TANDBERG Gatekeeper User Manual
Contents
1 Introduction 1
1.1 TANDBERG Gatekeeper Overview . . . . . . . . . . . . . . . . . . . . . . . . . . 2
2 Installation 3
2.1 Precautions....................................... 3
2.2 Unpacking........................................ 3
2.3 Mounting ........................................ 4
2.4 ConnectingCables................................... 4
2.5 SwitchingontheSystem................................ 4
2.6 Gatekeeper Initial Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
3 Getting started 7
3.1 SystemAdministration................................. 7
3.2 Backups......................................... 8
3.3 IPConfiguration .................................... 8
3.4 Registration....................................... 8
3.5 NeighborGatekeepers................................. 9
3.6 AlternateGatekeepers................................. 11
3.7 Callsignaling...................................... 12
4 Unregistered Endpoints 15
4.1 Calling from an unregistered endpoint . . . . . . . . . . . . . . . . . . . . . . . . 15
4.2 Calling to an unregistered endpoint . . . . . . . . . . . . . . . . . . . . . . . . . . 15
5 Bandwidth Control 17
5.1 Bandwidth Control and Firewall Traversal . . . . . . . . . . . . . . . . . . . . . . 21
5.2 Bandwidth Control Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
6 Registration Control 24
6.1 Registration Restriction Policy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
6.2 Authentication...................................... 25
7 URI Dialing 28
7.1 Making a call using URI dialing . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
7.2 Receiving a call using URI dialing . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
7.3 DNSRecords...................................... 29
8 ENUM dialing 31
8.1 ConfiguringENUM................................... 31
8.2 Configuring DNS NAPTR Records . . . . . . . . . . . . . . . . . . . . . . . . . . 31
9 Example Traversal deployments 33
9.1 Simple Enterprise deployment . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33
9.2 EnterpriseGatekeepers ................................ 34
9.3 Dialing Public IP addresses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
9.4 Neighboredenterprises ................................ 35
9.5 URI dialing from within the enterprise . . . . . . . . . . . . . . . . . . . . . . . . 35
viii