Avaya 3.7 User Manual

Page 321

Advertising
background image

Issue 4 May 2005

321

Index

Extranet, (continued)

IP Address text boxes

. . . . . . . . . . . . . .

103

IP Group, configuring an

. . . . . . . . . . . .

102

IPSec Proposals, About

. . . . . . . . . . . . .

154

support

. . . . . . . . . . . . . . . . . . . . .

16

VSU

. . . . . . . . . . . . . . . . . . . . . .

99

extranet, creating

. . . . . . . . . . . . . . . . .

284

F

Failover TEP

detailed description

. . . . . . . . . . . . . . .

218

Failover, reconnect

. . . . . . . . . . . . . . . . .

229

failover,connectivity check example

. . . . . . . . .

227

FAX support

. . . . . . . . . . . . . . . . . . . .

19

Filter Rules, parameters

. . . . . . . .

263

,

264

,

265

FilterStats, parameters

. . . . . . . . . . . . . . .

257

Firewall

. . . . . . . . . . . . . . . . . . . . . .

196

Policies

. . . . . . . . . . . . . . . . . . . .

196

Rules

. . . . . . . . . . . . . . . . . . . . .

164

Firewall Policy Management

Firewall Templates

. . . . . . . . . . . . . . .

169

firewall templates

. . . . . . . . . . . . . . . . .

297

firewall, considerations for NAT

. . . . . . . . . . .

167

firewall, setting FTP rules

. . . . . . . . . . . . . .

167

firmware version, how to find

. . . . . . . . . . . .

61

flood attack

. . . . . . . . . . . . . . . . . .

28

,

174

FTP, setting firewall rules for

. . . . . . . . . . . .

167

G

General tab

SKIP VPN Objects, for

. . . . . . . . . . . . .

150

User Objects, for

. . . . . . . . . . . . . . . .

118

VPN Objects, for

. . . . . . . . . . . . . . . .

152

groups

private addresses

. . . . . . . . . . . . . . . .

135

H

Heartbeat Interval

. . . . . . . . . . . . . . . . .

215

Heartbeat Retry Limit

. . . . . . . . . . . . . . . .

215

Help System, online

. . . . . . . . . . . . . . . .

17

High Availability

. . . . . . . . . . . . . . . . . .

221

Creating

. . . . . . . . . . . . . . . . . . . .

224

Deleting

. . . . . . . . . . . . . . . . . . . .

225

Enabling

. . . . . . . . . . . . . . . . . . . .

221

HMAC-MD5 as an IPSec parameter

. . . . . . . . .

155

HMAC-SHA as an IPSec parameter

. . . . . . . . .

155

Hold Down Time

. . . . . . . . . . . . . . . . . .

215

Hold Up Time

. . . . . . . . . . . . . . . . . . .

215

I

IKE Certificate Usage

. . . . . . . . . . . . . . .

240

IKE Identifier

. . . . . . . . . . . . . . . . . . .

100

IKE identifier (user)

. . . . . . . . . . . . . . . .

117

IKE Identifier drop-down list

. . . . . . . . . . . .

103

IKE radio button

. . . . . . . . . . . . . . . . .

136

IKE VPN

about

. . . . . . . . . . . . . . . . . . . . .

134

adding IP Group Objects

. . . . . . . . . . . .

152

adding User and User Group Objects

. . . . . .

152

authentication method, configuring the

. . . . .

153

Certificate Based radio button

. . . . . . . . .

152

compression, configuring

. . . . . . . . . . .

153

configuring

. . . . . . . . . . . . . . . . . .

152

creating a new

. . . . . . . . . . . . . . . .

136

Diffie-Hellman Group drop-down list

. . . . . .

154

encryption level, configuring the

. . . . . . . .

152

IPSec (see IPSec)
Key Lifetime, configuring

. . . . . . . . . . . .

153

keying algorithm (modulus), configuring the

. . .

154

perfect forward secrecy, configuring

. . . . . .

153

Preshared Secret radio button

. . . . . . . . .

152

shared secret, changing the

. . . . . . . . . .

153

import configuration

. . . . . . . . . . . . . . . .

281

intranet

support

. . . . . . . . . . . . . . . . . . . . .

16

IP (Internet Protocol)

packet

. . . . . . . . . . . . . . . . . . . .

134

private addresses

. . . . . . . . . . . . . . .

135

IP addressing, by zone

. . . . . . . . . . . . . . .

70

IP Group

About

. . . . . . . . . . . . . . . . . . . . . .

97

address/mask pair described

. . . . . . . . . . .

97

configuring

. . . . . . . . . . . . . . . . . .

101

creating

. . . . . . . . . . . . . . . . . . . . .

97

extranet, how to connect to an

. . . . . . . . .

102

finding which are associated with a VSU

. . . . .

62

IKE Identifier drop-down list

. . . . . . . . . .

103

terminal equipment to a VPN, about adding

. . . .

97

when to create

. . . . . . . . . . . . . . . . .

97

IP Group (definition)

. . . . . . . . . . . . . . . .

97

IP Group (deriving the Group Mask)

. . . . . . . .

100

IP spoofing

. . . . . . . . . . . . . . . . . .

28

,

174

IP telephone

adding device to security gateway

. . . . . .

74

,

75

IP telephone configuration

. . . . . . . . . . . . .

72

ipRouteTable, parameters

. . . . . . . . . . . . .

254

IPSec

headers to packets, adding IPSec

. . . . . . .

154

Proposal

about

. . . . . . . . . . . . . . . . . . .

154

authentication parameters, configuring

. . . .

155

encryption parameters, configuring

. . . . .

154

lifetime options, key

. . . . . . . . . . . .

155

Advertising