TANDBERG Gatekeeper Network Card User Manual


 
TANDBERG Gatekeeper User Guide
Page 3 of 105
4.7. Alternates.............................................................................................................................. 23
4.8. Call Processing Overview....................................................................................................... 24
5. Transforming Destination Aliases 26
5.1. Alias Transforms ................................................................................................................... 26
5.2. Zone Transforms................................................................................................................... 27
6. Unregistered Endpoints 28
6.1. Calling from an Unregistered Endpoint.................................................................................. 28
6.2. Calling to an Unregistered Endpoint...................................................................................... 28
7. Bandwidth Control 30
7.1. About Bandwidth Control ...................................................................................................... 30
7.2. Subzones .............................................................................................................................. 30
7.2.1. Subzone links...................................................................................................................................31
7.2.2. Pipes.................................................................................................................................................31
7.3. Insufficient Bandwidth .......................................................................................................... 32
7.3.1. Insufficient bandwidth.....................................................................................................................32
7.4. Bandwidth Control and Firewall Traversal............................................................................. 33
7.5. Bandwidth Control Examples ................................................................................................ 34
7.5.1. Example without a firewall..............................................................................................................34
7.5.2. Example with a firewall ...................................................................................................................34
8. Registration Control 36
8.1. Setting Registration Restriction Policy................................................................................... 36
8.1.1. Viewing the Allow and Deny lists.....................................................................................................36
8.1.2. Activating use of Allow or Deny lists...............................................................................................36
8.1.3. Managing entries in the Allow and Deny lists................................................................................37
8.2. Authentication....................................................................................................................... 38
8.2.1. Authentication using a local database...........................................................................................38
8.2.2. Authentication using an LDAP server.............................................................................................38
8.2.3. Enforced dial plans..........................................................................................................................39
8.2.4. Securing the LDAP connection with TLS........................................................................................40
9. URI Dialing 41
9.1. About URI Dialing .................................................................................................................. 41
9.2. Making a Call Using URI Dialing ............................................................................................ 41
9.2.1. Enabling URI dialing........................................................................................................................41
9.2.2. Configuring DNS server(s)...............................................................................................................41
9.2.3. Configuring the domain name........................................................................................................41
9.2.4. URI dialing and firewall traversal....................................................................................................41
9.3. Receiving a Call Using URI Dialing......................................................................................... 42
9.4. DNS Records......................................................................................................................... 43
10. ENUM Dialing 44
10.1. About ENUM Dialing.............................................................................................................. 44
10.2. Configuring ENUM................................................................................................................. 44
10.2.1. Enabling ENUM support..................................................................................................................44
10.2.2. Managing ENUM DNS zones...........................................................................................................44
10.3. Configuring DNS NAPTR Records .......................................................................................... 46
11. Example Traversal Deployments 47
11.1. Simple Enterprise Deployment.............................................................................................. 47
11.1.1. Enabling outgoing URI calls ............................................................................................................47
11.1.2. Enabling incoming URI calls............................................................................................................48