4-9
Cisco ONS 15454 SDH Procedure Guide, R7.0
78-17194-01
Chapter 4 Turn Up a Node
NTP- D28 Set Up Timing
Figure 4-1 ONS 15454 SDH Nodes Residing Behind a Firewall
Step 3
If the CTC computer resides behind a firewall, complete the “DLP-D68 Provision the IIOP Listener Port
on the CTC Computer” task on page 17-57.
Figure 4-2 shows a CTC computer and ONS 15454 SDH behind firewalls. For the computer to access
the ONS 15454 SDH, you must provision the IIOP port on the CTC computer and on the
ONS 15454 SDH. Each firewall can use a different IIOP port.
Figure 4-2 CTC Computer and ONS 15454 SDH Nodes Residing Behind Firewalls
Stop. You have completed this procedure.
NTP-D28 Set Up Timing
61331
CTC computer
External network Protected network
ONS 15454 SDH
Unprotected
network
Private
network
IIOP port
IIOP port
Firewall
Port
filtering
ONS 15454 SDH
61330
CTC computer
Firewall
Port
filtering
Protected network External network Protected network
ONS 15454 SDH
Private
network
Unprotected
network
Private
network
IIOP port
IIOP port
IIOP port
Firewall
Port
filtering
ONS 15454 SDH
Purpose This procedure provisions the ONS 15454 SDH timing.
Tools/Equipment None
Prerequisite Procedures NTP-D24 Verify Card Installation, page 4-2
Required/As Needed Required
Onsite/Remote Onsite or remote
Security Level Provisioning or higher