Nat , outbound proxy, Network, Subscribers . the – Siemens GIGASET C475 IP User Manual

Page 197: Ral network subscribers, Networks, H the network subscribers, L network subscribers, L network subscribers ar, Work, Network sub

Advertising
background image

196

Glossary

Gigaset C470-475 IP / EN for IM-Ost / A31008-xxxx-xxxx-x-xxxx / glossary.fm / 18.12.07

Ve

rs

ion 2.

1,

08.0

1.20

07

N

NAT

Network Address Translation

Method for converting (private) IP addresss to one or more (public) IP addresses. NAT

enables the IP addresses of Network subscriberss (e.g. VoIP telephones) in a LAN to be

concealed behind a shared IP address for the Router on the Internet.
VoIP telephones behind a NAT router cannot be reached by VoIP servers (on account of

the private IP address). In order to "get around" NAT, it is possible to use (alternatively)

ALG in the router, STUN in the VoIP telephone, or for the VoIP provider to use an Out-

bound proxy.
If an outbound proxy is made available you must allow for this in the VoIP settings for

your phone.

Network

Group of devices. Devices can be connected in either wired or wireless mode.
Networks can also differ in range and structure:
– Range: local networks (LAN) or wide-area networks (WAN)
– Structure: Infrastructure network or ad-hoc network

Network subscribers

Devices and computers that are connected to each other in a network, e.g. servers, PCs

and phones.

O

Outbound proxy

Alternative NAT control mechanism to STUN and ALG.
Outbound proxies are implemented by the VoIP provider in firewall/NAT environments

as an alternative to SIP proxy server. They control data traffic through the firewall.
Outbound proxy and STUN servers should not be used simultaneously.
See also: STUNand NAT.

P

Paging

(handset search)

A base station function to locate registered handsets. The base station establishes a con-

nection to every registered handset. The handsets start to ring. Paging is activated by

briefly pressing the button on the base station and is deactivated by briefly pressing the

same button again.

PIN

Personal Identification Number

Protects against unauthorised use. When the PIN is activated a number combination has

to be entered in order to access a protected area.
You can protect your base station configuration data with a system PIN (4-digit number

combination).

Port

Data is exchanged between two applications in a Network via a port.

Advertising
This manual is related to the following products: