Figure 4-2 Ctc Computer And Ons 15454 Sdh Nodes Residing Behind Firewalls; Prerequisite Procedures Ntp-D24 Verify Card Installation; Ntp- D28 Set Up Timing - Cisco ONS 15454 SDH Procedure Manual

Hide thumbs Also See for ONS 15454 SDH:
Table of Contents

Advertisement

Chapter 4
Turn Up a Node
Figure 4-1
CTC computer
If the CTC computer resides behind a firewall, complete the
Step 3
on the CTC Computer" task on page
Figure 4-2
the ONS 15454 SDH, you must provision the IIOP port on the CTC computer and on the
ONS 15454 SDH. Each firewall can use a different IIOP port.
Figure 4-2
CTC Computer and ONS 15454 SDH Nodes Residing Behind Firewalls
IIOP port
Private
network
CTC computer
filtering
Protected network
Stop. You have completed this procedure.
NTP-D28 Set Up Timing
Purpose
Tools/Equipment
Prerequisite Procedures
Required/As Needed
Onsite/Remote
Security Level
78-17194-01
ONS 15454 SDH Nodes Residing Behind a Firewall
Unprotected
network
External network
shows a CTC computer and ONS 15454 SDH behind firewalls. For the computer to access
Firewall
Unprotected
network
Port
External network
This procedure provisions the ONS 15454 SDH timing.
None
NTP-D24 Verify Card Installation, page 4-2
Required
Onsite or remote
Provisioning or higher
Firewall
Private
network
Port
filtering
Protected network
"DLP-D68 Provision the IIOP Listener Port
17-57.
Firewall
Private
network
Port
filtering
Protected network
Cisco ONS 15454 SDH Procedure Guide, R7.0

NTP- D28 Set Up Timing

IIOP port
ONS 15454 SDH
IIOP port
ONS 15454 SDH
IIOP port
ONS 15454 SDH
IIOP port
ONS 15454 SDH
4-9

Advertisement

Table of Contents
loading

Table of Contents