beautypg.com

TANDBERG Gatekeeper User Manual

Page 4

background image

TANDBERG Gatekeeper User Guide

Page 4 of 105

11.2.

Enterprise Gatekeepers ........................................................................................................ 48

11.3.

Dialing Public IP Addresses................................................................................................... 49

11.4.

Neighbored Enterprises......................................................................................................... 49

11.5.

URI Dialing from within the Enterprise .................................................................................. 50

12.

Third Party Call Control

51

12.1.

About Third Party Call Control................................................................................................ 51

12.2.

Placing a Call......................................................................................................................... 51

12.3.

Transferring a Call................................................................................................................. 51

12.3.1.

Enabling call routed mode ..............................................................................................................51

12.3.2.

Enabling call transfer ......................................................................................................................52

12.4.

Disconnecting a Call.............................................................................................................. 52

13.

Call Policy

53

13.1.

About Call Policy.................................................................................................................... 53

13.1.1.

Uploading the CPL script.................................................................................................................53

13.1.2.

Enabling use of the CPL script........................................................................................................53

13.1.3.

Call Policy and Authentication ........................................................................................................53

13.1.4.

CPL Standard...................................................................................................................................53

13.2.

Making Decisions Based on Addresses................................................................................. 54

13.2.1.

address-switch.................................................................................................................................54

13.3.

CPL Script Actions ................................................................................................................. 55

13.3.1.

location ............................................................................................................................................55

13.3.2.

proxy.................................................................................................................................................56

13.3.3.

reject ................................................................................................................................................56

13.4.

Unsupported CPL Elements................................................................................................... 56

13.5.

CPL Examples ....................................................................................................................... 56

13.5.1.

Call screening of authenticated users............................................................................................56

13.5.2.

Call screening based on domain ....................................................................................................57

13.5.3.

Call redirection.................................................................................................................................57

13.5.4.

Call screening based on alias .........................................................................................................57

14.

Logging

58

14.1.

About Logging ....................................................................................................................... 58

14.2.

Viewing the event log ............................................................................................................ 58

14.3.

Controlling what is Logged .................................................................................................... 58

14.3.1.

About Event levels ...........................................................................................................................58

14.3.2.

Setting the log level.........................................................................................................................58

14.4.

Event Log Format.................................................................................................................. 59

14.5.

Logged Events....................................................................................................................... 60

14.6.

Remote Logging .................................................................................................................... 64

14.6.1.

Enabling remote logging .................................................................................................................64

15.

Software Upgrading

65

15.1.

About Software Upgrading..................................................................................................... 65

15.2.

Upgrading Using HTTP(S)....................................................................................................... 65

15.3.

Upgrading Using SCP/PSCP .................................................................................................. 66

16.

Command Reference

68

16.1.

Status.................................................................................................................................... 68

16.1.1.

Listing all status information ..........................................................................................................68

16.1.2.

Listing all status commands ...........................................................................................................68

16.1.3.

Calls..................................................................................................................................................68

16.1.4.

Ethernet ...........................................................................................................................................68

16.1.5.

ExternalManager.............................................................................................................................69

16.1.6.

Feedback .........................................................................................................................................69