Avaya G430 Manual page 10

Administering branch gateway
Hide thumbs Also See for G430:
Table of Contents

Advertisement

Interface configuration...................................................................................................................... 422
Unnumbered IP interfaces................................................................................................................ 426
Routing sources............................................................................................................................... 429
Routing table configuration............................................................................................................... 430
GRE tunneling.................................................................................................................................. 434
DHCP and BOOTP relay.................................................................................................................. 444
DHCP server.................................................................................................................................... 447
Broadcast relay................................................................................................................................ 456
ARP table......................................................................................................................................... 458
Proxy ARP........................................................................................................................................ 461
ICMP errors...................................................................................................................................... 461
RIP................................................................................................................................................... 462
OSPF................................................................................................................................................ 468
Route redistribution.......................................................................................................................... 472
VRRP............................................................................................................................................... 474
Fragmentation.................................................................................................................................. 477
Chapter 19: IPSec VPN.......................................................................................................
IPSec VPN................................................................................................................................................ 479
Overview of IPSec VPN configuration.............................................................................................. 480
Typical failover applications............................................................................................................. 529
Chapter 20: Policy lists.......................................................................................................
Policy lists................................................................................................................................................. 557
Types of policy lists.......................................................................................................................... 557
Policy list management.................................................................................................................... 560
Policy list configuration..................................................................................................................... 561
Policy list attachments...................................................................................................................... 564
Device-wide policy lists.................................................................................................................... 567
Defining global rules......................................................................................................................... 567
Policy rule configuration................................................................................................................... 568
Composite operations...................................................................................................................... 574
DSCP table....................................................................................................................................... 577
Policy list displays and tests............................................................................................................. 579
Summary of access control list commands...................................................................................... 581
Summary of QoS list commands...................................................................................................... 583
Chapter 21: Policy-based routing......................................................................................
Policy-based routing.................................................................................................................................. 587
Applications for policy-based routing................................................................................................ 588
Setting up policy-based routing........................................................................................................ 589
PBR rules......................................................................................................................................... 592
Next hop lists.................................................................................................................................... 594
Editing and deleting PBR lists.......................................................................................................... 596
PBR list commands in context.......................................................................................................... 597
Policy-based routing application example........................................................................................ 598
Summary of policy-based routing commands.................................................................................. 601
Chapter 22: Synchronization.............................................................................................
Synchronization......................................................................................................................................... 605
Defining a stratum clock source....................................................................................................... 605
10
Administering Avaya G430 Branch Gateway
479
557
587
605
October 2013

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents