3Com Version 4.3 Drums User Manual


 
Chapter 14. Firewall and Client Configuration
NAT between the Telecommuting Module and the Internet must not be used.
NAT between the Telecommuting Module and the internal networks must not be used.
The SIP clients
SIP clients will use the Telecommuting Module as their outgoing SIP proxy and as their registrar (if they can’t be
configured with the domain only). If you don’t want to use the Telecommuting Module as the registrar, you should
point the clients to the SIP registrar you want to use.
Other
The DNS server used must have a record for the SIP domain, which states that the Telecommuting Module handles
the domain, or many SIP clients won’t be able to use it (if you don’t use plain IP addresses as domains).
The DMZ/LAN type
Using the DMZ/LAN type, the network configuration should look like this:
The Firewall
The firewall to which the Telecommuting Module is connected should have the following configuration:
SIP over UDP
Let through UDP traffic between the Internet (all high ports) and the Telecommuting Module (port 5060). You
must allow traffic in both directions.
Let through UDP traffic between the Internet (all high ports) and the Telecommuting Module (the port interval
for media streams which was set on the Basic page). You must allow traffic in both directions.
Let through UDP traffic between the Telecommuting Module (all high ports) and the Internet (port 53). You must
allow traffic in both directions. This enables the Telecommuting Module to make DNS queries to DNS servers on
the Internet. If the DNS server is located on the same network as the Telecommuting Module, you don’t have to
do this step.
NAT between the Telecommuting Module and the Internet must not be used.
SIP over TCP/TLS
Let through TCP traffic between the Internet (all high ports) and the Telecommuting Module (ports 1024-32767).
You must allow traffic in both directions.
Let through UDP traffic between the Internet (all high ports) and the Telecommuting Module (the port interval
for media streams which was set on the Basic page). You must allow traffic in both directions.
Let through UDP traffic between the Telecommuting Module (all high ports) and the Internet (port 53). You must
allow traffic in both directions. This enables the Telecommuting Module to make DNS queries to DNS servers on
the Internet. If the DNS server is located on the same network as the Telecommuting Module, you don’t have to
do this step.
NAT between the Telecommuting Module and the Internet must not be used.
122