Web Management - Branch-To-Branch; Branch-To-Branch Setup; Secruity Channel - Planet UMG-2000 User Manual

Unified office
Hide thumbs Also See for UMG-2000:
Table of Contents

Advertisement

13. Web Management - Branch-to-Branch

The Branch-to-Branch is a solution for building a company intranet which provides the
ability to build a secure intranet, share data, setup voice link, and manage remote IT
resources between all your branches by using the Internet. First, a reliable, secure, and
auto recoverable connection is built between the different branches via the Internet or your
private network. Second, an intranet which can only be accessed by authorized users,
especially for the numbers or employees of the organization will be built based on this
connection. Third, the VoIP switching and data synchronization systems are automatically
setup for inter-branch communication. Finally, a centralized configuration management
platform for the administrator to organize and manage all data and resources within the
whole intranet is implemented. When the enabling the Branch-to-Branch feature, the
UMG-2000 can be in only one of the following modes.
STANDALONE
Standalone is a standby mode when the Branch-to-Branch feature is disabled.
HEADQUARTER
Headquarter is a server or master mode. The UMG-2000 in this mode will be the master
node in this group.
DIVISION
Division is a client or slave mode. The UMG-2000 in this mode will be a slave node in the
group and can be managed by its headquarter.

13.1 Branch-to-Branch Setup

If you want to setup up Branch-to-Branch, you must connect the UMG-2000 to the Internet
or your private network. Choose one system as the headquarter (server) of this group and
others as divisions (clients). Refer to Section - Branch-to-Branch Setting to setup the
configuration.

13.2 Secruity Channel

Once Branch-to-Branch is setup, the secure Intranet will be built automatically. To setup the
connection, both the headquarter and divisions will negotiate and SSL will be used for the
authentication to protect from any Internet threats. Then a VPN channel is built for the
encryption data transmission and this secure channel will be maintained until the physical
network link is down or disconnected manually.
91

Advertisement

Table of Contents
loading

Table of Contents