beautypg.com

What’s in this manual – TANDBERG D14049.04 User Manual

Page 9

background image

9

D14049.04
JULY 2008

Grey Headline (continued)

Password Encryption ........................................................... 192

Overview ...................................................................... 192

Web Interface ......................................................... 192
Command Line Interface ......................................... 192

Maximum length of Passwords ...................................... 192

Appendices

CPL Reference .................................................................... 194

Overview of CPL on the VCS .......................................... 194
address-switch ............................................................. 194

Overview ................................................................ 194
address ................................................................. 194
field........................................................................ 195
subfield .................................................................. 196

otherwise ..................................................................... 196
not-present ................................................................... 196
location ........................................................................ 197
rule-switch .................................................................... 197
proxy ........................................................................... 197
reject .......................................................................... 197
Unsupported CPL Elements ........................................... 197
CPL Examples............................................................... 198

Call Screening of Authenticated Users ..................... 198
Call Screening Based on Alias ................................. 198
Call Screening Based on Domain ............................. 199
Change of Domain Name ......................................... 199
Allow Calls from Locally Registered Endpoints Only ... 200
Block Calls from Default Zone and Default Subzone . 200
Restricting Access to a Local Gateway ..................... 201

Using the address-switch node .......................... 201
Using the rule-switch node ................................ 201

Regular Expression Reference ............................................. 202

Overview ...................................................................... 202
Common Regular Expressions ....................................... 202

Pattern Variable Reference .................................................. 203

Overview ...................................................................... 203
Valid Variable Strings .................................................... 203

VCS Port Reference ............................................................ 204

Overview ...................................................................... 204
VCS Ports ..................................................................... 204

DNS Configuration .............................................................. 207

Overview ...................................................................... 207

Verifying the SRV Record ......................................... 207

Microsoft DNS Server ................................................... 207
BIND 8 & 9 .................................................................. 207

LDAP Configuration ............................................................. 208

About the LDAP Databases ........................................... 208
Downloading the LDAP schemas .................................... 208
Microsoft Active Directory ............................................ 208

Prerequisites ......................................................... 208
Installing the H.350 Schemas ................................. 208
Adding H.350 Objects ............................................ 209

Create the Organizational Hierarchy .................. 209
Add the H.350 Objects ..................................... 209

Securing with TLS .................................................. 209

OpenLDAP .................................................................... 210

Prerequisites ......................................................... 210
Installing the H.350 Schemas ................................ 210
Adding H.350 Objects ............................................ 211

Create the Organizational Hierarchy .................. 211
Add the H.350 Objects ..................................... 211

Securing with TLS .................................................. 211

Command Reference - xConfiguration .................................. 212
Command Reference - xCommand ....................................... 242
Command Reference - xStatus ............................................ 254
Bibliography ........................................................................270
Glossary..............................................................................271
Contact Information .............................................................276

TANDBERG

VIDEO COMMUNICATIONS SERVER

ADMINISTRATOR GUIDE

Introduction

Getting Started

Overview and

Status

System

Configuration

VCS

Configuration

Zones and

Neighbors

Call

Processing

Bandwidth

Control

Firewall

Traversal

Appendices

Applications

Maintenance

What’s in this Manual?