![](//vs1.manuzoid.com/store/data-gzf/fb5f864bd1785b06139e47ef62fec1f5/2/001978917.htmlex.zip/bge.jpg)
Polycom RealPresence Access Director System Solution Deployment Guide
6 Polycom, Inc.
In this implementation:
• The outside firewall, which resides between the WAN (Untrust) and the
RealPresence Access Director system in the DMZ, must be in Destination
NAT mode. In this mode:
— When inbound packets from the WAN pass through the firewall, it
translates the destination IP address to that of the RealPresence Access
Director system.
— When outbound packets from the enterprise network pass through
the firewall, it translates the source IP address to the outside IP
address of the firewall system.
— A static and direct 1:1 NAT mapping is recommended for the outside
firewall.
• The inside firewall, which resides between the RealPresence Access
Director system in the DMZ and the LAN (Trust), must be in Route mode.
In this mode, the firewall does not change the destination or source IP
address, so no translation is required or supported.
This approach takes advantage of the firewall’s security functionality.
However, because all media and signaling traffic flows through the firewall,
performance can be affected.
A RealPresence Access Director system that uses at least two network
interfaces can be deployed in a “two-legged” configuration. In this scenario,
SIP and H.323 signaling and media traffic are split between the interfaces to
separate external and internal traffic.
Deployment in a Tunnel Environment
Two RealPresence Access Director systems can be deployed to tunnel traffic to
and from the inside network. In this model, one system acts as the tunnel
server and is deployed in the corporate back-to-back DMZ. The other system
serves as a tunnel client and is deployed behind the inside firewall.
Communication between the tunnel server and the tunnel client is through
UDP transmission.
In this scenario, the tunnel server can forward all traffic through one open port
on the inside firewall. If necessary, based on the firewall policy, the tunnel
client can also send all traffic through one open port on the inside firewall.
Other Deployment Models
If you have a three-legged firewall (one with at least three network interfaces),
the same firewall can separate the RealPresence Access Director system in the
DMZ from both the internal LAN and the Internet. Note that in this
configuration, not all firewall traffic goes through the RealPresence Access
Director system.