Chapter6. Basic Configuration

Information

Informationabout this certificate, such as the signing CA and expiration date.
Delete Row
Ifyou select this box, the row is deleted when you click on Add new rows or Save.
Create
Enterthe number of new rows you want to add to the table, and then click on Create.
Save
Savesall Certificates configuration to the preliminary configuration.
Cancel
Clearsand resets all fields in new rows and resets changes in old rows.
Telecommuting Module Type
TheTelecommuting Module can be connected to your network in different ways, depending on your needs. On this
page,you state what configuration you have.

The DMZ Configuration

Usingthis configuration, the Telecommuting Module is located on the DMZ of your firewall, and connected to it
withonly one interface.
Thisis the safest configuration, since all traffic goes through both your firewall and your Telecommuting Module. It
isalso the most flexible, since all networks connected to any of your firewall’s interfaces can be SIP-enabled.
Onyour firewall, you need to open the SIP port (normally UDP port 5060) and a range of UDP ports for RTP traffic
betweenthe Telecommuting Module and the Internet as well as between the Telecommuting Module and your
internalnetworks. The SIP traffic finds its way to the Telecommuting Module using DNS or by setting the
TelecommutingModule as an outbound proxy on the clients.
Thefirewall mustn’t use NAT for the traffic between the TelecommutingModule and your internal networks or for
thetraffic between the Telecommuting Module and the Internet. However, the TelecommutingModule can itself use
NATfor traffic to the Internet.
Youneed to declare your internal network topology on the Surroundings page.

The DMZ/LAN Configuration

Usingthis configuration, the Telecommuting Module is located on the DMZ of your firewall, and connected to it
withone of the interfaces.
Thisconfiguration is used to enhance the data throughput, since the traffic only needs to pass your firewall once.
57