Datatek UMI User Manual

Page 62

Advertising
background image

U N I V E R S A L M E D I A T I O N I N T E R F A C E ( U M I ) U S E R M A N U A L

04/30/09

62

vport 1 cnt=4 type=rcv hport=26 cug=+1

When

Endpoint A calls the UMI and TCP port number 26, access to the NE in the BNS network

is granted and everything proceeds transparently. If anyone outside CUG 1 (e.g.,

Endpoint B)

attempts to call the same TCP port, however, the following happens:

1. The call is terminated during authentication without any data being transported in either

direction.

2. An

authentication alarm is generated and sent to an attached Starkeeper, an attached

Telnet Console and the SNMP Trap Manager. The Alarm contains the IP address of the
remote endpoint that attempted the unauthorized access.

Endpoint B is given access to the BNS network in general by means of a separate hunt group on
the UMI with a different TCP port number, which has no corresponding CUG restriction on the
BNS network. This UMI hunt group might still have CUGs associated with it (for these two IP
endpoints) if there are other endpoints in the IP network which should be totally restricted from
accessing the BNS network.

Advertising