beautypg.com

What’s in this manual – TANDBERG Security Camera User Manual

Page 7

background image

7

D14049.03
MAY 2008

Grey Headline (continued)

H.460.18/19 Ports ....................................................... 149

Call signaling .......................................................... 149
Media ..................................................................... 149

STUN Ports ................................................................... 149
Ports for Connections out to the Public Internet ............. 149

Firewall Traversal and Authentication ................................... 150

Overview ...................................................................... 150
Authentication and NTP ................................................. 150

Other Issues ...................................................................... 151

Firewall Traversal and Dual Network Interfaces............... 151
Firewall Configuration .................................................... 151

Configuring the VCS as a Traversal Client ............................. 152

Overview ...................................................................... 152
Adding a New Traversal Client Zone ............................... 152
Configuring a Traversal Client Zone ................................ 153

Configuring the VCS as a Traversal Server ............................ 154

Overview ...................................................................... 154
Adding a New Traversal Server Zone .............................. 154
Configuring a Traversal Server Zone ............................... 155
Configuring Traversal for Endpoints ................................ 156

Overview ................................................................ 156

Configuring Traversal Server Ports ................................. 157

Overview ................................................................ 157

STUN Services .............................................................. 158

About STUN ............................................................ 158
About ICE ............................................................... 158
STUN Binding Discovery .......................................... 158

How it works ..................................................... 158

STUN Relay............................................................. 158

How it works ..................................................... 158

Configuring STUN Services ...................................... 159

Restoring Default Configuration ............................................170

Overview .......................................................................170
DefaultValuesSet Level 3 ...............................................170

Appendices

CPL Reference .....................................................................172

Overview of CPL on the VCS ...........................................172
address-switch ..............................................................172

Overview .................................................................172
address ..................................................................172
field.........................................................................173
subfield ...................................................................174

otherwise ......................................................................174
not-present ....................................................................174
location .........................................................................175
rule-switch .....................................................................175
proxy ............................................................................175
reject ...........................................................................175
Unsupported CPL Elements ............................................175
CPL Examples................................................................176

Call Screening of Authenticated Users ......................176
Call Screening Based on Alias ..................................176
Call Screening Based on Domain ..............................177
Change of Domain Name ..........................................177
Allow Calls from Locally Registered Endpoints Only ....178
Block Calls from Default Zone and Default Subzone ..178
Restricting Access to a Local Gateway ......................179

Using the address-switch node ...........................179
Using the rule-switch node .................................179

Regular Expression Reference ............................................. 180

Overview ...................................................................... 180
Common Regular Expressions ....................................... 180

Maintenance

Upgrading Software ............................................................ 161

Overview ...................................................................... 161

Prerequisites .......................................................... 161
Installing and Restarting ......................................... 161
Backing up Existing Configuration Before Upgrading . 161
Upgrading and Option Keys ..................................... 161

Upgrading Using SCP/PSCP ........................................... 161
Upgrading via the Web Interface .................................... 162

Option Keys ........................................................................ 163

Overview ...................................................................... 163
Adding Options via the CLI............................................. 163
Adding Options via the Web Interface ............................ 164

Security ............................................................................. 165

Overview ...................................................................... 165

For extra security, you may wish to have the VCS
communicate with other systems (e.g. servers such as
LDAP servers or clients such as SIP endpoints) using
TLS encryption. ....................................................... 165

Enabling Security .......................................................... 165

Passwords ......................................................................... 166

Overview ...................................................................... 166
Configuring Administrator Password ............................... 166

System Snapshot ............................................................... 167

Overview ...................................................................... 167
Creating a System Snapshot ......................................... 167
Error Reports ................................................................ 167

Restarting .......................................................................... 168

Overview ...................................................................... 168
Restarting the VCS ....................................................... 168

Shutting Down .................................................................... 169

Overview ...................................................................... 169
Shutting Down .............................................................. 169

TANDBERG

VIDEO COMMUNICATIONS SERVER

ADMINISTRATOR GUIDE

Introduction

Getting Started

Overview and

Status

System

Configuration

VCS

Configuration

Zones and

Neighbors

Call

Processing

Bandwidth

Control

Firewall

Traversal

Maintenance

Appendices

What’s in this Manual?