Configuring Policy; Policy Overview; Access Control Lists - Avaya G350 Administration

Hide thumbs Also See for G350:
Table of Contents

Advertisement

17

Configuring policy

This chapter provides information about configuring QoS policy on the G350 and contains the following
sections:

Policy overview

Defining policy lists
Attaching policy lists to an interface
Device-wide policy lists
Defining global rules
evaluated
Defining rules
Composite operations
configure composite operations
DSCP table
Displaying and testing policy lists
and test their effects on simulated IP packets
Policy overview
This section provides an overview of policy lists on the G350 and includes the following topics:

Access control lists

authorized to pass through an interface
QoS lists
Policy-based routing
Configuring policy-based routing
Managing policy lists
Access control lists
You can use access control lists to control which packets are authorized to pass through an interface.
When a packet matches a rule on the access control list, the rule specifies whether the G350:
Accepts the packet or drops the packet
Sends an ICMP error reply if it drops the packet
Sends an SNMP trap if it drops the packet
Access lists have the following parts:
Global rules — a set of rules that are executed before the list is evaluated
Rule list — a list of filtering rules and actions for the G350 to take when a packet matches the
rule. Match actions on this list are pointers to the composite operation table.
Administration of the Avaya G350 Media Gateway
June 2004
— an overview of QoS policy configuration
— instructions on how to configure policy lists
— instructions on how to attach a policy list to an interface
— instructions on how to attach a policy list to all interfaces
— instructions on how to configure rules that are executed before the list is
— instructions on how to configure rules, including an overview of rule criteria
— a description of composite operations and instructions on how to
— a description of the DSCP table, with examples
— instructions on how to view the configuration of policy lists
— a description of access control lists, which control which packets are
— a description of QoS lists, which can change the value of the QoS field in a packet
— an overview of policy-based routing, which is described in more detail in
on page 177
— an overview of how to manage policy lists on the G350
Configuring policy
Policy overview
159

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents