Planet Technology Internet Telephony PBX System IPX-300 Series User Manual
Page 44
44
Network Address
Translation
Enable/Disable NAT.
IPSec Pass Through
IPsec (Internet Protocol Security) is a framework for a set of protocols for
security at the network or packet processing layer of network
communication. Enable/Disable this framework verification.
PPTP Pass Through
PPTP (Point-to-Point Tunneling Protocol) is a protocol that allows
corporations to extend their own corporate network through private
"tunnels" over the public Internet. Enable/Disable this protocol verification.
L2TP Pass Through
L2TP (The Layer 2 Tunnel Protocol) is an emerging Internet Engineering
Task Force (IETF) standard that combines the best features of two
existing tunneling protocols: Cisco's Layer 2 Forwarding (L2F) and
Microsoft's Point-to-Point Tunneling Protocol (PPTP). L2TP is an
extension to the Point-to-Point Protocol (PPP), which is an important
component for VPNs. VPNs allow users and telecommuters to connect to
their corporate intranets or extranets. Enable/Disable this function.
SIP ALG
SIP, the Session Initiation Protocol, is a signaling protocol for Internet
conferencing, telephony, presence, events notification and instant
messaging. Enable/Disable this protocol verification.
DMZ
In computer networks, a DMZ (Demilitarized Zone) is a computer host or
small network inserted as a "neutral zone" between a company's private
network and the outside public network. It prevents outside users from
getting direct access to a server that has company dIP-PBX. Think of DMZ
as the front yard of your house. It belongs to you and you may put some
things there, but you would put anything valuable inside the house where
it can be properly secured. Setting up a DMZ is very easy. If you have
multiple computer s, you can choose to simply place one of the computers
between the Internet connection and the firewall.
DMZ IP LAN
If you have a computer that cannot run Internet applications properly from
behind the device, then you can allow the computer to have unrestricted
Internet access. Enter the IP address of that computer as a DMZ host with
unrestricted Internet access. Adding a client to the DMZ may expose that
computer to a variety of security risks; so only use this option as a last
resort.
Table 4-10. NAT description
¾
Virtual Server Mapping
The device can be configured as a virtual server so that remote users accessing services such as Web
or FTP services via the public (WAN) IP address can be automatically redirected to local servers in the