Administration of the Avaya G350 Media Gateway - Avaya Support

Administration of the Avaya G350 Media Gateway - Avaya Support Administration of the Avaya G350 Media Gateway - Avaya Support

downloads.avaya.com
from downloads.avaya.com More from this publisher
13.07.2015 Views

Configuring policyComposite operationsThis section describes composite operations and includes the following topics:●●●●●Overview of composite operations — an overview of composite operations and how theyare usedPre-configured composite operations for access control lists — a list and descriptions ofthe pre-configured composite operations that you can use in access control list rulesPre-configured composite operations for QoS lists — a list and descriptions of thepre-configured composite operations that you can use in QOS list rulesConfiguring composite operations — instructions on how to configure additional compositeoperationsComposite operation example — an example of configuring a composite operation andattaching it to a ruleOverview of composite operationsA composite operation is a set of operations that the G350 can perform when a rule matches apacket. Every rule in a policy list has an operation field that specifies a composite operation.The operation field determines how the G350 handles a packet when the rule matches thepacket.There are different composite operations for access control list rules and QoS list rules. Foreach type of list, the G350 includes a pre-configured list of composite operations. You cannotchange or delete pre-configured composite operations. You can define additional compositeoperations.Pre-configured composite operations for access control listsThe following table lists the pre-configured entries in the composite operation table for rules inan access control list:No Name Access Notify Reset Connection0 Permit forward no trap no reset1 Deny deny no trap no reset2 Deny-Notify deny trap all no reset3 Deny-Rst deny no trap reset4 Deny-Notify-Rst deny trap all reset266 Administration of the Avaya G350 Media Gateway

Composite operationsEach column represents the following:●●●●●No — a number identifying the operationName — a name identifying the operation. Use this name to attach the operation to a rule.Access — determines whether the operation forwards (forward) or drops (deny) thepacketNotify — determines whether the operation causes the G350 to send a trap when it dropsa packetReset Connection — determines whether the operation causes the G350 to reset theconnection when it drops a packetPre-configured composite operations for QoS listsTable 10: Pre-configured QoS list composite operations on page 267 lists the pre-configuredentries in the composite operation table for rules in a QoS list:Each column represents the following:●●Table 10: Pre-configured QoS list composite operationsNo Name CoS DSCP Trust0 CoS0 cos0 no change No1 CoS1 cos1 no change No2 CoS2 cos2 no change No3 CoS3 cos3 no change No4 CoS4 cos4 no change No5 CoS5 cos5 no change No6 CoS6 cos6 no change No7 CoS7 cos7 no change No9 No-Change no change no change No10 Trust-DSCP - - DSCP11 Trust-DSCP-CoS - - DSCP and CoSNo — a number identifying the operationName — a name identifying the operation. Use this name to attach the operation to a rule.Issue 3 January 2005 267

Composite operationsEach column represents <strong>the</strong> following:●●●●●No — a number identifying <strong>the</strong> operationName — a name identifying <strong>the</strong> operation. Use this name to attach <strong>the</strong> operation to a rule.Access — determines whe<strong>the</strong>r <strong>the</strong> operation forwards (forward) or drops (deny) <strong>the</strong>packetNotify — determines whe<strong>the</strong>r <strong>the</strong> operation causes <strong>the</strong> <strong>G350</strong> to send a trap when it dropsa packetReset Connection — determines whe<strong>the</strong>r <strong>the</strong> operation causes <strong>the</strong> <strong>G350</strong> to reset <strong>the</strong>connection when it drops a packetPre-configured composite operations for QoS listsTable 10: Pre-configured QoS list composite operations on page 267 lists <strong>the</strong> pre-configuredentries in <strong>the</strong> composite operation table for rules in a QoS list:Each column represents <strong>the</strong> following:●●Table 10: Pre-configured QoS list composite operationsNo Name CoS DSCP Trust0 CoS0 cos0 no change No1 CoS1 cos1 no change No2 CoS2 cos2 no change No3 CoS3 cos3 no change No4 CoS4 cos4 no change No5 CoS5 cos5 no change No6 CoS6 cos6 no change No7 CoS7 cos7 no change No9 No-Change no change no change No10 Trust-DSCP - - DSCP11 Trust-DSCP-CoS - - DSCP and CoSNo — a number identifying <strong>the</strong> operationName — a name identifying <strong>the</strong> operation. Use this name to attach <strong>the</strong> operation to a rule.Issue 3 January 2005 267

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!