Network Security; Firewall Setup - Toshiba IPedge Installation Manual

Hide thumbs Also See for IPedge:
Table of Contents

Advertisement

NETWORK SECURITY

NETWORK SECURITY

FIREWALL SETUP

10-2
After the IPedge system is installed, the SIP Trunks and/or Remote IP
Telephones working, it is the responsibility of the installer and system user
to setup the firewall to help prevent unauthorized access.
While this can be accomplished in many ways one basic method is using
lists. For example; Cisco devices can be configured using ACL's (Access
control lists) and, in Sonicwall by setting up rules to Deny or allow specific
IP addresses, or other means in other firewalls.
For example; the firewall configuration could be set to only allow specific
IP's. Contact your SIP Provider for a list of the IP's their Signaling and
Media will use. For a remote IPT add the static IP to the safe list, if the
remote IPT is a dynamic IP you could list a range ips for use by the IPT, or
even better require the use of a hardware VPN for all remote phones and
software VPN for softphones that are roaming.
Any specific programming of firewall rules to secure access to the
network and IPedge server are the responsibility of the installing dealer
and/or customer and vary by the needs and level of protection determined
by the customer's IT department. Toshiba technical support does not
assume responsibility to provide specific commands or to verify a network
or specific IPedge server is secure.
This section discusses firewall setup.
Be sure that all of the port numbers from Step 2 above are programmed
into the fire wall, pointing to the IPedge server IP address.
Important!
When an IPedge server with HTTPS set is installed
behind a firewall ports 443 and 8443 must also be open.
Open port 8080 to allow the redirect to 8442. Open port
10000 to allow access to Webmin.
IPedge Configuration
Installation Manual
June, 2011

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents