Page 1
Users must take full responsibility for their applications of any products specified in this document. The information in this document is proprietary to Nortel Networks. Nortel, Nortel (Logo), the Globemark, SL-1, Meridian 1, and Succession are trademarks of Nortel Networks.
Contents Audience Organization Conventions Related Documentation Overview C H A P T E R Voice Office Transformed Applications Security Deployment Planning Network Impacts Security Planning C H A P T E R Application Gateway Security Overview General Security Issues Application Gateway Security Solutions Authentication Secure Socket Layer Cookies and Secure Cookies...
Page 4
Contents Application Gateway Location Relative to a Firewall or Router Application Gateway Operation with a Router Network Impacts C H A P T E R N D E X Application Gateway Network Integration Guide...
Preface This preface describes who should read the Application Gateway Network Integration Guide, how it is organized, and its document conventions. Audience This installation guide is intended for IT professionals and other individuals responsible for determining how the Application Gateway is to integrate into a network.
Conventions Conventions This guide uses the following conventions: Convention Description boldface font Commands and HTML element names are in boldface. Information you must enter is in boldface screen boldface screen font font. Notes use the following conventions: Means reader take note. Notes contain helpful suggestions or other Note important information.
The Nortel Application Gateway delivers business applications to the screens and speakers of Internet-enabled IP telephones. The applications delivered to IP Phones include Nortel Voice Office applications and transformed business applications. Application Gateway Network Integration Guide...
Chapter 1 Overview Voice Office Voice Office Voice Office is a suite of packaged telephony applications that requires no development work. The Voice Office Application Suite enables enterprises to further leverage their IP telephony investments and increase workforce productivity by delivering converged applications to the screens and speakers of IP phones.
Chapter 1 Overview Transformed Applications Transformed Applications In addition to delivering Voice Office applications to IP phones, the Application Gateway also provides the ability to transform existing business applications for the screens of IP phones. Transformed applications are delivered to the screen of the device using the Application Gateway and are customized using the visual development toolkit, Design Studio.
Chapter 1 Overview Deployment Planning The Application Gateway fully complies with the security protocols used by other devices. For example, if your IP telephones support secure communications, the Application Gateway connection with the telephones will be secure. The Application Gateway uses only published interfaces to IP telephones and systems.
Chapter 1 Overview Network Impacts The Application Gateway must be able to contact the servers that have • the requested content. Content may be generated by servers on the local network and the Web. For a more information about Application Gateway deployment planning, Chapter 3, “Deployment Planning.”...
Chapter 2 Chapter Security Planning Security is a major issue in conducting any business. This chapter provides an overview of Application Gateway security. This chapter is not intended to be a comprehensive guide to planning a security strategy, as these issues will vary by organization.
Page 14
Chapter 2 Security Planning Application Gateway Security Overview The Application Gateway is a hardened application server and can be installed in any network with confidence that it introduces no additional security risks or liabilities. The Application Gateway has the following characteristics: It is not possible to determine what operating system is running on the •...
Chapter 2 Security Planning General Security Issues Supports digital certificates in Privacy Enhanced Mail (PEM) format • that include a private key. You should install on the Application Gateway a digital X.509 certificate that belongs to your company. This will ensure that all SSL transactions will pass with no error warnings to device users.
Page 16
Chapter 2 Security Planning General Security Issues against the protection of integrity and confidentiality. In addition, good security involves more than technology. Employees and partners must be aware of security issues, trained in best practices, and reminded often of the importance of security to their organization. To achieve data security, an organization must provide effective methods to ensure the following: Authentication—recognizing and verifying user identity...
Chapter 2 Security Planning Application Gateway Security Solutions Communications security is the protection of information during transmission from unauthorized or accidental modification, destruction, and disclosure. Since it can be difficult to prevent unauthorized access to signal transmissions, the best security often involves using some form of encryption.
Chapter 2 Security Planning Application Gateway Security Solutions The Application Gateway also protects the passwords that must be entered for connections to devices needed for operations, such as LDAP servers, SMTP servers, and so on. Any password entry required for such servers is not echoed to the screen during entry or during subsequent viewing of the configuration data, either on screen or in the system logs.
Chapter 2 Security Planning Application Gateway Security Solutions Cookies and Secure Cookies Many Internet sites do not allow entry unless cookies are enabled; many IP phones have no ability to accept cookies. Other solutions address this cookie management problem by caching cookies on the server and using some unique identifier, such as the device ID, to associate cookies with a particular user.
Chapter 3 Chapter Deployment Planning The following topics describe issues to consider when planning how to integrate the Application Gateway into your network and contain sample configurations for delivering applications to IP phones: Overview, page 15 Considerations for Integrating the Application Gateway into an IP Phone Enterprise, page 16 Overview One or more Application Gateways can be installed within a LAN...
Chapter 3 Deployment Planning Considerations for Integrating the Application Gateway into an IP Phone Enterprise The Application Gateway administration interface includes a variety of standard Linux monitoring applications to help you understand the networking from the Application Gateway to other devices. The monitoring applications include My traceroute, the Ethereal Network Analyzer, and xNetTools.
Chapter 3 Deployment Planning Considerations for Integrating the Application Gateway into an IP Phone Enterprise Location of Call Servers, IP Phones, and LDAP Servers Voice application operation requires that the Application Gateway is deployed on VLAN(s) that can connect to the following services simultaneously: call servers, call management servers, IP phones, and the LDAP servers used by the Application Gateway.
Chapter 3 Deployment Planning Considerations for Integrating the Application Gateway into an IP Phone Enterprise Phone service redundancy is also a consideration in the design of an installation. If a centralized soft switch topology fails due to a hardware or network outage, the IP telephones will be unable to see the IP address of the soft switch.
Chapter 3 Deployment Planning Considerations for Integrating the Application Gateway into an IP Phone Enterprise Sample Configurations The configuration samples included in this section describe how the Application Gateway operates in a some common network configurations. The network environment in which you are placing the Application Gateway will ultimately determine the best placement for the Application Gateway.
Page 26
Chapter 3 Deployment Planning Considerations for Integrating the Application Gateway into an IP Phone Enterprise When the Application Gateway straddles a firewall or is in front of a router, it will need routes for reaching any subnets that are not automatically available through your Default Gateway.
Page 27
Chapter 4 Chapter Network Impacts For best performance, the Application Gateway should be placed on the data VLAN. Voice Office traffic over the data VLAN will be prioritized lower than phone calls, which go over the voice VLAN. Use of Voice Office applications will have the following network impacts: Telephone registration with the Application Gateway is the equivalent •...
Page 28
Chapter 4 Network Impacts To determine expected bandwidth impact of broadcasting a message, use the following formula: (Number of broadcast messages in the busy hour) x (Average number of recipients) x (Average broadcast size, in bytes) x 85.6 Kbps Suppose that 5 broadcasts are sent during the busy hour to 10 recipients and that the broadcasts average 30 bytes in size.
Page 29
Index cookie management cookies access control Application Gateway and authentication buffer deployment clusters overview 4, 15 cookie management with firewall forced secure connections with router interfaces with server load balancer network impact Design Studio network location digital certificate support 9, 12 operating system operation with router application server...
Page 30
Index network impacts Visual Voicemail non-repudiation network impact Voice Office applications passwords port requirements Zone Paging Pre-Installation Checklist network impact privacy proxy servers security application authentication features IP phones of software upgrades overview system logs server load balancer connection, illustrated Smart Agent and performance session support...
Page 32
Users must take full responsibility for their applications of any products specified in this document. The information in this document is proprietary to Nortel Networks. Nortel, Nortel (Logo), the Globemark, SL-1, Meridian 1, and Succession are trademarks of Nortel Networks.
Need help?
Do you have a question about the 1000 and is the answer not in the manual?
Questions and answers