3Com NBX 100 Administrator's Manual - page 412
412
A
PPENDIX
D: C
ONNE
X
TIONS
H.323 G
ATEWAY
14 Choose what you want ConneXtions to do if it cannot register with the
preferred gatekeeper:
Autodiscover a new Gatekeeper — ConneXtions allows you to make
direct H.323 (unregistered calls) while attempting to contact an
alternative gatekeeper on the network.
Continue unregistered — ConneXtions continues to function without
using a gatekeeper.
Block Calls — ConneXtions blocks calls if it cannot register with a
gatekeeper. (You must either have a gatekeeper on the network, or select
one of the other options which enables ConneXtions to work without a
gatekeeper present.) If a gatekeeper becomes available, you must stop
the ConneXtions service and then restart it.
15 Do you want to use alternate Gatekeepers? If you select Yes, the chosen
gatekeeper maintains a list of alternate gatekeepers to be used if the
preferred gatekeeper does not respond.
If you choose to use alternate gatekeepers and have also selected to
autodiscover new gatekeepers if ConneXtions cannot contact the
preferred gatekeeper, ConneXtions first tries to use alternate gatekeepers
from the list (in priority order); if this fails, it then tries to autodiscover a
new gatekeeper.
16 Do you want to route calls through the Gatekeeper? You can route H.323
calls through the gatekeeper for these reasons:
■
To control calls more effectively. For example, service providers need to
be able to control call flow to allow them to bill for calls placed
through the network.
■
To reroute a call to another endpoint if a called endpoint is
unavailable.
■
To maintain interoperability with multi-vendor equipment which
routes all calls directly using the gatekeeper.
■
To use address resolution in large multi-zone configurations which
have one or more gatekeepers in each zone.
17 You are prompted to set the size of the log files. The default value is 1
Mb. ConneXtions maintains two log files, named
ConneXtions01.log
and
ConneXtions02.log
. Data is logged to only one of these at a time.
Once the active log file reaches a specified size, data logging switches to
the second log file. Any data previously stored in that log file is
overwritten.