ................................................................... 196
location ........................................................................ 197
rule-switch .................................................................... 197
proxy ........................................................................... 197
reject .......................................................................... 197
Unsupported CPL Elements ........................................... 197
CPL Examples............................................................... 198
Call Screening of Authenticated Users ..................... 198
Call Screening Based on Alias ................................. 198
Call Screening Based on Domain ............................. 199
Change of Domain Name ......................................... 199
Allow Calls from Locally Registered Endpoints Only ... 200
Block Calls from Default Zone and Default Subzone . 200
Restricting Access to a Local Gateway ..................... 201
Using the address-switch node .......................... 201
Using the rule-switch node ................................ 201
Regular Expression Reference ............................................. 202
Overview ...................................................................... 202
Common Regular Expressions ....................................... 202
Pattern Variable Reference .................................................. 203
Overview ...................................................................... 203
Valid Variable Strings .................................................... 203
VCS Port Reference ............................................................ 204
Overview ......................................................................204
VCS Ports .....................................................................204
DNS Conguration .............................................................. 207
Overview ...................................................................... 207
Verifying the SRV Record ......................................... 207
Microsoft DNS Server ................................................... 207
BIND 8 & 9 .................................................................. 207
LDAP Conguration ............................................................. 208
About the LDAP Databases ........................................... 208
Downloading the LDAP schemas ....................................208
Microsoft Active Directory ............................................ 208
Prerequisites ......................................................... 208
Installing the H.350 Schemas ................................. 208
Adding H.350 Objects ............................................209
Create the Organizational Hierarchy .................. 209
Add the H.350 Objects .....................................209
Securing with TLS .................................................. 209
OpenLDAP .................................................................... 210
Prerequisites ......................................................... 210
Installing the H.350 Schemas ................................ 210
Adding H.350 Objects ............................................ 211
Create the Organizational Hierarchy .................. 211
Add the H.350 Objects .....................................211
Securing with TLS .................................................. 211
Command Reference - xConguration .................................. 212
Command Reference - xCommand ....................................... 242
Command Reference - xStatus ............................................ 254
Bibliography ........................................................................270
Glossary..............................................................................271
Contact Information .............................................................276
TANDBERG VIDEO COMMUNICATIONS SERVER
ADMINISTRATOR GUIDE
Introduction Getting Started
Overview and
Status
System
Conguration
VCS
Conguration
Zones and
Neighbors
Call
Processing
Bandwidth
Control
Firewall
Traversal
Appendices
Applications Maintenance
What’s in this Manual?