Special Issues
481
administrator specifies crossing privileges according to network needs
and policies. Control criteria consists of direction of transfer, source and
destination address, packet type, and access ports.
Firewalls affect, and are affected by, H.323 gateways. For example,
firewall processing increases packet delay while the complexity of the
H.323 protocol complicates the firewall programming.
The only way to safely avoid firewall delays is to exclude outside internet
access. This means calls can only be made within the secure intranet.
In some business applications, it is possible to eliminate the firewall delay
by setting up a dedicated physical connection between the H.323
gateway and the router. This approach, which requires a second NIC in
the ConneXtions PC system, bypasses the firewall and puts the burden of
discriminating against non-H.323 packets on the gateway. The PC system
that runs the ConneXtions software must be secure.
Systems that must conform to very conservative firewall policies can use a
Virtual Private Network (VPN) if they need to filter incoming H.323 calls
from the public Internet. An alternative is to use a firewall with H.323
proxy support.
While the operating system that runs the H.323 gateway can be
programmed to serve both as an H.323 gateway and as an IP router, such
arrangements are usually impractical because the gateway needs so
much processing power just to manage audio conversions.
3Com recommends that a high-performance PC be dedicated to the
ConneXtions software.
The question of whether an operating system is adequately “secure” is a
subject of debate. The concern is that Windows has many IP ports of its
own. One way to deal with these ports is to set up a firewall that limits
the range of externally accessible ports. However, some organizations
connect the ConneXtions gateway directly to the Internet through a
second NIC that bypasses the firewall protecting the rest of the local
network. ConneXtions supports either configuration.
Organizations that want to completely bypass firewall delays can research
the large volume of security information about the subject.
Summary of Contents for 3C10402B
Page 18: ...18 ...
Page 22: ...22 ABOUT THIS GUIDE ...
Page 26: ...26 CHAPTER 1 INTRODUCTION ...
Page 74: ...74 CHAPTER 3 FEATURE SETTINGS ...
Page 130: ...130 CHAPTER 5 TELEPHONE CONFIGURATION ...
Page 156: ...156 CHAPTER 7 CALL DISTRIBUTION GROUPS ...
Page 194: ...194 CHAPTER 8 PSTN GATEWAY CONFIGURATION ...
Page 256: ...256 CHAPTER 10 SIP MODE OPERATIONS ...
Page 328: ...328 CHAPTER 11 DIAL PLAN ...
Page 360: ...360 CHAPTER 13 DOWNLOADS ...
Page 370: ...370 CHAPTER 14 LICENSING AND UPGRADES ...
Page 406: ...406 CHAPTER 16 NETWORK MANAGEMENT ...
Page 412: ...412 CHAPTER 17 COUNTRY SETTINGS ...
Page 450: ...450 APPENDIX A INTEGRATING THIRD PARTY MESSAGING ...
Page 456: ...456 APPENDIX B ISDN COMPLETION CAUSE CODES ...
Page 510: ...510 APPENDIX F OUTBOUND CALLER ID AND 911 SERVICE ...
Page 546: ...546 APPENDIX G NBX ENTERPRISE MIB ...
Page 566: ...566 GLOSSARY ...
Page 578: ...578 INDEX ...
Page 582: ......