Polycom V2IU 4350 user manual How Peering Proxy Works

Page 61

Configuring the V2IU 4350

Any: for the specified network, allows all ports and protocols through the system. No ports are required because not all protocols support the concept of ports.

Port or Port Range: The port number or port range allowed through the system when UDP or TCP are selected. A port range is specified by separating the starting and ending ports with a colon ':' (for example, 22:80). The ports parameter is not supported when you select Any protocol because not all protocols support the concept of ports.

4.When you have finished entering this information, click Add.

5.Click OK. The new forwarding entry appears on the Forwarding Rules window in the list area.

Peering Proxy

H.323 prefixes can be used to route calls based on a matching prefix in the destination alias of the call. Each prefix is associated with a domain name or IP address to send the call to in case the prefix matches.

The prefixes are searched in order, that is, the first prefix is tried first, and then the next one on the list until the system finds a matching prefix. This means that if there are multiple matching prefixes, the first one is used.

How Peering Proxy Works

The Polycom V2IU 4350 supports the concept of an H.323 Peering Proxy. This function provides advanced security layers or peering points within the network where a security layer is needed. Peering Proxy allows network providers to add internetworking connections between their “trusted” network and an unknown network. This topology hides their trusted network and the Stateful packet inspection Firewall provides the policies to ensure security. You can add Peering Proxies in series with one another to push the core H.323 networking infrastructure to meet individual security requirements.

The illustration below shows a sample diagram with dial plan and call flow examples. It is a snapshot of how the Peering Proxy can be deployed. Peering Proxy however, is not limited to this specific scenario, so contact your Polycom representative to discuss specific network requirements for full Peering Proxy support.

3 - 43

Image 61
Contents V2IU 4350 Converged Network Appliance Trademark Information Contents Page Contents Saving and Restoring the V2IU 4350 Configuration System DiagnosticsUpgrading the V2IU 4350 Contents Page V2IU 4350 Converged Network Appliance T1 Wide Area Network WAN Access RouterFeature Summary LED Label Activity Description Front Panel LEDsBack panel of the 4350E contains the following connections Back PanelRequired Tools and Materials Physical InstallationWall-Mount Installation Desktop InstallationRack-Mount Installation Connecting the Power and Cables AdministrationGetting Started Page Configuring the V2IU Configuration Guide For IP Centrex Applications Task Subtask Application? Configuration OutlineConfiguration Guide For Station Side IP PBX Applications Configure For Station Configuration Guide For Trunk Side IP PBX Applications Configure For Trunk Side IP Hotspot Configuration Guide For Hosted Video ApplicationsConfigure For Hosted Configuration Guide For Enterprise Video Applications Configure For Hosted Configure the LAN Interface System ConfigurationPress Submit Page Modify an Existing Vlan Configuration Configure the WAN Interface Configuring the V2IU Frame Relay Mode and Dlci Configure the Dhcp Server Mask Delete a Dhcp IP Address Configure Hostname, Snmp and Remote Logging Disable Snmp Change the Administration Password Enabling a Read-only User Read-only UserClick Submit How Subinterfaces WorksConfiguring Subinterfaces Viewing or Changing the ToS Byte Setting How the ToS Byte Setting WorksConfiguring the V2IU Configuration Configuring the V2IU Settings in the Embedded gatekeeper mode settings This is an advanced configuration option and should H.323 Settings page includes the following two buttons Alias Manipulation ActivityItem Description Neighboring H.323 Neighboring page includes the following buttons Regular Expressions Regular Expressions Symbol DescriptionHow Forwarding Rules Works Forwarding RulesConfiguring Forwarding Rules Page How Peering Proxy Works Peering ProxyPage Outbound from Site C to Site a Inbound from Site a to Site C Outbound from Site C to Public IP Endpoint Configuring Peering ProxyAdding an H.323 Prefix Entry Clients List Lock Enabling the Clients List Lock To configure clients list lock, use the following stepsActivity Monitor Type of Events Callee admission request received Call Termination Received invalid data Viewing the H.323 Activity MonitorVoIP Configuration Configure the VoIP ALG Programmed in your IP phone Configure VoIP Subnet Routing Enter a VoIP Subnet Route Configure IP Phones, IADs or Softphones NAT for Data Traffic Data Networking ConfigurationProtocolPublicIPAddress/netmask-portPrivateIPAddress-port Static IP routing Firewall Configuration Enable or disable the firewall Action Description Input format Traffic Management Configuration Enable Traffic Shaping Enable CAC Optionally enable priority IP addressesCloser Look at Traffic Management Upstream Traffic Management ClassifyingDownstream Traffic Management Page System Diagnostics Viewing Networking Information Viewing the ALG registration codeRouting Information Viewing Advanced System Information Passive Voice Call Monitoring Accessing Troubleshooting ToolsVerify Registered Voice and Video Devices Performing a Ping Test Restarting Networking Processes Ewn Command Saving and Restoring the V2IU 4350 ConfigurationCopy a Backup File to a Remote Tftp Server Create a Backup File and Save in Local FlashDownload a Backup File from a Remote Tftp Server List the Available Backup FilesDelete a Backup File Page Upgrading the V2IU Upgrade Procedure for Software Revision 1.3.11 or LaterPage Appendix Troubleshooting TipsSpecifications Regulatory Notices Other Rights and Limitations Regulatory Notices Warranty and Warranty Exclusions Regulatory Notices Page Regulatory Notices Page Regulatory Notices FCC Part 68 Notice to Users of Digital Service Industry Canada IC Notice Warranty and Repair Service Center