13.07.2015 Views

Administration of the Avaya G350 Media Gateway - Avaya Support

Administration of the Avaya G350 Media Gateway - Avaya Support

Administration of the Avaya G350 Media Gateway - Avaya Support

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Configuring IPSec VPNConfiguring a site-to-site IPSec VPNTo configure a site-to-site IPSec VPN, two devices (<strong>the</strong> <strong>G350</strong> and a peer <strong>Gateway</strong>) must beconfigured symmetrically. The following sections provide an overview <strong>of</strong> IPSec VPNconfiguration, followed by detailed step-by-step instructions.Overview <strong>of</strong> IPSec VPN configurationThe basic IPSec VPN building blocks define how to secure packets, as follows:●ISAKMP policies – define parameters for IKE phase 1 negotiation● Transform-sets – define parameters for IKE phase 2 negotiationOnce <strong>the</strong> building blocks are defined, IPSec VPN is implemented using a crypto-list. Thecrypto-list defines, for <strong>the</strong> interface it which it applies, which packets should be secured andhow, as follows:Each rule in <strong>the</strong> crypto-list points to a crypto-map. A crypto-map points to a transform-set, andto a peer. The peer, in turn, points to an ISAKMP policy.The following diagram illustrates IPSec VPN components and <strong>the</strong>ir relationships:204 <strong>Administration</strong> <strong>of</strong> <strong>the</strong> <strong>Avaya</strong> <strong>G350</strong> <strong>Media</strong> <strong>Gateway</strong>

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!