WO2006083171A1 - Method of monitoring and configuring - Google Patents

Method of monitoring and configuring Download PDF

Info

Publication number
WO2006083171A1
WO2006083171A1 PCT/NO2006/000038 NO2006000038W WO2006083171A1 WO 2006083171 A1 WO2006083171 A1 WO 2006083171A1 NO 2006000038 W NO2006000038 W NO 2006000038W WO 2006083171 A1 WO2006083171 A1 WO 2006083171A1
Authority
WO
WIPO (PCT)
Prior art keywords
management system
firewall
request
equipment
transmitting
Prior art date
Application number
PCT/NO2006/000038
Other languages
French (fr)
Other versions
WO2006083171B1 (en
Inventor
Jarl Ove Staurnes
Nicolai GJØDUM
Original Assignee
Tandberg Telecom As
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tandberg Telecom As filed Critical Tandberg Telecom As
Priority to CN2006800041240A priority Critical patent/CN101116337B/en
Priority to EP06701735A priority patent/EP1847126B1/en
Publication of WO2006083171A1 publication Critical patent/WO2006083171A1/en
Publication of WO2006083171B1 publication Critical patent/WO2006083171B1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/04Processing captured monitoring data, e.g. for logfile generation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L61/00Network arrangements, protocols or services for addressing or naming
    • H04L61/09Mapping addresses
    • H04L61/25Mapping addresses of the same type
    • H04L61/2503Translation of Internet protocol [IP] addresses
    • H04L61/255Maintenance or indexing of mapping tables
    • H04L61/2553Binding renewal aspects, e.g. using keep-alive messages
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L61/00Network arrangements, protocols or services for addressing or naming
    • H04L61/09Mapping addresses
    • H04L61/25Mapping addresses of the same type
    • H04L61/2503Translation of Internet protocol [IP] addresses
    • H04L61/256NAT traversal
    • H04L61/2564NAT traversal for a higher-layer protocol, e.g. for session initiation protocol [SIP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L61/00Network arrangements, protocols or services for addressing or naming
    • H04L61/50Address allocation
    • H04L61/5007Internet protocol [IP] addresses
    • H04L61/5014Internet protocol [IP] addresses using dynamic host configuration protocol [DHCP] or bootstrap protocol [BOOTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/02Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/14Systems for two-way working
    • H04N7/15Conference systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
    • H04L67/125Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks involving control of end-device applications over a network

Definitions

  • the present invention relates to monitoring, configuration and administrating IP terminals behind Firewalls and NAT traversing nodes.
  • Conventional conferencing systems comprise a number of end-points communicating real-time video, audio and/or data streams over and between various networks such as WAN, LAN and circuit switched networks.
  • a number of conference systems residing at different sites may participate in the same conference, most often, through one or more MCU's (Multipoint Control Unit) performing i.a. switching functions to allow the audiovisual terminals to intercommunicate properly.
  • MCU's Multipoint Control Unit
  • the management tool may i.a. include a resource scheduler, a monitor module and a routing module.
  • IP-based equipment is often connected to a Local Area Network (LAN), which is protected by Firewalls and NAT installations.
  • LAN Local Area Network
  • the Management system might as well be operating from outside the LAN, meaning that communication towards the managed nodes and endpoints has to force through Firewalls and NATs.
  • This is a problem due to a most often strict policy for what is allowed to pass through a firewall.
  • all communication sessions through a firewall has to be initiated from inside. This means that all requests initiated from a management system to a device located inside a LAN would be rejected by the firewall.
  • the management system would not know the terminating IP address of the device as the NAT installation hides the actual addresses of the devices.
  • the equipments may be able to transmit their reports out to the administration tool if the firewall is configured to let these reports out, but the administrator would have difficulties configuring and otherwise administrating the equipments, as it is prevented from requesting devices behind the firewall.
  • Allowing the reports out through the firewall may cause other information leaking out that was not intended to.
  • IP equipment of prior art uses SNMP (Simple Network Management Protocol) for monitoring purposes.
  • the equipment sends a trap to the management system when something happens using a UDP/IP packet to a specific port.
  • the management system might then probe the equipment using another specified port.
  • the SNMP ports must be opened. This poses a very high security risk because mostly all IP equipment has SNMP, and thus the entire network would be exposed to the outside.
  • the security mechanisms of SNMP is rather weak and malicious parties might intercept the messages and pretend to be the management system and issue the same administrator commands as the management system and alter the equipments configurations.
  • SNMP uses a specific port for the management system to access the equipments, thus if the management system is outside the firewall and NAT is in use, only one of the equipment on the inside could be accessed as the firewall could only map one port to one address on the inside.
  • a way to work around this is to make a tunnel through the firewall and a specific utility on the inside (proxy) that would redirect the connection to the equipment.
  • this would require some special extension in the management system and quite a lot of configurations.
  • the present invention discloses a method for managing and monitoring communication devices in a firewall/NAT protected network from a Management system outside the firewall/NAT protected network by periodically and at predefined events opening an http connection and transmitting a request from the respective communication devices to the Management system through a firewall/NAT installation protecting the network, and when receiving said request in the management system, transmitting instructions and data to the communication devices from the management system in a http response through said http connection.
  • Figure 1 is a block diagram showing the data flow between an endpoint and a management system according to one embodiment of the present invention.
  • firewalls allow establishment of communication sessions initiated from inside the protected area, but not in the opposite direction e.g. from the public Internet into the protected area.
  • firewalls have HTTP (port 80) and HTTPS (port 443) open from the inside to the outside of the firewall.
  • HTTP port 80
  • HTTPS port 443
  • the inside equipment periodically sends data in an initiating request, allowing the management system to send configuration or other administration command in the response.
  • HTTP/S is used as the transport mechanism.
  • HTTP/S is a protocol standardized by IETF designed to send individual messages securely through the Internet.
  • the only configuration that is required when deploying new equipment is setting the IP address of the administration tool on the equipment.
  • DHCP Dynamic Host Configuration Protocol
  • the administration tool address can be configured in the DHCP server once and then all equipments will automatically be configured when they are connected to the network.
  • an event scheme defines when the equipment behind the firewall sends request posting an event with certain information (different types depending on the situation) or simply a repeating request, and then the management system in response will issue configuration and other types of commands for managing the equipment.
  • the request is preferably a SOAP request, which is a request according to the Simple Object Access Protocol compatible with http for exchanging information in an Internet environment.
  • the equipment For the event scheme to be activated, the equipment has to retrieve the address of the management system. This is preferably provided automatically in that the equipment is configured to utilise DHCP for obtaining its IP address configuration.
  • a query is sent to a DHCP server.
  • the DHCP server responds with a packet containing the IP configuration and other optional settings.
  • the equipment can then receive the IP address of the management system.
  • the equipment when it connects to the network, it first checks if it has received an IP address to the management system from DHCP. If so, the address is used in conjunction with a stored service path (configurable, e.g. "/public/extemalmanager.asmx") to make a URL which it then try to establish an HTTP or HTTPS connection to the management system. Alternatively, if no management system address is received from DHCP, or DHCP is not in use, a (pre-configured) stored address to the management system is then used.
  • a stored service path configurable, e.g. "/public/extemalmanager.asmx”
  • the first SOAP request sent from the equipment to the administration tool defines a "Boot" event. This is a special registration event that is used to signal to the administration tool that the equipment is just connected to the network (or booted up).
  • the management system On response to the "Boot" event SOAP request, the management system sends a set of parameters to be used by the equipment for the succeeding communication with the management system, e.g. defining requests intervals and event schemes. Below are a few examples of parameters depicted.
  • HeartBeatlnterval - A number defining the frequency of heartbeat events, i.e. periodical SOAP request, in seconds.
  • FilesToDownload - A group parameter containing a SoftwareUpgrade parameter informing the equipment to download new software.
  • the parameter contains the address and authorization key.
  • a set of FileToDownload parameters simply mapping a network address file to a local file path to which the equipment should download.
  • Management- This parameter element is the key to managing. All event responses have this.
  • a set of sub elements is used to separate the different types of administration commands. Examples of such commands are Command, Configuration and Directory is in use.
  • Expressions- Group element holding several Expression definitions e.g. defining different events.
  • a heartbeat frequency is defined as a result of a previous event response
  • a timer is started with the number of seconds specified between each "heartbeat”.
  • an event is sent to the management system as a "Beat” event type.
  • the response from the management system contains the same parameters as the Boot event.
  • each of the Expression elements are registered in the change machinery.
  • an event is sent to the Management system as an Expression event type.
  • the expression that triggered the event is passed as a parameter to the management system.
  • the response from the management system is the same parameters as for the Boot event. However, any HeartBeat or Expressions elements will override previous defined events.
  • FIG. 1 an example of data flow between a videoconference terminal behind a firewall and a management system is discussed.
  • the terminal sends a DHCP request for retrieval of its own IP address configuration (1).
  • the DHCP server returns information, with extension to supply management system IP address (2).
  • the terminal After receiving the information from the DHCP server, the terminal sends a BOOT event to the management system using the IP address that was retrieved or pre-configured in the previous steps (3).
  • the event is sent over an HTTP connection, and by doing so, a virtual tunnel is made through the firewall so that a two-way communication with the management system is established.
  • the management system sends a (HTTP) response through the tunnel (4) where it may instruct the equipment to issue new events in the future (a timed event, or when changes occur matching an expression).
  • the management system may issue other administration commands, e.g. configurations or control commands. If the management system requested a heartbeat event, a timer in the equipment was created as specified (5).
  • the equipment sends a new event (BEAT) to the management system (6). Again, opening a new HTTP connection and thus creating a new communication tunnel.
  • BEAT new event
  • the usage of the present invention is particularly advantageous when deploying equipment in larger numbers that require initial configuration.
  • the mechanism can be implemented as a part of a solution to ease this process.
  • this server can return configuration data and instruct the equipment to download files or upgrade firmware, even when the equipment is behind a NAT firewall/router. This allows an administrator to be able to roll out new equipment without configuring it on beforehand.
  • the only step necessary is to register the equipment with the configuration server if it is not configured to give configuration data to any system connecting to it.
  • the equipment would typically use DHCP to locate the configuration server.
  • Another possibility that opens is a more flexible mechanism for pro-active notifications for the administrator.
  • the administrator could configure feedback expressions that would supply him with notifications of his own choice.
  • the configuration server could also send e-mails when a heartbeat event has not been received, to inform that a unit is offline.
  • the configuration server is allowed to schedule contact with the equipment at any time in the future upon receiving the next request.
  • the standard heartbeat interval is 5 minutes
  • the configuration server would like to issue a command on the equipment in 13 minutes
  • the configuration server could set it to 3 minutes on the request before the command should be executed.
  • the equipment would contact the configuration server with the heartbeat request, get the command in the response, and the heartbeat interval would be set back to 5 minutes.
  • the disadvantage of using the event scheme for issuing administration commands is that the Management system can not at any time send these commands but have to wait for the next event.
  • One of the advantages of the present invention is that there is no need for configuring the firewall. Also, by using the DHCP extensions, the only configuration needed is to install the IP address for management system on the DHCP server once. Then all new equipment will automatically connect. Without the DHCP extension in use, all new equipment must be configured with this one o IP address for the administration tool. For other specialized administration protocols, the firewall must be configured to allow this new protocol through.
  • Another advantage is that there is no need to make new software for the 5 equipment for generating new events as it is when using SNMP.
  • SNMP a new trap handler must be created in the equipment if new reports are needed.
  • the management system can define the event as specific or general as convenient. All that is needed are a specification of the XML documents on the equipment and an XPath query 0 machinery than can trigger on changes on the equipment.
  • firewalls Since the model is using HTTP and HTTP is a well-known protocol that is in extensible use, all firewall will be supported. Also, they are normally pre- configured to allow HTTP traffic out of the firewall thus a deployment of equipment and administration tools can be done without involving the firewall.

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Multimedia (AREA)
  • Data Mining & Analysis (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Computer And Data Communications (AREA)

Abstract

The present invention discloses a method for managing and monitoring communication devices in a firewall/NAT protected network from a Management system outside the firewall/NAT protected network by periodically and at predefined events opening an http connection and transmitting a request from the respective communication devices to the Management system through a firewall/NAT installation protecting the network, and when receiving said request in the management system, transmitting instructions and data to the communication devices from the management system in a http response through said http connection.

Description

METHOD FOR MONITORING AND CONFIGURATION
Technical field
The present invention relates to monitoring, configuration and administrating IP terminals behind Firewalls and NAT traversing nodes.
Background art
Conventional conferencing systems comprise a number of end-points communicating real-time video, audio and/or data streams over and between various networks such as WAN, LAN and circuit switched networks.
A number of conference systems residing at different sites may participate in the same conference, most often, through one or more MCU's (Multipoint Control Unit) performing i.a. switching functions to allow the audiovisual terminals to intercommunicate properly.
As videoconferencing involves various recourses and equipment simultaneously interoperating at different localizations and capabilities, there is a need for the possibility to manage the resources involved both for scheduled and ad hoc conferences.
Conferencing systems are therefore often provided with a management tool. The management tool may i.a. include a resource scheduler, a monitor module and a routing module.
As early conferencing equipment was ISDN based, it has now started migrating to IP based terminals and infrastructure. IP-based equipment is often connected to a Local Area Network (LAN), which is protected by Firewalls and NAT installations. This introduces a new problem in connecting between Management systems and the associated nodes and equipment. The Management system might as well be operating from outside the LAN, meaning that communication towards the managed nodes and endpoints has to force through Firewalls and NATs. This is a problem due to a most often strict policy for what is allowed to pass through a firewall. Conventionally, all communication sessions through a firewall has to be initiated from inside. This means that all requests initiated from a management system to a device located inside a LAN would be rejected by the firewall. In addition, the management system would not know the terminating IP address of the device as the NAT installation hides the actual addresses of the devices.
Thus, the equipments may be able to transmit their reports out to the administration tool if the firewall is configured to let these reports out, but the administrator would have difficulties configuring and otherwise administrating the equipments, as it is prevented from requesting devices behind the firewall.
Allowing the reports out through the firewall may cause other information leaking out that was not intended to.
Most IP equipment of prior art uses SNMP (Simple Network Management Protocol) for monitoring purposes. The equipment sends a trap to the management system when something happens using a UDP/IP packet to a specific port. The management system might then probe the equipment using another specified port. For this to work through a firewall, the SNMP ports must be opened. This poses a very high security risk because mostly all IP equipment has SNMP, and thus the entire network would be exposed to the outside. Also the security mechanisms of SNMP is rather weak and malicious parties might intercept the messages and pretend to be the management system and issue the same administrator commands as the management system and alter the equipments configurations.
Another problem is that SNMP uses a specific port for the management system to access the equipments, thus if the management system is outside the firewall and NAT is in use, only one of the equipment on the inside could be accessed as the firewall could only map one port to one address on the inside. A way to work around this is to make a tunnel through the firewall and a specific utility on the inside (proxy) that would redirect the connection to the equipment. However, this would require some special extension in the management system and quite a lot of configurations.
Disclosure of the invention
It is an object of the present invention to provide a method avoiding the above described problems. The features defined in the independent claims enclosed characterise this method. The present invention discloses a method for managing and monitoring communication devices in a firewall/NAT protected network from a Management system outside the firewall/NAT protected network by periodically and at predefined events opening an http connection and transmitting a request from the respective communication devices to the Management system through a firewall/NAT installation protecting the network, and when receiving said request in the management system, transmitting instructions and data to the communication devices from the management system in a http response through said http connection.
Brief description of the drawings
In order to make the invention more readily understandable, the discussion that follows will be supported by the accompanying drawing,
Figure 1 is a block diagram showing the data flow between an endpoint and a management system according to one embodiment of the present invention.
Best mode for carrying out the invention
In the following, the present invention will be discussed by describing a preferred embodiment, and supported by the accompanying drawings. However, people skilled in the art will realize other applications and modifications within the scope of the invention as defined in the enclosed independent claims.
As already mentioned in the background section, firewalls allow establishment of communication sessions initiated from inside the protected area, but not in the opposite direction e.g. from the public Internet into the protected area. Particularly, most firewalls have HTTP (port 80) and HTTPS (port 443) open from the inside to the outside of the firewall. When a TCP connection then is established from the inside to a verified area on the outside (server, node, terminal etc.), the verified area can transfer information back to the originating system. This possibility is utilised in the present invention for managing IP equipment behind firewalls/NAT installations relative to the management system. According to the invention, the inside equipment periodically sends data in an initiating request, allowing the management system to send configuration or other administration command in the response. By selecting proper initiating request intervals and/or defining proper initiating events, a system on the inside of a firewall can be configured, monitored and administrated from the outside without compromising with security. Preferably, the secure protocol HTTP/S is used as the transport mechanism. HTTP/S is a protocol standardized by IETF designed to send individual messages securely through the Internet. The only configuration that is required when deploying new equipment is setting the IP address of the administration tool on the equipment. However, by using an extension to DHCP (Dynamic Host Configuration Protocol), the administration tool address can be configured in the DHCP server once and then all equipments will automatically be configured when they are connected to the network.
In a preferred embodiment of the invention, an event scheme defines when the equipment behind the firewall sends request posting an event with certain information (different types depending on the situation) or simply a repeating request, and then the management system in response will issue configuration and other types of commands for managing the equipment. The request is preferably a SOAP request, which is a request according to the Simple Object Access Protocol compatible with http for exchanging information in an Internet environment.
For the event scheme to be activated, the equipment has to retrieve the address of the management system. This is preferably provided automatically in that the equipment is configured to utilise DHCP for obtaining its IP address configuration. When the equipment is turned on, a query is sent to a DHCP server. The DHCP server then responds with a packet containing the IP configuration and other optional settings. By extending the DHCP packet using a free option, the equipment can then receive the IP address of the management system.
Further, when the equipment connects to the network, it first checks if it has received an IP address to the management system from DHCP. If so, the address is used in conjunction with a stored service path (configurable, e.g. "/public/extemalmanager.asmx") to make a URL which it then try to establish an HTTP or HTTPS connection to the management system. Alternatively, if no management system address is received from DHCP, or DHCP is not in use, a (pre-configured) stored address to the management system is then used.
After the URL has been created and the HTTP/S (TCP connection) has been established, a SOAP request is generated. By using SOAP the service mechanism (SOAP + WSDL == web services) can very easily be implemented in a management system, as it is an existing standard.
The first SOAP request sent from the equipment to the administration tool defines a "Boot" event. This is a special registration event that is used to signal to the administration tool that the equipment is just connected to the network (or booted up).
In the top heading of a SOAP request associated with a "Boot" event is an identification element including information about the equipment for the management system to uniquely identify it.
On response to the "Boot" event SOAP request, the management system sends a set of parameters to be used by the equipment for the succeeding communication with the management system, e.g. defining requests intervals and event schemes. Below are a few examples of parameters depicted.
HeartBeatlnterval - A number defining the frequency of heartbeat events, i.e. periodical SOAP request, in seconds.
FilesToDownload - A group parameter containing a SoftwareUpgrade parameter informing the equipment to download new software. The parameter contains the address and authorization key. Further, a set of FileToDownload parameters simply mapping a network address file to a local file path to which the equipment should download.
Management- This parameter element is the key to managing. All event responses have this. A set of sub elements is used to separate the different types of administration commands. Examples of such commands are Command, Configuration and Directory is in use. Expressions- Group element holding several Expression definitions e.g. defining different events.
Whenever a heartbeat frequency is defined as a result of a previous event response, a timer is started with the number of seconds specified between each "heartbeat". When it expires, an event is sent to the management system as a "Beat" event type.
The response from the management system contains the same parameters as the Boot event.
Whenever an Expressions element is returned in a previous event response, each of the Expression elements are registered in the change machinery. When a change in the system satisfies one of the registered expressions, an event is sent to the Management system as an Expression event type. Within the event request, the expression that triggered the event is passed as a parameter to the management system. The response from the management system is the same parameters as for the Boot event. However, any HeartBeat or Expressions elements will override previous defined events.
By referring to figure 1 , an example of data flow between a videoconference terminal behind a firewall and a management system is discussed.
The terminal sends a DHCP request for retrieval of its own IP address configuration (1). The DHCP server returns information, with extension to supply management system IP address (2).
After receiving the information from the DHCP server, the terminal sends a BOOT event to the management system using the IP address that was retrieved or pre-configured in the previous steps (3). The event is sent over an HTTP connection, and by doing so, a virtual tunnel is made through the firewall so that a two-way communication with the management system is established.
Thereafter, the management system sends a (HTTP) response through the tunnel (4) where it may instruct the equipment to issue new events in the future (a timed event, or when changes occur matching an expression). Along with these instructions, the management system may issue other administration commands, e.g. configurations or control commands. If the management system requested a heartbeat event, a timer in the equipment was created as specified (5).
When the heart beat timer expires, the equipment sends a new event (BEAT) to the management system (6). Again, opening a new HTTP connection and thus creating a new communication tunnel.
Finally, the Management system responds with possible new instructions (7).
The usage of the present invention is particularly advantageous when deploying equipment in larger numbers that require initial configuration. The mechanism can be implemented as a part of a solution to ease this process. By having a configuration server with the initial configuration for the equipment stored, this server can return configuration data and instruct the equipment to download files or upgrade firmware, even when the equipment is behind a NAT firewall/router. This allows an administrator to be able to roll out new equipment without configuring it on beforehand. The only step necessary is to register the equipment with the configuration server if it is not configured to give configuration data to any system connecting to it. The equipment would typically use DHCP to locate the configuration server.
Another possibility that opens is a more flexible mechanism for pro-active notifications for the administrator. By implementing a mechanism on the configuration server that would send e-mails based on events from the equipment, the administrator could configure feedback expressions that would supply him with notifications of his own choice. The configuration server could also send e-mails when a heartbeat event has not been received, to inform that a unit is offline.
Further, by using the heartbeat frequency in a dynamic manner, the configuration server is allowed to schedule contact with the equipment at any time in the future upon receiving the next request. E.g. if the standard heartbeat interval is 5 minutes, and the configuration server would like to issue a command on the equipment in 13 minutes, the configuration server could set it to 3 minutes on the request before the command should be executed. At the time the command is to be executed on the equipment, the equipment would contact the configuration server with the heartbeat request, get the command in the response, and the heartbeat interval would be set back to 5 minutes. The disadvantage of using the event scheme for issuing administration commands is that the Management system can not at any time send these commands but have to wait for the next event. By carefully selecting the expressions and heart beat interval, this would not be a big issue in practice, s However, by keeping the tunnel up (in fact, this is the default behaviour of HTTP 1.1) and extending the HTTP protocol so that requests can be issued from both sides (like RTSP, real time streaming protocol). The management system could send a new form of request for issuing management commands.
The problem with this is that either of the equipment, firewall or administrator o server can at any time close the tunnel if the link is inactive for a period of time. Therefore this approach will not guaranty more control for the management system.
The event model though will always reconnect the tunnel if necessary and are therefore guarantied to work as defined.
s One of the advantages of the present invention is that there is no need for configuring the firewall. Also, by using the DHCP extensions, the only configuration needed is to install the IP address for management system on the DHCP server once. Then all new equipment will automatically connect. Without the DHCP extension in use, all new equipment must be configured with this one o IP address for the administration tool. For other specialized administration protocols, the firewall must be configured to allow this new protocol through.
Further, by using the HTTPS protocol, a secure connection is made both ways so no eavesdrop or insertion of malicious commands can happen.
Another advantage is that there is no need to make new software for the 5 equipment for generating new events as it is when using SNMP. In SNMP, a new trap handler must be created in the equipment if new reports are needed. With the event scheme using expressions, the management system can define the event as specific or general as convenient. All that is needed are a specification of the XML documents on the equipment and an XPath query 0 machinery than can trigger on changes on the equipment.
Since the model is using HTTP and HTTP is a well-known protocol that is in extensible use, all firewall will be supported. Also, they are normally pre- configured to allow HTTP traffic out of the firewall thus a deployment of equipment and administration tools can be done without involving the firewall.
WAN Wide Area Network
LAN Local Area Network
MCU Multipoint Control Unit
ISDN Integrated Services Digital Network
IP Internet Protocol
NAT Network Address Translation
SNMP Simple Network Management Protocol
UDP/IP User Datagram Protocol/Internet Protocol
HTTP HyperText Transfer Protocol
HTTPS HyperText Transfer Protocol Secure
TCP Transmission Control Protocol
IETF Internet Engineering Task Force
DHCP Dynamic Host Configuration Protocol
SOAP Simple Object Access Protocol
URL Uniform Resource Locator
RTSP Real Time Streaming Protocol

Claims

Claims
1. A method for managing and monitoring communication devices in a firewall/NAT protected network from a Management system outside the firewall/NAT protected network, characterized in the following steps: periodically and at predefined events opening an http connection and transmitting a request from the respective communication devices to the Management system through a firewall/NAT installation protecting the network, when receiving said request in the management system, transmitting instructions and data to the communication devices from the management system in a http response through said http connection.
2. A method according to claim 1 , characterized in that when one of the communication devices for the first time is connected to the network: opening an initial http connection and transmitting a BOOT request through said firewall/NAT installation from said communication device, when receiving said BOOT request in the management system, transmitting configuration data and parameters to said communication device from the management system at least defining time intervals between periodical requests and events triggering event requests to be transmitted from said device.
3. A method according to claim 2, characterized in the following step prior to the step of opening an initial http connection: transmitting from said communication device a DHCP request to a DHCP server, transmitting from the DHCP server to the communication device a DHCP response at lest including an IP address of the Management system.
4. A method according to one of the preceding claims, characterized in that said requests are defined according to the Simple Object Access Protocol.
5. A method according to one of the preceding claims, characterized in that the http connection is a http/s connection.
6. A method according to one of the preceding claims, characterized in that said instructions and data at least include one of the following: new time intervals between periodical requests to be transmitted from respective devices to the management system overriding any existing ones, definitions of new events initiating event requests to be transmitted from respective devices to the management system, command for initiation of download of new software from the management system to respective devices, command for instructing the respective communication devices to transmit status information to the management system.
7. A method according to one of the preceding claims, characterized in that the communication devices are IP based conference endpoints and/or equipment.
PCT/NO2006/000038 2005-02-04 2006-01-27 Method of monitoring and configuring WO2006083171A1 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN2006800041240A CN101116337B (en) 2005-02-04 2006-01-27 Method of monitoring and configuring
EP06701735A EP1847126B1 (en) 2005-02-04 2006-01-27 Method for monitoring and configuration

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
NO20050625A NO323215B1 (en) 2005-02-04 2005-02-04 Firewall / NAT Protected Network Monitoring and Configuration Procedure
NO20050625 2005-02-04

Publications (2)

Publication Number Publication Date
WO2006083171A1 true WO2006083171A1 (en) 2006-08-10
WO2006083171B1 WO2006083171B1 (en) 2006-11-09

Family

ID=36777497

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/NO2006/000038 WO2006083171A1 (en) 2005-02-04 2006-01-27 Method of monitoring and configuring

Country Status (5)

Country Link
US (2) US8713662B2 (en)
EP (1) EP1847126B1 (en)
CN (1) CN101116337B (en)
NO (1) NO323215B1 (en)
WO (1) WO2006083171A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2008031967A2 (en) * 2006-09-12 2008-03-20 France Telecom Method of supervising a session for accessing a service set up by a client terminal by means of a dynamic configuration protocol

Families Citing this family (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPWO2007039942A1 (en) * 2005-10-06 2009-04-16 三菱電機株式会社 Terminal device, server device, and command device
US7752658B2 (en) * 2006-06-30 2010-07-06 Microsoft Corporation Multi-session connection across a trust boundary
CN101399827A (en) * 2007-09-26 2009-04-01 国际商业机器公司 Method and system for safely installing patch to system
WO2009055717A1 (en) * 2007-10-24 2009-04-30 Jonathan Peter Deutsch Various methods and apparatuses for a central station to allocate virtual ip addresses
JP4633837B2 (en) * 2008-01-22 2011-02-16 富士通株式会社 Address distribution system, method and program therefor
TWI363545B (en) * 2008-06-13 2012-05-01 Coretronic Corp Management method for remote digital signages
MY179999A (en) * 2012-07-31 2020-11-19 Telekom Malaysia Berhad A system for the management of access points
DE102012217144A1 (en) * 2012-09-24 2014-03-27 Robert Bosch Gmbh Terminal, monitoring system with the terminal and method for initializing the terminal in the monitoring system
US9559906B2 (en) * 2013-01-11 2017-01-31 Microsoft Technology Licensing, Llc Server load management
JP6042243B2 (en) * 2013-03-18 2016-12-14 株式会社日立ソリューションズ Monitoring system, monitoring server, and monitoring method
US10200423B2 (en) 2015-05-01 2019-02-05 Cisco Technology, Inc. Presenting methods for joining a virtual meeting
US11144885B2 (en) 2016-07-08 2021-10-12 Cisco Technology, Inc. Using calendar information to authorize user admission to online meetings
US10320856B2 (en) 2016-10-06 2019-06-11 Cisco Technology, Inc. Managing access to communication sessions with communication identifiers of users and using chat applications
US10547653B2 (en) 2016-10-10 2020-01-28 Cisco Technology, Inc. Managing access to communication sessions via a web-based collaboration room service
US11784874B2 (en) 2019-10-31 2023-10-10 Juniper Networks, Inc. Bulk discovery of devices behind a network address translation device
US11159370B2 (en) 2019-10-31 2021-10-26 Juniper Networks, Inc. Bulk discovery of devices behind a network address translation device

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0717544A2 (en) * 1994-12-16 1996-06-19 AT&T Corp. Graphical user interface for multimedia conferencing system
WO2002008856A2 (en) * 2000-07-21 2002-01-31 Burstband Technology Corporation Method and system for data delivery with guaranteed quality of service
US20020093948A1 (en) * 2001-01-16 2002-07-18 Motorola, Inc. Packet-based multimedia communications system having one or more wireless links
US20030125995A1 (en) * 2001-12-27 2003-07-03 Mitsubishi Denki Kabushiki Kaisha Chat management system
EP1427211A1 (en) * 2001-06-25 2004-06-09 Nova Co., Ltd. Multimedia information communication service system, user terminal program, and recording medium
WO2004053761A1 (en) * 2002-12-07 2004-06-24 Hyun-Kyun Cho Real estate brokerage method through a video-conference

Family Cites Families (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP4104799B2 (en) * 1999-11-25 2008-06-18 株式会社山武 Network system and communication method
US6760750B1 (en) 2000-03-01 2004-07-06 Polycom Israel, Ltd. System and method of monitoring video and/or audio conferencing through a rapid-update web site
US8363647B2 (en) * 2001-04-03 2013-01-29 Voxpath Networks, Inc. System and method for configuring an IP telephony device
EP1283464A1 (en) * 2001-08-06 2003-02-12 Hewlett-Packard Company A boot process for a computer, a boot ROM and a computer having a boot ROM
US6845452B1 (en) * 2002-03-12 2005-01-18 Reactivity, Inc. Providing security for external access to a protected computer network
CN100417127C (en) * 2002-04-10 2008-09-03 中兴通讯股份有限公司 User management method based on dynamic mainframe configuration procotol
CN1251446C (en) * 2002-07-18 2006-04-12 华为技术有限公司 Method of defending network transmission control protocol sync message from overflowing attack
US20040242328A1 (en) * 2003-03-05 2004-12-02 Blackburn Christopher W. Boot service in a service-oriented gaming network environment
US7409676B2 (en) * 2003-10-20 2008-08-05 International Business Machines Corporation Systems, methods and computer programs for determining dependencies between logical components in a data processing system or network
US20050102390A1 (en) * 2003-10-22 2005-05-12 Peterson Eric M. System and method of network usage analyzer
US20050149729A1 (en) * 2003-12-24 2005-07-07 Zimmer Vincent J. Method to support XML-based security and key management services in a pre-boot execution environment

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0717544A2 (en) * 1994-12-16 1996-06-19 AT&T Corp. Graphical user interface for multimedia conferencing system
WO2002008856A2 (en) * 2000-07-21 2002-01-31 Burstband Technology Corporation Method and system for data delivery with guaranteed quality of service
US20020093948A1 (en) * 2001-01-16 2002-07-18 Motorola, Inc. Packet-based multimedia communications system having one or more wireless links
EP1427211A1 (en) * 2001-06-25 2004-06-09 Nova Co., Ltd. Multimedia information communication service system, user terminal program, and recording medium
US20030125995A1 (en) * 2001-12-27 2003-07-03 Mitsubishi Denki Kabushiki Kaisha Chat management system
WO2004053761A1 (en) * 2002-12-07 2004-06-24 Hyun-Kyun Cho Real estate brokerage method through a video-conference

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See also references of EP1847126A4 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2008031967A2 (en) * 2006-09-12 2008-03-20 France Telecom Method of supervising a session for accessing a service set up by a client terminal by means of a dynamic configuration protocol
WO2008031967A3 (en) * 2006-09-12 2008-05-15 France Telecom Method of supervising a session for accessing a service set up by a client terminal by means of a dynamic configuration protocol

Also Published As

Publication number Publication date
CN101116337A (en) 2008-01-30
WO2006083171B1 (en) 2006-11-09
US8713662B2 (en) 2014-04-29
EP1847126B1 (en) 2012-08-29
US20140297794A1 (en) 2014-10-02
EP1847126A4 (en) 2010-01-20
NO20050625L (en) 2006-08-07
EP1847126A1 (en) 2007-10-24
CN101116337B (en) 2011-12-21
US20060195568A1 (en) 2006-08-31
US9160635B2 (en) 2015-10-13
NO323215B1 (en) 2007-01-29

Similar Documents

Publication Publication Date Title
US9160635B2 (en) Method of monitoring and configuring
US8683078B2 (en) Method and system for quality of service control for remote access to universal plug and play
KR101188037B1 (en) Remote management method, a related auto configuration server, a related further auto configuration server, a related routing gateway and a related device
US7353279B2 (en) Proxy architecture for providing quality of service(QoS) reservations
US8239520B2 (en) Network service operational status monitoring
KR100948317B1 (en) METHOD AND SYSTEM FOR PROVIDING AN ABILITY TO SET UP A QoS CONTRACT FOR A VIDEOCONFERENCE SESSION BETWEEN CLIENTS
US8391299B2 (en) Architecture of gateway between a home network and an external network
US20080267096A1 (en) Tunnel Device, Relay Device, Terminal Device, Call Control System, Ip Telephone System, Conference Device, and Their Control Method and Program
TW201002018A (en) Method for predicting port number of NAT apparatus based on two STUN server inquiry results
WO2013120069A1 (en) Secure remote computer network
EP2237476B1 (en) Upnp device for providing remote access service and method for same
JP2009510812A (en) Cable gateway for interfacing packet cable networks to IP multimedia subsystems
JP2005518715A (en) Correlating service quality requirements
US20190116081A1 (en) Method for establishing a management session between an item of equipment and a device for management of this item of equipment
KR100660123B1 (en) Vpn server system and vpn terminal for a nat traversal
JP2007519356A (en) Remote control gateway management with security
Cisco Interdomain Multicast Solutions Using SSM
JP2012085356A (en) Method, system and equipment for realizing intercommunication between ip domains
KR100764063B1 (en) Method for udp multicast tunneling in multicast-based multi-party collaboration environment, and system therefor
EP1848151B1 (en) Method and apparatus for configuring service equipment elements in a network
Okugawa et al. A home network service environment for wide-area communications
US7386604B1 (en) Signaling method for communication networks
Korvakangas Audio/Video Systems and Information Security
WO2010052696A1 (en) Session initiation protocol in multi-cast/unicast system for connection between users behind nat and connection between server and users behind nat
Cruz et al. Peer-to-Peer Streaming Tracker Protocol (PPSTP)

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application
DPE2 Request for preliminary examination filed before expiration of 19th month from priority date (pct application filed from 20040101)
WWE Wipo information: entry into national phase

Ref document number: 200680004124.0

Country of ref document: CN

NENP Non-entry into the national phase

Ref country code: DE

WWE Wipo information: entry into national phase

Ref document number: 2006701735

Country of ref document: EP

WWP Wipo information: published in national office

Ref document number: 2006701735

Country of ref document: EP