Configuring Remote Offices For H.323 - D-Link NetDefendOS User Manual

Network security firewall
Hide thumbs Also See for NetDefendOS:
Table of Contents

Advertisement

Source Network: branch-net
Destination Interface: dmz
Destination Network: ip-gatekeeper, ip-gateway
Service: my_h323_gatekeeper_service
Comment: Allow communication with the gatekeeper on DMZ from the branch
network.
3.
Click OK
Create an IP rule for traffic from the VPN to the gatekeeper:
1.
Go to: Policies > Firewalling > Main IP Rules > Add > IP Rule
2.
Now enter:
Name: BranchToGW
Action: Allow
Source Interface: vpn-remote
Source Network: remote-net
Destination Interface: dmz
Destination Network: ip-gatekeeper
Service: my_h323_gatekeeper_service
Comment: Allow communication with the gatekeeper on DMZ from the remote
network.
3.
Click OK
Example 6.17. Configuring remote offices for H.323
If the branch and remote office H.323 phones and applications are to be configured to use the
H.323 gatekeeper at the head office, the NetDefend Firewalls in the remote and branch offices
should be configured as follows:
Here, the interface called vpn-hq is the VPN tunnel to the network hq-net located at
headquarters.
Note: This IP rule/policy should exist in both the branch and remote office NetDefendOS
configurations.
Web Interface
1.
Go to: Policies > Firewalling > Main IP Rules > Add > IP Rule
498
Chapter 6: Security Mechanisms

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents