Tandberg D14049 04 Users Manual
D14049.04 to the manual c6a0d91b-3e36-455f-b83c-31b031739b94
2015-02-03
: Tandberg Tandberg-D14049-04-Users-Manual-462504 tandberg-d14049-04-users-manual-462504 tandberg pdf
Open the PDF directly: View PDF .
Page Count: 276
Download | ![]() |
Open PDF In Browser | View PDF |
Video Communication Server ADMINISTRATOR GUIDE Version X3.0 July 2008 Introduction D14049.04 JULY 2008 Getting Started Overview and Status System Configuration VCS Configuration Zones and Neighbors Call Processing 1 Bandwidth Control Firewall Traversal Applications Maintenance Appendices Grey Headline (continued) What’s in this Manual? TANDBERG VIDEO COMMUNICATIONS SERVER ADMINISTRATOR GUIDE Preamble Introduction Getting Started Legal Notices........................................................................ 10 The TANDBERG VCS............................................................... 14 Installation............................................................................ 20 Disclaimer....................................................................... 10 Overview......................................................................... 14 What’s in the Box?........................................................... 20 Intellectual Property Rights.............................................. 10 VCS and the TANDBERG Total Solution............................. 14 Connecting the Cables..................................................... 20 Copyright Notice.............................................................. 10 VCS Base Applications..................................................... 15 Installation Site Preparations........................................... 20 Patent Information........................................................... 10 VCS Control............................................................... 15 General Installation Precautions....................................... 20 Safety Instructions and Approvals.......................................... 11 VCS Expressway™..................................................... 15 Initial Configuration................................................................ 21 Safety Instructions.......................................................... 11 Standard Features .......................................................... 16 Powering on the VCS........................................................ 21 Water and Moisture.................................................... 11 Optional Features ........................................................... 16 Initial Configuration via Serial Cable.................................. 21 Cleaning.................................................................... 11 Dual Network Interfaces....................................... 16 Initial Configuration via Front Panel................................... 22 Ventilation................................................................. 11 User Policy (FindMe™).......................................... 16 System Administrator Access................................................. 23 Lightning................................................................... 11 What’s New in this Version?..............................................17 Overview......................................................................... 23 Dust.......................................................................... 11 Presence....................................................................17 About Administrator Access........................................ 23 Vibration................................................................... 11 Scalable Deployments................................................17 Configuring Administrator Access................................ 23 Power Connection and Hazardous Voltage................... 11 Administration Accounts............................................. 23 Servicing................................................................... 11 Clusters must use TMS version 12.0 and above to ensure they are configured identically..........................17 Accessories............................................................... 11 Multiple Web Accounts................................................17 Resetting the Default Administrator Password....... 23 Approvals........................................................................ 11 Intelligent Route Director.............................................17 Root Account ............................................................ 23 Changing the Default Administrator Password....... 23 Electromagnetic Compatibility (EMC)........................... 11 H.323 version 6..........................................................17 Administrator Session Timeout................................... 23 EC Declaration of Conformity...................................... 11 Microsoft OCS 2007 Interworking................................17 Security Considerations............................................. 23 JATE Approval (Japan only).......................................... 11 Backup and Restore....................................................17 Web Interface.................................................................. 24 Environmental Issues............................................................ 12 Pre-Connect Transfer..................................................17 Using the Web Interface............................................. 24 TANDBERG’s Environmental Policy.................................... 12 SNMP Enhancements.................................................17 Supported Browsers.................................................. 24 European Environmental Directives................................... 12 The Administrator Guide......................................................... 18 General page features................................................ 25 Waste Handling .............................................................. 12 Using this Administrator Guide......................................... 18 Command Line Interface.................................................. 26 TANDBERG’s Recycling Policy........................................... 12 Typographical conventions......................................... 18 Using the Command Line Interface (CLI)..................... 26 Digital User Guides.......................................................... 12 Web Interface...................................................... 18 Types of Commands............................................. 26 Command Line Interface...................................... 18 How Command are Shown in this Guide................ 26 Supported Characters...................................................... 26 Introduction D14049.04 JULY 2008 Getting Started Overview and Status System Configuration VCS Configuration Zones and Neighbors Call Processing 2 Bandwidth Control Firewall Traversal Applications Maintenance Appendices Grey Headline (continued) What’s in this Manual? TANDBERG VIDEO COMMUNICATIONS SERVER ADMINISTRATOR GUIDE Overview and Status Local Zone............................................................................ 39 Configuration Log................................................................... 52 Overview............................................................................... 28 Viewing the Local Zone Page............................................ 39 Viewing the Configuration Log Page.................................. 52 Viewing the Overview Page............................................... 28 Understanding the Local Zone Page.................................. 39 Understanding the Configuration Log Page........................ 52 Understanding the Overview Page..................................... 28 Zones................................................................................... 40 Types of Configuration Events..................................... 52 System Information............................................................... 29 Viewing the Zones Page................................................... 40 Administrator sessions........................................ 52 Viewing the System Information Page............................... 29 Understanding the Zones Page......................................... 40 FindMe User sessions.......................................... 52 Understanding the System Information Page..................... 29 Links..................................................................................... 41 Configuration changes.......................................... 52 Ethernet................................................................................ 30 Viewing the Links Page..................................................... 41 Viewing the Ethernet Status Page..................................... 30 Understanding the Links Page.......................................... 41 Understanding the Ethernet Status Page.......................... 30 Pipes.................................................................................... 42 System Administration........................................................... 54 IP Status............................................................................... 31 Viewing the Pipes Page.................................................... 42 Overview......................................................................... 54 Viewing the IP Status Page............................................... 31 Understanding the Pipes Page.......................................... 42 About the System Name ........................................... 54 Understanding the IP Status Page.................................... 31 STUN Relays.......................................................................... 43 About Administrator Access settings ......................... 54 Resource Usage.................................................................... 32 Viewing the STUN Relays Page......................................... 43 Configuration................................................................... 54 Viewing the Resource Usage Page.................................... 32 Understanding the STUN Relays Page............................... 43 Ethernet................................................................................ 55 Understanding the Resource Usage Page.......................... 32 Applications.......................................................................... 44 Overview......................................................................... 55 Registrations......................................................................... 33 Viewing the Applications Page.......................................... 44 About Ethernet Speed................................................ 55 Viewing the Registrations Page......................................... 33 Understanding the Applications Page................................ 44 Configuration................................................................... 55 System Configuration Understanding the Registrations Page.............................. 33 Warnings............................................................................... 45 IP.......................................................................................... 56 Registration History............................................................... 34 Viewing the Warnings Page............................................... 45 Overview......................................................................... 56 Viewing the Registration History Page............................... 34 Understanding the Warnings Page.................................... 45 About IPv4 to IPv6 Gatewaying................................... 56 Understanding the Registration History Page.................... 34 Event Log.............................................................................. 46 About IP Routes......................................................... 56 Presence............................................................................... 35 Viewing the Event Log Page.............................................. 46 IP Configuration............................................................... 56 Viewing the Presence Status Pages.................................. 35 Event Log Color Coding.................................................... 46 LAN....................................................................................... 57 Calls..................................................................................... 36 Green........................................................................ 46 Overview......................................................................... 57 Viewing the Calls Page..................................................... 36 Orange...................................................................... 46 About LAN Configuration............................................ 57 Understanding the Calls Page........................................... 36 Red........................................................................... 46 About Dual Network Interfaces................................... 57 Call History............................................................................ 37 Understanding the Event Log Page................................... 46 LAN Configuration............................................................ 57 Viewing the Call History Page........................................... 37 Event Log Levels.............................................................. 46 DNS...................................................................................... 58 Understanding the Call History Page................................. 37 Interpreting the Event Log.................................................47 Overview......................................................................... 58 Search History....................................................................... 38 Event Log Format........................................................47 About DNS Servers.................................................... 58 Viewing the Search History Page....................................... 38 Message Details Field................................................ 48 About the DNS Domain Name..................................... 58 About Searches............................................................... 38 Events and Levels............................................................ 49 Configuration................................................................... 58 Understanding the Search History Page............................ 38 Introduction D14049.04 JULY 2008 Getting Started Overview and Status System Configuration VCS Configuration Zones and Neighbors Call Processing 3 Bandwidth Control Firewall Traversal Applications Maintenance Appendices Grey Headline (continued) What’s in this Manual? TANDBERG VIDEO COMMUNICATIONS SERVER ADMINISTRATOR GUIDE NTP....................................................................................... 59 H.323 Endpoint Registration............................................ 65 Authentication..................................................................74 Overview......................................................................... 59 Overview................................................................... 65 Authentication Mode...................................................74 About the NTP Server................................................. 59 Registration Conflict Mode......................................... 65 Authentication for Local Registrations..........................74 About the Time Zone.................................................. 59 Auto Discover............................................................ 65 Configuring Authentication...........................................74 Configuration................................................................... 59 Time to Live............................................................... 65 About External Registration Credentials...................... 75 SNMP................................................................................... 60 Call Time to Live........................................................ 65 Configuring External Registration Credentials.............. 75 Overview......................................................................... 60 Configuring H.323............................................................ 66 Authentication Databases................................................ 76 About SNMP.............................................................. 60 SIP........................................................................................ 67 Alias Origin Setting.................................................... 76 Configuration................................................................... 60 SIP Overview................................................................... 67 LDAP................................................................... 76 External Manager.................................................................. 61 About SIP on the VCS................................................. 67 Combined............................................................ 76 Overview......................................................................... 61 Using the VCS as a SIP Registrar................................ 67 Endpoint.............................................................. 76 About the External Manager....................................... 61 Proxying Registration Requests............................ 67 Authentication using an LDAP Server ......................... 76 Configuration................................................................... 61 SIP Registration Expiry............................................... 67 Configuring the LDAP Server Directory................... 76 Logging................................................................................. 62 Using the VCS as a SIP Proxy Server........................... 68 Securing the LDAP Connection with TLS ............... 76 Overview......................................................................... 62 Using the VCS as a SIP Presence Server..................... 68 Configuring LDAP Server settings.......................... 77 About Logging............................................................ 62 SIP protocols and ports.............................................. 68 Authentication using a Local Database ...................... 78 Remote Logging............................................................... 62 Configuring SIP - Registrations, Protocols and Ports.......... 69 Configuring the Local Database............................ 78 About Remote Logging............................................... 62 Configuring SIP - Domains................................................ 70 Registering Aliases.......................................................... 79 Enabling Remote Logging........................................... 62 Interworking...........................................................................71 About Alias Registration............................................. 79 Log Levels....................................................................... 63 Overview..........................................................................71 H.323 Alias Registration...................................... 79 About Event Log Levels.............................................. 63 About Interworking......................................................71 SIP Alias Registration........................................... 79 Setting the Event Log Level........................................ 63 Configuring Interworking....................................................71 Attempts to Register using an Existing Alias................ 79 Registration Control............................................................... 72 H.323................................................................. 79 Registration Overview...................................................... 72 SIP...................................................................... 79 H.323................................................................................... 65 Endpoint Registration................................................. 72 Allow and Deny Lists........................................................ 80 H.323 Overview............................................................... 65 Registrations on a VCS Expressway............................ 72 About Allow and Deny Lists........................................ 80 About H.323 on the VCS............................................ 65 MCU, Gateway and Content Server Registration.......... 72 Patterns and Pattern Types.................................. 80 Using the VCS as an H.323 Gatekeeper...................... 65 Finding a VCS with which to Register........................... 73 Removing existing registrations.................................. 80 Configuring H.323 Ports............................................. 65 SIP...................................................................... 73 Activating use of Allow or Deny Lists........................... 80 H.323................................................................. 73 Managing Entries in the Allow List.............................. 81 Preventing automatic registrations........................ 73 Managing Entries in the Deny List............................... 82 VCS Configuration Introduction D14049.04 JULY 2008 Getting Started Overview and Status System Configuration VCS Configuration Zones and Neighbors Call Processing 4 Bandwidth Control Firewall Traversal Applications Maintenance Appendices Grey Headline (continued) What’s in this Manual? TANDBERG VIDEO COMMUNICATIONS SERVER ADMINISTRATOR GUIDE Zones and Neighbors TMS.......................................................................... 97 Call Processing Introduction........................................................................... 84 What Configuration is and isn’t Replicated?...................... 97 Introduction......................................................................... 103 About your Video Communications Network...................... 84 System Name............................................................ 97 Call Processing Diagram................................................ 103 Example Network Diagram......................................... 84 Administration Accounts............................................. 97 Search Process....................................................... 103 Local Zone and Subzones...................................................... 85 Option keys............................................................... 97 Dialing by Address Types...................................................... 104 Overview......................................................................... 85 Ethernet speed.......................................................... 97 About the Different Address Types.................................. 104 Configuring the Local Zone and its Subzones.................... 85 IP configuration . ....................................................... 97 Dialing by IP Address..................................................... 104 Bandwidth Management............................................. 85 DNS Configuration..................................................... 97 Endpoints registered to a VCS Expressway.......... 104 Local Zone Matches................................................... 85 Logging..................................................................... 97 Dialing by H.323 ID or E.164 alias.................................. 104 Traversal Subzone........................................................... 86 Sharing Registrations Across Peers.................................. 98 Dialing by H.323 or SIP URI............................................ 104 What are traversal calls?............................................ 86 H.323 Registrations................................................... 98 Dialing by ENUM............................................................ 104 Configuring the Traversal Subzone Ports..................... 86 SIP Registrations....................................................... 98 Hop Counts......................................................................... 105 Zones................................................................................... 87 Sharing Bandwidth Across Peers...................................... 98 About Hop Counts.......................................................... 105 About Zones.................................................................... 87 Backup and Restore......................................................... 98 Configuring Hop Counts.................................................. 105 Neighbor Zone................................................................. 87 Upgrades and Downgrades.............................................. 98 Searches and Transforms.................................................... 106 Traversal Client Zone....................................................... 87 Upgrading to X3.0...................................................... 98 Overview of Searches and Transforms............................ 106 Traversal Server Zone...................................................... 87 Downgrading from X3.0.............................................. 98 About Searches....................................................... 106 ENUM Zone..................................................................... 88 Clustering and FindMe..................................................... 99 About Transforms.................................................... 106 DNS Zone........................................................................ 88 Overview................................................................... 99 Pre-Search Transforms................................................... 106 Default Zone................................................................... 88 Enabling the Replication of FindMe Information..... 99 About Pre-Search Transforms................................... 106 Adding Zones................................................................... 89 Enabling SSH....................................................... 99 Pre-Search Transform Process.................................. 106 Configuring Zones............................................................ 89 Clustering and Presence.................................................. 99 Configuring Pre-Search Transforms............................107 Configuring Zones - All Types............................................ 90 Viewing Peers.................................................................. 99 Zone Searching and Transforming . ................................ 108 Configuring Neighbor Zones.............................................. 91 Neighboring the Local VCS to a Cluster........................... 100 About Zone Searching.............................................. 108 Configuring Traversal Client Zones.................................... 92 Dial Plans............................................................................ 101 Match Mode...................................................... 108 Configuring Traversal Server Zones................................... 93 About Dial Plans............................................................ 101 Match Priority.................................................... 108 Configuring ENUM Zones.................................................. 94 Flat Dial Plan................................................................. 101 About Zone Transforms............................................ 108 Configuring DNS Zones.................................................... 95 Structured Dial Plan....................................................... 101 Using Zone Searches and Transforms Together......... 108 Clustering, Peers and Alternates............................................ 96 Hierarchical Dial Plan..................................................... 101 Zone Search and Transform Process......................... 108 About Clustering.............................................................. 96 Configuring Zone Searches and Transforms............... 109 Cluster Subzone.............................................................. 96 Local Zone......................................................... 109 Configuring Clusters......................................................... 97 External Zones................................................... 109 Prerequisites............................................................. 97 Default Settings....................................................... 109 Enabling H.323.................................................... 97 Introduction D14049.04 JULY 2008 Getting Started Overview and Status System Configuration VCS Configuration Zones and Neighbors Call Processing 5 Bandwidth Control Firewall Traversal Applications Maintenance Appendices Grey Headline (continued) What’s in this Manual? TANDBERG VIDEO COMMUNICATIONS SERVER ADMINISTRATOR GUIDE Examples...................................................................... 110 URI Dialing for Incoming Calls......................................... 122 Unregistered Endpoints........................................................ 130 Combining Match Types and Priorities....................... 110 Types of DNS Records Required............................... 122 About Unregistered Endpoints........................................ 130 Never Query a Zone................................................. 110 Process................................................................... 122 Calls to an Unregistered Endpoint................................... 130 Always Query a Zone, Never Apply Transforms........... 110 SRV Record Format ................................................. 122 Overview................................................................. 130 Filter Queries to a Zone Without Transforming........... 111 Configuring H.323 SRV Records................................ 122 Recommended Configuration for Firewall Traversal ... 130 Query a Zone for Original and Transformed Alias....... 112 Location SRV Records........................................ 122 Calls from an Unregistered Endpoint............................... 130 Query a Zone for Two or More Transformed Aliases.... 113 Call SRV Records............................................... 122 Fallback Alias...................................................................... 131 Call Policy........................................................................... 114 Configuring SIP SRV Records.................................... 122 Overview....................................................................... 131 About Call Policy ........................................................... 114 Example DNS Record Configuration.......................... 123 Configuration................................................................. 131 Administrator Policy and Authentication.......................... 114 URI Dialing and Firewall Traversal................................... 123 Example Usage.............................................................. 131 Authentication Mode On........................................... 114 Recommended Configuration.................................... 123 Call IDs, Serial Numbers and Tags........................................ 132 H.323............................................................... 114 ENUM Dialing...................................................................... 124 Identifying a Particular Call............................................. 132 SIP.................................................................... 114 Overview....................................................................... 124 Call ID..................................................................... 132 Authentication Mode Off.......................................... 114 Process......................................................................... 124 Call Serial Number................................................... 132 Enabling the use of Administrator Policy.......................... 115 Enabling ENUM Dialing................................................... 124 Call Tag................................................................... 132 Configuring Administrator Policy via the Web Interface..... 116 ENUM Dialing for Outgoing Calls..................................... 125 Obtaining Call Numbers via the CLI........................... 132 Configuring Administrator Policy via a CPL script...............117 Prerequisites........................................................... 125 Disconnecting Calls............................................................. 133 Uploading a CPL Script..............................................117 Process................................................................... 125 Obtaining the Call ID via the Web UI.......................... 133 About CPL XSD files..................................................117 Example.................................................................. 125 Disconnecting a Call via the Web Interface..................... 133 Downloading policy files..................................................117 Configuring Matches for ENUM Zones....................... 126 Disconnecting a Call via the CLI..................................... 133 URI Dialing.......................................................................... 118 Example............................................................ 126 Issues when Disconnecting SIP Calls.............................. 133 Overview....................................................................... 118 Configuring Transforms for ENUM Zones................... 126 URI Resolution Process via DNS..................................... 118 Example............................................................ 126 H323...................................................................... 118 Configuring ENUM Zones.......................................... 127 Bandwidth Control Overview................................................. 135 SIP.......................................................................... 118 Configuring DNS Servers.......................................... 128 Bandwidth Control on the VCS........................................ 135 Enabling URI Dialing....................................................... 118 ENUM Dialing for Incoming Calls..................................... 129 Example Network Deployment........................................ 135 URI Dialing for Outgoing Calls......................................... 119 Prerequisites........................................................... 129 Subzones............................................................................ 136 Process................................................................... 119 About DNS Domains for ENUM................................. 129 About Subzones and Bandwidth Control.......................... 136 Configuring Matches for DNS Zones.......................... 119 Configuring DNS NAPTR Records.............................. 129 About the Default Subzone............................................. 136 Adding and Configuring DNS Zones........................... 120 Example.................................................................. 129 Specifying the Subzone IP Addresses............................. 136 Configuring DNS Servers.......................................... 121 Introduction D14049.04 JULY 2008 Getting Started Overview and Status System Configuration Bandwidth Control Subzone Links............................................................... 136 VCS Configuration Zones and Neighbors Call Processing 6 Bandwidth Control Firewall Traversal Applications Maintenance Appendices Grey Headline (continued) What’s in this Manual? TANDBERG VIDEO COMMUNICATIONS SERVER ADMINISTRATOR GUIDE About the Traversal Subzone.......................................... 136 Bandwidth Control Examples.................................................147 Firewall Traversal and Authentication.................................... 154 Traversal Calls......................................................... 136 Example Without a Firewall..............................................147 Overview....................................................................... 154 Bandwidth Consumption of Traversal Calls................ 136 Example With a Firewall................................................. 148 Authentication and NTP.................................................. 154 Creating a Subzone........................................................ 137 VCS Expressway Subzone Configuration.................... 148 Other Issues....................................................................... 155 Configuring a Subzone.................................................... 138 VCS Control Subzone Configuration........................... 148 Firewall Traversal and Dual Network Interfaces............... 155 Applying Bandwidth Limitations to Subzones................... 139 Firewall Configuration..................................................... 155 Types of Limitations................................................. 139 Firewall Traversal Configuring the VCS as a Traversal Client.............................. 156 How Different Bandwidth Limitations are Managed.... 139 Firewall Traversal Overview................................................... 150 Overview....................................................................... 156 Links................................................................................... 140 About Expressway™....................................................... 150 Adding a New Traversal Client Zone................................ 156 About Links................................................................... 140 How does it work?................................................... 150 Configuring a Traversal Client Zone................................. 157 Creating a New Link................................................. 140 VCS as a Firewall Traversal Client................................... 150 Configuring the VCS as a Traversal Server............................. 158 Default Links........................................................... 140 VCS as a Firewall Traversal Server.................................. 150 Overview....................................................................... 158 Creating Links............................................................... 140 Quick Guide to VCS Traversal Client - Server Configuration..... 151 Adding a New Traversal Server Zone............................... 158 Editing Links...................................................................141 Overview....................................................................... 151 Configuring a Traversal Server Zone................................ 159 Default Links................................................................. 142 VCS Control (Client)....................................................... 151 Configuring Traversal for Endpoints................................. 160 About Default Links.................................................. 142 VCS Expressway (Server)................................................ 151 Overview................................................................. 160 Pre-Configured Links................................................ 142 Firewall Traversal Protocols and Ports................................... 152 Configuring Traversal Server Ports.................................. 161 Automatically Created Links..................................... 142 Overview....................................................................... 152 Overview................................................................. 161 Pipes.................................................................................. 143 Expressway Process...................................................... 152 STUN Services............................................................... 162 About Pipes................................................................... 143 H.323 Firewall Traversal Protocols.................................. 152 About STUN............................................................. 162 Creating Pipes............................................................... 143 SIP Firewall Traversal Protocols...................................... 152 About ICE................................................................ 162 Editing Pipes................................................................. 144 Ports for Initial Connections from Traversal Clients.......... 153 STUN Binding Discovery........................................... 162 Editing an Existing Pipe............................................ 144 Assent Ports................................................................. 153 How it works...................................................... 162 Applying Pipes to Links.................................................. 145 Call signaling........................................................... 153 STUN Relay............................................................. 162 One Pipe, One Link.................................................. 145 Media...................................................................... 153 How it works...................................................... 162 One Pipe, Two or More Links..................................... 145 SIP Ports....................................................................... 153 Configuring STUN Services....................................... 163 Example............................................................ 145 Call signaling........................................................... 153 Two Pipes, One Link................................................. 145 Media...................................................................... 153 Example............................................................ 145 H.460.18/19 Ports........................................................ 153 Default Bandwidth and Downspeeding.................................. 146 Call signaling........................................................... 153 About the Default Call Bandwidth................................... 146 Media...................................................................... 153 About Downspeeding..................................................... 146 STUN Ports.................................................................... 153 Configuring Default Call Bandwidth and Downspeeding.... 146 Ports for Connections out to the Public Internet.............. 153 Introduction D14049.04 JULY 2008 Getting Started Overview and Status System Configuration VCS Configuration Zones and Neighbors Call Processing 7 Bandwidth Control Firewall Traversal Applications Maintenance Appendices Grey Headline (continued) What’s in this Manual? TANDBERG VIDEO COMMUNICATIONS SERVER ADMINISTRATOR GUIDE Applications Enabling and Disabling Presence Services.......................174 Option Keys......................................................................... 181 FindMe™ (User Policy).......................................................... 165 PUA . .......................................................................174 Overview....................................................................... 181 Overview....................................................................... 165 Enabled..............................................................174 Adding Options via the CLI............................................. 181 What is FindMe?...................................................... 165 Disabled.............................................................174 Adding Options via the Web Interface............................. 182 How are Devices Specified?..................................... 165 Presence Server.......................................................174 Security.............................................................................. 183 Process Overview.................................................... 165 Enabled..............................................................174 Overview....................................................................... 183 Who Must do What Before FindMe™ Can Be Used?... 165 Disabled.............................................................174 Enabling Security........................................................... 183 Recommendations When Deploying FindMe.............. 165 Viewing Presence Status.................................................175 Administration Accounts...................................................... 184 Overview....................................................................... 184 Example............................................................ 165 Publishers................................................................175 User Policy Manager................................................ 165 Presentities .............................................................175 Default Administration Account................................. 184 Enabling FindMe on the VCS........................................... 166 Subscribers..............................................................175 Additional Administration Accounts........................... 184 Configuring User Policy Manager............................... 166 Managing FindMe User Accounts.................................... 167 Administration Access Levels................................... 184 Read Write......................................................... 184 Maintenance About User Accounts................................................ 167 Upgrading Software..............................................................177 Read Only.......................................................... 184 Creating a New User Account................................... 167 Overview........................................................................177 Adding an Administration Account................................... 184 Changing a User Password....................................... 168 Prerequisites............................................................177 Editing an Administration Account................................... 185 Viewing Existing User Account Settings..................... 168 Backing up current configuration..........................177 Backup and Restore............................................................ 186 Deleting a User Account........................................... 169 Upgrading and Option Keys.......................................177 Overview....................................................................... 186 Using TANDBERG’s FindMe™.................................................170 Installing and Restarting...........................................177 Limitations.............................................................. 186 About your FindMe User Account.....................................170 Upgrading Using SCP/PSCP.............................................177 Creating a Backup of your VCS Configuration................... 186 About FindMe™........................................................170 Upgrading via the Web Interface......................................178 Restoring a Previous Backup.......................................... 187 FindMe User Accounts........................................170 Downgrading Software......................................................... 180 System Snapshot................................................................ 188 Individual versus Group FindMe ..........................170 Downgrade Procedure.................................................... 180 Overview....................................................................... 188 Accessing the FindMe Configuration Page........................170 Prerequisites........................................................... 180 Creating a System Snapshot.......................................... 188 Configuring your FindMe User Account.............................171 Backing up current configuration......................... 180 Error Reports................................................................. 188 Presence..............................................................................172 Impact on features introduced in X3.0............................ 180 Restarting........................................................................... 189 Overview........................................................................172 Encrypted Passwords............................................... 180 Overview....................................................................... 189 Presence Server.............................................................172 Additional Administration accounts........................... 180 Restarting the VCS........................................................ 189 Presence User Agent (PUA)..............................................173 Clustering................................................................ 180 Shutting Down..................................................................... 190 Overview..................................................................173 Presence Services................................................... 180 Overview....................................................................... 190 Aggregation of Presence Information.........................173 Local Zone Matches................................................. 180 Shutting Down............................................................... 190 FindMe presence................................................173 Call Tags................................................................. 180 Restoring Default Configuration............................................ 191 Registration refresh period........................................173 Logging Levels......................................................... 180 Overview....................................................................... 191 DefaultValuesSet Level 3............................................... 191 Introduction D14049.04 JULY 2008 Getting Started Overview and Status System Configuration VCS Configuration Zones and Neighbors Call Processing 8 Bandwidth Control Firewall Traversal Applications Maintenance Appendices Grey Headline (continued) What’s in this Manual? TANDBERG VIDEO COMMUNICATIONS SERVER ADMINISTRATOR GUIDE Password Encryption............................................................ 192 Regular Expression Reference.............................................. 202 Command Reference - xConfiguration................................... 212 Overview....................................................................... 192 Overview....................................................................... 202 Command Reference - xCommand........................................ 242 Web Interface.......................................................... 192 Common Regular Expressions........................................ 202 Command Reference - xStatus............................................. 254 Command Line Interface.......................................... 192 Pattern Variable Reference................................................... 203 Bibliography.........................................................................270 Maximum length of Passwords....................................... 192 Overview....................................................................... 203 Glossary..............................................................................271 Valid Variable Strings..................................................... 203 Contact Information..............................................................276 VCS Port Reference............................................................. 204 Appendices CPL Reference..................................................................... 194 Overview....................................................................... 204 Overview of CPL on the VCS........................................... 194 VCS Ports...................................................................... 204 address-switch.............................................................. 194 DNS Configuration............................................................... 207 Overview................................................................. 194 Overview....................................................................... 207 address . ................................................................ 194 Verifying the SRV Record.......................................... 207 field........................................................................ 195 Microsoft DNS Server.................................................... 207 subfield................................................................... 196 BIND 8 & 9 . ................................................................. 207 otherwise...................................................................... 196 LDAP Configuration.............................................................. 208 not-present.................................................................... 196 About the LDAP Databases............................................ 208 location......................................................................... 197 Downloading the LDAP schemas..................................... 208 rule-switch..................................................................... 197 Microsoft Active Directory ............................................. 208 proxy . .......................................................................... 197 Prerequisites .......................................................... 208 reject ........................................................................... 197 Installing the H.350 Schemas.................................. 208 Unsupported CPL Elements............................................ 197 Adding H.350 Objects ............................................. 209 CPL Examples............................................................... 198 Create the Organizational Hierarchy ................... 209 Call Screening of Authenticated Users...................... 198 Add the H.350 Objects . .................................... 209 Call Screening Based on Alias.................................. 198 Securing with TLS ................................................... 209 Call Screening Based on Domain.............................. 199 OpenLDAP..................................................................... 210 Change of Domain Name.......................................... 199 Prerequisites .......................................................... 210 Allow Calls from Locally Registered Endpoints Only.... 200 Installing the H.350 Schemas ................................. 210 Block Calls from Default Zone and Default Subzone.. 200 Adding H.350 Objects ............................................. 211 Restricting Access to a Local Gateway...................... 201 Create the Organizational Hierarchy ................... 211 Using the address-switch node........................... 201 Add the H.350 Objects . .................................... 211 Using the rule-switch node................................. 201 Securing with TLS ................................................... 211 Introduction D14049.04 JULY 2008 Getting Started Overview and Status System Configuration VCS Configuration Zones and Neighbors Call Processing 9 Bandwidth Control Firewall Traversal Applications Maintenance Appendices Preamble Legal Notices Grey Headline (continued) TANDBERG VIDEO COMMUNICATIONS SERVER ADMINISTRATOR GUIDE Disclaimer Intellectual Property Rights The specifications for the product and the information in this Administrator Guide are subject to change at any time, without notice, by TANDBERG. Every effort has been made to supply complete and accurate information in this Administrator Guide, however, TANDBERG assumes no responsibility or liability for any errors or inaccuracies that may appear in this document. Copyright Notice This Administrator Guide and the product to which it relates contain information that is proprietary to TANDBERG and its licensors. Information regarding the product is found adjacent in the Copyright Notice and Patent Information sections. Patent Information The product that is covered by this Administrator Guide is protected under copyright, patent, and other intellectual property rights of various jurisdictions. This product is Copyright © 2008, Tandberg Telecom AS. All rights reserved. This Administrator Guide may be reproduced in its entirety, including all copyright and intellectual property notices, in limited quantities in connection with the use of the product. Except for the limited exception set forth in the previous sentence, no part of this Administrator Guide may be reproduced, stored in a retrieval system, or transmitted, in any form, or by any means, electronically, mechanically, by photocopying, or otherwise, without the prior written permission of TANDBERG. Requests for such permission should be addressed to ipr@tandberg.com. This product is covered by one or more of the following patents: • EP01953201 • GB1338127 Other patents pending. Contact tandberg@tandberg.com for an up-to-date list. This product includes copyrighted software licensed from others. A list of the copyright notices and the terms and conditions of use can be found at: http://www.tandberg.com/collateral/ documentation/User_Manuals/TANDBERG VCS EULA.pdf and TANDBERG® is a registered trademark belonging to Tandberg ASA. Other trademarks used in this document are the property of their respective holders. COPYRIGHT © 2008, TANDBERG All rights reserved. http://www.tandberg.com/collateral/ documentation/User_Manuals/TANDBERG VCS Copyrights.pdf. IMPORTANT: USE OF THIS PRODUCT IS SUBJECT IN ALL CASES TO THE COPYRIGHT RIGHTS AND THE TERMS AND CONDITIONS OF USE REFERRED TO ABOVE. USE OF THIS PRODUCT CONSTITUTES AGREEMENT TO SUCH TERMS AND CONDITIONS. Philip Pedersens vei 22 1366 Lysaker Norway Tel: +47 67 125 125 Fax: +47 67 125 234 e-mail: tandberg@tandberg.com Introduction D14049.04 JULY 2008 Getting Started Overview and Status System Configuration VCS Configuration Zones and Neighbors Call Processing 10 Bandwidth Control Firewall Traversal Applications Maintenance Appendices Grey Headline (continued) Safety Instructions and Approvals TANDBERG VIDEO COMMUNICATIONS SERVER ADMINISTRATOR GUIDE Safety Instructions For your protection please read these safety instructions completely before you connect the equipment to the power source. Carefully observe all warnings, precautions and instructions both on the apparatus and in these operating instructions. Retain this manual for future reference. Approvals Never use this apparatus, or connect or disconnect communication cables or power cables during lightning storms. • Do not operate the apparatus under or near water – for example near a bathtub, kitchen sink, or laundry tub, in a wet basement, near a swimming pool or in other areas with high humidity. without first unplugging the device from it's power source. • Unplug the apparatus from its power source • Do not touch the product with wet hands. • The product may have hazardous voltage in wet locations unless the jack is specifically designed for wet locations. Cleaning • Unplug the apparatus from communication lines, mains power-outlet or any power source before cleaning or polishing. • Do not use liquid cleaners or aerosol cleaners. Use a lint-free cloth lightly moistened with water for cleaning the exterior of the apparatus. Ventilation • Do not block any of the ventilation openings of the apparatus. Never cover the slots and openings with a cloth or other material. Never install the apparatus near heat sources such as radiators, heat registers, stoves, or other apparatus (including amplifiers) that produce heat. • Do not place the product in direct sunlight or close to a surface directly heated by the sun. Overview and Status • Do not attempt to service the apparatus Do not operate the apparatus in areas with vibration or place it on an unstable surface. or moisture other products. • If the apparatus has been subjected to • In case any parts of the product has visual excessive shock by being dropped. damage never attempt to connect mains power, or any other power source, before consulting service personnel • If the cabinet has been damaged. • If the apparatus seems to be overheated. • If the apparatus emits smoke or abnormal • The plug connecting the power cord to the odor. product/power supply serves as the main disconnect device for this equipment. The power cord must always be easily accessible. • Route the power cord so as to avoid it being VCS Configuration • If the apparatus fails to operate in accordance with the operating instructions. Accessories walked on or pinched by items placed upon or against it. Pay particular attention to the plugs, receptacles and the point where the cord exits from the apparatus. System Configuration • LVD 73/23/EEC • EMC 89/336/EEC • If objects have fallen into the apparatus. • If the apparatus has been exposed to rain • Never connect attached power supply cord to Use only accessories specified by the manufacturer, or sold with the apparatus. Zones and Neighbors Call Processing 11 Type Number: Description: TANDBERG Telecom AS TANDBERG Video Communication Server TTC2-04 Network unit • If the power cord or plug is damaged or apparatus. an earthed power outlet. Manufacturer: Product Name: This product complies with Commission Directives: • If liquid has been spilled into the • This product should always be powered from This is a Class A product. In a domestic environment this product may cause radio interference in which case the user may be required to take adequate measures. and refer servicing to qualified personnel under the following conditions: frayed. inside. Never attempt to open this product, or any peripherals connected to the product, where this action requires a tool. Electromagnetic Compatibility (EMC) EC Declaration of Conformity Servicing yourself as opening or removing covers may expose you to dangerous voltages or other hazards, and will void the warranty. Refer all servicing to qualified service personnel. Vibration Power Connection and Hazardous Voltage D14049.04 JULY 2008 • Never install cables, or any peripherals, Dust • Never install jacks for communication cables Getting Started outlet, consult an electrician. Do not operate the apparatus in areas with high concentration of dust. Water and Moisture Introduction • Do not tug the power cord. • If the provided plug does not fit into your Lightning Bandwidth Control Firewall Traversal This product complies with harmonized Standards: • EN 60950-1 : 2001, A11 • EN 55022 : 1998, A1/A2 • EN 55024 : 1998, A1/A2 • EN 61000-3-2 : 2000 • EN 61000-3-3 : 1995, A1 Technical Construction File No.: X14182 Year which the CE mark was affixed: 2007 For an official, signed version of this document, or details regarding documentation from the technical construction file, please contact TANDBERG. JATE Approval (Japan only) This unit must be connected to the public internet via a router/switch that has JATE approval. Applications Maintenance Appendices Grey Headline (continued) Environmental Issues TANDBERG VIDEO COMMUNICATIONS SERVER ADMINISTRATOR GUIDE Thank you for buying a product which contributes to a reduction in pollution, and thereby helps save the environment. Our products reduce the need for travel and transport and thereby reduce pollution. Our products have either none or few consumable parts (chemicals, toner, gas, paper). Our products are low energy consuming products. TANDBERG’s Environmental Policy Environmental stewardship is important to TANDBERG’s culture. As a global company with strong corporate values, TANDBERG is committed to following international environmental legislation and designing technologies that help companies, individuals and communities creatively address environmental challenges. TANDBERG’s environmental objectives are to: • Develop products that reduce energy consumption, CO emissions, and traffic congestion European Environmental Directives As a manufacturer of electrical and electronic equipment TANDBERG is responsible for compliance with the requirements in the European Directives 2002/96/EC (WEEE) and 2002/95/ EC (RoHS). As part of compliance with the European WEEE Directive, TANDBERG provides recycling information on request for all types of new equipment put on the market in Europe after August 13th 2005. The primary aim of the WEEE Directive and RoHS Directive is to reduce the impact of disposal of electrical and electronic equipment at end-of-life. The WEEE Directive aims to reduce the amount of WEEE sent for disposal to landfill or incineration by requiring producers to arrange for collection and recycling. The RoHS Directive bans the use of certain heavy metals and brominated flame retardants to reduce the environmental impact of WEEE which is landfilled or incinerated. Please contact TANDBERG and provide the following details for the product for which you would like to receive recycling information: TANDBERG has implemented necessary process changes to comply with the European RoHS Directive (2002/95/EC) and the European WEEE Directive (2002/96/EC). our customers Waste Handling • Produce products that can be recycled or disposed of safely at the end of product life • Comply with all relevant environmental legislation. Digital User Guides In order to avoid the dissemination of hazardous substances in our environment and to diminish the pressure on natural resources, we encourage you to use the appropriate take-back systems in your area. Those systems will reuse or recycle most of the materials of your end of life equipment in a sound way. TANDBERG products put on the market after August 2005 are marked with a crossed-out wheelie bin symbol that invites you to use those take-back systems. Please contact your local supplier, the regional waste administration, or http://www.tandberg.com/recycling if you need more information on the collection and recycling system in your area. D14049.04 JULY 2008 Getting Started Overview and Status • Model number of TANDBERG product • Your company’s name • Contact name • Address • Telephone number • E-mail 2 • Provide products and services that improve quality of life for Introduction TANDBERG’s Recycling Policy System Configuration VCS Configuration Zones and Neighbors Call Processing 12 Bandwidth Control TANDBERG is pleased to announce that we have replaced the printed versions of our User Guides with a digital CD version. Instead of a range of different user manuals, there is now one CD – which can be used with all TANDBERG products – in a variety of languages. The environmental benefits of this are significant. The CDs are recyclable and the savings on paper are huge. A simple web-based search feature helps you directly access the information you need. In addition, the TANDBERG video systems now have an intuitive on-page help function, which provides a range of useful features and tips. The contents of the CD can still be printed locally, whenever needed. Firewall Traversal Applications Maintenance Appendices TANDBERG CONTENT SERVER USER GUIDE TANDBERG VIDEO COMMUNICATIONS SERVER ADMINISTRATOR GUIDE Grey Headline (continued) Environmental Issues Table of What’s New in Contents this Version? Introduction Getting Started D 13898.04 DECEMBER 2006 D14049.04 JULY 2008 Trademark/ Licenses Overview and Status Safety/ Environmental System Configuration Introduction VCS Configuration Installation Zones and Neighbors Quick Setup Call Processing 12 13 Operation Bandwidth Control Administrator Settings Firewall Traversal Conference Setup Applications View Conferences Maintenance Appendices Appendices Introduction Grey Headline (continued) The TANDBERG VCS TANDBERG VIDEO COMMUNICATIONS SERVER ADMINISTRATOR GUIDE Overview VCS and the TANDBERG Total Solution The TANDBERG Video Communication Server (VCS) enhances the video experience and provides seamless communication between SIP and H.323 devices utilizing IETF and ITU standards. The VCS is the center of the video communication network, and connects all H.323 and SIP endpoints, infrastructure, and management devices. The VCS provides unrivaled scalability and redundancy to video communications, and is integral to TANDBERG interoperability with unified communications and Voice over IP systems. The VCS can be deployed with either the Control application or the Expressway™ application, with various optional packages including FindMe™ and Dual Network Interfaces. E NT E RPRISE LA N/ WA N 3G MOBILE MSE 8000 4500 MCU ENTRYPOINT MPS TMS IP GATEWAY FIREWALL VCS EXPRESSWAY (H.323/SIP) INDUSTRY SOLUTONS IP AVAYA COMMUNICATION MANAGER CONTENT SERVER MICROSOFT STREAMING CLIENTS LCS CISCO CALL MANAGER VCS CONTROL/ FINDME™ (H.323/SIP) ISDN GATEWAY NORTEL MCS 5100 EXTERNAL PARTNERS MOVI (PC VIDEO) ISDN Introduction D14049.04 JULY 2008 Getting Started Overview and Status System Configuration VCS Configuration Zones and Neighbors Call Processing 14 Bandwidth Control Firewall Traversal Applications Maintenance Appendices Grey Headline (continued) The TANDBERG VCS TANDBERG VIDEO COMMUNICATIONS SERVER ADMINISTRATOR GUIDE VCS Base Applications VCS Control VCS Expressway™ The VCS Control provides internal video control and administration for all SIP and H.323 devices. It is normally deployed within your wide area network with endpoints that are behind the same firewalls or NAT devices. The VCS Expressway provides standards-based firewall traversal for SIP and H.323 devices allowing secure firewall traversal of any firewall or NAT device. As well as all the functionality of a VCS Control, it also provides registration of traversal-enabled devices and STUN Discovery and STUN Relay services. The VCS Control replaces the need to have separate H.323 gatekeeper, SIP registrar and H.323 SIP gateway servers. Introduction D14049.04 JULY 2008 Getting Started Overview and Status System Configuration VCS Configuration The VCS Expressway is normally deployed outside of your firewall or within the DMZ. Zones and Neighbors Call Processing 15 Bandwidth Control Firewall Traversal Applications Maintenance Appendices Grey Headline (continued) The TANDBERG VCS TANDBERG VIDEO COMMUNICATIONS SERVER ADMINISTRATOR GUIDE Standard Features • H.323 gatekeeper • SIP Proxy/Registrar • SIP Presence Server • SIP Presence User Agent • SIP and H.323 support, including SIP/H.323 gatewaying • IPv4 and IPv6 support, including IPv4/IPv6 gatewaying • Bandwidth management on both a per- call and a total usage basis, configurable separately for calls within the local subzones and to external systems and zones • Automatic downspeeding option for calls that exceed the available bandwidth • URI and ENUM dialing via DNS, enabling global connectivity D14049.04 JULY 2008 Getting Started • Flexible zone configuration with prefix, suffix Dual Network Interfaces • Can function as a stand-alone VCS or be Enables the LAN 2 ethernet port on the VCS Expressway, allowing you to have a secondary IP address for your VCS. and regex support neighbored with other systems such as VCSs, Border Controllers, gatekeepers and SIP proxies This configuration is intended for high-security deployments where the VCS Expressway is located in a DMZ between two separate firewalls on separate network segments. • Can be part of a Cluster of up to 6 VCSs for increased capacity and redundancy • Intelligent Route Director for single number dialling and network failover facilities • Optional endpoint authentication • Control over which endpoints are allowed to register • Administrator Policy including support for CPL • Embedded setup wizard via a serial port for initial configuration • System administration via a web interface or • Up to 2500 registrations • Up to 500 non-traversal calls • Up to 100 traversal calls • Up to 200 external zones Introduction Optional Features RS-232, Telnet, SSH, and HTTPS • Can be managed with TANDBERG User Policy (FindMe™) Management Suite 12 or newer. Overview and Status System Configuration VCS Configuration A unique industry solution that gives individual video users a single alias on which they can be contacted regardless of location. Users have the ability to log on to a Web-based interface and control where and how they are contacted. Zones and Neighbors Call Processing 16 Bandwidth Control Firewall Traversal Applications Maintenance Appendices Grey Headline (continued) The TANDBERG VCS TANDBERG VIDEO COMMUNICATIONS SERVER ADMINISTRATOR GUIDE What’s New in this Version? The following features have been introduced in version X3.0 of the VCS software: Presence Two new presence services are now supported: Presence Server and Presence User Agent. Presence Server • complies with IETF’s SIP-based SIMPLE protocol • supports PUBLISH, SUBSCRIBE and NOTIFY messages • includes a Presence Server database • aggregates a user’s presence information from various devices using FindMe™. Presence User Agent • Publishes presence information on behalf of devices that are registered to the VCS, including those that do not support IETF Presence. Scalable Deployments A VCS can be part of a Cluster of up to six identically configured VCSs, enabling the systems to work together as one large Local Zone. This allows you to: • increase the capacity of your VCS deployment compared with a single VCS • provide redundancy in the rare case that a VCS becomes unavailable (for example, due to a network or power outage). Clusters must use TMS version 12.0 and above to ensure they are configured identically. Introduction D14049.04 JULY 2008 Getting Started Overview and Status System Configuration Multiple Web Accounts Backup and Restore This feature allows up to 15 additional administration accounts to be created. Each administration account can be assigned either “Read Only” access, meaning they can view but not change configuration, or “Read Write” access, enabling them to modify the configuration of the VCS. The Backup and Restore feature allows you to create a file containing the configuration of your VCS at a particular date and time. You can then use this file at a later date to return the VCS to that state of configuration. In order to track the activities of users, the VCS now also includes a Configuration Log which shows all web login attempts for administrators and Findme users (both failed and successful), and all changes to the VCS configuration made via the web UI including the name of the user who made the change. Intelligent Route Director Pre-Connect Transfer To compliment support for the call forward (before and after answer) and the call hold facilities available in SIP, the VCS now interworks these supplementary services into the H.323 protocol using standards-based Facility messages. SNMP Enhancements The addition of Local Zone matches to the zone search process means that it is now possible to configure the VCS so that a call can be routed to a specific zone (including the Local Zone) depending on a pre-defined set of priorities and bandwidth policies. This feature enables, for example, the VCS to be configured to overflow calls from an IP zone to an ISDN gateway registered on the local zone. The VCS now supports SNMP v2 MIB-II and Net-SNMP MIB. H.323 version 6 TANDBERG VCS now supports H.323 version 6. Microsoft OCS 2007 Interworking Additional advanced zone configuration options have been included to allow calls to be made between Microsoft OCS 2007 clients and devices registered to the VCS. These options also allow Microsoft OCS clients to view basic presence information of endpoints registered to the VCS. VCS Configuration Zones and Neighbors Call Processing 17 Bandwidth Control Firewall Traversal Applications Maintenance Appendices Grey Headline (continued) The Administrator Guide TANDBERG VIDEO COMMUNICATIONS SERVER ADMINISTRATOR GUIDE Using this Administrator Guide This Administrator Guide is provided to help you make the best use of your TANDBERG VCS. Typographical conventions Your approach to this documentation depends on what you want to do and how much you already know. Most configuration tasks on the VCS can be performed via either the web interface or a command line interface. This Guide will describe how to use both methods. The Administrator Guide has been divided into several sections, each providing different information. In some places information is duplicated between sections to let you have all the relevant information in one place. Web Interface In this Guide, instructions for performing a task via the web interface are shown in the format: This document does not have an index. This is intentional; if the Table of Contents does not direct you to the information you need, you can use the Find function in Adobe Reader to search the text for keywords. • Menu > Submenu followed by the Name of the page that you will be taken to. Note that the Administrator Guide describes a fully equipped version. Your version may not have all the described extensions installed. In most cases a screenshot of the page will be shown adjacent, with callouts describing each of the configurable options. Our main objective with this Guide is to address your goals and needs. Please let us know how well we succeeded! Command Line Interface In this Guide, instructions for performing a task using the command line interface (CLI) are shown in the format: • xConfiguration• xCommand These are meant as a reference only. Each command is hyperlinked to the Command Reference table at the back of this Guide; clicking on the hyperlink will take you to the appropriate section of the table showing all the available sub-elements, parameters and valuespaces for the given command. Note that: • Typing the given xConfiguration path into the CLI will return a list of values currently configured for that element (and sub-elements where applicable). • Typing the given xConfiguration path into the CLI followed by a ? will return information about the usage for that element and sub-elements. • Typing the given xCommand command into the CLI with or without a ? will return information about the usage of that command. Introduction D14049.04 JULY 2008 Getting Started Overview and Status System Configuration VCS Configuration Zones and Neighbors Call Processing 18 Bandwidth Control Firewall Traversal Applications Maintenance Appendices Grey Headline (continued) TANDBERG VIDEO COMMUNICATIONS SERVER ADMINISTRATOR GUIDE Getting Started This section describes how to install the VCS and carry out its initial configuration. It also gives an overview of the VCS’s Administrator settings and describes how to access the VCS via either the Command Line Interface (CLI) or the web interface. Introduction D14049.04 JULY 2008 Getting Started Overview and Status System Configuration VCS Configuration Zones and Neighbors Call Processing 19 Bandwidth Control Firewall Traversal Applications Maintenance Appendices Grey Headline (continued) Installation TANDBERG VIDEO COMMUNICATIONS SERVER ADMINISTRATOR GUIDE Installation Site Preparations What’s in the Box? To avoid damage to the unit during transportation, the TANDBERG VCS is delivered in a special shipping box, which should contain the following components: • TANDBERG VCS • CD containing VCS Administrator Guide and other General Installation Precautions • Make sure that the VCS is accessible and that all cables can • The socket outlet shall be installed near to the equipment • For ventilation: leave a space of at least 10cm (4 inches) • Never install cables without first switching the power OFF. be easily connected. behind the VCS’s rear panel and 10cm (4 inches) in front of the front panel. and shall be easily accessible. • The room in which you install the VCS should have an ambient documentation temperature between 0ºC and 35ºC (32ºF and 95ºF) and between 10% and 90% non-condensing relative humidity. • Installation Sheet • Registration card • Rack ears and screws • Cables: • power cables • ethernet cable • shielded serial cable • Do not place heavy objects directly on top of the VCS. • Do not place hot objects directly on top, or directly beneath the VCS. • Use a grounded AC power outlet for the VCS. Please report any discrepancies to your TANDBERG representative immediately. A brief yet concise description of the procedure to get you up and going can be found in the Installation Sheet accompanying your TANDBERG product. Connecting the Cables Ethernet cable To use the VCS over IP, connect the ethernet cable from the LAN1 port on the VCS to your network. Shielded serial cable The LAN2 port can also be used if you have the Dual Network Interfaces option installed. To control the VCS using a direct connection to a PC, connect the serial cable between the VCS’s DATA port and the COM port on a PC. Introduction D14049.04 JULY 2008 Getting Started Power switch Power cable Connect the system power cable to an electrical distribution socket. Soft power button The LAN3 and LAN4 ports are not used. Overview and Status System Configuration VCS Configuration Zones and Neighbors Call Processing 20 Bandwidth Control Firewall Traversal Applications Maintenance Appendices Grey Headline (continued) Initial Configuration TANDBERG VIDEO COMMUNICATIONS SERVER ADMINISTRATOR GUIDE Powering on the VCS To start the VCS: 1. Ensure the power cable is connected. 2. Ensure the LAN cable is connected to the LAN1 port. 3. Turn on the power switch on the back right of the unit (adjacent to the power cable). 4. Press the soft power button on the back left of the unit. The system will power up. Wait until: • the green PWR LED on the front of the unit is a steady green color (it may flash briefly during power up). • the red ALM LED on the front of the unit has gone out. • the IP address is showing in the display panel on the front of the unit. You now must set the system's IP address, subnet mask and default gateway before the system can be used. Consult your network administrator for information on which addresses to use. Note that the VCS must use a static IP address. The initial configuration can be done: • by connecting from a PC to the VCS via a serial cable • via the buttons on the front panel • if your network is set up to allow it, by connecting via a web browser to the default IP address of 192.168.0.100. ! If the red ALM LED flashes rapidly it indicates a hardware fault. Contact your local TANDBERG representative. The yellow HDD LED indicates disk activity and may flicker during normal operation, more so on a busy system. Introduction D14049.04 JULY 2008 Getting Started Overview and Status Initial Configuration via Serial Cable To set the initial configuration using a PC connected to the VCS DATA port via a serial cable: c. The LAN1 IP address of the system. d. The LAN1 IPv4 subnet mask of the system (if you have selected IPv4). 1. Connect the supplied serial cable from the DATA port on the VCS to the COM port on a PC. e. The IP default gateway of the system. f. The ethernet speed. g. Whether you want to use SSH to administer the system. 2. Start a terminal emulator program on the PC and configure it to use the DATA port as follows: h. Whether you want to use Telnet to administer the system. • baud rate 115200 • data bits: 8 • parity: none • stop bits: 1 • flow control: none. 7. Once the wizard is finished you will be prompted to log in again. Login with the username admin and your new password. 8. You will again get the install wizard prompt; this time select n and press Enter in order to skip the wizard. 3. Power on the unit (if it is not already on). The terminal emulator program will display start up information. A welcome message similar to the following will appear: After approximately 2 minutes you will get the login prompt (if the unit is already on, press Enter to get the login prompt): TANDBERG VCS Release X3.0 Welcome to Once it has rebooted, the VCS is ready to use. You can continue to use the serial connection, or you can connect to the system remotely over IP using either or both: • the web interface via HTTPS • a command line interface via SSH or Telnet. We recommend that you now configure the following: • The system name of the VCS. This is used by the TANDBERG Management Suite (TMS) to identify the system. See About the System Name for more information. • Automatic discovery. If you have multiple VCSs in the same network you may want to disable automatic discovery on some of them. See Auto Discover for more information. • The DNS server address (if URI dialing or FQDNs are to be used). See DNS configuration for more information. SW Release Date: 2008-07-01 tandberg login: 4. Enter the username admin and press Enter. You will get the password prompt: Password: 5. Enter the default password of TANDBERG and press Enter. OK 9. You must now reboot the system in order for the new settings take effect. To do this, type the command: • xCommand boot You will get the install wizard prompt: Run install wizard [n]: Type y and press Enter. 6. Follow the prompts given by the install wizard to specify the following: The IP configuration made via the serial cable applies to the LAN 1 ethernet port only. If you have enabled the LAN 2 port (by installing the Dual Network Interfaces option key) you must use the web interface or CLI to configure the LAN 2 settings. a. The password you want to use for your admin account. See Default Administrator Account for details. b. Whether you wish to use IPv4, IPv6 or Both. See IP Protocol for details. System Configuration VCS Configuration Zones and Neighbors Call Processing 21 Bandwidth Control Firewall Traversal Do not leave a terminal emulator session open once it is no longer in use. An open session may cause issues during a system restart. ! Applications Maintenance Appendices Grey Headline (continued) Initial Configuration TANDBERG VIDEO COMMUNICATIONS SERVER ADMINISTRATOR GUIDE Initial Configuration via Front Panel The LCD panel makes it possible to configure and check the IP settings as well as to reboot the system. By default, during normal operation the front panel will show the system name (if configured) and the LAN 1 IPv4 Address. To access the front panel menu options, press ENTER. Press ENTER to produce the Main Menu. Use UP/DOWN to navigate to the Press ENTER to access the IP Settings submenu. Use the UP/DOWN keys to navigate to IP Address and press ENTER to select this option. IP Settings submenu. Press ENTER again to produce the cursor. Use the up/down keys to move left and right between the digits of the number. When you reach a digit you wish to change, press ENTER. Use UP/DOWN to increase or decrease the digit value. Press ENTER to select To amend the remaining digits, either press ENTER to move to the right, or ESC When you have finished editing press ESC twice to go to the Confirm change The front panel LCD menu items are as follows: Main Menu IP Settings Commands IP Information IP Settings IP Address IP Default GW IP Netmask Commands Reboot IP Information IP Address the amended digit. Use the UP/DOWN key to select yes or no followed by ENTER to confirm. UP key The IPv4 address and IPv4 subnet mask configuration made via the front panel applies to the LAN 1 ethernet port only. To configure the system's IPv6 settings and (if you have the Dual Network Interfaces option key installed) the LAN 2 settings, you must use the web interface or CLI. D14049.04 JULY 2008 Getting Started Overview and Status ESC key to navigate back to the main Use menu. menu. the process, selecting IP Default Repeat GW to configure the default gateway and IP Netmask for the subnet mask. The steps opposite give an example of how to use the front panel, in this case to configure the LAN 1 IPv4 address. Use the same procedure to configure the system's LAN 1 IPv4 subnet mask and IPv4 default gateway. Introduction followed by UP/DOWN to move to the left. ENTER key DOWN key System Configuration VCS Configuration Zones and Neighbors ESC key Call Processing 22 Bandwidth Control Firewall Traversal Applications Maintenance Appendices Grey Headline (continued) System Administrator Access TANDBERG VIDEO COMMUNICATIONS SERVER ADMINISTRATOR GUIDE Overview About Administrator Access Administration Accounts Administrator Session Timeout While it is possible to administer the TANDBERG VCS via a PC connected directly to the unit via a serial cable, you may wish to access the system remotely over IP. The VCS has a default administrator account with full read/write access. This account is used to log into the VCS via the web UI or the CLI. You can add additional administrator accounts with either read/write access or read-only access; these can be used to log in via the web UI only. See the Administration Accounts section for information on how to create these additional accounts. By default, Administrator sessions do not time out – they remain active until you logout. You can do this using either or both: Default Administrator Account • the web interface via HTTPS • a command line interface (CLI) via SSH or Telnet. By default, access via HTTPS and SSH is enabled; access via Telnet is disabled. These can be enabled and disabled according to your requirements. You can also enable access via HTTP. However, this mode works by redirecting HTTP calls to the HTTPS port, so HTTPS must be enabled for access via HTTP. Tandberg Management Suite (TMS) accesses the VCS via the web server. If HTTPS mode is turned off, TMS will not be able to access it. ! Configuring Administrator Access To configure the ways in which your system is accessed: • System Configuration > System. You will be taken to the System Administration page. In the Admin Access section, select Off or On from the drop-down boxes for each service. • xConfiguration Administration You must restart the system for any changes to the Administrator settings to take effect. Introduction D14049.04 JULY 2008 Getting Started Overview and Status The default administrator account has a username of admin (all lower case) and a default password of TANDBERG (all upper case). You cannot delete the default administrator account or change the admin username, but you should change the password as soon as possible. Choose a strong password, particularly if administration over IP is enabled. Changing the Default Administrator Password Resetting the Default Administrator Password To change the administrator password: If you forget your password, it is possible to set a new password using the following procedure: • Maintenance > Administration Accounts. You will be taken to the Administration Accounts page. Click on View/Edit for the admin name. You will be taken to the Edit Administration Account page. In the Password and Confirm Password fields, enter the new password, and click Save. To set an empty password via the web UI, delete the characters from the Password and Confirm Password fields and click Save. • xConfiguration SystemUnit Password To set an empty password via the CLI, type: 1. Connect a PC to the VCS using the serial cable as per the instructions in steps 1 and 2 of Initial Configuration via Serial Cable. 2. Reboot the VCS. 3. Login from the PC with the username pwrec. No password is required. ! System Configuration VCS Configuration Zones and Neighbors To set the timeout period: • System Configuration > System. You will be taken to the System Administration page. In the Admin Access section, in the Session time out (minutes) box, enter the number of minutes of inactivity after which an administrator session should time out. xConfiguration Administration TimeOut Values must be between 0 and 10,000. A value of 0 means that Administrator sessions will never time out. 4. You will be prompted for a new password. The pwrec account is only active for one minute following a restart. Beyond that time you will have to restart the system again to change the password. xConfiguration SystemUnit Password: "" It is possible to have more than one Administrator session running at the same time. These sessions could be via the web interface, command line interface, or a mixture of both. This may cause issues if each Administrator session is attempting to make the same configuration changes. You can set the system to timeout an Administrator session after a set number of minutes of inactivity. The timeout period will apply to all Administrator sessions using both the Web Interface and the Command Line Interface. Root Account The VCS provides a root account which will have the same password as the admin account. The root account should not be used in normal operation, and in particular system configuration should not be conducted using this account. Use the admin account instead. Call Processing 23 Bandwidth Control Firewall Traversal Security Considerations To securely manage the VCS you should disable Telnet, using the encrypted HTTPS and SSH protocols instead. For further security, disable HTTPS and SSH as well and use the serial port to manage the system. Because access to the serial port allows the password to be reset, it is recommended that you install the VCS in a physically secure environment. ! Applications Maintenance Appendices Grey Headline (continued) System Administrator Access TANDBERG VIDEO COMMUNICATIONS SERVER ADMINISTRATOR GUIDE Web Interface Using the Web Interface To use the web interface: 1. Open a browser window and in the address line type either: • the IP address of the system • the FQDN of the system. 2. Select Administrator Login. 3. Enter a valid administration username and password and select Login. You will be presented with the Overview page. When logging in via the VCS web interface, you may receive a warning message regarding the VCS's security certificate. This can safely be ignored. Supported Browsers The VCS web interface is designed for use with Internet Explorer (6 and up) or Firefox (1.5 and up). It may work with Opera and Safari, but you may encounter unexpected behavior. Javascript and cookies must be enabled to use the VCS web interface. In this Administrator Guide, instructions for performing a task via the web interface are shown in the format: • Menu option1 > Menu option2 followed by the Name of the page that you will be taken to in order to perform the task. In most cases the page will be shown adjacent with callouts describing each of the configurable options. Introduction D14049.04 JULY 2008 Getting Started Overview and Status System Configuration VCS Configuration Zones and Neighbors Call Processing 24 Bandwidth Control Firewall Traversal Applications Maintenance Appendices Grey Headline (continued) System Administrator Access TANDBERG VIDEO COMMUNICATIONS SERVER ADMINISTRATOR GUIDE Web Interface General page features Page name and Location These are the features that can be found on some or all of the web UI pages. Note that you will not be able to change settings if your admin account is read only. User System Warning Every page shows the page name and the menu path that you took to get there. Each part of the menu path is a link; clicking on any of the higher level menu items will take you to that page. This icon appears on the top right corner of every page when there is a system warning in place. Click on this icon to go to the Warnings page which gives information about the warning and its suggested resolution. The username of the administration account used to log in to the VCS. Information bar Log out The VCS provides you with feedback in certain situations, for example when settings have been saved or when you need to take further action. This feedback is given in a yellow information bar at the top of the page. This icon appears on the top right corner of every page. Clicking on this icon will end your Administrator session. You will be taken to the Administrator Login page. Sorting Columns View manual Click on column headings to sort the information in ascending and descending order. This icon appears on the top right corner of every page. Clicking on this icon will take you directly to the latest version of the VCS Administrator Guide on the TANDBERG website. Select All and Unselect All Use these buttons to select and unselect all items in the list. Information box A yellow information box will appear on the configuration pages whenever you either click on the Information icon or click inside a field. This box gives you information about the particular field, including where applicable the valid ranges and default value. Status On configuration pages, this section shows you the current status of the items you are configuring. Note that some configuration requires a reboot to take effect, so if you have changed the configuration but not yet rebooted this will show the existing (unchanged) status. To close the information box, click on the X at its top right corner. System Information Information Each page will always show the system name (or LAN 1 IPv4 address if no system name is configured) at the bottom left corner, and the hardware serial number and VCS software version at the bottom right corner. Introduction D14049.04 JULY 2008 Getting Started Overview and Status This icon appears to the right of most input fields in the web interface. Clicking on this icon will activate the Information Box. System Configuration VCS Configuration Zones and Neighbors Call Processing 25 Bandwidth Control Firewall Traversal Applications Maintenance Appendices Grey Headline (continued) System Administrator Access TANDBERG VIDEO COMMUNICATIONS SERVER ADMINISTRATOR GUIDE Command Line Interface Supported Characters Using the Command Line Interface (CLI) How Command are Shown in this Guide The command line interface is available over SSH, Telnet and through the serial port. In this Guide, instructions for performing a task using the command line interface (CLI) are shown in the format: To use the command line interface: • xConfiguration • xCommand 1. Start a SSH or Telnet session. 2. Enter the IP address or FQDN of the VCS. 3. Login with a username of admin and your system password. You will see a screen similar to that shown on the right. You are now ready to start using the CLI by typing the appropriate commands. These are meant as a reference only. Each command is hyperlinked to the Command Reference table at the back of this Guide; clicking on the hyperlink will take you to the appropriate section of the table showing all the available sub-elements, parameters and valuespaces for the given command. Note that: • Typing the given xConfiguration path into the CLI will return Types of Commands Commands are divided into different groups according to their function: xStatus These commands return information about the current status of the system. Information such as current calls and registrations is available through this command group. xConfiguration These commands allow you to add and edit single items of data such as IP address and zones. xCommand These commands allow you to add and configure items and obtain information. xHistory These commands provide historical information about calls and registrations. xFeedback These commands provide information about events as they happen, such as calls and registrations. a list of values currently configured for that element (and subelements where applicable). • Typing the given xConfiguration path into the CLI followed by a ? will return information about the usage for that element and sub-elements. • Typing the given xCommand command into the CLI with or without a ? will return information about the usage of that command. The VCS supports the following characters when entering text in the CLI and web UI: • the letters A-Z and a-z • decimal digits ( 0-9 ) • underscore ( _ ) • minus sign ( - ) • equals sign ( = ) • plus sign ( + ) • at sign ( @ ) • comma ( , ) • period/full stop ( . ) • exclamation mark ( ! ) • spaces The following characters are specifically not allowed: • tabs • angle brackets ( < and > ) • ampersand ( & ) • caret ( ^ ) See the Command Reference Appendix for a full description of commands available on the VCS. Introduction D14049.04 JULY 2008 Getting Started Overview and Status System Configuration VCS Configuration Zones and Neighbors Call Processing 26 Bandwidth Control Firewall Traversal Applications Maintenance Appendices Grey Headline (continued) TANDBERG VIDEO COMMUNICATIONS SERVER ADMINISTRATOR GUIDE Overview and Status This section describes the information that appears on the Overview page and all the pages under the Status menu of the web interface. These pages provide information on the current status and configuration of the VCS. Introduction D14049.04 JULY 2008 Getting Started Overview and Status System Configuration VCS Configuration Zones and Neighbors Call Processing 27 Bandwidth Control Firewall Traversal Applications Maintenance Appendices Grey Headline (continued) Overview TANDBERG VIDEO COMMUNICATIONS SERVER ADMINISTRATOR GUIDE Viewing the Overview Page Understanding the Overview Page The Overview page summarizes the current configuration and status of your VCS. Options The maximum number of calls and registrations, and the availability of additional VCS features such as User Policy and Dual Network Interfaces, are controlled through the use of Option Keys. This section shows all the Options that are currently installed on the VCS. The Overview page opens automatically when you first log on to the web interface. You can also access it at any time by clicking on the Overview menu at the top left of any page. Traversal calls System name The name that has been assigned to the VCS. Current: The number of traversal calls going through the VCS at this moment. Up time Max (peak): The highest number of concurrent traversal calls handled by the VCS since it was last restarted. The amount of time that has elapsed since the system last restarted. Total: The total number of traversal calls handled by the VCS since it was last restarted. See the section Traversal Calls for details on what constitutes a traversal call. Software version The version of software that is currently installed on the VCS. Non-traversal calls IPv4 address Current: The number of non-traversal calls going through the VCS at this moment. Max (peak): The highest number of concurrent non-traversal calls handled by the VCS since it was last restarted. The VCS’s IPv4 address(es). IPv6 address Total: The total number of non-traversal calls handled by the VCS since it was last restarted. The VCS’s IPv6 address(es). Registrations Many of the items on this page are configurable, and contain links to the page where they can be configured. For example, clicking on System name will take you to the System Administration page, from where you can configure the system name. Current: The number of endpoints registered to the VCS at this moment. Max (peak): The highest number of endpoints concurrently registered to the VCS since it was last restarted. Total: The total number of registrations on the VCS since it was last restarted. Introduction D14049.04 JULY 2008 Getting Started Overview and Status System Configuration VCS Configuration Zones and Neighbors Call Processing 28 Bandwidth Control Firewall Traversal Applications Maintenance Appendices Grey Headline (continued) System Information TANDBERG VIDEO COMMUNICATIONS SERVER ADMINISTRATOR GUIDE Viewing the System Information Page Understanding the System Information Page The System Information page provides details of the software, hardware, and time settings of the VCS. System name The name that has been assigned to the VCS. To view the System Information page: Product • Status > System > Information This will be TANDBERG VCS. Up time Software release The amount of time that has elapsed since the system last restarted. The version of software that is currently installed on the VCS. System time (UTC) Software build The time as determined by the NTP server. The build number of this software version. If no NTP server has been configured, this will show Time Not Set. Software release date Time zone The date on which this version of the software was released. The time zone that has been configured on the NTP page. Software name Local time The internal TANDBERG reference number for this software release. If an NTP server has been configured, this will be a combination of the NTP server time (which is UTC) and the local time zone. Software options All the extra features installed on the VCS via option keys. If no NTP server has been configured, this will show the time according to the VCS’s operating system. Hardware version The version number of the hardware on which the VCS software is installed. Some of the items on this page are configurable, and contain links to the page where they can be configured. For example, clicking on Software Options will take you to the Option Keys page, from where you can install new optional features. Introduction D14049.04 JULY 2008 Getting Started Overview and Status Hardware serial number The serial number of the hardware on which the VCS software is installed. System Configuration VCS Configuration Zones and Neighbors Call Processing 29 Bandwidth Control Firewall Traversal Applications Maintenance Appendices Grey Headline (continued) Ethernet TANDBERG VIDEO COMMUNICATIONS SERVER ADMINISTRATOR GUIDE Viewing the Ethernet Status Page Understanding the Ethernet Status Page The Ethernet page provides details of the MAC address and ethernet speed settings of the VCS. MAC address The MAC address of the VCS’s ethernet device. If the Dual Network Interfaces option key has been installed, this will show the MAC addresses of the ethernet cards for both the LAN1 port and the LAN2 port. To view the Ethernet page: • Status > System > Ethernet Speed The speed of the connection between the VCS and the ethernet switch. If the Dual Network Interfaces option key has been installed, this will show the ethernet speed for both the LAN1 port and the LAN2 port. Introduction D14049.04 JULY 2008 Getting Started Overview and Status System Configuration VCS Configuration Zones and Neighbors Call Processing 30 Bandwidth Control Firewall Traversal Applications Maintenance Appendices Grey Headline (continued) IP Status TANDBERG VIDEO COMMUNICATIONS SERVER ADMINISTRATOR GUIDE Viewing the IP Status Page Understanding the IP Status Page The IP Status page provides details of the IP and DNS settings of the VCS. IPv4 gateway The IPv4 gateway used by VCS. To view the IP Status page: • Status > System > IP Protocol IPv6 gateway Indicates the IP protocol supported by the VCS. The IPv6 gateway used by VCS. IPv4: The VCS will only accept registrations from endpoints using an IPv4 address, and will only take calls between two endpoints or devices communicating via IPv4. It will communicate with other systems via IPv4 only. IPv6: The VCS will only accept registrations from endpoints using an IPv6 address, and will only take calls between two endpoints communicating via IPv6. It will communicate with other systems via IPv6 only. Dual Network Interfaces Indicates whether the second LAN port has been enabled. This is done by installing the Dual Network Interfaces option key. Both: The VCS will accept registrations from endpoints using either an IPv4 or IPv6 address, and will take calls using either protocol. If a call is between an IPv4-only and an IPv6-only endpoint, the VCS will act as an IPv4 to IPv6 gateway (note that this will require a traversal call licence). The VCS can communicate with other systems via either protocol. LAN 1 Shows the IPv4 Address and subnet mask, and IPv6 Address of the LAN1 port. Server 1..5 address The IP address(es) of each of the DNS servers that will be queried when resolving domain names. Up to 5 DNS servers may be configured. LAN 2 If the Dual Network Interfaces option key has been installed, this shows the IPv4 Address and subnet mask, and IPv6 Address of the LAN2 port. Domain Specifies the name to be appended to the host name before a query to the DNS server is executed. Introduction D14049.04 JULY 2008 Getting Started Overview and Status System Configuration VCS Configuration Zones and Neighbors Call Processing 31 Bandwidth Control Firewall Traversal Applications Maintenance Appendices Grey Headline (continued) Resource Usage TANDBERG VIDEO COMMUNICATIONS SERVER ADMINISTRATOR GUIDE Viewing the Resource Usage Page Understanding the Resource Usage Page Traversal calls The Resource Usage page provides statistics about the numbers of current and cumulative calls and registrations on the VCS. This page automatically refreshes every 5 seconds. Current: The number of traversal calls going through the VCS at this moment. Max (peak): The highest number of concurrent traversal calls handled by the VCS since it was last restarted. To view the Resource Usage page: • Status > System > Resource Usage Total: The total number of traversal calls handled by the VCS since it was last restarted. Non-traversal calls Current: The number of non-traversal calls going through the VCS at this moment. Max (peak): The highest number of concurrent non-traversal calls handled by the VCS since it was last restarted. Total: The total number of non-traversal calls handled by the VCS since it was last restarted. Registrations Current: The number of devices registered to the VCS at this moment. Max (peak): The highest number of devices concurrently registered to the VCS since it was last restarted. Total: The total number of registrations on the VCS since it was last restarted. Introduction D14049.04 JULY 2008 Getting Started Overview and Status System Configuration VCS Configuration Zones and Neighbors Call Processing 32 Bandwidth Control Firewall Traversal Applications Maintenance Appendices Grey Headline (continued) Registrations TANDBERG VIDEO COMMUNICATIONS SERVER ADMINISTRATOR GUIDE Viewing the Registrations Page Understanding the Registrations Page The Registrations page lists all the devices that are currently registered with the VCS. Name The H.323 alias or SIP AOR that the device registered. Devices that are configured for both SIP and H.323 will register twice; once as an H.323 endpoint and once as a SIP UA. Clicking on an individual name will take you to the Registrations Details page for that registration. To view the Registrations page: • Status > Registrations Type Indicates the nature of the registration. This will most commonly be Endpoint, Gateway, or SIP UA. Unregister Click here to remove the selected registrations. IP Address Note that removing a registration will not prevent the same device from automatically re-registering. For H.323 devices, this is the RAS address. For SIP UAs it is the Contact address presented in the REGISTER request. Creation Time The date and time at which the registration was accepted. Filter To limit the list of registrations, enter one or more characters in the Filter field and select Filter. Only those registrations that contain (in any of the displayed fields) the string you entered will be shown. If an NTP server has not been configured, this will say Time not set. Protocol To return to the full list of registrations, click Reset. Introduction D14049.04 JULY 2008 Getting Started Overview and Status Whether the registration is for a SIP or H.323 device. System Configuration VCS Configuration Zones and Neighbors Call Processing 33 Bandwidth Control Firewall Traversal Applications Maintenance Appendices Grey Headline (continued) Registration History TANDBERG VIDEO COMMUNICATIONS SERVER ADMINISTRATOR GUIDE Viewing the Registration History Page Understanding the Registration History Page The Registration History page lists all the registrations that are no longer current. It lists the most recent historical registrations since the last reboot, up to a maximum of 255. Name The H.323 alias or SIP AOR that the device registered. Clicking on an individual name will take you to the Registrations Details page for that registration. To view the Registration History page: • Status > Registration History Type Indicates the nature of the registration. This will most commonly be Endpoint, Gateway, or SIP UA. Protocol Whether the registration was for a SIP or H.323 device. Reason The reason why the registration was terminated. Duration The length of time that the registration was in place. End Time Filter The date and time at which the registration was terminated. To limit the list of registrations, enter one or more characters in the Filter field and select Filter. Only those registrations that contain (in any of the displayed fields) the string you entered will be shown. Creation Time To return to the full list of registrations, click Reset. The date and time at which the registration was accepted. If an NTP server has not been configured, this will say Time not set. Introduction D14049.04 JULY 2008 Getting Started Overview and Status System Configuration VCS Configuration Zones and Neighbors Call Processing 34 Bandwidth Control Firewall Traversal Applications Maintenance Appendices Grey Headline (continued) Presence TANDBERG VIDEO COMMUNICATIONS SERVER ADMINISTRATOR GUIDE Viewing the Presence Status Pages The Status > Presence menu has three sub-menus: • Publishers • Presentities • Subscribers. These pages provide information about endpoints and presentities using the Presence services on the VCS. Refer to the Viewing Presence Status section for a full explanation of the information on these pages. Introduction D14049.04 JULY 2008 Getting Started Overview and Status System Configuration VCS Configuration Zones and Neighbors Call Processing 35 Bandwidth Control Firewall Traversal Applications Maintenance Appendices Grey Headline (continued) Calls TANDBERG VIDEO COMMUNICATIONS SERVER ADMINISTRATOR GUIDE Viewing the Calls Page Understanding the Calls Page The Calls page lists all the calls currently taking place to or from devices registered with the VCS, or that are passing through the VCS. Start time The date and time at which the call was placed. To view the Calls page: • Status > Calls Source The alias of the device that placed the call. Disconnect Click here to disconnect the selected calls. Destination The alias to which the call was placed. ! Call disconnection works differently for H.323 and SIP calls due to differences in the way the protocols work. This may be different from the alias that was actually dialed from the device, as it may have been transformed either locally or before the zone was queried. For H.323 calls, and interworked H.323 to SIP calls, the Disconnect command will actually disconnect the call. Actions For SIP to SIP calls, the Disconnect command will cause the VCS to release all resources used for the call and the call will appear on the system as disconnected. However, SIP calls are peer-to-peer and as a SIP proxy the VCS has no authority over the endpoints. Although releasing the resources may have the side-effect of disconnecting the SIP call, it is also possible that the call signaling, media or both may stay up (depending on the type of call being made). The call will not actually disconnect until the SIP endpoints involved have also cleared their resources. Click View to go to the Call Details page which lists full details of this call. Protocol Shows whether the call used H.323, SIP, or both protocols. Route The subzone or zone from which the call was received and the subzone or zone to which the call was placed. Intermediary subzones are not shown here. To see the complete route within the VCS that the call took, click on View to go to the Call Details page. Filter To limit the list of calls, enter one or more characters in the Filter field and select Filter. Only those calls that contain (in any of the displayed fields) the characters you entered will be shown. Bandwidth Allocated The amount of bandwidth allocated to this call. To return to the full list of calls, click Reset. Introduction D14049.04 JULY 2008 Getting Started Overview and Status System Configuration VCS Configuration Zones and Neighbors Call Processing 36 Bandwidth Control Firewall Traversal Applications Maintenance Appendices Grey Headline (continued) Call History TANDBERG VIDEO COMMUNICATIONS SERVER ADMINISTRATOR GUIDE Viewing the Call History Page Understanding the Call History Page The Call History page lists all the calls that are no longer active that have taken place since the VCS was last restarted. Start time The date and time at which the call was placed. To view the Call History page: • Status > Call History Source The alias of the device that placed the call. Destination The alias to which the call was placed. This may be different to the alias that was actually dialed from the endpoint, as it may have been transformed either locally or before the zone was queried. Actions Click View to go to the Call Details page which lists full details of this call. Status The reason the call was terminated. Duration Filter The length of time of the call. To limit the list of calls, enter one or more characters in the Filter field and select Filter. Only those calls that contain (in any of the displayed fields) the characters you entered will be shown. Protocol To return to the full list of calls, click Reset. Introduction D14049.04 JULY 2008 Getting Started Overview and Status Shows whether the call used H.323, SIP, or both protocols. System Configuration VCS Configuration Zones and Neighbors Call Processing 37 Bandwidth Control Firewall Traversal Applications Maintenance Appendices Grey Headline (continued) Search History TANDBERG VIDEO COMMUNICATIONS SERVER ADMINISTRATOR GUIDE Viewing the Search History Page Understanding the Search History Page The Search History page lists all the searches that have taken place since the VCS was last restarted. Start time The date and time at which the search was initiated. To view the Search History page: • Status > Search History Search Type The type of message being sent. About Searches Actions Click View to go to the Search Details page which lists full details of this call. For H.323, two messages are sent for every call that is placed locally: the first is an ARQ which locates the device being called, and the second is the call setup which sends a request to the device asking it to accept the call. Each message shows up as a separate search in the Search History page, but only the Setup message will be associated with a particular call. Found Indicates whether or not the search was successful. True: the search was successful. False: the search was unsuccessful. For H.323 searches originating from external zones, an LRQ will appear in the search history. Destination For SIP, a single message is sent in order to place a call: this is the SIP INVITE. The alias that was dialed from the endpoint. This may be different from the alias to which the call was actually placed, as the original alias may have been transformed either locally or before the neighbor was queried. Filter Source To limit the list of calls, enter one or more characters in the Filter field and select Filter. Only those calls that contain (in any of the displayed fields) the characters you entered will be shown. The alias of the endpoint that initiated the call. To return to the full list of calls, click Reset. Introduction D14049.04 JULY 2008 Getting Started Overview and Status System Configuration VCS Configuration Zones and Neighbors Call Processing 38 Bandwidth Control Firewall Traversal Applications Maintenance Appendices Grey Headline (continued) Local Zone TANDBERG VIDEO COMMUNICATIONS SERVER ADMINISTRATOR GUIDE Viewing the Local Zone Page Understanding the Local Zone Page The Local Zone page lists all the subzones that together make up the Local Zone. This will always include the Default Subzone and the Traversal Subzone, plus any other subzones that you have created. Subzone Name The names of each subzone currently configured on this VCS. To view the Local Zone page: • Status > Local Zone Registrations The number of devices currently registered within each subzone. Note that devices cannot be registered to the Traversal Subzone. Bandwidth Used The total amount of bandwidth used by all calls passing through each subzone. Calls The number of calls currently passing through each subzone. Note that a single call may pass through more than one subzone, depending on the route it takes. For example, traversal calls from a locally registered endpoint will always pass through the Traversal Subzone, so they will show up twice; once in the originating subzone and once in the Traversal Subzone. Each subzone name is also a link to the configuration page for that subzone. To configure the subzone, click on the subzone name. Introduction D14049.04 JULY 2008 Getting Started Overview and Status System Configuration VCS Configuration Zones and Neighbors Call Processing 39 Bandwidth Control Firewall Traversal Applications Maintenance Appendices Grey Headline (continued) Zones TANDBERG VIDEO COMMUNICATIONS SERVER ADMINISTRATOR GUIDE Viewing the Zones Page Understanding the Zones Page The Zones status page lists all the zones that are currently configured on your VCS, the number of calls and amount of bandwidth being used by each, and their current status. Name The names of each zone currently configured on this VCS. The list of zones will always include the Default Zone, plus any other zones that you have created. Type To view the Zones page: The type of zone. • Status > Zones See About Zones for a full description of each zone type. Calls The number of calls currently passing out to or received in from each zone. Status The current status of each zone. Bandwidth Used The total amount of bandwidth used by all calls passing out to or received in from each zone. Each zone name is also a link to the configuration page for that zone. To configure the zone, click on the zone name. Note that this does not apply to the Default Zone, as this is not configurable. Introduction D14049.04 JULY 2008 Getting Started Overview and Status System Configuration VCS Configuration Zones and Neighbors Call Processing 40 Bandwidth Control Firewall Traversal Applications Maintenance Appendices Grey Headline (continued) Links TANDBERG VIDEO COMMUNICATIONS SERVER ADMINISTRATOR GUIDE Viewing the Links Page Understanding the Links Page The Links status page gives you an overview of all the links currently configured on your VCS, along with the number of calls and the bandwidth being used by each link. Name The name of each link. To view the Links status page: • Status > Links Calls The total number of calls currently traversing each link. Note that a single call may traverse more than one link, depending on how your system is configured. Bandwidth Used The total bandwidth of all the calls currently traversing each link. Each link name is also a hyperlink to the configuration page for that link. To configure the link, click on the link name. Introduction D14049.04 JULY 2008 Getting Started Overview and Status System Configuration VCS Configuration Zones and Neighbors Call Processing 41 Bandwidth Control Firewall Traversal Applications Maintenance Appendices Grey Headline (continued) Pipes TANDBERG VIDEO COMMUNICATIONS SERVER ADMINISTRATOR GUIDE Viewing the Pipes Page Understanding the Pipes Page The Pipes page provides a list of all the pipes currently configured on your VCS, along with the number of calls and the bandwidth being used by each pipe. Name The name of each pipe. Clicking on the name will take you to the Edit Pipe page, where you can configure the pipe. To view the Pipes status page: • Status > Pipes Calls The number of calls currently traversing each pipe. Note that a single call may traverse more than one pipe, depending on how your system is configured. Bandwidth Used The total bandwidth of all the calls currently traversing each pipe. Each pipe name is also a link to the configuration page for that pipe. To configure the pipe, click on the pipe name. Introduction D14049.04 JULY 2008 Getting Started Overview and Status System Configuration VCS Configuration Zones and Neighbors Call Processing 42 Bandwidth Control Firewall Traversal Applications Maintenance Appendices Grey Headline (continued) STUN Relays TANDBERG VIDEO COMMUNICATIONS SERVER ADMINISTRATOR GUIDE Viewing the STUN Relays Page Understanding the STUN Relays Page Client The STUN Relays page provides a list of all the currently active STUN Relays on the VCS. For each Relay, it shows the requesting client address and port and the corresponding VCS address and port. The IP address and port on the NAT (or the client if there is no NAT) from which the STUN Relay request has come. To view the STUN Relays page: • Status > STUN Relays Relay Address The IP address and port on the VCS that has been allocated for this particular relay request. Expiry Time The date and time at which the STUN Relay will become inactive. Creation Time The date and time on which the STUN Relay became active. STUN services are available on VCS Expressways only. Introduction D14049.04 JULY 2008 Getting Started Overview and Status System Configuration VCS Configuration Zones and Neighbors Call Processing 43 Bandwidth Control Firewall Traversal Applications Maintenance Appendices Grey Headline (continued) Applications TANDBERG VIDEO COMMUNICATIONS SERVER ADMINISTRATOR GUIDE Viewing the Applications Page Understanding the Applications Page Applications The Applications page shows the status of all external applications running on the VCS. Currently this includes: All Applications that are installed on the VCS are shown on the left. Their current status is shown on the right. • Presence • FindMe To view the Applications page: • Status > Applications Introduction D14049.04 JULY 2008 Getting Started Overview and Status System Configuration VCS Configuration Zones and Neighbors Call Processing 44 Bandwidth Control Firewall Traversal Applications Maintenance Appendices Grey Headline (continued) Warnings TANDBERG VIDEO COMMUNICATIONS SERVER ADMINISTRATOR GUIDE Viewing the Warnings Page Understanding the Warnings Page The Warnings page provides a list of all the warnings currently in place on your system. Warnings Each warning (and, where relevant, its proposed resolution), is listed here. Warnings occur when an event or configuration change has taken place on the VCS that requires some manual Administrator intervention, such as a reboot. When there are warnings in place on the VCS, a warning icon will appear at the top right of the page. System Warning To view the Warnings page, either: This icon appears on the top right corner of every page when there is a system warning in place. Click on this icon to go to the Warnings page which gives information about the warning and its suggested resolution. icon • click on the • Status > Warnings Introduction D14049.04 JULY 2008 Getting Started Overview and Status System Configuration VCS Configuration Zones and Neighbors Call Processing 45 Bandwidth Control Firewall Traversal Applications Maintenance Appendices Grey Headline (continued) Event Log TANDBERG VIDEO COMMUNICATIONS SERVER ADMINISTRATOR GUIDE Viewing the Event Log Page Understanding the Event Log Page The Event Log page allows you to view and search the event log, which is a list of all the events that have occurred on your system since the last upgrade. The event log visible on the web UI holds a maximum 40 MB of data; once this size is reached, the oldest entries will be overwritten. Search for To view the Event Log page: To return to the complete Event Log listing, click Reset. This field allows you to filter the event log. Enter the text you wish to search for and click Filter. Only those events that contain the text you entered will then be shown. • Status > Logs > Event Log You can also view the Event Log via the CLI: Reconfigure the log settings • eventlog Clicking this link will take you to the Logging configuration page. From this page, you can determine the level of events that are recorded in the Event Log, and also set up a remote server to which the Event Log can be copied. Results This section shows all the events, with the most recent being shown first. Most tvcs events contain hyperlinks in one or more of the fields (such fields will change color when you hover over them). You can click on the hyperlink to show only those events that contain the same text string. Event Log Color Coding Certain events in the Event Log are color-coded so that you can identify them more easily. These events are as follows: Green Orange Red • System Start • Installation of - • System Shutdown • Registration Rejected • Registration Refresh Rejected • Call Rejected • License Limit Reached • Decode Error • TLS Negotiation Error • External Server Communications succeeded • Registration Accepted • Call Connected • Request Successful • Beginning System Restore • Completed System Backup • Completed System Restore Introduction D14049.04 JULY 2008 Getting Started Overview and Status System Configuration Failure • Application Failed • Request Failed • System Backup error • System Restore error VCS Configuration Zones and Neighbors Call Processing 46 Bandwidth Control For example, clicking on the text that appears after Event= will filter the list to show all the events of that particular type. Likewise, clicking on a particular Call-Id will show just those events that contain a reference to that particular call. Event Log Levels You can configure the amount of detail that appears in the Event Log. See Setting the Event Log Level for more information. Firewall Traversal Applications Maintenance Appendices Grey Headline (continued) Event Log TANDBERG VIDEO COMMUNICATIONS SERVER ADMINISTRATOR GUIDE Interpreting the Event Log Event Log Format The event log is displayed in an extension of the UNIX syslog format: date time process _ name: message _ details where: Field Description date the local date on which the message was logged time the local time at which the message was logged process _ name the name of the program generating the log message. This could include: tvcs for all messages originating from TANDBERG VCS processes web[ ] for all web login and configuration events. but will differ for messages from third party processes which are used in the VCS product message _ details Introduction D14049.04 JULY 2008 the body of the message (see Message details field for further information) Getting Started Overview and Status System Configuration VCS Configuration Zones and Neighbors Call Processing 47 Bandwidth Control Firewall Traversal Applications Maintenance Appendices Grey Headline (continued) Event Log TANDBERG VIDEO COMMUNICATIONS SERVER ADMINISTRATOR GUIDE Interpreting the Event Log Message Details Field For all messages logged from the tvcs process, the message _ details field, which contains the body of the message, consists of a number of human-readable name=value pairs, separated by a space. The first field within the message _ details field is always Event and the last field is always Level. The table below shows all the possible fields within the message _ details field, in the order that they would normally appear, along with a description of each. In addition to the events described below, a syslog.info event containing the string MARK will be logged after each hour of inactivity to provide confirmation that logging is still active. Field Description Field Description Event The event which caused the log message to be generated. See Events and Levels for a list of all events that are logged by the VCS, and the level at which they are logged. Src-port Specifies the source port: the IP port of the device attempting to establish communications. User The username that was entered when a login attempt was made. Src-Alias ipaddr The source IP address of the user who has logged in. If present, the first H.323 Alias associated with the originator of the message. If present, the first E.164 Alias associated with the originator of the message. Protocol Specifies which protocol was used for the communication. Valid values are: Dst-Alias • TCP • UDP • TLS. If present, the first H.323 Alias associated with the recipient of the message. If present, the first E.164 Alias associated with the recipient of the message. Detail Descriptive detail of the Event. Whether the call attempt has been authenticated successfully. Reason Auth Textual string containing any reason information associated with the event. Method SIP method (INVITE, BYE, UPDATE, REGISTER, SUBSCRIBE, etc). Service Specifies which protocol was used for the communication. Will be one of: Contact Contact: header from REGISTER. AOR Address of record. Call-Id The Call-ID header field uniquely identifies a particular invitation or all registrations of a particular client. Call-SerialNumber The VCS-local Call Serial Number that is common to all protocol messages for a particular call. Tag The Tag is common to all searches and protocol messages across a VCS network for all forks of a call. • H323 • SIP • H.225 • H.245 • LDAP • Q.931 • NeighbourGatekeeper • Clustering • ConferenceFactory. Message Type Specifies the type of the message. To (for REGISTER requests): the AOR for the REGISTER request. ResponseCode SIP response code or, for H.323 and interworked calls, a SIP equivalent response code. RequestURI The SIP or SIPS URI indicating the user or service to which this request is being addressed. Src-ip Specifies the source IP address (the IP address of the device attempting to establish communications). This can be an IPv4 address or an IPv6 address. NumBytes The number of bytes sent/received in the message. Dst-ip Request/granted registration expiry duration. Specifies the destination IP address (the IP address of the destination for a communication attempt). The destination IP is recorded in the same format as Src-ip. Duration Time Dst-port A full UTC timestamp in YYYY/MM/DD-HH:MM:SS format. Using this format permits simple ASCII text sorting/ordering to naturally sort by time. This is included due to the limitations of standard syslog timestamps. Specifies the destination port: the IP port of the destination for a communication attempt. Level The level of the event as defined in Log Levels. Introduction D14049.04 JULY 2008 Getting Started Overview and Status System Configuration VCS Configuration Zones and Neighbors Call Processing 48 Bandwidth Control Firewall Traversal Applications Maintenance Appendices Grey Headline (continued) Event Log TANDBERG VIDEO COMMUNICATIONS SERVER ADMINISTRATOR GUIDE Events and Levels Event Description Admin Session Finish An administrator has logged off the system. Level 1 Admin Session Login Failure An unsuccessful attempt has been made to log in as an administrator. This could be because an incorrect username or password (or both) was entered. 1 Admin Session Start An administrator has logged onto the system. 1 Application Failed The VCS application is out of service due to an unexpected failure. 1 Application Start The VCS has started. Further detail may be provided in the Detail event parameter. 1 Application Warning Beginning System Backup The VCS application is still running but has experienced a recoverable problem. Further detail may be provided in the Detail event parameter. 1 A system backup has started. 1 Beginning System Restore A system restore has started. 1 Call Answer Attempted An attempt to answer a call has been made. 1 Call Attempted A call has been attempted. 1 Call Connected A call has been connected. 1 Call Diverted A call has been diverted. 1 Call Disconnected A call has been disconnected. 1 Call Rejected Completed System Backup A call has been rejected. The Reason event parameter contains a textual representation of the H.225 additional cause code. 1 A system backup has completed. 1 Completed System restore A system restore has completed. 1 Decode Error A syntax error was encountered when decoding a SIP or H.323 message. 1 Eventlog Cleared An operator cleared the event log. 1 External Server Communication Failure Communication with an external server failed unexpectedly. The Detail event parameter should differentiate between ‘no response’ and ‘request rejected’. Servers concerned are: 1 • DNS • LDAP servers • Neighbor Gatekeeper • NTP servers • Peers Hardware Failure There is an issue with the VCS hardware. If the problem persists, contact your TANDBERG support representative. 1 License Limit Reached Licensing limits for a given feature have been reached. The Detail event parameter specifies the facility/limits concerned. Possible values for the detail field are: 1 • Non Traversal Call Limit Reached • Traversal Call Limit Reached Introduction D14049.04 JULY 2008 Getting Started Overview and Status System Configuration VCS Configuration Zones and Neighbors Call Processing 49 Bandwidth Control Firewall Traversal Applications Maintenance Appendices Grey Headline (continued) Event Log TANDBERG VIDEO COMMUNICATIONS SERVER ADMINISTRATOR GUIDE Events and Levels Event Description Message Received An incoming RAS message has been received. Level 2 Message Received An incoming RAS NSM Keepalive, H.225 or H.245 message has been received. 3 Message Received (SIP) An incoming message has been received. 4 Message Rejected This could be for one of two reasons: 1 1. The VCS Authentication mode is set to On, and an endpoint has unsuccessfully attempted to send a message (such as a registration request) to the VCS. This could be either because the endpoint has not supplied any authentication credentials, or because its credentials do not match those expected by the VCS. 2. Clustering is enabled but bandwidth across the cluster has not been configured identically, and the VCS has received a message relating to an unknown Peer, Link, Pipe, Subzone or Zone. Use TMS to synchronize configuration across Peers. Message Sent An outgoing RAS message has been sent. 2 Message Sent An outgoing RAS NSM Keepalive, H.225 or H.245 message has been sent. 3 Message Sent (SIP) An outgoing message has been sent. 4 Policy Change A policy file has been updated. 1 Registration Accepted A registration request has been accepted. 1 Registration Refresh Accepted A request to refresh or keep a registration alive has been accepted. 3 A request to refresh a registration has been rejected. 1 A request to refresh or keep a registration alive has been received. 3 Registration Rejected A registration request has been rejected. The Reason event parameter contains the H.225 cause code. Optionally, the Detail event parameter may contain a textual representation of the H.225 additional cause code. 1 Registration Removed A registration has been removed by the VCS. The Reason event parameter specifies the reason why the registration was removed. This is one of: 1 Registration Refresh Rejected Registration Refresh Requested • Authentication change • Conflicting zones • Operator forced removal • Operator forced removal (all registrations removed) • Registration superseded. Registration Requested A registration has been requested. 1 Request Received A call-related SIP request has been received. 2 Request Received A non-call-related SIP request has been received. 3 Introduction D14049.04 JULY 2008 Getting Started Overview and Status System Configuration VCS Configuration Zones and Neighbors Call Processing 50 Bandwidth Control Firewall Traversal Applications Maintenance Appendices Grey Headline (continued) Event Log TANDBERG VIDEO COMMUNICATIONS SERVER ADMINISTRATOR GUIDE Events and Levels Event Description Request Sent A call-related SIP request has been sent. Level 2 Request Sent A non-call-related SIP request has been sent. 3 Response Received A call-related SIP response has been received. 2 Response Received A non-call-related SIP response has been received. 3 Response Sent A call-related SIP response has been sent. 2 Response Sent A non-call-related SIP response has been sent. 3 System Backup error An error has occurred while attempting a system backup. 1 System Configuration Changed An item of configuration on the system has changed. The Detail event parameter contains the name of the changed configuration item and its new value. 1 System Restore error An error has occurred while attempting a system restore. 1 System Shutdown The operating system was shutdown. 1 System snapshot started A system snapshot has been initiated. 1 System snapshot completed A system snapshot has completed. 1 System Start The operating system has started. 1 TLS Negotiation Error Transport Layer Security (TLS) connection failed to negotiate. 1 Unregistration Accepted An unregistration request has been accepted. 1 Unregistration Rejected An unregistration request has been rejected. 1 Unregistration Requested An unregistration request has been received. 1 User session finish A FindMe user has logged out of the system. 1 User session Login failure An unsuccessful attempt has been made to log in as a FindMe user. This could be because either an incorrect username or password (or both) was entered. 1 User session start A FindMe user has logged on to the system. 1 Introduction D14049.04 JULY 2008 Getting Started Overview and Status System Configuration VCS Configuration Zones and Neighbors Call Processing 51 Bandwidth Control Firewall Traversal Applications Maintenance Appendices Grey Headline (continued) Configuration Log TANDBERG VIDEO COMMUNICATIONS SERVER ADMINISTRATOR GUIDE Viewing the Configuration Log Page Understanding the Configuration Log Page Types of Configuration Events The Configuration Log page allows you to view and search login and configuration activities triggered via the VCS web interface. It shows all web login attempts for administrators and Findme users (both failed and successful), and all changes to the VCS configuration made via the web UI. The configuration log visible via the web UI holds a maximum of 4 MB of data; once this size is reached, the oldest entries will be overwritten. Administrator sessions Will be one of the following Events: • Admin • Admin • Admin Session Start Session Finish Session Login Failure To view the Configuration Log page: FindMe User sessions • Status > Logs > Configuration Log Will be one of the following Events: • User • User • User Search for This field allows you to filter the configuration log. Enter the text you wish to search for and click Filter. Only those web-based events that contain the text you entered will then be shown. Session Login Failure • the name of the administrator or FindMe user to whom the session relates, and their IP Address • the date and time that the login was Results attempted, started, or ended. This section shows all the web-based events, with the most recent being shown first. Configuration changes Most events contain hyperlinks in one or more of the fields (such fields will change color when you hover over them). You can click on the hyperlink to automatically filter the search so that only those events that contain that same text string are shown. For example, clicking on the text that appears after Event= will filter the list to show all the events of that particular type. Likewise, clicking on a particular user will show just those events relating to that particular administration account. D14049.04 JULY 2008 Session Finish For both of the above types of session, the Detail field for each of these events will include: To return to the complete Configuration Log listing, click Reset. Introduction Session Start Getting Started Overview and Status Changes to the VCS configuration made by administrators via the web UI will have an Event field of System Configuration Changed. The Detail field of each of these events will give: All events that appear in the Configuration Log are also recorded in the Event Log. They are all recorded as Level 1 Events, so any changes to the Logging Levels will not affect their presence in the Configuration Log. System Configuration VCS Configuration Zones and Neighbors Call Processing 52 Bandwidth Control Firewall Traversal • the configuration item that was affected • what it was changed from and to • the name of the administrator user who made the change, and their IP Address • the date and time that the change was made. Applications Maintenance Appendices Grey Headline (continued) TANDBERG VIDEO COMMUNICATIONS SERVER ADMINISTRATOR GUIDE System Configuration This section describes all the options that appear under the System Configuration menu of the web interface. These options enable you to configure the VCS in relation to the network in which it is located, for example its IP settings and the external services used by the VCS (e.g. DNS, NTP and SNMP). Introduction D14049.04 JULY 2008 Getting Started Overview and Status System Configuration VCS Configuration Zones and Neighbors Call Processing 53 Bandwidth Control Firewall Traversal Applications Maintenance Appendices Grey Headline (continued) System Administration TANDBERG VIDEO COMMUNICATIONS SERVER ADMINISTRATOR GUIDE Configuration Overview System name To configure the VCS’s system administration settings: Defines the name of the VCS. Choose a name that uniquely identifies the system. • System Configuration > System. You will be taken to the System Administration page. • xConfiguration • xConfiguration Session time out (minutes) SystemUnit Nam e Sets the number of minutes that an administration session (HTTPS, Telnet or SSH) may be inactive before the session is timed out. A value of 0 turns session time outs off. Administration About the System Name The system name is used to identify the VCS. It appears in various places in the web interface, and in the display on the front panel of the unit (so that you can identify it when it is in a rack with other systems). The system name is also used by TANDBERG’s TMS. Telnet service Determines whether the VCS can be accessed via Telnet. SSH service If no system name is specified, the LAN1 IPv4 address will be shown instead. Determines whether the VCS can be accessed via SSH and SCP. We recommend that you give the VCS a name that allows you to easily and uniquely identify it. HTTP service On: HTTP calls will be redirected to the HTTPS port. Off: no HTTP access will be available. About Administrator Access settings While it is possible to administer the TANDBERG VCS via a PC connected directly to the unit via a serial cable, you may wish to access the system remotely over IP. HTTPS service Determines whether the VCS can be accessed via the web server. This must be On to enable both web interface and TMS access. You can do this using either or both: • the web interface via HTTPS • a command line interface via SSH or Telnet. By default, access via HTTPS and SSH is enabled; access via Telnet is disabled. You can also enable access via HTTP. However, this mode works by redirecting HTTP calls to the HTTPS port, so HTTPS must also be enabled for access via HTTP to function. Introduction D14049.04 JULY 2008 Getting Started Overview and Status Save Restart Click here to save your changes. Click here to restart the system. You must save your changes and restart the system for any changes made via this page (apart from the Session time out) to take effect. System Configuration VCS Configuration ! Zones and Neighbors TMS accesses the VCS via the web server. If HTTPS mode is turned off, TMS will not be able to access it. Call Processing 54 Bandwidth Control By default, access via HTTPS and SSH is enabled; access via Telnet is disabled. To securely manage the VCS you should disable Telnet, using the encrypted HTTPS and SSH protocols instead. For further security, disable HTTPS and SSH as well and use the serial port to manage the system. ! Firewall Traversal Applications Maintenance Appendices Grey Headline (continued) Ethernet TANDBERG VIDEO COMMUNICATIONS SERVER ADMINISTRATOR GUIDE Configuration Overview To configure the VCS’s Ethernet settings: Ethernet speed • System Configuration >Ethernet. You will be taken to the Ethernet page. Sets the speed of the connection between the VCS and the ethernet switch. • xConfiguration If you have the Dual Network Interfaces option key installed, you will be able to configure this for both LAN1 and LAN2. Ethernet About Ethernet Speed The Ethernet speed setting determines the speed of the connection between the VCS and the ethernet switch. It must be set to the same value on both systems. The default is Auto, which means that the two systems will auto-negotiate the appropriate speed. We recommend that you do not change from the default value of Auto unless the switch to which you are connecting is unable to auto-negotiate. A mismatch in Ethernet speed settings between the VCS and ethernet switch will at best result in packet loss; at worst it will make the system inaccessible for endpoints and system administrators. ! You must save your changes and restart the system for changes made via this page to take effect. Restart Click here to restart the system. Save Click here to save your changes. Introduction D14049.04 JULY 2008 Getting Started Overview and Status System Configuration VCS Configuration Zones and Neighbors Call Processing 55 Bandwidth Control Firewall Traversal Applications Maintenance Appendices Grey Headline (continued) IP TANDBERG VIDEO COMMUNICATIONS SERVER ADMINISTRATOR GUIDE IP Configuration Overview To configure the VCS’s IP settings: IP protocol • System Configuration > IP. You will be taken to the IP page. You can configure the VCS to use IPv4, IPv6 or Both protocols. The default is Both. • xConfiguration • xConfiguration IPv4: The VCS will only accept registrations from endpoints using an IPv4 address, and will only take calls between two endpoints communicating via IPv4. It will communicate with other systems via IPv4 only. IP IPProtocol About IPv4 to IPv6 Gatewaying IPv6: The VCS will only accept registrations from endpoints using an IPv6 address, and will only take calls between two endpoints communicating via IPv6. It will communicate with other systems via IPv6 only. The VCS can act as a gateway between IPv4 and IPv6 calls. To enable this feature, select an IP Protocol of Both. Both: The VCS will accept registrations from endpoints using either an IPv4 or IPv6 address, and will take calls using either protocol. If a call is between an IPv4-only and an IPv6-only endpoint, the VCS will act as an IPv4 to IPv6 gateway. It can communicate with other systems via either protocol. Some endpoints support both IPv4 and IPv6, however an endpoint can use only one protocol when registering with the VCS. Which protocol it uses will be determined by the format used to specify the IP address of the VCS on the endpoint. Once the endpoint has registered using one protocol, calls to it from an endpoint using the other protocol will be gatewayed by the VCS. IPv4 gateway Specifies the default IPv4 gateway of the VCS. About IP Routes The options on this page allow you to set the default IPv4 and IPv6 gateways used by the VCS. This is the gateway to which IP requests are sent for IP addresses that do not fall within the VCS’s local subnet. However, you can also configure additional IP routing information on the VCS. This is sometimes required when using the Dual Network Interfaces option and occasionally required in other complex network deployments. You can configure routes for up to 50 networks and host combinations. IPv6 gateway Specifies the default IPv6 gateway of the VCS. Restart Click here to restart the system. Save IP routes are configured via the CLI only using: • xConfiguration IP Route • xCommand RouteAdd Introduction D14049.04 JULY 2008 Getting Started Calls for which the VCS is acting as an IPv4 to IPv6 gateway are traversal calls. They will therefore require a traversal call licence. Overview and Status System Configuration VCS Configuration Zones and Neighbors Call Processing 56 Bandwidth Control Firewall Traversal You must save your changes and restart the system for changes to take effect. Click here to save your changes. Applications Maintenance Appendices Grey Headline (continued) LAN TANDBERG VIDEO COMMUNICATIONS SERVER ADMINISTRATOR GUIDE LAN Configuration Overview IPv4 address To configure the VCS’s LAN 1 and LAN 2 ethernet port settings: Specifies the IPv4 IP address of the VCS’s LAN1 port. • System Configuration > IP. You will be taken to the IP page. • xConfiguration Ethernet The VCS is shipped with a default IP address for LAN 1 of 192.168.0.100. This allows you to connect the VCS to your network and access it via the default address so that you can configure it remotely. IPv4 subnet mask About LAN Configuration IPv6 address Specifies the IPv4 subnet mask of the VCS’s LAN1 port. Specifies the IPv6 address of the VCS’s LAN1 port. LAN 1 is the primary network port on the VCS. You can configure the IPv4 address and subnet mask, and IPv6 address for this port. In addition, if you have the Dual Network Interface option key installed, you will also be able to configure the LAN 2 port. If you have the Dual Network Interfaces option key installed, you will also be able to configure the IPv4 address, IPv4 subnet mask and IPv6 address for the LAN2 port via this page. About Dual Network Interfaces The Dual Network Interface option enables the LAN 2 port on the VCS for both management and call signaling. This allows you to have a secondary IP address for your VCS. This configuration is intended for high-security deployments where the VCS is located in a DMZ between two separate firewalls on separate network segments. In such deployments, routers prevent devices on the internal network from being able to route IP traffic to the public internet, and instead the traffic must pass through an application proxy such as the VCS. Restart Click here to restart the system. Save Click here to save your changes. To enable this feature you must purchase and install the appropriate Option Key. Contact your TANDBERG representative for information. Introduction D14049.04 JULY 2008 Getting Started Overview and Status You must save your changes and restart the system for changes to take effect. System Configuration VCS Configuration Zones and Neighbors Call Processing 57 Bandwidth Control Firewall Traversal Applications Maintenance Appendices Grey Headline (continued) DNS TANDBERG VIDEO COMMUNICATIONS SERVER ADMINISTRATOR GUIDE Configuration Overview About DNS Servers To configure the VCS’s DNS settings: You must specify at least one DNS server to be queried for address resolution if you wish to either: • use FQDNs (Fully Qualified Domain Names) instead of IP • System Configuration > DNS. You will be taken to the DNS page. • xConfiguration IP DNS addresses when specifying external addresses (for example for LDAP and NTP servers, neighbor zones and alternates), or Address 1 to Address 5 • use features such as URI dialing or ENUM dialing. Sets the IP address of a DNS server to be queried when resolving domain names. You can specify up to 5 DNS servers. The VCS sends requests to all configured servers in parallel taking the first result received and discounting the rest. This can lead to confusing behavior should local network administrators, for example, deploy ‘split horizon’ DNS where records held on an internal, corporate, DNS server use the same domain names but with different values to those on the public internet - an often used tactic in corporate intranets. ! About the DNS Domain Name Domain name The DNS Domain Name is used when attempting to resolve server addresses configured on the VCS that are without any form of qualification (e.g. ldap or ldap_server but not ldap.server). It applies only to the following: Specifies the name to be appended to an unqualified server address before a query to the DNS server is executed. • LDAP server • NTP server • External Manager server • Remote logging server. The DNS Domain Name is appended to the unqualified server address before a query to the DNS server is executed. If the server address is an IP address or is in the format of a domain name, DNS will only be queried for the server address as configured, without the DNS Domain Name appended. For this reason we recommend that all server addresses use an IP address or FQDN (Fully Qualified Domain Name). Save Click here to save your changes. The DNS Domain name plays no part in URI dialing. Introduction D14049.04 JULY 2008 Getting Started Overview and Status System Configuration VCS Configuration Zones and Neighbors Call Processing 58 Bandwidth Control Firewall Traversal Applications Maintenance Appendices Grey Headline (continued) NTP TANDBERG VIDEO COMMUNICATIONS SERVER ADMINISTRATOR GUIDE Configuration Overview To configure the VCS’s NTP settings: NTP server • System Configuration > NTP You will be taken to the NTP page. Sets the IP address or FQDN (or server address, if a DNS Domain Name has also been configured) of the NTP server to be used when synchronizing system time. • xConfiguration • xConfiguration NTP Address TimeZone Nam e About the NTP Server The NTP server is a remote server with which the VCS synchronizes in order to ensure its time setting is accurate. The NTP server provides the VCS with UTC time. Accurate timestamps play an important part in authentication, helping to guard against replay attacks. For this reason, if you are using authentication, both the VCS and the endpoints must use an NTP server to synchronize their system time. Traversal clients must always authenticate with traversal servers, even if the server’s Authentication Mode is Off. Therefore in order for a traversal client and traversal server to connect to each other, both must be configured with details of an NTP server. Time zone Sets the local time zone of the VCS. About the Time Zone The NTP server provides the VCS with UTC time. You can also determine the local time to be used on your system by configuring the Time Zone. This takes the UTC time and offsets it by the number of hours specified by the selected time zone to make the local time. The local time is used throughout the web UI and to set the timestamp that appears at the start of each line in the Event Log. Introduction D14049.04 JULY 2008 Getting Started Overview and Status System Configuration Save Click here to save your changes. VCS Configuration Zones and Neighbors Call Processing 59 Bandwidth Control Firewall Traversal Applications Maintenance Appendices Grey Headline (continued) SNMP TANDBERG VIDEO COMMUNICATIONS SERVER ADMINISTRATOR GUIDE Configuration Overview About SNMP Tools such as TANDBERG Management Suite (TMS) or HP OpenView may act as SNMP Network Management Systems (NMS). They allow you to monitor your network devices, including the VCS, for conditions that might require administrative attention. To configure the VCS’s SNMP settings: Enabled • System Configuration > SNMP You will be taken to the SNMP page. Select On to enable SNMP support. • xConfiguration SNMP You must save your changes and restart the system for any changes to take effect. The VCS supports the most basic MIB-II tree (.1.3.6.1.2.1) as defined in RFC 1213 [23]. The information made available by the VCS includes the following: • system uptime • system name • location • contact • interfaces • disk space, memory, and other machinespecific statistics. SNMP community name Sets the VCS’s SNMP community name. System contact To allow the VCS to be monitored by an SNMP NMS (including TMS), you must Enable SNMP on the VCS and provide the name of the SNMP community within which it resides. You may optionally provide the name of a System contact and the physical Location of the system for reference by administrators when following up on queries. Specifies the name of the person who can be contacted regarding issues with the VCS. Location Specifies the physical location of the VCS. By default, SNMP is Disabled with a SNMP community name of public. The VCS does not support SNMP traps or SNMP sets, therefore it cannot be managed via SNMP. Restart Click here to restart the system. SNMP is disabled by default, because of the potentially sensitive nature of the information involved. Do not enable SNMP on a VCS on the public internet or in any other environment where you do not want to expose internal system information. ! Introduction D14049.04 JULY 2008 Getting Started Overview and Status Save Click here to save your changes. System Configuration VCS Configuration Zones and Neighbors Call Processing 60 Bandwidth Control Firewall Traversal Applications Maintenance Appendices Grey Headline (continued) External Manager TANDBERG VIDEO COMMUNICATIONS SERVER ADMINISTRATOR GUIDE Configuration Overview To configure the VCS’s External Manager settings: Address Sets the IP address or FQDN (or server address, if a DNS Domain Name has also been configured) of the External Manager. • System Configuration > External Manager. You will be taken to the External Manager page. • xConfiguration ExternalManager About the External Manager An External Manager is a remote system, such as the TANDBERG Management Suite (TMS), used to monitor events occurring on the VCS, for example call attempts, connections and disconnections. Path Sets the path of the External Manager. The use of an External Manager is optional. In order to use an External Manager, you must configure the VCS with the IP address or host name and path of the External Manager to be used. If you are using TMS as your external manager, use the default path of tms/public/external/management/ SystemManagementService.asmx. Save Click here to save your changes. Introduction D14049.04 JULY 2008 Getting Started Overview and Status System Configuration VCS Configuration Zones and Neighbors Call Processing 61 Bandwidth Control Firewall Traversal Applications Maintenance Appendices Grey Headline (continued) Logging TANDBERG VIDEO COMMUNICATIONS SERVER ADMINISTRATOR GUIDE Remote Logging Overview About Logging About Remote Logging Enabling Remote Logging The VCS provides an event logging facility for troubleshooting and auditing purposes. The event log records information about such things as calls, registrations, and messages sent and received. The event log is always stored locally on the VCS. However, it is often convenient to collect copies of all event logs from various systems in a single location. A computer running a BSD-style syslog server, as defined in RFC 3164 [4], may be used as the central log server. To enable remote logging, you must configure the VCS with the address of the central log server to which the event log will be copied. To do this: The VCS logging facility allows you to: • System Configuration > Logging. You will be taken to the Logging page. Log Server Address • xConfiguration • specify the amount of information that is logged. This is done by changing the event log level • copy the event log to a remote syslog server. A VCS will not act as a central logging server for other systems. Events will be always logged locally (i.e. to the Event Log) regardless of whether or not remote logging has been enabled. Remote syslog server Enter the IP address or FQDN (or server address, if a DNS Domain Name has also been configured) of the server to which the log will be written. This server must support the BSD syslog protocol. It cannot be another VCS. Save Click here to save your changes. View the Event Log Clicking on this link will take you to the Event Log page, which displays the Event Log. Introduction D14049.04 JULY 2008 Getting Started Overview and Status System Configuration VCS Configuration Zones and Neighbors Call Processing 62 Bandwidth Control Firewall Traversal Applications Maintenance Appendices Grey Headline (continued) Logging TANDBERG VIDEO COMMUNICATIONS SERVER ADMINISTRATOR GUIDE Log Levels About Event Log Levels Setting the Event Log Level All events have an associated level in the range 1-4, with level 1 events considered the most important. The table below gives an overview of the levels assigned to different events. You can control which events are logged by the VCS by setting the log level. All events with a level numerically equal to and lower than the specified logging level are recorded in the event log. So, at Level 1, only Level 1 events are logged; at Level 2, both Level 1 and Level 2 events are logged, etc. See Events and Levels for a list of all events that are To set the log level: logged by the VCS, and the level at which they are logged. • System Configuration > Logging. Log level • xConfiguration Assigned Events Level 1 High-level events such as registration requests and call attempts. Easily human readable. For example: Log Level • call attempt/connected/disconnected • registration attempt/accepted/rejected. Level 2 Changes to the event log level are not retrospective. If you change the event log level, it will only effect what is logged from that point onwards. All Level 1 Events, plus: • Logs of protocol messages sent and received (H.323, LDAP, etc.) excluding noisy messages such as H.460.18 keepalives and H.245 video fast-updates. Level 3 The default is 1. Changes to the event log level affect both the event log that you can view via the web interface, and the information that is copied to the remote log server (if any) that you have configured. You will be taken to the Logging page. Level Select the level of logging you require. All Level 1 and Level 2 Events, plus: • Protocol keepalives Level 4 All Level 1, Level 2 and Level 3 Events, plus: • SIP messages Save Click here to save your changes. We do not usually recommend logging at Level 3 or Level 4, as the Event Log holds a maximum of 40 MB of data and logging at these levels on a busy system could cause the Event Log to be recycled too quickly. ! Introduction D14049.04 JULY 2008 Getting Started Overview and Status System Configuration View the Event Log Clicking on this link will take you to the Event Log page, where you can view and search the Event Log. VCS Configuration Zones and Neighbors Call Processing 63 Bandwidth Control Firewall Traversal Applications Maintenance Appendices Grey Headline (continued) TANDBERG VIDEO COMMUNICATIONS SERVER ADMINISTRATOR GUIDE VCS Configuration This section provides information on the pages that appear under the Protocols, Registrations and Authentication sub-menus of the VCS Configuration menu. These pages allow you to configure the functionality of the VCS in each of these areas. This section includes the following information: • an overview of H.323 and the H.323 configuration options available on the VCS • an overview of SIP and the SIP configuration options available on the VCS • how to configure the VCS to act as a SIP to H.323 gateway • how to control registrations on the VCS using authentication and Allow Lists and Deny Lists. Introduction D14049.04 JULY 2008 Getting Started Overview and Status System Configuration VCS Configuration Zones and Neighbors Call Processing 64 Bandwidth Control Firewall Traversal Applications Maintenance Appendices Grey Headline (continued) H.323 TANDBERG VIDEO COMMUNICATIONS SERVER ADMINISTRATOR GUIDE H.323 Overview H.323 Endpoint Registration About H.323 on the VCS Overview Auto Discover The VCS supports the H.323 protocol: it is an H.323 gatekeeper. It will also provide interworking between H.323 and SIP, translating between the two protocols to enable endpoints that only support one of these protocols to call each other. In order to support H.323, the H.323 mode must be enabled. H.323 endpoints in your network must register with the VCS in order to use it as their gatekeeper. The VCS has an Auto Discover setting which determines whether it will respond to the Gatekeeper Discovery Requests sent out by endpoints. There are two ways an H.323 endpoint can locate a VCS with which to register: manually or automatically. The option is configured on the endpoint itself under the Gatekeeper Discovery setting (consult your endpoint manual for how to access this setting). To prevent H.323 endpoints being able to register automatically with the VCS, set Auto Discover to Off. This will mean that endpoints will be able to register with the VCS only if they have been configured with the VCS’s IP address. • If the mode is set to automatic, the endpoint will try to Using the VCS as an H.323 Gatekeeper As an H.323 gatekeeper, the VCS accepts registrations from H.323 endpoints and provides call control functions such as address translation and admission control. register with any VCS it can find. It does this by sending out a Gatekeeper Discovery Request, to which eligible VCSs will respond. • If the mode is set to manual, you must specify the IP address of the VCS with which you wish your endpoint to register, and the endpoint will attempt to register with that VCS only. Registration Conflict Mode An H.323 endpoint may attempt to register with the VCS using an alias that has already been registered on the VCS from another IP address. The reasons for this could include: • two endpoints at different IP addresses are attempting to Time to Live H.323 endpoints must periodically re-register with the VCS in order to confirm that they are still functioning. The VCS allows you to configure the interval (in seconds) between these reregistrations, known as the Time to Live. Some older endpoints do not support the ability to periodically re-register with the system. In this case, and in any other situation where the system has not had a confirmation from the endpoint within the specified period, it will send an IRQ to the endpoint to verify that it is still functioning. register using the same alias • a single endpoint has previously registered using a particular Configuring H.323 Ports The VCS allows you to configure the listening port for H.323 registrations and call signaling, and the range of ports to be used by H.323 calls once they are established. The default VCS configuration uses standard port numbers so you can use H.323 services out of the box without having to first set these up. alias. The IP address allocated to the endpoint then changes, and the endpoint is attempting to re-register using the same alias. You can determine how the VCS will behave in this situation by configuring the Registration Conflict Mode. The options are: Call Time to Live • Reject: denies the new registration. • Overwrite: deletes the original registration and replaces it The VCS allows you to configure the interval (in seconds) at which the endpoints are polled, known as the Call Time to Live. Once the endpoint is in a call, the VCS will periodically poll it to confirm whether it is still in the call. If the endpoint does not respond, the call will be disconnected. with the new registration. The system will poll endpoints in a call regardless of whether the call type is traversal or non-traversal. Introduction D14049.04 JULY 2008 Getting Started Overview and Status System Configuration VCS Configuration Zones and Neighbors Call Processing 65 Bandwidth Control Firewall Traversal Applications Maintenance Appendices Grey Headline (continued) H.323 TANDBERG VIDEO COMMUNICATIONS SERVER ADMINISTRATOR GUIDE Configuring H.323 To configure the VCS’s H.323 settings: Registration conflict mode • VCS Configuration > Protocols > H.323. You will be taken to the H.323 page. • xConfiguration H323 Determines how the system will behave if an endpoint attempts to register an alias currently registered from another IP address. H.323 Mode Overwrite: deletes the original registration and replaces it with the new registration. Reject: denies the registration. The default is Reject. Determines whether or not the VCS will provide H.323 gatekeeper functionality. Registration UDP port Specifies the port to be used for H.323 UDP registrations. The default is 1719. Time to live Call signaling TCP port Specifies the interval (in seconds) at which an H.323 endpoint must re-register with the VCS in order to confirm that it is still functioning. Specifies the port that listens for H.323 call signaling. The default is 1800. The default is 1720. Call time to live Specifies the interval (in seconds) at which the VCS polls the endpoints in a call to verify that they are still in the call Call signaling port range start Specifies the lower port in the range to be used by H.323 calls once they are established. The default is 120. The default is 15000. Auto discover Call signaling port range end Specifies the upper port in the range to be used by H.323 calls once they are established. Determines whether or not the VCS responds to gatekeeper discovery requests from endpoints. The default is 19999. The default is On. ! Save The call signalling port range must be great enough to support all the required concurrent calls. Introduction D14049.04 JULY 2008 Getting Started Overview and Status Click here to save your changes. System Configuration VCS Configuration Zones and Neighbors Call Processing 66 Bandwidth Control Firewall Traversal Applications Maintenance Appendices Grey Headline (continued) SIP TANDBERG VIDEO COMMUNICATIONS SERVER ADMINISTRATOR GUIDE SIP Overview About SIP on the VCS Using the VCS as a SIP Registrar SIP Registration Expiry The VCS supports the SIP protocol. It can act as a: In order for a SIP endpoint to be contactable via its registered alias, it must register its location with a SIP Registrar. The VCS can act as a SIP Registrar for up to 20 domains. SIP endpoints must periodically re-register with the SIP Registrar in order to prevent their registration expiring. You can configure the interval with which SIP endpoints must register with the VCS. • SIP Registrar • SIP Proxy • SIP Presence Server. The VCS will provide interworking between SIP and H.323 calls. In order to support SIP, SIP mode must be enabled and at least one of the SIP transport protocols (i.e. UDP, TCP or TLS) must be active. SIP aliases always take the form username@domain. To enable the VCS to act as a SIP Registrar, you must configure it with the SIP Domain(s) for which it will be authoritative. It will then accept registration requests for any endpoints attempting to register with an alias that includes that domain. If no Domains are configured, then the VCS will not act as a SIP Registrar. Proxying Registration Requests If the VCS has no domains configured, or it receives a registration request for a domain for which it is not acting as a Registrar, then the VCS may proxy the registration request. This depends on the SIP Registration Proxy Mode setting, as follows: • Off: the VCS will not proxy any registration requests. The request will be rejected with a “403 Forbidden” message. • Proxy to Known Only: the VCS will proxy the registration request but only to its Neighbor, Traversal Client and Traversal Server zones. • Proxy to any: the VCS will proxy the registration requests in accordance with its call policy (e.g. Administrator policy and transforms). See Call Processing for more information. The SIP Registration Proxy Mode setting also impacts the VCS’s behavior when acting as a SIP Proxy Server. Introduction D14049.04 JULY 2008 Getting Started Overview and Status System Configuration VCS Configuration Zones and Neighbors Call Processing 67 Bandwidth Control The SIP Registration Expiry setting applies only when the VCS is acting as a SIP Registrar, and to endpoints registered with the VCS. It does not apply to endpoints whose registrations are being proxied through the VCS. Firewall Traversal Applications Maintenance Appendices Grey Headline (continued) SIP TANDBERG VIDEO COMMUNICATIONS SERVER ADMINISTRATOR GUIDE SIP Overview Using the VCS as a SIP Proxy Server Using the VCS as a SIP Presence Server When SIP mode has been enabled the VCS may act as a SIP Proxy Server. The role of a Proxy Server is to forward requests (such as REGISTER and INVITE) from endpoints or other Proxy Servers. These requests are forwarded on to other Proxy Servers or to the destination endpoint. The VCS supports the SIP-based SIMPLE protocol. It can act as a: • Presence Server • Presence User Agent Whether or not the VCS acts as a SIP Proxy Server, and its exact behavior when proxying requests, is determined by the SIP Registration Proxy Mode setting. In addition, this also depends on the presence of Route Set information in the request header and whether or not the Proxy Server from which the request was received is a Neighbor of the VCS. for any of the SIP Domain(s) for which it is authoritative. For full information on how to use the VCS as a SIP Presence server, see the Presence section. A Route Set can specify the path that must be taken when requests are being proxied between an endpoint and its Registrar. For example, when a REGISTER request is proxied by a VCS, the VCS adds a Path header component to the request which signals that the VCS must be included on any call to that endpoint. The information is usually required in situations where firewalls exist and the media must follow a specified path in order to successfully traverse the firewall. For more information about the path header field, see RFC 3327 [10]. When the VCS proxies a request that contains existing Route Set information, it will forward it directly to the URI specified in the path. Any call policy configured on the VCS will therefore be bypassed. This may present a security risk if the information in the Route Set cannot be trusted. For this reason, you can configure the VCS with three different behaviors when proxying requests, as follows: • If the SIP Registration Proxy Mode setting is Off, the VCS will not proxy any requests that have an existing Route Set. Requests that do not have an existing Route Set will still be proxied in accordance with existing call policy (e.g. zone searches and transforms). This setting provides the highest level of security. • If the setting is Proxy to Known Only, the VCS will proxy requests with an existing Route Set only if the request was received from a Neighbor zone (including Traversal Client and Traversal Server zones). Requests that do not have an existing Route Set will be proxied in accordance with existing call policy. • If the setting is Proxy to any, the VCS will proxy all requests. Those with existing Route Sets will be proxied to the specified URI; those without will be proxied in accordance with existing call policy. SIP protocols and ports The VCS supports SIP over UDP, TCP and TLS transport protocols. You can configure whether or not incoming calls using each protocol are supported, and if so, the ports on which the VCS will listen for such calls. You can also specify the range of ports the VCS will use once calls are established. This range must be sufficient to support all required concurrent calls. At least one of the UDP, TCP or TLS transport protocols must be set to a Mode of On in order for SIP functionality to be supported. The SIP Registration Proxy Mode setting only applies to dialog-forming requests, e.g. INVITE and SUBSCRIBE. Responses, such as NOTIFY, are always proxied regardless of this setting. Introduction D14049.04 JULY 2008 Getting Started Overview and Status System Configuration VCS Configuration Zones and Neighbors Call Processing 68 Bandwidth Control Firewall Traversal Applications Maintenance Appendices Grey Headline (continued) SIP TANDBERG VIDEO COMMUNICATIONS SERVER ADMINISTRATOR GUIDE Configuring SIP - Registrations, Protocols and Ports SIP settings are configured via: UDP mode • VCS Configuration > Protocols > SIP > Configuration. You will be taken to the SIP page. • xConfiguration SIP Determines whether or not incoming SIP calls using the UDP protocol will be allowed. The default is On. UDP port SIP mode Specifies the listening port for incoming SIP calls over UDP. Determines whether or not the VCS will provide SIP functionality (i.e. SIP Registrar and SIP proxy services). The default is 5060. Registration expire delta TCP mode Specifies the period (in seconds) within which a SIP endpoint must re-register to prevent its registration expiring. Determines whether or not incoming SIP calls using the TCP protocol will be allowed. The default is On. The default is 60. TCP port SIP registration proxy mode Specifies the listening port for incoming SIP calls over TCP. Specifies how proxied registrations and invites will be handled. The default is 5060. Off: Registration requests will not be proxied (but will still be permitted locally if the VCS is authoritative for that domain). Invite requests with existing Route Sets will be rejected. TLS mode Determines whether or not incoming SIP calls using the TLS protocol will be allowed. Proxy to known only: Registration requests will be proxied, and invite requests will be proxied only if the Route Set contains the URI(s) of neighbors (including traversal clients and traversal servers). The default is On. TLS port Proxy to any: Registration requests and invite requests will always be proxied. Specifies the listening port for incoming SIP calls over TLS. The default is 5061. TCP Outbound Port Start TCP Outbound Port End Save Specifies the lower port in the range to be used by outbound TCP/TLS SIP connections. Specifies the upper port in the range to be used by outbound TCP/TLS SIP connections. Click here to save your changes. The default is 25000. The default is 29999. Introduction D14049.04 JULY 2008 Getting Started Overview and Status System Configuration VCS Configuration Zones and Neighbors Call Processing 69 Bandwidth Control Firewall Traversal Applications Maintenance Appendices Grey Headline (continued) SIP TANDBERG VIDEO COMMUNICATIONS SERVER ADMINISTRATOR GUIDE Configuring SIP - Domains SIP domains are configured via: View/Edit • VCS Configuration > Protocols >SIP > Domains. You will be taken to the Domains page. Click here to change the domain name or delete the domain. • To add a new domain, click New. You will be taken to the Create Domain page. Enter the domain in the Name field and click Create Domain. The new domain will be added and you will be returned to the Domains page. • To edit the name of an existing domain, click View/Edit. You will be taken to the Edit Domain page. Edit the Name of the domain and click Save. The name of the domain will be changed. Name Specifies a domain for which the VCS is authoritative. The VCS will act as a SIP Registrar and Presence Server for this domain, and will accept registration requests for any SIP endpoints attempting to register with an alias that includes this domain. • To delete an existing domain, click View/ Edit. You will be taken to the Edit Domain page. Click Delete. The domain will be deleted and you will be returned to the Domains page. • To delete one or more existing domains, select the boxes next to the domains you wish to delete and click Delete. Cancel Click here to return to the Domains page without saving your changes. • xCommand DomainAdd • xCommand DomainDelete • xConfiguration SIP Domains Delete Click here to delete the domain and return to the Domains page. Save Click here to save your changes. Introduction D14049.04 JULY 2008 Getting Started Overview and Status System Configuration VCS Configuration Zones and Neighbors Call Processing 70 Bandwidth Control Firewall Traversal Applications Maintenance Appendices Grey Headline (continued) Interworking TANDBERG VIDEO COMMUNICATIONS SERVER ADMINISTRATOR GUIDE Overview Configuring Interworking About Interworking Interworking options are configured via: The VCS is able to act as a gateway between SIP and H.323, translating calls from one protocol to the other. This is known as “interworking”. • xConfiguration • VCS Configuration > Protocols > Interworking. You will be taken to the Interworking page. Interworking Mode By default, the VCS will act as a SIP-H.323 and H.323-SIP gateway but only if at least one of the endpoints is locally registered. You can change this setting so that the VCS will act as SIP-H.323 gateway regardless of whether the endpoints involved are locally registered. You also have the option to disable interworking completely. We recommend that you leave this setting as RegisteredOnly (where calls are interworked only if at least one of the endpoints is locally registered). Unless your network is correctly configured, setting it to On (where all calls can be interworked) may result in unnecessary interworking, for example where a call between two H.323 endpoints is made over SIP, or vice versa. ! Calls for which the VCS is acting as an SIP to H.323 gateway are traversal calls. They will therefore require a traversal call licence. Save H.323 <-> SIP interworking mode Click here to save your changes. Determines whether or not the VCS will act as a gateway between SIP and H.323 calls. Off: the VCS will not act as a SIP-H.323 gateway. RegisteredOnly: the VCS will act as a SIP-H.323 gateway but only if at least one of the endpoints is locally registered. On: the VCS will act as SIP-H.323 gateway regardless of whether the endpoints are locally registered. Introduction D14049.04 JULY 2008 Getting Started Overview and Status System Configuration VCS Configuration Zones and Neighbors Call Processing 71 Bandwidth Control Firewall Traversal Applications Maintenance Appendices Grey Headline (continued) Registration Control TANDBERG VIDEO COMMUNICATIONS SERVER ADMINISTRATOR GUIDE Registration Overview Endpoint Registration Registrations on a VCS Expressway MCU, Gateway and Content Server Registration In order for an endpoint to use the TANDBERG VCS as its H.323 gatekeeper or SIP Registrar, the endpoint must first register with the VCS. The VCS can be configured to control which devices are allowed to register with it. Two separate mechanisms are provided: If a traversal-enabled endpoint registers directly with a VCS Expressway, the VCS Expressway will provide the same services to that endpoint as a VCS Control, with the addition of firewall traversal. Traversal-enabled endpoints include all TANDBERG Expressway™ endpoints and third party endpoints which support the ITU H.460.18 and H.460.19 standards. H.323 systems such as gateways, MCUs and Content Servers can also register with a VCS. They are known as locally registered services. These systems are configured with their own prefix, which they provide to the VCS when registering. The VCS will then know to route all calls that begin with that prefix to the gateway, MCU or Content Server as appropriate. These prefixes can also be used to control registrations. • an authentication process based on the username and • a simple Registration Restriction Policy that uses Allow Lists Endpoints that are not traversal-enabled can still register with a VCS Expressway, but they may not be able to make or receive calls through the firewall successfully. This will depend on a number of factors: It is possible to use both mechanisms together. For example, you can use authentication to verify an endpoint’s identity from a corporate directory, and registration restriction to control which of those authenticated endpoints may register with a particular VCS. • whether the endpoint is using SIP or H.323 • the endpoint’s position in relation to the firewall • whether there is a NAT in use • whether the endpoint is using a public IP address. password supplied by the endpoint or Deny Lists to specify which aliases can and cannot register with the VCS. This section gives an overview of how endpoints and other devices register with the VCS, and then describes the two mechanisms by which registrations can be restricted. SIP devices cannot register prefixes. If your dial plan dictates that a SIP device should be reached via a particular prefix, then you should add the device as a neighbor zone with a pattern match equal to the prefix to be used. For example, if an endpoint is behind a NAT or firewall, it may not be able to receive incoming calls and may not be able to receive media for calls it has initiated. SIP endpoints can also work behind a NAT but can only receive video if they send it as well. To ensure firewall traversal will work successfully for H.323 endpoints behind a NAT, the endpoint must be traversal-enabled. For specific information about how registrations are managed across Peers in a cluster, refer to the section Sharing Registrations Across Peers. Introduction D14049.04 JULY 2008 Getting Started Overview and Status System Configuration The TANDBERG MPS and TANDBERG Content Server (TCS) both support Expressway. They can therefore register directly with a VCS Expressway for firewall traversal. VCS Configuration Zones and Neighbors Call Processing 72 Bandwidth Control Firewall Traversal Applications Maintenance Appendices Grey Headline (continued) Registration Control TANDBERG VIDEO COMMUNICATIONS SERVER ADMINISTRATOR GUIDE Registration Overview Finding a VCS with which to Register H.323 Before an endpoint can register with a VCS, it must determine which VCS it can or should be registering with. This setting is configured on the endpoint, and the process is different for SIP and H.323. There are two ways an H.323 endpoint can locate a VCS with which to register: manually or automatically. The option is configured on the endpoint itself under the Gatekeeper Discovery setting (consult your endpoint manual for how to access this setting). • If the mode is set to automatic, the endpoint will try to register with any VCS it can find. It does this by sending out a Gatekeeper Discovery Request, to which eligible VCSs will respond. • If the mode is set to manual, you must specify the IP address of the VCS with which you wish SIP your endpoint to register, and the endpoint will attempt to register with that VCS only. SIP endpoints must find a SIP Registrar with which to register. The SIP Registrar maintains a record of the endpoint’s details against the endpoint’s Address of Record (AOR). When a call is received for that AOR, the SIP Registrar refers to the record in order to find the endpoint to which it corresponds. (Note that the same AOR can be used by more than one SIP endpoint at the same time.) Preventing automatic registrations The SIP Registrar will only accept registrations for domains for which it is authoritative. There are two ways a SIP endpoint can locate a Registrar with which to register: manually or automatically. The option is configured on the endpoint itself under the SIP Server Discovery option (consult your endpoint user guide for how to access this setting). • If the Server Discovery mode is set to automatic, the endpoint will send a REGISTER message to its SIP Server. This will be forwarded (via DNS if necessary) to the Registrar that is authoritative for the domain with which the endpoint is attempting to register. For example, if an endpoint is attempting to register with a URI of john.smith@example.com, the request will be sent to the Registrar authoritative for the domain example.com. You can prevent H.323 endpoints being able to register automatically with the VCS by disabling Auto Discovery on the VCS. The Auto Discovery setting determines whether the VCS responds to the Gatekeeper Discovery requests sent out by endpoints. To configure the Auto Discovery setting: • VCS Configuration > Protocols > H.323. You will be taken to the H.323 page. • H323 Gatekeeper AutoDiscovery • If the Server Discovery mode is set to manual, the user must specify the IP address or FQDN of Auto discover The VCS is a SIP Server for endpoints in its local zone, and can also act as a SIP Registrar. On: The VCS will respond to Gatekeeper discovery requests. the Registrar with which they wish to register, and the endpoint will attempt to register with that Registrar only. • If the VCS is acting as the endpoint’s SIP Server and SIP Registrar, when the registration request is received from the endpoint it will be accepted by the VCS and the endpoint will be registered and able to receive inbound calls. See Using the VCS as a SIP Registrar for more information. • If the VCS is acting as the endpoint’s SIP server but is not a SIP Registrar, it will proxy the registration request. See Proxying registration requests for more information. Introduction D14049.04 JULY 2008 Getting Started Overview and Status System Configuration VCS Configuration Zones and Neighbors Off: The VCS will reject Gatekeeper discovery requests. H.323 endpoints will be able to register with the VCS only if their Gatekeeper Discovery setting is Manual and they have entered the IP address of the VCS. Call Processing 73 Bandwidth Control Firewall Traversal Applications Maintenance Appendices Grey Headline (continued) Registration Control TANDBERG VIDEO COMMUNICATIONS SERVER ADMINISTRATOR GUIDE Authentication Authentication Mode Configuring Authentication The VCS can be configured to use a username and passwordbased challenge-response scheme to determine whether it will permit communications from other systems. This process is known as authentication. When Authentication Mode is On, systems attempting to communicate with the VCS, including endpoints attempting to send registration requests to the VCS, must first authenticate with it. To configure the Authentication Mode of the VCS, and the Database it will use: Mode • VCS Configuration > Authentication > Configuration You will be taken to the Authentication Configuration page. Authentication Determines whether systems attempting to communicate with the VCS must authenticate with it first. On: For H.323, any credentials in the message are checked against the authentication database. The message is allowed if the credentials match, or if there are no credentials in the message. For SIP, any messages originating from an endpoint in a local domain will be authenticated. • xConfiguration Off: no authentication is required for endpoints. The default is Off. Authentication for Local Registrations When Authentication Mode is On, endpoints must authenticate with the VCS before they can register. In order to authenticate successfully, the endpoint must supply the VCS with a username. For TANDBERG endpoints using H.323, the username is the endpoint’s Authentication ID; for TANDBERG endpoints using SIP it is the endpoint’s Authentication Username. Database type Determines which database the VCS will use during authentication. LocalDatabase: the local database is used. You must configure the Local database to use this option. For details of how to configure endpoints with a username and password, please consult the endpoint manual. LDAP: A remote LDAP database is used. You must configure the LDAP server to use this option. In order to verify the identity of the device, the VCS needs access to a database on which all authentication credential information (usernames, passwords, and other relevant information) is stored. This database may be located either locally on the VCS, or on an LDAP Directory Server. The VCS looks up the endpoint’s username in the database and retrieves the authentication credentials for that entry. If the credentials match those supplied by the endpoint, the registration is allowed to proceed. The VCS supports the ITU H.235 specification [1] for authenticating the identity of H.323 network devices with which it communicates. Introduction D14049.04 JULY 2008 Getting Started Overview and Status System Configuration The default is LocalDatabase. If the VCS is a traversal server, you must ensure that each traversal client’s authentication credentials are entered into the selected database. ! Accurate timestamps play an important part in authentication, helping to guard against replay attacks. For this reason, if you are using authentication, both the VCS and the endpoints must use an NTP server to synchronize their system time. See the NTP section for information on how to configure this for the VCS. ! VCS Configuration Zones and Neighbors Call Processing 74 Bandwidth Control Firewall Traversal Applications Maintenance Appendices Grey Headline (continued) Registration Control TANDBERG VIDEO COMMUNICATIONS SERVER ADMINISTRATOR GUIDE Authentication About External Registration Credentials Configuring External Registration Credentials The VCS may be required to authenticate itself with another system. For example, when the VCS is forwarding an invite from an endpoint to another VCS, that other system may have authentication enabled and will therefore require your local VCS to provide it with a username and password. • VCS Configuration > Authentication > Configuration To configure Authentication options: You will be taken to the Authentication Configuration page (shown below). Authentication • xConfiguration Authentication username The Authentication Username is the name that the VCS uses when authenticating with other systems. Additionally, traversal clients must always successfully authenticate with traversal servers before they can connect. The username and password that your VCS provides when authenticating with other systems is configured under the External Registration Credentials section of the Authentication Configuration page. Authentication password Specifies the password to be used by the VCS (in conjunction with the Authentication username) when the VCS is authenticating with other systems. Introduction D14049.04 JULY 2008 Getting Started Overview and Status System Configuration VCS Configuration Zones and Neighbors Call Processing 75 Bandwidth Control Firewall Traversal Applications Maintenance Appendices Grey Headline (continued) Registration Control TANDBERG VIDEO COMMUNICATIONS SERVER ADMINISTRATOR GUIDE Authentication Databases Alias Origin Setting Authentication using an LDAP Server This setting determines the alias(es) with which the endpoint will attempt to register. The options are as follows: If the VCS is using an LDAP server for authentication, the process is as follows: 1. The endpoint presents its username and authentication credentials (these are generated using its password) to the VCS, and the alias(es) with which it wishes to register LDAP 2. The VCS looks up the username in the LDAP database and obtains the authentication and alias information for that entry. The alias(es) presented by the endpoint will be used as long as they are listed in the LDAP database for the endpoint’s username. • If an endpoint presents an alias that is listed in the LDAP database, it will be registered with that alias. • If more than one alias is listed in the LDAP database for that username, the endpoint will be registered with only those aliases that it has presented. • If an endpoint presents an alias that is not in the LDAP database, it will not be registered with that alias. • If an endpoint presents more than one alias but none are listed in the LDAP database, it will not 3. If the authentication credentials match those supplied by the endpoint, the registration will continue. The VCS will then determine which alias(es) the endpoint will be allowed to attempt to register with, based on the alias origin setting. For H.323 endpoints, you can use this setting to override the aliases presented by the endpoint with those in the H.350 directory, or you can use them in addition to the endpoint’s aliases. For SIP endpoints, you can use this setting to reject a registration if the endpoint’s AOR does not match that in the LDAP database. be allowed to register. • If no aliases are presented by the endpoint, it will be registered with all the aliases listed in the LDAP database for its username. (This is to allow for MCUs which additively register aliases for conferences, for example the TANDBERG MPS (J4.0 and later) which registers ad-hoc conferences.) (This applies to H.323 only). • If no aliases are listed in the LDAP database for the endpoint’s username, then the endpoint will be registered with all the aliases it presented. Combined The alias(es) presented by the endpoint will be used in addition to any that are listed in the LDAP database for the endpoint’s username. In other words, this is the same as for LDAP, with one exception: • If an endpoint presents an alias that is not in the LDAP database, it will be allowed to register with that alias. Configuring the LDAP Server Directory The directory on the LDAP server should be configured to implement the ITU H.350 specification [2] to store credentials for devices with which the VCS communicates. The directory should also be configured with the aliases of endpoints that will register with the VCS. • If no aliases are presented by the endpoint, it will not be allowed to register. For instructions on how to configure common LDAP servers, see the Appendix LDAP Configuration. D14049.04 JULY 2008 Overview and Status System Configuration VCS Configuration To use TLS: • LDAP Encryption must be set to TLS • the LDAP server must have a valid certificate installed, verifying its identity • The VCS must trust the certificate installed on the LDAP server. TLS can be difficult to configure, so we recommend that you confirm that your LDAP database is working correctly before you attempt to secure the connection with TLS. We also recommend that you use a third party LDAP browser to verify that your LDAP server is correctly configured to use TLS. The alias(es) presented by the endpoint will be used; any in the LDAP database will be ignored. Getting Started The traffic between the VCS and the LDAP server can be encrypted using Transport Layer Security (TLS). ! Endpoint Introduction Securing the LDAP Connection with TLS Zones and Neighbors Call Processing 76 Bandwidth Control For information on how to configure the VCS to trust the certificate installed on the LDAP server, see the Security section. Firewall Traversal Applications Maintenance Appendices Grey Headline (continued) Registration Control TANDBERG VIDEO COMMUNICATIONS SERVER ADMINISTRATOR GUIDE Authentication Databases Configuring LDAP Server settings LDAP Server To configure the settings for accessing the LDAP server: The IP address or FQDN (or server address, if a DNS Domain Name has also been configured) of the LDAP server. • VCS Configuration > Authentication > LDAP > Configuration. You will be taken to the LDAP Configuration page. • xConfiguration LDAP • xConfiguration Authentication LDAP Port The IP port of the LDAP server. The default is 389. Encryption Determines whether the connection to the LDAP server will be encrypted. (For more information on configuring encryption, see Securing the LDAP connection with TLS.) Alias origin Determines the source of the alias(es) with which the endpoint will be registered. TLS: TLS Encryption will be used for the connection with the LDAP server. LDAP: The aliases listed in the LDAP database for the endpoint’s username will be used; those presented by the endpoint will be ignored. Off: No encryption will be used. The default is Off. Endpoint: The aliases presented by the endpoint will be used; any in the LDAP database will be ignored. UserDN The user distinguished name to be used by the VCS when binding to the LDAP server. Combined: The endpoint will be registered both with the aliases which it has presented and with those configured in the LDAP database. Password The default is LDAP. The password to be used by the VCS when binding to the LDAP server. Upload a CA Certificate file for TLS Clicking here will take you to the Security page, where you can upload a file that contains the trusted CA certificate for the LDAP server. This is required if the connection between the VCS and the LDAP server is encrypted. Base DN The area of the directory on the LDAP server to be searched for the credential information. This should be specified as the Distinguished Name (DN) in the LDAP directory under which the H.350 objects reside. For more information on how to configure the VCS to trust the certificate installed on the LDAP server, see the Security section. Introduction D14049.04 JULY 2008 Getting Started Overview and Status System Configuration VCS Configuration Zones and Neighbors Call Processing 77 Bandwidth Control Firewall Traversal Applications Maintenance Appendices Grey Headline (continued) Registration Control TANDBERG VIDEO COMMUNICATIONS SERVER ADMINISTRATOR GUIDE Authentication Databases Authentication using a Local Database Credentials The Credentials page shows all the existing entries in the Local Database. The local database is included as part of your VCS system. It consists of a list of usernames and passwords, which you add via the web interface and/or the CLI. The database can hold up to 2500 entries. You can sort these entries by clicking on the Name column heading. Configuring the Local Database To manage entries in the Local Database: • VCS Configuration > Authentication > Local View/Edit Database. You will be taken to the Credentials page. • xConfiguration Authentication Credential • xCommand CredentialAdd • xCommand CredentialDelete Select View/Edit to add a make changes to an existing entry. You will be taken to the Edit Credential page. Cancel New Returns you to the Credentials page without saving your changes. Select New to add a new entry to the Local Database. You will be taken to the Create Credential page. Delete Removes the entry from the Local Database and returns you to the Credentials page. Name The username used by the endpoint when authenticating with the VCS. Save Saves the changes you have made. Password The password used by the endpoint when authenticating with the VCS. The same credentials can be used by more than one endpoint - you do not need to have a separate entry in the database for each endpoint. Create Credential Select Create Credential to add the new entry to the Local Database and return to the Credentials page. Introduction D14049.04 JULY 2008 Getting Started Overview and Status System Configuration VCS Configuration Zones and Neighbors Call Processing 78 Bandwidth Control Firewall Traversal Applications Maintenance Appendices Grey Headline (continued) Registration Control TANDBERG VIDEO COMMUNICATIONS SERVER ADMINISTRATOR GUIDE Registering Aliases About Alias Registration Attempts to Register using an Existing Alias SIP Once the authentication process (if required) has been completed, the endpoint will then attempt to register its alias(es) with the VCS. An endpoint may attempt to register with the VCS using an alias that is already registered to the system. How this is managed depends on how the VCS is configured and whether the endpoint is SIP or H.323. A SIP endpoint will always be allowed to register using an alias that is already in use from another IP address. When a call is received for this alias, all endpoints registered using that alias will be called simultaneously. This SIP feature is known as “forking”. H.323 Alias Registration H.323 When registering, the H.323 endpoint presents the VCS with one or more of the following: An H.323 endpoint may attempt to register with the VCS using an alias that has already been registered on the VCS from another IP address. The reasons for this could include: • one or more H.323 IDs • one or more E.164 aliases • one or more URIs. • two endpoints at different IP addresses are attempting to register using the same alias • a single endpoint has previously registered using a particular alias. The IP address allocated to the endpoint, or the port the Users of other registered endpoints can then call the endpoint by dialing any of these aliases. endpoint uses to communicate with the VCS, then changes, and the endpoint is attempting to re-register using the same alias. You can determine how the VCS will behave in this situation by configuring the Registration Conflict Mode. To configuring the Registration Conflict Mode: We recommended that you register your H.323 endpoints using a URI. This facilitates interworking between SIP and H.323, as SIP endpoints register using a URI as standard. • VCS Configuration > Protocols > H.323. You will be taken to the H.323 page. • xConfiguration H323 Gatekeeper Registration ConflictMode Registration conflict mode Determines what will happen when an H.323 endpoint attempts to register using an alias that has already been registered from another IP address. We recommended that you do not use aliases that reveal sensitive information. Due to the nature of H.323, call setup information is exchanged in an unencrypted form. Reject: The registration from the new IP address will be rejected. This is useful if your priority is to prevent two users registering with the same alias. Overwrite: The existing registration will be overwritten using the new IP address. This is useful if your network is such that endpoints are often allocated new IP addresses, because it will prevent unwanted registration rejections. SIP Alias Registration When registering, the SIP endpoint presents the VCS with its contact address (IP address) and logical address (Address of Record). The logical address is considered to be its alias, and will generally be in the form of a URI. Introduction D14049.04 JULY 2008 Getting Started Overview and Status System Configuration The default is Reject. VCS Configuration Zones and Neighbors Call Processing 79 Bandwidth Control Firewall Traversal Applications Maintenance Appendices Grey Headline (continued) Registration Control TANDBERG VIDEO COMMUNICATIONS SERVER ADMINISTRATOR GUIDE Allow and Deny Lists About Allow and Deny Lists Activating use of Allow or Deny Lists When an endpoint attempts to register with the VCS it presents a list of aliases. You can control which endpoints are allowed to register by setting the Restriction Policy to AllowList or DenyList and then including any one of the endpoint’s aliases on the Allow List or the Deny list as appropriate. Each list can contain up to 2,500 entries. When an endpoint attempts to register, each of its aliases is compared with the patterns in the relevant list to see if it matches. Only one of the aliases needs to appear in the Allow List or the Deny List for the registration to be allowed or denied. To activate the use of Allow or Deny lists to determine which aliases are allowed to register with the VCS: • VCS Configuration > Registration > Configuration. You will be taken to the Registration Configuration page. Registration RestrictionPolicy • xConfiguration For example, If the Registration Restriction policy is set to DenyList and an endpoint attempts to register using three aliases, one of which matches a pattern on the Deny list, that endpoint’s registration will be denied. Likewise, if the Registration Restriction policy is set to AllowList, only one of the endpoint’s aliases needs to match a pattern on the Allow list for it to be allowed to register using all its aliases. Patterns and Pattern Types Entries on the Allow List and Deny List are a combination of Pattern and Type. The Pattern specifies the string to be matched; the Type determines whether that string; • must match the Pattern exactly (Exact) • must appear at the start of the alias (Prefix) • must appear at the end of the alias (Suffix) • is in the form of a Regular Expression (Regex). Removing existing registrations Once an Allow List or Deny List has been activated, it will be used to control all registration requests from that point forward. However, any existing registrations will remain in place, even if the new list would otherwise block them. For this reason we recommend that you manually remove all existing unwanted registrations after you have implemented an Allow List or Deny List. To manually remove a registration; navigate to Status > Registrations, select the registration(s) you wish to remove, and click Unregister. Restriction policy Save Specifies the policy to be used when determining which endpoints may register with the VCS. Click here to save your changes. None: Any endpoint may register. AllowList: Only those endpoints with an alias that matches an entry in the Allow List may register. DenyList: All endpoints may register, unless they match an entry on the Deny List. The default is None. Introduction D14049.04 JULY 2008 Getting Started Overview and Status System Configuration VCS Configuration Zones and Neighbors Call Processing 80 Bandwidth Control Firewall Traversal Allow Lists and Deny Lists are mutually exclusive: only one may be in use at any given time. Applications Maintenance Appendices Grey Headline (continued) Registration Control TANDBERG VIDEO COMMUNICATIONS SERVER ADMINISTRATOR GUIDE Allow and Deny lists Managing Entries in the Allow List Registration Allow List This page shows all the existing entries in the Allow List. To view and manage the entries in the Allow List: You can sort these entries by clicking on the relevant column heading. • VCS Configuration > Registration > Allow List. You will be taken to the Registration Allow List page. • xCommand AllowListAdd • xConfiguration Registration AllowList This warning is a reminder that you must set the restriction policy to Allow List (VCS Configuration > Registration > Configuration) in order for it to be activated. New View/Edit Click here to add a new entry to the Allow List. You will be taken to the Create Allow Pattern page. Select View/Edit to make changes to an existing entry. You will be taken to the Edit Allow Pattern page. Pattern Enter the pattern you wish to add to the Allow List. Pattern Edit the pattern. Type Select the way in which the Pattern must match the alias for the registration to be allowed. Options are: Type Edit the type. Exact: the alias must match the Pattern exactly. Cancel Prefix: the alias must begin with the Pattern. Suffix: the alias must end with the Pattern. Select Cancel to return to the Registration Allow List page without saving your changes. Regex: the Pattern is a regular expression. See Regular Expression Reference for further information. Delete Select Delete to remove the registration from the list. Add Allow List Pattern Click here to save the entry and return to the Registration Allow List page. Introduction D14049.04 JULY 2008 Getting Started Overview and Status Save Select Save to save your changes. System Configuration VCS Configuration Zones and Neighbors Call Processing 81 Bandwidth Control Firewall Traversal Applications Maintenance Appendices Grey Headline (continued) Registration Control TANDBERG VIDEO COMMUNICATIONS SERVER ADMINISTRATOR GUIDE Allow and Deny lists Managing Entries in the Deny List Registration Deny List This page shows all the existing entries in the Deny List. To view and manage the entries in the Deny List: • VCS Configuration > Registration > Deny You can sort these entries by clicking on the relevant column heading. List. You will be taken to the Registration Deny List page. • xCommand DenyListAdd • xConfiguration Registration DenyList This warning is a reminder that you must set the restriction policy to Deny List (VCS Configuration > Registration > Configuration) in order for it to be activated. New Click here to add a new entry to the Deny List. You will be taken to the Create Deny Pattern page. View/Edit Select View/Edit to make changes to an existing entry. You will be taken to the Edit Deny Pattern page. Pattern Enter the pattern you wish to add to the Deny List. Pattern Edit the pattern. Type Type Select the way in which the Pattern must match the alias for the registration to be denied. Options are: Edit the type. Exact: the alias must match the Pattern exactly. Cancel Select Cancel to return to the Registration Deny List page without saving your changes. Prefix: the alias must begin with the Pattern. Suffix: the alias must end with the Pattern. Regex: the Pattern is a regular expression. See Regular Expression Reference for further information. Delete Select Delete to remove the registration from the list. Add Deny List Pattern Save Click here to save the entry and return to the Registration Deny List page. Introduction D14049.04 JULY 2008 Getting Started Overview and Status Select Save to save your changes. System Configuration VCS Configuration Zones and Neighbors Call Processing 82 Bandwidth Control Firewall Traversal Applications Maintenance Appendices Grey Headline (continued) TANDBERG VIDEO COMMUNICATIONS SERVER ADMINISTRATOR GUIDE Zones and Neighbors This section begins with an overview of all the different types of subzones and zones and how these fit into the overall structure of your video communication network. It then provides information on the pages that appear under the Local Zone, Zones and Alternates sub-menus of the VCS Configuration menu. These pages allow you to: • configure the VCS’s Local Zone (which is made up of subzones, including the Traversal Subzone and Default Subzone) • create and configure external zones to communicate with other systems and endpoints, including other VCSs, Gatekeepers, Border Controllers or SIP devices, and endpoints contactable via DNS or ENUM dialing. • create VCS Clusters to increase the capacity of your local zone, and for resiliency. Introduction D14049.04 JULY 2008 Getting Started Overview and Status System Configuration VCS Configuration Zones and Neighbors Call Processing 83 Bandwidth Control Firewall Traversal Applications Maintenance Appendices Grey Headline (continued) Introduction TANDBERG VIDEO COMMUNICATIONS SERVER ADMINISTRATOR GUIDE About your Video Communications Network The most basic implementation of a TANDBERG video communications network is a single VCS connected to the internet with one or more endpoints registered to it. However, depending on the size and complexity of your enterprise the VCS may be part of a network of endpoints, other VCSs and other network infrastructure devices, with one or more firewalls between it and the internet. In such situations you may wish to apply restrictions to the amount of bandwidth used by and between different parts of your network. VCS CONTROL LOCAL ZONE Traversal Client Zone Subzone This section will give you an overview of the different parts of the video communications network and the ways in which they can be connected. This information should allow you to configure your VCS to best suit your own infrastructure. Traversal Server Zone VCS EXPRESSWAY Traversal Subzone Neighbor Zone Default Subzone Neighbor Zone Example Network Diagram VCS CONTROL The diagram opposite shows the different components of a VCS (i.e. subzones and zones) and how they interrelate. Using a VCS Control as the example Local Zone, it shows that it is made up of a number of subzones which are all connected by links. The Local Zone is also connected to external VCSs and to the internet via different types of zones. DNS Zone Default Zone ENUM Zone All these components are described in more detail in the sections that follow. Internet Introduction D14049.04 JULY 2008 Getting Started Overview and Status System Configuration VCS Configuration Zones and Neighbors Call Processing 84 Bandwidth Control Firewall Traversal Applications Maintenance Appendices Grey Headline (continued) Local Zone and Subzones TANDBERG VIDEO COMMUNICATIONS SERVER ADMINISTRATOR GUIDE Overview Configuring the Local Zone and its Subzones The collection of all endpoints, gateways, MCUs and Content Servers registered with the VCS make up its Local Zone. The Local Zone is divided into subzones. These include an automatically created Default Subzone and up to 100 manually configurable subzones. Each manually configured subzone specifies a range of IP addresses. When an endpoint registers with the VCS it is allocated to the appropriate subzone based on its IP address. If the endpoint’s IP address does not match any of the subzones, it is assigned to the Default Subzone. The Local Zone maythe be independent network topology, and may be Configuring Local Zoneofand its Subzones comprised of multiple network segments. The VCS also has two special types of subzones. The first is the Traversal Subzone, which is always present (see the Traversal Subzone section for more information). The second is the Cluster Subzone, which is only present when your VCS is part of a cluster (see the Clustering section for more information). Bandwidth Management Local Zone Matches The Local Zone’s subzones exist for the purposes of bandwidth management. Once you have set up your subzones you can apply bandwidth limits to: One of the functions of the VCS is to route a call received from a locally registered endpoint or external zone to its appropriate destination. Calls are routed based on the address or alias of the destination endpoint. • individual calls between two endpoints within the subzone • individual calls between an endpoint within the subzone and another endpoint outside of the subzone • the total of calls to or from endpoints within the subzone. For full details of how to create and configure subzones, and apply bandwidth limitations to subzones including the Default Subzone and Traversal Subzone, see the section on Bandwidth Control. When searching for a destination endpoint, the VCS will search its Local Zone and external zones. You can prioritize the order in which these zones are searched, and filter the search requests sent to each zone, based on the address or alias being searched for. This allows you to reduce the potential number of search requests sent to the Local Zone and out to external zones, and speed up the search process. For further information on how to configure the Local Zone Matches and the overall process for searching zones, see the Zone Searching and Transforming section. The ability to include the Local Zone when prioritizing zone searches is a new feature in VCS version X3.0. Prior to this version, the Local Zone was always searched before any external zones. Introduction D14049.04 JULY 2008 Getting Started Overview and Status System Configuration VCS Configuration Zones and Neighbors Call Processing 85 Bandwidth Control Firewall Traversal Applications Maintenance Appendices Grey Headline (continued) Local Zone and Subzones TANDBERG VIDEO COMMUNICATIONS SERVER ADMINISTRATOR GUIDE Traversal Subzone The Traversal Subzone is a conceptual subzone; no endpoints can be registered to it, but all traversal calls (i.e. calls for which the VCS is taking the media in addition to the signaling) will pass through it. The Traversal Subzone exists in order to allow you to control the amount of bandwidth used by traversal calls, as these can be particularly resource-intensive. What are traversal calls? The following types of calls require the VCS to take the media. They are classified as traversal calls and will always pass through the Traversal Subzone: • Firewall traversal calls • calls that are gatewayed (interworked) between H.323 and SIP • calls that are gatewayed (interworked) between IPv4 and IPv6 • for VCSs with Dual Network Interfaces enabled, calls that are inbound from one LAN port and All such calls will require a traversal call licence each time they pass through the Traversal Subzone. You must ensure that the port range is large enough to support the maximum number of traversal calls available on your VCS. A single traversal call can take up to 20 ports (5 pairs in each direction). So for example, if your VCS is licensed for 5 traversal calls you must ensure that the range of ports configured for traversal media is at least 100. If you add extra traversal calls to your system, you must also ensure that the range of ports available is sufficient. STUN Relays also consume traversal call licences (three relays take one licence) but they do not actually pass through the Traversal Subzone. D14049.04 JULY 2008 Overview and Status System Configuration VCS Configuration The default range for the ports to be used for media is 50000 - 51119 UDP, but these can be changed to anywhere between 1024 and 65533. Ports are allocated from this range in pairs, the first of each being even. Therefore the range must start with an even number and end with an odd number. • VCS Configuration > Local Zone > Traversal Subzone • xConfiguration Traversal Media Port Start • xConfiguration Traversal Media Port End • a SIP to SIP call when one of the participants is behind a NAT. Getting Started The VCS allows you to configure the range of ports to be used for the media in traversal calls. A single traversal call can consist of up to 5 types of media (audio, video, far end camera control, dual streams and BFCP) and each type of media may require a pair of ports – for example, audio and video each require one port for RTP, and one for RTCP. Separate pairs of ports are required for the inbound and outbound portions of a call. A single traversal call can therefore take up to 20 ports. To configure the ports used for media in traversal calls: outbound on the other Introduction Configuring the Traversal Subzone Ports ! Zones and Neighbors Call Processing 86 Bandwidth Control Firewall Traversal Applications Maintenance Appendices Grey Headline (continued) Zones TANDBERG VIDEO COMMUNICATIONS SERVER ADMINISTRATOR GUIDE Traversal Client Zone About Zones A zone is a collection of endpoints, either all registered to a single system (e.g. TANDBERG VCS, gatekeeper, or TANDBERG Border Controller), or of a certain type such as ENUM or DNS. The use of zones enables you to: • use links to determine whether calls can be made between your local subzones and these other zones • manage the bandwidth of calls between your local subzones and endpoints in other zones • easily search for aliases that are not registered locally • apply transforms to aliases before searching for them. Your VCS allows you to configure up to 200 zones of 5 different types. It also has a non-configurable Default Zone. Traversal Server Zone In order to be able to traverse a firewall, the VCS must be neighbored with a traversal server (for example a TANDBERG VCS Expressway or a TANDBERG Border Controller). A VCS Expressway is able to act as a traversal server, providing firewall traversal on behalf of traversal clients (for example, VCS Controls or gatekeepers). In this situation your local VCS is a traversal client, so you neighbor with the traversal server by creating a traversal client zone on your local VCS. You then configure the client zone with details of the corresponding zone on the traversal server. (The traversal server must also be configured with details of the VCS client zone.) In order to act as a traversal server, the VCS Expressway must have a special type of two-way neighbor relationship with each traversal client. To do this, you create a traversal server zone on your local VCS Expressway and configure it with the details of the corresponding zone on the traversal client. (The client must also be configured with details of the VCS Expressway.) Once you have neighbored with the traversal server you can: Once you have neighbored with the traversal client you can: • use the neighbor as a traversal server • provide firewall traversal services to the traversal client • query the traversal client about its endpoints • apply transforms to any queries before they are sent to the • query the traversal server about its endpoints • apply transforms to any queries before they are sent to the traversal server Neighbor Zone • control the bandwidth used for calls between your local VCS and the traversal server. traversal client • control the bandwidth used for calls between your local VCS and the traversal client. A Neighbor zone could be a collection of endpoints registered to another system (e.g. VCS, gatekeeper, or Border Controller), or it could be a SIP device. The other system or SIP device is referred to as a neighbor. Neighbors can be part of your own enterprise network, part of a separate network, or even standalone systems. You create a neighbor relationship with the other system by adding it as a neighbor zone on your local VCS. Once you have added it, you can: • query the neighbor about its endpoints • apply transforms to any requests before they are sent to the neighbor • control the bandwidth used for calls between your local VCS and the neighbor zone. Neighbor zone relationships are one-way; adding another system to your VCS as a neighbor does not mean that your VCS will also be a neighbor of that other system. In such a situation, your VCS will know about and be able to query the other system, but the other system will not know about or be able to query your VCS. However, inbound calls will be identified as coming from that neighbor if the source IP address matches. Introduction D14049.04 JULY 2008 Getting Started Overview and Status System Configuration Traversal client-server zone relationships are two-way; in order for firewall traversal to work, the traversal server and the traversal client must each be configured with the other’s details. (See Quick Guide to VCS Traversal Client - Server Configuration for more information.) The client and server will then be able to query each other. VCS Configuration Zones and Neighbors Call Processing 87 Bandwidth Control Firewall Traversal Applications Maintenance Appendices Grey Headline (continued) Zones TANDBERG VIDEO COMMUNICATIONS SERVER ADMINISTRATOR GUIDE ENUM Zone DNS Zone Default Zone ENUM zones allow you to locate endpoints via an ENUM lookup. You can create one or more ENUM zones based on the ENUM DNS suffix used and/or by pattern matching of the endpoints’ aliases. DNS zones allow you to locate endpoints via a DNS lookup. You can create one or more DNS zones based on pattern matching of the endpoints’ aliases. Any incoming calls from endpoints that are not recognized as belonging to any of the existing configured zones are deemed to be coming from the Default Zone. Once you have configured one or more DNS zones, you can: Once you have configured one or more ENUM zones, you can: • apply transforms to alias search requests directed to that group of endpoints • control the bandwidth used for calls between your local VCS and each group of DNS endpoints. The VCS comes pre-configured with the Default Zone and default links between it and both the Default Subzone and the Traversal Subzone. • apply transforms to alias search requests directed to that group of endpoints • control the bandwidth used for calls between your local VCS and each group of ENUM endpoints. The purpose of the Default Zone is to allow you to manage incoming calls from unrecognized endpoints to the VCS. You can do this by: • deleting the default links. This will prevent any incoming calls from unrecognized endpoints • applying pipes to the default links. This will allow you to control the bandwidth consumed by incoming calls from unrecognized endpoints. The default links can be reinstated at any time via the command: See ENUM Dialing for more information on the use of ENUM zones. Introduction D14049.04 JULY 2008 Getting Started Overview and Status System Configuration xCommand DefaultLinksAdd VCS Configuration Zones and Neighbors Call Processing 88 Bandwidth Control Firewall Traversal Applications Maintenance Appendices Grey Headline (continued) Zones TANDBERG VIDEO COMMUNICATIONS SERVER ADMINISTRATOR GUIDE Adding Zones Configuring Zones In order to neighbor with another system (e.g. VCS, gatekeeper or Border Controller) or create an ENUM or DNS zone, you must add a new zone on the local VCS. When adding a new zone you will be asked to specify its Type; this will determine which configuration options will then be available. Once you have created a new zone on the local VCS you must configure it appropriately. For traversal server zones, traversal client zones and neighbor zones this will include providing information about the neighbor system such as IP address and ports. Zones are configured via the Edit Zone page. You will be taken to this page automatically upon creation of a new zone. To access this page for an existing zone: To create a new zone: • VCS Configuration > Zones. You will be taken to the Zones page. Click New. You will be taken to the Create Zone page. • xCommand ZoneAdd • VCS Configuration > Zones. You will be taken to the Zones page. Click on the name of the zone you wish to configure. You will be taken to the Edit Zone page. • xConfiguration Zones Zone [1..200] The sections that follow describe the configuration options available for each zone type. Name Enter the name you wish to give to this zone. The name acts as a unique identifier, allowing you to distinguish between zones of the same type. Type From the Type drop-down menu, select the type of zone you wish to add. Neighbor: the new zone will be a connection to a neighbor of the local VCS. TraversalClient: the local VCS is a traversal client of the new zone, and there is a firewall between the two. TraversalServer: the local VCS is a traversal server for new zone, and there is a firewall between the two. ENUM: the new zone contains endpoints discoverable by ENUM lookup. DNS: the new zone contains endpoints discoverable by DNS lookup. Once the zone has been created, the Type cannot be changed. Introduction D14049.04 JULY 2008 Getting Started Overview and Status Create Zone Cancel Click here to create the zone. You will be taken directly to the Edit Zone page. Click here to return to the Zones page without creating the zone. System Configuration VCS Configuration Zones and Neighbors Call Processing 89 Bandwidth Control Firewall Traversal Applications Maintenance Appendices Grey Headline (continued) Zones TANDBERG VIDEO COMMUNICATIONS SERVER ADMINISTRATOR GUIDE Configuring Zones - All Types Name Assigns a name to the zone. The name acts as a unique identifier, allowing you to distinguish between zones of the same type. Type Determines the nature of the zone: Neighbor: the new zone will be a connection to a neighbor of the local VCS. TraversalClient: the local VCS is a traversal client of the new zone, and there is a firewall between the two. TraversalServer: the local VCS is a traversal server for new zone, and there is a firewall between the two. ENUM: the new zone contains endpoints discoverable by ENUM lookup. DNS: the new zone contains endpoints discoverable by DNS lookup. Once the zone has been created, the Type cannot be changed. Hop count The hop count is the number of times a request will be forwarded to a neighbor gatekeeper or proxy (see Hop Counts for more information). This field specifies the hop count to be used when sending an alias search request to this particular zone. If the search request was received from another zone and already has a hop count assigned, the lower of the two values will be used. Match1 - Match5 The Match sections allow you to configure when and how search requests will be sent to this zone, and also whether any transforms will be applied to aliases being searched for in this zone. These features are described in full in the section Zone searching and alias transforming. Introduction D14049.04 JULY 2008 Getting Started Overview and Status System Configuration VCS Configuration Zones and Neighbors Call Processing 90 Bandwidth Control Firewall Traversal Applications Maintenance Appendices Grey Headline (continued) Zones TANDBERG VIDEO COMMUNICATIONS SERVER ADMINISTRATOR GUIDE Configuring Neighbor Zones SIP mode Searches are automatically responded to Determines whether SIP calls will be allowed to and from the neighbor zone. Determines what happens when the VCS receives a SIP search that originated as an H.323 search, destined for this zone. The default is Off. SIP port Off: a SIP OPTION message will be sent to the zone. Specifies the port on the neighbor system to be used for SIP calls from the local VCS. On: searches will be responded to automatically, without being forwarded to the zone. This must be the same port number as that configured on the neighbor system as its SIP TCP, SIP TLS or SIP UDP port (depending on which SIP transport mode is in use). This option should normally be left as the default Off. However, some systems such as Microsoft OCS 2007 will not accept SIP OPTION messages, so for these zones this should be set to On. If you do change this to On, you must also configure pattern matches to ensure that only those searches that actually match endpoints in this zone are responded to. If you do not, the search will not continue to other lower-priority zones, and the call will be forwarded to this zone even if it cannot support it. ! SIP transport Refer to the relevant TANDBERG VCS Deployment Guide for full details on how to configure these advanced options for specific systems. Determines which transport type will be used for SIP calls to and from the neighbor zone. H.323 mode Determines whether H.323 calls will be allowed to and from the neighbor zone. Empty INVITE allowed Determines whether the VCS will generate a SIP INVITE message with no SDP to send to this zone. INVITES with no SDP mean that the destination device is asked to initiate the codec selection, and are used when the call has been interworked locally from H.323. The default is On. H.323 port Specifies the port on the neighbor system to be used for H.323 calls from the local VCS. This must be the same port number as that configured on the neighbor system as its H.323 UDP port. If the neighbor is another VCS, this will be the port found under VCS Configuration > Protocols > H.323 in the Registration UDP Port field. On: SIP INVITEs with no SDP will be generated and sent to this neighbor. Off: SIP INVITEs will be generated and a pre-configured SDP will be inserted before the INVITEs are sent to this neighbor. In most cases this option should normally be left as the default On. However, some systems such as Microsoft OCS 2007 will not accept invites with no SDP, so for these zones this should be set to Off. ! Peer 1 to Peer 6 address The IP Address or FQDN of the neighbor system. If the neighbor is a VCS cluster, this includes all of its Peers. See the section Neighboring the Local VCS to a Cluster for more information. Introduction D14049.04 JULY 2008 Getting Started Overview and Status Refer to the relevant TANDBERG VCS Deployment Guide for full details on how to configure these advanced options for specific systems. System Configuration VCS Configuration Zones and Neighbors Call Processing 91 Bandwidth Control Firewall Traversal Applications Maintenance Appendices Grey Headline (continued) Zones TANDBERG VIDEO COMMUNICATIONS SERVER ADMINISTRATOR GUIDE Configuring Traversal Client Zones Authentication username SIP mode Traversal clients must always authenticate with traversal servers by providing their authentication username and password. Determines whether SIP calls will be allowed to and from the traversal server. The client’s authentication username is shown here for reference, to make it easier to configure the corresponding zone on the traversal server. SIP port Specifies the port on the traversal server to be used for SIP calls to and from the VCS. The authentication username is a system-wide setting that is set via VCS Configuration > Authentication > Configuration. SIP transport Determines which transport type will be used for SIP calls to and from the traversal server. H.323 mode For firewall traversal to work via SIP, the traversal server must have a traversal server zone configured on it to represent this VCS, using this same transport type and port number. Determines whether H.323 calls will be allowed to and from the traversal server. H.323 protocol Determines which of the two firewall traversal protocols (Assent or H.460.18) to use for calls to the traversal server. (See Firewall Traversal Protocols for more information.) Retry interval H.323 port Specifies the interval in seconds with which a failed attempt to establish a connection to the traversal server should be retried. Specifies the port on the traversal server to be used for H.323 calls to and from the local VCS. Peer 1 to Peer 6 address For firewall traversal to work via H.323, the traversal server must have a traversal server zone configured on it to represent this VCS, using this same port number. The IP Address or FQDN of the traversal server. If the traversal server is a TANDBERG Border Controller, this should include all its Alternates. If the traversal server is a VCS cluster, this includes all of its Peers. See the section Neighboring the Local VCS to a Cluster for more information. For full details on how traversal client zones and traversal server zones work together to achieve firewall traversal, see Firewall Traversal. Introduction D14049.04 JULY 2008 Getting Started Overview and Status NTP must also be configured in order for traversal zones to work. System Configuration VCS Configuration Zones and Neighbors Call Processing 92 Bandwidth Control Firewall Traversal Applications Maintenance Appendices Grey Headline (continued) Zones TANDBERG VIDEO COMMUNICATIONS SERVER ADMINISTRATOR GUIDE Configuring Traversal Server Zones There must be an entry in the traversal server’s Authentication database for this username. See Authentication for more information. SIP mode Client authentication username Determines whether SIP calls will be allowed to and from this zone. If the traversal client is a VCS, this is its Authentication Username. If the traversal client is a TANDBERG Gatekeeper, this is its System Name. SIP port Specifies the port on the local VCS Expressway to be used for SIP calls to and from the traversal client. SIP transport H.323 mode Determines which transport type will be used for SIP calls to and from the traversal client. Determines whether H.323 calls will be allowed to and from the traversal client. UDP retry interval H.323 protocol Sets the frequency (in seconds) with which the client will send a UDP probe to the VCS Expressway if a keep alive confirmation has not been received. Determines the protocol (Assent or H.460.18) to be used to traverse the firewall/NAT. (See Firewall Traversal Protocols for more information.) UDP retry count H.323 port Specifies the port on the local VCS to be used for H.323 calls to and from the traversal client. Sets the number of times the client will attempt to send a UDP probe to the VCS Expressway during call setup. H.460.19 demultiplexing Mode UDP keep alive interval Determines whether or not the same two ports will be used for media by two or more calls. Sets the interval (in seconds) with which the client will send a UDP probe to the VCS Expressway once a call is established, in order to keep the firewall’s NAT bindings open. On: all calls will use the same two ports. Off: each call will use a separate pair of ports. For full details on how traversal client zones and traversal server zones work together to achieve firewall traversal, see Firewall Traversal. Introduction D14049.04 JULY 2008 Getting Started Overview and Status TCP keep alive interval TCP retry count TCP retry interval Sets the interval (in seconds) with which the traversal client will send a TCP probe to the VCS once a call is in place, in order to maintain the firewall’s NAT bindings. Sets the number of times the client will attempt to send a TCP probe to the VCS Expressway during call setup. Sets the frequency (in seconds ) with which the traversal client will send a TCP probe to the VCS if a keep alive confirmation has not been received. System Configuration VCS Configuration Zones and Neighbors Call Processing 93 Bandwidth Control Firewall Traversal The default UDP and TCP probe retry intervals are suitable for most situations. However, if you experience problems with NAT bindings timing out, they may need to be changed. Applications Maintenance Appendices Grey Headline (continued) Zones TANDBERG VIDEO COMMUNICATIONS SERVER ADMINISTRATOR GUIDE Configuring ENUM Zones DNS suffix Specifies the domain to be appended to the transformed E.164 number to create an ENUM domain for which this zone is queried. SIP mode Determines whether SIP records will be looked up for this zone. H.323 mode Determines whether H.323 records will be looked up for this zone. Full details of how to use and configure ENUM zones is given in ENUM Dialing. Introduction D14049.04 JULY 2008 Getting Started Overview and Status System Configuration VCS Configuration Zones and Neighbors Call Processing 94 Bandwidth Control Firewall Traversal Applications Maintenance Appendices Grey Headline (continued) Zones TANDBERG VIDEO COMMUNICATIONS SERVER ADMINISTRATOR GUIDE Configuring DNS Zones SIP mode Determines whether SIP calls will be allowed to this zone. H.323 mode Determines whether H.323 calls will be allowed to this zone. Full details of how to use and configure DNS zones is given in URI Dialing. Empty INVITE allowed Searches are automatically responded to Determines whether the VCS will generate a SIP INVITE messages which has no SDP to send to this zone. Determines what happens when the VCS receives a search destined for this zone. On: SIP INVITEs with no SDP will be generated and sent to this neighbor. Off: a SIP OPTION message will be sent to the zone. Off: SIP INVITEs with no SDP will be generated but a preconfigured SDP will be inserted before they are sent to this neighbor. The defaults for the SDP are: Note: In most cases this option should normally be left as the default On. However, some systems such as Microsoft OCS 2007 will not accept invites with no SDP, so for these zones this should be set to Off. ! Introduction D14049.04 JULY 2008 Getting Started Overview and Status System Configuration Refer to the relevant TANDBERG VCS Deployment Guide for full details on how to configure these advanced options for specific systems. VCS Configuration Zones and Neighbors Call Processing 95 Bandwidth Control On: searches will be responded to automatically, without being forwarded to the zone. Note: In most cases this option should normally be left as the default Off. However, some systems such as Microsoft OCS 2007 will not accept SIP OPTION messages, so for these zones this should be set to On. If you do change this to On, you must also configure pattern matches to ensure that only those searches that actually match endpoints in this zone are responded to. ! Refer to the relevant TANDBERG VCS Deployment Guide for full details on how to configure these advanced options for specific systems. Firewall Traversal Applications Maintenance Appendices Grey Headline (continued) Clustering, Peers and Alternates TANDBERG VIDEO COMMUNICATIONS SERVER ADMINISTRATOR GUIDE About Clustering A VCS can be part of a Cluster of up to six VCSs. Each VCS in the Cluster is a Peer of every other VCS in the Cluster. The purpose of a Cluster is twofold: • to increase the capacity of your VCS deployment compared with a single VCS • to provide redundancy in the rare case that a VCS becomes unavailable (for example, due to a network or power outage). VCS CLUSTER PEER 1 All Peers in a Cluster must use TMS to ensure they are configured identically for subzones, zones, links, pipes, authentication, bandwidth control and call policy. They must also have identical sets of options keys installed. Peers share information with each other about their use of bandwidth, registrations, and FindMe users. This allows the Cluster to act, as one large VCS Local Zone. The diagram opposite shows four Peers clustered together to form one large Local Zone. PEER 2 LOCAL ZONE ”Alternate” is an H.323 term for a system used to provide redundancy to a Primary gatekeeper, and prior to version X3.0 the VCS supported Alternates. From X3.0 onwards, redundancy (along with other features) is provided by clusters of Peers, which support both H.323 and SIP and work as equals. However, Peers may sometimes be referred to as Alternates. Cluster Subzone PEER 3 PEER 4 Cluster Subzone Subzone When two or more VCSs are clustered together, a new subzone is created within the cluster’s Local Zone. This is the Cluster Subzone, and any calls between two Peers in the Cluster will pass via this Subzone during call setup. The Cluster Subzone is (like the Traversal Subzone) a virtual Subzone used for call routing only, and endpoints can not register to this subzone. Once a call has been established between two Peers, the Cluster Subzone will no longer appear in the call route and the call will appear as having come from (or being routed to) the Default Subzone. Traversal Subzone Neighbor Zone Default Subzone The two situations in which a call will pass via the Cluster Subzone are: • Calls between two endpoints registered to different peers in the Cluster. Traversal Client Zone For example, Endpoint A is registered in the Default Subzone to Peer 1. Endpoint B is also registered in the Default Subzone, but to Peer 2. When A calls B, the call route is shown on Peer 1 as Default Subzone -> Cluster Subzone, and on Peer 2 as Cluster Subzone -> Default Subzone. • Calls received from outside the Cluster by one Peer, for an endpoint registered to another Peer. For example, we have a single VCS for the Branch Office, which is neighbored to a Cluster of 4 VCSs at the Head Office. A user in the Branch Office calls Endpoint A in the Head Office. Endpoint A is registered in the Default Subzone to Peer 1. The call is received by Peer 2, as it has the lowest resource usage at that moment. Peer 2 then searches for Endpoint A within the Cluster’s Local Zone, and finds that it is registered to Peer 1. Peer 2 then forwards the call to Peer 1, which forwards it to Endpoint A. In this case, on Peer 2 the call route will be shown as Branch Office -> Default Subzone -> Cluster Subzone, and on Peer 1 as Cluster Subzone -> Default Subzone. Introduction D14049.04 JULY 2008 Getting Started Overview and Status System Configuration VCS Configuration Default Zone Zones and Neighbors Call Processing 96 Bandwidth Control Firewall Traversal DNS Zone Applications ENUM Zone Maintenance Appendices Grey Headline (continued) Clustering, Peers and Alternates TANDBERG VIDEO COMMUNICATIONS SERVER ADMINISTRATOR GUIDE What Configuration is and isn’t Replicated? Configuring Clusters Prerequisites Most items of configuration are replicated across Peers, with the exceptions listed below. Before creating your cluster, ensure that: • Each VCS to be added to the cluster is configured with a different system name. • All VCSs to be added to the cluster have different LAN configuration (i.e. a different IPv4 Address and subnet mask, and different IPv6 Address, where enabled). • All VCSs to be added to the cluster have identical sets of option keys installed. • Determine which VCS is to be the master and configure it with the settings you wish to apply to the entire cluster. Enabling H.323 H.323 signaling is used for both endpoint location searching and sharing bandwidth usage information with other Peers in the cluster. This means that H.323 must be enabled on all Peers, even if all endpoints in the cluster are SIP only. To enable H.323, navigate to VCS Configuration > Protocols > H.323 and ensure that H.323 mode is set to On. TMS Clusters are created, configured and managed via TANDBERG Management Suite (TMS) version 12.0 and above. To create a cluster using TMS: 1. From Systems > Navigator, select the VCS that will be the Master. This will be the VCS on which all configuration changes are made, and whose configuration is replicated to the other Peers. 2. From the Clustering tab, select Create New Cluster. 3. Enter a Cluster Name and select Create Cluster. System Name LAN configuration is not replicated across Peers. Each Peer must have a different IPv4 Address and different IPv6 Address. The system name is not replicated. It must be different for each Peer in the cluster. The IP Protocol is replicated, because each Peer must support the same protocol(s). Administration Accounts IP Gateway configuration is not replicated. Each Peer can use a different Gateway. The password for the default admin administrator account is not replicated. Each Peer can have a different password. IP routes are not replicated. If these are used, they can be different for each Peer. Any other administration accounts and passwords will be replicated from the Master Peer to all other Peers. DNS Configuration See the Administration Accounts section for further information. DNS servers are not replicated across Peers - each Peer can use a different set of DNS servers. However, the DNS domain name is replicated across peers. Option keys Logging Option keys are not replicated. Each Peer must have an identical set of option keys installed, but you must purchase these separately for each Peer in the cluster. The Event Log and Configuration Log on each Peer will only report activity for that particular VCS. We recommend that you set up a remote syslog server to which the logs of all Peers can be sent. This will allow you to have a global view of activity across all Peers in the cluster. Ethernet speed 4. You will then have the option to Add Members to the cluster. Select the VCS(s) that are to be Peers in the cluster and click Add. (For full information, refer to the TMS Administrator Guide.) TMS will automatically propagate the configuration of the Master to all other Members (Peers) in the cluster. This ensures that configuration across the cluster is kept identical; if it is not, you may experience problems. You must only make configuration changes on the Master. Any changes made on other Peers will not be reflected across the cluster, and will be overwritten the next time the Master’s configuration is replicated across the Peers. IP configuration The ethernet speed is not replicated. Each Peer may have slightly different requirements for the connection to their ethernet switch. We recommend that Peers in a Cluster are deployed on the same LAN as each other so that they can be configured with the same routing information such as local domain names and local domain subnet masks. If Peers are deployed on different LANs, there must be sufficient connectivity between the networks to ensure a low degree of latency between the Peers. ! Introduction D14049.04 JULY 2008 Getting Started Overview and Status System Configuration VCS Configuration Zones and Neighbors Call Processing 97 Bandwidth Control Firewall Traversal Applications Maintenance Appendices Grey Headline (continued) Clustering, Peers and Alternates Sharing Registrations Across Peers When one VCS in a cluster receives a Location Request, it checks its own registration database along with that of each of its Peers before responding. This allows all endpoints in the cluster to be treated as if they were registered with a single VCS. TANDBERG VIDEO COMMUNICATIONS SERVER ADMINISTRATOR GUIDE Sharing Bandwidth Across Peers Upgrades and Downgrades When clustering has been configured, all Peers share the bandwidth available to the cluster. Peers are periodically queried to ensure that they are still functioning. In order to prevent delays during call setup, any non-functioning Peers will not receive Location Requests. Peers must be configured identically for all aspects of bandwidth control including subzones, links and pipes. Peers share their bandwidth usage information with all other Peers in the cluster, so when one Peer is consuming part or all of the bandwidth available within or from a particular subzone, or on a particular pipe, this bandwidth will not be available for other Peers. H.323 Registrations For general information on how the VCS manages bandwidth, see the Bandwidth Control section. SIP Registrations Failover re-registration to an Alternate applies to H.323 reregistrations only. The SIP standard currently has no equivalent. However, if you configure your endpoints with a SIP server address that is an FQDN, and configure this FQDN to resolve to a round-robin DNS record populated with the IP Addresses of all the Peers in the Cluster, then this could allow the endpoint to re-register with another Peer if its connection to the original Peer was lost. Introduction D14049.04 JULY 2008 Getting Started Overview and Status System Configuration Upgrading to X3.0 If you are upgrading to VCS software version X3.0 from a previous version and wish to implement clustering, you must: 1. Remove any existing Alternate configuration. 1. Upgrade all VCSs to be added to the cluster to VCS software version X3.0. 2. Determine which VCS will be the master VCS and configure it accordingly. All the Peers in a Cluster share responsibility for their H.323 endpoint community. When an H.323 endpoint registers with one Peer, it receives a registration response which contains a list of Alternate gatekeepers, populated with the IP addresses of all the other Peers in that Cluster. If the endpoint loses contact with the initial Peer, it will seek to register with one of the Alternates. This may result in your H.323 endpoint community’s registrations being spread over all the Peers in the Cluster. You should change the registration Time to live on all Peers in the Cluster from the default 30 minutes to just a few minutes. This setting determines how often endpoints are required to re-register with their VCS, and changing this to just a few minutes will ensure that if one VCS becomes unavailable, the endpoint will quickly failover to one of its Peers. To change this setting, navigate to VCS Configuration > Protocols > H.323 > Gatekeeper > Time to live. The Clustering feature was introduced to the VCS in software release X3.0. 3. Create and configure the cluster via TMS. 4. Add the remaining Peers to the cluster via TMS. Downgrading from X3.0 If you have clustering configured and subsequently downgrade to a version of VCS software prior to X3.0, the VCS will retain all its existing configuration but will no longer act as a Peer in a cluster - it will essentially become a stand-alone system. This will have the following impact: Backup and Restore • Changes to the master Peer will not be replicated to the The Backup and Restore process saves all configuration information for a particular VCS. We recommend that you backup not just the master Peer but all Peers in the cluster. This will ensure that Peer-specific configuration information (see the section What configuration is and isn’t replicated?) is saved and can be restored individually for each Peer. Do not restore a backup made on one Peer to another Peer. VCS Configuration Zones and Neighbors Call Processing 98 Bandwidth Control VCS, or if the VCS is the master Peer, its changes will not be replicated to any other VCS. • The VCS’s FindMe database will be a copy of that shared across all Peers in the cluster at the point when the VCS was downgraded. The FindMe database will then be accessible to the local VCS only. • Other VCSs that were Peers to this VCS will now be treated as Alternates. (See the X2.n Administrator Guide for full information on Alternates.) Firewall Traversal Applications Maintenance Appendices Grey Headline (continued) Clustering, Peers and Alternates TANDBERG VIDEO COMMUNICATIONS SERVER ADMINISTRATOR GUIDE Clustering and FindMe Viewing Peers Overview Configuration Clustering supports the use of FindMe. Each Peer has its own FindMe database containing all FindMe account information for the cluster. When a FindMe account is created or edited on one Peer, that Peer shares the information about the changes to all other Peers in the cluster, which then update their own FindMe databases accordingly. Enabling the Replication of FindMe Information Note that the replication of FindMe database information is a completely separate process and uses a different mechanism to the replication of configuration information. Changes to FindMe information can be made on any Peer and will be shared with all other Peers, whereas changes to configuration information can only be made to the master Peer and is then replicated to all other Peers via TMS. The Alternates page lists the IP Addresses of all the Peers in the Cluster to which this VCS belongs, including the IP Address of the VCS to which you are currently logged in. To view the Alternates page: If you are using FindMe on your VCS Cluster, you must first run a special series of commands to allow FindMe databases to be replicated between Peers. Contact your TANDBERG representative for further information on how to do this. • VCS Configuration > Alternates. You will be taken to the Alternates page. Alternates • xConfiguration Do not make any changes directly to this page; it is for information only. Adding and removing Peers from a Cluster must only be done via TMS. ! Enabling SSH The replication of FindMe data between Peers is performed using SSH, so this service must be enabled on all Peers. To enable SSH, navigate to System Configuration > System and ensure that SSH service is set to On. Clustering and Presence Clustering supports the use of Presence. All Peers in the cluster must have identical SIP Domain, Presence Server and Presence User Agent (PUA) configuration. If Peers in the cluster have the PUA enabled, each Peer will publish information about its own local registrations. This information will be routed to a Presence Server authoritative for the cluster’s domain. If Peers have the Presence Server enabled, the Presence database is replicated across all Peers in the cluster. Introduction D14049.04 JULY 2008 Getting Started Overview and Status When viewing Presence Status on a Peer in a cluster: • Publishers will show all presentities across the cluster for whom presence information is being published. • Presentities will show any presentity for whom a subscription request has been received on the local VCS only. • Subscribers will show each endpoint from Peer 1...Peer 6 IP address whom a subscription request has been received on the local VCS only. System Configuration VCS Configuration The IP Addresses of all Peers in the cluster are shown here. This will include the IP Address of the local VCS. Zones and Neighbors Call Processing 99 Bandwidth Control Firewall Traversal Systems that are configured as Alternates (Peers) must not also be configured as neighbors to each other, and vice versa. ! Applications Maintenance Appendices Grey Headline (continued) Clustering, Peers and Alternates TANDBERG VIDEO COMMUNICATIONS SERVER ADMINISTRATOR GUIDE Neighboring the Local VCS to a Cluster You can neighbor your local VCS (or VCS Cluster) to a remote VCS Cluster; this could be a Neighbor, Traversal Client, or Traversal Server to your local VCS. In this case, when a call is received on your local VCS and is passed via the relevant zone to the remote cluster, it will be routed to whichever Peer in that neighboring cluster has the lowest resource usage. That Peer will then forward the call as appropriate: • to one of its locally registered endpoints (if the endpoint is registered to that Peer) • to one of its Peers (if the endpoint is registered to another Peer in that cluster) • one of its external zones (if the endpoint has been located elsewhere). The IP Addresses of each Peer in the zone to which you are connecting are configured in the Location section of the Edit Zone page. To access this page:. • VCS Configuration > Zones. You will be taken to the Zones page. From here, click on the name of the zone you wish to edit, or click New to create a new zone. • Zones Zone [1..200] Neighbor Peer [1..6] Address • Zones Zone [1..200] TraversalClient Peer [1..6] Address When configuring a connection to a remote Cluster, you should configure the relevant zone with details of all the Peers in the Cluster. Adding this information to the zone will ensure that the call is passed to that Cluster regardless of the status of the individual Peers. Note that when you are configuring a connection to a remote cluster, you need to enter the IP Address of all Peers only when they are Neighbor or Traversal Client zones. You do not do this for Traversal Server zones, as these are not configured using IP Addresses. ! Peer 1...Peer 6 address Systems that are configured as Alternates (Peers) must not also be configured as neighbors to each other, and vice versa. Introduction D14049.04 JULY 2008 Enter the IP Address or FQDN of each Peer in the remote cluster. The order in which the Peers in the remote VCS cluster are listed here does not matter. Getting Started Overview and Status System Configuration VCS Configuration Zones and Neighbors Call Processing 100 Bandwidth Control Firewall Traversal Applications Maintenance Appendices Grey Headline (continued) Dial Plans TANDBERG VIDEO COMMUNICATIONS SERVER ADMINISTRATOR GUIDE About Dial Plans Flat Dial Plan Structured Dial Plan As you start deploying more than one VCS, it is useful to neighbor the systems together so that they can query each other about their registered endpoints. Before you start, you should consider how you will structure your dial plan. This will determine the aliases assigned to the endpoints, and the way in which the VCSs are neighbored together. The solution you chose will depend on the complexity of your system. Some possible options are described in the following sections. The simplest approach is to assign each endpoint a unique alias and divide the endpoint registrations between the VCSs. Each VCS is then configured with all the other VCS as neighbor zones. When one VCS receives a call for an endpoint which is not registered with it, it will send out a Location Request to all the other neighbor VCSs. Whilst conceptually simple, this sort of flat dial plan does not scale very well. Adding or moving a VCS requires changing the configuration of every VCS, and one call attempt can result in a large number of location requests. This option is therefore most suitable for a deployment with just one or two VCSs and its Alternates. Hierarchical Dial Plan An alternative deployment would use a structured dial plan whereby endpoints are assigned an alias based on the system they are registering with. If you are using E.164 aliases, each VCS would be assigned an area code. When the VCSs are neighbored together, each neighbor zone is configured with its corresponding area code as a prefix (i.e. a Match Mode of Pattern and a Type of Prefix). That neighbor will now only be queried for calls to numbers which begin with its prefix. In a URI based dial plan, similar behavior may be obtained by configuring neighbors with a suffix to match the desired domain name. It may be desirable to have endpoints register with just the subscriber number -- the last part of the E.164 number. In that case, the VCS could be configured to strip prefixes before sending the query to that zone. In this type of structure one VCS is nominated as the Directory for the deployment, and all other VCSs are neighbored with it alone. Each VCS is configured with the Directory VCS as a neighbor zone with a Match Mode of Always, and the Directory VCS is configured with each VCS as a neighbor zone with a Match Mode of Pattern and its prefix as the Pattern String. There is no need to neighbor the VCSs with each other. Adding a new VCS now only requires changing configuration on that system and the Directory VCS. However, failure of the Directory VCS in this situation could cause significant disruption to communications. Consideration should be given to the use of Clustering for increased resilience. A structured dial plan will minimize the number of queries issued when a call is attempted. However, it still requires a fully connected mesh of all VCSs in your deployment. A hierarchical dial plan can simplify this. Introduction D14049.04 JULY 2008 Getting Started Overview and Status System Configuration VCS Configuration Zones and Neighbors Call Processing 101 Bandwidth Control Firewall Traversal Applications Maintenance Appendices Grey Headline (continued) TANDBERG VIDEO COMMUNICATIONS SERVER ADMINISTRATOR GUIDE Call Processing This section provides information on the pages that appear under the Calls, Transforms and Policy sub-menus of the VCS Configuration menu. These pages allow you to configure the way in which the VCS receives and process calls. This section includes the following: • a overview of how the VCS searches for the destination endpoint • the different types of addresses that can be dialed to initiate a call • how to apply transforms to the address that was dialed, either before searching on the local VCS or when sending the search request to the Local Zone and external zones • how to use Call Policy to manage calls • how to set up your network to handle incoming and outgoing calls made via URI dialing and ENUM dialing • how to disconnect calls. Introduction D14049.04 JULY 2008 Getting Started Overview and Status System Configuration VCS Configuration Zones and Neighbors Call Processing 102 Bandwidth Control Firewall Traversal Applications Maintenance Appendices Grey Headline (continued) Introduction TANDBERG VIDEO COMMUNICATIONS SERVER ADMINISTRATOR GUIDE Call Processing Diagram One of the functions of the VCS is to route calls to their appropriate destination, based on the address or alias received from a locally registered endpoint or external zone. There are a number of steps involved in determining the destination of a call, and some of these steps can involve transforming the alias or redirecting the call to other aliases. It is important to understand the process before setting up your dial plan so you can avoid circular references, where an alias is transformed from its original format to a different format, and then back to the original alias. The VCS is able to detect circular references. If it does identify one it will terminate that branch of the search and return a “policy loop detected” error message. Search Process The process followed by the VCS when attempting to locate a destination endpoint is shown in the diagram opposite. 1. The user enters into their endpoint the alias or address of the destination endpoint. This can be in a number of different formats. 2. The destination address is sent from the caller’s endpoint to its local VCS (i.e. the VCS to which it is registered). 3. The VCS applies any pre-search transforms to the alias. 4. The VCS applies any Administrator Policy to the (transformed) alias. If this results in a new alias, the process starts again, with the new alias checked against the pre-search transforms. 5. The VCS applies any User Policy (if FindMe is enabled) to the alias. If the alias is a FindMe name that resolves to one or more new aliases, the process will start again; all the resulting aliases will be checked against pre-search transforms and Administrator Policy. 6. The VCS then searches, in order of priority, all its zones, including the Local Zone (which includes any Peers). If the alias matches an ENUM zone, this may return a URI. If so, the process starts again; the URI is checked against any pre-search transforms, Administrator Policy and User Policy. 7. If the alias is found within the Local Zone or by one of the external zones, the VCS will attempt to place the call to that zone. 8. If the alias is not found, the VCS will respond with a message to say that the call has failed. Introduction D14049.04 JULY 2008 Getting Started Overview and Status System Configuration VCS Configuration Zones and Neighbors Call Processing 103 Bandwidth Control Firewall Traversal Applications Maintenance Appendices Grey Headline (continued) Dialing by Address Types TANDBERG VIDEO COMMUNICATIONS SERVER ADMINISTRATOR GUIDE About the Different Address Types Dialing by H.323 ID or E.164 alias The destination address that is entered via the caller’s endpoint can take a number of different formats, and this will affect the specific process that the VCS follows when attempting to locate the destination endpoint. The address types supported by the VCS are: No special configuration is required in order to place a call using an H.323 ID or E.164 alias. The VCS follows the usual search process, applying any transforms and then searching the Local Zone and external zones for the alias, depending on the match and priority settings of each. • IP address e.g. 10.44.10.1 or 3ffe:80ee:3706::10:35 • H.323 ID e.g. john.smith or john.smith@example.com • E.164 alias e.g. 441189876432 or 6432 • URI e.g. john.smith@example.com • ENUM e.g. 441189876432 or 6432 Each of these address types may require some configuration of the VCS in order for them to be supported. The following sections describe the configuration required for each address type. ! SIP endpoints must register using a URI. We recommend that H.323 endpoints also register with an H.323 ID in the form of a URI to facilitate interworking. Dialing by IP Address Dialing by H.323 or SIP URI Dialing by IP address is necessary when the destination endpoint is not registered with any system (e.g. VCS, gatekeeper or Border Controller). If the destination endpoint is registered with one of these systems, then it may still be possible to call it using its IP address but we recommend that one of the other addressing schemes should be used instead as they are more flexible. When a user places a call using URI dialing, they will typically dial name@example.com. In order to make a call by dialing the destination endpoint’s IP address, the call must be able to be routed via a VCS that is configured with a Calls to Unknown IP Addresses setting of Direct. This could be the local VCS, or it could be one of its neighbors (in which case the local VCS would route the call to the neighbor, which would then place the call directly to the IP address). Full instructions on how to configure the VCS to support URI dialing (both outbound and inbound) are given in URI Dialing. For endpoints that are not locally registered, URI dialing may make use of DNS to locate the destination endpoint. In order to support full URI dialing on the VCS you must configure it with at least one DNS server and at least one DNS zone, However, if the destination IP address is found in a local subzone (i.e. it is an endpoint registered to the same VCS as the endpoint making the call), then the call will be placed regardless of the Calls to Unknown IP Addresses setting. Endpoints registered to a VCS Expressway Calls made by dialing the IP address of an H.323 endpoint registered directly with a VCS Expressway will be forced to route through the VCS Expressway. The call will therefore be subject to any restrictions configured on that system. ! D14049.04 JULY 2008 Getting Started Overview and Status System Configuration VCS Configuration ENUM dialing allows an endpoint to be contacted by a caller dialing an E.164 number - a telephone number - even if that endpoint has registered using a different format of alias. The E.164 number is converted into a URI by the DNS system, and the rules for URI dialing are then followed to place the call. The ENUM dialing facility allows you to retain the flexibility of URI dialing whilst having the simplicity of being called using just a number - particularly important if any of your callers are restricted to dialing via a numeric keypad. In order to support ENUM dialing on the VCS you must configure it with at least one DNS server and the appropriate ENUM zone(s). If you are calling from an unregistered endpoint, we do not recommend dialing the destination endpoint using its IP address. The presence of a firewall may disrupt the call. Instead place the call to the VCS to which the destination endpoint is registered as described in Calls from an Unregistered Endpoint. Introduction Dialing by ENUM Full instructions on how to configure the VCS to support ENUM dialing (both outbound and inbound) are given in ENUM Dialing. Zones and Neighbors Call Processing 104 Bandwidth Control Firewall Traversal Applications Maintenance Appendices Grey Headline (continued) Hop Counts TANDBERG VIDEO COMMUNICATIONS SERVER ADMINISTRATOR GUIDE About Hop Counts Configuring Hop Counts Each search request is assigned a hop count value by the system that initiates the search. Every time the request is forwarded to another neighbor gatekeeper or proxy, the hop count value is decreased by a value of 1. When the hop count reaches 0, the request will not be forwarded on any further. For search requests initiated by the local VCS, the hop count assigned to the request is configurable on a zone-by-zone basis. The zone’s hop count will apply to all search requests originating from the local VCS that are sent to that zone. To configure the hop count for a zone: • VCS Configuration > Zones. You will be taken to the Zones page. Click on the name of the zone you wish to configure. You will be taken to the Edit Zone page. In the Configuration section, in the Hop Count field, enter the hop count value you wish to use for this zone. • xConfiguration Zones Zone [1..200] HopCount For full details on other zone options, see Configuring Zones. Search requests received from another zone will already have a hop count assigned. When the request is subsequently forwarded on to a neighbor zone, the lower of the two values (i.e. the original hop count or the hop count configured for that zone) will be used. For H.323, the hop count only applies to search requests. For SIP, the hop count applies to all requests sent to a zone, affecting the Max-Forwards field in the request. The hop count value can be between 1 and 255. The default is 15. ! If your hop counts are set higher than necessary, you may risk introducing loops into your network. In these situations a search request will be sent around the network until the hop count reaches 0, consuming resources unnecessarily. When dialing by URI or ENUM, the hop count used is that for the associated DNS or ENUM zone via which the destination endpoint (or intermediary SIP Proxy or gatekeeper) was found. Introduction D14049.04 JULY 2008 Getting Started Overview and Status System Configuration VCS Configuration Zones and Neighbors Call Processing 105 Bandwidth Control Firewall Traversal Applications Maintenance Appendices Grey Headline (continued) Searches and Transforms TANDBERG VIDEO COMMUNICATIONS SERVER ADMINISTRATOR GUIDE Overview of Searches and Transforms Pre-Search Transforms About Searches About Pre-Search Transforms One of the VCS’s functions is to process incoming requests to search for a particular alias. These search requests are received from The pre-search transform function allows you to modify the alias in an incoming search request. The transformation is applied by the VCS before any searches take place, either locally or to external zones. It applies to all incoming search requests received from locally registered endpoints, Neighbor, Traversal Client and Traversal Server zones, and endpoints on the public internet. It does not apply to requests received from Peers (which are configured identically and therefore will have already applied the same transform). • locally registered endpoints • neighboring systems, including neighbors, traversal clients and traversal servers • endpoints on the public internet. Regardless of the origin of the request, the VCS will search its Local Zone and all external zones for the alias. When creating and configuring zones, you assign at least one match and corresponding priority to each zone, and the zones with the highest priority matches (i.e. those with a priority closest to 1) are searched first. In addition, you can use these pattern matching rules to filter searches to specific zones. For full information about configuring searches, see the Zone Searching and Transforming section. Each pre-search transform defines a string against which an alias is compared, and the changes to make to the alias if it matches that string. Once the alias has been transformed, it remains changed. and all further call processing is applied to the new alias. About Transforms Pre-Search Transform Process The VCS allows you to transform the alias in a search request if it matches certain criteria. This transformation can be applied to the alias at two points in the search process: Up to 100 pre-search transforms can be configured. Each transform must have a unique priority number between 1 and 65534. • as soon as it is received and before it is searched for locally (pre-search Transforms) • after call policy has been applied and before sending a search request to the Local Zone and Every incoming alias is compared with each transform in order of priority, starting with that closest to 1. If and when a match is made, the transform is applied to the alias and no further pre-search checks and transformations of the new alias will take place. The new alias is then used for the remainder of the search process. external zones. You can transform the alias by removing or replacing its prefix, suffix, or the entire string, and by the use of regular expressions. All Peers in a cluster should be configured identically, including any pre-search transforms. A VCS in a cluster will treat search requests from any of its Peers as having come from its own Local Zone, and will not re-apply any pre-search transforms on receipt of the request. Introduction D14049.04 JULY 2008 Getting Started Overview and Status System Configuration VCS Configuration Zones and Neighbors Further transforms of the alias may take place during the remainder of the search process. This may be as a result of Call Policy (Administrator Policy) or FindMe (User Policy). If this is the case, the pre-search transforms are re-applied to the new alias. Refer to the search process diagram for more information. Call Processing 106 Bandwidth Control Firewall Traversal Applications Pre-search transforms are not applied to GRQ or RRQ messages received from endpoints registering with the VCS; endpoints will be registered with the alias(es) as presented in these messages. Pre-search transforms will be applied prior to any possible CPL modification and Zone transforms. If you add a new pre-search transform that has the same priority as an existing transform, all transforms with a lower priority (i.e. higher numerical value) will have their priority incremented by one, and the new transform will be added with the specified priority. However, if there are not enough “slots” left to move all the priorities down, then you will get an error message. Maintenance Appendices Grey Headline (continued) Searches and Transforms TANDBERG VIDEO COMMUNICATIONS SERVER ADMINISTRATOR GUIDE Pre-Search Transforms Configuring Pre-Search Transforms Pattern string Specifies the pattern against which the alias is compared. To configure the way in which aliases are transformed before being searched for: • VCS Configuration > Transforms. You will be taken to the Transforms page. Click New. You will be taken to the Create Transform page. • xConfiguration Transform [1..100]. Priority Assigns a priority to this transform. Priority can be from 1 to 65534, with 1 being the highest priority. Transforms are applied in order of priority, and the priority must be unique for each transform. Pattern type Determines the way in which the string must match the alias. Options are: Exact: the string must match the alias character for character. Prefix: the string must appear at the beginning of the alias. Suffix: the string must appear at the end of the alias. Regex: the string will be treated as a regular expression. Pattern behavior Determines how the matched part of the alias will be modified. Options are: Pre-search transforms support the use of Regular Expressions in both the Pattern String and Replace String fields. See the Appendix Regular Expression Reference for more information. Introduction D14049.04 JULY 2008 Getting Started Overview and Status Create Transform Cancel Click here to save the transform and return to the Transforms page. Click here to return to the Transforms page without adding the new transform. System Configuration VCS Configuration Zones and Neighbors Call Processing 107 Replace string (applies only if Pattern Behavior is set to Replace) Specifies the string to be used as a substitution for the part of the alias that matched the pattern. Bandwidth Control Firewall Traversal Strip: the matching prefix or suffix will be removed from the alias. Replace: the matching part of the alias will be substituted with the text in the Replace String. Applications Maintenance Appendices Grey Headline (continued) Searches and Transforms TANDBERG VIDEO COMMUNICATIONS SERVER ADMINISTRATOR GUIDE Zone Searching and Transforming About Zone Searching About Zone Transforms Zone Search and Transform Process The VCS allows you to filter the search requests sent to each zone, including the Local Zone, and prioritize the order in which these zones are searched. This allows you to reduce the potential number of search requests sent out, and speed up the search process. The VCS allows you to change the alias being searched for before a search request is sent to the Local Zone or out to a particular zone. This feature uses the PatternMatch mode of the zone search function. Zones searching takes place after call policy has been applied. The zone search and transform process is applied to the Local Zone and all other external zones simultaneously, and is as follows: To set up a zone transform, you must: The VCS uses the concept of zone “matches” to filter search requests. Each zone has up to five configurable “matches” available to it. Each match is assigned a Mode and Priority (described below). The combination of the two determines if and when that zone will be queried. • configure the zone with a Mode of PatternMatch • specify the pattern that the alias to be transformed must 1. The VCS looks at all matches for the Local Zone and all external zones to find those with either: Match Mode The match Mode allows you to specify whether and how requests to the zone will be filtered. You can also use this mode to prevent search requests from ever being sent to the zone. The Mode options are: • AlwaysMatch: always query the zone • PatternMatch: only query the zone if the alias being searched match • specify the way in which the alias will be transformed. All searches that match the specified pattern will then be transformed when sent to the zone, and the zone will be queried using the new alias. Each zone has up to five configurable matches. This means that you can specify up to five different transforms for each zone. This could be: • one alias or string transformed five different ways • five aliases or strings each transformed individually • a combination of both. for matches a specified pattern • Disabled: never query the zone (this mode does not need a corresponding Priority option). Using Zone Searches and Transforms Together The zone searching feature and the zone transforms feature both make use of the PatternMatch mode. You can use these two features together or separately. Match Priority The match Priority allows you to specify when in the search process that zone will be queried. Search requests are sent to all zones with a Priority 1 match first, followed by all zones with Priority 2 matches, and so on. The remainder of this section: • describes the zone search and transform process • explains how to configure zone searches and transforms • gives some examples of how zone searches and transforms could be used together. It is possible for the same priority to be given to more than one match, either in the same zone or in different zones. In this case, all zones with that match priority will be queried at the same time. Introduction D14049.04 JULY 2008 Getting Started Overview and Status System Configuration Zone transforms support the use of Regular Expressions in both the Pattern String and Replace String fields. See the Appendix Regular Expression Reference for more information. VCS Configuration Zones and Neighbors Call Processing 108 Bandwidth Control • a Mode of AlwaysMatch, or • a Mode of PatternMatch and a Pattern String that matches the alias being searched for. 2. These matches are listed in order of the Priority that has been assigned to them. 3. If there are any duplicates in the list, the entry with the lower Priority is removed. (This applies to a zone with the same pattern string and the same transform but different priorities.) 4. If there is a zone which has an AlwaysMatch as well as a PatternMatch with no transforms, the PatternMatch is removed from the list. 5. All zones with a Priority 1 match on the list are queried using the same protocol (i.e. SIP or H.323) as the incoming call request. For AlwaysMatch matches, the query will use the original alias; for PatternMatch matches the query will use the alias specified by the transform rules. 6. If the alias is found, the call will be forwarded to that zone. If the alias is found by more than one zone, the call will be forwarded to the zone that responded first. 7. If the alias is not found using the native protocol, the query is repeated (as per steps 5 and 6) using the interworked protocol. 8. If the alias is not found, all zones with a Priority 2 match are queried as per steps 5 to 7. 9. The process is repeated with subsequent Priority levels until either: • the alias is found, or • all zones with a match that meets the specified criteria have been queried. Firewall Traversal Applications Maintenance Appendices Grey Headline (continued) Searches and Transforms TANDBERG VIDEO COMMUNICATIONS SERVER ADMINISTRATOR GUIDE Zone Searching and Transforming Configuring Zone Searches and Transforms Mode Determines if and when a query will be sent to this zone. Options are: To configure when a zone will be searched and any transforms that will be applied before the search request is sent: AlwaysMatch: the zone will always be queried. Local Zone PatternMatch: the zone will only be queried if the alias queried for matches the specified Pattern String. • VCS Configuration > Local Zone > Matches. You will be taken to the Local Zone Matches page. • xConfiguration Disabled: this match is not used. If all 5 matches for a zone are disabled, the zone will never be queried. Zones LocalZone Match [1..5] External Zones • VCS Configuration > Zones. Priority You will be taken to the Zones page. Click on the zone you wish to configure (or New to create and configure a new zone). You will be taken to the Edit Zone page. Scroll down until you get to the Match1 section. • xConfiguration Determines the order in which the zone will be sent a search request. Zones with priority 1 matches are searched first, followed by priority 2, and so on. More than one match can be assigned the same priority; in this case the matching zones will be queried simultaneously. Zones Zone [1..200] Match [1..5] Default Settings Pattern string (Applies only if the Mode is PatternMatch.) By default the Local Zone and all other configured zones have a Match 1 configured with a Mode of AlwaysMatch. All remaining matches will be set to Disabled. This means that (unless you make any changes) the zone will be queried for the original alias, with no transforms applied. The difference between the default settings for each type of zone is the Priority assigned to Match 1. The default priorities are: • Local Zone: 50 • Neighbor, Traversal Client or Traversal Server zone: 100 • ENUM or DNS zone: 150 This default configuration means that the Local Zone will be searched first for all aliases. If not found locally, all Neighbor, Traversal Client and Traversal Server zones will then be searched, and if they cannot locate the alias the request will be sent to any DNS and ENUM zones. Specifies the pattern against which the alias is compared. Pattern type (Applies only if the Mode is PatternMatch.) Pattern behavior (Applies only if the Mode is PatternMatch.) Specifies the string to be used as a substitution for the part of the alias that matched the pattern. Leave: the alias will not be modified. Prefix: the string must appear at the beginning of the alias. Strip: the matching prefix or suffix will be removed from the alias. Suffix: the string must appear at the end of the alias. Replace: the matching part of the alias will be substituted with the text in the Replace String. Regex: the string will be treated as a regular expression. Determines if and how the matched part of the alias will be modified. Options are: You can change the default Match 1 Mode and Priority and add additional Matches for all zones, including the Local Zone. Introduction D14049.04 JULY 2008 Getting Started Overview and Status System Configuration Determines the way in which the string must match the alias. Options are: Replace string (Applies only if the Mode is PatternMatch and Pattern Behavior is Replace.) VCS Configuration Zones and Neighbors Call Processing 109 Bandwidth Control Firewall Traversal Exact: the string must match the alias character for character. Applications Maintenance Appendices Grey Headline (continued) Searches and Transforms TANDBERG VIDEO COMMUNICATIONS SERVER ADMINISTRATOR GUIDE Examples Combining Match Types and Priorities By using both AlwaysMatch and PatternMatch matches in the same zone, and applying the same or different priorities to each match, you will have a great deal of flexibility in determining if and when the zone will be queried and whether any transforms will be applied. Some example configurations are given here. Never Query a Zone Always Query a Zone, Never Apply Transforms To configure the zone so that it is never sent an alias search request (for example if you only want to receive incoming calls from this zone), set all 5 matches to a Mode of Disabled: To configure the zone so that it is always sent search requests using the original alias, set Match 1 to AlwaysMatch with a Priority of 1: The AlwaysMatch mode does not support alias transforms. Should you wish to always query a zone using a different alias to that received, you will need to use a mode of PatternMatch in combination with a regular expression. Introduction D14049.04 JULY 2008 Getting Started Overview and Status System Configuration VCS Configuration Zones and Neighbors Call Processing 110 Bandwidth Control Firewall Traversal Applications Maintenance Appendices Grey Headline (continued) Searches and Transforms TANDBERG VIDEO COMMUNICATIONS SERVER ADMINISTRATOR GUIDE Examples Filter Queries to a Zone Without Transforming It is possible to filter the search requests sent to a zone so that it is only queried for aliases that match certain criteria. For example, assume all endpoints in your regional sales office are registered to their local VCS with a suffix of @sales.example.com. In this situation, it makes sense for your Head Office VCS to query the Sales Office VCS only when it receives a search request for an alias with a suffix of @sales.example.com. Sending any other search requests to this particular VCS would take up resources unnecessarily. To achieve this, on your Head Office VCS create and configure the zone representing the Sales Office VCS as shown: Introduction D14049.04 JULY 2008 Getting Started Overview and Status System Configuration VCS Configuration Zones and Neighbors Call Processing 111 Bandwidth Control Firewall Traversal Applications Maintenance Appendices Grey Headline (continued) Searches and Transforms TANDBERG VIDEO COMMUNICATIONS SERVER ADMINISTRATOR GUIDE Examples Query a Zone for Original and Transformed Alias You may wish to query a zone for the original alias at the same time as you query it for a transformed alias. To do this, configure one match with a mode of AlwaysMatch, and a second match with a mode of PatternMatch along with details of the transform to be applied. Both matches must be given the same Priority level. For example, you may wish to query a neighbor zone for both a full URI and just the name (i.e. the URI with the domain removed). To achieve this, on your local VCS configure the zone representing the neighbor VCS as shown: Introduction D14049.04 JULY 2008 Getting Started Overview and Status System Configuration VCS Configuration Zones and Neighbors Call Processing 112 Bandwidth Control Firewall Traversal Applications Maintenance Appendices Grey Headline (continued) Searches and Transforms TANDBERG VIDEO COMMUNICATIONS SERVER ADMINISTRATOR GUIDE Examples Query a Zone for Two or More Transformed Aliases Zones are queried in order of priority of the matches configured within them. It is possible to configure a single zone with up to five PatternMatch matches, each with the same Priority and with an identical Pattern String to be matched, but each with a different replacement pattern. In this situation, the VCS will query that zone for each of the new aliases simultaneously. (Any duplicate aliases produced by the transforms will be removed prior to the search requests being sent out.) If any of the new aliases are found by that zone, the call will be forwarded to the zone. It is then up to the controlling system to determine the alias to which the call will be forwarded. Introduction D14049.04 JULY 2008 Getting Started Overview and Status System Configuration VCS Configuration Zones and Neighbors Call Processing 113 Bandwidth Control Firewall Traversal Applications Maintenance Appendices Grey Headline (continued) Call Policy TANDBERG VIDEO COMMUNICATIONS SERVER ADMINISTRATOR GUIDE About Call Policy Administrator Policy and Authentication The VCS allows you to set up a set of rules to control which calls are allowed, which calls are rejected, and which calls are to be redirected to a different destination. These rules are known as Call Policy, or Administrator Policy Administrator Policy uses the source and destination of a call to determine the action to be taken. Policy interacts with Authentication when considering the source alias of the call. If your VCS is part of a secure environment, any policy decisions based on the source of the call should only be made when that source can be authenticated. Whether or not the VCS considers an endpoint to be authenticated depends on the Authentication Mode setting of the VCS. If Administrator Policy is enabled and has been configured, each time a call is made the VCS will execute the policy in order to decide, based on the source and destination of the call, whether to • proxy the call to its original destination • redirect the call to a different destination or set of destinations • reject the call. You can set up an Administrator Policy in either of two ways: • by configuring basic administrator policy using the web interface. (Note that this will only allow you to Allow or Reject specified calls) • by uploading a script written in the Call Processing Language (CPL). Authentication Mode On When Authentication Mode is set to On on the VCS, all endpoints and neighbors are required to authenticate with it before calls will be accepted. If a call is received from an unauthenticated source (e.g. neighbor or endpoint) the call’s source aliases will be removed from the call request and replaced with an empty field before the Administrator Policy is executed. This is because there is a possibility that the source aliases could be forged and therefore they should not be used for policy decisions in a secure environment. This means that, when Authentication Mode is On and you configure policy based on the source alias, it will only apply to authenticated sources. The VCS determines whether or not an endpoint is authenticated as follows: H.323 An H.323 endpoint is considered to be authenticated if either of the following conditions apply: • it is a locally registered endpoint. (Because Authentication Mode is On, the registration will have been accepted only after the endpoint authenticated successfully with the VCS.) • it is a remote endpoint that is registered to and authenticated with a Neighbor VCS, and that Neighbor in turn has authenticated with the local VCS. An H.323 endpoint is considered to be unauthenticated when: Only one of these two methods can be used at any one time to specify Administrator Policy. If a CPL script has been uploaded, this will disable use of the web interface to configure administrator policy. In order to use the web interface, you must delete the CPL script that has been uploaded. • it is a remote endpoint registered to a neighbor and that neighbor has not authenticated with the VCS. This is regardless of whether or not the endpoint authenticated with the neighbor. SIP A SIP endpoint is considered to be authenticated when: • it falls within one of the domains for which the VCS is authoritative and has successfully responded to an authentication challenge. A SIP endpoint is considered to be unauthenticated if any of the following conditions apply: When enabled, Administrator Policy is executed for all calls going through the VCS. • it does not fall within one of the domains for which the VCS is authoritative, or • it has failed to successfully respond to an authentication challenge, or • it has successfully responded to an authentication challenge but its From or Reply-To addresses are not compatible with the alias origin settings. Use Administrator Policy to determine which callers can make or receive calls via the VCS. Use Allow and Deny lists to determine which aliases can or cannot register with the VCS. Introduction D14049.04 JULY 2008 Getting Started Overview and Status System Configuration Authentication Mode Off When Authentication Mode is set to Off on the VCS, calls will be accepted from any endpoint or neighbor. The assumption is that the source alias is trusted, so authentication is not required. VCS Configuration Zones and Neighbors Call Processing 114 Bandwidth Control Firewall Traversal Applications Maintenance Appendices Grey Headline (continued) Administrator Policy TANDBERG VIDEO COMMUNICATIONS SERVER ADMINISTRATOR GUIDE Enabling the use of Administrator Policy To enable Administrator Policy: Administrator Policy Mode • VCS Configuration > Call Policy. You will be taken to the Call Policy page. • xConfiguration Policy AdministratorPolicy Mode On: Administrator Policy is enabled. If a CPL script has been uploaded, this policy will be used. Otherwise, the policy configured via the Administrator Policy section will be used. Off: Administrator Policy is not in use. Save You must click here for any changes to the Administrator Policy Mode to take effect. Once you have enabled the use of Administrator Policy, you must define the policy to be used. This is done either via the web interface or by uploading a CPL script. If Administrator Policy is on but a policy has not been configured, then a default policy will be applied that allows all calls, regardless of source or destination. Introduction D14049.04 JULY 2008 Getting Started Overview and Status System Configuration VCS Configuration Zones and Neighbors Call Processing 115 Bandwidth Control Firewall Traversal Applications Maintenance Appendices Grey Headline (continued) Administrator Policy TANDBERG VIDEO COMMUNICATIONS SERVER ADMINISTRATOR GUIDE Configuring Administrator Policy via the Web Interface To configure Administrator Policy using the web interface: and Each combination of Source and Destination is compared, in the order shown, with the details of the call being made until a match is found. To move a particular item to higher or and icons lower in the list, click on the respectively. • VCS Configuration > Policy > Administrator. You will be taken to the Administrator Policy page. You will not be able to use the web interface to configure Administrator Policy if a CPL file is already in place. If this is the case, you will have the option to Delete Existing file. Doing so will delete the existing Administrator Policy and enable use of the web interface for Administrator Policy configuration. ! Destination The alias that the endpoint dialed to make the call. This field supports Regular Expressions. Action Whether or not the call will be permitted. Allow: if both the Source and Destination aliases match those listed, call processing will continue. Administrator Policy This section shows the web-configured Administrator policy currently in place. To edit the existing policy, click Add New. Reject: if both the Source and Destination aliases match those listed, the call will be rejected. Source Cancel The alias that the calling endpoint used to identify itself when placing the call. This field supports Regular Expressions. Returns to the Administrator Policy page without adding the new item. Add Unauthenticated user Adds the new item to the Administrator Policy. Check this box if you wish the new policy to apply to all incoming calls where the endpoint making the call is not either: Commit • locally registered and authenticated with the VCS, or • registered and authenticated to a neighbor which in turn has authenticated with the local VCS. Introduction D14049.04 JULY 2008 Getting Started Overview and Status Updates the existing Administrator Policy with the changes you have made. Delete Add New To remove one or more line items from the list, check the box to the left of the item and then click Delete. Click to add the new item to the Policy. A new row with empty fields for you to complete will appear. System Configuration VCS Configuration Zones and Neighbors Call Processing 116 Bandwidth Control Firewall Traversal Applications Maintenance Appendices Grey Headline (continued) Administrator Policy TANDBERG VIDEO COMMUNICATIONS SERVER ADMINISTRATOR GUIDE Downloading policy files Configuring Administrator Policy via a CPL script To configure Administrator Policy using a CPL script: Show Policy file Click here to download the Administrator Policy that is currently in place, as an XML-based CPL script. • VCS Configuration > Policy > Administrator. You will be taken to the Administrator Policy page. • if Administrator Policy has been configured using a CPL script, this will show you the script that was uploaded • if Administrator Policy has been configured using the web interface, this will show you the CPL version of the policy • if Administrator Policy is On but a policy has not been configured, this will show you the default CPL script that allows all calls. Uploading a CPL Script You can use CPL scripts to configure advanced Administrator Policy. To do this, you must first create and save the CPL script as a text file, after which you upload it to the VCS. The CPL script cannot be uploaded via the command line interface. You may wish to download the file in order to take a backup copy of the Administrator Policy, or you may want to use the web-configured Administrator Policy as a starting point for a more advanced CPL script. About CPL XSD files The CPL script must be in a format supported by the VCS. The Administrator Policy page allows you to download the XML schemas which are used to check the script before it is uploaded to the VCS, so you can check in advance that your CPL script is valid. If you download a web-configured Administrator policy as a CPL script and then upload it back to the VCS without editing it, the VCS will recognise the file and automatically add each rule back into the Administrator Policy section of the web interface. Select the new policy file Enter the file name or Browse to the CPL script you wish to upload. Show CPL XSD file Upload File Downloads the XML schema used for the CPL script. Once you have selected the file containing the CPL script, click here to upload it to the VCS. Show CPL Extensions XSD file For information on the CPL syntax and commands that are supported by the VCS, see CPL Reference. Introduction D14049.04 JULY 2008 Getting Started Overview and Status Downloads the XML schema used for additional CPL elements supported by the VCS. System Configuration VCS Configuration Zones and Neighbors Call Processing 117 Bandwidth Control Firewall Traversal Applications Maintenance Appendices Grey Headline (continued) URI Dialing TANDBERG VIDEO COMMUNICATIONS SERVER ADMINISTRATOR GUIDE Overview URI Resolution Process via DNS A URI address typically takes the form name@example.com, where name is the alias and example.com is the domain. URI dialing can make use of DNS to enable endpoints registered with different systems to locate and call each other. With URI dialing, it is possible to find an endpoint by using DNS to locate the domain in the URI address and then query that domain for the alias. Without URI dialing, you would need to neighbor all the systems to each other in order for one system to be able to locate an endpoint registered to another system. This does not scale well as the number of systems grows. It is also inconvenient for making one-off calls to endpoints registered with previously unknown systems. H.323 endpoints should register with the VCS using a URI address in order to be reachable using URI dialing. SIP endpoints always register with an AOR in the form of a URI. There is an exception to the requirement for H.323 endpoints to register with the VCS using a URI address in order to be reachable using URI dialing. This is the case where endpoints register with an alias, and incoming calls are made to alias@domain.com. A local transform is then configured to strip the @domain, and the search is made locally for alias. If the VCS does not have DNS configured, calls made using URI dialing will still be placed if the destination endpoint is locally registered, or registered to a neighbor system. This is because these endpoints are not located via a DNS query. Introduction D14049.04 JULY 2008 Getting Started Overview and Status When a VCS is attempting to locate a destination URI address using the DNS system, the general process is as follows: H323 1. The VCS will send a query (via its DNS server) for a SRV record for the domain in the URI. If available, this SRV record will return information about the authoritative H.323 gatekeeper for that domain (e.g. its FQDN and listening port). • If the domain part of the URI address was resolved successfully using an H.323 Location SRV record (i.e. for _ h323ls) then the FQDN returned is queried via an LRQ for the full URI address. • If the domain part of the URI address was resolved using an H.323 Call Signaling SRV record (i.e. for _ h323cs) or an A/ AAAA record lookup then the call is routed directly to the IP address returned in that record. An exception to this is where the original dial string has a port specified (e.g. user@example.com:1720) in which case the address returned is queried via an LRQ for the full URI address. Once its IP address has been discovered, the system will query that gatekeeper for the URI. 2. If a relevant SRV record cannot be located, the system will fall back to looking for an A or AAAA record for the domain in the URI. If such a record is found, the call will be routed to that IP address. Enabling URI Dialing SIP 1. The system will send a NAPTR query for the domain in the URI. If available, the result set of this query will describe a prioritized list of SRV records and transport protocols that should be used to contact that domain. If no NAPTR records are present in DNS for this domain name then the VCS will use a default list of _sips._tls.
, _sip._ tcp. and _sip._udp. for that domain as if they had been returned from DNS. 2. The system will send SRV queries for each result returned from the NAPTR record lookup. A prioritized list of A/AAAA records returned is built. If no SRV records are found then the domain name from the URI is added as the only entry in list of A/AAAA records to lookup. 3. The system will send an A/AAAA record query for each name record returned by the SRV record lookup. The above steps will result in a tree of IP addresses, port and transport protocols to be used to contact the target domain. The tree is sub-divided by NAPTR record priority and then by SRV record priority. When the tree of locations is used, the searching process will stop on the first location to return a response that indicates that the target destination has been contacted. URI dialing is enabled separately for outgoing and incoming calls. Outgoing Calls To enable endpoints registered to your VCS to place calls to non-locally registered endpoints directly using URI dialing, you must: • configure at least one DNS zone, and • configure at least one DNS Server. This is described in the section Configuring URI dialing for outgoing calls. Incoming Calls To enable endpoints registered to your VCS to receive calls directly from non-locally registered endpoints using URI dialing, you must: • ensure all endpoints are registered with a URI address • configure appropriate DNS records, depending on the protocols and transport types you wish to use. This is described in the section Configuring URI dialing for Incoming calls. Firewall Traversal Calls To configure your system so that you can place and receive calls using URI dialing through a firewall, see the section URI Dialing and firewall traversal. If a DNS zone and/or a DNS server have not been configured on the local VCS, calls to non-locally registered endpoints could still be placed if the local VCS is neighbored with another VCS that has been configured for DNS. In this case, any URI dialed calls will go via the neighbor. This configuration is useful if you want all URI dialing to be made via one particular system, e.g. a VCS Expressway. System Configuration VCS Configuration Zones and Neighbors Call Processing 118 Bandwidth Control Firewall Traversal Applications Maintenance Appendices Grey Headline (continued) URI Dialing TANDBERG VIDEO COMMUNICATIONS SERVER ADMINISTRATOR GUIDE URI Dialing for Outgoing Calls Process Configuring Matches for DNS Zones When a user places a call using URI dialing, they will typically dial an address in the form name@example.com from their endpoint. Below is the process that is followed when a URI address is dialed from an endpoint registered with your VCS: If you wish locally registered endpoints to be able to place URI calls via the VCS, then at a minimum you should configure a DNS zone with a match that has a Mode of AlwaysMatch. This will result in DNS always being queried, but will mean it is queried for all aliases, not just URI addresses. 1. The VCS will check its Local Zone (which includes all Peers in the Cluster to which it may belong) and all its external zones to see if any of them are configured with either: To filter the queries sent to the DNS server: • an AlwaysMatch, or • a PatternMatch with a pattern that matches the URI address. • configure a DNS zone with a match that has a Mode of PatternMatch • use the Pattern string and Pattern type fields to define the aliases that will trigger a DNS query. For example, a match with a Pattern string of *@* and a Pattern type of Regex will mean that DNS is only queried for aliases in the form of typical URI addresses. These zones will then be queried in priority order for the URI. To set up further filters, configure the remaining matches in the same DNS zone. You don’t need to create new DNS zones unless you want to configure more than the maximum of 5 matches. 2. If the Local Zone contains a match, the call will be forwarded to the endpoint. 3. If one or more of the external zones that contain a match are neighbor, traversal client or traversal server zone, the zone will be queried for the URI. If the neighbor, traversal client or traversal server supports URI dialing, it may route the call itself. You should create separate DNS zones if you want to filter based on the protocol (SIP or H.323) or hop count to be used. 4. If one or more of the zones that contain a match are DNS zones, this will trigger the VCS to attempt to locate the endpoint through a DNS lookup. It does this by querying the DNS server configured on the VCS for the location of the domain as per the URI resolution process via DNS. If the domain part of the URI address was resolved successfully the request is forwarded to those address(es). Introduction D14049.04 JULY 2008 Getting Started Overview and Status System Configuration VCS Configuration Zones and Neighbors Call Processing 119 Bandwidth Control Firewall Traversal Applications Maintenance Appendices Grey Headline (continued) URI Dialing TANDBERG VIDEO COMMUNICATIONS SERVER ADMINISTRATOR GUIDE URI Dialing for Outgoing Calls Adding and Configuring DNS Zones Name Assigns a name to this zone. In order for locally registered endpoints to use URI dialing through the VCS, you must configure at least one DNS zone. To do this: Type • VCS Configuration > Zones. For DNS zones, this will be DNS. You will be taken to the Zones page. Click New. You will be taken to the Create Zone page. Enter a Name for the zone and select a Type of DNS. Click Create Zone. You will be taken to the Edit Zone page. • xCommand ZoneAdd • xConfiguration Zones Zone [1..200] SIP mode Determines whether or not SIP calls will be allowed to this zone. H.323 mode Determines whether or not H.323 calls will be allowed to this zone. Hop count Specifies the hop count to be used when sending an alias search request to this zone. If the search request was received from another zone and already has a hop count assigned, the lower of the two values will be used. Advanced In most cases the options in the Advanced section should be left at their default values. However, some systems such as Microsoft OCS 2007 may require these options to be changed from the default. When dialing by URI, the hop count used is that configured for the DNS zone that matches the URI address. Refer to the relevant TANDBERG VCS Deployment Guide for full details on how to configure these advanced options for specific systems. If there is no DNS zone configured that matches the URI address, then the query may be forwarded to a neighbor. In this case, the hop count used will be that configured for the neighbor zone. Normal zone pattern matching and prioritization rules will apply to DNS zones. Introduction D14049.04 JULY 2008 Getting Started Overview and Status System Configuration VCS Configuration Zones and Neighbors Match1 - Match5 These sections allow you to specify any filtering criteria you wish to apply to this zone. See Configuring Matches for DNS zones for full information on how the Match options can be used. Call Processing 120 Bandwidth Control Firewall Traversal Applications Maintenance Appendices Grey Headline (continued) URI Dialing TANDBERG VIDEO COMMUNICATIONS SERVER ADMINISTRATOR GUIDE URI Dialing for Outgoing Calls Configuring DNS Servers Address 1 to Address 5 To configure the DNS servers to be used by the VCS when querying DNS: Enter the IP address(es) of up to 5 DNS servers that the VCS will query when attempting to locate a domain. • System Configuration > DNS. These fields must use an IP address, not a FQDN. You will be taken to the DNS page. • xConfiguration IP DNS Server In order for endpoints registered to the local VCS to make outgoing calls using URI dialing to endpoints that are not registered to the local VCS or one of its neighbors, you must configure at least one DNS server for the VCS to query. For resilience, you can specify up to five DNS servers. The DNS server(s) configured here are used as part of both the ENUM dialing and URI dialing processes. Without DNS, calls made using URI dialing will still be placed if the destination endpoint is locally registered or registered to a neighbor system as locating these URIs does not require the use of DNS. Introduction D14049.04 JULY 2008 Getting Started Overview and Status System Configuration VCS Configuration Zones and Neighbors Call Processing 121 Bandwidth Control Firewall Traversal Applications Maintenance Appendices Grey Headline (continued) URI Dialing TANDBERG VIDEO COMMUNICATIONS SERVER ADMINISTRATOR GUIDE URI Dialing for Incoming Calls Types of DNS Records Required SRV Record Format The ability of the VCS to receive incoming calls made via URI dialing relies on the presence of DNS records for each domain the VCS is hosting. The format of SRV records is defined by RFC 2782 [3] as: These records can be of various types including: _ Service. _ Proto.Name TTL Class SRV Priority Weight Port Target For the VCS, these will be as follows: • A records, which provide the IPv4 address of the VCS • AAAA records, which provide the IPv6 address of the VCS • Service (SRV) records, which specify the FQDN of the VCS • _ Service and _ Proto will be different for H.323 and SIP, and will depend on the protocol and transport type being used. • Name is the domain in the URI that the VCS is hosting (e.g. example.com) • Port is the port on the VCS that has been configured to listen for that particular service and protocol combination • Target is the FQDN of the VCS. • NAPTR records, which specify SRV record and transport Configuring H.323 SRV Records Configuring SIP SRV Records You should provide an SRV or NAPTR record for each combination of domain hosted and protocol and transport type enabled on the VCS. Annex O of H.323 [15] defines the procedures for using DNS to locate gatekeepers and endpoints and for resolving H.323 URL aliases. It also defines parameters for use with the H.323 URL. RFC 3263 [16] describes the DNS procedures used to resolve a SIP URI into the IP address, port, and transport protocol of the next hop to contact. and the port on it to be queried for a particular protocol and transport type. preferences for a SIP domain. The VCS supports two types of SRV record as defined by this Annex. These are Location and Call, with _ Service set to _ h323ls and _ h323cs respectively. If you wish the VCS to be contactable via H.323 URI dialing, you should provide at least a Location SRV record, as it provides the most flexibility and the simplest configuration. When an incoming call has been placed using URI dialing, the VCS will have been located by the calling system via one of the DNS record lookups described above. The VCS will receive the request containing the dialed URI in the form user@example.com. The VCS will then check its local registrations and FindMe names and if any are an exact match, the call will be routed to the appropriate device(s). • Valid combinations of _ Service and _ Proto are: Location SRV Records Process If you wish the VCS to be contactable via SIP URI dialing, you should configure an SRV record for each SIP transport protocol enabled on the VCS (i.e. UDP, TCP or TLS) as follows: For each domain hosted by the VCS, you should configure a Location SRV record as follows: • _ Service is _ h323ls • _ Proto is _ udp • Port is the port number that has been configured via VCS Configuration > Protocols > H.323 as the Registration UDP port. Call SRV Records • _ sips. _ tcp • _ sip. _ tcp • _ sip. _ udp • Port is the port number that has been configured via VCS Configuration > Protocols > SIP as the port for that particular transport protocol. Call SRV records (and A/AAAA records) are intended primarily for use by endpoints which cannot participate in a location transaction, exchanging LRQ and LCF. The configuration of a Call SRV record should be as follows: • _ Service is _ h323cs • _ Proto is _ tcp • Port is the port number that has been configured via VCS Configuration > Protocols > H.323 as the Call signaling TCP port. Introduction D14049.04 JULY 2008 Getting Started Overview and Status System Configuration VCS Configuration Zones and Neighbors Call Processing 122 Bandwidth Control Firewall Traversal Applications Maintenance Appendices Grey Headline (continued) URI Dialing TANDBERG VIDEO COMMUNICATIONS SERVER ADMINISTRATOR GUIDE URI Dialing for Incoming Calls URI Dialing and Firewall Traversal Example DNS Record Configuration Recommended Configuration A company with the domain name example.com wants to enable incoming H.323 and SIP calls using URI addresses in the format user@example.com. The VCS hosting the domain has the FQDN vcs.example.com. If URI dialing is being used in conjunction with firewall traversal, DNS zones and DNS Servers should be configured on the VCS Expressway and any VCSs on the public network only. VCSs behind the firewall should not have any DNS zones or servers configured. This will ensure that any outgoing URI calls made by endpoints registered with the VCS will be routed through the VCS Expressway. Their DNS records would typically be as follows: • SRV record for _ h323ls. _ udp.example.com returns vcs.example.com • SRV record for _ h323cs. _ tcp.example.com returns vcs.example.com • SRV record for _ sip. _ udp.example.com returns vcs.example.com • SRV record for _ sip. _ tcp.example.com returns vcs.example.com • SRV record for _ sips. _ tcp.example.com returns vcs.example.com • A record for vcs.example.com returns the IPv4 address of the VCS • AAAA record for vcs.example.com returns the IPv6 address of the VCS In addition, the DNS records should be configured with the address of the VCS Expressway as the authoritative gatekeeper/proxy for the enterprise (see the Appendix DNS Configuration). This ensures that incoming calls placed using URI dialing enter the enterprise through the VCS Expressway, allowing successful traversal of the firewall. How you add the DNS records depends on the type of DNS server you are using. Instructions for setting up two common DNS servers are given in the Appendix DNS Configuration. In order for locally registered endpoints to be reached using URI dialing, they must register using a full URI. This applies to both SIP and H.323 endpoints. If endpoints do not register using a full URI, they will be discoverable only by the VCS to which they are registered, and any neighbor VCSs. Several mechanisms could have been used to locate the VCS. You may wish to enable calls placed to user@ to be routed to an existing registration for user@example.com. In this case you would configure a Pre-Search Transform that would strip the IP address of the VCS from the incoming URI and replace it with the domain name of example.com. Introduction D14049.04 JULY 2008 Getting Started Overview and Status System Configuration VCS Configuration Zones and Neighbors Call Processing 123 Bandwidth Control Firewall Traversal Applications Maintenance Appendices Grey Headline (continued) ENUM Dialing TANDBERG VIDEO COMMUNICATIONS SERVER ADMINISTRATOR GUIDE Overview Process Enabling ENUM Dialing ENUM dialing allows an endpoint to be contacted by a caller dialing an E.164 number - a telephone number - even if that endpoint has registered using a different format of alias. When a VCS is attempting to dial a destination endpoint using ENUM, the general process is as follows: Using ENUM dialing, when an E.164 number is dialed it is converted into a URI using information stored in DNS. The VCS then attempts to find the endpoint based on the URI that has been returned. 2. The VCS converts the E.164 number into an ENUM domain as follows: The ENUM dialing facility allows you to retain the flexibility of URI dialing whilst having the simplicity of being called using just a number - particularly important if any of your callers are restricted to dialing via a numeric keypad. 1. The user dials the E.164 number from their endpoint. a. the digits are reversed and separated by a dot b. the name of the domain that is hosting the NAPTR records for that E.164 number is added as a suffix. 3. DNS is then queried for the resulting ENUM domain. 4. If a NAPTR record exists for that ENUM domain, this will advise how the number should be converted into one (or possibly more) H.323/SIP URIs. 5. The VCS begins the search again, this time for the converted URI as per the URI dialing process. Note that this is considered to be a completely new search, and so pre-search transforms and administrator policy will therefore apply. The VCS supports outward ENUM dialing by allowing you to configure ENUM zones on the VCS. When an ENUM zone is queried, this triggers the VCS to transform the E.164 number that was dialed into an ENUM domain which is then queried via DNS. D14049.04 JULY 2008 Getting Started Overview and Status System Configuration Outgoing Calls To allow locally registered endpoints to dial out to other endpoints using ENUM, you must • configure at least one ENUM zone, and • configure at least one DNS Server. This is described in the section Configuring ENUM Dialing for outgoing calls. Incoming Calls To enable endpoints in your enterprise to receive incoming calls from other endpoints via ENUM dialing, you must configure a DNS NAPTR record mapping your endpoints’ E.164 numbers to their SIP/H.323 URIs. See the section Configuring ENUM dialing for incoming calls for instructions on how to do this. If an ENUM zone and/or a DNS server have not been configured on the local VCS, calls made using ENUM dialing could still be placed if the local VCS is neighbored with another VCS that has been appropriately configured for ENUM dialing. Any ENUM dialed calls will go via the neighbor. This configuration is useful if you want all ENUM dialing from your enterprise to be configured on one particular system. Note however that ENUM dialing relies on the presence of relevant DNS NAPTR records for the ENUM domain being queried. These are the responsibility of the administrator of that domain. Introduction ENUM dialing is enabled separately for incoming and outgoing calls. VCS Configuration Zones and Neighbors Call Processing 124 Bandwidth Control Firewall Traversal Applications Maintenance Appendices Grey Headline (continued) ENUM Dialing TANDBERG VIDEO COMMUNICATIONS SERVER ADMINISTRATOR GUIDE ENUM Dialing for Outgoing Calls Prerequisites Process Example In order for a local endpoint to be able to dial another endpoint using ENUM via your VCS, the following three conditions must be met: Below is the process that is followed when an ENUM (E.164) number is dialed from an endpoint registered with your VCS: 1. There must be a NAPTR record available in DNS that maps the called endpoint’s E.164 number to its URI. It is the responsibility of the administrator of the enterprise to which the called endpoint belongs to provide this record, and they will only make it available if they wish the endpoints in their enterprise to be contactable via ENUM dialing. 2. The VCS initiates a search for the E.164 number as dialed. It follows the usual alias search process. In this example, we wish to call Fred at Example Corp. Fred’s endpoint is actually registered with the URI fred@example.com, but to make it easier to contact him his system administrator has configured a DNS NAPTR record mapping this alias to his E.164 number: +44123456789. 2. You must configure an ENUM zone on your local VCS. This ENUM zone must have a DNS Suffix that is the same as the domain where the NAPTR record for the called endpoint is held. 3. You must configure your local VCS with the address of at least one DNS server that it can query for the NAPTR record (and if necessary any resulting URI). Once the ENUM process has returned one or more URIs, a new search will begin for each of these URIs in accordance with the URI dialing process. If the URIs belong to locally registered endpoints, no further configuration is required. However, if one or more of the URIs are not locally registered, you may also need to configure a DNS zone if they are to be located via a DNS lookup. 1. The user dials the E.164 number from their endpoint. 3. After applying any pre-search transforms, the VCS will check all its zones (local and external) and to see if any of them are configured with either: • an AlwaysMatch, or • a PatternMatch with pattern that matches the E.164 number. These zones will then be queried in priority order. 4. If one or more of the zones that contain a match is a neighbor zone, the neighbor will be queried for the E.164 number. If the neighbor supports ENUM dialing, it may route the call itself. 5. If one or more of the zones that contain a match is an ENUM zone, this will trigger the VCS to attempt to locate the endpoint through ENUM. As and when each ENUM zone configured on the VCS is queried, the E.164 number is transformed into an ENUM domain as follows: a. the digits are reversed and separated by a dot b. the DNS Suffix configured for that ENUM zone is appended. 6. DNS is then queried for the resulting ENUM domain. 7. If the DNS server finds at that ENUM domain a NAPTR record that matches the transformed E.164 number (i.e., after it has been reversed and separated by a dot), it returns the associated URI to the VCS. 8. The VCS then initiates a new search for that URI (maintaining the existing hop count). The VCS starts at the beginning of the search process (i.e. applying any pre-search transforms, then searching local and external zones in priority order). From this point, as it is now searching for a SIP/H.323 URI, the process for URI Dialing is followed. Introduction D14049.04 JULY 2008 Getting Started Overview and Status System Configuration VCS Configuration Zones and Neighbors Call Processing 125 Bandwidth Control We know that the NAPTR record for example.com uses the DNS domain of e164.arpa. 1. We create an ENUM zone on our local VCS with a DNS suffix of e164.arpa. 2. We configure this zone with a pattern match mode of AlwaysMatch, so that ENUM will always be queried regardless of the format of the alias being searched for. 3. We dial 44123456789 from our endpoint. 4. The VCS initiates a search for a registration of 44 118 123 456. Because the ENUM zone we have configured has a match mode of AlwaysMatch, it is queried at the same time as any other zones with a matching priority. 5. Because the zone being queried is an ENUM zone, the VCS is automatically triggered to transform the number into an ENUM domain as follows: a. the digits are reversed and separated by a dot: 9.8.7.6.5.4.3.2.1.4.4 b. the DNS Suffix configured for this ENUM zone, e164.arpa, is appended. This results in a transformed domain of 9.8.7.6.5.4.3.2.1.4.4.e164.arpa. 6. DNS is then queried for that ENUM domain. 7. The DNS server finds the domain and returns the information in the associated NAPTR record. This tells the VCS that the E.164 number we have dialed is mapped to the SIP URI of fred@example.com. 8. The VCS then starts another search, this time for fred@example.com. From this point the process for URI Dialing is followed, and results in the call being forwarded to Fred’s endpoint. Firewall Traversal Applications Maintenance Appendices Grey Headline (continued) ENUM Dialing TANDBERG VIDEO COMMUNICATIONS SERVER ADMINISTRATOR GUIDE ENUM Dialing for Outgoing Calls Configuring Matches for ENUM Zones Configuring Transforms for ENUM Zones If you wish locally registered endpoints to be able to make ENUM calls via the VCS, then at a minimum you should configure an ENUM zone with: You can configure transforms for ENUM zones in the same way as any other zones (see Zone Searching and Transforming for full information). • a match that has a Mode of AlwaysMatch • a DNS suffix of e164.arpa (the domain specified by the ENUM standard). If there are any transforms configured for an ENUM zone, these will be applied prior to the number being converted to an ENUM domain. This will result in DNS always being queried for all aliases, not just ENUMs. It will also mean that ENUM dialing will only be successful if the enterprise being dialed uses the e164.arpa domain. Example To ensure successful ENUM dialing, you must configure an ENUM zone for each domain that holds NAPTR records for endpoints that callers in your enterprise might wish to dial. For example, you want to enable ENUM dialing from your network to endpoints at a remote site using a prefix of 8 followed by the last 4 digits of the remote endpoints’ E.164 number. You would configure an ENUM zone on your VCS that has a Match configured as follows: Once these ENUM zones have been created, you can filter the queries that are sent to each as follows: • Mode of PatternMatch • Pattern string of 8(\d{4}) • Pattern type of Regex • Pattern behavior of Replace • Replace string of 44123123(\1) • configure a match that has a Mode of PatternMatch • use the Pattern string and Pattern type fields to define the aliases that will trigger an ENUM lookup. Example For example, you want to enable ENUM dialing from your network to a remote office in the UK where the endpoints’ E.164 numbers start with 44. You would configure an ENUM zone on your VCS that has a Match configured as follows: With this configuration, it will be the resulting string (i.e. 44123123xxxx) that will then be converted into an ENUM domain and queried for via DNS. • Mode of PatternMatch • Pattern string of 44 • Pattern type of Prefix. This will result in an ENUM query being sent to that zone only when someone dials a number starting with 44. To verify that you have configured your outward ENUM dialing correctly, use the xCommand Locate command to try and resolve an E.164 alias. Introduction D14049.04 JULY 2008 Getting Started Overview and Status System Configuration VCS Configuration Zones and Neighbors Call Processing 126 Bandwidth Control Firewall Traversal Applications Maintenance Appendices Grey Headline (continued) ENUM Dialing TANDBERG VIDEO COMMUNICATIONS SERVER ADMINISTRATOR GUIDE ENUM Dialing for Outgoing Calls Configuring ENUM Zones Name In order for locally registered endpoints to use ENUM dialing, you must configure an ENUM zone for each ENUM service used by remote endpoints. To do this: Assigns a name to this zone. Type For ENUM zones, this will be ENUM. • VCS Configuration > Zones. You will be taken to the Zones page. • Click New. Hop count You will be taken to the Create Zone page. Specifies the hop count to be used when sending an alias search request to this zone. If the search request was received from another zone and already has a hop count assigned, the lower of the two values will be used. • Enter the zone Name and select a Type of ENUM. • Click Create Zone. You will be taken to the Edit Zone page. • xCommand ZoneAdd • xConfiguration Zones DNS suffix Zone [1..200] The DNS zone that is to be queried for a NAPTR record. This suffix is appended to the transformed E.164 number in an attempt to find a matching NAPTR record. SIP mode Determines whether or not SIP records will be looked up for this zone. H.323 mode Determines whether or not H.323 records will be looked up for this zone. Any number of ENUM zones may be configured on the VCS. You should configure at least one ENUM zone for each DNS suffix that your endpoints may use. Match1 - Match5 These sections allow you to specify any filtering criteria and/or transforms you wish to apply to this zone. See Configuring Matches for ENUM zones and Configuring Transforms for ENUM zones for full information on how the Match options can be applied. Normal zone pattern matching and prioritization rules will apply to ENUM zones. Introduction D14049.04 JULY 2008 Getting Started Overview and Status System Configuration VCS Configuration Zones and Neighbors Call Processing 127 Bandwidth Control Firewall Traversal Applications Maintenance Appendices Grey Headline (continued) ENUM Dialing TANDBERG VIDEO COMMUNICATIONS SERVER ADMINISTRATOR GUIDE ENUM Dialing for Outgoing Calls Configuring DNS Servers Address 1 to Address 5 To configure the DNS servers to be used by the VCS when querying DNS: Enter the IP address(es) of up to 5 DNS servers that the VCS will query when attempting to locate a domain. • System Configuration > DNS. You will be taken to the DNS page. • xConfiguration IP DNS Server In order for endpoints registered to the VCS to make outgoing calls using ENUM dialing, you must configure at least one DNS server for the VCS to query. For resilience, you can specify up to five DNS servers. Introduction D14049.04 JULY 2008 Getting Started Overview and Status The DNS server(s) configured via this page are used as part of both the ENUM dialing and URI dialing processes. System Configuration VCS Configuration Zones and Neighbors Call Processing 128 Bandwidth Control Firewall Traversal Applications Maintenance Appendices Grey Headline (continued) ENUM Dialing TANDBERG VIDEO COMMUNICATIONS SERVER ADMINISTRATOR GUIDE ENUM Dialing for Incoming Calls Prerequisites Configuring DNS NAPTR Records Example In order for your locally registered endpoints to be reached using ENUM dialing, you must configure a DNS NAPTR record that maps your endpoints’ E.164 numbers to their SIP/H.323 URIs. This record must be located at an appropriate DNS domain where it can be found by any systems attempting to reach you via ENUM dialing. ENUM relies on the presence of NAPTR records, as defined by RFC 2915 [7]. These are used to obtain an H.323 or SIP URI from an E.164 number. For example, the record: The record format that the VCS supports is: • order flag preference service regex replacement where: • order About DNS Domains for ENUM ENUM relies on the presence of NAPTR records to provide the mapping between E.164 numbers and their SIP/H.323 URIs. RFC 3761 [8], which is part of a suite of documents that define the ENUM standard, specifies that the domain for ENUM - where the NAPTR records should be located for public ENUM deployments - is e164.arpa. However, use of this domain requires that your E.164 numbers are assigned by an appropriate national regulatory body. Not all countries are yet participating in ENUM, so you may wish to use an alternative domain for your NAPTR records. This domain could reside within your corporate network (for internal use of ENUM) or it could use a public ENUM database such as http://www.e164.org. and preference determine the order in which NAPTR records will be processed. The record with the lowest order is processed first, with those with the lowest preference being processed first in the case of matching order. • flag determines the interpretation of the other fields in this record. Only the value u (indicating that this is a terminal rule) is currently supported, and this is mandatory. • service states whether this record is intended to describe E.164 to URI conversion for H.323 or for SIP. Its value must be either E2U+h323 or E2U+SIP. • regex is a regular expression that describes the conversion from the given E.164 number to an H.323 or SIP URI. • IN NAPTR 10 100 "u" "E2U+h323" "!^(.*)$!h323:\1@ example.com!" . would be interpreted as follows: • 10 is the order • 100 is the preference • u is the flag • E2U+h323 states that this record is for an H.323 URI • !^(.*)$!h323:\1@example.com! describes the conversion: • ! is a field separator • the first field represents the string to be converted. In this example, ^(.*)$ represents the entire E.164 number • the second field represents the H.323 URI that will be generated. In this example, h323:\1@example.com states that the E.164 number will be concatenated with @example.com. For example, 1234 will be mapped to 1234@example.com. • . shows that the replacement field has not been used. • replacement is not currently used by the VCS and should be set to . (i.e. the full stop character). Non-terminal rules in ENUM are not currently supported by the VCS. For more information on these, see section 2.4.1 of RFC 3761 [8], Introduction D14049.04 JULY 2008 Getting Started Overview and Status System Configuration VCS Configuration Zones and Neighbors Call Processing 129 Bandwidth Control Firewall Traversal Applications Maintenance Appendices Grey Headline (continued) Unregistered Endpoints TANDBERG VIDEO COMMUNICATIONS SERVER ADMINISTRATOR GUIDE About Unregistered Endpoints Calls from an Unregistered Endpoint An unregistered endpoint is any device that is not registered with an H.323 gatekeeper or SIP Registrar (e.g. VCS, gatekeeper or Border Controller). Although most calls are made between endpoints each registered with such a system, it is sometimes necessary to place a call to, or receive a call from, an unregistered endpoint. An unregistered endpoint (one that is not registered to any system) can call an endpoint registered with the local VCS. If there are no firewalls between the unregistered endpoint and the locally registered endpoint, it is possible for the caller to place the call by dialing the locally registered endpoint’s IP address. However, we do not recommend that callers are given IP addresses to use as the call may not always be successful (for example if the IP address is private). Instead, we recommend that callers from unregistered endpoints dial the IP address or the domain name (if configured) of the local VCS, prefixed by the alias they wish to call (for example, john.smith@82.118.9.0). The VCS will then place the call as normal. Calls to an Unregistered Endpoint Overview To configure how the VCS will behave when receiving a call for an IP address that is not registered locally: Calls can be placed from an endpoint registered to the local VCS to an endpoint that is not registered with any system in two ways: • using a URI (if the DNS system has been appropriately configured). If URI dialing is used, DNS is queried for a call signaling address and, if found, the call is placed to that address. (See URI Dialing for incoming calls for details of how to configure the Call Signaling SRV Record.) • dialing its IP address However, it is sometimes undesirable for a system to be allowed to place a call to an IP address directly. Instead, you may want a neighbor to place the call on behalf of the VCS, or not allow such calls at all. The VCS allows you to configure this behavior. Introduction D14049.04 JULY 2008 Getting Started • VCS Configuration > Calls You will be taken to the Calls page. • xConfiguration Call Services Calls to Unknown IP Addresses Determines the way in which the VCS will manage calls to IP addresses which are not registered with it or one of its neighbors. Direct: A locally registered endpoint will be allowed to make the call to the unknown IP address without the VCS querying any neighbors. The call setup would occur just as it would if the far end were registered directly to the local system. Recommended Configuration for Firewall Traversal When the VCS Expressway is neighbored with an VCS Control for firewall traversal, you should typically set Calls to unknown IP addresses to Indirect on the VCS Control and Direct on the VCS Expressway. When a caller inside the firewall attempts to place a call to an IP address outside the firewall, it will be routed as follows: 1. The call will go from the endpoint to the VCS Control with which it is registered. 2. Since the IP address being called is not registered to that VCS, and its Calls to unknown IP addresses setting is Indirect, the VCS will not place the call directly. Instead, it will query its neighbor VCS Expressway to see if that system is able to place the call on the VCS Control’s behalf. Indirect: Upon receiving the call the VCS will check to see if the IP address belongs to one of its locally registered H.323 endpoints. If so, it will allow the call. If not, it will query its neighbors for the remote address. If the neighbor’s configuration allows it to connect a call to that alias, the VCS will pass the call to that neighbor for completion. 3. The VCS Expressway receives the call and since its Calls to unknown IP addresses setting is Direct, it will make the call directly to the called IP address. Off: This will not allow any endpoint registered locally to the VCS to call an IP address of any system not also registered locally to that VCS. Overview and Status Applications System Configuration VCS Configuration Zones and Neighbors Call Processing 130 Bandwidth Control Firewall Traversal Maintenance Appendices Grey Headline (continued) Fallback Alias TANDBERG VIDEO COMMUNICATIONS SERVER ADMINISTRATOR GUIDE Overview Configuration It is possible for the VCS to receive a call that is destined for it but which does not specify an alias. This could be for one of the following reasons: • the caller has dialed the IP address of the Example Usage You may wish to configure your Fallback Alias to be that of your receptionist, so that all calls that do not specify an alias will still be answered personally and can then be redirected appropriately. To configure the Fallback Alias: • VCS Configuration > Calls. You will be taken to the Calls page. • xConfiguration Call Services Fallback Alias VCS directly For example, Example Inc. has the domain of example.com. The endpoint at reception has the alias reception@example.com. • the caller has dialed the domain name without giving an alias as a prefix They configure their VCS with a fallback alias of reception@example.com. This means that any calls made directly to example.com (i.e. without being prefixed by an alias), are forwarded to reception@example.com, where the receptionist answers the call and directs it appropriately. • the caller has dialed the IP address or domain name of the VCS prefixed by the VCS’s system name as an alias. Normally such calls would be disconnected. However, the VCS allows you to specify an alias to which all such calls should be routed. This alias is known as the Fallback Alias. Some endpoints do not allow users to enter an alias and an IP address to which the call should be placed. Introduction D14049.04 JULY 2008 Getting Started Overview and Status Save Fallback alias Click here to save your changes. Enter the alias to which you want to forward all calls that do not already specify an alias. System Configuration VCS Configuration Zones and Neighbors Call Processing 131 Bandwidth Control Firewall Traversal If no fallback alias is configured, calls that do not specify an alias will be disconnected. Applications Maintenance Appendices Grey Headline (continued) Call IDs, Serial Numbers and Tags TANDBERG VIDEO COMMUNICATIONS SERVER ADMINISTRATOR GUIDE Identifying a Particular Call Obtaining Call Numbers via the CLI Each call that passes through the VCS is assigned a Call ID and a Call Serial Number. Calls also have a Call Tag assigned if this does not already exist. To control calls using the CLI, you must reference the call using either its call ID or serial number. These can be obtained using the command: Call ID The VCS assigns each call currently in progress a different Call ID. The Call ID numbers start at 1 and go up to the maximum number of calls allowed on that system. Each time a call is made, the VCS will assign that call the lowest available Call ID number. For example, if there is already a call in progress with a Call ID of 1, the next call will be assigned a Call ID of 2. If Call 1 is then disconnected, the third call to be made will be assigned a Call ID of 1. • xStatus Calls This will return details of each call currently in progress in order of their Call ID number. The second line of each entry will list the Call Serial Number, and the third will list the Call Tag. The Call ID is not therefore a unique identifier: while no two calls in progress at the same time will have the same Call ID, the same Call ID will be assigned to more than one call over time. Call Serial Number The VCS assigns a unique Call Serial Number to every call passing through it. No two calls on a VCS will ever have the same Call Serial Number. However, a single call passing between two or more VCSs will be identified by a different Call Serial Number on each system. Call Tag Call Tags are used to track calls passing through a number of VCSs. When the VCS receives a call, it checks to see if there is a Call Tag already assigned to it. If so, the VCS will use the existing Call Tag; if not, it will assign a new Call Tag to the call. This Call Tag is then included in the call’s details when the call is forwarded on. A single call passing between two or more VCSs will be assigned a different Call Serial Number each time it arrives at a VCS (including one it has already passed through) but can be identified as the same call by use of the Call Tag. This is particularly useful if you are using a remote syslog server to collate events across a number of VCSs in your network. The Call Tag also helps you identify loops in your network. Loops occur when a query is sent to a neighbor zone and passes through one or more systems before being routed back to the original VCS. In this situation the outgoing and incoming query will have different Call Serial Numbers and may even be for different destination aliases (depending on whether any transforms had been applied). However, the call will still have the same Call Tag. Call Tags are supported by VCS version X3.0 and above. If a call passes through a system that is not a VCS, or a VCS that is running an earlier version of the software, the Call Tag information will be lost. Introduction D14049.04 JULY 2008 Getting Started Overview and Status System Configuration VCS Configuration Zones and Neighbors Call ID Call Processing 132 Call serial number Bandwidth Control Firewall Traversal Applications Call tag Maintenance Appendices Grey Headline (continued) Disconnecting Calls TANDBERG VIDEO COMMUNICATIONS SERVER ADMINISTRATOR GUIDE Identifying a Particular Call Obtaining the Call ID via the Web UI The Calls page in the web interface lists individual calls based on their Call Serial Number. You can click on a particular call to find out more details about it, including the Call Serial Number and Call Tag. Note that one or more individual calls may have the same Call Tag. Disconnecting a Call via the CLI The VCS web UI does not use the Call ID. Calls are identified using their Call Serial number only. To disconnect an existing call using the CLI, you must first obtain either the call ID number or the call serial number. Then use either one of the following commands as appropriate: • xCommand • xCommand DisconnectCall Call: DisconnectCall CallSerialNumber: While it is quicker to use the call ID number to reference the call to be disconnected, there is a risk that in the meantime the call has already been disconnected and the call ID assigned to a new call. For this reason, the VCS also allows you to reference the call using the longer but unique call serial number. Disconnecting a Call via the Web Interface To disconnect one or more existing call via the web interface: When disconnecting a call, only the call with that Call Serial Number will be disconnected. Other calls with the same Call Tag but different Call Serial Number may not be affected. • Status > Calls. You will be taken to the Calls page. (To check details of a call including the Call Serial Number and Call Tag, click View.) Issues when Disconnecting SIP Calls Disconnect Check the box next to the call(s) you wish to terminate and select Disconnect. The call disconnection API works differently for H.323 and SIP calls due to differences in the way the protocols work. For H.323 calls, and interworked calls, the Disconnect command will actually disconnect the call. For SIP calls, the Disconnect command will cause the VCS to release all resources used for the call and the call will appear on the system as disconnected. However, SIP calls are peerto-peer and as a SIP proxy the VCS has no authority over the endpoints. Although releasing the resources may have the sideeffect of disconnecting the SIP call, it is also possible that the call signaling, media or both may stay up (depending on the type of call being made). The call will not actually disconnect until the SIP endpoints involved have also cleared their resources. When disconnecting a call, only the call with that Call Serial Number will be disconnected. Other calls with the same Call Tag but different Call Serial Number may not be affected. Endpoints that support RFC 4028 [14] have a call refresh timer which should cause them to clear the resources of any hung SIP calls after a certain period of time. This includes all TANDBERG endpoints. Introduction D14049.04 JULY 2008 Getting Started Overview and Status System Configuration VCS Configuration Zones and Neighbors Call Processing 133 Bandwidth Control Firewall Traversal Applications Maintenance Appendices Grey Headline (continued) TANDBERG VIDEO COMMUNICATIONS SERVER ADMINISTRATOR GUIDE Bandwidth Control This section describes the pages that appear under the Local Zone and Bandwidth sub-menus of the VCS Configuration menu in the web interface. These pages allow you to control the bandwidth that is used for calls within your local zone, as well as calls out to other zones. Introduction D14049.04 JULY 2008 Getting Started Overview and Status System Configuration VCS Configuration Zones and Neighbors Call Processing 134 Bandwidth Control Firewall Traversal Applications Maintenance Appendices Grey Headline (continued) Bandwidth Control Overview TANDBERG VIDEO COMMUNICATIONS SERVER ADMINISTRATOR GUIDE Bandwidth Control on the VCS Example Network Deployment The TANDBERG VCS allows you to control the amount of bandwidth used by endpoints on your network. This is done by grouping endpoints into subzones, and then applying limits to the bandwidth that can be used: The diagram below shows a typical network deployment: • within each subzone • between a subzone and another subzone • between a subzone and a zone. In this example we have created new subzone for each pool of endpoints, so that we can apply suitable limitations to the bandwidth used within and between each subzone based on the amount of bandwidth they have available via their internet connections. • a broadband LAN between the Enterprise and the internet, where high bandwidth calls are acceptable • a pipe to the internet (Pipe A) with restricted bandwidth • two satellite offices, Branch and Home, each with their own internet connections and restricted pipes. Bandwidth limits may be set on a call-by-call basis and/or on a total concurrent usage basis. This flexibility allows you to set appropriate bandwidth controls on individual components of your network. VCS CONTROL This section describes the different types of subzones and how to add and configure them, and explains how to use Links and Pipes to apply bandwidth controls between subzones and zones. HEAD OFFICE HOME OFFICE INTERNET Pipe A Pipe B Default Subzone Calls will fail if links are not configured correctly. You can check whether a call will succeed, and what bandwidth will be allocated to it, using the command xCommand CheckBandwidth. ! Home Office Subzone Pipe C BRANCH OFFICE Branch Office Subzone For specific information about how bandwidth is managed across Peers in a cluster, refer to the section Sharing Bandwidth Across Peers. Introduction D14049.04 JULY 2008 Getting Started Overview and Status System Configuration VCS Configuration Zones and Neighbors Call Processing 135 Bandwidth Control Firewall Traversal Applications Maintenance Appendices Grey Headline (continued) Subzones TANDBERG VIDEO COMMUNICATIONS SERVER ADMINISTRATOR GUIDE About Subzones and Bandwidth Control About the Traversal Subzone All endpoints registered with the VCS are part of its Local Zone. The Traversal Subzone is a conceptual subzone. No endpoints can be registered to the Traversal Subzone; its sole purpose is to allow for the control of bandwidth used by traversal calls. The Local Zone is made up of two or more subzones. The first two subzones are automatically created for you. These are the Default Subzone and the Traversal Subzone. You can create and configure further subzones manually on the basis of endpoints’ IP addresses: when an endpoint registers with the VCS its IP address is checked and it is assigned to the appropriate subzone. The main purpose of all three types of subzones is to enable you to control the bandwidth used by various parts of your network. Traversal Calls About the Default Subzone A traversal call is any call passing through the VCS that includes both the signaling (information about the call) and media (voice and video). The only other type of call is a non-traversal call, where the signaling passes through the VCS but the media goes directly between the endpoints. When an endpoint registers with the VCS, its IP address is checked and it is assigned to the appropriate subzone. If no subzones have been created, or the endpoint’s IP address does not match any of the configured subzones, it will be assigned to the Default Subzone. Traversal calls are always one of the following: The use of a Default Subzone on its own (i.e. without any other manually configured subzones) is suitable only if you have uniform bandwidth available between all your endpoints. However, it is possible for a Local Zone to contain two or more different networks with different bandwidth limitations. In this situation, you should configure separate subzones for each different part of the network. Specifying the Subzone IP Addresses A subzone is defined by specifying a range of IP addresses. The VCS allocates endpoints to a subzone based on their IP address. You specify which IP addresses are associated with the subzone by configuring up to 5 subnets for that subzone. Subzone Links The VCS is shipped with the Default Subzone and Traversal Subzone (and Default Zone) already created, and with links between the three. You may delete or amend these default links if you need to model restrictions of your network. If any of these links have been deleted, they may be automatically restored via: • xCommand If an endpoint’s IP address matches more than one subnet, it will be allocated to the subnet with the narrowest range. Introduction D14049.04 JULY 2008 Getting Started Overview and Status DefaultLinksAdd VCS Configuration • calls that are traversing a firewall • SIP to H.323 interworking calls • IPv4 to IPv6 interworking calls. Traversal calls use more resource than non-traversal calls, and the numbers of each type of call are licensed separately. The VCS has one license for the maximum number of concurrent traversal calls it can take, and another for the maximum number of concurrent non-traversal calls. A call is “traversal” or “non-traversal” from the point of view of the VCS through which it is being routed at the time. A call between two endpoints may pass through a series of VCSs. Some of these systems may just take the signaling, in which case the call will be a non-traversal call for that VCS. Other systems in the route may need to take the media as well, and so the call will count as a traversal call on that particular VCS. Bandwidth Consumption of Traversal Calls Traversal calls between two endpoints within a single subzone on the VCS must, like all traversal calls, pass through the VCS’s Traversal Subzone. This means that such calls will consume an amount of bandwidth from the originating subzone’s total concurrent allocation that is equal to twice the bandwidth of the call – once for the call from the subzone to the Traversal Subzone, and again for the call from the Traversal Subzone back to the originating subzone. To restore these links via the web interface, you must recreate them manually. See Creating Links for instructions on how to do this. System Configuration All traversal calls are deemed to pass through the Traversal Subzone, so by applying bandwidth limitations to the Traversal Subzone you can control how much processing of media the VCS will perform at any one time. These limitations can be applied on a total concurrent usage basis, and/ or on a per-call basis. In addition, since this call passes through the Traversal Subzone, it will consume an amount of bandwidth from the Traversal Subzone equal to that of the call. Zones and Neighbors Call Processing 136 Bandwidth Control Firewall Traversal Applications Maintenance Appendices Grey Headline (continued) Subzones TANDBERG VIDEO COMMUNICATIONS SERVER ADMINISTRATOR GUIDE Creating a Subzone To add a new subzone: • VCS Configuration > Local Zone > Subzones. You will be taken to the Subzones page. Select New. You will be taken to the Create Subzone page. • xCommand SubZoneAdd Name Enter the name you wish to assign to the subzone. You will refer to this name when creating Links. Subnet 1 address Enter the IP address of the subnet. In conjunction with the Prefix, this will define the range of IP addresses that will belong to this subzone. Up to 4 further subnets can be configured once the subzone has been created via the Edit Subzone page. Prefix length Enter the number of bits of the Subnet IP Address which must match for an IP address to belong in this subzone. Address range = This shows the range of IP addresses that will be allocated to this subzone, based on the combination of the subnet address and prefix length that have been configured. Bandwidth See Applying Bandwidth Limitations to Subzones for a description of these fields. Create Subzone Click here to create the subzone and return to the subzones page. Introduction D14049.04 JULY 2008 Getting Started Overview and Status System Configuration VCS Configuration Zones and Neighbors Call Processing 137 Bandwidth Control Firewall Traversal Applications Maintenance Appendices Grey Headline (continued) Subzones TANDBERG VIDEO COMMUNICATIONS SERVER ADMINISTRATOR GUIDE Configuring a Subzone To configure a subzone: • VCS Configuration > Local Zone > Subzones. You will be taken to the Subzones page. Click on the subzone you wish to configure. You will be taken to the Edit Subzone page. • xConfiguration Zones LocalZone SubZone Name Enter the name you wish to assign to the subzone. You will refer to this name when creating Links and Pipes. Subnet 1 Enter the subnet IP Address and Prefix, This will define the range of IP addresses that will belong to the first subnet in this subzone. Address range = This shows the range of IP addresses that will be allocated to this subzone, based on the combination of the subnet address and prefix length that have been configured. Subnet 2 - 5 Use these fields to define up to 4 further subnets for this Subzone. Bandwidth See Applying Bandwidth Limitations to Subzones for a description of these fields. Save Click here to save your changes. Introduction D14049.04 JULY 2008 Getting Started Overview and Status System Configuration VCS Configuration Zones and Neighbors Call Processing 138 Bandwidth Control Firewall Traversal Applications Maintenance Appendices Grey Headline (continued) Subzones TANDBERG VIDEO COMMUNICATIONS SERVER ADMINISTRATOR GUIDE Applying Bandwidth Limitations to Subzones Types of Limitations How Different Bandwidth Limitations are Managed You can apply bandwidth limits to the Default Subzone, Traversal Subzone and all manually configured subzones. The types of limitations you can apply vary depending on the type of subzone, as follows: In situations where there are differing bandwidth limitations applied to the same link, the lower limit will always be the one used when routing the call and taking bandwidth limitations into account. Limitation Description Can be applied to Total Limits the total concurrent bandwidth being used by all endpoints in the subzone at any one time. In the case of the Traversal Subzone, this is the maximum bandwidth available for all concurrent traversal calls. • Default Subzone • Traversal Subzone • Manually configured subzones Calls entirely within... Limits the bandwidth of any individual call between two endpoints within the subzone. • Default Subzone • Manually configured subzones Calls into our out of... Limits the bandwidth of any individual call between an endpoint in the subzone, and an endpoint in another subzone or zone. • Default Subzone • Manually configured subzones Calls handled by... The maximum bandwidth available to any individual traversal call. • Traversal Subzone For example, Subzone A may have a per call inter bandwidth of 128. This means that any calls between Subzone A and any other subzone or zone will be limited to 128kbps. However, Subzone A also has a link configured between it and Subzone B. This link uses a pipe with a limit of 512kbps. In this situation, the lower limit of 128kbps will apply to calls between the two, regardless of the larger capacity of the pipe. In the reverse situation, where Subzone A has a per call inter bandwidth limit of 512kbps and a link to Subzone B with a pipe of 128, any calls between the two subzones will still be limited to 128kbps. For all these settings, a bandwidth mode of: • NoBandwidth will mean that no bandwidth is allocated and therefore no calls can be made. • Limited will mean that limits are applied. You must also enter a value in the corresponding bandwidth (kbps) field. • Unlimited will mean that no restrictions will be applied to the amount of bandwidth being used. Use subzone bandwidth limits if you want to configure the bandwidth available between one specific subzone and all other subzones or zones. Use Pipes if you want to configure the bandwidth available between one specific subzone and another specific subzone or zone. If your bandwidth configuration is such that multiple types of bandwidth restrictions are placed on a call (for example, if there are both subzone bandwidth limits and pipe limits), the lowest limit will always apply to that call. Introduction D14049.04 JULY 2008 Getting Started Overview and Status System Configuration VCS Configuration Zones and Neighbors A non-traversal call between two endpoints within the same subzone would consume from that subzone the amount of bandwidth of that call. A traversal call between two endpoints within the same subzone must, like all traversal call, pass through the Traversal Subzone. This means that such calls will consume an amount of bandwidth from the originating subzone’s total concurrent allocation that is equal to twice the bandwidth of the call – once for the call from the subzone to the Traversal Subzone, and again for the call from the Traversal Subzone back to the originating subzone. In addition, since this call passes through the Traversal Subzone, it will consume an amount of bandwidth from the Traversal Subzone equal to that of the call. Call Processing 139 Bandwidth Control Firewall Traversal Applications Maintenance Appendices Grey Headline (continued) Links TANDBERG VIDEO COMMUNICATIONS SERVER ADMINISTRATOR GUIDE About Links Creating Links Subzones are connected to other subzones and zones via links. For a call to take place, the endpoints involved must each reside in subzones or zones that have a link between them. The link does not need to be direct; the two endpoints may be linked via one or more intermediary subzones. Name Enter the name you wish to assign to this link. Links are used to calculate how a call is routed over the network and therefore which zones and subzones are involved and how much bandwidth is available. If multiple routes are possible, your VCS will perform the bandwidth calculations using the one with the fewest links. Node 1, Node 2 Select the names of the two subzones, or the subzone and zone between which you wish to create a link. Creating a New Link To create a new link: • VCS Configuration > Bandwidth > Links. You will be taken to the Links page. Click New. You will be taken to the Create Link page. • xCommand LinkAdd Pipe 1, Pipe 2 If you wish to apply bandwidth limitations to this link, select the pipe(s) to be applied. For more information, see Applying Pipes to Links. Default Links If a subzone has no links configured, then endpoints within the subzone will only be able to call other endpoints within the same subzone. For this reason, when a subzone is created, it is automatically given certain links. See Default Links for more information. Introduction D14049.04 JULY 2008 Getting Started Overview and Status Create Link Click here to create the link and return to the Links page. System Configuration VCS Configuration Zones and Neighbors Call Processing 140 Bandwidth Control Firewall Traversal Applications Maintenance Appendices Grey Headline (continued) Links TANDBERG VIDEO COMMUNICATIONS SERVER ADMINISTRATOR GUIDE Editing Links To edit a link: Name • VCS Configuration > Bandwidth > Links. You will be taken to the Links page. Click View/Edit. You will be taken to the Edit Link page. • xConfiguration Bandwidth Link Enter the name you wish to assign to this link. Node 1, Node 2 Select the names of the two subzones, or the subzone and zone between which you wish to create a link. Pipe 1, Pipe 2 If you wish to apply bandwidth limitations to this link, select the pipe(s) to be applied. For more information, see Applying Pipes to Links. Cancel Click here to return to the Links page without saving your changes. Delete Click here to delete the link. Save Click here to save your changes. Introduction D14049.04 JULY 2008 Getting Started Overview and Status System Configuration VCS Configuration Zones and Neighbors Call Processing 141 Bandwidth Control Firewall Traversal Applications Maintenance Appendices Grey Headline (continued) Links TANDBERG VIDEO COMMUNICATIONS SERVER ADMINISTRATOR GUIDE Default Links About Default Links Pre-Configured Links Automatically Created Links If a subzone has no links configured, then endpoints within the subzone will only be able to call other endpoints within the same subzone. For this reason, the VCS comes shipped with a set of pre-configured links and will also automatically create new links each time you create a new subzone. The VCS is shipped with the Default Subzone, Traversal Subzone and Default Zone already created, and with default links preconfigured between the three. These links will be named as follows: Whenever a new subzone or zone is created, links are automatically created as follows: New zone/subzone type Default links are created to... Subzone Default Subzone and Traversal Subzone Neighbor zone You may rename, delete and amend these default links if you need to model restrictions of your network. Default Subzone and Traversal Subzone DNS Zone If any of these links have been deleted, they may all be automatically restored via: Default Subzone and Traversal Subzone ENUM Zone Default Subzone and Traversal Subzone Traversal Client Zone Traversal Subzone Traversal Server Zone Traversal Subzone • DefaultSZtoTraversalSZ • DefaultSZtoDefaultZ • TraversalSZtoDefaultZ • xCommand DefaultLinksAdd To restore these links via the web interface, you must do so manually. See Creating Links for instructions on how to do this. Along with the pre-configured default links this ensures that, by default, any new subzone or zone has connectivity to all other subzones and zones. You may rename, delete and amend any of these default links. Calls will fail if links are not configured correctly. You can check whether a call will succeed, and what bandwidth will be allocated to it, using the command xCommand CheckBandwidth. ! Introduction D14049.04 JULY 2008 Getting Started Overview and Status System Configuration You can edit any of these default links in the same way you would edit manually configured links. See Editing Links for more information. VCS Configuration Zones and Neighbors Call Processing 142 Bandwidth Control Firewall Traversal Applications Maintenance Appendices Grey Headline (continued) Pipes TANDBERG VIDEO COMMUNICATIONS SERVER ADMINISTRATOR GUIDE About Pipes Creating Pipes It is possible to control the amount of bandwidth used on calls between specific subzones and zones. The limits can be applied to the total concurrent bandwidth used at any one time, or to the bandwidth used by any individual call. Name To apply these limits, you create a pipe and configure it with the required bandwidth limitations. Then when configuring links you assign the pipe to one or more links. Calls using the link will then have the pipe’s bandwidth limitations applied to them. Bandwidth restriction Enter the name you wish to give to this pipe. You will refer to this name when creating links. Determines whether there is a limit on the total concurrent bandwidth of this pipe. Unlimited: no limitations are in place. Limited: there is a limit in place; you must enter the limit in the field below. See Applying Pipes to Links for more information. NoBandwidth: there is no bandwidth available. To create a pipe: Total bandwidth limit (kbps) • VCS Configuration > Bandwidth > Pipes. You will be taken to the Pipes page. Select New. You will be taken to the Create Pipe page. • xCommand PipeAdd Sets the limit on the total concurrent bandwidth of this pipe. Bandwidth restriction Determines whether there is a limit on the bandwidth of individual calls via this pipe. Unlimited: no limitations are in place. Limited: there is a limit in place; you must enter the limit in the field below. NoBandwidth: there is no bandwidth available. Per call bandwidth limit (kbps) Sets the limit on the bandwidth of individual calls via this pipe. Create Pipe Click here to create the pipe and return to the Pipes page. Introduction D14049.04 JULY 2008 Getting Started Overview and Status System Configuration VCS Configuration Zones and Neighbors Call Processing 143 Bandwidth Control Firewall Traversal Applications Maintenance Appendices Grey Headline (continued) Pipes TANDBERG VIDEO COMMUNICATIONS SERVER ADMINISTRATOR GUIDE Editing Pipes Editing an Existing Pipe Name To configure details of a pipe: Enter the name you wish to give to this pipe. You will refer to this name when creating links. • VCS Configuration > Bandwidth > Pipes You will be taken to the Pipes page. Click on the pipe you wish to configure. You will be taken to the Edit Pipe page. • xConfiguration Bandwidth Pipe Bandwidth restriction Determines whether there is a limit on the total concurrent bandwidth of this pipe. Unlimited: no limitations are in place. Limited: there is a limit in place; you must enter the limit in the field below. NoBandwidth: there is no bandwidth available. Total bandwidth limit (kbps) Sets the limit on the total concurrent bandwidth of this pipe. Bandwidth restriction Determines whether there is a limit on the bandwidth of individual calls via this pipe. Unlimited: no limitations are in place. Limited: there is a limit in place; you must enter the limit in the field below. NoBandwidth: there is no bandwidth available. Per call bandwidth (kbps) Sets the limit on the bandwidth of individual calls via this pipe. Delete Click here to delete the pipe. Save Click here to save the changes. Introduction D14049.04 JULY 2008 Getting Started Overview and Status System Configuration VCS Configuration Zones and Neighbors Call Processing 144 Bandwidth Control Firewall Traversal Applications Maintenance Appendices Grey Headline (continued) Pipes TANDBERG VIDEO COMMUNICATIONS SERVER ADMINISTRATOR GUIDE Applying Pipes to Links Pipes are used to restrict the bandwidth of a link. When a pipe is applied to a link, it will restrict the bandwidth of calls made between the two nodes of the link - the restrictions will apply to calls in either direction. Normally a single pipe would be applied to a single link. However, one or more pipes may be applied to one or more links, depending on how you wish to model your network. One Pipe, One Link Applying a single pipe to a single link is useful when you wish to apply specific limits to calls between a subzone and another specific subzone or zone. VCS CONTROL One Pipe, Two or More Links HEAD OFFICE Each pipe may be applied to multiple links. This is used to model the situation where one site communicates with several other sites over the same broadband connection to the Internet. A pipe should be configured to represent the broadband connection, and then applied to all the links. This will allow you to configure the bandwidth options for calls in and out of that site. HOME OFFICE INTERNET Pipe A Pipe B Default Subzone Home Office Subzone Example In the diagram opposite, Pipe A has been applied to two links: the link between the Default Subzone and the Home Office subzone, and the link between the Default Subzone and the Head Office subzone. In this case, Pipe A represents the Head Office’s broadband connection to the internet, and would have total and per-call restrictions placed on it. Pipe C Two Pipes, One Link BRANCH OFFICE Each link may have up to two pipes associated with it. This is used to model the situation where the two nodes of a link are not directly connected, for example two sites that each have their own broadband connection to the Internet. Each connection should have its own pipe, meaning that a link between the two nodes should be subject to the bandwidth restrictions of both pipes. Branch Office Subzone Example In the diagram opposite, the link between the Default Subzone and the Home Office Subzone has two pipes associated with it: Pipe A, which represents the Head Office’s broadband connection to the internet, and Pipe B, which represents the Home Office’s dial-up connection to the internet. Each pipe would have bandwidth restrictions placed on it to represent its maximum capacity, and a call placed via this link would have the lower of the two bandwidth restrictions applied. Introduction D14049.04 JULY 2008 Getting Started Overview and Status System Configuration VCS Configuration Zones and Neighbors Call Processing 145 Bandwidth Control Firewall Traversal Applications Maintenance Appendices Grey Headline (continued) Default Bandwidth and Downspeeding TANDBERG VIDEO COMMUNICATIONS SERVER ADMINISTRATOR GUIDE Configuring Default Call Bandwidth and Downspeeding About the Default Call Bandwidth Usually, when a call is initiated the endpoint will include in the request the amount of bandwidth it wishes to use. For those cases where the endpoint has not specified the bandwidth, you can set the VCS to apply a default bandwidth value. The default call bandwidth and downspeeding behavior are configured via: • VCS Configuration > Bandwidth > Configuration. You will be taken to the Bandwidth Configuration page. Bandwidth Default Bandwidth Downspeed • xConfiguration • xConfiguration Default call bandwidth (kbps) Enter the bandwidth value to be used for calls for which no bandwidth value has been specified by the system that initiated the call. About Downspeeding If bandwidth control is in use, there may be situations when there is insufficient bandwidth available to place a call at the requested rate. By default (and assuming that there is some bandwidth still available) the VCS will still attempt to connect the call, but at a reduced bandwidth – this is known as downspeeding. This value cannot be blank. The default value is 384 kbps. Downspeeding can be configured so that it is applied in either or both of the following scenarios: Downspeed per call mode • when the requested bandwidth for the call exceeds the lowest Determines what will happen if the per-call bandwidth restrictions on a subzone or pipe mean that there is insufficient bandwidth available to place a call at the requested rate. per-call limit for the subzone or pipe(s) • when placing the call at the requested bandwidth would mean that the total bandwidth limits for that subzone or pipe(s) would be exceeded. You can turn off downspeeding, in which case if there is insufficient bandwidth to place the call at the originally requested rate, the call will not be placed at all. This could be used if, when your network is nearing capacity, you would rather a call failed to connect at all than was connected at a lower than requested speed. In this situation users will get one of the following messages, depending on the message that initiated the search: • Exceeds Call Capacity • Gatekeeper Resources Unavailable On: the call will be downspeeded. Off: the call will not be placed. Save Downspeed total mode Click here to save your changes Determines what will happen if the total bandwidth restrictions on a subzone or pipe mean that there is insufficient bandwidth available to place a call at the requested rate. On: the call will be downspeeded. Off: the call will not be placed. Introduction D14049.04 JULY 2008 Getting Started Overview and Status System Configuration VCS Configuration Zones and Neighbors Call Processing 146 Bandwidth Control Firewall Traversal Applications Maintenance Appendices Grey Headline (continued) Bandwidth Control Examples TANDBERG VIDEO COMMUNICATIONS SERVER ADMINISTRATOR GUIDE Example Without a Firewall An example deployment is shown opposite. In this example, there are three geographically separate offices: Enterprise, Branch and Home. All endpoints in the Enterprise office register with the VCS Control, as do those in the Branch and Home offices. VCS CONTROL Each of the three offices is represented as a separate subzone on the VCS, with bandwidth configured according to local policy. The enterprise’s leased line connection to the Internet, and the DSL connections to the remote offices are modeled as separate pipes. There are no firewalls involved in this scenario, so we can configure direct links between each of the offices. Each link is then assigned two pipes, representing the Internet connections of the offices at each end of the link. HEAD OFFICE HOME OFFICE INTERNET Pipe A Pipe B Default Subzone In this scenario, a call placed between the Home Office and Branch Office will consume bandwidth from the Home and Branch subzones and on the Home and Branch pipes. The Enterprise’s bandwidth budget will be unaffected by the call. Home Office Subzone Pipe C BRANCH OFFICE Branch Office Subzone Introduction D14049.04 JULY 2008 Getting Started Overview and Status System Configuration VCS Configuration Zones and Neighbors Call Processing 147 Bandwidth Control Firewall Traversal Applications Maintenance Appendices Grey Headline (continued) Bandwidth Control Examples TANDBERG VIDEO COMMUNICATIONS SERVER ADMINISTRATOR GUIDE Example With a Firewall If we modify the previous example deployment to include firewalls between the offices, we can use TANDBERG’s Expressway™ firewall traversal solution to maintain connectivity. We do this by adding a VCS Expressway outside the firewall on the public internet, which will work in conjunction with the VCS Control and Home and Branch office endpoints to traverse the firewalls. In this example, the endpoints in the Head Office register with the VCS Control, whilst those in the Branch and Home offices register with the VCS Expressway. VCS EXPRESSWAY VCS CONTROL The introduction of the firewalls means that there is no longer any direct connectivity between the Branch and Home offices. All traffic must be routed through the VCS Expressway. This is shown by the absence of a link between the Home and Branch subzones. VCS Expressway Subzone Configuration HOME OFFICE INTERNET Default Subzone Traversal Client Zone Traversal Subzone The VCS Expressway has subzones configured for the Home Office and Branch Office. These are linked to the VCS Expressway’s Traversal Subzone, with pipes placed on each link. All calls from the VCS Expressway to the VCS Control must go through the Traversal Subzone and will consume bandwidth from this Subzone. Note also that calls from the Home Office to the Branch Office must also go through the Traversal Subzone, and will also consume bandwidth from this Subzone as well as the Home and Branch subzones and Home Office, Branch office and Head Office pipes. Traversal Server Zone Pipe B Traversal Subzone Home Office Subzone Pipe A Pipe C BRANCH OFFICE Branch Office Subzone In this example we have assumed that there is no bottleneck on the link between the VCS Expressway and the Head Office network, so have not placed a pipe on this link. If you want to limit the amount of traffic flowing through your firewall, you could provision a pipe on this link. VCS Control Subzone Configuration Because the VCS Control is only managing endpoints on the Head Office LAN, its configuration is simpler. All of the endpoints in the Head Office are assigned to the Default Subzone. This is linked to the Traversal Subzone, through which all calls leaving the Head Office must pass. Introduction D14049.04 JULY 2008 Getting Started Overview and Status System Configuration VCS Configuration Zones and Neighbors Call Processing 148 Bandwidth Control Firewall Traversal Applications Maintenance Appendices Grey Headline (continued) TANDBERG VIDEO COMMUNICATIONS SERVER ADMINISTRATOR GUIDE Firewall Traversal This section describes how to configure your VCS Control and VCS Expressway in order to traverse firewalls. It also describes how to configure the additional firewall traversal server functions of a VCS Expressway, including STUN services. Introduction D14049.04 JULY 2008 Getting Started Overview and Status System Configuration VCS Configuration Zones and Neighbors Call Processing 149 Bandwidth Control Firewall Traversal Applications Maintenance Appendices Grey Headline (continued) Firewall Traversal Overview TANDBERG VIDEO COMMUNICATIONS SERVER ADMINISTRATOR GUIDE About Expressway™ VCS as a Firewall Traversal Client The purpose of a firewall is to control the IP traffic entering your network. Firewalls will generally block unsolicited incoming requests, meaning that any calls originating from outside your network will be prevented. However, firewalls can be configured to allow outgoing requests to certain trusted destinations, and to allow responses from those destinations. This principle is used by TANDBERG’s Expressway™ solution to enable secure traversal of any firewall. Your VCS can act as a firewall traversal client on behalf of SIP and H.323 endpoints registered to it, and any gatekeepers that are neighbored with it. In order to act as a firewall traversal client, the VCS must be configured with information about the system(s) that will be acting as its firewall traversal server. See the section on Configuring the VCS as a Traversal Client for full details on how to do this. In most cases, you will use a VCS Control as a firewall traversal client. However, a VCS Expressway can also act as a firewall traversal client. The Expressway™ solution consists of: 1. a TANDBERG VCS Expressway or TANDBERG Border Controller located outside the firewall on the public network or in the DMZ, which acts as the firewall traversal server 2. a TANDBERG VCS Control, TANDBERG Gatekeeper, MXP endpoint or other traversal-enabled endpoint located in a private network, which acts as the firewall traversal client. The two systems work together to create an environment where all connections between the two are outbound, i.e. established from the client to the server, and thus able to successfully traverse the firewall. How does it work? The traversal client constantly maintains a connection via the firewall to a designated port on the traversal server. This connection is kept alive by the client sending packets at regular intervals to the server. When the traversal server receives an incoming call for the traversal client, it uses this existing connection to send an incoming call request to the client. The client then initiates the necessary outbound connections required for the call media and/or signaling. This process ensures that from the firewall’s point of view, all connections are initiated from the traversal client inside the firewall out to the traversal server. Introduction D14049.04 JULY 2008 Getting Started Overview and Status System Configuration The firewall traversal server used by the VCS client can be a TANDBERG VCS Expressway, or (for H.323 only) a TANDBERG Border Controller. VCS as a Firewall Traversal Server The VCS Expressway has all the functionality of a VCS Control (including being able to act as a firewall traversal client). However, its main feature is that it can act as a firewall traversal server for other TANDBERG systems and any traversal-enabled endpoints that are registered directly to it. It can also provide STUN Discovery and STUN relay services to endpoints with STUN clients. These features are enabled as follows: • In order for the VCS Expressway to act as a firewall traversal server for TANDBERG systems, you must create and configure a new traversal server zone on the VCS Expressway for every system that is its traversal client. See Configuring the VCS as a Traversal Server for full instructions. • In order for the VCS Expressway to act as a firewall traversal server for traversal-enabled endpoints (i.e. TANDBERG MXP endpoints and any other endpoints that support the ITU H.460.18 and H.460.19 standards), no additional configuration is required. See Configuring Traversal for Endpoints for more information on the options available. • To enable STUN Discovery and STUN Relay services, see STUN Services. • To reconfigure the default ports used by the VCS Expressway, see Configuring Traversal Server Ports. In order for firewall traversal to function correctly, the VCS Expressway must have one traversal server zone configured on it for each client system that is connecting to it (this does not include traversal-enabled endpoints which register directly with the VCS Expressway; the settings for these connections are configured in a different way). Likewise, each VCS client must have one traversal client zone configured on it for each server that it is connecting to. The ports and protocols configured for each pair of client-server zones must be the same. (See Quick Guide to VCS Traversal Client - Server Configuration for a summary of the configuration on each system.) Because the VCS Expressway listens for connections from the client on a specific port, we recommend that you create the traversal server zone on the VCS Expressway before you create the traversal client zone on the VCS Control. ! VCS Configuration Zones and Neighbors Call Processing 150 Bandwidth Control Firewall Traversal Applications Maintenance Appendices Grey Headline (continued) Quick Guide to VCS Traversal Client - Server Configuration Overview TANDBERG VIDEO COMMUNICATIONS SERVER ADMINISTRATOR GUIDE VCS Control (Client) Full details of how to configure a VCS Control and VCS Expressway as traversal client and server respectively are given in the following pages. However, the basic steps are: VCS Expressway (Server) the VCS Control has been Ensure configured with an Authentication username and Authentication password to use as its External Registration Credentials. These can be added or edited via VCS Configuration > Authentication > Configuration (or by clicking on the Edit Authentication Username/Password link in the Edit Zone page for an existing Traversal Client Zone). the VCS Expressway, create a On Traversal Server Zone (this represents the incoming connection from the VCS Control). In the Client authentication username field, enter the VCS Control’s Authentication username. the VCS Expressway, add the VCS On Control’s authentication username and password as credentials in the authentication database. These can be added or edited via VCS Configuration > Authentication > Local Database, or by clicking on the Add/Edit Local Authentication Database link in the Edit Zone page. the VCS Control, create a Traversal On Client Zone (this represents the connection to the VCS Expressway). Enter the VCS Expressway’s IP address or FQDN in the Peer 1 address field. On the VCS Control, configure all the modes and ports in the Protocol section to match identically those of the Traversal Server Zone on the VCS Expressway. Introduction D14049.04 JULY 2008 Getting Started Overview and Status System Configuration VCS Configuration Zones and Neighbors Call Processing 151 Bandwidth Control Firewall Traversal Applications Maintenance Appendices Grey Headline (continued) Firewall Traversal Protocols and Ports Overview TANDBERG VIDEO COMMUNICATIONS SERVER ADMINISTRATOR GUIDE Expressway Process H.323 Firewall Traversal Protocols Ports play a vital part in firewall traversal configuration. The correct ports must be set on the VCS Expressway, traversal client and firewall in order for connections to be permitted. The Expressway™ solution works as follows: Ports are initially configured on the VCS Expressway by the VCS Expressway Administrator. The firewall administrator and the traversal client administrator should then be notified of the ports, and they then must then configure their systems to connect to these specific ports on the server. The only port configuration that is done on the client is the range of ports it uses for outgoing connections; the firewall administrator may need to know this information so that if necessary they can configure the firewall to allow outgoing connections from those ports. 2. The server identifies each client by the port on which it receives the connection, and the Authentication credentials provided by the client. 1. Each traversal client connects via the firewall to a unique port on the VCS Expressway. 3. Once established, the client constantly sends a probe to the VCS Expressway via this connection in order to keep the connection alive. 4. When the VCS Expressway receives an incoming call for the client, it uses this initial connection to send an incoming call request to the client. The VCS supports two different firewall traversal protocols for H.323: Assent and H.460.18/H.460.19. • Assent is TANDBERG’s proprietary protocol. • H.460.18 and H.460.19 are ITU standards which define protocols for the firewall traversal of signaling and media respectively. These standards are based on the original TANDBERG Assent protocol. In order for a traversal server and traversal client to communicate, they must be using the same protocol. The two protocols each use a slightly different range of ports. 5. The client then initiates one or more outbound connections. The destination ports used for these connections will differ for signaling and/or media, and will depend on the protocol being used (see the following sections for more details). SIP Firewall Traversal Protocols The VCS supports the Assent protocol for SIP firewall traversal of media. The signaling is traversed through TCP/TLS connection established from the client to the server. Introduction D14049.04 JULY 2008 Getting Started Overview and Status System Configuration VCS Configuration Zones and Neighbors Call Processing 152 Bandwidth Control Firewall Traversal Applications Maintenance Appendices Grey Headline (continued) Firewall Traversal Protocols and Ports Ports for Initial Connections from Traversal Clients Each traversal server zone specifies an H.323 port and a SIP port to be used for the initial connection from the client. Each time you configure a new traversal server zone on the VCS Expressway, you will be allocated default port numbers for these connections: • H.323 ports will start at UDP/6001 and increment by 1 for every new traversal server zone • SIP ports will start at TCP/7001 and increment by 1 for every new traversal server zone. You can change these default ports if necessary but you must ensure that the ports are unique for each traversal server zone. Once the H.323 and SIP ports have been set on the VCS Expressway, matching ports must be configured on the corresponding traversal client. You must allow outbound connections through your firewall to each of the unique SIP and H.323 ports that are configured on each of the VCS Expressway’s traversal server zones. The default port used for the initial connections from MXP endpoints is the same as that used for standard RAS messages, i.e. UDP/1719. While it is possible to change this port on the VCS Expressway, most endpoints will not support connections to ports other than UDP/1719. We therefore recommend that this be left as the default. ! Introduction D14049.04 JULY 2008 Getting Started Overview and Status TANDBERG VIDEO COMMUNICATIONS SERVER ADMINISTRATOR GUIDE Assent Ports Ports for Connections out to the Public Internet H.460.18/19 Ports For connections to the VCS Expressway using the Assent protocol, the default ports are: Call signaling For connections to the VCS Expressway using the H.460.18/19 protocols, the default ports are: Call signaling • UDP/1719: listening port for RAS • UDP/1719: listening port for RAS messages • TCP/1720: listening port for H.225 protocol • TCP/2777: listening port for H.245 protocol messages • TCP/2776: listening port for H.225 and H.245 protocols Media Media • UDP/2776: RTP media port • UDP/2776: RTP media port • UDP/2777: RTCP media control port • UDP/2777: RTCP media control port If your VCS Expressway does not have any endpoints registering directly with it, and it has no Alternates configured, then UDP/1719 is not required. You therefore do not need to allow outbound connections to this port through the firewall between the VCS Control and VCS Expressway. In situations where the VCS Expressway is attempting to connect to an endpoint on the public internet, you will not know the exact port(s) on the endpoint to which the connection will be made. This is because the ports to be used are determined by the endpoint and advised to the VCS Expressway only once the server has located the endpoint on the public internet. This may cause problems if your VCS Expressway is located within a DMZ (i.e. there is a firewall between the VCS Expressway and the public internet) as you will not be able to specify in advance rules that will allow you to connect out to the endpoint’s ports. You can however specify the ports on the VCS Expressway that will be used for calls to and from endpoints on the public internet so that your firewall administrator can allow connections via these ports. The ports that can be configured for this purpose are: H.323 SIP Ports STUN Ports SIP call signaling uses the same port as used by the initial connection between the client and server. The VCS Expressway can be enabled to provide STUN services (STUN Relay and STUN Binding Discovery) which can be used by SIP endpoints which support the ICE firewall traversal protocol. Media The ports used by these services are configurable via: Where the traversal client is a VCS, SIP media uses Assent to traverse the firewall . The default ports are the same as for H.323, i.e.: • VCS Configuration > Expressway > STUN • xConfiguration Traversal Server Call signaling • UDP/2776: RTP media port • UDP/2777: RTCP media control port System Configuration VCS Configuration STUN The ICE clients on each of the SIP endpoints must be able to discover these ports, either via SRV records in DNS or by direct configuration. Zones and Neighbors Call Processing 153 Bandwidth Control Firewall Traversal • TCP/1720: signaling • UDP/1719: signaling • UDP/50,000-51199: media • TCP/15,000-19999: signaling SIP • TCP/5061: signaling • UDP/5060 (default): signaling • UDP/50,000-51199: media • TCP: a temporary port in the range 25000-29999 is allocated. STUN • 3478/UDP (default): STUN Discovery • 4678/UDP: (default): STUN Relay • 60000-61200/UDP (default range): media Applications Maintenance Appendices Grey Headline (continued) Firewall Traversal and Authentication TANDBERG VIDEO COMMUNICATIONS SERVER ADMINISTRATOR GUIDE Overview In order to control which systems can use the VCS Expressway as a traversal server, each VCS Control or Gatekeeper that wishes to be its client must first authenticate with it. Upon receiving the initial connection request from the traversal client, the VCS Expressway asks the client to authenticate itself by providing a username and password. The VCS Expressway then looks up the client’s username and password in its own authentication database. If a match is found, the VCS Expressway will accept the request from the client. The settings used for authentication depend on the combination of client and server being used. These are detailed in the table opposite. All VCS and Gatekeeper traversal clients must authenticate with the VCS Expressway, regardless of the VCS Expressway’s Authentication Mode setting. However, endpoint clients are only required to authenticate if the VCS Expressway’s Authentication Mode is On. Client Server VCS Control or VCS Expressway VCS Expressway • The VCS client provides its Authentication Username and Authentication Password. These are set on the VCS client via VCS Configuration > Authentication > Configuration, in the External Registration Credentials section. • The traversal server zone for the VCS client must be configured with the Endpoint VCS Expressway • The endpoint client provides its Authentication ID and Authentication Password. • There must be an entry in the VCS Expressway’s authentication TANDBERG Gatekeeper (version 5.2 and earlier) VCS Expressway • The Gatekeeper looks up its System Name in its own authentication • The traversal server zone for the Gatekeeper client must be configured TANDBERG Gatekeeper (version 6.0 and later) VCS Expressway • The Gatekeeper provides its Authentication Username and • The traversal server zone for the Gatekeeper client must be configured VCS Control or VCS Expressway Border Controller database and retrieves the password for that name. It then provides this name and password. Authentication Password. These are set on the Gatekeeper via Gatekeeper Configuration > Authentication, in the External Registration Credentials section. Authentication and NTP All VCS and Gatekeeper traversal clients must authenticate with the VCS Expressway. The authentication process makes use of timestamps and requires that each system is using an accurate system time. The system time on a VCS is provided by a remote NTP server. Therefore, in order for firewall traversal to work, all systems involved must be configured with details of an NTP server. Introduction D14049.04 JULY 2008 Getting Started Overview and Status Client Authentication Username. This is set on the VCS Expressway via VCS Configuration > Zones > Edit Zone, in the Configuration section. • There must also be an entry in the VCS Expressway’s authentication database with the corresponding client username and password. database with the corresponding client username and password. with the Gatekeeper’s System Name in the Client Authentication Username field. This is set on the VCS Expressway via VCS Configuration > Zones > Edit Zone, in the Configuration section. • There must be an entry in the VCS Expressway’s authentication database that has the Gatekeeper’s System name as the username, along with the corresponding password. with the Gatekeeper’s Authentication Username. This is set on the VCS Expressway via VCS Configuration > Zones > Edit Zone, in the Configuration section • There must also be an entry in the VCS Expressway’s authentication database with the corresponding client username and password. • If Authentication is On on the Border Controller, the VCS client provides • If Authentication is On on the Border Controller, there must be an entry its Authentication Username and Authentication Password. These are set on the VCS client via VCS Configuration > Authentication > Configuration, in the External Registration Credentials section. • If the Border Controller is in Assent mode, the VCS client provides its Authentication Username. This is set on the VCS client via VCS Configuration > Authentication > Configuration, in the External Registration Credentials section. System Configuration VCS Configuration Zones and Neighbors Call Processing 154 in the Border Controller’s authentication database that matches the VCS client’s Authentication Username and Authentication Password. • If the Border Controller is in Assent mode, the traversal zone configured on the Border Controller to represent the VCS client must use the VCS’s Authentication Username in the Assent Account name field. This is set on the Border Controller via TraversalZone > Assent > Account name. Bandwidth Control Firewall Traversal Applications Maintenance Appendices Grey Headline (continued) Other Issues TANDBERG VIDEO COMMUNICATIONS SERVER ADMINISTRATOR GUIDE Firewall Traversal and Dual Network Interfaces Firewall Configuration The Dual Network Interfaces option enables the LAN 2 interface on your VCS Expressway (the option is not available on a VCS Control). The LAN 2 interface is used in situations where your VCS Expressway is located in a DMZ that consists of two separate networks - an inner DMZ and an outer DMZ - and your firewall rules prevent communication between the two. With the LAN 2 interface enabled, you can configure the VCS with two separate IP addresses, one for each network in the DMZ. Your VCS then acts as a proxy server between the two networks, allowing calls to pass between the internal and outer firewalls that make up your DMZ. All ports configured on the VCS, including those relating to firewall traversal, will apply to both IP addresses; it is not possible to configure these ports separately for each IP address. In order for Expressway™ firewall traversal to function correctly, the firewall must be configured to: • allow initial outbound traffic from the client to the ports being used by the VCS Expressway • allow return traffic from those ports on the VCS Expressway back to the originating client. TANDBERG offers a downloadable tool, the Expressway Port Tester, that allows you to test your firewall configuration for compatibility issues with your network and endpoints. It will advise if necessary which ports may need to be opened on your firewall in order for the Expressway™ solution to function correctly. The Expressway Port Tester currently only supports H.323. Contact your TANDBERG representative for more information. ! Introduction D14049.04 JULY 2008 Getting Started Overview and Status System Configuration VCS Configuration Zones and Neighbors We recommend that you turn off any H.323 and SIP protocol support on the firewall: these are not needed in conjunction with the TANDBERG Expressway™ solution and may interfere with its operation. Call Processing 155 Bandwidth Control Firewall Traversal Applications Maintenance Appendices Grey Headline (continued) Configuring the VCS as a Traversal Client TANDBERG VIDEO COMMUNICATIONS SERVER ADMINISTRATOR GUIDE Adding a New Traversal Client Zone Overview To enable your VCS to act as a traversal client on behalf of its endpoints and neighbor gatekeepers, you must create a connection between it and a traversal server (e.g. a TANDBERG VCS Expressway or Border Controller). • VCS Configuration > Zones. You will be taken to the Zones page. Select New. You will be taken to the Create Zone page. • xCommand ZoneAdd You do this by adding a new traversal client zone on the VCS client and configuring it with the details of the traversal server. Name Enter the name you wish to give to this zone. The name acts as a unique identifier, allowing you to distinguish between zones of the same type. Type From the Type drop-down menu, select TraversalClient. Create Zone Click here to create the zone. You will be taken directly to the Edit Zone page, where you can configure the traversal client zone as required. You can create more than one traversal client zone if you wish to connect to multiple traversal servers. Introduction D14049.04 JULY 2008 Getting Started Overview and Status System Configuration VCS Configuration Zones and Neighbors Call Processing 156 Bandwidth Control Firewall Traversal Applications Maintenance Appendices Grey Headline (continued) Configuring the VCS as a Traversal Client TANDBERG VIDEO COMMUNICATIONS SERVER ADMINISTRATOR GUIDE Configuring a Traversal Client Zone • VCS Configuration > Zones. SIP mode You will be taken to the Zones page. Click on the name of the zone you wish to configure. You will be taken to the Edit Zone page. • xConfiguration • xConfiguration Determines whether SIP calls will be allowed to and from this zone. Zones Zone [1..200] SIP port Zones Zone [1..200] Traversal Client Specifies the port on the traversal server to be used for SIP calls from this VCS. Hop count SIP transport Specifies the hop count to be used when querying this zone. Determines which transport type will be used for SIP calls to and from the traversal server. Authentication username This field displays the Authentication username that has been configured on this VCS. The Authentication username and password are system-wide settings that are used for all Traversal Client Zones. The Authentication username cannot be edited directly from this page but it is shown here for reference as it is needed when configuring the corresponding Traversal Server Zone. H.323 mode Determines whether H.323 calls will be allowed to and from this zone. H.323 protocol Determines which of the two firewall traversal protocols to use for calls to the traversal server. To edit the Authentication username, click on the Edit Authentication Username/Password link. This will take you to the Authentication page, where you can edit the settings under the External Registration Credentials section. H.323 port Specifies the port on the traversal server to be used for H.323 firewall traversal calls. Peer 1 to Peer 6 address Retry interval The IP Address or FQDN of the traversal server. If the traversal server is a VCS cluster, this includes all of its Peers. See the section Neighboring the Local VCS to a Cluster for more information. Specifies the interval in seconds with which a failed attempt to establish a connection to the traversal server should be retried. Remember to Save your changes. Introduction D14049.04 JULY 2008 Getting Started Overview and Status System Configuration VCS Configuration Zones and Neighbors Call Processing 157 Bandwidth Control Firewall Traversal Applications Maintenance Appendices Grey Headline (continued) Configuring the VCS as a Traversal Server TANDBERG VIDEO COMMUNICATIONS SERVER ADMINISTRATOR GUIDE Overview Adding a New Traversal Server Zone The VCS Expressway can act as a firewall traversal server. This feature means you can: • Allow your VCS to act as a traversal server for other VCSs and TANDBERG Gatekeepers. You do this by adding a new traversal server zone on the VCS, and configuring it with details of the traversal client. • Provide firewall traversal for any traversalenabled endpoints (i.e. TANDBERG MXP endpoints and any other endpoints that support the ITU H.460.18 and H.460.19 standards) registered directly with it. You can configure the protocols and ports that will be used. • Enable and configure STUN services. • Configure the ports used specifically for firewall traversal services. The following sections describe how to configure each of the above options. • VCS Configuration > Zones. You will be taken to the Zones page. Select New. You will be taken to the Create Zone page. • xCommand ZoneAdd Name Enter the name you wish to give to this zone. The name acts as a unique identifier, allowing you to distinguish between zones. Type From the Type drop-down menu, select TraversalServer. Create Zone Click here to create the zone. You will be taken directly to the Edit Zone page, where you can configure the traversal server zone as required. Introduction D14049.04 JULY 2008 Getting Started Overview and Status System Configuration VCS Configuration Zones and Neighbors Call Processing 158 Bandwidth Control Firewall Traversal Applications Maintenance Appendices Grey Headline (continued) Configuring the VCS as a Traversal Server TANDBERG VIDEO COMMUNICATIONS SERVER ADMINISTRATOR GUIDE Configuring a Traversal Server Zone • VCS Configuration > Zones. SIP mode You will be taken to the Zones page. Click on the name of the zone you wish to configure. You will be taken to the Edit Zones page. • xConfiguration • xConfiguration Determines whether SIP calls will be allowed to and from the traversal client. SIP port Zones Zone Specifies the port on the VCS Expressway to be used for SIP calls from the traversal client. Zones Zone [1..200] TraversalServer SIP transport Client authentication username Determines which transport type will be used for SIP calls to and from the traversal client. If the traversal client is a VCS, this must be the VCS’s Authentication Username. You must also add the client’s Authentication username and password to the VCS’s authentication database. To go directly to the page where you can do this, click on the Add/ Edit Local Authentication Database link. H.460.19 demux mode On: allows use of the same two ports for media for all calls from the traversal client. Off: each call from the traversal client will use a separate pair of ports for media. H.323 mode UDP retry interval Determines whether H.323 calls will be allowed to and from the traversal client. Sets the interval (in seconds) with which the traversal client will send a UDP probe to the VCS Expressway. H.323 protocol Determines which of the two firewall traversal protocols will be used for calls through the firewall, to and from the client. The same protocol must be used by the client. UDP retry count Sets the number of times the traversal client will attempt to send a UDP probe to the VCS Expressway. H.323 port UDP keep alive interval Specifies the port on the VCS Expressway to be used for H.323 connections from the client. TCP retry interval Sets the frequency (in seconds ) with which the traversal client will send a TCP probe to the VCS Expressway. Introduction D14049.04 JULY 2008 Getting Started Overview and Status TCP keep alive interval TCP retry count Sets the interval (in seconds) with which the traversal client will send a TCP probe to the VCS once a call is established, in order to keep the firewall’s NAT bindings open. Sets the number of times the traversal client will attempt to send a TCP probe to the VCS Expressway. System Configuration VCS Configuration Zones and Neighbors Call Processing 159 Bandwidth Control Firewall Traversal Sets the interval (in seconds) with which the traversal client will send a UDP probe to the VCS once a call is established, in order to keep the firewall’s NAT bindings open. Applications Maintenance Appendices Grey Headline (continued) Configuring the VCS as a Traversal Server TANDBERG VIDEO COMMUNICATIONS SERVER ADMINISTRATOR GUIDE Configuring Traversal for Endpoints Overview UDP probe retry interval Sets the frequency (in seconds) with which locally registered endpoints will send a UDP probe to the VCS Expressway. Traversal-enabled H.323 endpoints can register directly with the VCS Expressway and use it for firewall traversal. To configure the options for these endpoints: UDP probe retry count • VCS Configuration > Expressway> Locally Sets the number of times locally registered endpoints will attempt to send a UDP probe to the VCS Expressway. Registered Endpoints You will be taken to the Locally Registered Endpoints page. • xConfiguration Zones LocalZone Traversal H323 UDP probe keep alive interval Sets the interval (in seconds) with which locally registered endpoints will send a UDP probe to the VCS Expressway once a call is established, in order to keep the firewall’s NAT bindings open. H.323 Assent mode Determines whether or not H.323 calls using Assent mode for firewall traversal will be allowed. TCP probe retry interval H.460.18 mode Sets the frequency (in seconds) with which locally registered endpoints will send a TCP probe to the VCS Expressway. Determines whether or not H.323 calls using H.460.18/19 mode for firewall traversal will be allowed. TCP probe retry count H.460.19 demux mode Sets the number of times locally registered endpoints will attempt to send a TCP probe to the VCS Expressway. Determines whether the VCS Expressway will operate in Demultiplexing mode for calls from locally registered endpoints. On: allows use of the same two ports for all calls. TCP probe keep alive interval Sets the interval (in seconds) with which locally registered endpoints will send a TCP probe to the VCS Expressway once a call is established, in order to keep the firewall’s NAT bindings open. Off: Each call will use a separate pair of ports for media. H.323 preference If an endpoint supports both Assent and H.460.18 protocols, this setting determines which the VCS Expressway uses. Introduction D14049.04 JULY 2008 Getting Started Overview and Status Save Click here to save your settings. System Configuration VCS Configuration Zones and Neighbors Call Processing 160 Bandwidth Control Firewall Traversal Applications Maintenance Appendices Grey Headline (continued) Configuring the VCS as a Traversal Server TANDBERG VIDEO COMMUNICATIONS SERVER ADMINISTRATOR GUIDE Configuring Traversal Server Ports Overview Media demultiplexing RTP port Specifies the port on the VCS to be used for demultiplexing RTP media. The VCS Expressway has specific listening ports used for firewall traversal. Rules must be set on your firewall to allow connections to these ports. In most cases the default ports should be used. However, you have the option to change these ports if necessary. Media demultiplexing RTCP port Specifies the port on the VCS to be used for demultiplexing RTCP media. To configure the VCS Expressway ports: • VCS Configuration > Expressway > Ports H.323 Assent call signaling port • xConfiguration Specifies the port on the VCS to be used for Assent signaling. You will be taken to the Ports page. Traversal Server Media Demultiplexing • xConfiguration H.323 Traversal Server H.323 H.460.18 call signaling port Specifies the port on the VCS to be used for H.460.18 signaling. Save Click here to save your settings. Introduction D14049.04 JULY 2008 Getting Started Overview and Status System Configuration VCS Configuration Zones and Neighbors Call Processing 161 Bandwidth Control Firewall Traversal Applications Maintenance Appendices Grey Headline (continued) Configuring the VCS as a Traversal Server TANDBERG VIDEO COMMUNICATIONS SERVER ADMINISTRATOR GUIDE STUN Services About STUN STUN Binding Discovery STUN Relay STUN is a network protocol that enables a SIP or H.323 client to communicate via UDP or TCP from behind a NAT firewall. The STUN Binding Discovery service provides information back to the client about the binding allocated by the NAT firewall being traversed. The STUN Relay service (formerly known as TURN) allows a client to ask for data to be relayed to it from specific remote peers via the relay server and through a single connection between the client and the relay server. The VCS Expressway can be configured to provide two types of STUN services to traversal clients. These services are STUN Binding Discovery and STUN Relay. Currently the VCS supports STUN over UDP only. For detailed information on the base STUN protocol and the Binding Discovery service, refer to Session Traversal Utilities for (NAT) (STUN) [11]. For detailed information on the STUN Relay service, refer to Obtaining Relay Addresses from Simple Traversal Underneath NAT (STUN) [12]. How it works A client behind a NAT firewall sends a STUN discovery request via the firewall to the VCS Expressway, which has been configured as a STUN discovery server. Upon receipt of the message, the VCS Expressway responds to the client with information about the allocated NAT binding, i.e. the public IP address and the ports being used. The client can then provide this information to other systems which may want to reach it, allowing it to be found even though it is not directly available on the public internet. How it works A client behind a NAT firewall sends a STUN Allocate request to the VCS Expressway which is acting as the STUN relay server. The sending of this request opens a binding on the firewall. Upon receipt of the request, the VCS Expressway opens a public IP port on behalf of the client, and reports back to the client this IP address and port, as well as details of the firewall binding. The client can then provide this IP address and port to other systems which may want to reach it. The client can restrict the remote address and ports from which the relay should forward on media. Any incoming calls to this IP address and port on the VCS server are relayed via the allocated binding on the NAT to the client. About ICE Currently, the most likely users of STUN services are ICE endpoints. ICE (Interactive Connectivity Establishment) is a collaborative algorithm that works together with STUN services (and other NAT traversal techniques) to allow clients to achieve firewall traversal. The individual techniques on their own may allow traversal in certain network topologies but not others. Also some techniques maybe less efficient than others, involving extra hops (e.g. STUN Relay). ICE involves the collecting of potential (candidate) points of contact (IP address and port combination) via each of the traversal techniques, the verification of peer-to-peer connectivity via each of these points of contact and then the selection of the “best” successful candidate point of contact to use. The endpoint will only be reachable if the firewall has the Endpoint-Independent Mapping behavior as described in RFC 4787 [13]. Introduction D14049.04 JULY 2008 Getting Started Overview and Status System Configuration VCS Configuration Zones and Neighbors Call Processing 162 Bandwidth Control STUN Relays consume traversal call licences (three relays take one licence) but they do not actually pass through the traversal subzone. Firewall Traversal Applications Maintenance Appendices Grey Headline (continued) Configuring the VCS as a Traversal Server TANDBERG VIDEO COMMUNICATIONS SERVER ADMINISTRATOR GUIDE STUN Services Configuring STUN Services STUN Discovery Mode Determines whether the VCS will offer STUN Discovery services to traversal clients. To configure the STUN Binding Discovery and STUN Relay services: • VCS Configuration > Expressway > STUN. You will be taken to the STUN page. • xConfiguration STUN Traversal Server STUN Discovery Port Specifies the port on the VCS on which it will be listening for STUN Discovery requests. STUN Relay Mode Determines whether the VCS will offer STUN Relay services to traversal clients. STUN Relay Port Specifies the port on the VCS on which it will be listening for STUN relay requests. STUN Relay Media port range start Specifies the lower port in the range to be used for STUN media relay. STUN Relay Media port range end Specifies the upper port in the range to be used for STUN media relay. Save Click here to save your changes. Introduction D14049.04 JULY 2008 Getting Started Overview and Status System Configuration VCS Configuration Zones and Neighbors Call Processing 163 Bandwidth Control Firewall Traversal Applications Maintenance Appendices Grey Headline (continued) TANDBERG VIDEO COMMUNICATIONS SERVER ADMINISTRATOR GUIDE Applications This section provides information on each of the additional services that are available under the Applications menu of the VCS. You must purchase the appropriate option key in order to use each of these applications. They are: • FindMe (User Policy) • Presence Services Introduction D14049.04 JULY 2008 Getting Started Overview and Status System Configuration VCS Configuration Zones and Neighbors Call Processing 164 Bandwidth Control Firewall Traversal Applications Maintenance Appendices Grey Headline (continued) FindMe™ (User Policy) TANDBERG VIDEO COMMUNICATIONS SERVER ADMINISTRATOR GUIDE Overview What is FindMe? Process Overview Recommendations When Deploying FindMe FindMe is a form of User Policy, which is the set of rules that determines what happens to a call for a particular user or group when it is received by the TANDBERG VCS. When the VCS receives a call for a particular alias, it checks to see whether User Policy has been enabled. If so, the VCS queries the User Policy Manager to see whether that alias is listed as a FindMe name. If so, the call is forwarded to the aliases according to configuration for that FindMe alias. • The FindMe name should be in the form of a URI, and should The FindMe feature lets you assign a single “FindMe” name to individuals or groups in your enterprise. Users can determine which devices will be called when their FindMe name is dialed, and can also specify what happens if those devices are busy or go unanswered. The FindMe feature means that potential callers can be given a single FindMe Alias on which they can contact an individual or group in your enterprise - callers won’t have to know details of all the devices on which that person or group might be available. If User Policy has not been enabled, or the alias is not present in the User Policy Manager, the VCS will continue to search for the alias in the usual manner, i.e. first locally and then sending the request out to neighbors. To enable this feature you must purchase and install the appropriate option key. Contact your TANDBERG representative for information. User Policy is invoked after any Administrator Policy configured on the VCS has been applied. See the Call Processing Diagram for more information. be the individual’s primary URI. • Endpoints should not register with an alias that is the same as an existing FindMe name. You can prevent this by including all FindMe names on the Deny List. Example Users at Example Corp. have a FindMe name in the format john.smith@example.com. Each of the user’s endpoints are registered with a slightly different alias that identifies its physical location. For example their office endpoint is registered with an alias in the format john.smith.office@example.com and their home endpoint as john.smith.home@example.com. Both of these endpoints are included in the list of devices to ring when the FindMe name is dialed. The alias john.smith@example. com is added to the Deny List, to prevent an individual endpoint registering with that alias. How are Devices Specified? Who Must do What Before FindMe™ Can Be Used? When configuring their FindMe account, users are asked to specify the devices to which calls to their FindMe name will be routed. FindMe™ is an optional feature on the VCS, and you must install the appropriate option key before it can be used. Contact your TANDBERG representative for more information. It is possible to specify aliases and even other FindMe names as one or more of the devices. However, care must be taken in these situations to avoid circular configurations. The following steps are required for the use of FindMe once the option has been installed: 1. The VCS administrator enables and configures User Policy. User Policy Manager For this reason, we recommend that users specify the physical devices they wish to ring when their FindMe name is called, by entering the alias with which that device has registered. 2. The VCS administrator creates a user account for each user or group who require a FindMe name. The User Policy Manager is the application that manages the FindMe user accounts. 3. The owner of the FindMe name configures their account settings. The VCS has its own local User Policy Manager. However, it also provides the ability to use a User Policy Manager on a remote system; this feature is intended for future third party integration. Introduction D14049.04 JULY 2008 Getting Started Overview and Status System Configuration VCS Configuration Zones and Neighbors Call Processing 165 Bandwidth Control FindMe is supported by clustering. For specific information about how FindMe information is managed across Peers in a cluster, refer to the section Clustering and FindMe. Firewall Traversal Applications Maintenance Appendices Grey Headline (continued) FindMe™ (User Policy) TANDBERG VIDEO COMMUNICATIONS SERVER ADMINISTRATOR GUIDE Enabling FindMe on the VCS Configuring User Policy Manager Mode Determines whether or not User Policy will be enabled, and if so, the location of the User Policy Manager. FindMe requires a User Policy Manager. The VCS has its own User Policy Manager, but there is also the ability to connect to a User Policy Manager located on another system. Off: User Policy is not enabled. Local: User Policy is enabled and the VCS’s own User Policy Manager is used. To configure the User Policy Manager: • Applications > FindMe > Configuration. Remote: User Policy is enabled and a thirdparty User Policy Manager located on another system is used (this feature is intended for future third-party integration). If you select this option, further configuration options will appear (see below). You will be taken to the User Policy page. Policy UserPolicy • xConfiguration Protocol The protocol used to connect to the remote User Policy Manager. Address The IP address or domain name of the remote User Policy Manager. Path The URL of the remote User Policy Manager. Username The username used by the VCS to log in and query the remote User Policy Manager. Password The password used by the VCS to log in and query the remote User Policy Manager. Administrator Policy will always be applied regardless of the User Policy mode. Introduction D14049.04 JULY 2008 Getting Started Overview and Status Save Click here to save your changes. System Configuration VCS Configuration Zones and Neighbors Call Processing 166 Bandwidth Control Firewall Traversal Applications Maintenance Appendices Grey Headline (continued) FindMe™ (User Policy) TANDBERG VIDEO COMMUNICATIONS SERVER ADMINISTRATOR GUIDE Managing FindMe User Accounts About User Accounts Creating a New User Account FindMe user accounts must be created by the VCS Administrator before they can be accessed and configured by users. • Applications > FindMe > User Accounts. Each user account is accessed via a username and password associated with a specific FindMe name. You will be taken to the User Accounts page. Select New. You will be taken to the Create User Account page. Username The name of the user for whom you are creating an account. This is the name they will use to log in when configuring their FindMe options. Initial password The password to be used along with the Username when logging into this account. FindMe name Users will be able to change the password for their account once they have logged in. The FindMe name on which the user can be contacted. The FindMe name can be any string of up to 60 characters. However, not all endpoints are able to dial aliases with spaces or other nonalphanumeric characters so we recommend that these are not used in your FindMe names. Confirm password Retype the password. Initial device Save The address or alias of an endpoint on which this user can be contacted initially. Once the account has been saved, the user can add and remove endpoints themselves. Click here to create the new account and return to the User Accounts page. Cancel Click here to return to the User Accounts page without creating the new account. Introduction D14049.04 JULY 2008 Getting Started Overview and Status System Configuration VCS Configuration Zones and Neighbors Call Processing 167 Bandwidth Control Firewall Traversal Applications Maintenance Appendices Grey Headline (continued) FindMe™ (User Policy) TANDBERG VIDEO COMMUNICATIONS SERVER ADMINISTRATOR GUIDE Managing FindMe User Accounts Changing a User Password New password Type the new password to be used along with the Username when logging into this account. You can change a password on behalf of a user without knowing their existing password. This is useful when the user has forgotten their password. To change the password: • VCS Configuration > Policy > User Accounts. You will be taken to the User Accounts page. Click on the user account whose password you wish to change. You will be taken to the Edit User Account page. Confirm password Retype the new password. Viewing Existing User Account Settings To view the configuration of an existing user account: Cancel Click here to return to the User Accounts page without changing the password. • VCS Configuration > Policy > User Accounts. You will be taken to the User Accounts page. Click on the user account whose password you wish to change. You will be taken to the Edit User Account page. Restore to Default Click here to delete any existing configuration for this FindMe name. This will have the effect that any calls to that FindMe name will be rejected until one or more devices are reconfigured for that account. FindMe Configuration for... This section shows you the current configuration for the user. Change Password Click here to update the password and return to the User Accounts page. Introduction D14049.04 JULY 2008 Getting Started Overview and Status System Configuration VCS Configuration Zones and Neighbors Call Processing 168 Bandwidth Control Firewall Traversal Applications Maintenance Appendices Grey Headline (continued) FindMe™ (User Policy) TANDBERG VIDEO COMMUNICATIONS SERVER ADMINISTRATOR GUIDE Managing FindMe User Accounts Deleting a User Account Tick the box next to the account you wish to delete. To delete a FindMe user account: To select all the accounts, click on Select All. • VCS Configuration > Policy > User Accounts. You will be taken to the User Accounts page. Delete Click here to delete the selected accounts. Are you sure...? A confirmation window will appear to ensure that you wish to proceed. Click OK to continue. Introduction D14049.04 JULY 2008 Getting Started Overview and Status System Configuration VCS Configuration Zones and Neighbors Call Processing 169 Bandwidth Control Firewall Traversal Applications Maintenance Appendices Grey Headline (continued) Using TANDBERG’s FindMe™ TANDBERG VIDEO COMMUNICATIONS SERVER ADMINISTRATOR GUIDE About your FindMe User Account Accessing the FindMe Configuration Page About FindMe™ To configure your FindMe user account, log in via a web browser as described below: The FindMe feature allows you as an individual or part of a group to have a single name on which you can always be called, and you chose where calls to that name will be routed. You can also determine what happens if your first choices are either busy or unanswered after a certain period of time. For example, you could set up your individual FindMe name so that it will call you on your desktop endpoint first. If there’s no answer after 10 seconds it will divert the call to your mobile phone, and if your desktop phone is busy it will divert the call to your colleague’s desktop videophone. Go to the FindMe link provided to you by your system administrator. This will take you to the Login page. Select User Login. Alternatively, you could have a single FindMe name for your team, and set it up so that all the team member’s desktop videophones will ring when anyone calls the FindMe name. FindMe User Accounts Each FindMe name has an associated user account. Your FindMe user account is set up by your system administrator. Once this has been done, you can log in to your account via a web interface and configure it with details of the device(s) on which you want to be contacted: Enter the Username and Password provided to you by your System Administrator. • when a call is first placed to your FindMe name • if any or all of your first choice of devices are busy • if all of your first choice of devices are unanswered Select Login. You can update these details as often as you wish. Individual versus Group FindMe There are two types of FindMe names: individual and group. The only difference between the two is what happens if one of the devices in the initial list is busy. You will be taken to the FindMe page. From here you can configure your FindMe options as either an individual or a group. For individuals, it is assumed that you will only be able to take calls on one device at a time, therefore if any devices in your Primary list are busy, the call will immediately divert to the device(s) in your Busy list. For groups, it is assumed that more than one person is available to take calls, so the call will only divert to the device(s) in the Busy list if all devices in the Primary list are engaged. Introduction D14049.04 JULY 2008 Getting Started Overview and Status System Configuration VCS Configuration Zones and Neighbors Call Processing 170 Bandwidth Control Firewall Traversal Applications Maintenance Appendices Grey Headline (continued) Using TANDBERG’s FindMe™ TANDBERG VIDEO COMMUNICATIONS SERVER ADMINISTRATOR GUIDE Configuring your FindMe User Account ! Primary Devices If no devices are configured for a FindMe name, all calls to that name will be rejected. List the all the device(s) that will ring when your FindMe name is first dialed. If more than one device is listed here, they will all ring at the same time. Username The username for this FindMe account. Ring the primary devices Select the amount of time in seconds you wish the devices in the Primary list to ring before the call is diverted. Alternatively, you can specify that the devices will ring until the caller hangs up. FindMe name The FindMe name being configured. Type Select whether this FindMe name is to apply to an individual or a group of people. This will affect how calls are diverted to the Busy devices. No Answer Devices List all the device(s) that will ring if none of the devices in the Primary list are answered within the specified time. If no devices are listed here, the caller will receive a “no answer” response if none of the Primary devices are answered. Change Password Click here to change the password used to access your FindMe account. You will be taken to a new page where you can enter the new password. If you have selected a Timeout period of ring until caller hangs up, you will not be able to list any devices here. Log Out Save Changes Busy Devices Click here to exit the FindMe page. Click here to update your FindMe account with any changes. For an individual, list all the device(s) that will ring immediately if any of the devices in the Primary list are busy. Adding a device to a list Removing a device You can have up to five devices in each list. To add a device to any of the lists, enter one of the following in any of the available fields: • for video endpoints: enter any alias with which the device is registered. • for 3G mobile phones: to route video to your mobile phone, you must have a 3G gateway - enter the gateway’s prefix followed by the mobile phone number. To route voice only, enter the mobile phone number along with any prefixes required by your dial plan for external calls. • for telephones: enter the extension number (for internal calls) or telephone number, along with any necessary prefixes. Introduction D14049.04 JULY 2008 Getting Started Overview and Status System Configuration VCS Configuration Zones and Neighbors To remove a device from a list, delete it from the relevant field and click Save Changes. Call Processing 171 For a group of people, list all the device(s) that will ring immediately if all of the devices in the Primary list are busy. (If some of the devices in the Primary list are busy, the rest will continue to ring for the specified time before the call will divert to the devices listed here.) Ensure that none of the Primary devices are set to Autoanswer. If they are, the system will consider the call to have been answered when Autoanswer is initiated, and so it will not divert the call to any other devices. If no devices are listed in this section, the caller will get a busy response if any/all of the Primary devices are busy. Bandwidth Control Firewall Traversal Applications Maintenance Appendices Grey Headline (continued) Presence TANDBERG VIDEO COMMUNICATIONS SERVER ADMINISTRATOR GUIDE Overview Presence Server Presence is the ability of endpoints to provide information to other users about their current status - such as whether they are offline, online, or in a call. Any entity which provides presence information, or about whom presence information can be requested, is known as a presentity. Presentities publish information about their own presence status, and also subscribe to the information being published by other presentities and FindMe users. The Presence Server application on the VCS is responsible for managing the presence information for all presentities in the SIP domain(s) for which the VCS is authoritative (refer to the Configuring SIP - Domains section for more information). The Presence Server can manage the presence information for locally registered endpoints and presentities whose information has been received via a SIP Proxy (e.g. another VCS Control or Expressway). Endpoints that support presence, such as the next release of TANDBERG Movi, can publish their own status information. The VCS can also provide basic presence information on behalf of endpoints that do not support presence, including H.323 endpoints, as long as they have registered with an alias in the form of a URI. The Presence Server is made up of the following services, all of which are enabled (or disabled) simultaneously when the Presence Server is enabled (or disabled): • Publication Manager - receives PUBLISH messages, which contain the status information about a presentity, and writes this information to the Presence Database. PUBLISH messages are generated by presence-enabled endpoints and by the Presence User Agent (PUA). If FindMe is enabled, the VCS can also provide presence information about FindMe users by aggregating the information provided by each presentity configured for that FindMe user. The Presence application on the VCS supports the SIP-based SIMPLE standard and is made up of two separate services. These are the Presence Server and the Presence User Agent (PUA). These services can be enabled and disabled separately. The Presence status pages provide information about the presentities who are providing presence information and the users who are requesting presence information on others. • Subscription Manager - handles SUBSCRIBE messages, which request information about the status of a presentity. Upon receipt of a SUBSCRIBE message, the Subscription Manager sends a request to the Presentity Manager for information about that presentity, and forwards the information that is returned to the subscriber. The Subscription Manager also receives notifications from the Presentity Manager when a presentity’s status has changed, and send this information to all subscribers. • Presentity Manager - an interface to the Presence Database. It is used to support VCS features such as FindMe and the PUA, where the presence information provided by a number of different devices must be aggregated in order to provide an overall presence status for one particular presentity. When the Presentity Manager receives a request from the subscription manager for information on a presentity, it queries the Presence Database for all information available on all the endpoints associated with that particular presentity. The Presentity Manager then aggregates this information to determine the presentity’s current status, and returns this to the Subscription Manager. • Presence database - stores current presence information received in the form of PUBLISH messages. Also sends NOTIFY messages to the Presentity Manager to inform it of any changes. Presence is supported by clustering. For specific information about how Presence information is managed across Peers in a cluster, refer to the section Clustering and Presence. Introduction D14049.04 JULY 2008 Getting Started Overview and Status System Configuration VCS Configuration Zones and Neighbors Call Processing 172 Bandwidth Control Firewall Traversal Applications Maintenance Appendices Grey Headline (continued) Presence TANDBERG VIDEO COMMUNICATIONS SERVER ADMINISTRATOR GUIDE Presence User Agent (PUA) Overview Aggregation of Presence Information Registration refresh period Endpoints that do not support presence, including all H.323 endpoints, can have status published on their behalf by the VCS. The service that publishes this information is called the Presence User Agent (PUA). When enabled, the PUA generates presence information for all endpoints registered to the VCS, including those which already support presence. However, endpoints that support presence may provide other, more detailed status, for example away or do not disturb. For this reason, information provided by the PUA is used by the Presentity Manager as follows: The PUA will update and publish presence information on receipt of: The PUA takes information from the local registration database and the call manager and determines, for each endpoint that is currently locally registered, whether or not it is currently in a call. The PUA then provides this status information via a PUBLISH message. In order for the PUA to successfully provide presence information about a locally registered endpoint: • Where presence information is provided by the PUA and one other source, the non-PUA presence information will always be used in preference to the PUA presence information. This is because it is assumed that the other source of information is the presentity itself, and this information is more accurate. • the endpoint must be registered with an alias in the form of a • Where presence information is provided by the PUA and two • the domain part of the URI must be able to be routed to a SIP Registrar that has a presence server enabled. (This could be either the local Presence Server, if enabled, or another Presence Server on a remote system.) • If no information is being published about an endpoint, either URI When enabled, the PUA generates presence information for all endpoints registered to the VCS, including those which already support presence. The status information provided by the PUA is either: • online (registered but not in a call) • in call (registered and currently in a call). or more other sources, the Presence Server will aggregate the presence information from all presentities to give the ‘highest interest’ information, e.g. online rather than offline, and in call rather than away. by the endpoint itself or by the PUA, the endpoint’s status will be offline. If the PUA is enabled, the offline status indicates that the endpoint is not currently registered. • a registration request (for new registrations) • a registration refresh (for existing registrations) • a deregistration request • call setup and cleardown information. For non-traversal H.323 registrations the default registration refresh period is 30 minutes. This means that when the PUA is enabled on a VCS with existing registrations, it may take up to 30 minutes before an H.323 registration refresh is received and available presence information is published for that endpoint. It also means that if an H.323 endpoint becomes unavailable without sending a deregistration message, it may take up to 30 minutes for its status to change to offline. To ensure more timely publication of presence information for H.323 endpoints, you should decrease the H.323 registration refresh period (via VCS Configuration > Protocols > H.323 > Gatekeeper > Time to live). The default registration refresh period for SIP is 60 seconds, so it will take no more than a minute for the PUA to publish updated presence information on behalf of any SIP endpoints. FindMe presence When the Presentity Manager receives a request for information about the presences of a FindMe alias, it looks up the presence information for each endpoint that makes up that FindMe alias. It then aggregates this information as follows: • if the FindMe alias is set to Individual mode, if any one of the endpoints making up that FindMe is in a call the FindMe presentity’s status will be reported as in call. • if the FindMe alias is set to Group mode, if any one of the endpoints is online (i.e. not in call or offline) then the FindMe presentity’s status will be reported as online. Introduction D14049.04 JULY 2008 Getting Started Overview and Status System Configuration VCS Configuration Zones and Neighbors Call Processing 173 Bandwidth Control Firewall Traversal Applications Maintenance Appendices Grey Headline (continued) Presence TANDBERG VIDEO COMMUNICATIONS SERVER ADMINISTRATOR GUIDE Enabling and Disabling Presence Services Presence Services (i.e. the Presence Server and the Presence User Agent) are both disabled by default. These services can be enabled and disabled separately from each other, depending on the nature of your deployment. Regardless of whether or not the Presence Server is enabled, the VCS will still continue to receive PUBLISH messages if they are sent to it from any of the following sources: • Applications > Presence You will be taken to the Presence page. • xConfiguration Applications Presence • locally registered endpoints that support • the local PUA (if enabled) • remote SIP Proxies Enabled If the PUA is enabled, it will publish presence information for all locally registered endpoints, whether or not those endpoints are also publishing their own presence information. Information published by the PUA will be routed to a Presence Server acting for the endpoint’s domain. This could be the local Presence Server, or (if this is disabled) a Presence Server on another system that is authoritative for that domain. Disabled If the PUA is disabled, only those endpoints that support presence will publish presence information. No information will be available for endpoints that do not support presence. The recommended configuration for a VCS Expressway when acting as a traversal server for a VCS Control is to enable the PUA and disable the Presence Server on the VCS Expressway, and enable the Presence Server on the VCS Control. This will ensure that all PUBLISH messages generated by the PUA are routed to the VCS Control. D14049.04 JULY 2008 To enable and disable the Presence Server and Presence User Agent: presence PUA Introduction Presence Server Getting Started Overview and Status Enabled If the local Presence Server is enabled, it will process any PUBLISH messages intended for the SIP domains for which the local VCS is authoritative. All other PUBLISH messages will be proxied on in accordance with the VCS’s SIP routing rules. Disabled If the local Presence Server is disabled, the VCS will proxy on all PUBLISH messages to one or more of its neighbor zones in accordance with its locally configured call processing rules. The local VCS will do this regardless of whether or not it is authoritative for the presentity’s domain. If one of these neighbors is authoritative for the domain, and has a Presence Server enabled, then that neighbor will provide presence information for the presentity. SIP SIMPLE Presence Server Enables or disables the Presence Server. We recommend that if you have a deployment with two or more VCSs neighbored together, you enable the presence server on just one VCS. This will ensure a central source of information for all presentities in your network. System Configuration VCS Configuration SIP SIMPLE Presence User Agent Enables or disables the Presence User Agent. Status This section shows whether the Presence Server and Presence User Agent are active or inactive. For information about how Presence works within a VCS cluster, see the Clustering and Presence section. Zones and Neighbors Call Processing 174 Bandwidth Control Firewall Traversal Applications Maintenance Appendices Grey Headline (continued) Presence TANDBERG VIDEO COMMUNICATIONS SERVER ADMINISTRATOR GUIDE Viewing Presence Status Publishers Presentities Subscribers Status > Presence > Publishers Status > Presence > Presentities Status > Presence > Subscribers This page lists each Presentity whose presence information is being managed by (i.e. published to) the local Presence Server. All Presentities are listed here regardless of whether or not anyone is requesting their presence information. If there are no Publishers listed, this could mean that the Presence Server is not enabled on this VCS. This page lists each presentity whose presence information is being managed by (i.e. published to) the local Presence Server and whose presence information has been requested by a subscriber. Presentities are listed here whether or not there is any information currently available about that presentity. If a presentity has been subscribed to but there is no information being published about it, then it will be listed here if the local presence server is authoritative for the presentity’s domain. Presentities are listed here regardless of whether the subscriber that requested the information is registered locally or to a remote system. This page lists each endpoint that has requested information about one or more presentities whose information is managed by (i.e. published to) the local presence server. Endpoints requesting this information are listed here regardless of whether they are registered locally or to a remote server. Note: FindMe users are not listed here as they do not have their status individually published. The status of a FindMe user is based on the published status of the endpoints and/or presentities that make up the FindMe user, and is determined by the Presentity Manager. Document Count: The number of sources of information that are being published for this particular presentity. All endpoints that are registered to the VCS will have information published on their behalf by the PUA (as long as they are registered with an alias in the form of a URI). If an endpoint supports presence, it may also publish its own presence information. This means that some presentities will have more than one source of information about their presence. It is the job of the Presentity Manager to aggregate this information and determine the actual status of the presentity. Note: FindMe users will be listed here if their presence information has been requested by a subscriber. URI: The address of the presentity whose presence information has been requested. Subscriber Count: The number of endpoints who have requested information about that particular presentity. Note: FindMe users will not be listed here as a FindMe entity cannot subscribe to presence information. However, one or more of the endpoints that make up a FindMe user may be requesting presence information, in which case that endpoint will be listed here. URI: The address of the endpoint that has requested presence information. Subscription Count: The number of local presentities about whom this endpoint is requesting information. To view the list of all local presentities whose information is being requested by a particular endpoint, click on the endpoint’s URI. To view the list of all subscribers who are requesting information about a particular presentity, click on the presentity’s URI. URI: The address of the presentity whose presence information is being published. Introduction D14049.04 JULY 2008 Getting Started Overview and Status System Configuration VCS Configuration Zones and Neighbors Call Processing 175 Bandwidth Control Firewall Traversal Applications Maintenance Appendices Grey Headline (continued) TANDBERG VIDEO COMMUNICATIONS SERVER ADMINISTRATOR GUIDE Maintenance This section describes the pages that appear under the Maintenance menu of the VCS web interface. These pages allow you to perform the following tasks: • upgrade to a new release of software • downgrade to a previous version of software • install and delete Option Keys • manage security certificates • manage Administrator accounts and passwords • create a system snapshot • restart the VCS • shut down the VCS This section also gives information on: • restoring the system to its default settings • password encryption. Introduction D14049.04 JULY 2008 Getting Started Overview and Status System Configuration VCS Configuration Zones and Neighbors Call Processing 176 Bandwidth Control Firewall Traversal Applications Maintenance Appendices Grey Headline (continued) Upgrading Software TANDBERG VIDEO COMMUNICATIONS SERVER ADMINISTRATOR GUIDE Overview It is possible to install new releases of the VCS software on your existing hardware. Software upgrade can be done via the VCS in one of two ways: • using secure copy (SCP/PSCP) • using the web interface (HTTP/HTTPS). This section describes how both of these methods are used to perform upgrades. You can also upgrade the VCS software via TMS. See the TMS guide for more information. Upgrading Using SCP/PSCP Upgrading and Option Keys All existing option keys will be retained through the upgrade from one version of software to the next, including upgrades to the next major release. However, we recommend that you take note of your existing option keys before performing the upgrade. New features may also become available with each major release of VCS software, and you may need to install new option keys if you wish to take advantage of these new features. Contact your TANDBERG representative for more information on all the options available for the latest release of VCS software. Prerequisites Installing and Restarting The upgrade requires you to have: • a valid Release key. This is required for upgrades to a major release, e.g. X2.1 to X3.0; it is not required for dot releases, e.g. X3.0 to X3.1) • a software image file. Contact your TANDBERG representative for more information on how to obtain these. Backing up current configuration The VCS’s existing configuration will be restored after performing an upgrade. However, we recommend that you make a backup of the configuration before upgrading. How you do this will depend on the version of software currently running. Versions prior to X3..0 1. Use the command line interface to log on to the VCS. 2. Issue the command xConfiguration. 3. Save the resulting output to a file, using cut-and-paste or some other means provided by your terminal emulator. To restore your configuration: 1. Remove the *c from in front of each command. Upgrading software is a two-stage process. Firstly, the new software image is uploaded onto the VCS. At the same time, the current configuration of the system is recorded, so that this can be restored after the upgrade. During this initial stage the system will continue running on its existing software version, and all normal system processes will continue. The second part of the upgrade involves restarting the system. It is only during the restart that the VCS installs the new software version and restores the previous configuration. This means that you can upload the new software to your system at any time, and then wait until a convenient moment (for example, when no calls are taking place) to install the new version by rebooting the system. However, this also means that any configuration changes made between the upload and the reboot will be lost once the system restarts using the new software version. ! For security reasons we recommend that you change the admin password after upgrading to X3.0. To upgrade using SCP or PSCP (part of the PuTTY free Telnet/ SSH package) you will need to transfer two files to the VCS: • a text file containing just the 16-character Release Key (not required for dot release upgrades). Ensure there is no extraneous white space in this file. • the file containing the software image. Once these files have been transferred: 1. Ensure the VCS is turned on and available over IP. 2. Upload the release key file using SCP/PSCP to the /tmp folder on the system. The target name must be release-key, e.g. scp release-key root@10.0.0.1:/tmp/release-key or pscp release-key root@10.0.0.1:/tmp/release-key 3. Enter the admin password when prompted. 4. Upload the software image using SCP/PSCP to the /tmp folder on the system. The target name must be /tmp/tandberg-image.tar.gz, e.g. scp s42100x30.tar.gz root@10.0.0.1:/tmp/ tandberg-image.tar.gz or pscp s42100x30.tar.gz root@10.0.0.1:/tmp/ tandberg-image.tar.gz 5. Enter the admin password when prompted. 6. Wait until the software has installed completely. This should not take more than five minutes. 7. Log in again and reboot the system. After about five minutes the system will be ready to use. ! You must name the files exactly as described above. 2. Paste this information back in to the command line interface. Version X3.0 and above Backups can be made automatically. See the Backup and Restore section for full details. Introduction D14049.04 JULY 2008 Getting Started Overview and Status System Configuration For specific information about upgrading and downgrading for Peers in a cluster, refer to the Upgrades and Downgrades section of the clustering chapter. VCS Configuration Zones and Neighbors Call Processing 177 Bandwidth Control ! You must transfer the Release Key file before transferring the software image. Firewall Traversal Applications Maintenance Appendices Grey Headline (continued) Upgrading Software TANDBERG VIDEO COMMUNICATIONS SERVER ADMINISTRATOR GUIDE Upgrading via the Web Interface System Information To upgrade your software via the web interface: • Maintenance > Upgrade. You will be taken to the Upgrade page. This section tells you about the software and hardware that currently make up your system. Release key Enter the 16-character Release Key that has been provided to you. This is not required if you are upgrading to a dot release, e.g. X3.0 to X3.1. If you have cut and pasted the release key, ensure there are no leading or trailing spaces. Select the software file Enter the path of the software image file, or click Browse to locate it on the network. You must restart the system after you have uploaded the new software version and confirmed the upgrade, in order for the installation to complete. Any configuration changes you make between confirming the upgrade and restarting will be lost, so we recommend restarting your system immediately. ! Install Software Click Install Software. After a few moments you will be taken to the Upgrade Confirmation page. This page will list any warnings of which you need to take note before proceeding with the upgrade. Before you start the upgrade, ensure that the software image file for the new version has been saved in a network location that can be accessed via the web interface. Also ensure that you have the 16-character Release Key readily available (this is not required if you are upgrading to a dot release, e.g. X3.0 to X3.1). Introduction D14049.04 JULY 2008 Getting Started Overview and Status Abort Upgrade Click here to cancel the upgrade and return to the Upgrade page. Continue with Upgrade Check the details and click Continue with Upgrade to proceed. System Configuration VCS Configuration Zones and Neighbors Call Processing 178 Bandwidth Control Firewall Traversal Applications Maintenance Appendices Grey Headline (continued) Upgrading Software TANDBERG VIDEO COMMUNICATIONS SERVER ADMINISTRATOR GUIDE Upgrading via the Web Interface (cont.) Software upgrade in progress (Continued from previous page) This screen appears while the new version of software is being copied to your system. Software successfully upgraded This screen indicates that the software has been copied to your system successfully. You will need to restart the VCS in order for the new version to take effect. Restarting will cause all current calls to terminate, and all current registrations to be ended. This page indicates the number of active calls and registrations on your VCS so that you can restart it at an appropriate time. If you do not restart the system immediately, you should refresh this page before restarting to check the current status of calls and registrations. You must restart the system after you have uploaded the new software version and confirmed the upgrade, in order for the installation to complete. Any configuration changes you make between confirming the upgrade and restarting will be lost, so we recommend restarting your system immediately. ! Restart system Click here after checking the active calls and registrations to ensure that it is an appropriate time to restart the VCS. Before you start the upgrade, ensure that the software image file for the new version has been saved in a network location that can be accessed via the web interface. Also ensure that you have the 16-character Release Key readily available (this is not required if you are upgrading to a dot release, e.g. X3.0 to X3.1). Introduction D14049.04 JULY 2008 Getting Started Overview and Status The system will restart and after a few minutes you will be taken to the Login screen. The upgrade is now complete. System Configuration VCS Configuration Zones and Neighbors Call Processing 179 Bandwidth Control Firewall Traversal Applications Maintenance Appendices Grey Headline (continued) Downgrading Software TANDBERG VIDEO COMMUNICATIONS SERVER ADMINISTRATOR GUIDE Downgrade Procedure Impact on features introduced in X3.0 The procedure for downgrading software is essentially the same for upgrading software, except for the software image being used. Prerequisites VCS software version X3.0 introduces a number of new features. Should you install this version and then subsequently downgrade to a previous version of the VCS software you must note the following. Encrypted Passwords The downgrade requires you to have: • a valid Release key. • a software image file. You should already have obtained these when the previous version of the software was installed on your VCS. Backing up current configuration The VCS’s existing configuration will be restored after performing a downgrade, with the exception of those configuration items relating to new features introduced in X3.0. However, we recommend that you make a backup of the configuration before downgrading. Version X3.0 has an automated backup feature, but note that this will only allow you to restore the backed up configuration to a VCS running X3.0. See the Backup and Restore section for full details. Any passwords that existed prior to upgrading to X3.0, and any that were subsequently created, will be deleted upon downgrade from version X3.0. The password for the default admin administration account will revert to the default of TANDBERG. Additional Administration accounts If you have created one or more Administration Accounts, these will all be deleted upon downgrading from version X3.0. Clustering After downgrading from X3.0, Peers in a cluster will no longer share information about Bandwidth, Presence, and FindMe. They will revert to treating each other as Alternates. Presence Services Presence will no longer be supported after downgrading from version X3.0. Local Zone Matches Any local zone matches will be deleted after downgrading from version X3.0. Call Tags Call tags will not be added or recognized by VCS software prior to X3.0. Once you downgrade from X3.0, any call tags received from other VCSs will be deleted and not forwarded on. Logging Levels If you have event logging set to Level 4, after downgrading from X3.0 the Log Level will be set to Level 3. Introduction D14049.04 JULY 2008 Getting Started Overview and Status System Configuration VCS Configuration Zones and Neighbors Call Processing 180 Bandwidth Control Firewall Traversal Applications Maintenance Appendices Grey Headline (continued) Option Keys TANDBERG VIDEO COMMUNICATIONS SERVER ADMINISTRATOR GUIDE Overview Adding Options via the CLI Your VCS may have been shipped with one or more optional features pre-installed. Additional VCS features can be added to your existing system by the installation of Option Keys. To return the indexes of all the Option Keys that are already installed on your system: • xStatus To view the list of options installed currently, go to Maintenance > Option Keys. You will be taken to the Option Keys page. Options The options that you may see here include: To add a new Option Key to your system: • Expressway: enables the VCS to work as an Expressway™ firewall traversal server • H.323 to SIP Interworking gateway: enables H.323 calls to be translated to SIP and vice versa • User Policy: enables TANDBERG FindMe functionality • Dual Network Interfaces: enables the LAN 2 port • Traversal calls: determines the number of traversal calls allowed on the VCS at any one time. A traversal call is any call where the • xConfiguration Option [1..64] Key VCS is required to take the media as well as the signalling, i.e. firewall traversal calls, calls that are interworked between IPv4 and IPv6 calls, and calls that are interworked between SIP and H.323. Note that traversal calls that are passing through the VCS from one neighbor to another but where neither endpoint in the call is locally registered will still be counted as one non-traversal call. • Non-traversal calls: determines the number of non-traversal calls allowed on the VCS at any one time. A non-traversal call is any call where the VCS is taking the signalling but not the media. Note that non-traversal calls that are passing through the VCS from one neighbor to another but where neither endpoint in the call is locally registered will still be counted as one non-traversal call. • Registrations: the number of concurrent registrations allowed on the VCS. An endpoint can register with more than one alias and this will be considered to be a single registration. However, an endpoint that supports both SIP and H.323 and registers using both protocols will count as two registrations. H.323 systems such as gateways, MCUs and Content Servers can also register with a VCS, and these will each count as one registration. • Encryption: indicates that AES encryption is supported by this software build. Contact your TANDBERG representative for more information on how to purchase any of these additional features. Once the appropriate Option Key has been purchased, options can be installed in either of two ways: • via the CLI. • via the web interface. This section describes both methods. Some option keys require that the VCS is restarted before the option key will take effect. In such cases you will receive a warning on the web UI, which will remain in place as a reminder until the system has been restarted. However, you can continue to use and configure the VCS in the meantime. Introduction D14049.04 JULY 2008 Getting Started Overview and Status System Configuration VCS Configuration Zones and Neighbors Call Processing 181 Bandwidth Control When using the CLI to add an extra option key, you can use any unused option index. If you chose an existing option index, that option will be overwritten and the extra functionality provided by that option key will no longer exist. To see which indexes are currently in use, type xConfiguration option. ! Firewall Traversal Applications Maintenance Appendices Grey Headline (continued) Option Keys TANDBERG VIDEO COMMUNICATIONS SERVER ADMINISTRATOR GUIDE Adding Options via the Web Interface To add options via the web interface: This section lists the keys that are already installed on your system along with a description of the options they provide. • Maintenance > Option Keys. You will be taken to the Option Keys page. System Information This section tells you about the hardware and options that currently make up your system. Add option key Enter the 20-character Option Key that has been provided to you for the option you wish to add. Some option keys require that the VCS is restarted before the option key will take effect. You will receive a warning if this is the case. Introduction D14049.04 JULY 2008 Getting Started Overview and Status Add Option Click Add Option. System Configuration VCS Configuration Zones and Neighbors Call Processing 182 Bandwidth Control Firewall Traversal Applications Maintenance Appendices Grey Headline (continued) Security TANDBERG VIDEO COMMUNICATIONS SERVER ADMINISTRATOR GUIDE Enabling Security Overview For extra security, you may wish to have the VCS communicate with other systems (e.g. servers such as LDAP servers, neighbor VCSs, or clients such as SIP endpoints) using TLS encryption. Select the file containing... Allows you to upload a PEM file that identifies the list of Certificate Authorities trusted by the VCS. The VCS will only accept certificates signed by a CA on this list. If you are connecting to an LDAP database using TLS encryption, the certificate used by the LDAP database must be signed by a CA on this list. For this to work successfully in a connection between a client and server: • the server must have a certificate installed that verifies its identity. This certificate must be signed by a Certificate Authority (CA). • the client must trust the CA that signed the certificate used by the server. The VCS allows you to install appropriate files so that it can act as either a client or a server in connections using TLS. Show CA certificate Shows you the currently uploaded PEM file that identifies the list of Certificate Authorities trusted by the VCS. For an endpoint to VCS connection, the VCS will be the TLS server. For a VCS to LDAP server connection, the VCS will be a client. For a VCS to VCS connection either VCS may be the client with the other VCS being the TLS server. Upload CA certificate Click here once you have selected the file to upload it. Select the server private key file Allows you to upload a PEM file that identifies the private key used to encrypt the server certificate used by the VCS. This private key must not be password protected. To enable security using the web interface: • Maintenance > Security. You will be taken to the Security page. The files that enable secure connections over TLS are installed via the web interface. They cannot be installed using the CLI. Introduction D14049.04 JULY 2008 Getting Started Overview and Status Select the server certificate file Allows you to upload a PEM file that contains the server certificate used for HTTPS connections to the VCS from user or administrator web browsers, and by SIP endpoints or servers connecting to the VCS over TLS. Upload server certificate data Show server certificate Click here once you have selected both the private key and certificate files to upload them. Shows you the currently uploaded PEM file containing the certificate used by the VCS to identify itself to SIP and HTTPS clients when communicating over SSL/TLS. System Configuration VCS Configuration Zones and Neighbors Call Processing 183 Bandwidth Control Firewall Traversal Applications Maintenance Appendices Grey Headline (continued) Administration Accounts TANDBERG VIDEO COMMUNICATIONS SERVER ADMINISTRATOR GUIDE Overview Adding an Administration Account Default Administration Account The VCS has a default administrator account with full read/write access. This account is used to log into the VCS via the web UI or the CLI. The username for this account is admin (all lower case) and the default password is TANDBERG (all upper case). You cannot delete the default administrator account or change the admin username, but you should change the password as soon as possible. Choose a strong password, particularly if administration over IP is enabled. Additional Administration Accounts You can add up to 15 additional administration accounts with either Read Write access or Read Only access. These can be used to log in via the web UI only. Administration Access Levels See the Supported Characters section for a complete list of characters allowed in these fields. Password Enter the password that this administrator will use to log in to the VCS. The password can be up to 16 characters. All passwords on the VCS are encrypted. Confirm Password Administration accounts with Read Write access can view and change all configuration available via the web UI. These accounts have exactly the same rights as the default admin user. Account access Determines the rights for this account. The options are: Account Disabled: This account can not be used currently. Read Only: this account will be able to view but not edit the VCS configuration. Read Write: this account will have full access to view and edit the VCS configuration. The Configuration Log records all login attempts and configuration changes made via the web UI, and can be used as an audit trail when you have multiple administration accounts. Introduction D14049.04 JULY 2008 Getting Started Overview and Status You will be taken to the Administration Accounts page. Click New. You will be taken to the Create Administration Account page. The username for the administration account. This field is case-senstive. Retype the password entered above. Administration accounts with Read Only access can view the current status and configuration of the VCS, but cannot make any changes. Some pages, such as the Upgrade page, are blocked to Read Only accounts. • Maintenance > Administration Accounts. Name Read Write Read Only To add a new Administration account: System Configuration VCS Configuration Zones and Neighbors Create Account Cancel Click here to save the account and return to the Administration Accounts page. Click here to return to the Administration Accounts page without creating the account. Call Processing 184 Bandwidth Control Firewall Traversal Applications Maintenance Appendices Grey Headline (continued) Administration Accounts TANDBERG VIDEO COMMUNICATIONS SERVER ADMINISTRATOR GUIDE Editing an Administration Account Account access To change the name, password or access level for an existing administration account: Determines the rights for this account. The options are: • Maintenance > Administration Accounts. You will be taken to the Administration Accounts page. Click on the name of the account you wish to edit. You will be taken to the Edit Administration Account page. Account Disabled: This account can not be used. Read Only: This account will be able to view but not edit the VCS configuration. Name Read Write: This account will have full access to view and edit the VCS configuration. The username for the administration account. This field is casesenstive. Password Enter the password that this administrator will use to log in to the VCS. The password can be up to 16 characters. All passwords on the VCS are encrypted, so you will only see placeholder characters here. Cancel Click here to return to the Administration Accounts page without saving your changes. Confirm Password Retype the password entered above. See the Supported Characters section for a complete list of characters allowed in these fields. Delete Click here to delete this account. If you forget the password for the admin account, you can still log in as another administration user with Read Write access and change the password for the admin account. If you do not have any other such administration users set up, or you have forgotten those passwords as well, it is possible to reset the password for the admin account as long as you have physical access to the VCS. See the section Resetting the Default Administrator Password for details. Introduction D14049.04 JULY 2008 Getting Started Overview and Status System Configuration Save Click here to save the changes to this account. VCS Configuration Zones and Neighbors Call Processing 185 Bandwidth Control Firewall Traversal Applications Maintenance Appendices Grey Headline (continued) Backup and Restore TANDBERG VIDEO COMMUNICATIONS SERVER ADMINISTRATOR GUIDE Overview Creating a Backup of your VCS Configuration The Backup and Restore feature allows you to create a file containing the configuration of your VCS at a particular date and time. You can then use this file at a later date to return the VCS to that state of configuration. We recommend you create a backup in the following situations: • before performing an upgrade • before performing a system restore • in demonstration and test environments if you wish to be able To create a backup of the VCS’s current configuration: 1. Navigate to Maintenance > Backup and Restore. You will be taken to the Backup and Restore page. 2. Click Create System Backup File. Once the backup file has been created, a pop-up window will appear giving you the opportunity to save the file (the other options available will depend on your browser). The default name will be in the format _ _