13.07.2015 Views

Administration of the Avaya G350 Media Gateway - Avaya Support

Administration of the Avaya G350 Media Gateway - Avaya Support

Administration of the Avaya G350 Media Gateway - Avaya Support

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

<strong>Administration</strong> procedures33. Remove unnecessary VPN peers.●Use <strong>the</strong> show crypto isakmp key command to list all defined pre-shared keys.● Use <strong>the</strong> no crypto isakmp key command to delete unnecessary VPN peers.34. Configure VPN peers (pre-shared keys).● Use <strong>the</strong> crypto isakmp key command to define new VPN peers or assign a newpre-shared key to existing peers.<strong>G350</strong>-N(super)# crypto isakmp policy 1<strong>G350</strong>-N(isakmp-1)# encryption des<strong>G350</strong>-N(isakmp-1)# hash sha<strong>G350</strong>-N(isakmp-1)# group 2exitcrypto isakmp key preshared_key1 address 10.0.0.2 isakmp-policy 1crypto isakmp key preshared_key2 address 1.0.0.2 isakmp-policy 135. Configure IPSec transfer-sets:●●HMAC-SHA-1AES● 3DES (or DES for interconnection with legacy systems)Use <strong>the</strong> crypto ipsec transform-set command.crypto ipsec transform-set ts1 esp-3des esp-sha-hmacexitcrypto map 1<strong>G350</strong>-N(super)# set transform-set ts1<strong>G350</strong>-N(crypto-map)# set peer 10.0.0.2Done!<strong>G350</strong>-N(crypto-map)# exit<strong>G350</strong>-N(super)# crypto map 2<strong>G350</strong>-N(crypto-map)# set transform-set ts1<strong>G350</strong>-N(crypto-map)# set peer 1.0.0.2Done!<strong>G350</strong>-N(crypto-map)# exit36. Define one or more IPSec Crypto lists that provide encryption rules for traffic that needsprotection. Make sure that packets with IP source address <strong>of</strong> any <strong>of</strong> <strong>the</strong> <strong>G350</strong> interfaces for<strong>the</strong> following protocols are always encrypted:●●●TELNETFTPTFTP● SNMPUse <strong>the</strong> ip crypto-list list-id command.Issue 3 January 2005 317

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!