Networking
Centralized Administration
44
IPedge General Description 01/12
Centralized Administration
Benefits
Centralized administration allows multiple nodes to be managed through a single point, reducing
the time it takes to administer multiple servers and also reducing the possibility of miss-
configuration.
Requirements
•
VPN
– A VPN is required between sites that implement Centralized Administration in order to
provide for security of the administration information.
•
Multi-node Centralized Administration
– The IP
edge
system enables administration of a
multi-node system from a single node called the Primary Server. In order to enable this unified
administration the following SNMP ports need to opened and forwarded on the Firewall and
NAT router (at each site that is being administered) respectively.
•
SNMP – UDP ports (161-162)
Interactions
For most centralized operations an administrator will connect to the primary node. For some
interactions, like setting the IP address on a remote node/server, the web browser will be redirected
to the specific node/server. To allow these functions it is necessary to configure the Firewall and
NAT rules at the remote node as documented in the “Remote Administration” section above.
IP
edge
Net
Benefits
A system with multiple independent IP
edge
nodes (and associated end points) can be logically
unified by networking the individual nodes together using IP
edge
Net. The primary benefit for
doing this is visibility and connectivity between any two end points irrespective of what node they
are connected to.
Requirements
•
IP
edge
Net
– From IP
edge
Enterprise Manager, IP
edge
Net connections need to be setup
between all the connected nodes.
•
VPN Connection
– If the individual nodes to be connected are separated across a public
network (Internet/WAN) a VPN connection needs to be setup for a successful IP
edge
Net
connection to be established between these nodes.
Interactions
IP Packets from phones on different IPedge Net nodes are relayed though the IPedge server; IP
packets for these communications are always sourced from one nodes IP address and destined to
the other node’s IP address. If these nodes are behind a firewall this communication would need to
be allowed.
Содержание ID EDGE
Страница 1: ...TOSHIBA Telecommunication Systems Division January 2012 General Description Title Page ...
Страница 6: ...This page is intentionally left blank ...
Страница 12: ...This page is intentionally left blank ...
Страница 24: ...This page is intentionally left blank ...
Страница 128: ...This page is intentionally left blank ...
Страница 134: ...This page is intentionally left blank ...
Страница 142: ...This is the last page of the document ...