Avaya G430 Manual page 695

Administering branch gateway
Hide thumbs Also See for G430:
Table of Contents

Advertisement

V
value ..........................................................
VAM ..........................................................................
vendor-specific-option .......................................
videos .........................................................................
Virtual interface .........................................................
Virtual Private Network ......................................
see VPN .............................................................
VPN ....................................................................
Virtual Private Network, see VPN .............................
Virtual router .............................................................
Virtual Router Redundancy Protocol ........................
VRRP .................................................................
Virtual Router Redundancy Protocol, see VRRP .....
Vlan 1 .......................................................................
VLANs .................................
binding modes ....................................................
clearing the VLAN table .....................................
CLI commands ...................................................
configuration examples ......................................
description ..........................................................
DHCP/BOOTP requests .....................................
displaying the VLAN table ..................................
dynamic bandwidth reporting .............................
ICC-VLAN ..........................................................
ingress security ..................................................
multi VLAN binding .............................................
overview .............................................................
setting the VLAN ................................................
setting vlan 2 example .......................................
switching interface ......................................
table ...................................................................
tagging ...............................................................
VLMS ........................................................................
VMON, for troubleshooting QoS ...............................
VoIP .....................................
available transmission protocols ........................
enabling queuing ................................................
fair packet scheduling ........................................
overview .............................................................
priority over Dialer interface ...............................
queue delay ........................................................
queue size ..........................................................
routing based on ................................................
RSVP protocol ....................................................
VoIP queuing ......................................................
Weighted Fair VoIP Queuing .............................
VoIP Queuing ...........................................................
voip-queue ........................................................
voip-queue-delay ......................................................
Administering Avaya G430 Branch Gateway
,
,
450
451
454
321
,
451
454
423
,
423
479
423
479
479
474
474
474
474
423
,
,
,
,
280
327
332
423
424
445
328
329
332
331
424
445
329
280
330
330
328
327
328
330
,
423
424
329
328
463
348
,
,
,
,
233
240
242
244
258
588
233
240
242
233
258
240
240
588
241
244
242
244
,
243
244
244
VPN ....
,
,
258
292
423
,
,
489
492
493
,
,
512
513
activating ............................................................
assigning an access control list ..........................
basic parameters ................................................
15
clearing VPN data ..............................................
CLI commands ...................................................
commands summary ..........................................
components and relationships ...........................
components overview ........................................
configuration, overview ......................................
configuration, procedure ....................................
continuous channel ............................................
coordinating with the VPN peer ..........................
crypto list, assigning to an interface ...................
crypto list, configuring ........................................
crypto list, deactivating .......................................
crypto list, overview ............................................
crypto map, configuring ......................................
crypto map, overview .........................................
failover mechanisms ..........................................
introduction .........................................................
ISAKMP policies, configuring .............................
ISAKMP policies, overview ................................
logging ................................................................
maintenance .......................................................
modem dial backup and .....................................
NAT Traversal ....................................................
object tracking for failover ..................................
peer-group, configuring ......................................
peer-group, overview .........................................
peer, configuring ................................................
peer, overview ....................................................
show status ........................................................
simple VPN topology ..........................................
site-to-site configuration .....................................
transform-sets, configuring .................................
transform-sets, overview ....................................
typical failover applications, failover using a peer-
group .....................................................
typical failover applications, failover using DNS .
typical failover applications, failover using GRE
typical failover applications, failover using object-
tracking ..................................................
typical failover applications, overview ................
typical installations, configuring dynamic IP .......
typical installations, enabling continuous channel
...............................................................
typical installations, full or partial mesh ..............
typical installations, full solution .........................
,
,
,
,
,
,
434
479
482
483
485
,
,
,
,
,
495
497
500
502
503
,
,
,
,
523
529
530
536
October 2013
,
,
486
488
,
,
505
510
,
542
550
500
498
486
503
550
483
482
482
485
485
512
486
500
495
497
482
493
482
529
479
486
482
503
502
258
499
292
492
482
489
482
503
505
485
488
482
542
536
530
542
529
510
512
513
523
695

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents