Table of Contents
When networks using different levels of trust are interconnected, the prevailing security model is to create a gate through which all inter-network communications must pass; that is, a single point (or very limited number of points) at which security policies are enforced. In most scenarios, the greatest concern is generally when an external untrusted network communicates with a trusted network. The Ribbon SBC is positioned at the network border to guard the internal network (core network) from security threats.
The
Unable to show "metadata-from": No such page "_space_variables"
can be deployed between two service provider networks in a peering environment (NNI), or between an access network and a backbone network to provide service to residential and/or enterprise customers.Peering - (NNI) Deployment
To learn about Enterprise deployment scenarios, refer to Enterprise Deployment Scenarios.
To learn about H.323 deployment scenarios, refer to H.323 Deployment Scenarios.
Overview
Content Tools