Avaya 3.7 Network Router User Manual


 
Issue 4 May 2005 321
Index
Extranet, (continued)
IP Address text boxes
. . . . . . . . . . . . . .103
IP Group, configuring an . . . . . . . . . . . .102
IPSec Proposals, About . . . . . . . . . . . . .154
support. . . . . . . . . . . . . . . . . . . . . 16
VSU . . . . . . . . . . . . . . . . . . . . . . 99
extranet, creating . . . . . . . . . . . . . . . . .284
F
Failover TEP
detailed description
. . . . . . . . . . . . . . .218
Failover, reconnect. . . . . . . . . . . . . . . . .229
failover,connectivity check example . . . . . . . . .227
FAX support. . . . . . . . . . . . . . . . . . . . 19
Filter Rules, parameters . . . . . . . . 263, 264, 265
FilterStats, parameters . . . . . . . . . . . . . . .257
Firewall . . . . . . . . . . . . . . . . . . . . . .196
Policies . . . . . . . . . . . . . . . . . . . .196
Rules . . . . . . . . . . . . . . . . . . . . .164
Firewall Policy Management
Firewall Templates
. . . . . . . . . . . . . . .169
firewall templates . . . . . . . . . . . . . . . . .297
firewall, considerations for NAT . . . . . . . . . . .167
firewall, setting FTP rules. . . . . . . . . . . . . .167
firmware version, how to find . . . . . . . . . . . . 61
flood attack . . . . . . . . . . . . . . . . . .28, 174
FTP, setting firewall rules for . . . . . . . . . . . .167
G
General tab
SKIP VPN Objects, for
. . . . . . . . . . . . .150
User Objects, for . . . . . . . . . . . . . . . . 118
VPN Objects, for . . . . . . . . . . . . . . . .152
groups
private addresses
. . . . . . . . . . . . . . . .135
H
Heartbeat Interval . . . . . . . . . . . . . . . . .215
Heartbeat Retry Limit. . . . . . . . . . . . . . . .215
Help System, online . . . . . . . . . . . . . . . . 17
High Availability . . . . . . . . . . . . . . . . . .221
Creating . . . . . . . . . . . . . . . . . . . .224
Deleting . . . . . . . . . . . . . . . . . . . .225
Enabling . . . . . . . . . . . . . . . . . . . .221
HMAC-MD5 as an IPSec parameter. . . . . . . . .155
HMAC-SHA as an IPSec parameter. . . . . . . . .155
Hold Down Time . . . . . . . . . . . . . . . . . .215
Hold Up Time . . . . . . . . . . . . . . . . . . .215
I
IKE Certificate Usage . . . . . . . . . . . . . . . 240
IKE Identifier . . . . . . . . . . . . . . . . . . . 100
IKE identifier (user) . . . . . . . . . . . . . . . . 117
IKE Identifier drop-down list . . . . . . . . . . . . 103
IKE radio button . . . . . . . . . . . . . . . . . 136
IKE VPN
about
. . . . . . . . . . . . . . . . . . . . . 134
adding IP Group Objects. . . . . . . . . . . . 152
adding User and User Group Objects. . . . . . 152
authentication method, configuring the . . . . . 153
Certificate Based radio button . . . . . . . . . 152
compression, configuring . . . . . . . . . . . 153
configuring . . . . . . . . . . . . . . . . . . 152
creating a new . . . . . . . . . . . . . . . . 136
Diffie-Hellman Group drop-down list . . . . . . 154
encryption level, configuring the . . . . . . . . 152
IPSec (see IPSec)
Key Lifetime, configuring
. . . . . . . . . . . . 153
keying algorithm (modulus), configuring the . . . 154
perfect forward secrecy, configuring . . . . . . 153
Preshared Secret radio button . . . . . . . . . 152
shared secret, changing the . . . . . . . . . . 153
import configuration. . . . . . . . . . . . . . . . 281
intranet
support
. . . . . . . . . . . . . . . . . . . . . 16
IP (Internet Protocol)
packet
. . . . . . . . . . . . . . . . . . . . 134
private addresses . . . . . . . . . . . . . . . 135
IP addressing, by zone . . . . . . . . . . . . . . . 70
IP Group
About
. . . . . . . . . . . . . . . . . . . . . . 97
address/mask pair described. . . . . . . . . . . 97
configuring . . . . . . . . . . . . . . . . . . 101
creating. . . . . . . . . . . . . . . . . . . . . 97
extranet, how to connect to an . . . . . . . . . 102
finding which are associated with a VSU . . . . . 62
IKE Identifier drop-down list . . . . . . . . . . 103
terminal equipment to a VPN, about adding . . . . 97
when to create . . . . . . . . . . . . . . . . . 97
IP Group (definition) . . . . . . . . . . . . . . . . 97
IP Group (deriving the Group Mask) . . . . . . . . 100
IP spoofing. . . . . . . . . . . . . . . . . . 28, 174
IP telephone
adding device to security gateway
. . . . . . 74, 75
IP telephone configuration . . . . . . . . . . . . . 72
ipRouteTable, parameters. . . . . . . . . . . . . 254
IPSec
headers to packets, adding IPSec
. . . . . . . 154
Proposal
about
. . . . . . . . . . . . . . . . . . . 154
authentication parameters, configuring. . . . 155
encryption parameters, configuring . . . . . 154
lifetime options, key . . . . . . . . . . . . 155