Administration of the Avaya G350 Media Gateway - Avaya Support

Administration of the Avaya G350 Media Gateway - Avaya Support Administration of the Avaya G350 Media Gateway - Avaya Support

downloads.avaya.com
from downloads.avaya.com More from this publisher
13.07.2015 Views

Configuring policyEditing and creating rulesTo create or edit a policy rule, you must enter the context of the rule. If the rule already exists,you can edit the rule from the rule context. If the rule does not exist, entering the rule contextcreates the rule.To enter a rule context:1. Enter the context of the list in which you want to create or edit a rule.2. Type the command ip-rule, followed by the number of the rule you want to create or edit.For example, to create rule 1, type ip-rule 1.To view the existing rules in a list, enter the list’s context and type ip show-rule. Each liststarts with a default rule. Each new rule has the same default parameters as the default rule.The default rule appears as follows:Index Protocol IP Wildcard Port Operation----- -------- --- ---------------- --------------- ------------ ----Deflt Any Src Any Any PermitDst Any AnyThis rule permits all packets.Rule criteriaThis section describes the rule criteria you can define and includes the following topics:● IP protocol — instructions on how to define the protocol to which the rule applies● Source and destination IP address — instructions on how to define the source anddestination IP addresses to which the rule applies●●●IP protocolSource and destination port range — instructions on how to define the source anddestination port ranges to which the rule appliesICMP type and code — instructions on how to define packet matching by ICMP type orcodeTCP Establish bit (access control lists only) — instructions on how to define packetmatching for TCP packets by whether the ack bit is burned onTo specify the IP protocol to which the rule applies, use the ip-protocol command, followedby the name of an IP protocol. If you want the rule to apply to all protocol, use any with thecommand. If you want the rule to apply to all protocols except for one, use the no form of thecommand, followed by the name of the protocol to which you do not want the rule to apply.262 Administration of the Avaya G350 Media Gateway

Defining rulesThe following command specifies the UDP protocol for rule 1 in QoS list 401:G350-001(QoS 401/rule 1)# ip-protocol udpThe following command specifies any IP protocol except IGMP for rule 3 in access control list302:G350-001(ACL 302/ip rule 3)# no ip-protocol igmpSource and destination IP addressTo specify a range of source and destination IP addresses to which the rule applies, use thecommands source-ip and destination-ip, followed by the IP range criteria. The IP rangecriteria can be any of the following:●●●a range — type two IP addresses to set a range of IP addresses to which the rule appliesa single address — type host, followed by an IP address, to set a single IP address towhich the rule applies.wildcard — type host, followed by an IP address using wildcards, to set a range of IPaddresses to which the rule applies● any — type any to apply the rule to all IP addressesUse the no form of the appropriate command to specify that the rule does not apply to the IPaddress or addresses defined by the command.The following command specifies a source IP address of 10.10.10.20 for rule 1 in accesscontrol list 301:G350-001(ACL 301/ip rule 1)# source-ip host 10.10.10.20The following command allows any destination IP address for rule 3 in QoS list 404:G350-001(QoS 404/rule 3)# destination-ip anyThe following command specifies a source IP address in the range 10.10.0.0 through10.10.255.255 for rule 1 in access control list 301:G350-001(ACL 301/ip rule 1)# source-ip 10.10.0.0 0.0.255.255The following command specifies a source IP address outside the range 64.236.24.0 through64.236.24.255 for rule 7 in access control list 308:G350-001(ACL 308/ip rule 7)# no source-ip 64.236.24.0 0.0.0.255The following command specifies a source IP address in the range 64..24. for rule6 in access control list 350:G350-001(ACL 350/ip rule 6)# source-ip 64.*.24.*Issue 3 January 2005 263

Configuring policyEditing and creating rulesTo create or edit a policy rule, you must enter <strong>the</strong> context <strong>of</strong> <strong>the</strong> rule. If <strong>the</strong> rule already exists,you can edit <strong>the</strong> rule from <strong>the</strong> rule context. If <strong>the</strong> rule does not exist, entering <strong>the</strong> rule contextcreates <strong>the</strong> rule.To enter a rule context:1. Enter <strong>the</strong> context <strong>of</strong> <strong>the</strong> list in which you want to create or edit a rule.2. Type <strong>the</strong> command ip-rule, followed by <strong>the</strong> number <strong>of</strong> <strong>the</strong> rule you want to create or edit.For example, to create rule 1, type ip-rule 1.To view <strong>the</strong> existing rules in a list, enter <strong>the</strong> list’s context and type ip show-rule. Each liststarts with a default rule. Each new rule has <strong>the</strong> same default parameters as <strong>the</strong> default rule.The default rule appears as follows:Index Protocol IP Wildcard Port Operation----- -------- --- ---------------- --------------- ------------ ----Deflt Any Src Any Any PermitDst Any AnyThis rule permits all packets.Rule criteriaThis section describes <strong>the</strong> rule criteria you can define and includes <strong>the</strong> following topics:● IP protocol — instructions on how to define <strong>the</strong> protocol to which <strong>the</strong> rule applies● Source and destination IP address — instructions on how to define <strong>the</strong> source anddestination IP addresses to which <strong>the</strong> rule applies●●●IP protocolSource and destination port range — instructions on how to define <strong>the</strong> source anddestination port ranges to which <strong>the</strong> rule appliesICMP type and code — instructions on how to define packet matching by ICMP type orcodeTCP Establish bit (access control lists only) — instructions on how to define packetmatching for TCP packets by whe<strong>the</strong>r <strong>the</strong> ack bit is burned onTo specify <strong>the</strong> IP protocol to which <strong>the</strong> rule applies, use <strong>the</strong> ip-protocol command, followedby <strong>the</strong> name <strong>of</strong> an IP protocol. If you want <strong>the</strong> rule to apply to all protocol, use any with <strong>the</strong>command. If you want <strong>the</strong> rule to apply to all protocols except for one, use <strong>the</strong> no form <strong>of</strong> <strong>the</strong>command, followed by <strong>the</strong> name <strong>of</strong> <strong>the</strong> protocol to which you do not want <strong>the</strong> rule to apply.262 <strong>Administration</strong> <strong>of</strong> <strong>the</strong> <strong>Avaya</strong> <strong>G350</strong> <strong>Media</strong> <strong>Gateway</strong>

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!