TANDBERG Gatekeeper User Guide
Page 4 of 105
11.2. Enterprise Gatekeepers ........................................................................................................ 48
11.3. Dialing Public IP Addresses................................................................................................... 49
11.4. Neighbored Enterprises......................................................................................................... 49
11.5. URI Dialing from within the Enterprise .................................................................................. 50
12. Third Party Call Control 51
12.1. About Third Party Call Control................................................................................................ 51
12.2. Placing a Call......................................................................................................................... 51
12.3. Transferring a Call................................................................................................................. 51
12.3.1. Enabling call routed mode..............................................................................................................51
12.3.2. Enabling call transfer......................................................................................................................52
12.4. Disconnecting a Call.............................................................................................................. 52
13. Call Policy 53
13.1. About Call Policy.................................................................................................................... 53
13.1.1. Uploading the CPL script.................................................................................................................53
13.1.2. Enabling use of the CPL script........................................................................................................53
13.1.3. Call Policy and Authentication ........................................................................................................53
13.1.4. CPL Standard...................................................................................................................................53
13.2. Making Decisions Based on Addresses................................................................................. 54
13.2.1. address-switch.................................................................................................................................54
13.3. CPL Script Actions ................................................................................................................. 55
13.3.1. location ............................................................................................................................................55
13.3.2. proxy.................................................................................................................................................56
13.3.3. reject................................................................................................................................................56
13.4. Unsupported CPL Elements................................................................................................... 56
13.5. CPL Examples ....................................................................................................................... 56
13.5.1. Call screening of authenticated users............................................................................................56
13.5.2. Call screening based on domain ....................................................................................................57
13.5.3. Call redirection.................................................................................................................................57
13.5.4. Call screening based on alias.........................................................................................................57
14. Logging 58
14.1. About Logging ....................................................................................................................... 58
14.2. Viewing the event log ............................................................................................................ 58
14.3. Controlling what is Logged .................................................................................................... 58
14.3.1. About Event levels...........................................................................................................................58
14.3.2. Setting the log level.........................................................................................................................58
14.4. Event Log Format.................................................................................................................. 59
14.5. Logged Events....................................................................................................................... 60
14.6. Remote Logging .................................................................................................................... 64
14.6.1. Enabling remote logging .................................................................................................................64
15. Software Upgrading 65
15.1. About Software Upgrading..................................................................................................... 65
15.2. Upgrading Using HTTP(S)....................................................................................................... 65
15.3. Upgrading Using SCP/PSCP .................................................................................................. 66
16. Command Reference 68
16.1. Status.................................................................................................................................... 68
16.1.1. Listing all status information ..........................................................................................................68
16.1.2. Listing all status commands...........................................................................................................68
16.1.3. Calls..................................................................................................................................................68
16.1.4. Ethernet...........................................................................................................................................68
16.1.5. ExternalManager.............................................................................................................................69
16.1.6. Feedback .........................................................................................................................................69