Avaya Mobile Communication 3100 Planning and Engineering Manual do Utilizador Página 19

  • Descarregar
  • Adicionar aos meus manuais
  • Imprimir
  • Página
    / 54
  • Índice
  • MARCADORES
  • Avaliado. / 5. Com base em avaliações de clientes
Vista de página 18
Security requirements 19
on the internet to a public FQDN and a public IP address. The figure also
shows a sample firewall configuration and policy. For the purposes of this
example assume
that the MCC 3100 (in the absence of a BES) requires a public FQDN
and IP for the MCG 3100 to be accessible from the internet. This in
turn forces the MCG 3100 to be placed in a demilitarized zone (DMZ).
Firewalls are used to filter traffic from the internet and from the DMZ to
separate the MCG 3100 and internet from the trusted Enterprise voice
infrastructure where other components on the ECS TLAN reside.
Figure 3
Sample MCG 3100 firewall configuration
If a user calls a client, the SIP signaling comes through the SPS. Real
Time Protocol (RTP) for announcements or MC 3100 Instant Conference
calls takes place between the MCG 3100 and the IP telephone without
using the SPS.
To allow public internet traffic to reach the MCG 3100 from clients, while
simultaneously providing MCG 3100 access to the ECS TLAN for SIP
and RTP, you must carefully consider the data network and security
requirements of the Enterprise.
Proprietary communication between the MCG 3100 and the MCC 3100 for
BlackBerry (without the BES, using HTTP), the MCC 3100 for Nokia (using
HTTPS), and the MCC 3100 for Windows Mobile (using HTTPS) enables
clients to initiate and modify calls for the user on the ECS. In the BES
configuration, the MCC 3100 for BlackBerry communicates with the BES,
Nortel Mobile Communication 3100
Nortel Mobile Communication 3100 Planning and Engineering
NN42030-200 03.04 17 July 2009
Copyright © 2007-2009 Nortel Networks. All Rights Reserved.
.
Vista de página 18
1 2 ... 14 15 16 17 18 19 20 21 22 23 24 ... 53 54

Comentários a estes Manuais

Sem comentários