
Chapter 4 User Notes
75
Nortel Business Secure Router 222 Configuration — Basics
5
In the FIREWALL, set up a LAN-to-LAN rule to block traffic between the
guest subnet (DHCP Pool) and the corporate subnet (IP Alias subnet).
Note: If branch tunnels are being used, the policies on these tunnels should
exclude the guest subnet.
Preventing heavy data traffic from impacting telephone calls
To ensure voice quality during heavy data traffic, bandwidth needs to be reserved
for voice traffic.
1
Determine your actual WAN up-stream bandwidth by connecting to a web site
such as http://myvoipspeed.visualware.com/.
2
On BANDWIDTH MANAGEMENT / Summary, activate WAN bandwidth
management, and fill in your actual uplink speed in the WAN Speed field..
3
On BANDWIDTH MANAGEMENT / Class Setup, add a WAN subclass, and
reserve sufficient bandwidth based on the number of telephones, for Protocol
ID 17 (UDP Traffic).
The amount of bandwidth should be based on a reasonable peak number of
simultaneous calls, and the data rate needed by the IP telephony CODECs.
Setting Up a Remote Office with a UNIStim IP Telephone
For a remote office with a PC, and a UNIStim IP telephone behind a Business
Secure Router, Client Emulation is the recommended method to connect to the
main office.
1
At the main office Contivity Client Server, establish two user accounts - one
for the telephone, and one for the PC.
2
On the remote office Business Secure Router, do the following:
Under WAN / WAN IP, ensure that Network Address Translation is set to
SUA Only (default). Also ensure that the Gateway IP address is set (not
0.0.0.0).
Under VPN / Summary, create an entry for the IP telephone client tunnel.
(Contivity Client, Active, Keep Alive). Fill in the IP address of the Contivity
Client Server, and the name and password of the telephone set user account.
Summary of Contents for BSR222
Page 28: ...28 Tables NN47922 500 ...
Page 50: ...50 Chapter 2 Introducing the WebGUI NN47922 500 ...
Page 66: ...66 Chapter 3 Wizard setup NN47922 500 ...
Page 92: ...92 Chapter 5 System screens NN47922 500 ...
Page 104: ...104 Chapter 6 LAN screens NN47922 500 ...
Page 154: ...154 Chapter 9 Static Route screens NN47922 500 ...
Page 196: ...196 Chapter 11 Firewall screens NN47922 500 ...
Page 212: ...212 Chapter 13 VPN NN47922 500 Figure 68 Summary IP Policies ...
Page 256: ...256 Chapter 13 VPN NN47922 500 Figure 82 VPN Client Termination advanced ...
Page 260: ...260 Chapter 13 VPN NN47922 500 ...
Page 264: ...264 Chapter 14 Certificates NN47922 500 Figure 84 My Certificates ...
Page 290: ...290 Chapter 14 Certificates NN47922 500 Figure 95 Trusted remote host details ...
Page 314: ...314 Chapter 16 IEEE 802 1x NN47922 500 ...
Page 318: ...318 Chapter 17 Authentication server NN47922 500 Figure 107 Local User database edit ...
Page 326: ...326 Chapter 17 Authentication server NN47922 500 ...
Page 374: ...374 Chapter 20 Logs Screens NN47922 500 Figure 151 Log settings ...
Page 384: ...384 Chapter 20 Logs Screens NN47922 500 ...
Page 402: ...402 Chapter 22 Maintenance NN47922 500 Figure 170 Restart screen ...