5
Introduction Getting
Started
System
Overview
System
Configuration
H.323 & SIP
Configuration
Registration
Control
Zones and
Neighbors
Call
Processing
Firewall
Traversal
Bandwidth
Control Maintenance Appendices
Introduction
ENUM Dialing 87
ENUM Dialing Overview.......................................................... 87
About ENUM Dialing ............................................................ 87
ENUM Process.................................................................... 87
Enabling ENUM Dialing ........................................................ 87
Outgoing Calls ............................................................... 87
Incoming Calls ............................................................... 87
ENUM Dialing for Outgoing Calls ............................................ 88
Prerequisites ...................................................................... 88
Process.............................................................................. 88
Example ............................................................................. 88
Configuring Matches for ENUM Zones .................................. 89
Example ........................................................................ 89
Configuring Transforms for ENUM Zones .............................. 89
Example ........................................................................ 89
Configuring ENUM Zones..................................................... 90
Configuring DNS Servers ..................................................... 91
ENUM Dialing for Incoming Calls ............................................ 92
Prerequisites ...................................................................... 92
About DNS Domains for ENUM ............................................ 92
Configuring DNS NAPTR Records ........................................ 92
Example ........................................................................ 92
Calls to and from Unregistered Endpoints 93
About Unregistered Endpoints................................................ 93
Calls to an Unregistered Endpoint .......................................... 93
Overview ............................................................................ 93
Configuration...................................................................... 93
Calls from an Unregistered Endpoint ...................................... 93
Recommended Configuration for Firewall Traversal .............. 93
Fallback Alias 94
Fallback Alias........................................................................ 94
Overview ............................................................................ 94
Configuration...................................................................... 94
Example Use of a Fallback Alias .......................................... 94
Disconnecting calls 95
Overview............................................................................... 95
About the Call Control API ................................................... 95
Identifying a Particular Call .................................................... 95
Call ID Number ................................................................... 95
Call Serial Number .............................................................. 95
Obtaining the Call ID/Serial Number .................................... 95
Disconnecting a Call via the Web Interface ............................. 96
Disconnecting a Call via the CLI ............................................. 96
Issues when Disconnecting SIP Calls ..................................... 96
Firewall Traversal 97
Firewall Traversal Overview .................................................... 97
About Firewall Traversal ...................................................... 97
VCS and Firewall Traversal ..................................................... 97
VCS as a Firewall Traversal Client ........................................ 97
VCS as a Firewall Traversal Server ....................................... 97
Firewall Traversal Protocols and Ports .................................... 98
Overview ............................................................................ 98
Process.............................................................................. 98
Ports for Initial Connections from Traversal Clients............... 98
H.323 Firewall Traversal Protocols ....................................... 98
Assent Ports....................................................................... 98
H.460.18/19 Ports ............................................................. 98
SIP Ports ............................................................................ 98
Ports for Connections out to the Public Internet ................... 99
STUN Ports......................................................................... 99
Firewall Configuration ............................................................ 99
Firewall Traversal and Authentication.................................... 100
Overview .......................................................................... 100
Client Type and Client Settings ............................................ 100
Server Type and Server Settings .......................................... 100
Configuring the VCS as a Traversal Client ............................. 101
Overview .......................................................................... 101
Adding a New Traversal Client Zone ................................... 101
Configuring a Traversal Client Zone .................................... 102
Configuring the VCS as a Traversal Server ............................ 103
Overview .......................................................................... 103
Adding a New Traversal Server Zone .................................. 103
Configuring a Traversal Server Zone................................... 104
Configuring Traversal for Endpoints.................................... 105
Configuring Traversal Server Ports ..................................... 106
STUN Services .................................................................... 107
About STUN ...................................................................... 107
About ICE ......................................................................... 107
STUN Binding Discovery .................................................... 107
STUN Relay....................................................................... 107
Configuring STUN Services ................................................ 108
Bandwidth Control 109
Overview............................................................................. 109
About Bandwidth Control................................................... 109
Example Network Deployment ........................................... 109
Subzones............................................................................ 110
About Subzones................................................................ 110
About the Default Subzone ................................................ 110
Specifying the IP Address Range of a Subzone ................... 110
About the Traversal Subzone ............................................. 110
Default Settings................................................................ 110
Traversal Calls .................................................................. 110
Bandwidth Consumption of Traversal Calls ......................... 110
Creating a Subzone ............................................................. 111
Configuring a Subzone......................................................... 112
Applying Bandwidth Limitations to Subzones ........................ 113
Types of Limitations .......................................................... 113
How Different Bandwidth Limitations are Managed............. 113
About Pipes ........................................................................ 114
Creating Pipes..................................................................... 114
Editing Pipes....................................................................... 115
About Links......................................................................... 116
Default Links ............................................................... 116
Creating Links ..................................................................... 116
Editing Links ....................................................................... 117
TANDBERG VIDEO COMMUNICATION SERVER
ADMINISTRATOR GUIDE
D 14049.01
07.2007
Table of Contents