![Viola Systems M2M Скачать руководство пользователя страница 13](http://html.mh-extra.com/html/viola-systems/m2m/m2m_user-manual_1028865013.webp)
User Manual
Viola M2M Gateway Enterprise
Edition
Firmware Version 2.4
13
Document Version 3.0
2.3
Routing Setup
When the M2M Gateway is installed to the existing network, some
configuration is required to add the route to the M2M Gateway and devices
behind it. For example, local firewall to router needs to be aware of routes
going via the M2M Gateway. Routing can be complex to setup in large
networks and it is recommend to consult local network administrator also
about routing.
2.4
Other Network Services
M2M Gateway network services are listed in table 1. The only mandatory
service is Secure Shell (SSH). SSH server listen to the incoming connections
from Arctic devices in port 22 (default). This port must not be blocked by
any firewall otherwise the remote Arctic devices are not able to open VPN
connections to the M2M Gateway.
Arctic uses ICMP ECHO (ping) messages to check its network connection to
the M2M Gateway. By default, the private IP address of the VPN peer is used
as the target for the network connection status check. i.e. the M2M Gateway is
not required to accept ICMP ECHO messages.
The network connection status check can also be made using some public
IP address (e.g. the public IP address of the M2M Gateway). In this case the
target host of the network connection check is required to accept ICMP ECHO
messages and that they are not blocked by any firewall.
2.5
Recommended Network Setup
The M2M Gateway is recommended to be connected to a DMZ of a firewall.
This way the M2M Gateway can have public or private IP address depending
on the firewall configuration. When placed in DMZ, the firewall protects
efficiently against any unauthorized access to the M2M Gateway. Only
incoming SSH connections are required to have access to DMZ zone.
Services other than SSH are optional.
If the M2M Gateway is located in the DMZ and it has a private IP address,
the firewall has to support port forwarding or destination network address
translation (DNAT). For firewall configuration, please refer to your firewall
documentation or to your local network administrator.