Appendix F – Network Topology
®
®
INTER-TEL
AXXESS
8.3
tecture using two firewalls as shown in the following example. In this environment, the DMZ
is between the inside trusted network and the outside untrusted network. The security issues
are still the same, but the configuration is split between the two firewalls.
8.4
tion (NAT) function (described in "Terminology" on
are converted to public IP addresses as packets go out through the firewall. As a general rule,
IP telephony devices do not perform well without special considerations when the communica-
tions must pass through a device performing NAT.
Page F-10
MANUAL VERSION 11.0 – May 2008
In some environments, DMZs are implemented in what is referred to as a two-tier archi-
In addition to providing protection, firewalls also perform a Network Address Transla-
page
F-2) in which private IP addresses
Public (Untrusted) Networks