Teleworker Solution Installation notes
The following items are designed to provide some assistance in terms of successfully deploying a Teleworker Solution server.
1) Be sure that the ethernet port(s), to which a Teleworker Server is being connected, are able to provide Full Duplex connections. Some DSL modems do provide L2 switched ports that will only allow for a 10baseT Half-Duplex connection.
2) When deploying a Teleworker Solution server as a gateway, the external interface of the server *MUST* have a publicly routable IP address assigned directly to it. That is, the server should not be residing behind a NAT device.
3) When deploying the server in a firewall's DMZ, the server should be deployed in server-only mode. In this scenario, a DMZ is defined as having the following characteristics:
a) Consists of a physically distinct interface on the firewall
b) Consists of a logical network that is separate from the LAN
c) Requires unique firewall rules in order to interact with the LAN
d) Is directly accessible from both the Internet and the LAN
e) Commonly provides NAT to the devices residing within.
4) When deploying the server in a firewall's DMZ, the firewall should NAT the publicly routable IP address of the server to the server's actual DMZ IP address (a private IP address). All voice traffic to, and from, remote sets will be directed to the publicly routable IP address of the server, rather than its private DMZ IP address. By default, most firewalls will not handle this behaviour, as the existing NAT rule for the Teleworker server NAT from the WAN interface to the DMZ interface; a NAT rule, or alias (Cisco specific) would be required on the LAN interface to translate the publicly routable IP address of the Teleworker server to the correct DMZ IP address.
5) When deploying a Teleworker Solution server as a gateway in a subnetted environment, any network that is to be able to access the server's facilities must be added to the server's Local Networks. When adding entries to the Local Networks section, please keep in mind that the router entry must refer to a router IP on the server's native network.
6) When deploying the Teleworker Solution in an environment that consists of multiple ICPs and/or phone networks, the Teleworker server *MUST* have a direct route to/from any voice device from/to which a call may be placed. i.e. A Teleworker server, in a DMZ, in an environment with clustered 3300 ICPs requires that the firewall rules allow it to speak to all the ICPs in the cluster, along with their respective IP sets, in order for all calls to have 2-way audio.
7) When deploying a Teleworker Solution server as a gateway in a VLAN environment, it is best to deploy the server on the voice VLAN because it is there to provide a virtual extension to the voice network. The Teleworker itself is not a VLAN aware device, so it should be connected to the VLAN router/switch using an untagged port. In the case where the server is to be accessible by multiple VLANs, the VLAN switch/router port must be untagged for each additional VLAN, in most cases this means configuring the switch port as a trunk port.
8) When deploying a Teleworker Solution server, you may have problems if the phone network's gateways do not align themselves towards the teleworker server. That is,
a) When deploying the server as an internet gateway, it should be the gateway for the phone network.
b) When deploying the server in a firewall's DMZ, the firewall should be the gateway for the phone network.