Chapter 4
Turn Up a Node
Figure 4-1
CTC computer
If the CTC computer resides behind a firewall, complete the
Step 3
on the CTC Computer" task on page
Figure 4-2
the ONS 15454 SDH, you must provision the IIOP port on the CTC computer and on the
ONS 15454 SDH. Each firewall can use a different IIOP port.
Figure 4-2
CTC Computer and ONS 15454 SDH Nodes Residing Behind Firewalls
IIOP port
Private
network
CTC computer
filtering
Protected network
Stop. You have completed this procedure.
NTP-D28 Set Up Timing
Purpose
Tools/Equipment
Prerequisite Procedures
Required/As Needed
Onsite/Remote
Security Level
78-17194-01
ONS 15454 SDH Nodes Residing Behind a Firewall
Unprotected
network
External network
shows a CTC computer and ONS 15454 SDH behind firewalls. For the computer to access
Firewall
Unprotected
network
Port
External network
This procedure provisions the ONS 15454 SDH timing.
None
NTP-D24 Verify Card Installation, page 4-2
Required
Onsite or remote
Provisioning or higher
Firewall
Private
network
Port
filtering
Protected network
"DLP-D68 Provision the IIOP Listener Port
17-57.
Firewall
Private
network
Port
filtering
Protected network
Cisco ONS 15454 SDH Procedure Guide, R7.0
NTP- D28 Set Up Timing
IIOP port
ONS 15454 SDH
IIOP port
ONS 15454 SDH
IIOP port
ONS 15454 SDH
IIOP port
ONS 15454 SDH
4-9