Advertisement

Title page
Nortel Application Gateway 1000/2000
Nortel Application Gateway Release 6.1
Network Integration Guide
Planning
Document Number: NN42360-200
Document Release: Standard 01.04
Date: January 2007
Year Publish FCC TM
Copyright © 2007 Nortel Networks. All rights reserved.
Produced in Canada
The information in this document is subject to change without notice. The statements, configurations, technical
data, and recommendations in this document are believed to be accurate and reliable, but are presented
without express or implied warranty. Users must take full responsibility for their applications of any products
specified in this document. The information in this document is proprietary to Nortel Networks.
Nortel, Nortel (Logo), the Globemark, SL-1, Meridian 1, and Succession are trademarks of Nortel Networks.

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the 1000 and is the answer not in the manual?

Questions and answers

Subscribe to Our Youtube Channel

Summary of Contents for Nortel 1000

  • Page 1 Users must take full responsibility for their applications of any products specified in this document. The information in this document is proprietary to Nortel Networks. Nortel, Nortel (Logo), the Globemark, SL-1, Meridian 1, and Succession are trademarks of Nortel Networks.
  • Page 3: Table Of Contents

    Contents Audience Organization Conventions Related Documentation Overview C H A P T E R Voice Office Transformed Applications Security Deployment Planning Network Impacts Security Planning C H A P T E R Application Gateway Security Overview General Security Issues Application Gateway Security Solutions Authentication Secure Socket Layer Cookies and Secure Cookies...
  • Page 4 Contents Application Gateway Location Relative to a Firewall or Router Application Gateway Operation with a Router Network Impacts C H A P T E R N D E X Application Gateway Network Integration Guide...
  • Page 5: Audience

    Preface This preface describes who should read the Application Gateway Network Integration Guide, how it is organized, and its document conventions. Audience This installation guide is intended for IT professionals and other individuals responsible for determining how the Application Gateway is to integrate into a network.
  • Page 6: Conventions

    Conventions Conventions This guide uses the following conventions: Convention Description boldface font Commands and HTML element names are in boldface. Information you must enter is in boldface screen boldface screen font font. Notes use the following conventions: Means reader take note. Notes contain helpful suggestions or other Note important information.
  • Page 7: Chapter 1 Overview

    The Nortel Application Gateway delivers business applications to the screens and speakers of Internet-enabled IP telephones. The applications delivered to IP Phones include Nortel Voice Office applications and transformed business applications. Application Gateway Network Integration Guide...
  • Page 8: Voice Office

    Chapter 1 Overview Voice Office Voice Office Voice Office is a suite of packaged telephony applications that requires no development work. The Voice Office Application Suite enables enterprises to further leverage their IP telephony investments and increase workforce productivity by delivering converged applications to the screens and speakers of IP phones.
  • Page 9: Transformed Applications

    Chapter 1 Overview Transformed Applications Transformed Applications In addition to delivering Voice Office applications to IP phones, the Application Gateway also provides the ability to transform existing business applications for the screens of IP phones. Transformed applications are delivered to the screen of the device using the Application Gateway and are customized using the visual development toolkit, Design Studio.
  • Page 10: Deployment Planning

    Chapter 1 Overview Deployment Planning The Application Gateway fully complies with the security protocols used by other devices. For example, if your IP telephones support secure communications, the Application Gateway connection with the telephones will be secure. The Application Gateway uses only published interfaces to IP telephones and systems.
  • Page 11: Network Impacts

    Chapter 1 Overview Network Impacts The Application Gateway must be able to contact the servers that have • the requested content. Content may be generated by servers on the local network and the Web. For a more information about Application Gateway deployment planning, Chapter 3, “Deployment Planning.”...
  • Page 12 Chapter 1 Overview Network Impacts Application Gateway Network Integration Guide...
  • Page 13: Chapter 2 Security Planning

    Chapter 2 Chapter Security Planning Security is a major issue in conducting any business. This chapter provides an overview of Application Gateway security. This chapter is not intended to be a comprehensive guide to planning a security strategy, as these issues will vary by organization.
  • Page 14 Chapter 2 Security Planning Application Gateway Security Overview The Application Gateway is a hardened application server and can be installed in any network with confidence that it introduces no additional security risks or liabilities. The Application Gateway has the following characteristics: It is not possible to determine what operating system is running on the •...
  • Page 15: General Security Issues

    Chapter 2 Security Planning General Security Issues Supports digital certificates in Privacy Enhanced Mail (PEM) format • that include a private key. You should install on the Application Gateway a digital X.509 certificate that belongs to your company. This will ensure that all SSL transactions will pass with no error warnings to device users.
  • Page 16 Chapter 2 Security Planning General Security Issues against the protection of integrity and confidentiality. In addition, good security involves more than technology. Employees and partners must be aware of security issues, trained in best practices, and reminded often of the importance of security to their organization. To achieve data security, an organization must provide effective methods to ensure the following: Authentication—recognizing and verifying user identity...
  • Page 17: Application Gateway Security Solutions

    Chapter 2 Security Planning Application Gateway Security Solutions Communications security is the protection of information during transmission from unauthorized or accidental modification, destruction, and disclosure. Since it can be difficult to prevent unauthorized access to signal transmissions, the best security often involves using some form of encryption.
  • Page 18: Secure Socket Layer

    Chapter 2 Security Planning Application Gateway Security Solutions The Application Gateway also protects the passwords that must be entered for connections to devices needed for operations, such as LDAP servers, SMTP servers, and so on. Any password entry required for such servers is not echoed to the screen during entry or during subsequent viewing of the configuration data, either on screen or in the system logs.
  • Page 19: Cookies And Secure Cookies

    Chapter 2 Security Planning Application Gateway Security Solutions Cookies and Secure Cookies Many Internet sites do not allow entry unless cookies are enabled; many IP phones have no ability to accept cookies. Other solutions address this cookie management problem by caching cookies on the server and using some unique identifier, such as the device ID, to associate cookies with a particular user.
  • Page 20 Chapter 2 Security Planning Application Gateway Security Solutions Application Gateway Network Integration Guide...
  • Page 21: Chapter 3 Deployment Planning

    Chapter 3 Chapter Deployment Planning The following topics describe issues to consider when planning how to integrate the Application Gateway into your network and contain sample configurations for delivering applications to IP phones: Overview, page 15 Considerations for Integrating the Application Gateway into an IP Phone Enterprise, page 16 Overview One or more Application Gateways can be installed within a LAN...
  • Page 22: The Application Gateway Pre-Installation Checklist

    Chapter 3 Deployment Planning Considerations for Integrating the Application Gateway into an IP Phone Enterprise The Application Gateway administration interface includes a variety of standard Linux monitoring applications to help you understand the networking from the Application Gateway to other devices. The monitoring applications include My traceroute, the Ethereal Network Analyzer, and xNetTools.
  • Page 23: Location Of Call Servers, Ip Phones, And Ldap Servers

    Chapter 3 Deployment Planning Considerations for Integrating the Application Gateway into an IP Phone Enterprise Location of Call Servers, IP Phones, and LDAP Servers Voice application operation requires that the Application Gateway is deployed on VLAN(s) that can connect to the following services simultaneously: call servers, call management servers, IP phones, and the LDAP servers used by the Application Gateway.
  • Page 24: Relative Performance Of Network Segments

    Chapter 3 Deployment Planning Considerations for Integrating the Application Gateway into an IP Phone Enterprise Phone service redundancy is also a consideration in the design of an installation. If a centralized soft switch topology fails due to a hardware or network outage, the IP telephones will be unable to see the IP address of the soft switch.
  • Page 25: Sample Configurations

    Chapter 3 Deployment Planning Considerations for Integrating the Application Gateway into an IP Phone Enterprise Sample Configurations The configuration samples included in this section describe how the Application Gateway operates in a some common network configurations. The network environment in which you are placing the Application Gateway will ultimately determine the best placement for the Application Gateway.
  • Page 26 Chapter 3 Deployment Planning Considerations for Integrating the Application Gateway into an IP Phone Enterprise When the Application Gateway straddles a firewall or is in front of a router, it will need routes for reaching any subnets that are not automatically available through your Default Gateway.
  • Page 27 Chapter 4 Chapter Network Impacts For best performance, the Application Gateway should be placed on the data VLAN. Voice Office traffic over the data VLAN will be prioritized lower than phone calls, which go over the voice VLAN. Use of Voice Office applications will have the following network impacts: Telephone registration with the Application Gateway is the equivalent •...
  • Page 28 Chapter 4 Network Impacts To determine expected bandwidth impact of broadcasting a message, use the following formula: (Number of broadcast messages in the busy hour) x (Average number of recipients) x (Average broadcast size, in bytes) x 85.6 Kbps Suppose that 5 broadcasts are sent during the busy hour to 10 recipients and that the broadcasts average 30 bytes in size.
  • Page 29 Index cookie management cookies access control Application Gateway and authentication buffer deployment clusters overview 4, 15 cookie management with firewall forced secure connections with router interfaces with server load balancer network impact Design Studio network location digital certificate support 9, 12 operating system operation with router application server...
  • Page 30 Index network impacts Visual Voicemail non-repudiation network impact Voice Office applications passwords port requirements Zone Paging Pre-Installation Checklist network impact privacy proxy servers security application authentication features IP phones of software upgrades overview system logs server load balancer connection, illustrated Smart Agent and performance session support...
  • Page 32 Users must take full responsibility for their applications of any products specified in this document. The information in this document is proprietary to Nortel Networks. Nortel, Nortel (Logo), the Globemark, SL-1, Meridian 1, and Succession are trademarks of Nortel Networks.

This manual is also suitable for:

2000

Table of Contents