ClearOne NetPoint Firewall Traversal Скачать руководство пользователя страница 12

 

12   NetPoint Firewall Traversal Server: Installation and Setup Manual 

F

IREWALLS

 

To protect their networks and data resources from external hazards such as hacking and 

virus propagation, some organizations install firewalls. 

Firewalls check the IP address and destination port of each data packet received from 

external sources. The type of permitted incoming traffic depends on the firewall’s 

configuration. For example, the firewall may allow traffic from an external source to pass if a 

node inside the firewall initiated communication with it. Usually, they will block or discard 

unsolicited packets. 

In order to deal with desirable requests for information while protecting most of their user 

nodes, many organizations place relevant information on a web server inside the firewall. 

The firewall is then configured to permit traffic to and from the web server’s IP address and 

port 80 to pass. 

EFFECTS OF FIREWALLS AND NATS ON H.323 

VIDEOCONFERENCING 

Compared to other data communications protocols such as HTTP and FTP, H.323 has 

unique characteristics that cause difficulties in enterprise environments protected by 

firewalls and NATs. 

 

H.323 transmissions include the embedding of the sender’s IP address inside the data 

packets. The call recipient transmits audio and video in return to the initiating user at the 

IP address embedded in the original transmissions. If this IP address is private, Internet 

routers typically discard the audio and video packets sent from the external endpoint 

because they are being sent to an un-routable private IP address.  

 

During H.323 communications, several protocol parameters, including IP port values, 

are determined dynamically during call setup negotiation instead of in advance. This 

poses a problem in security devices such as firewalls, which usually require a security 

schema based on opening specific known ports. 

 

The use of H.323 video and voice communication requires a firewall to open a wide 

range of ports so that traffic can pass unhindered. The IP voice and video 

communications protocols require several open ports to receive call control messages 

and to establish the voice and video data channels. These additional port numbers are 

determined dynamically, not in advance. Therefore, network administrators would have 

to open up all the firewall ports to allow the H.323 traffic to pass through. This 

constitutes a breach of the firewall’s purpose, which prefers to close as many ports as 

possible. 

 

H.460.18 and H.460.19 are ITU standards that enable H.323 devices to exchange 

signaling and media across boundaries imposed by NAT and firewalls, without the need 

for any additional equipment.  

In most organizations, firewalls are configured to severely limit the types of inbound data 

traffic that will arrive to internal users’ workstations, servers, and peripheral equipment.  

Содержание NetPoint Firewall Traversal

Страница 1: ...NETPOINT FIREWALL TRAVERSAL SERVER INSTALLATION AND SETUP MANUAL...

Страница 2: ...NSTALLATION AND SETUP MANUAL CLEARONE DOCUMENT 800 000 000 04 _REV1 0 OCTOBER 2012 2012 ClearOne and NetStreams All rights reserved No part of this document may be reproduced in any form or by any mea...

Страница 3: ...from ClearOne ClearOne and Collaborate Central are registered trademarks of ClearOne Microsoft Windows and NetMeeting are registered trademarks of Microsoft Corporation All other trademarks are the t...

Страница 4: ......

Страница 5: ...s are electrically rated to operate with the AC power available in your location To help avoid possible damage to the system cards wait 5 seconds after turning off the system before disconnecting a de...

Страница 6: ...ursuant to Part 15 of the FCC rules These limits are designed to provide reasonable protection against harmful interference when the equipment is operated in a commercial environment This equipment ca...

Страница 7: ...ring NAT Firewall Protected Nodes to the Collaborate Central 15 Collaborate Central Outside of LAN 15 Collaborate Central Inside LAN 15 Negotiating Firewalls 15 Setting Up the Firewall to Support NetP...

Страница 8: ...l Server Installation and Setup Manual Logging in 28 Main Screen 28 Administrators 29 Network 29 Upgrading 30 License 31 Log Out 31 Shut Down 31 Restart 31 Backup Restore 32 System Restore 33 Take Sna...

Страница 9: ...software system designed to enable firewall transversal NetPoint supports the H 460 standard and ClearOne Tunneling propriety protocol It allows end points behind firewalls to communicate with other...

Страница 10: ......

Страница 11: ...hackers and spammers Finite number of available IP addresses The number of public IP addresses is limited By defining addresses for internal use only an organization can use a large number of differe...

Страница 12: ...t the IP address embedded in the original transmissions If this IP address is private Internet routers typically discard the audio and video packets sent from the external endpoint because they are be...

Страница 13: ...ion will not penetrate the network protected by the NAT The user behind the NAT never receives the public side user s audio and video THE NETPOINT SYSTEM SOLUTION ClearOne s NetPoint of products provi...

Страница 14: ...QoS to IP videoconferencing is integrated into the NetPoint The QoS helps provide the best possible audio and video quality at a given data rate for all H 323 H 460 end points located behind the NetPo...

Страница 15: ...ith the Collaborate Central Collaborate Central Outside of LAN Collaborate Central Inside LAN COLLABORATE CENTRAL OUTSIDE OF LAN In this configuration NetPoint is not required Collaborate Central supp...

Страница 16: ...s dynamically while the calls are connected The NetPoint s deployment does not affect other ports or rules of the firewall As a result it is not required to open ports inward or to open random or dyna...

Страница 17: ...t products If it becomes necessary to change settings later on such as a running of the NetPoint recovery option you will have to reconfigure the system This chapter and includes the following section...

Страница 18: ...r This name appears in the Main View NetPoint IP Address IP address of the server Management Pages This button opens the NetPoint Home Page in the NetPoint tab This tab is practically the same as the...

Страница 19: ...the firewall through which the system routes data This parameter is configured automatically based on Outbound TCP Signaling Port 2 H460 RTP port Low High The range of ports in the firewall through wh...

Страница 20: ...ugh this NetPoint Set QoS properties as follows PRIORITY TYPE QOS Select the type of QoS used for transmitting packets during heavy network congestion conditions No Priority Network transfers packets...

Страница 21: ...n or transmission delays the item with the lowest priority number may be discarded in order to send the rest of the packets successfully The priority levels vary depending on whether the selected Prio...

Страница 22: ......

Страница 23: ...Side Ports ENDPOINT SIDE PORTS The following ports should be opened in the firewall on the endpoint side to allow the endpoints to work properly Two static ports 1719 UDP 1720 TCP Up to 5 dynamic port...

Страница 24: ......

Страница 25: ...page network tab or by using cross cable ASSIGNING STATIC IP ADDRESSES TO NETPOINT SERVER WITH DHCP ADDRESS This procedure describes how to set a static IP Address when Netpoint is connected to the ne...

Страница 26: ...Connection to open it for editing 5 To set a static IP address uncheck the Obtain address from DHCP server option 6 Assign a static IP address by entering the following information IP Address Subnet M...

Страница 27: ...down the computer s current IP address and subnet mask so that you can restore them later 4 Change the remote computer s IP configuration temporarily to the same IP address segment 10 0 10 x and subne...

Страница 28: ...r to start working with the new IP you must unplug the crossover cable from interface GbE2 during restart process LOGGING IN Start your IE browser and point it to the NetPoint admin configuration scre...

Страница 29: ...manage NetPoint administrators You can create delete and edit administrators login credentials Click New to create a new admin To delete an admin account select the checkbox of the desired administra...

Страница 30: ...en the EVC web applications without needing to login each time 4 When you are done click Apply NOTE The configured NIC can be the one you are currently connected to or a different one UPGRADING This f...

Страница 31: ...end it by mail to your ClearOne sales representative 3 You will receive a permanent license key form ClearOne Delete the temporary license and then copy and paste the permanent license key instead Whe...

Страница 32: ...es At any time you can easily restore the default Netpoint configuration as was set at ClearOne or return to a specific configuration state Select the Action you want to perform System Restore Restore...

Страница 33: ...System Restore 2 Select the Restore option Restore To Base Line Restore the system configuration to the factory default snapshot base line or a newly created base line snapshot The base line snapshot...

Страница 34: ...Netpoint backup and restore actions to ensure that only authorized administrators can restore the Netpoint configuration The default password is 1234 3 Click Apply TAKE SNAPSHOT After making configura...

Страница 35: ...5 DELETE SNAPSHOT This option enables you to delete a snapshot from the list Select the desired snapshot and click Delete NOTE Some snapshots i e base line snapshots and snapshots that are automatical...

Отзывы: