![Nortel SMC 2450 Implementation Manual Download Page 25](http://html1.mh-extra.com/html/nortel/smc-2450/smc-2450_implementation-manual_1706451025.webp)
Description
Page 25 of 260
Secure Multimedia Controller
Implementation Guide
•
Secure UNIStim proxy
•
High Availability (HA) configurations (active/standby)
•
Administrative tools
The following sections describe these features in detail.
Security zones
Configuration of the SMC is built around the concept of multimedia security
zones. A security zone is a protected subnet connected to the SMC through a
port on the device. Multimedia infrastructure components, such as the
signaling and media servers, are located in the zones. All traffic into and out
of the zones flows through the multimedia controller. The SMC has six ports
and supports up to four secure multimedia zones. The two remaining ports are
used for management and intranet/untrusted traffic.
Two networks are mandatory in each SMC system installation:
•
Management subnet: The management subnet transmits clustering and
synchronization traffic between two SMC devices in a cluster. You can
access the browser-based interface (BBI) through the management
subnet.
•
Intranet subnet: The intranet subnet represents the non-secure corporate
intranet, which is the non-secure side of the SMC where the IP phones
generally reside.
Four optional primary subnets, referred to as secure multimedia zones (SMZ),
interface with the SMC:
•
ELAN subnet: The Embedded LAN (ELAN) subnet, which is the
management LAN for CS 1000, isolates critical telephony signaling
between the Call Server and other components.
•
TLAN subnet: The Telephony LAN (TLAN) subnet, which is the voice
LAN for CS 1000, carries telephony, voice, and signaling traffic to and
from IP clients and gateways.
Summary of Contents for SMC 2450
Page 2: ......
Page 4: ...Page 4 of 260 Revision history 553 3001 225 Standard 1 00 May 2006...
Page 10: ...Page 10 of 260 Contents 553 3001 225 Standard 1 00 May 2006 Format 251 Log message table 253...
Page 16: ...Page 16 of 260 List of procedures 553 3001 225 Standard 1 00 May 2006...
Page 20: ...Page 20 of 260 About this document 553 3001 225 Standard 1 00 May 2006...
Page 56: ...Page 56 of 260 Description 553 3001 225 Standard 1 00 May 2006...
Page 76: ...Page 76 of 260 Hardware installation 553 3001 225 Standard 1 00 May 2006...
Page 120: ...Page 120 of 260 Firewall deployment 553 3001 225 Standard 1 00 May 2006...
Page 160: ...Page 160 of 260 Secure UNIStim deployment 553 3001 225 Standard 1 00 May 2006...
Page 182: ...Page 182 of 260 Maintenance 553 3001 225 Standard 1 00 May 2006...
Page 196: ...Page 196 of 260 The Command Line Interface CLI 553 3001 225 Standard 1 00 May 2006...
Page 212: ...Page 212 of 260 Logging 553 3001 225 Standard 1 00 May 2006...
Page 250: ...Page 250 of 260 Appendix D Software licenses 553 3001 225 Standard 1 00 May 2006...
Page 260: ...Page 260 of 260 Appendix E SMC packet filter log messages 553 3001 225 Standard 1 00 May 2006...
Page 261: ......