HP VCX Software manual Network Configuration, Telecommuting Module Type

Page 25

Chapter 4. Network Configuration

First, the Telecommuting Module must be configured to be aware of the network in which it operates. This is performed on the Network Configuration pages. The important pages for getting started are Telecommuting Module Type, Interface (Network Interface 1 and 2), Default Gateway, Networks and Computers and (for the DMZ Telecommuting Module Type) Surroundings.

You will also need to add DNS configuration on the Basic Configuration page under Basic Configuration

Telecommuting Module Type

The Telecommuting Module can be connected to your network in different ways, depending on your needs. On this page, you state what configuration you have.

DMZ Configuration

Using this configuration, the Telecommuting Module is located on the DMZ of your firewall, and connected to it with only one interface. The SIP traffic finds its way to the Telecommut- ing Module using DNS or by setting the Telecommuting Module as an outbound proxy on the clients.

This is the most secure configuration, since all traffic goes through both your firewall and your Telecommuting Module. It is also the most flexible, since all networks connected to any of your firewall’s interfaces can be SIP-enabled.

The drawback is that the SIP traffic will pass the firewall twice, which can decrease perfor- mance.

On your firewall, you need to open the SIP port (normally UDP port 5060) and a range of UDP ports for RTP traffic between the Telecommuting Module and the Internet as well as between the Telecommuting Module and your internal networks. The SIP traffic finds its way to the Telecommuting Module using DNS or by setting the Telecommuting Module as an outbound proxy on the clients.

The firewall mustn’t use NAT for the traffic between the Telecommuting Module and your internal networks or for the traffic between the Telecommuting Module and the Internet. However, the Telecommuting Module can itself use NAT for traffic to the Internet.

You need to declare your internal network topology on the Surroundings page.

17

Image 25
Contents Getting started Guide 3Com VCX IP Telecommuting ModulePage 3Com VCX IP Telecommuting Module Getting started Guide Page Table of Contents Page Part I. Installation of the 3Com VCX IP Telecommuting Module Page Introduction What is a Telecommuting Module?Configuration alternatives DMZ ConfigurationStandalone Configuration DMZ/LAN ConfigurationOverview of the Installation License Conditions About settings in 3Com VCX IP Telecommuting ModuleInstallation Installing 3Com VCX IP Telecommuting ModuleInstallation with magic ping Installation with a serial cablePage Page Page Page Installation with a diskette Page Page Remember to lock up the Telecommuting Module Turning off a Telecommuting Module Installing 3Com VCX IP Telecommuting Module Part II. Configuring 3Com VCX IP Telecommuting Module Page Telecommuting Module Type Network ConfigurationNetwork Configuration Telecommuting Module Type configuration Interface Network Interface 1General Physical device Directly Connected NetworksStatus Interface nameDNS Name Or IP Address NameIP address Netmask/BitsAlias Routed network Static RoutingRouter Cancel Default GatewayMain Default Gateways SaveGateway Reference Hosts Policy For Packets From Unused GatewaysDynamic InterfaceNetworks and Computers Subgroup NameLower Limit Interface/VLAN Upper LimitDelete Row CreateSurroundings SurroundingsNetwork Additional NegotiatorsData Interfaces Basic Configuration Default domain IP PolicyName of this Telecommuting Module Policy For Ping To Your 3Com VCX IP Telecommuting ModuleDNS Servers Reverts all the above fields to their previous configuration Network Configuration Additional SIP Signaling Ports Basic SettingsSIP Configuration SIP ModuleSIP Media Port Range Provisioning RelayTransport CommentSIP Servers To Monitor Public IP address for NATed Telecommuting ModuleServer SIP Logging Log class for SIP signalingLog class for SIP packets Log class for SIP license messagesRouting Log class for SIP errorsDNS Override For SIP Requests Log class for SIP media messagesRelay To DomainSender IP Filter Rules FilteringFrom Network ActionDefault Policy For SIP Requests Content TypesContent Type URI Encoding InteroperabilityAllow Remote SIP Connectivity Remote Clients Signaling ForwardingRemote NAT Traversal Remote NAT traversalNAT timeout for TCP NAT timeout for UDPNAT keepalive method Media Route Access Control Administration of the Telecommuting ModuleConfiguration Allowed Via Interface Configuration Transport User Authentication For Web Interface AccessConfiguration via Http Configuration ComputersConfiguration via Https Configuration via SSHNetmask/Bits Range DNS Name Or Network AddressVia IPsec Peer Log Class SSHSave/Load Configuration Duration of limited test modeTest Preliminary Configuration Apply configurationShow Message About Unapplied Changes BackupSave to diskette Save/Load CLI Command File Abort All Edits Revert to Old ConfigurationsReload Factory Configuration Administration of the Telecommuting Module DMZ type Firewall and Client ConfigurationFirewall SIP clients DMZ/LAN typeOther Standalone type SIP clients Apply Index
Related manuals
Manual 446 pages 4.55 Kb