Administration of the Avaya G350 Media Gateway - Avaya Support
Administration of the Avaya G350 Media Gateway - Avaya Support Administration of the Avaya G350 Media Gateway - Avaya Support
Configuring IPSec VPN252 Administration of the Avaya G350 Media Gateway
Chapter 18: Configuring policyThis chapter provides information about configuring QoS policy on the G350 and contains thefollowing sections:●●●●●●●●●Policy overview — an overview of QoS policy configurationDefining policy lists — instructions on how to configure policy listsAttaching policy lists to an interface — instructions on how to attach a policy list to aninterfaceDevice-wide policy lists — instructions on how to attach a policy list to all interfacesDefining global rules — instructions on how to configure rules that are executed before thelist is evaluatedDefining rules — instructions on how to configure rules, including an overview of rulecriteriaComposite operations — a description of composite operations and instructions on how toconfigure composite operationsDSCP table — a description of the DSCP table, with examplesDisplaying and testing policy lists — instructions on how to view the configuration of policylists and test their effects on simulated IP packetsPolicy overviewThis section provides an overview of policy lists on the G350 and includes the following topics:●●●●Access control lists — a description of access control lists, which control which packets areauthorized to pass through an interfaceQoS lists — a description of QoS lists, which can change the value of the QoS field in apacketPolicy-based routing — an overview of policy-based routing, which is described in moredetail in Configuring policy-based routing on page 273Managing policy lists — an overview of how to manage policy lists on the G350Issue 3 January 2005 253
- Page 202 and 203: Configuring the routerReassembly pa
- Page 204 and 205: Configuring IPSec VPNConfiguring a
- Page 206 and 207: Configuring IPSec VPNConfiguring IP
- Page 208 and 209: Configuring IPSec VPNPrerequisite -
- Page 210 and 211: Configuring IPSec VPN●hash: the h
- Page 212 and 213: Configuring IPSec VPNTo configure p
- Page 214 and 215: Configuring IPSec VPN3. Exit crypto
- Page 216 and 217: Configuring IPSec VPN9. Exit crypto
- Page 218 and 219: Configuring IPSec VPNIPSec VPN main
- Page 220 and 221: Configuring IPSec VPN2. Use the set
- Page 222 and 223: Configuring IPSec VPNConfiguring th
- Page 224 and 225: Configuring IPSec VPNip-rule 30sour
- Page 226 and 227: Configuring IPSec VPNFull or partia
- Page 228 and 229: Configuring IPSec VPN2. Configure b
- Page 230 and 231: Configuring IPSec VPNip-rule 4sourc
- Page 232 and 233: Configuring IPSec VPNip-rule 10sour
- Page 234 and 235: Configuring IPSec VPN2. Configure B
- Page 236 and 237: Configuring IPSec VPNip-rule 20sour
- Page 238 and 239: Configuring IPSec VPNInterface vlan
- Page 240 and 241: Configuring IPSec VPN3. Allowed ICM
- Page 242 and 243: Configuring IPSec VPNip access-cont
- Page 244 and 245: Configuring IPSec VPNip-rule 70sour
- Page 246 and 247: Configuring IPSec VPNFigure 21: Ful
- Page 248 and 249: Configuring IPSec VPNConfiguration
- Page 250 and 251: Configuring IPSec VPNip-rule 30sour
- Page 254 and 255: Configuring policyAccess control li
- Page 256 and 257: Configuring policyDefining policy l
- Page 258 and 259: Configuring policyAttaching policy
- Page 260 and 261: Configuring policyDevice-wide polic
- Page 262 and 263: Configuring policyEditing and creat
- Page 264 and 265: Configuring policySource and destin
- Page 266 and 267: Configuring policyComposite operati
- Page 268 and 269: Configuring policy●●●CoS —
- Page 270 and 271: Configuring policyThe following com
- Page 272 and 273: Configuring policySimulating packet
- Page 274 and 275: Configuring policy-based routingPol
- Page 276 and 277: Configuring policy-based routingCon
- Page 278 and 279: Configuring policy-based routing●
- Page 280 and 281: Configuring policy-based routingMod
- Page 282 and 283: Configuring policy-based routingEdi
- Page 284 and 285: Configuring policy-based routingIn
- Page 286 and 287: Configuring policy-based routingThe
- Page 288 and 289: Setting synchronizationIf, for any
- Page 290 and 291: FIPSFigure 26: Image of the cryptog
- Page 292 and 293: FIPSSupported algorithmsThe cryptog
- Page 294 and 295: FIPSSecurity levelThe cryptographic
- Page 296 and 297: FIPSTable 14: Roles and required id
- Page 298 and 299: FIPSTable 15: Critical security par
- Page 300 and 301: FIPSCSP access rights within roles
Chapter 18: Configuring policyThis chapter provides information about configuring QoS policy on <strong>the</strong> <strong>G350</strong> and contains <strong>the</strong>following sections:●●●●●●●●●Policy overview — an overview <strong>of</strong> QoS policy configurationDefining policy lists — instructions on how to configure policy listsAttaching policy lists to an interface — instructions on how to attach a policy list to aninterfaceDevice-wide policy lists — instructions on how to attach a policy list to all interfacesDefining global rules — instructions on how to configure rules that are executed before <strong>the</strong>list is evaluatedDefining rules — instructions on how to configure rules, including an overview <strong>of</strong> rulecriteriaComposite operations — a description <strong>of</strong> composite operations and instructions on how toconfigure composite operationsDSCP table — a description <strong>of</strong> <strong>the</strong> DSCP table, with examplesDisplaying and testing policy lists — instructions on how to view <strong>the</strong> configuration <strong>of</strong> policylists and test <strong>the</strong>ir effects on simulated IP packetsPolicy overviewThis section provides an overview <strong>of</strong> policy lists on <strong>the</strong> <strong>G350</strong> and includes <strong>the</strong> following topics:●●●●Access control lists — a description <strong>of</strong> access control lists, which control which packets areauthorized to pass through an interfaceQoS lists — a description <strong>of</strong> QoS lists, which can change <strong>the</strong> value <strong>of</strong> <strong>the</strong> QoS field in apacketPolicy-based routing — an overview <strong>of</strong> policy-based routing, which is described in moredetail in Configuring policy-based routing on page 273Managing policy lists — an overview <strong>of</strong> how to manage policy lists on <strong>the</strong> <strong>G350</strong>Issue 3 January 2005 253