
Planning NAT and Firewall Traversal with SCOPIA XT Series
SCOPIA XT Series fully supports NAT and firewall traversal, enabling you to place the unit
behind a NAT router or firewall and connect with other endpoints seamlessly. This section
describes four approaches to NAT and firewall traversal with XT Series:
•
Using a RADVISION HTTP server or a STUN public server for NAT and firewall traversal
When the XT Series hosts a videoconference with endpoints outside the enterprise (
Figure
1-2 on page 5
), it first queries the HTTP or STUN server to discover its public IP
address, then sends it to any external endpoints wishing to join the conference. The
external endpoints then answer the call using the IP address provided. Configure the XT
Codec Unit for HTTP or STUN autodiscovery.
Figure 1-2
Using an HTTP/STUN Server for NAT and Firewall Traversal
This approach works well in simple NAT and firewall traversal deployments, typically used
by home offices and Small Medium Businesses (SMBs).
•
Using a NAT/firewall traversal server supporting H.460
The endpoints in the private network communicate with the endpoints located in the
public network via an H.460 NAT/firewall traversal server, like the SCOPIA PathFinder (see
Figure 1-3 on page 6
). Endpoints in the public network can join a conference hosted in
the private network via the traversal server if there is an open connection through the
firewall. Verify the duration of the firewall pinhole and configure that time in the XT
Codec Unit.
RADVISION | Administrator Guide for SCOPIA XT5000 Series Version 3.0
Planning the Topology of the SCOPIA XT Series Deployment | 5