Public (Untrusted) Networks - Inter-Tel AXXESS Manual

Hide thumbs Also See for AXXESS:
Table of Contents

Advertisement

Appendix F – Network Topology
®
®
INTER-TEL
AXXESS
8.3
tecture using two firewalls as shown in the following example. In this environment, the DMZ
is between the inside trusted network and the outside untrusted network. The security issues
are still the same, but the configuration is split between the two firewalls.
8.4
tion (NAT) function (described in "Terminology" on
are converted to public IP addresses as packets go out through the firewall. As a general rule,
IP telephony devices do not perform well without special considerations when the communica-
tions must pass through a device performing NAT.
Page F-10
MANUAL VERSION 11.0 – May 2008
In some environments, DMZs are implemented in what is referred to as a two-tier archi-
In addition to providing protection, firewalls also perform a Network Address Transla-
page
F-2) in which private IP addresses

Public (Untrusted) Networks

Advertisement

Table of Contents
loading

Table of Contents