Справочник Пользователя для SonicWALL 5.8.1

Скачать
Страница из 1490
VoIP Settings
825
SonicOS 5.8.1 Administrator Guide
  •
Server Address Objects - The wizard creates the address object for the new server. 
Because the IP address of the server added in the example is in the IP address range 
assigned to the LAN zone, the wizard binds the address object to the LAN zone. 
  •
Server Service Group Object - The wizard creates a service group object for the services 
used by the new server. 
  •
Server NAT Policies - The wizard creates a NAT policy to translate the destination 
addresses of all incoming packets with one of the services in the new service group and 
addressed to the WAN address to the address of the new server. The wizard also creates 
a Loopback NAT policy
  •
Server Access Rules - The wizard creates an access policy allowing all traffic to the WAN 
Primary IP for the new service.
Step 11
Click Accept in the Public Server Configuration Summary page to complete the wizard and 
apply the configuration to your SonicWALL. 
Tip
The new IP address used to access the new server, both internally and externally, is 
displayed in the URL field of the Congratulations window. 
Step 12
Click Close to close the wizard.
Configuring VoIP Logging
You can enable the logging of VoIP events in the SonicWALL security appliance log in the Log 
> Categories
 page. Log entries are displayed on the Log > View page. To enable logging:
Step 1
Select Log > Categories.
Step 2
Select Expanded Categories from the View Style menu in the Log Categories section. 
Step 3
Locate the VoIP (VOIP H.323/RAS, H.323/H.225, H.323/H.245 activity) entry in the table. 
Step 4
Select Log to enable the display of VoIP log events in on the Log > View page.
Step 5
Select Alerts to enable the sending of alerts for the category.
Step 6
Select Syslog to enable the capture of the log events into the SonicWALL security appliance 
Syslog.
Step 7
Click Accept.
VoIP Deployment Scenarios
SonicWALL security appliances can be deployed VoIP devices can be deployed in a variety of 
network configurations. This section describes the following deployment scenarios:
  •
  •
  •
  •