13.07.2015 Views

Administration of the Avaya G350 Media Gateway - Avaya Support

Administration of the Avaya G350 Media Gateway - Avaya Support

Administration of the Avaya G350 Media Gateway - Avaya Support

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Configuring IPSec VPNConfiguring <strong>the</strong> simple VPN topologyThis section describes how to configure <strong>the</strong> simple VPN topology, followed by a detailedconfiguration example.To configure <strong>the</strong> simple VPN topology1. Configure each branch as follows:● The default gateway is <strong>the</strong> Internet interface.● VPN policy is configured on <strong>the</strong> Internet interface egress as follows:Traffic from <strong>the</strong> local subnets to anyone is encrypted, using tunnel mode IPSec,with <strong>the</strong> remote peer being <strong>the</strong> Main Office (<strong>the</strong> VPN Hub)● ACL is configured on <strong>the</strong> Internet interface to allow only <strong>the</strong> VPN / ICMP traffic, asfollows:Ingress:1. IKE from remote tunnel endpoint to local tunnel endpoint -> Permit2. ESP from remote tunnel endpoint to local tunnel endpoint -> Permit3. ICMP from anyone to local tunnel endpoint -> PermitNote:Note:Note:This allows PMTUD application to work.4. All allowed services from anyone to any local subnet -> PermitNote:Due to <strong>the</strong> definition <strong>of</strong> <strong>the</strong> VPN Policy, this will be allowed only if traffic comesover ESP.5. Default -> DenyEgress:1. IKE from local tunnel endpoint to remote tunnel endpoint -> Permit2. ESP from local tunnel endpoint to remote tunnel endpoint -> Permit3. ICMP from local tunnel endpoint to anyone -> PermitNote: This allows <strong>the</strong> PMTUD application to work.4. All allowed services from any local subnet to anyone -> PermitNote: This traffic is tunnelled using VPN.5. Default -> Deny2. Configure <strong>the</strong> VPN Hub (Main Office) as follows:● Static routing: Branch subnets -> Internet interface.● The VPN policy portion for <strong>the</strong> branch is configured as a mirror image <strong>of</strong> <strong>the</strong> branch, asfollows:Traffic from any to branch local subnets -> encrypt, using tunnel mode IPSec, with <strong>the</strong>remote peer being <strong>the</strong> VPN Spoke (Branch Internet address).222 <strong>Administration</strong> <strong>of</strong> <strong>the</strong> <strong>Avaya</strong> <strong>G350</strong> <strong>Media</strong> <strong>Gateway</strong>

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!