RedMax EXtreme EX-LRT Guía para resolver problemas Pagina 13

  • Descarga
  • Añadir a mis manuales
  • Imprimir
  • Pagina
    / 142
  • Tabla de contenidos
  • SOLUCIÓN DE PROBLEMAS
  • MARCADORES
  • Valorado. / 5. Basado en revisión del cliente
Vista de pagina 12
Oracle SBC Security Guide
Part 2: Secure Installation and Configuration
Recommended Deployment Topologies
This section outlines the planning process for a secure installation and describes several recommended
deployment topologies for the system.
Session Border Controller
The SBC family products can be deployed following several generalized topology types; Peering
(sometimes called Trunking), Access (also called Hosted IP Services), and Hybrid which combines the
two models.
Peering
In a peering model the SBC is contacted by a SIP server to relay endpoint signaling information. The SIP
server may be a PBX, registrar, proxy, SBC, or other device. The IP of the device is usually trusted and
pre-provisioned in the SBC as an endpoint (session agent) that will be relaying calls. Since the remote
endpoint is already known, Access Control Lists (ACL) and Call Admission Controls (CAC) can be pre-
provisioned for the appropriate level of protection or service level assurance.
Vista de pagina 12
1 2 ... 8 9 10 11 12 13 14 15 16 17 18 ... 141 142

Comentarios a estos manuales

Sin comentarios