3. Click OK
Example 6.11. Configuring remote offices for H.323
If the branch and remote office H.323 phones and applications are to be configured to use the H.323 Gatekeeper
at the head office, the NetDefend Firewalls in the remote and branch offices should be configured as follows: (this
rule should be in both the Branch and Remote Office firewalls).
Web Interface
1. Go to Rules > IP Rules > Add > IPRule
2. Now enter:
• Name: ToGK
• Action: Allow
• Service: H323-Gatekeeper
• Source Interface: lan
• Destination Interface: vpn-hq
• Source Network: lannet
• Destination Network: hq-net
• Comment: Allow communication with the Gatekeeper connected to the Head Office DMZ
3. Click OK
Example 6.12. Allowing the H.323 Gateway to register with the Gatekeeper
The branch office NetDefend Firewall has a H.323 Gateway connected to its DMZ. In order to allow the Gateway
to register with the H.323 Gatekeeper at the Head Office, the following rule has to be configured:
Web Interface
1. Go to Rules > IP Rules > Add > IPRule
2. Now enter:
• Name: GWToGK
• Action: Allow
• Service: H323-Gatekeeper
• Source Interface: dmz
• Destination Interface: vpn-hq
• Source Network: ip-branchgw
• Destination Network: hq-net
• Comment: Allow the Gateway to communicate with the Gatekeeper connected to the Head Office
3. Click OK
Note: Outgoing calls do not need a specific rule
There is no need to specify a specific rule for outgoing calls. NetDefendOS monitors
6.2.9. The H.323 ALG Chapter 6. Security Mechanisms
288