•
Source Network: branch-net
•
Destination Interface: dmz
•
Destination Network: ip-gatekeeper, ip-gateway
•
Service: my_h323_gatekeeper_service
•
Comment: Allow communication with the gatekeeper on DMZ from the branch
network.
3.
Click OK
Create an IP rule for traffic from the VPN to the gatekeeper:
1.
Go to: Policies > Firewalling > Main IP Rules > Add > IP Rule
2.
Now enter:
•
Name: BranchToGW
•
Action: Allow
•
Source Interface: vpn-remote
•
Source Network: remote-net
•
Destination Interface: dmz
•
Destination Network: ip-gatekeeper
•
Service: my_h323_gatekeeper_service
•
Comment: Allow communication with the gatekeeper on DMZ from the remote
network.
3.
Click OK
Example 6.17. Configuring remote offices for H.323
If the branch and remote office H.323 phones and applications are to be configured to use the
H.323 gatekeeper at the head office, the NetDefend Firewalls in the remote and branch offices
should be configured as follows:
Here, the interface called vpn-hq is the VPN tunnel to the network hq-net located at
headquarters.
Note: This IP rule/policy should exist in both the branch and remote office NetDefendOS
configurations.
Web Interface
1.
Go to: Policies > Firewalling > Main IP Rules > Add > IP Rule
498
Chapter 6: Security Mechanisms