The MiCollab server can be deployed in a variety of ways, depending on which services and applications you wish to provide, where your users are located, and whether you are using a physical or virtual system.
MiCollab in LAN Mode Clustered with MBG(s) in the DMZ
MiCollab in LAN Mode Clustered with MBG(s) on the Network Edge
MiCollab with MBG on the Network Edge (Server Gateway Mode)
Use these scenarios to obtain an overview of the conditions and settings that you need to employ. For detailed instructions, refer to the documents provided with MiCollab, MBG, and MiCollab Client Deployment. For other deployment configuration examples, see the MiCollab Engineering Guidelines.
This solution consists of MiCollab on the corporate LAN and one or more MBGs providing Teleworker and Web Proxy services in the DMZ. The Teleworker service is employed on both the MiCollab and MBG systems while the Web Proxy Service is provided only by the MBGs. The Teleworker service in MiCollab is only used to remotely manage the Teleworker phones that are configured on the MBGs.
To support this configuration, install the MiCollab server with the MBG application in the LAN and install one or more standalone MBG servers in the DMZ. Then create a cluster that ties the MBGs together.
Conditions
The MiCollab server on the LAN must be configured in "Server-only on LAN" mode and the MBG(s) in the DMZ must be configured in "Server-only on DMZ" mode. (Note that MBG clustering is only supported for MiCollab systems that are configured in "Server-only on LAN" mode.)
The MBGs in the DMZ must be routable to the MiCollab server on the LAN.
All MBGs must have the same software version. This ensures support for the full range of MBG features and services.
The MBG on MiCollab and the MBG(s) in the DMZ must be added to a cluster. Clustering provides the following benefits:
Allows data (including Teleworker services) to be managed from the MiCollab application.
Enables licence pooling. Note that, although licences are pooled, it is recommended that you purchase all Teleworker service licenses for the MBG(s) located in the DMZ in order to avoid licensing issues.
The MiCollab and MBG nodes must reside in separate logical zones. Use the default zone for the node located on the LAN (which you may rename) and create a new zone for the nodes located in the DMZ.

Key Settings
The following table lists the key settings required to successfully program the systems (MiCollab, MBGs, firewall) in conjunction MiCollab Client Deployment. For a complete programming instructions, refer to the appropriate product documentation.
| Feature | System | Configuration |
|---|---|---|
|
Installing the Systems |
MiCollab |
Install MiCollab on the LAN:
|
|
MBGs |
Install MBG(s) in the DMZ:
Note: To share MBG configuration data (but not IP addresses or network profiles) amongst the systems, create a cluster. See below for instructions.
|
|
|
Configuring the Firewall |
Firewall |
|
|
Clustering the MBGs |
MiCollab and MBGs |
Create a cluster:
Subdivide the cluster into two logical zones:
|
|
Configuring MiCollab Client Deployment |
MiCollab |
Connect to the MBG(s):
Create deployment profiles for the MBG(s):
Note: Because the MiCollab server is in LAN mode, there is no need to use its local MBG in a deployment profile.
Assign deployment profiles to users:
Note: It is also possible to assign deployment profiles using templates in the Users and Services application. For conditions and configuration instructions, refer to the MiCollab documentation.
|
|
Add Web Server Certificate |
MBGs and MiCollab |
You are required to purchase a Third-Party SSL Certificate and install it on the MBG(s) in the DMZ and the MiCollab on the LAN. See MiCollab in LAN Mode with MBGs in DMZ. |
This solution consists of MiCollab on the corporate LAN and one or more MBGs providing Teleworker and Web Proxy services on the network edge. The Teleworker service is employed on both the MiCollab and MBG systems while the Web Proxy Service is provided only by the MBGs. The Teleworker service in MiCollab is only used to remotely manage the Teleworker phones that are configured on the MBGs.
To support this configuration, install the MiCollab server with the MBG application in the LAN and install one or more standalone MBG servers on the network edge. Then create a cluster that ties the MBGs together.
Conditions
The MiCollab server on the LAN must be configured in "Server-only on LAN" mode and the MBG(s) on the network edge must be configured in "Server-only on network edge" mode. (Note that MBG clustering is only supported for MiCollab systems that are configured in "Server-only on LAN" mode.)
The MBGs on the network edge must be routable to the MiCollab server on the LAN.
All MBGs must have the same software version. This ensures support for the full range of MBG features and services.
The MBG on MiCollab and the MBG(s) on the network edge must be added to a cluster. Clustering provides the following benefits:
Allows data (including Teleworker services) to be managed from the MiCollab application.
Enables licence pooling. Note that, although licences are pooled, it is recommended that you purchase all Teleworker service licenses for the MBG(s) located in the DMZ in order to avoid licensing issues.
The MiCollab and MBG nodes must reside in separate logical zones. Use the default zone for the node located on the LAN (which you may rename) and create a new zone for the nodes located on the network edge.

Key Settings
The following table lists the key settings required to successfully program the systems (MiCollab, MBGs, firewall) in conjunction with MiCollab Client Deployment. For a complete programming instructions, refer to the appropriate product documentation.
| Feature | System | Configuration |
|---|---|---|
|
Installing the Systems |
MiCollab |
Install MiCollab on the network edge:
|
|
MBGs |
Install MBG(s) on the network edge:
Note: To share MBG configuration data (but not IP addresses or network profiles) within the systems, create a cluster. See below for instructions.
|
|
|
Configuring the Firewall |
Firewall |
If you are using MBG Teleworker service on the network edge, consult the MiCollab Engineering Guidelines for a description of the port usage and firewall settings. |
|
Clustering the MBGs |
MiCollab and MBGs |
Create a cluster:
Subdivide the cluster into two logical zones:
|
|
Configuring MiCollab Client Deployment |
MiCollab |
Connect to the MBG(s):
Create deployment profiles for the MBG(s):
Note: Because the MiCollab server is in LAN mode, there is no need to use its local MBG in a deployment profile.
Assign deployment profiles to users:
Note: It is also possible to assign deployment profiles using templates in the Users and Services application. For conditions and configuration instructions, refer to the MiCollab documentation.
|
|
Add Web Server Certificate |
MBGs and MiCollab |
You are required to purchase a Third-Party SSL Certificate and install it on the MBG(s) on the network edge and the MiCollab on the LAN. See MiCollab Server in LAN Mode. |
Network Edge (Server-Gateway) mode can be used to deploy any of the MiCollab applications. In this configuration, MiCollab must have direct Internet access, which is required by the MBG Teleworker and MiCollab Client applications.
Conditions
The MiCollab server requires two Ethernet adaptors. One adapter is configured as "Local" for connection to the LAN, and the other is configured as "WAN" for connection to the Internet. The WAN network adapter requires a publicly routable IP address that is accessible to both the Internet and the LAN (in other words, the server should not reside behind a NAT device).
Preferably, MiCollab should be used in conjunction with the corporate firewall. The MiCollab system acts as a firewall/gateway for MiCollab applications while the corporate firewall controls data traffic for the enterprise. If your voice/telephony network and your data network are separate, connect the MiCollab's local network adapter to the voice/telephony network in order to support the MiCollab's telephony applications.
Network Edge (Server-Gateway) mode involves a number of security considerations:
Most application traffic is encrypted, because the system supports Secure Real-time Transport Protocol (SRTP) for SIP traffic on both the ICP side as well as the set side of the network edge. However, calls between SIP endpoints and some older Mitel MiNET devices may be unencrypted because the MiNET devices only support RTP. This issue does not arise when newer Mitel MiNET devices are in use.
When using Teleworker in conjunction with LAN-facing applications, you must ensure that they review the configuration in relation to your corporate security policy. You may choose to deploy Teleworker on a separate server in a DMZ.

Key Settings
The following table lists the key settings required to successfully program the systems (MiCollab, MBGs, firewall) in conjunction with MiCollab Client Deployment. For a complete programming instructions, refer to the appropriate product documentation.
| Feature | System | Configuration |
|---|---|---|
|
Installing the Systems |
MiCollab / MBG |
Install MiCollab on the network edge (server-gateway):
|
|
Configuring the Firewall |
Firewall |
If you are using MBG Teleworker service in the DMZ, consult the MiCollab Engineering Guidelines for a description of the port usage and firewall settings. Since these settings are provided automatically and cannot be changed, the information is provided for reference only. |
|
Configuring MiCollab Client Deployment |
MiCollab |
Create a deployment profile for the MBG:
Assign deployment profiles to users:
Note: It is also possible to assign deployment profiles using templates in the Users and Services application. For conditions and configuration instructions, refer to the MiCollab documentation.
|
|
Add Web Server Certificate |
MiCollab / MBG |
You are required to purchase a Third-Party SSL Certificate and install it on the MiCollab server. See MiCollab Server in Network Edge Mode . |