IP Network Interface

 

 

On the rear of the IMG 2020 are three redundant ethernet interfaces labeled CTRL 0/1, DATA A0/A1, and DATA B0/B1. Each of these interfaces can be configured so that they can pass IP packets. When configured, the interfaces can pass IP information for Services such as SIP or H.323 Signaling, Multimedia signaling, M3UA Signaling, NFS, RADIUS, and SNMP. The interfaces can also be configured to pass Media Info such as audio (RTP) or video data. Each individual interface is configured under the IP Network > Logical Interfaces object. Within the IP Network object, the IP Firewall field enables and disables the Denial Of Service functionality. To create the IP Network object, right click on the IMG 2020 physical node object and select New Network.

Web GUI Page

Dialogic > IMG 2020 > New Network

Related Topics and Dependencies

Physical Node - Direct Connect

Physical Node - Multinode

Logical Interfaces

Logical Interface

Configure Network Interfaces

Maximum Objects

One IP Network object can be created per IMG 2020 (physical node) object.

Field Descriptions

IP Firewall

The IP Firewall field enables and disables the Denial Of Service functionality. It is not recommended that the IP Firewall be disabled since this will make the system susceptible to various DoS attacks. Disabling the firewall should be done for troubleshooting purposes only.

Enable (Default) - Enables the Denial Of Service functionality.

Disable - Disables the Denial Of Service functionality. The IMG 2020 is now susceptible to IP attacks through any of the CPU based Services. Refer to the Denial of Service (DoS/DDoS) topic for more information on what a CPU based service entails.

Preferred Network Port

The Preferred Network Port field enables and disables the preferred network port functionality.

Disable (Default) - Disables the preferred network port functionality.

UsePort0 - If set to UsePort0, the 0 interfaces will be the preferred network ports. CRTL 0, DATA A0, and DATA B0 are the preferred ports for the network interfaces.

UsePort1 - If set to UsePort1, the 1 interfaces will be the preferred network ports. CRTL 1, DATA A1, and DATA B1 are the preferred ports for the network interfaces.

TLS1.2 Cipher String for HTTPS

This setting specifies the cipher suites to be allowed for HTTPS service.

HIGH:!aNULL:!eNULL (Default) - Includes encryption cipher suites with key lengths larger than 128 bits. It also includes some 128 bits key lenght cipher suites except the ones with no encryption (eNULL) and no authentication (aNULL). The following cipher suites will then be accepted on IMG2020.

TLS_RSA_WITH_AES_128_CBC_SHA256
TLS_RSA_WITH_AES_256_CBC_SHA256
TLS_RSA_WITH_AES_128_GCM_SHA256
TLS_RSA_WITH_AES_256_GCM_SHA384

AES128-GCM-SHA256 - Specifies IMG2020 to use this specific cipher suite.

AES256-GCM-SHA384 - Specifies IMG2020 to use this specific cipher suite.

AES128-GCM-SHA256:AES256-GCM-SHA384 - Specifies IMG2020 to use these two specfic cipher suites.

ALL:!aNULL:!eNULL - Includes all ciphers except the ones with no encryption (eNULL) and no authentication (aNULL). The following cipher suites will then be accepted on IMG2020.

TLS_RSA_WITH_3DES_EDE_CBC_SHA
TLS_RSA_WITH_AES_128_CBC_SHA256
TLS_RSA_WITH_AES_256_CBC_SHA256
TLS_RSA_WITH_AES_128_GCM_SHA256
TLS_RSA_WITH_AES_256_GCM_SHA384

TLS1.2 Only

Possibility to restrict the connection to TLS version 1.2

Enable - Connection is restricted to TLS version 1.2 only.

Disable (Default) - Connection is not restricted to TLS version 1.2 only.

Return to Documentation Home I Return to Sangoma Support