can join a conference hosted in the private network via the traversal server if there is an open
connection through the firewall.
A dedicated Avaya Equinox H.323 Edge offers external endpoints a static address when
joining conferences hosted in your organization. You can dial 1234@pathfinder.company.com
to access from outside the firewall, or you can dial 1234 directly if you deployed the Avaya
Equinox H.323 Edge Client.
Configure the Avaya Equinox H.323 Edge as the XT Series's gatekeeper and enable H.460.
• Using the XT Series for NAT and firewall traversal
In cases where your organization has no sophisticated firewall protection, the XT Series can
straddle the two network zones using the both network ports provided on the XT Codec Unit
(see
Figure 9: Using XT Series for NAT and Firewall Traversal on page 30).
Activate the second network port
with the correct license, then connect one port to the
public network and the other to your private network. All communication passes through the XT
Series which acts as the virtual conference room for all the endpoints.
Figure 9: Using XT Series for NAT and Firewall Traversal
A gatekeeper allows the XT Series to dial aliases instead of IP addresses for endpoints in the
private network, while for public endpoints, you must dial IP addresses. Without a gatekeeper,
all endpoints must be referenced using IP addresses.
Related links
Planning the Topology of the Avaya Scopia
®
XT Series Deployment on page 27
Planning the Topology of the Avaya Scopia
®
XT Series Deployment
January 2017 Avaya Scopia
®
XT Series Deployment Guide 30
Comments on this document? infodev@avaya.com