beautypg.com

Peering proxy, How peering proxy works, Peering proxy –43 – Polycom V2IU 4350 User Manual

Page 61: How peering proxy works –43

background image

Configuring the V2IU 4350

3 - 43

Any: for the specified network, allows all ports and protocols through

the system. No ports are required because not all protocols support

the concept of ports.

Port or Port Range: The port number or port range allowed through the
system when UDP or TCP are selected. A port range is specified by
separating the starting and ending ports with a colon ':' (for example,
22:80). The ports parameter is not supported when you select Any
protocol because not all protocols support the concept of ports.

4.

When you have finished entering this information, click Add.

5.

Click OK. The new forwarding entry appears on the Forwarding Rules
window in the list area.

Peering Proxy

H.323 prefixes can be used to route calls based on a matching prefix in the

destination alias of the call. Each prefix is associated with a domain name or IP

address to send the call to in case the prefix matches.
The prefixes are searched in order, that is, the first prefix is tried first, and then

the next one on the list until the system finds a matching prefix. This means

that if there are multiple matching prefixes, the first one is used.

How Peering Proxy Works

The Polycom V

2

IU 4350 supports the concept of an H.323 Peering Proxy. This

function provides advanced security layers or peering points within the

network where a security layer is needed. Peering Proxy allows network

providers to add internetworking connections between their “trusted”

network and an unknown network. This topology hides their trusted network

and the Stateful packet inspection Firewall provides the policies to ensure

security. You can add Peering Proxies in series with one another to push the

core H.323 networking infrastructure to meet individual security

requirements.
The illustration below shows a sample diagram with dial plan and call flow

examples. It is a snapshot of how the Peering Proxy can be deployed. Peering

Proxy however, is not limited to this specific scenario, so contact your Polycom

representative to discuss specific network requirements for full Peering Proxy

support.