Nat , outbound proxy, Network, Subscribers . the – Siemens GIGASET C475 IP User Manual
Page 197: Ral network subscribers, Networks, H the network subscribers, L network subscribers, L network subscribers ar, Work, Network sub
196
Glossary
Gigaset C470-475 IP / EN for IM-Ost / A31008-xxxx-xxxx-x-xxxx / glossary.fm / 18.12.07
Ve
rs
ion 2.
1,
08.0
1.20
07
N
NAT
Network Address Translation
Method for converting (private) IP addresss to one or more (public) IP addresses. NAT
enables the IP addresses of Network subscriberss (e.g. VoIP telephones) in a LAN to be
concealed behind a shared IP address for the Router on the Internet.
VoIP telephones behind a NAT router cannot be reached by VoIP servers (on account of
the private IP address). In order to "get around" NAT, it is possible to use (alternatively)
ALG in the router, STUN in the VoIP telephone, or for the VoIP provider to use an Out-
bound proxy.
If an outbound proxy is made available you must allow for this in the VoIP settings for
your phone.
Network
Group of devices. Devices can be connected in either wired or wireless mode.
Networks can also differ in range and structure:
– Range: local networks (LAN) or wide-area networks (WAN)
– Structure: Infrastructure network or ad-hoc network
Network subscribers
Devices and computers that are connected to each other in a network, e.g. servers, PCs
and phones.
O
Outbound proxy
Alternative NAT control mechanism to STUN and ALG.
Outbound proxies are implemented by the VoIP provider in firewall/NAT environments
as an alternative to SIP proxy server. They control data traffic through the firewall.
Outbound proxy and STUN servers should not be used simultaneously.
See also: STUNand NAT.
P
Paging
(handset search)
A base station function to locate registered handsets. The base station establishes a con-
nection to every registered handset. The handsets start to ring. Paging is activated by
briefly pressing the button on the base station and is deactivated by briefly pressing the
same button again.
PIN
Personal Identification Number
Protects against unauthorised use. When the PIN is activated a number combination has
to be entered in order to access a protected area.
You can protect your base station configuration data with a system PIN (4-digit number
combination).
Port
Data is exchanged between two applications in a Network via a port.