Professional Documents
Culture Documents
Release 8.3
For Solution 8.3 (Intel servers only)
Issue 3
April 2016
License type(s)
Hosted Service
Concurrent User License (CU). End User may install and use the
Software on multiple Designated Processors or one or more Servers,
so long as only the licensed number of Units are accessing and using
the Software at any given time. A Unit means the unit on which
Avaya, at its sole discretion, bases the pricing of its licenses and can
be, without limitation, an agent, port or user, an e-mail or voice mail
account in the name of a person or corporate function (e.g.,
webmaster or helpdesk), or a directory entry in the administrative
database utilized by the Software that permits one user to interface
with the Software. Units may be linked to a specific, identified Server
or an Instance of the Software.
Designated System(s) License (DS). End User may install and use
each copy or an Instance of the Software only on a number of
Designated Processors up to the number indicated in the order.
Avaya may require the Designated Processor(s) to be identified in
the order by type, serial number, feature key, Instance, location or
other specific designation, or to be provided by End User to Avaya
through electronic means established by Avaya specifically for this
purpose.
Database License (DL). End User may install and use each copy or
an Instance of the Software on one Server or on multiple Servers
provided that each of the Servers on which the Software is installed
communicates with no more than one Instance of the same
database.
CPU License (CP). End User may install and use each copy or
Instance of the Software on a number of Servers up to the number
software. The Third Party Terms shall take precedence over these
Software License Terms, solely with respect to the applicable Third
Party Components to the extent that these Software License Terms
impose greater restrictions on You than the applicable Third Party
Terms.
Named User License (NU). You may: (i) install and use each copy or
Instance of the Software on a single Designated Processor or Server
per authorized Named User (defined below); or (ii) install and use
each copy or Instance of the Software on a Server so long as only
authorized Named Users access and use the Software. Named
User, means a user or device that has been expressly authorized by
Avaya to access and use the Software. At Avayas sole discretion, a
Named User may be, without limitation, designated by name,
corporate function (e.g., webmaster or helpdesk), an e-mail or voice
mail account in the name of a person or corporate function, or a
directory entry in the administrative database utilized by the Software
that permits one user to interface with the Software.
The following applies only if the H.264 (AVC) codec is distributed with
the product. THIS PRODUCT IS LICENSED UNDER THE AVC
PATENT PORTFOLIO LICENSE FOR THE PERSONAL USE OF A
CONSUMER OR OTHER USES IN WHICH IT DOES NOT RECEIVE
REMUNERATION TO (i) ENCODE VIDEO IN COMPLIANCE WITH
THE AVC STANDARD (AVC VIDEO) AND/OR (ii) DECODE AVC
VIDEO THAT WAS ENCODED BY A CONSUMER ENGAGED IN A
PERSONAL ACTIVITY AND/OR WAS OBTAINED FROM A VIDEO
PROVIDER LICENSED TO PROVIDE AVC VIDEO. NO LICENSE IS
GRANTED OR SHALL BE IMPLIED FOR ANY OTHER USE.
ADDITIONAL INFORMATION MAY BE OBTAINED FROM MPEG
LA, L.L.C. SEE HTTP://WWW.MPEGLA.COM.
Shrinkwrap License (SR). You may install and use the Software in
accordance with the terms and conditions of the applicable license
agreements, such as shrinkwrap or clickthrough license
accompanying or applicable to the Software (Shrinkwrap License).
Service Provider
Contents
Chapter 1: About PathFinder................................................................................................... 8
Main Features of PathFinder.................................................................................................... 9
Technical Specifications.........................................................................................................10
Change history......................................................................................................................12
Chapter 2: Preparing the PathFinder server Setup............................................................. 13
Planning Your Topology for PathFinder...................................................................................13
Ports to Open on PathFinder.................................................................................................. 15
Checking Site Suitability.........................................................................................................20
Unpacking the Device............................................................................................................20
Inspecting for Damage...........................................................................................................21
Chapter 3: Setting up the Device...........................................................................................22
Mounting the Device on to the Rack........................................................................................22
Preparing the Rack and Rails for Mounting the Device....................................................... 22
Mounting the Outer Rails on to the Rack........................................................................... 25
Mounting the Device on to the Outer Rails.........................................................................28
Connecting Cables to the Device............................................................................................32
Obtaining the License Key of the PathFinder server................................................................. 33
Verifying the PathFinder server Installation..............................................................................34
Chapter 4: Performing the Initial Configuration of the PathFinder server........................ 35
Configuring the IP Addresses of the PathFinder server.............................................................35
Configuring Ports on the PathFinder server............................................................................. 40
Configuring the UDP Port for RAS on the PathFinder server............................................... 40
Limiting the TCP/UDP Port Range for H.323 Direct Access Calls on the PathFinder server... 41
Limiting the TCP/UDP port range on the internal interface of PathFinder..............................41
Configuring Port Access for H.460 Endpoints.................................................................... 42
Integrating the PathFinder server with Other Scopia Solution Components.............................. 45
Integrating the PathFinder server with ECS....................................................................... 45
Integrating the PathFinder server with NAT....................................................................... 46
Enabling Internal Endpoints to Call External Endpoints.............................................................47
Configuring Access for H.323 Legacy Endpoints................................................................47
URI Dialing Functionality..................................................................................................49
Enabling URI Dialing to External Endpoints....................................................................... 50
Enabling IP Dialing to External Endpoints..........................................................................54
Configuring Priority of Audio or Video......................................................................................57
Chapter 5: Scalability, High Availability and Load Balancing with PathFinder................ 59
Workflow to Configure PathFinder server for Redundancy........................................................ 61
Configuring Radware Load Balancer for PathFinder servers..................................................... 62
Configuring the F5 BIG-IP LTM for PathFinder servers............................................................. 64
Configuring PathFinder servers for the Load Balancer..............................................................67
April 2016
Contents
April 2016
Avaya Scopia PathFinder provides a complete firewall and NAT traversal solution for H.323
deployments, enabling secure connectivity between enterprise networks and remote sites.
Avaya Scopia PathFinder is part of the Scopia Solution the components of which can be
combined to fit the existing network topology and videoconferencing requirements of the
organization.
PathFinder maintains the security and advantages of firewall and NAT over heterogeneous video
networks and allows seamless integration with existing video endpoints and infrastructure
components.
Figure 1: PathFinder Functionality on page 8 illustrates the functionality of PathFinder.
PathFinder uses the H.460 protocol. H.460 enhances the standard H.323 protocol to manage
firewall/NAT traversal, employing ITU-T standards.
Endpoints which are already H.460 compliant can communicate directly with the PathFinder server,
where the endpoint acts as an H.460 client to the PathFinder server which acts as an H.460 server.
The endpoints in a private network can communicate with the endpoints located in the public
network via the PathFinder server. Endpoints in the public network can join a conference hosted in
the private network via the PathFinder server if there is an open connection through the firewall. The
ECS provides standalone address resolution functionality in H.323 networks.
April 2016
The PathFinder server offers external endpoints a static address when joining conferences hosted in
your organization. You can dial1234@pathfinder.company.com to access from outside the firewall,
or you can dial 1234 directly if you are an H.460 client logged in to the PathFinder server.
Related links
Main Features of PathFinder on page 9
Technical Specifications on page 10
April 2016
About PathFinder
The PathFinder server supports Direct Public Access (DPA). Any public H.323 endpoint can
directly call through the PathFinder server without the need to deploy an additional Scopia
PathFinder client. Public H.323 endpoints which do not support the H.460 standard can directly
call the PathFinder server and easily and securely participate in any call or conference call
inside the organization.
URI Dialing
With support for URI dialing PathFinder enables seamless and intuitive connectivity between
enterprises, with customers and home workers. The following dialing methods are supported
for both outgoing public calls and incoming public calls:
- <Number>@<Domain> e.g. 5640@company.com
- <Number>@<IP Address> e.g. 5640@216.2.12.310
- <Name>@<Domain> e.g. Paul@company.com
- <Name>@<IP Address> e.g. Paul@216.2.12.310
Enhanced management capabilities
Avaya Scopia Management fully supports the PathFinder server providing comprehensive
maintenance tools such as user management, real-time monitoring, traps and alarms,
automated log collection, and direct web access.
Integrated web-based event log
Use the event log for quick and effective troubleshooting
Related links
About PathFinder on page 8
Technical Specifications
This section lists important information about the device you purchased. Refer to this information
when preparing system setup and afterwards to verify that the environment still complies with these
requirements.
This information lists the technical specifications of the Avaya Scopia PathFinder server.
System power requirements:
- 600W, 100-240VAC input, 50/60Hz auto-switched
Environmental requirements:
- Operating temperature: 5C to 35C (41F to 95F)
- Humidity: 8% to 90% non-condensing
- Storage and transit temperature: -40C to 60C (-40F to 140F)
April 2016
10
Technical Specifications
Physical dimensions:
- Size: 437mm (17.2) width x 43mm (1.7) height x 650mm (25.6) depth
- Weight: ~16.3kg (~36lbs)
External interfaces:
- Dual Gigabit NICs
- 1 x DB9 serial port connector
- 2 x USB 2.0 connectors
Communications:
- H.323
- IPv4
- Bit rate: up to 4Mbps per call
Call capacity:
- Up to 100 concurrent calls
- Up to 600 registered devices
Scalability:
- Radware AppDirector 208
- Radware AppDirector 1000
- F5 BIG-IP Load Traffic Manager 1600 Series
Firewall traversal:
- H.460.18, H.460.19 including support for multiplexed media
- Direct Public Access (DPA) solution for direct communication between internal endpoints in
the internal network and external ones in the public network.
- If the remote system includes an installation of the Scopia PathFinder client, you can tunnel
communication through the firewall securely by routing traffic via the Scopia PathFinder
client.
Security:
- H.235 for call privacy in all traversal modes (H.460, tunneling, DPA)
Related links
About PathFinder on page 8
April 2016
11
About PathFinder
Change history
Issue
Date
Summary of changes
April 2016
April 2016
12
Perform procedures in this section to prepare the site and device for installation.
Related links
Planning Your Topology for PathFinder on page 13
Ports to Open on PathFinder on page 15
Checking Site Suitability on page 20
Unpacking the Device on page 20
Inspecting for Damage on page 21
Management
H.323
To create a secure deployment, administrators in organizations need to separate the various types
of network traffic in the deployment.
The PathFinder server houses two NIC cards. The PathFinder server provides uncompromised
security by using the two NICs for separating and restricting IP traffic in the deployment. The
external NIC accepts access only from a very specific range of ports and media types, which
significantly limits intrusive attempts on the system. The internal NIC is dedicated to the local traffic.
We recommend configuring the second NIC to also support management traffic.
There are two recommended ways of deploying the dual-NIC PathFinder server:
Bypassing the enterprise firewall
April 2016
13
The external NIC is connected to the external network while the internal NIC resides in the
enterprise LAN. The external endpoints have access to the external NIC through the firewall
and the NAT. The internal NIC communicates with the components of the internal network and
bypasses the firewall to the enterprise LAN. Figure 2: Deploying a Dual-NIC PathFinder server
bypassing the enterprise firewall on page 14 illustrates this type of deployment.
April 2016
14
Deploying the PathFinder server requires configuring the unit itself as well as several other
components. For information on components that are part of the Scopia Solution, see the Scopia
Solution guide.
SCOPIA PathFinder Servers can also be clustered behind a load balancing system for scalability
and high availability. See Scalability, High Availability and Load Balancing with PathFinder on
page 59.
Important:
Small and medium-size enterprises that set up videoconferences within their enterprise can
choose to deploy PathFinder server with a single NIC. Contact Customer Support for
information on that type of deployment.
Related links
Preparing the PathFinder server Setup on page 13
April 2016
15
When opening ports to and from PathFinder server, use the following as a reference:
If opening ports that are both to and from the PathFinder server, see Table 2: Bidirectional
Ports to Open the PathFinder server on page 17.
If opening ports that are both to and from the Scopia PathFinder client, see Table 3:
Bidirectional Ports to Open on the Scopia PathFinder client on page 19.
Important:
In order for an H.323 endpoint (or other H.323 device) within the enterprise to successfully
connect to the PathFinder server in the DMZ via the enterprise firewall (see Figure 5: Contacting
PathFinder server from within the enterprise on page 17), you must do one of the following:
Install a Scopia PathFinder client within the enterprise
Use H.460-enabled endpoints
Open the internal firewall to the PathFinder server (1024-65535, bidirectional)
April 2016
16
Important:
The specific firewalls you need to open ports on depends on where your PathFinder server,
Scopia PathFinder client, and other Scopia Solution products are deployed.
Table 2: Bidirectional Ports to Open the PathFinder server
Port Range
Protocol
Destination
Functionality
Result of
Blocking Port
Required
22
SSH/SFTP
(TCP)
SSH client
endpoint
Enables initial
configuration, log
download and
server upgrade
Cannot initialize
the server,
download logs and
upgrade the server
Mandatory for
configuring the
PathFinder
server
53
DNS (UDP)
DNS server
Enables querying
the DNS for
domains per call
Cannot support
domain name calls
and dialing by URI
Mandatory if
using URI dialing
1719
UDP
H.460.18
endpoint/ H.
460.18 client
gatekeeper
Enables H.460.18
RAS capabilities
H.460.18
endpoints cannot
register through
PathFinder server,
firewall traversal
function based on
H.460.18 and H.
460.19 cannot
function.
Mandatory for H.
460 endpoints
Any H.323
device using Q.
931 signaling in
DPA mode
Enables IP call
signaling
No signaling
capabilities: guest
users cannot dial
Mandatory if in
DPA mode
1720
TCP
To configure,
see Configuring
the UDP Port for
RAS on the
PathFinder
server on
page 40
Table continues
April 2016
17
Port Range
Protocol
Destination
Functionality
Result of
Blocking Port
into internal
endpoints
Required
2776
TCP, UDP
H.460.18
endpoint/ H.
460.18 client
gatekeeper
Enables H.460.18
Call Signaling, H.
460.19 Multiplex
Media Channel
H.460.18
endpoints cannot
register through
PathFinder server
or set up logical
channels. Firewall
traversal function
based on H.460.18
and H.460.19
cannot function.
Mandatory for H.
460 endpoints
2777
TCP, UDP
H.460.18
endpoint/ H.
460.18 client
gatekeeper
Enables H.460.18
and H.460.19 Call
Control, H.460.19
Multiplex Media
Control Channel
H.460.18
endpoints cannot
set up Call Control
channels or logical
channels. Firewall
traversal function
based on H.460.18
and H.460.19
cannot function.
Mandatory for H.
460 endpoints
3089
TCP, UDP
Scopia
Enables signaling
PathFinder client and media traversal
3089
TCP, UDP
PathFinder
server
Enables signaling
and media
connection to
neighbor server
Cannot connect or
traverse media to
neighbor server
4000-5000
TCP, UDP
Any H.323
device using Q.
931 signaling in
DPA mode
Enables Direct
Public Access
(DPA) for H.323 call
signaling, control
and media traversal
Cannot setup/
Mandatory if in
connect DPA mode DPA mode
calls
To limit range,
see Limiting the
Mandatory if
using a neighbor
server
Table continues
April 2016
18
Port Range
Protocol
Destination
Functionality
Result of
Blocking Port
Required
TCP/UDP Port
Range for H.323
Direct Access
Calls on the
PathFinder
server on
page 41
8080
HTTP (TCP)
Web client/
browser
Provides access to
the web user
interface
Cannot configure
PathFinder server
Mandatory for
configuring the
PathFinder
application
8089
XML (TCP)
Enables managing
PathFinder server
via XML API
The External
Management
System cannot get
PathFinder server
status or receive
traps from
PathFinder server
Optional
Protocol
Destination
Functionality
Result of
Blocking Port
Required
3478
STUN (UDP)
STUN server
Enables an endpoint
located in the
remote network to
send a STUN
Binding Request
when connecting to
another endpoint in
the same network
Scopia
PathFinder client
cannot
determine its
public IP
address. Smart
Direct Media
Connect cannot
function.
Recommended
Important:
If there is a firewall between the H.323 client and the Scopia PathFinder client, all high ports
must be opened in both directions (1024-65535). We therefore recommend no firewall between
the endpoint and the Scopia PathFinder client.
Related links
Preparing the PathFinder server Setup on page 13
April 2016
19
Procedure
1. Inspect the shipping box to verify that it is not seriously damaged during shipping.
2. Place the shipping box on a horizontal surface paying attention to the This Side Up symbol
on the shipping box (Figure 6: This Side Up symbol on page 20).
Caution:
The accessories kit is situated on top of the device inside the shipping box and can be
damaged if the box is placed upside down. Pay attention to the This Side Up symbol on
the shipping box to handle the box correctly at all times.
Caution:
To prevent injury and equipment damage, follow the lifting guidelines described in the
Safety Guide when lifting or moving the shipping box.
3. Cut the plastic straps.
April 2016
20
Caution:
The plastic straps are tightly stretched and can hit you when you cut them. To avoid this,
make sure you do not face the side of the box secured by the straps before you cut the
straps.
4. Cut the strapping tape.
5. Open the shipping box.
6. Take the accessories kit out of the shipping box.
7. Take the device out of the shipping box.
8. Carefully open the additional boxes, remove the packing material, and remove the drives
and other contents.
Important:
We recommend keeping the packaging materials in case you need to repack the device.
9. Remove the cellophane wrapping from the server case.
10. After opening the shipping box, check the shipment is complete. Compare the contents of
the shipment with the packing list included in the box.
Related links
Preparing the PathFinder server Setup on page 13
April 2016
21
Procedure
1. Verify that you have a 19 rack that meets the EIA-310 standards. This standard includes the
exact specifications, including the shape of the holes, their size, the depth of the rack and
other features.
The rack should be sturdy enough to support the device when you slide it in and out.
April 2016
22
We recommend choosing a rack without doors. If installing in an enclosed rack, ensure that
the rack has adequate ventilation.
2. Ensure that the environment is suitable and set up the rack, considering factors such as the
ambient temperature of the room. Read the safety instructions that came with your rack for
details.
Important:
Maintain a minimum clearance of 30 inches (76.2 cm) in the rear of the rack to allow
adequate airflow.
Ensure the rack is stable. The leveling jacks at the bottom of the rack should be fully
extended.
3. Decide where on the rack to place the device, using the guidelines listed below. Mark this
location on the rack, ensuring that the height is the same on each rack post.
Proper placement prevents the device from overheating and ensures that the rack is stable.
Find a space on the rack which is 3 empty square holes in height (1U), as shown in Figure
7: One rack unit of space on the rack on page 23.
Note that the holes on the rack posts are not spaced equally. They form a repeating
pattern of two holes close together, then one hole separate, then two holes close together
and so on.
The top of the device should start on the lower of the two holes which are close together.
If there are few devices mounted in the rack, find the lowest possible location to mount the
device, to ensure the rack remains stable.
April 2016
23
4. Make sure you have the following items, which were shipped with the device and are used to
mount the rails to the rack (Figure 8: Preparing the parts required to mount the rails on
page 24):
Two long outer rails and two short outer rails, to be attached to the rack itself (as
described in Mounting the Outer Rails on to the Rack on page 25)
Two inner rail extensions, used to attach the device to the outer rails on the rack (as
described in Mounting the Device on to the Outer Rails on page 28)
Eight flat-head long screws (Phillips cross recessed flat-head machine screws M5x12mm).
You need only four to mount the device.
Eight brackets (finishing washers M5). You need only four to mount the device.
Two flat-head short screws (Phillips cross recessed flat-head machine screws 6-32
UNCx3/16")
5. Continue with Mounting the Outer Rails on to the Rack on page 25.
Related links
Mounting the Device on to the Rack on page 22
April 2016
24
April 2016
25
Procedure
1. Connect the long and short outer rails to each other by sliding the knob on the short rail
through the rounded end of the slot on the long rail (Figure 10: Connecting the two outer
rails on page 26).
2. Attach the rails to the rack posts, at the location you marked in Preparing the Rack and Rails
for Mounting the Device on page 22:
a. Starting at the rear of the rack, attach the short rail by aligning the two square knobs
with the rack holes (Figure 11: Attaching the short rail to the rear of the rack on
page 26).
The rails are spring-loaded and lock into place on the rack with a safety latch.
Figure 11: Attaching the short rail to the rear of the rack
b. Slide the long rail towards the front of the rack, adjusting the length according to the
depth of the rack. Attach it to the front of the rack as you did to the rear of the rack.
April 2016
26
Important:
To unfasten the rail pins from the rack, push the safety latch to release:
c. Secure the rail by inserting a long screw and a washer through the rear rack post only
(Figure 13: Securing the rail to the rack on page 27). Insert the washer between the
long screw and the rail, as shown below.
The rail is secured to the front of the rack only after the device is mounted, as described
in Mounting the Device on to the Outer Rails on page 28.
April 2016
27
The outer rail is now attached to the rack, as shown in Figure 14: Side view of rack with
the outer rail attached on page 28.
Figure 14: Side view of rack with the outer rail attached
3. Repeat all steps to mount the outer rails to the other side of the rack.
4. Continue with Mounting the Device on to the Outer Rails on page 28.
Related links
Mounting the Device on to the Rack on page 22
April 2016
28
Make sure you have the following items, which were shipped with the device and are used to
mount the rails to the rack (Figure 15: Preparing the parts required to mount the device onto
the rails on page 29):
- Two inner rail extensions
- Two flat-head short screws (Phillips cross recessed flat-head machine screws 6-32
UNCx3/16")
- Two flat-head long screws (Phillips cross recessed flat-head machine screws M5x12mm)
- Two brackets (finishing washers M5)
Figure 15: Preparing the parts required to mount the device onto the rails
Procedure
1. Attach the inner rail extension to the rear of the device:
a. Slide the rear inner rail extension towards the front of the device (see Figure 16:
Attaching inner rail extensions to the device on page 29).
The hooks on the side of the device fasten the inner rail in place.
b. Secure the rear inner rail extension through one of the two holes on the rail extension,
using one flat-headed short screw (Figure 17: Securing rail extensions to the device on
page 30).
April 2016
29
April 2016
30
Important:
To pull out the device, you need to slide the long part of the latch on each side
simultaneously to release the safety lock. Slide the right latch up and slide the left latch
down (Figure 19: Removing the device from the rails on page 31).
3. Secure the device to each front post using a long screw. Insert a washer between the screw
and the device panel.
This secures the front panel to the front of the rack and the outer rail to the rack.
The outer rail was already secured in Mounting the Outer Rails on to the Rack on page 25.
April 2016
31
Figure 20: Securing the front panel of the device to the front post
Related links
Mounting the Device on to the Rack on page 22
Procedure
1. On the rear panel, connect the power cable to the AC power connector (Figure 21: Rear
panel of the device on page 33).
April 2016
32
April 2016
33
Related links
Setting up the Device on page 22
Procedure
1. On the front panel, verify that the power LED is lit green.
April 2016
34
After connecting the cables and switching on the Avaya Scopia PathFinder server, perform the
initial configuration as described in these sections:
Related links
Configuring the IP Addresses of the PathFinder server on page 35
Configuring Ports on the PathFinder server on page 40
Integrating the PathFinder server with Other Scopia Solution Components on page 45
Enabling Internal Endpoints to Call External Endpoints on page 47
Configuring Priority of Audio or Video on page 57
April 2016
35
Procedure
1. Login to the administration shell menu of your PathFinder server.
a. Start PuTTY on your PC
b. Select the Serial page in the PuTTY Configuration dialog box.
c. Verify that the connection fields are setup as follows:
April 2016
36
Field Name
Value
COM1
Speed (baud)
9600
Data bits
Stop bits
Parity
None
Flow Control
None
April 2016
37
Description
Internal access
Management access
The system automatically disables the external role of eth1. The window displays the
NIC configuration as illustrated in Figure 25: The network interface configuration
screen on page 38.
The configuration automatically sets the IP addresses of the NICs in the web interface
of the PathFinder server. To view this page, login to the web interface and navigate to
April 2016
38
Settings > General (Figure 26: The page displaying the NIC IP addresses in the
Settings tab on page 39).
Figure 26: The page displaying the NIC IP addresses in the Settings tab
April 2016
39
Procedure
1. Access the PathFinder server Administrator web interface.
2. Log in to the PathFinder web user interface.
3. Select Settings > General.
4. Locate the Gatekeeper area (see Figure 27: Gatekeeper Settings on page 40).
April 2016
40
Limiting the TCP/UDP Port Range for H.323 Direct Access Calls
on the PathFinder server
About this task
The Avaya Scopia PathFinder server has designated ports 4000-5000 for H.323 Direct Public
Access (DPA), which allows non-H.460 public endpoints to call internal endpoints without being
registered to the PathFinder server. To provide additional security for your firewall, you can limit this
range.
To calculate approximately how many ports the PathFinder server uses, multiply the number of
simultaneous DPA calls by 10. The multiplication factor is lower for audio-only calls and higher for
calls with dual video. We recommend using 10 as an approximation.
Procedure
1. Access the PathFinder server Administrator web interface.
2. Select Settings > General.
3. Enable H.323 Direct Access by selecting the checkbox next to H.323 Direct Access (Figure
28: H.323 Direct Access Settings on page 41).
April 2016
41
To calculate the number of ports PathFinder uses, add the two figures that you get by the following
methods:
Multiply the number of simultaneous H.323 calls by 10.
The multiplication factor is lower for audio-only calls and higher for calls with dual video. Use
10 as an approximate multiplication factor.
Count one port for each endpoint registration.
For example, if you have 100 endpoints, count 100 ports.
You must restart PathFinder after you modify the port range.
Procedure
1. Access the PathFinder server Administrator web interface.
2. Click Settings > General.
3. In the Internal interface section, set the port range to 12000 up to 15000.
The maximum port range is from 9000 to 65535. The port range setting requires a minimum
range of 300 ports.
4. Click Save.
Next steps
Restart PathFinder
Related links
Configuring Ports on the PathFinder server on page 40
April 2016
42
If an external H.460 endpoint in the public internet can dial the E.164 number of an endpoint within
the enterprise, the ports used are:
1. The H.460 endpoint requests registration (RRQ) to the PathFinder server via port 1719.
2. The PathFinder server confirms RRQ.
3. The endpoint sends a call request in the form of two connections to the PathFinder server:
Port 2776 for call setup with H.225. H.225 is part of the set of H.323 protocols. It defines
the messages and procedures used by gatekeepers to set up calls.
Port 2777 for signaling with H.245
Signaling, also known as call control, sets up, manages and ends a connection or call.
These messages include the authorization to make the call, checking bandwidth, resolving
endpoint addresses, and routing the call through different servers. Signaling is transmitted
via the H.225.0/Q.931 and H.225.0/RAS protocols in H.323 calls, or by the SIP headers in
SIP calls. Signaling occurs before the control aspect of call setup.
The PathFinder server in turn routes these requests to the ECS.
For more information on the firewall's port configuration see Ports to Open on PathFinder on
page 15. The PathFinder server ports are configured by default to support these calls. Follow this
procedure to change the default configuration.
Procedure
1. Access the PathFinder server Administrator web interface.
2. Select Settings > H.460. The window displays the default port values for H.460 endpoint
port access.
April 2016
43
Description
Ras Port
April 2016
RTCP Port
RTP Port
Multiplex
44
Related links
Configuring Ports on the PathFinder server on page 40
Procedure
1. Access the PathFinder server Administrator web interface.
2. Select the Settings tab.
3. In the General tab navigate to the Gatekeeper Address field. See Figure 31: Integrating the
PathFinder server with ECS on page 46.
April 2016
45
Procedure
1. Access the PathFinder server Administrator web interface.
2. Select Settings > General > NAT Support.
Description
NAT Support
Address
April 2016
Enter the public IP address of the NAT device in the Address field.
Table continues
46
Field
Description
Important:
In the firewall/NAT device, verify that the NAT address is
mapped to the private IP address of the PathFinder server's
external NIC.
Port
Related links
Integrating the PathFinder server with Other Scopia Solution Components on page 45
April 2016
47
To set up this connection, you need to configure the PathFinder server to accept H.323 calls and
forward them. You also need to configure the Avaya Scopia ECS Gatekeeper to one or more
PathFinder servers to facilitate the routing of these calls. For more information on configuring the
ECS, see the Reference Guide for Avaya Scopia ECS Gatekeeper.
Procedure
1. Access the PathFinder server Administrator web interface.
2. Select Settings > General.
3. Configure the following settings for Direct Public Access:
Description
Port Range
Define the range of ports used for direct H.323 calls in the
field.
Important:
If the external NIC of the PathFinder server is located
behind a firewall, this range of port must also be opened
in the firewall, as well as port 1720 for H.323 signaling.
Default Extension
4. Select Save.
Related links
Enabling Internal Endpoints to Call External Endpoints on page 47
April 2016
48
To access an endpoint in the other company, the URIs domain name is the second companys
firewall traversal system, like the name of their PathFinder server, or the organization's domain
April 2016
49
name. For example, in Figure 34: URI dialing between two enterprises using PathFinder on
page 49, dialing to the partner company requires knowing the following:
The name or number of the endpoint, in this example xt1
The domain name of the PathFinder server of that company, public.partner.com in this
example, or the organization's domain name, partner.com.
Important:
As with regular web domain names, the name of the PathFinder server resolves to an IP
address via standard DNS lookup if it has been allocated a global DNS name. If the servers IP
address does not have a DNS name, the URI dial should directly specify the servers IP address
instead. For example, the URI xt1@123.456.789.1 specifies the alias followed by the servers IP
address.
To set up this connection, you need to configure the PathFinder server to accept H.323 calls and
forward them. You also need to configure the ECS to define one or more PathFinder servers as
ECSs neighbor, to facilitate the routing of these calls.
Related links
Enabling Internal Endpoints to Call External Endpoints on page 47
April 2016
50
Procedure
1. Access the PathFinder server Administrator web interface.
2. Navigate to Settings > General > Dialing URI Support.
April 2016
51
3. Configure the PathFinder server to handle the domain name or IP address included in the
URI dialing of inbound or outbound calls, as described below.
Table 6: Configuring URI support
Field
Description
Select to strip the domain name/IP address from the dialed string
before transferring the relevant message to its destination.
Important:
We recommend enabling this setting to optimize the handling
of call transfer.
Do not select this option if your organization has a policy of
transferring a message to its destination by using the complete
endpoint's dial string (for example, 1234@5.6.7.8) instead of
its alias (1234 in this example).
April 2016
52
Figure 37: Configuring a Neighboring PathFinder server for outgoing URI calls
6. Configure the PathFinder server as a neighboring server to the ECS to facilitate outgoing
URI dialing, as described below.
This is required since the external endpoint is not registered to the gatekeeper, and therefore
it cannot resolve the address of the external endpoint. When an internal endpoint calls an
external endpoint using its URI address, the gatekeeper sends the request to all devices
configured as its neighbor, which may include other gatekeepers and PathFinder servers, to
check which one can resolve the address.
Table 7: Configuring a Neighboring PathFinder server for outgoing URI calls
Field
Description
Add
Prefix
Leave this field empty since URI dialing does not route calls
to zones using dial prefixes. URI dialing routes calls using
the domain name in the URI string, which is resolved to any
zone worldwide.
Description
IP Address
Port
7. Select Upload.
8. If your deployment includes multiple PathFinder servers, including several servers acting as
one server behind a load balancer, repeat the steps above for each PathFinder server.
April 2016
53
Related links
Enabling Internal Endpoints to Call External Endpoints on page 47
You can also configure the gatekeeper to forward URI calls to the PathFinder server, as described
in Enabling Internal Endpoints to Call External Endpoints on page 47. For deployments with multiple
PathFinder servers, including several servers acting as one server behind a load balancer, perform
this procedure for each server. For more information about configuring multiple PathFinder servers
behind a load balancer, see Scalability, High Availability and Load Balancing with PathFinder on
page 59.
April 2016
54
If you are configuring multiple PathFinder servers, with or without a load balancer, do this for
each PathFinder server.
1. From the PathFinder server web interface, select Client Status > Client Name that has
the format paProxy@<IP address>. The PathFinder server automatically created this
proxy address when you enabled Direct Public Access.
2. Note the address (IP address and port) under Q.931 Address > Registration
Information(see Figure 39: Registration information required for configuring the ECS on
page 55).
You need this registration information to configure IP dialing.
Procedure
1. Access the ECS web interface.
If you are using Scopia Management's built-in gatekeeper, log in to the administrator portal
of Scopia Management and access the link from the gatekeeper's page (for more
information on accessing Scopia Management, see Administrator Guide for Avaya Scopia
Management).
2. Select Settings > Calls.
April 2016
55
Description
Route IP calls to
Add
IP Address
Port
4. Select OK.
5. Select Upload.
6. If your deployment includes multiple PathFinder servers, including several servers acting as
one server behind a load balancer:
a. Repeat the steps above for each PathFinder server.
b. Verify you have the correct redundancy policy set up between the gatekeeper and each
PathFinder server.
The ECS has its own load balancing method to work with multiple PathFinder servers
for outgoing calls from internal endpoints to external endpoints (Figure 41: Forwarding
traffic to the PathFinder server on page 57). By default, it is configured to the
Scalability policy, enabling it to send requests to each PathFinder server in the cluster,
in a round robin manner.
Alternatively, you can set the ECS to work with the Priority policy, where the ECS can
route the call to the first PathFinder server in the list and continue to the next one only if
a failure occurred. Contact Customer Support to configure this setting.
Important:
This is separate from the redundancy policy you configured for the load balancer,
which instructs it how to direct incoming traffic from the external network to the
internal network (Figure 41: Forwarding traffic to the PathFinder server on
page 57). For more information about setting up the load balancer, see
Scalability, High Availability and Load Balancing with PathFinder on page 59.
April 2016
56
Related links
Enabling Internal Endpoints to Call External Endpoints on page 47
April 2016
57
video and audio codecs, and other parameters like resolution, bitrate and frame rate. Control
is communicated via H.245 in H.323 endpoints. Control occurs within the framework of an
established call, after signaling.
Follow this procedure to determine the relative priorities for audio, video, and control transmitted via
the PathFinder server.
Procedure
1. Access the PathFinder server Administrator web interface.
2. Select the Settings > General > QoS tab.
3. In the General tab navigate to QoS.
Description
None
Select this setting when the network has sufficient bandwidth for each
stream (audio, video, and media control) and does not require any
prioritization of the different streams.
Default
Select this setting to use the following default priority values for each
stream:
48 for the media Control stream. This highest priority ensures that calls
are set up properly even if it means that other calls ongoing may reduce
their video or audio during a call setup. All TCP connections use the QoS
value set in this field.
46 for the Audio stream. This priority ensures that audio is always given
precedence over video. This audio applies to multiple video channels
(e.g., sound stream for endpoint microphones and presentations).
34 for the Video stream. The lowest default priority is given to video
image quality. It applies to endpoint camera images and also covers data
streams like far end camera control.
Customized
Enter your own relative priorities as a number from 0-255 to represent the
relative priority of Audio, Video, and Control.
Related links
Performing the Initial Configuration of the PathFinder server on page 35
Enabling Internal Endpoints to Call External Endpoints on page 47
April 2016
58
Avaya Scopia PathFinder servers provide firewall traversal and NAT solution services to both H.
460-compliant and non-H.460 endpoints. You can provide both scalability and high availability for
your PathFinder servers by deploying multiple PathFinder servers behind a load balancer. High
availability is a state where you ensure better service and less downtime by deploying additional
servers. Scalability describes the ability to increase the capacity of a network device by adding
another identical device (one or more) to your existing deployment.
A load balanced group of PathFinder servers, also known as a cluster, act as a single virtual server.
A load balancer can distribute traffic among the servers in the cluster, so that if one PathFinder
server has too many incoming calls at a given time, for example, another PathFinder server can
take up the load of managing incoming calls in a round-robin manner. Other load balancing methods
can be configured for the load balancer, according to your deployment's requirements. Likewise, if
one server fails, the remaining servers can continue working, providing high availability of the
deployment.
Figure 43: Load balancing PathFinder server in the enterprises DMZ on page 60 illustrates a
typical deployment of multiple PathFinder servers with a load balancer.
April 2016
59
Load balancing multiple PathFinder servers is also often required for service provider deployments,
where the large capacity can serve multiple enterprises within one deployment. This topology is
similar to the one illustrated in Figure 43: Load balancing PathFinder server in the enterprises
DMZ on page 60.
In each case, the deployment requires the following components:
PathFinder servers
The servers are configured as a cluster that has a virtual IP address for routing calls inbound to
the local network. We recommend connecting both network interface cards (NIC) of each
PathFinder server:
- The first NIC connects to a DMZ switch along with the load balancer
- The second NIC connects to the companys internal network
For more information about a dual NIC configuration, see Configuring the IP Addresses of the
PathFinder server on page 35. PathFinder server s with one NIC can also be part of the
cluster.
A load balancer
A load balancer groups together a set (or cluster) of servers to give them a single IP address,
known as a virtual IP address. It distributes client service requests amongst a group of servers.
It distributes loads according to different criteria such as bandwidth, CPU usage, or cyclic
(round robin). Load balancers are also known as application delivery controllers (ADC).
April 2016
60
The following load balancers are certified for the current version of PathFinder server:
- Radware AppDirector
- F5 BIG-IP Load Traffic Manager (LTM)
PathFinder server redundancy can also be managed using other third-party load balancers.
A gatekeeper
A gatekeeper routes audio and video H.323 calls by resolving dial strings (H.323 alias or URI)
into the IP address of an endpoint, and handles the initial connection of calls. Gatekeepers also
implement the dial plan of an organization by routing H.323 calls depending on their dial
prefixes. Scopia Management includes a built-in Avaya Scopia Gatekeeper, while ECS is a
standalone gatekeeper.
H.323 endpoints
Your deployment can include H.323 endpoints that are H.460 compliant or H.323 (legacy)
endpoints which do not support H.460. Both types of endpoints can reside either in the
enterprise (secured network) or in the Internet. Endpoints that want to register to the
PathFinder server do so via the clusters virtual IP address or register to the Scopia
PathFinder client if they are not H.460-compliant. The Scopia PathFinder client registers to
the PathFinder server via the clusters virtual IP address.
For information on the components that are part of the Scopia Solution, see the Scopia Solution
Guide.
Related links
Workflow to Configure PathFinder server for Redundancy on page 61
Configuring Radware Load Balancer for PathFinder servers on page 62
Configuring the F5 BIG-IP LTM for PathFinder servers on page 64
Configuring PathFinder servers for the Load Balancer on page 67
Procedure
1. Install and configure one of the PathFinder servers, as described in:
Preparing the PathFinder server Setup on page 13
April 2016
61
April 2016
62
Procedure
1. Log in to the AppDirector user interface.
2. Create a server farm for PathFinder servers in the load balancer, as described in the
AppDirector documentation. A farm is the term used by AppDirector to refer to a cluster of
servers.
The settings described below are specific to PathFinder server and may differ from a typical
AppDirector deployment:
Table 9: Virtual farm settings specific to PathFinder server
Field
Description
Farm Name
Aging Time
Dispatch Method
Select the method the load balancer uses for distributing traffic
between servers in this farm. We recommend one of the
following:
Round Robin: Directs each endpoint service request to
another PathFinder server, in turn.
Least Amount of Traffic: Directs endpoint service requests to
the PathFinder server with the least amount of traffic.
Sessions Mode
3. Configure a virtual IP address for the farm, as described in the AppDirector documentation.
This is the address the load balancer uses to forward endpoint service requests to the
PathFinder servers grouped in the farm.
April 2016
63
4. Configure the Layer 4 rules (or policies) the load balancer uses to manage traffic, as
described in the AppDirector documentation.
AppDirector uses the Layer 4 protocol and the requests destination port to select the
required farm. TCP (Transmission Control protocol) and UDP (User Datagram Protocol) are
part of the Layer 4 protocol. AppDirector manages the virtual IP addresses using Layer 4
policies.
The settings described below are specific to PathFinder server and may differ from a typical
AppDirector deployment:
Use the same farm name as above
Set L4 Protocol to Any. This ensures the farm supports any IP protocol, including TCP
and UDP.
5. Add each PathFinder server to the farm as described in the AppDirector documentation.
The settings described below are specific to PathFinder server and may differ from a typical
AppDirector deployment:
Enter the server's details, such as the IP address
Verify that Client NAT is set to Disabled.
6. To ensure communication is possible with the PathFinders, add the farm's virtual IP address
and service port to the organization's firewalls.
7. Continue with Configuring PathFinder servers for the Load Balancer on page 67 to
configure the PathFinder servers to function with a load balancer.
Related links
Scalability, High Availability and Load Balancing with PathFinder on page 59
April 2016
64
when deploying the load balancer. For more information on standard F5 BIG-IP LTM
deployments, see the F5 documentation.
Verify that you have all the IP addresses of the PathFinder servers and the F5 (including its default
gateway, also known as its router). This is required to configure the load balancer.
Procedure
1. Access the F5 web interface.
2. Set up a virtual LAN (VLAN) for all PathFinder servers, as described in the F5
documentation.
A VLAN is similar to a physical LAN, but is used to group devices based on specific
attributes rather than a common location. Any data packets passing in and out of the VLAN
must be done via the F5's router (also known as the default gateway).
3. Add a Self IP for the VLAN you created, as described in the F5 documentation.
This IP address represents the range of IP addresses of the servers in the cluster. The load
balancer uses this IP address to determine which VLAN to forward the request.
4. Add a Node for each PathFinder server and the default gateway, as described in the F5
documentation.
The VLAN consists of nodes, where each node is a physical server.
5. Add a pool that contains all PathFinder servers in your deployment, as described in the F5
documentation. A pool is the term used by F5 to refer to a cluster of servers.
Configure the PathFinder server pool settings, as described in the F5 documentation.
The settings described below are specific to PathFinder server and may differ from a typical
F5 deployment:
Table 10: Pool settings specific to PathFinder server
Field
Description
Configuration
Name
Health Monitors
From the list, select the method the load balancer uses for
distributing traffic between servers in this pool. The default method
is Round Robin, which directs each endpoint service request to
another PathFinder server, in turn.
Table continues
April 2016
65
Field
Description
Node List
Service Port
Enter 0 to indicate that this field should not be used. The PathFinder
server's service port is configured on the firewall.
New Members
6. Add a pool that contains the default gateway, as described in the F5 documentation.
The pool may include more than one gateway, depending on your network setup.
The settings described below are specific to PathFinder server and may differ from a typical
F5 deployment:
Table 11: Gateway pool settings specific to PathFinder server
Field
Description
Configuration
Name
Health Monitors
New Address
Select this option and enter the IP address of the F5's default
gateway (router).
Service Port
Enter 0 to indicate that this field should not be used. The PathFinder
server's service port is configured on the firewall.
New Members
7. (Optional) After configuring the pools, we recommend verifying that the servers are running
by checking the list of members in each pool, as described in the F5 documentation.
8. Set up the default gateway as the router for the PathFinder server pool, as described in the
F5 documentation.
9. Add a virtual server, which includes all PathFinder servers in your deployment, as described
in the F5 documentation.
10. Configure the virtual server, as described in the F5 documentation.
The settings described below are specific to PathFinder server and may differ from a typical
F5 deployment:
April 2016
66
Description
Default Pool
11. Configure static network address translation (SNAT) to translate the source IP from an actual
PathFinder server to a virtual public IP, as described in the F5 documentation. This is used
to convert a request to the virtual cluster IP into the real IP of one of the servers in the
cluster.
The settings described below are specific to PathFinder server and may differ from a typical
F5 deployment:
Table 13: SNAT settings specific to PathFinder server
Field
Description
Name
Translation
Select IP address from the list and enter the IP address of the
PathFinder virtual server you just created.
Origin
Type
Select Host.
Address
12. To ensure communication is possible with the PathFinders, add the IP address and service
port of the PathFinder virtual server to the organization's firewalls.
13. Continue with Configuring PathFinder servers for the Load Balancer on page 67 to
configure the PathFinder servers to function with a load balancer.
Related links
Scalability, High Availability and Load Balancing with PathFinder on page 59
April 2016
67
The following load balancers are certified for the current version of PathFinder server:
Radware AppDirector
F5 BIG-IP Load Traffic Manager (LTM)
PathFinder server redundancy can also be managed using other third-party load balancers.
For more information, see:
Scalability, High Availability and Load Balancing with PathFinder on page 59 for an overview of
scalability and load balancing with PathFinder servers.
Important:
The load balancer maps the traffic based on the source IP address. All endpoint requests
that originate from the same IP address are always mapped to the same PathFinder
server.
The load balancer's documentation.
Procedure
1. Access the PathFinder server Administrator web interface.
2. Select Settings > General > NAT Support.
3. Configure NAT support for each PathFinder server in the cluster, as follows:
Table 14: Configuring NAT support
Field
Description
NAT Support
Address
April 2016
68
Field
Description
VIP of the cluster and deploy your load balancer in the
public network.
Important:
In the firewall/NAT device, verify that the NAT address
is mapped to the private VIP address of the PathFinder
server cluster's external NIC.
Port
4. Select Save.
5. For each PathFinder server in the cluster, perform the necessary configurations described in
Performing the Initial Configuration of the PathFinder server on page 35.
Important:
All PathFinder servers in the cluster must be configured identically, apart from their
native IP addresses. For more information about configuring the IP address, see
Configuring the IP Addresses of the PathFinder server on page 35.
Related links
Scalability, High Availability and Load Balancing with PathFinder on page 59
April 2016
69
This section details to the ongoing administrator tasks required to maintain your video network:
Related links
Updating, Backing Up and Restoring the PathFinder server on page 70
Filtering and Monitoring Events in PathFinder server on page 76
Managing Logs on page 80
Capturing Network Traces for Troubleshooting on page 83
Viewing PathFinder Hardware and License Information on page 85
April 2016
70
Important:
You can restore the operating system of the PathFinder server to any version of the server as
long as you use the Intel server's backup packages.
For details about updating, backing up, restoring the PathFinder server application and its operating
system, see the following topics:
Related links
Performing Maintenance Procedures on page 70
Upgrading the PathFinder server on page 71
Backing Up the Configuration Settings on page 73
Restoring the Configuration Settings on page 75
April 2016
71
Procedure
1. Run WinSCP to transfer the file.
2. Configure the connection to your PathFinder server in the WinSCP Login dialog box, as
follows:
Table 15: Configuring WinSCP settings
Field
Description
Host name
User name
Password
File protocol
3. Select Login.
4. Drag the new .pkg update file to the /updates folder in the PathFinder server and select
Copy when prompted (Figure 45: Screen showing the application upgrade file in the
PathFinder server on page 72).
Figure 45: Screen showing the application upgrade file in the PathFinder server
Description
SSH
April 2016
72
c. Enter the menu item corresponding to the installation file you just transferred to the
PathFinder server (Figure 47: Screen showing the installation of the PathFinder server
application update on page 73).
Figure 47: Screen showing the installation of the PathFinder server application update
d. If this is a major update of the PathFinder server application, enter the license key
(Figure 47: Screen showing the installation of the PathFinder server application
update on page 73). Otherwise, press Enter to use the current license key.
The PathFinder server reboots automatically after each installation procedure.
Related links
Updating, Backing Up and Restoring the PathFinder server on page 70
April 2016
73
Procedure
1. Run PuTTY to connect to the PathFinder server.
2. Configure the connection to the PathFinder server in the Session tab of the PuTTY
Configuration dialog box, as follows:
Table 17: Configuring the PuTTY session
Field
Description
SSH
Depending on the backup you selected, the configuration is saved to a file that has the
format <sysconfig_yyyy-mm-dd-hh-mm-ss.tgz> or <pfsconfig_yyyy-mm-dd-hh-mmss.tgz> (Figure 49: Screen showing the backing up the PathFinder server application
configuration on page 74). The file is located in the server folder /updates/bckp.
Figure 49: Screen showing the backing up the PathFinder server application
configuration
April 2016
74
Procedure
1. Run PuTTY to connect to the PathFinder server.
2. Configure the connection to the PathFinder server in the Session tab of the PuTTY
Configuration dialog box, as follows:
Table 18: Configuring the PuTTY session
Field
Description
SSH
April 2016
75
c. Enter the item number corresponding to the configuration restore (Figure 51: Screen
showing how to restore the PathFinder server application configuration on page 76).
Figure 51: Screen showing how to restore the PathFinder server application configuration
d. Press Enter. After the configuration is restored, the display returns to the Backup/
Restore menu.
Related links
Updating, Backing Up and Restoring the PathFinder server on page 70
April 2016
76
Procedure
1. Access the PathFinder server Administrator web interface.
2. To pass events and messages to a management server, enable the Third Party
Management API field in the General tab.
The management server uses the dedicated username whose role is Collaborator,
displayed in the Users tab. The default username is Collab with password balloC.
3. To filter traps sent to the management server, select Settings > Alerts.
4. Select Enable next to the event for which you want to send a trap, or Select All to enable
the complete list of events. Table 19: Filtering the display of certain types of events on
page 78 lists some of the Event Types you can choose to configure.
To change the default severity level of the monitored event, select the new setting
(Information, Warning, Critical) from the dropdown list.
April 2016
77
Description
Power Up
Power Down
Endpoint Registered
Endpoint
Unregistered
GK Changed
High Level CPU Meter The PathFinder server has reached the maximum CPU usage, set in the
Threshold field in the same row (Figure 54: Event types on page 78).
Client Connected
Client Disconnected
April 2016
78
Field
Description
Port Utilization
Registration
Utilization
User logged in
A user successfully logged out from the PathFinder server web interface.
Authentication
Failure
License Update
Link Down
5. Where available, set the Threshold value from the dropdown list. For example, when the
server's CPU load exceeds the 85% you configured in High Level CPU Meter, the alert
remains active until the usage decreases below the configured value.
The server sends clearing messages to Scopia Management for the High Level CPU
Meter, Port Utilization, or Registration Utilization events.
6. Select Save.
7. Access the PathFinder server web interface and monitor the trap messages in the Event
Logs tab (Figure 55: Trap messages in PathFinder server on page 79).
Related links
Performing Maintenance Procedures on page 70
April 2016
79
Managing Logs
Logs are important for troubleshooting. This section describes the log managing provided in the
Avaya Scopia PathFinder server:
Related links
Performing Maintenance Procedures on page 70
Configuring the Alert Level and Size of Logs on page 80
Retrieving Application and Operating System Logs on page 81
Procedure
1. Access the PathFinder server Administrator web interface.
2. Select the Settings tab.
3. Navigate to the Logging area of the General tab (Figure 56: Configuring the logs on
page 80).
Description
Detail
Saves call details, warnings, and critical system errors to the log file.
Warning
Saves warnings issued by the system and critical system errors to the log
file.
Error
Disabled
5. Select the log file size in the Size Limit field. The size of an individual log file is configured to
500KB by default. The maximum size of an individual log file is 10000KB.
6. Define how many log files are created in the Number of Log Files field. By default the
maximum number of log files that are kept on the PathFinder server is 300. The maximum
number of log files is 1000. When the maximum number is reached and a new log file is
created, it replaces the oldest log file.
Related links
Managing Logs on page 80
April 2016
80
Managing Logs
Procedure
1. Access the PathFinder server Administrator web interface.
2. Select General > Customer Support (Figure 57: Accessing the screen for generating the
Customer Support Package on page 81).
Figure 57: Accessing the screen for generating the Customer Support Package
April 2016
81
April 2016
82
7. (Optional) To download the package from the PathFinder server to your PC using WinSCP,
run the application and perform the steps below to transfer the file.
8. Configure the connection to your PathFinder server in the WinSCP Login dialog box, as
follows:
Table 20: Configuring WinSCP settings
Field
Description
Host name
User name
Password
File protocol
9. Select Login.
10. Drag the log file from the /updates/logs folder to the relevant folder on your computer The
PathFinder server names logs as pfcspkg_<selected_dates>.zip by default.
11. Close WinSCP and confirm ending the session to save the changes.
Related links
Managing Logs on page 80
April 2016
83
You can retrieve the network captures as files and use them to troubleshoot problems.
Procedure
1. Run PuTTY to connect to the PathFinder server.
2. Configure the connection to the PathFinder server in the Session tab of the PuTTY
Configuration dialog box, as follows:
Table 21: Configuring the PuTTY session
Field
Description
SSH
c. Enter Y to confirm starting to capture the network traces (Figure 62: Creating the
network capture files on page 84).
The PathFinder server starts the trace, which you can end by pressing Ctrl-C. It creates
a single or multiple .pcap files, depending on the duration of the capture. It also
April 2016
84
generates a .tgz file which compresses all these .pcap files to a single package (Figure
63: Downloading the network capture files to your computer on page 85). As each file
is dated and time stamped, you can download and review only the files which captured
issues you are interested in troubleshooting.
d. Press Enter to return to the Main Menu.
e. Press Q to exit the session.
4. Run WinSCP to transfer the file.
5. Configure the connection to your PathFinder server in the WinSCP Login dialog box, as
follows:
Table 22: Configuring WinSCP settings
Field
Description
Host name
User name
Password
File protocol
6. Select Login.
7. Drag the relevant network capture file from the /updates/nw_traces folder to the relevant
folder on your computer (Figure 63: Downloading the network capture files to your
computer on page 85).
8. Close WinSCP and confirm ending the session to save the changes.
Related links
Performing Maintenance Procedures on page 70
April 2016
85
Procedure
1. Access the PathFinder server Administrator web interface.
2. Select the About tab. The screen displays system information.
Table 23: Viewing Information on PathFinder
Field Name
Description
Version Number
MAC Address
Serial Number
Expiration Date
Max. Connected
Endpoints
Related links
Performing Maintenance Procedures on page 70
April 2016
86
Glossary
1080p
2CIF
2CIF describes a video resolution of 704 x 288 pixels (PAL) or 704 x 240
(NTSC). It is double the width of CIF, and is often found in CCTV products.
2SIF
2SIF describes a video resolution of 704 x 240 pixels (NTSC) or 704 x 288
(PAL). This is often adopted in IP security cameras.
4CIF
4CIF describes a video resolution of 704 x 576 pixels (PAL) or 704 x 480
(NTSC). It is four times the resolution of CIF and is most widespread as the
standard analog TV resolution.
4SIF
4SIF describes a video resolution of 704 x 480 pixels (NTSC) or 704 x 576
(PAL). This is often adopted in IP security cameras.
720p
AAC
AAC is an audio codec which compresses sound but with better results
than MP3.
Alias
Auto-Attendant
Balanced
Microphone
April 2016
87
Glossary
Bitrate
Bitrate is the speed of data flow. Higher video resolutions require higher
bitrates to ensure the video is constantly updated, thereby maintaining
smooth motion. If you lower the bitrate, you lower the quality of the video. In
some cases, you can select a lower bitrate without noticing a significant
drop in video quality; for example during a presentation or when a lecturer
is speaking and there is very little motion. In video recordings, the bitrate
determines the file size for each minute of recording. Bitrate is often
measured in kilobits per second (kbps).
Call Control
Cascaded
Videoconference
CIF
Content Slider
The Scopia Content Slider stores the data already presented in the
videoconference and makes it available for participants to view during the
meeting.
Continuous
Presence
Control
Control, or media control, sets up and manages the media of a call (its
audio, video and data). Control messages include checking compatibility
between endpoints, negotiating video and audio codecs, and other
parameters like resolution, bitrate and frame rate. Control is communicated
via H.245 in H.323 endpoints, or by SDP in SIP endpoints. Control occurs
within the framework of an established call, after signaling.
CP
April 2016
88
Dedicated Endpoint
Dedicated Endpoint
Dial Plan
A dial plan defines a way to route a call and to determine its characteristics.
In traditional telephone networks, prefixes often denote geographic
locations. In videoconferencing deployments, prefixes are also used to
define the type and quality of a call. For example, dial 8 before a number for
a lower bandwidth call, or 6 for an audio-only call, or 5 to route the call to a
different branch.
Dial Prefix
Distributed
Deployment
DNS Server
DTMF
Dual Video
Dynamic Video
Layout
E.164
Endpoint
April 2016
89
Glossary
Endpoint Alias
FEC
FECC
Forward Error
Correction
FPS
Frame Rate
Frames Per Second (fps), also known as the frame rate, is a key measure
in video quality, describing the number of image updates per second. The
average human eye can register up to 50 frames per second. The higher
the frame rate, the smoother the video.
Full HD
Full HD, or Full High Definition, also known as 1080p, describes a video
resolution of 1920 x 1080 pixels.
The full screen view shows one video image. Typically, it displays the
remote presentation, or, if there is no presentation, it displays the other
meeting participant(s).
Gatekeeper
A gatekeeper routes audio and video H.323 calls by resolving dial strings
(H.323 alias or URI) into the IP address of an endpoint, and handles the
initial connection of calls. Gatekeepers also implement the dial plan of an
organization by routing H.323 calls depending on their dial prefixes.
Scopia Management includes a built-in Avaya Scopia Gatekeeper, while
ECS is a standalone gatekeeper.
Gateway
GLAN
GLAN, or gigabit LAN, is the name of the network port on the XT Series. It
is used on the XT Series to identify a 10/100/1000MBit ethernet port.
April 2016
90
H.225
H.225
H.225 is part of the set of H.323 protocols. It defines the messages and
procedures used by gatekeepers to set up calls.
H.235
H.239
H.243
H.243 is the protocol used with H.323 endpoints enabling them to remotely
manage a videoconference.
H.245
H.261
H.263
H.264
H.264 is a widespread protocol used with SIP and H.323 endpoints, which
defines video compression. Compression algorithms include 4x4 transforms
and a basic motion comparison algorithm called P-slices. There are several
profiles within H.264. The default profile is the H.264 Baseline Profile, but
H.264 High Profile uses more sophisticated compression techniques.
H.264 Baseline
Profile
April 2016
91
Glossary
H.320
H.323
H.323 Alias
H.350
H.350 is the protocol used to enhance LDAP user databases to add video
endpoint information for users and groups.
H.460
HD
High Availability
High availability is a state where you ensure better service and less
downtime by deploying additional servers. There are several strategies for
achieving high availability, including deployment of redundant servers
managed by load balancing systems.
High Definition
High Profile
HTTPS
HTTPS is the secured version of the standard web browser protocol HTTP.
It secures communication between a web browser and a web server
through authentication of the web site and encrypting communication
between them. For example, you can use HTTPS to secure web browser
access to the web interface of many Scopia Solution products.
Image Resolution
KBps
Kilobytes per second (KBps) measures the bitrate in kilobytes per second,
not kilobits, by dividing the number of kilobits by eight. Bitrate is normally
quoted as kilobits per second (kbps) and then converted to kilobytes per
second (KBps). Bitrate measures the throughput of data communication
between two devices.
kbps
LDAP
April 2016
92
Lecture Mode
Load balancer
A load balancer groups together a set (or cluster) of servers to give them a
single IP address, known as a virtual IP address. It distributes client service
requests amongst a group of servers. It distributes loads according to
different criteria such as bandwidth, CPU usage, or cyclic (round robin).
Load balancers are also known as application delivery controllers (ADC).
Location
Management
MBps
Megabytes per second (MBps) is a unit of measure for the bitrate. The
bitrate is normally quoted as kilobits per second (kbps) and then converted
by dividing it by eight to reach the number of kilobytes per second (KBps)
and then by a further 1000 to calculate the MBps.
MCU
MCU service
Media
Media refers to the live audio, video and shared data streams sent during a
call. Presentation and Far end camera control (FECC) are examples of
information carried on the data stream. Media is transmitted via the RTP
and RTCP protocols in both SIP and H.323 calls. The parallel data stream
of both live video and presentation, is known as dual video.
April 2016
93
Glossary
Media Control
Meeting Type
Meeting types (also known as MCU services) are meeting templates which
determine the core characteristics of a meeting. For example, they
determine if the meeting is audio only or audio and video, they determine
the default video layout, the type of encryption, PIN protection and many
other features. You can invoke a meeting type by dialing its prefix in front of
the meeting ID. Meeting types are created and stored in the MCU, with
additional properties in Scopia Management.
Moderator
MTU
Multi-Point
Multi-tenant
Multicast Streaming
NAT
NetSense
April 2016
94
Packet Loss
Packet loss occurs when some of the data transmitted from one endpoint is
not received by the other endpoint. This can be caused by narrow
bandwidth connections or unreliable signal reception on wireless networks.
The PaP (Picture and Picture) view shows up to three images of the same
size.
Phantom Power
Microphones which use phantom power draw their electrical power from the
same cable as the audio signal. For example, if your microphone is
powered by a single cable, it serves both to power the microphone and
transmit the audio data. Microphones which have two cables, one for sound
and a separate power cable, do not use phantom power.
The PiP (Picture In Picture) view shows a video image in the main screen,
with an additional smaller image overlapping in the corner. Typically, a
remote presentation is displayed in the main part of the screen, and the
remote video is in the small image. If the remote endpoint does not show
any content, the display shows the remote video in the main part of the
screen, and the local presentation in the small image.
Point-to-Point
The PoP (Picture out Picture) view shows up to three images of different
size, presented side by side, where the image on the left is larger than the
two smaller images on the right.
Prefix
PTZ Camera
A PTZ camera can pan to swivel horizontally, tilt to move vertically, and
optically zoom to devote all the camera's pixels to one area of the image.
For example, the XT Standard Camera is a PTZ camera with its own power
supply and remote control, and uses powerful lenses to achieve superb
visual quality. In contrast, fixed cameras like webcams only offer digital
PTZ, where the zoom crops the camera image, displaying only a portion of
the original, resulting in fewer pixels of the zoomed image, which effectively
lowers the resolution. Fixed cameras also offer digital pan and tilt only after
zooming, where you can pan up to the width or length of the original
camera image.
Q.931
Q.931 is a telephony protocol used to start and end the connection in H.323
calls.
April 2016
95
Glossary
QCIF
QCIF, or Quarter CIF, defines a video resolution of 176 144 pixels (PAL)
or 176 x 120 (NTSC). It is often used in older mobile handsets (3G-324M)
limited by screen resolution and processing power.
Quality of Service
(QoS)
Recordings
Redundancy
Registrar
A SIP Registrar manages the SIP domain by requiring that all SIP devices
register their IP addresses with it. For example, once a SIP endpoint
registers its IP address with the Registrar, it can place or receive calls with
other registered endpoints.
Resolution
Restricted Mode
Restricted mode is used for ISDN endpoints only, when the PBX and line
uses a restricted form of communication, reserving the top 8k of each
packet for control data only. If enabled, the bandwidth values on these lines
are in multiples of 56kbps, instead of multiples of 64kbps.
Room System
RTCP
RTP
April 2016
96
RTSP
protocols today, including H.323, SIP and the streaming control protocol
known as RTSP. The secured version of RTP is SRTP.
RTSP
Sampling Rate
SBC
Scalability
Scopia Content
Slider
SD
Service
SIF
SIF defines a video resolution of 352 x 240 pixels (NTSC) or 352 x 288
(PAL). This is often used in security cameras.
Signaling
Signaling, also known as call control, sets up, manages and ends a
connection or call. These messages include the authorization to make the
call, checking bandwidth, resolving endpoint addresses, and routing the call
through different servers. Signaling is transmitted via the H.225.0/Q.931
and H.225.0/RAS protocols in H.323 calls, or by the SIP headers in SIP
calls. Signaling occurs before the control aspect of call setup.
Single Sign On
Single Sign On (SSO) automatically uses your network login and password
to access different enterprise systems. Using SSO, you do not need to
separately login to each system or service in your organization.
SIP
April 2016
97
Glossary
SIP Server
SIP URI
Slider
SNMP
Software endpoint
SQCIF
SRTP
SSO
Standard Definition
Streaming
STUN
SVC
April 2016
98
SVGA
which enhance resolution, frame rate and quality. Each additional layer is
only transmitted when bandwidth permits. This allows for a steady video
transmission when available bandwidth varies, providing better quality
when the bandwidth is high, and adequate quality when available
bandwidth is poor.
SVGA
Switched video
SXGA
Telepresence
Telepresence - Dual
row telepresence
room
Dual row telepresence rooms are large telepresence rooms with two rows
of tables that can host up to 18 participants.
TLS
Transcoding
UC (Unified
Communications)
April 2016
99
Glossary
Unbalanced
Microphone
Unicast Streaming
URI
URI Dialing
User profile
VFU
VGA
Video Fast Update (VFU) is a request for a refreshed video frame, sent
when the received video is corrupted by packet loss. In response to a VFU
request, the broadcasting endpoint sends a new intra-frame to serve as the
baseline for the ongoing video stream.
Video Layout
Video Resolution
Video Switching
Videoconference
Virtual Room
April 2016
100
VISCA Cable
send invitations to each other via a web link which brings you directly into
their virtual room. Virtual meeting rooms are also dialed like phone
extension numbers, where a users virtual room number is often based on
that persons phone extension number. You can personalize your virtual
room with PIN numbers, custom welcome slides and so on. External
participants can download Scopia Desktop or Scopia Mobile free to
access a registered user's virtual room and participate in a
videoconference.
VISCA Cable
A crossed VISCA cable connects two PTZ cameras to enable you to use
the same remote control on both.
Waiting Room
A waiting room is a holding place for participants waiting for the host or
moderator to join the meeting. While waiting, participants see a static image
with the name of the owner's virtual room, with an optional audio message
periodically saying the meeting will start when the host arrives.
Webcast
WUXGA
XGA
Zone
April 2016
101