- Page 1 and 2: Administration of theAvaya G350 Med
- Page 3 and 4: Electromagnetic Compatibility (EMC)
- Page 5: ContentsAbout this Book . . . . . .
- Page 9 and 10: ContentsSNMPv3. . . . . . . . . . .
- Page 11 and 12: ContentsAdditional GRE tunnel param
- Page 13 and 14: ContentsChapter 18: Configuring pol
- Page 15 and 16: ContentsAdministration procedures .
- Page 17 and 18: About this BookOverviewAdministrati
- Page 19 and 20: Technical assistanceTechnical assis
- Page 21 and 22: Chapter 1:IntroductionThe Avaya G35
- Page 23 and 24: Chapter 2:Configuration overviewThi
- Page 25 and 26: Configuration using CLIConfiguratio
- Page 27 and 28: Chapter 3:Accessing the Avaya G350
- Page 29 and 30: Accessing the CLIIf you type help o
- Page 31 and 32: Accessing the CLIAccessing CLI via
- Page 33 and 34: Accessing Avaya IWWhen performing i
- Page 35 and 36: Accessing Avaya Communication Manag
- Page 37 and 38: Managing login permissionsManaging
- Page 39 and 40: Managing login permissionsSSH Confi
- Page 41 and 42: Managing login permissionsTo disabl
- Page 43 and 44: Managing login permissions4. Use th
- Page 45 and 46: Managing login permissions●●Use
- Page 47 and 48: Managing login permissionsTable 1:
- Page 49 and 50: Chapter 4:Basic device configuratio
- Page 51 and 52: Defining the default gatewayIf you
- Page 53 and 54: Configuring the Media Gateway Contr
- Page 55 and 56: Viewing the status of the deviceTo
- Page 57 and 58:
Version managementFile transferThe
- Page 59 and 60:
Version management●●●●●
- Page 61 and 62:
Chapter 5:Configuring Ethernet port
- Page 63 and 64:
Configuring the WAN Ethernet port
- Page 65 and 66:
Chapter 6:Configuring loggingThis c
- Page 67 and 68:
Logging fileTo delete a Syslog serv
- Page 69 and 70:
Filters and severity levelsTable 5:
- Page 71 and 72:
Chapter 7:Configuring VoIP QoSThis
- Page 73 and 74:
Configuring RTP and RTCPNote:Note:N
- Page 75 and 76:
Configuring RTCP QoS parametersConf
- Page 77 and 78:
Chapter 8:Configuring the G350 for
- Page 79 and 80:
Configuring the console port for mo
- Page 81 and 82:
Chapter 9:Configuring a WAN Interfa
- Page 83 and 84:
Serial interface overviewSerial int
- Page 85 and 86:
Initial WAN configurationInitial WA
- Page 87 and 88:
Initial WAN configuration7. Use the
- Page 89 and 90:
Initial WAN configuration2. Use the
- Page 91 and 92:
Initial WAN configuration6. Test th
- Page 93 and 94:
Initial WAN configuration4. Configu
- Page 95 and 96:
Initial WAN configurationConfigurin
- Page 97 and 98:
Backup interfaces●Use the show fr
- Page 99 and 100:
Extended keepaliveBackup commandsUs
- Page 101 and 102:
Dynamic CAC●●●Use the extende
- Page 103 and 104:
Frame relay encapsulationFrame rela
- Page 105 and 106:
WAN configuration examplePriority q
- Page 107 and 108:
WAN configuration example● Networ
- Page 109 and 110:
WAN configuration exampleConfigurat
- Page 111 and 112:
Chapter 10: Configuring PoEThis cha
- Page 113 and 114:
PoE overviewPlug and Play Operation
- Page 115 and 116:
PoE configuration examplesPowerline
- Page 117 and 118:
Chapter 11: Configuring Emergency T
- Page 119 and 120:
Chapter 12: Configuring SNMPThis ch
- Page 121 and 122:
SNMP versionsSNMPv1SNMPv1 uses comm
- Page 123 and 124:
SNMP versionsGroupsIn SNMPv3, each
- Page 125 and 126:
Configuring SNMP trapsConfiguring S
- Page 127 and 128:
Configuring SNMP accessConfiguring
- Page 129 and 130:
SNMP configuration examplesThe foll
- Page 131 and 132:
Chapter 13: Configuring advanced sw
- Page 133 and 134:
Configuring VLANsFigure 10: VLAN Ex
- Page 135 and 136:
Configuring VLANsIngress VLAN secur
- Page 137 and 138:
Configuring VLANsThe following exam
- Page 139 and 140:
Configuring port redundancyConfigur
- Page 141 and 142:
Configuring port mirroringPort redu
- Page 143 and 144:
Configuring spanning treeThe follow
- Page 145 and 146:
Configuring spanning treePort roles
- Page 147 and 148:
Configuring spanning tree●●●U
- Page 149 and 150:
Port classification6 /21 not-connec
- Page 151 and 152:
Chapter 14: Configuring contact clo
- Page 153 and 154:
Showing contact closure statusTo ac
- Page 155 and 156:
Chapter 15: Configuring RMON monito
- Page 157 and 158:
RMON configuration examplesRising t
- Page 159 and 160:
Chapter 16: Configuring the routerT
- Page 161 and 162:
Configuring interfacesRouter interf
- Page 163 and 164:
Configuring the routing tableUse th
- Page 165 and 166:
Configuring the routing tableVia-in
- Page 167 and 168:
Configuring GRE tunnelingGRE tunnel
- Page 169 and 170:
Configuring GRE tunneling●A combi
- Page 171 and 172:
Configuring GRE tunnelingOptional G
- Page 173 and 174:
Configuring GRE tunneling3. In the
- Page 175 and 176:
Configuring GRE tunnelingGRE tunnel
- Page 177 and 178:
Configuring DHCP and BOOTP relayCon
- Page 179 and 180:
Configuring DHCP serverConfiguring
- Page 181 and 182:
Configuring DHCP serverDHCP server
- Page 183 and 184:
Configuring DHCP serverConfiguring
- Page 185 and 186:
Configuring broadcast relayThe foll
- Page 187 and 188:
Configuring the ARP tableConfigurin
- Page 189 and 190:
Enabling proxy ARPARP table command
- Page 191 and 192:
Configuring RIPRIPv1RIPv2The very s
- Page 193 and 194:
Configuring RIPRIP limitationsConfi
- Page 195 and 196:
Configuring OSPFIn OSPF, routers us
- Page 197 and 198:
Route redistribution●●●●●
- Page 199 and 200:
Configuring VRRPIn VRRP, two or mor
- Page 201 and 202:
Configuring fragmentation●●Use
- Page 203 and 204:
Chapter 17: Configuring IPSec VPNTh
- Page 205 and 206:
Configuring a site-to-site IPSec VP
- Page 207 and 208:
Configuring a site-to-site IPSec VP
- Page 209 and 210:
Configuring a site-to-site IPSec VP
- Page 211 and 212:
Configuring a site-to-site IPSec VP
- Page 213 and 214:
Configuring a site-to-site IPSec VP
- Page 215 and 216:
Configuring a site-to-site IPSec VP
- Page 217 and 218:
Configuring a site-to-site IPSec VP
- Page 219 and 220:
IPSec VPN maintenanceTip:●●Use
- Page 221 and 222:
Typical installationsTypical instal
- Page 223 and 224:
Typical installationsConfiguration
- Page 225 and 226:
Typical installationsip-rule 50dest
- Page 227 and 228:
Typical installationsConfiguring th
- Page 229 and 230:
Typical installationsConfiguration
- Page 231 and 232:
Typical installationsip-rule 20sour
- Page 233 and 234:
Typical installationsInterface vlan
- Page 235 and 236:
Typical installationsip-rule 4sourc
- Page 237 and 238:
Typical installationsip-rule 10sour
- Page 239 and 240:
Typical installationsFigure 20: Hub
- Page 241 and 242:
Typical installationsConfiguration
- Page 243 and 244:
Typical installationsip-rule 70sour
- Page 245 and 246:
Typical installationsip route 255.2
- Page 247 and 248:
Typical installations●4. Allowed
- Page 249 and 250:
Typical installationsip-rule 20sour
- Page 251 and 252:
Typical installationsinterface Seri
- Page 253 and 254:
Chapter 18: Configuring policyThis
- Page 255 and 256:
Policy overviewPolicy-based routing
- Page 257 and 258:
Defining policy listsDefining list
- Page 259 and 260:
Attaching policy lists to an interf
- Page 261 and 262:
Defining rulesThe composite command
- Page 263 and 264:
Defining rulesThe following command
- Page 265 and 266:
Defining rulesICMP type and codeTo
- Page 267 and 268:
Composite operationsEach column rep
- Page 269 and 270:
DSCP tableComposite operation examp
- Page 271 and 272:
Displaying and testing policy lists
- Page 273 and 274:
Chapter 19: Configuring policy-base
- Page 275 and 276:
ApplicationsFigure 24: Policy-based
- Page 277 and 278:
Configuring Policy-Based RoutingThe
- Page 279 and 280:
PBR RulesPBR RulesEach PBR list can
- Page 281 and 282:
Next Hop ListsNext hop list overvie
- Page 283 and 284:
Application example●●In PBR lis
- Page 285 and 286:
Application exampleG350-001(super-P
- Page 287 and 288:
Chapter 20: Setting synchronization
- Page 289 and 290:
Chapter 21: FIPSThis chapter provid
- Page 291 and 292:
OverviewTable 11: Physical and logi
- Page 293 and 294:
OverviewNon-FIPS mode of operationI
- Page 295 and 296:
OverviewTable 14: Roles and require
- Page 297 and 298:
OverviewCritical security parameter
- Page 299 and 300:
OverviewTable 15: Critical security
- Page 301 and 302:
OverviewTable 17: CSP access rights
- Page 303 and 304:
OverviewTable 18: Role and service
- Page 305 and 306:
Security rulesNote:5. The cryptogra
- Page 307 and 308:
Administration proceduresPrerequisi
- Page 309 and 310:
Administration procedures5. Verify
- Page 311 and 312:
Administration procedures15. To dis
- Page 313 and 314:
Administration procedures●Use the
- Page 315 and 316:
Administration procedures26. Config
- Page 317 and 318:
Administration procedures33. Remove
- Page 319 and 320:
Administration proceduresFailure sc
- Page 321 and 322:
Administration proceduresFigure 27:
- Page 323 and 324:
Appendix A: Traps and MIBsThis appe
- Page 325 and 326:
G350 trapsNameParameters(MIB variab
- Page 327 and 328:
G350 trapsNameParameters(MIB variab
- Page 329 and 330:
G350 trapsNameParameters(MIB variab
- Page 331 and 332:
G350 MIBsNameParameters(MIB variabl
- Page 333 and 334:
G350 MIBsMIB FilePPP-LCP-MIB.myWAN-
- Page 335 and 336:
G350 MIBsObject OIDfrDlcmiErrorThre
- Page 337 and 338:
G350 MIBsThe following table provid
- Page 339 and 340:
G350 MIBsObject OIDvrrpOperAuthType
- Page 341 and 342:
G350 MIBsObject OIDdot1dStpPortOper
- Page 343 and 344:
G350 MIBsObject OIDdsx1IntervalESs
- Page 345 and 346:
G350 MIBsObject OIDifAdminStatus 1.
- Page 347 and 348:
G350 MIBsObject OIDipRouteInfo 1.3.
- Page 349 and 350:
G350 MIBsThe following table provid
- Page 351 and 352:
G350 MIBsObject OIDripGlobalsDefaul
- Page 353 and 354:
G350 MIBsObject OIDospfXtndIfPassiv
- Page 355 and 356:
G350 MIBsObject OIDrip2IfConfAuthTy
- Page 357 and 358:
G350 MIBsObject OIDifAlias 1.3.6.1.
- Page 359 and 360:
G350 MIBsObject OIDdsx1TotalSESs 1.
- Page 361 and 362:
G350 MIBsObject OIDipPolicyRuleL4Sr
- Page 363 and 364:
G350 MIBsObject OIDipPolicyQueryIfI
- Page 365 and 366:
G350 MIBsObject OIDipPolicyActivati
- Page 367 and 368:
G350 MIBsObject OIDdot1dStpPortEnab
- Page 369 and 370:
G350 MIBsObject OIDgenGroupConfigur
- Page 371 and 372:
G350 MIBsObject OIDsoftRedundancyPo
- Page 373 and 374:
G350 MIBsObject OIDcmgH248LinkStatu
- Page 375 and 376:
G350 MIBsObject OIDcmgCcStatus 1.3.
- Page 377 and 378:
G350 MIBsObject OIDfrTrapState 1.3.
- Page 379 and 380:
G350 MIBsObject OIDgenOpLastWarning
- Page 381 and 382:
G350 MIBsObject OIDifTableXtndDescr
- Page 383 and 384:
G350 MIBsObject OIDsnmpInASNParseEr
- Page 385 and 386:
G350 MIBsObject OIDospfLsdbType 1.3
- Page 387 and 388:
G350 MIBsThe following table provid
- Page 389 and 390:
Appendix B: Configuring the G350 us
- Page 391 and 392:
MGC configuration and upgradeMGC co
- Page 393 and 394:
MGC configuration and upgrade4. Cli
- Page 395 and 396:
Upgrading an existing MGCUpgrading
- Page 397 and 398:
Upgrading an existing MGC4. Click C
- Page 399 and 400:
Upgrading an existing MGC8. Click C
- Page 401 and 402:
Gateway configurationGateway config
- Page 403 and 404:
Gateway configuration4. Click Conti
- Page 405 and 406:
Firmware configuration2. The Firmwa
- Page 407 and 408:
Modem configuration3. If you select
- Page 409 and 410:
Telephony configuration2. Click Con
- Page 411 and 412:
Telephony configuration5. Click Con
- Page 413 and 414:
Trunk configuration2. Click Continu
- Page 415 and 416:
Trunk configurationModifying trunk
- Page 417 and 418:
Trunk configurationDisplaying trunk
- Page 419 and 420:
Trunk configurationConfiguring a tr
- Page 421 and 422:
Alarm configurationAlarm configurat
- Page 423 and 424:
Password and final screensPassword
- Page 425 and 426:
Password and final screens4. Click
- Page 427 and 428:
Appendix C: Configuring the G350 us
- Page 429 and 430:
5. Select one of the following opti
- Page 431 and 432:
10. Click Continue. The IP Addresse
- Page 433 and 434:
13. Click Continue. The Media Gatew
- Page 435 and 436:
19. Click Continue. The firmware is
- Page 437 and 438:
23. Click Continue. The Change Root
- Page 439 and 440:
IndexIndexNumerical802.1x protocol
- Page 441 and 442:
IndexCommands, (continued)ppp timeo
- Page 443 and 444:
IndexECMP. . . . . . . . . . . . .
- Page 445 and 446:
IndexMMAC addressesstoring in ARP t
- Page 447 and 448:
IndexRRADIUS authentication. . . .
- Page 449 and 450:
IndexVirtual Private Networksee VPN