Administration of the Avaya G350 Media Gateway - Avaya Support

Administration of the Avaya G350 Media Gateway - Avaya Support Administration of the Avaya G350 Media Gateway - Avaya Support

downloads.avaya.com
from downloads.avaya.com More from this publisher
13.07.2015 Views

Configuring IPSec VPN3. Exit crypto map context using the exit CLI command.G350-001(config-crypto:1)# exitG350-001#Configuring crypto-listsA crypto-list is an ordered list of ip-rules that control which traffic requires IPSec protection andwhich does not, based on IP groups (source and destination IP addresses/mask). A crypto-listis activated on an interface. The G350 can have multiple crypto-lists activated on differentinterfaces.To configure a crypto-list:1. Enter the crypto-list context and create a crypto-list by using the crypto-list CLIcommand.Important:! Important:It is mandatory to create at least one crypto-list.G350-001# ip crypto-list 901G350-001(Crypto 901)#2. Configure the following parameters:●local address: the local IP address for the IPSec tunnels derived from this crypto list.Important:●●●! Important:local address is a mandatory parameter.name: the name of the crypto listowner: the owner of the crypto listcookie: the list cookie for this crypto list. This parameter is used by QoS Manager.G350-001(Crypto 901)# local address 192.168.49.1Done!G350-001(Crypto 901)# name “Public Network via ADSL”Done!G350-001(Crypto 901)# owner louDone!G350-001(Crypto 901)# cookie 1Done!214 Administration of the Avaya G350 Media Gateway

Configuring a site-to-site IPSec VPN3. Enter the ip-rule context and define an ip-rule using the ip-rule CLI command.Important:! Important:It is mandatory to create at least one ip-rule.G350-001(Crypto 901Crypto 901)# ip-rule 10G350-001(Crypto 901/ip rule 10)#4. Configure the following ip-rule parameters:●●●source ip: the requested source IP address to matchdestination ip: the requested destination IP address to matchDefine the action: specify whether to protect traffic that matches the source anddestination addresses:●●no protect: do not protect traffic that matches the source and destinationaddressesprotect crypto map : protect traffic that matches the sourceand destination addresses. The specified crypto map specifies how to secure thetraffic.G350-001(Crypto 901/ip rule 10)# source-ip 10.1.0.0 0.0.255.255Done!G350-001(Crypto 901/ip rule 10)# destination-ip anyDone!G350-001(Crypto 901/ip rule 10)# protect crypto map 1Done!5. Exit ip-rule context using the exit CLI command.G350-001(Crypto 901/ip rule 10)# exitG350-001(Crypto 901)#6. Repeat steps 3, 4 and 5 for every ip-rule you wish to define in the crypto-list.7. Create a last ip-rule using the ip-rule default command. This rule specifies whichaction to take if a packet matches non of the previous rules. Within this ip-rule context,define only whether to protect or no protect traffic.G350-001(Crypto 901Crypto 901)# ip-rule defaultG350-001(Crypto 901/ip rule default)# protect crypto map 1Done!8. Exit ip-rule context using the exit CLI command.G350-001(Crypto 901/ip rule default)# exitG350-001(Crypto 901)#Issue 3 January 2005 215

Configuring a site-to-site IPSec VPN3. Enter <strong>the</strong> ip-rule context and define an ip-rule using <strong>the</strong> ip-rule CLI command.Important:! Important:It is mandatory to create at least one ip-rule.<strong>G350</strong>-001(Crypto 901Crypto 901)# ip-rule 10<strong>G350</strong>-001(Crypto 901/ip rule 10)#4. Configure <strong>the</strong> following ip-rule parameters:●●●source ip: <strong>the</strong> requested source IP address to matchdestination ip: <strong>the</strong> requested destination IP address to matchDefine <strong>the</strong> action: specify whe<strong>the</strong>r to protect traffic that matches <strong>the</strong> source anddestination addresses:●●no protect: do not protect traffic that matches <strong>the</strong> source and destinationaddressesprotect crypto map : protect traffic that matches <strong>the</strong> sourceand destination addresses. The specified crypto map specifies how to secure <strong>the</strong>traffic.<strong>G350</strong>-001(Crypto 901/ip rule 10)# source-ip 10.1.0.0 0.0.255.255Done!<strong>G350</strong>-001(Crypto 901/ip rule 10)# destination-ip anyDone!<strong>G350</strong>-001(Crypto 901/ip rule 10)# protect crypto map 1Done!5. Exit ip-rule context using <strong>the</strong> exit CLI command.<strong>G350</strong>-001(Crypto 901/ip rule 10)# exit<strong>G350</strong>-001(Crypto 901)#6. Repeat steps 3, 4 and 5 for every ip-rule you wish to define in <strong>the</strong> crypto-list.7. Create a last ip-rule using <strong>the</strong> ip-rule default command. This rule specifies whichaction to take if a packet matches non <strong>of</strong> <strong>the</strong> previous rules. Within this ip-rule context,define only whe<strong>the</strong>r to protect or no protect traffic.<strong>G350</strong>-001(Crypto 901Crypto 901)# ip-rule default<strong>G350</strong>-001(Crypto 901/ip rule default)# protect crypto map 1Done!8. Exit ip-rule context using <strong>the</strong> exit CLI command.<strong>G350</strong>-001(Crypto 901/ip rule default)# exit<strong>G350</strong>-001(Crypto 901)#Issue 3 January 2005 215

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!