Nortel Meridian Meridian 1 Implementation Manual page 37

Meridian integrated conference bridge
Hide thumbs Also See for Meridian Meridian 1:
Table of Contents

Advertisement

Table 4 summarizes the recommended access permissions allowed by
the firewall. All other paths not in the table should be denied.
Table 4
Firewall access permissions
Source
WWW
C-LAN
MICB
MICB
MICB
Notes
Take the following notes into consideration:
Technically, a firewall can be configured to enforce these access
restrictions even when the MICB is in the C-LAN. However, a Green
and Red LAN is usually used, because it is safer.
Cards of a dual-MICB set must be in the same LAN segment, with
no restrictions between them.
When upgrading to this configuration from MICB2 to MICB3, MICB
IP parameters will change.
LAN/intranet access only
In this configuration, the MICB is not accessible from anywhere in the
World Wide Web (assuming this policy is enforced by the firewall).
There are two options for this type of configuration: C-LAN connection
and E-LAN connection.
Figure 7 on page 38
Meridian Integrated Conference Bridge
Destination
Protocol
MICB
HTTP
MICB
HTTP, FTP, TELNET
WWW
FTP (optional; allows upgrade from the
web)
C-LAN
FTP
Mail Server
SMTP
shows an example of the C-LAN connection.
Page 37 of 208
Service Implementation Guide

Advertisement

Table of Contents
loading

This manual is also suitable for:

Meridian 1Succession 1000m1000 con?guration guide

Table of Contents