Valid 300-206 Dumps shared by ExamDiscuss.com for Helping Passing 300-206 Exam! ExamDiscuss.com now offer the newest 300-206 exam dumps, the ExamDiscuss.com 300-206 exam questions have been updated and answers have been corrected get the newest ExamDiscuss.com 300-206 dumps with Test Engine here:
Access 300-206 Dumps Premium Version
(175 Q&As Dumps, 35%OFF Special Discount Code: freecram)
Recent Comments (The most recent comments are at the top.)
Firewall traversal for end-to end VoIP calls poses several problems:
o VoIP protocols use many ports for a single communication session. It is not possible to configure static rules for a large range of ports.
o Limiting the RTP port range is not supported by most endpoints.
o An application layer gateway (ALG) can be costly in terms of system resources and maintenance.
Cisco Unified Communications Trusted Firewall Control pushes services onto the network through a Trusted Relay Point (TRP) firewall. Firewall traversal is accomplished using Session Traversal Utilities for NAT(STUN) on a TRP colocated with a Cisco Unified Communications Manager Express (Cisco Unified CME) or a Cisco Unified Border Element.
- Cisco Unified Communications Trusted Firewall Control is supported on the Cisco 1861, 2801, 2811, 2821, 2851, 3825, and 3845 platforms.
Cisco Unified Communications Trusted Firewall Control builds intelligence into the firewall so that it can open a pinhole (a port that is opened through a firewall to allow a particular application access to the protected network) dynamically when it receives a STUN request for a media flow. This request is authenticated/authorized by the firewall to ensure that it opens pinholes only for genuine calls.
STUN = Session Traversal Utilities for NAT
- The protocol requires assistance from a third-party network server (STUN server) located on the opposing (public) side of the NAT, usually the public Internet.
- STUN is a tool for communications protocols to detect and traverse network address translators that are located in the path between two endpoints of communication. It is implemented as a light-weight client-server protocol, requiring only simple query and response components with a third-party server located on the common, easily accessible network, typically the Internet (FW – Trusted Relay Point).
- The client side is implemented in the user's communications application, such as a Voice over Internet Protocol (VoIP) phone or an instant messaging client.