R
rockdrummer
Guest
I finally took the Sorenson router out of my configuration. It’s not that it’s a bad router its just that it’s only minimally configurable and there are bugs in the user interface. I was not able to configure the firewall features and for me that was a problem.
So I put my Linksys firewall/router back on the network. Some things I learned in the process.
Assign a static IP address to the VP. Don't use DHCP unless you have a reservation set for the VP.
The placement of the VP with regard to the firewall can be set up in one of two ways (maybe more). You can either put the VP on the DMZ (de-milatarized zone) or you can configure your firewall to allow for inbound and outbound ports and services as follows;
Inbound ports
1720 TCP
15328-15333 TCP and UDP
Outbound ports
1024-65535 TCP and UDP
Services
FTP port 21
LDAP port 389
HTTP port 80
The DMZ option is the eaisest but the least secure. Technically someone could hack, corrupt or launch a DOS (denial of service) attack on your VP. Remember the DMZ is not protected by the firewall.
I am a bit new to VP technology but I understand this. The firewall configuration above should work for Sorenson VP’s and other vendors as well. That statement assumes that you can make point to point calls between Sorenson VP’s and other vendors VP’s. I think you can but I have never had the opportunity to try it. I guess I need more friends with VP's
Anyway, with what I learned combined with my background I just thought I might be able to offer some assistance if anyone is having problems.
So I put my Linksys firewall/router back on the network. Some things I learned in the process.
Assign a static IP address to the VP. Don't use DHCP unless you have a reservation set for the VP.
The placement of the VP with regard to the firewall can be set up in one of two ways (maybe more). You can either put the VP on the DMZ (de-milatarized zone) or you can configure your firewall to allow for inbound and outbound ports and services as follows;
Inbound ports
1720 TCP
15328-15333 TCP and UDP
Outbound ports
1024-65535 TCP and UDP
Services
FTP port 21
LDAP port 389
HTTP port 80
The DMZ option is the eaisest but the least secure. Technically someone could hack, corrupt or launch a DOS (denial of service) attack on your VP. Remember the DMZ is not protected by the firewall.
I am a bit new to VP technology but I understand this. The firewall configuration above should work for Sorenson VP’s and other vendors as well. That statement assumes that you can make point to point calls between Sorenson VP’s and other vendors VP’s. I think you can but I have never had the opportunity to try it. I guess I need more friends with VP's
Anyway, with what I learned combined with my background I just thought I might be able to offer some assistance if anyone is having problems.
Last edited by a moderator: