Figure 4-1 Nodes Behind A Firewall - Cisco ONS 15454 Series Procedure Manual

Hide thumbs Also See for ONS 15454 Series:
Table of Contents

Advertisement

NTP-A27 Set Up the ONS 15454 for Firewall Access
NTP-A27 Set Up the ONS 15454 for Firewall Access
Purpose
Tools/Equipment
Prerequisite Procedures
Required/As Needed
Onsite/Remote
Security Level
Log into a node that is behind the firewall. See the
Step 1
instructions. If you are already logged in, continue with Step 2.
Complete the
Step 2
Figure 4-1
For the computer to access the ONS 15454s, you must provision the IIOP listener port specified by your
firewall administrator on the ONS 15454.
Figure 4-1
CTC computer
If the CTC computer resides behind a firewall, complete the
Step 3
on the CTC Computer" task on page
Figure 4-2
ONS 15454, you must provision the IIOP port on the CTC computer and on the ONS 15454.
Cisco ONS 15454 Procedure Guide, R5.0
4-8
This procedure provisions ONS 15454s and CTC computers for access
through firewalls.
IIOP listener port number provided by your LAN or firewall administrator
NTP-A24 Verify Card Installation, page 4-2
As needed
Onsite or remote
Provisioning or higher
"DLP-A67 Provision the IIOP Listener Port on the ONS 15454" task on page
shows an ONS 15454 in a protected network and the CTC computer in an external network.
Nodes Behind a Firewall
Firewall
Unprotected
network
External network
shows a CTC computer and ONS 15454 behind firewalls. For the computer to access the
"DLP-A60 Log into CTC" task on page 17-66
Private
network
Port
filtering
Protected network
"DLP-A68 Provision the IIOP Listener Port
17-74.
Chapter 4
Turn Up Node
IIOP port
ONS 15454
IIOP port
ONS 15454
December 2004
for
17-74.

Advertisement

Table of Contents
loading

Table of Contents