Author Topic: MiCollab external access  (Read 3435 times)

Offline MrRedHat

  • New Member
  • *
  • Posts: 2
  • Country: us
  • Karma: +0/-0
    • View Profile
MiCollab external access
« on: September 11, 2016, 10:09:17 PM »
I have a Mitel phone system and we want to use the MiCollab client software with our phone system external when we aren’t in the office. Our Mitel vendor keeps insisting to be able to use the MiCollab client outside of the office we need to move the phone system server over to the Internet and face an interface on the server facing the Internet without any firewall. From a security stand point this seems insane and I’m wondering if there is a better way to allow external access using the MiCollab client. Are there any UDP TCP ports that can forwarded or anything?


Offline martyn

  • Hero Member
  • *****
  • Posts: 688
  • Country: au
  • Karma: +10/-0
    • View Profile
Re: MiCollab external access
« Reply #1 on: September 11, 2016, 10:24:54 PM »
In order to publish MiCollab you need to do it via MBG. There are a couple of options for this based on the design of your network, but the internet facing interface is locked down to only the ports and applications required.

Offline VinceWhirlwind

  • Hero Member
  • *****
  • Posts: 899
  • Country: au
  • Karma: +31/-0
    • View Profile
Re: MiCollab external access
« Reply #2 on: September 11, 2016, 10:46:06 PM »
The way to do it is to build an MBG server in your DMZ, then it somehow clusters with the MBG that's running on the MiCollab server and acts as a proxy for those services so that outside clients are talking to the server in the DMZ rather than directly to the internal MiCollab server.

Offline MrRedHat

  • New Member
  • *
  • Posts: 2
  • Country: us
  • Karma: +0/-0
    • View Profile
Re: MiCollab external access
« Reply #3 on: September 11, 2016, 11:07:41 PM »
What we call the “ucaserver” has two interface cards in it. One interface card is connected to the local LAN and it has worked well for several years. We wanted to use the MiCollab client, so the phone system vendor said that we needed to use second interface for the MiCollab client. I pulled an IP off from the firewall and we gave it that IP on the second interface card on the “ucaserver”.

This is what the network design is before and after:

Offline dilkie

  • Global Moderator
  • Sr. Member
  • *****
  • Posts: 344
  • Karma: +11/-0
    • View Profile
Re: MiCollab external access
« Reply #4 on: September 11, 2016, 11:36:22 PM »
Your phone system vendor should go back to MitelU and study a bit harder.

Martyn and Vince are both correct, deploy MBG to get access to internal phones services (all services, including UCA) from the internet.

Offline martyn

  • Hero Member
  • *****
  • Posts: 688
  • Country: au
  • Karma: +10/-0
    • View Profile
Re: MiCollab external access
« Reply #5 on: September 11, 2016, 11:51:22 PM »
Is it a standalone UCA/Micollab client server, or is it running on an all in one MiCollab server with Nupoint, MBG, AWV/MCA, etc?

Offline VinceWhirlwind

  • Hero Member
  • *****
  • Posts: 899
  • Country: au
  • Karma: +31/-0
    • View Profile
Re: MiCollab external access
« Reply #6 on: September 12, 2016, 12:20:51 AM »
Well....it might seem like a bad idea, but in fact the MiCollab engineering guidelines have a deployment model they call "Network Edge" for the MiCollab server:
MiCollab has 2 NICs, one connected to the LAN, the other connected to the outside world. No seperate MBG required.
One version of this deployment model has the MiCollab server acting as the actual firewall for the site.

 
The diagram above might be right, or might be wrong - if you connect the MiCollab to the firewall instead of the LAN, then you will need to configure all sorts of firewall rules for the internal MiCollab stuff to work.

Offline johnp

  • Global Moderator
  • Hero Member
  • *****
  • Posts: 2202
  • Country: us
  • Karma: +66/-0
    • View Profile
Re: MiCollab external access
« Reply #7 on: September 15, 2016, 06:33:10 PM »
I hate that they changed the terminology from server-gateway to network edge. In sever-gateway, the MSL acts as a firewall for traffic between interfaces and it is a robust firewall IMHO.


 

Sitemap 1 2 3 4 5 6 7 8 9 10