13.07.2015 Views

Administration of the Avaya G350 Media Gateway - Avaya Support

Administration of the Avaya G350 Media Gateway - Avaya Support

Administration of the Avaya G350 Media Gateway - Avaya Support

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Configuring IPSec VPN2. Configure branch <strong>of</strong>fice 2 as follows:●●The default gateway is <strong>the</strong> Internet interface.VPN policy is configured on <strong>the</strong> Internet interface egress as follows:●●Traffic from <strong>the</strong> local subnets to <strong>the</strong> First Spoke subnets -> encrypt, using tunnel modeIPSec, with <strong>the</strong> remote peer being <strong>the</strong> First Spoke.Traffic from <strong>the</strong> local subnets to anyone -> encrypt, using tunnel mode IPSec,with <strong>the</strong> remote peer being <strong>the</strong> Main Office (VPN hub)● ACL is configured on <strong>the</strong> Internet interface to allow only <strong>the</strong> VPN / ICMP traffic, asfollows:Ingress:1. IKE from Main Office IP to Branch IP -> Permit2. ESP from Main Office IP to Branch IP -> Permit3. IKE from First Branch IP to Branch IP -> Permit4. ESP from First Branch IP to Branch IP -> Permit5. ICMP from anyone to local tunnel endpoint -> PermitNote: This allows PMTUD application to work.6. All allowed services from anyone to any local subnet -> PermitNote: Due to <strong>the</strong> definition <strong>of</strong> <strong>the</strong> VPN Policy, this will be allowed only if traffic comesover ESP.7. Default -> DenyEgress:1. IKE from Branch IP to Main Office IP -> Permit2. ESP from Branch IP to Main Office IP -> Permit3. IKE from Branch IP to First Branch IP -> Permit4. ESP from Branch IP to First Branch IP -> Permit5. ICMP from local tunnel endpoint to anyone -> PermitNote: This allows <strong>the</strong> PMTUD application to work.6. All allowed services from any local subnet to anyone -> PermitNote: This traffic is tunnelled using VPN.7. Default -> Deny3. Configure <strong>the</strong> VPN Hub (Main Office) as follows:● Static routing: Branch subnets -> Internet interface.●The VPN policy portion for <strong>the</strong> branch is configured as a mirror image <strong>of</strong> <strong>the</strong> branch, asfollows:Traffic from anyone to branch local subnets -> encrypt, using tunnel mode IPSec, with<strong>the</strong> remote peer being <strong>the</strong> VPN Spoke (Branch Internet address).228 <strong>Administration</strong> <strong>of</strong> <strong>the</strong> <strong>Avaya</strong> <strong>G350</strong> <strong>Media</strong> <strong>Gateway</strong>

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!