Issue 4 May 2005
321
Index
Extranet, (continued)
IP Address text boxes
. . . . . . . . . . . . . .
103
IP Group, configuring an
. . . . . . . . . . . .
102
IPSec Proposals, About
. . . . . . . . . . . . .
154
support
. . . . . . . . . . . . . . . . . . . . .
16
VSU
. . . . . . . . . . . . . . . . . . . . . .
99
extranet, creating
. . . . . . . . . . . . . . . . .
284
F
Failover TEP
detailed description
. . . . . . . . . . . . . . .
218
Failover, reconnect
. . . . . . . . . . . . . . . . .
229
failover,connectivity check example
. . . . . . . . .
227
FAX support
. . . . . . . . . . . . . . . . . . . .
19
Filter Rules, parameters
. . . . . . . .
263
,
264
,
265
FilterStats, parameters
. . . . . . . . . . . . . . .
257
Firewall
. . . . . . . . . . . . . . . . . . . . . .
196
Policies
. . . . . . . . . . . . . . . . . . . .
196
Rules
. . . . . . . . . . . . . . . . . . . . .
164
Firewall Policy Management
Firewall Templates
. . . . . . . . . . . . . . .
169
firewall templates
. . . . . . . . . . . . . . . . .
297
firewall, considerations for NAT
. . . . . . . . . . .
167
firewall, setting FTP rules
. . . . . . . . . . . . . .
167
firmware version, how to find
. . . . . . . . . . . .
61
flood attack
. . . . . . . . . . . . . . . . . .
28
,
174
FTP, setting firewall rules for
. . . . . . . . . . . .
167
G
General tab
SKIP VPN Objects, for
. . . . . . . . . . . . .
150
User Objects, for
. . . . . . . . . . . . . . . .
118
VPN Objects, for
. . . . . . . . . . . . . . . .
152
groups
private addresses
. . . . . . . . . . . . . . . .
135
H
Heartbeat Interval
. . . . . . . . . . . . . . . . .
215
Heartbeat Retry Limit
. . . . . . . . . . . . . . . .
215
Help System, online
. . . . . . . . . . . . . . . .
17
High Availability
. . . . . . . . . . . . . . . . . .
221
Creating
. . . . . . . . . . . . . . . . . . . .
224
Deleting
. . . . . . . . . . . . . . . . . . . .
225
Enabling
. . . . . . . . . . . . . . . . . . . .
221
HMAC-MD5 as an IPSec parameter
. . . . . . . . .
155
HMAC-SHA as an IPSec parameter
. . . . . . . . .
155
Hold Down Time
. . . . . . . . . . . . . . . . . .
215
Hold Up Time
. . . . . . . . . . . . . . . . . . .
215
I
IKE Certificate Usage
. . . . . . . . . . . . . . .
240
IKE Identifier
. . . . . . . . . . . . . . . . . . .
100
IKE identifier (user)
. . . . . . . . . . . . . . . .
117
IKE Identifier drop-down list
. . . . . . . . . . . .
103
IKE radio button
. . . . . . . . . . . . . . . . .
136
IKE VPN
about
. . . . . . . . . . . . . . . . . . . . .
134
adding IP Group Objects
. . . . . . . . . . . .
152
adding User and User Group Objects
. . . . . .
152
authentication method, configuring the
. . . . .
153
Certificate Based radio button
. . . . . . . . .
152
compression, configuring
. . . . . . . . . . .
153
configuring
. . . . . . . . . . . . . . . . . .
152
creating a new
. . . . . . . . . . . . . . . .
136
Diffie-Hellman Group drop-down list
. . . . . .
154
encryption level, configuring the
. . . . . . . .
152
IPSec (see IPSec)
Key Lifetime, configuring
. . . . . . . . . . . .
153
keying algorithm (modulus), configuring the
. . .
154
perfect forward secrecy, configuring
. . . . . .
153
Preshared Secret radio button
. . . . . . . . .
152
shared secret, changing the
. . . . . . . . . .
153
import configuration
. . . . . . . . . . . . . . . .
281
intranet
support
. . . . . . . . . . . . . . . . . . . . .
16
IP (Internet Protocol)
packet
. . . . . . . . . . . . . . . . . . . .
134
private addresses
. . . . . . . . . . . . . . .
135
IP addressing, by zone
. . . . . . . . . . . . . . .
70
IP Group
About
. . . . . . . . . . . . . . . . . . . . . .
97
address/mask pair described
. . . . . . . . . . .
97
configuring
. . . . . . . . . . . . . . . . . .
101
creating
. . . . . . . . . . . . . . . . . . . . .
97
extranet, how to connect to an
. . . . . . . . .
102
finding which are associated with a VSU
. . . . .
62
IKE Identifier drop-down list
. . . . . . . . . .
103
terminal equipment to a VPN, about adding
. . . .
97
when to create
. . . . . . . . . . . . . . . . .
97
IP Group (definition)
. . . . . . . . . . . . . . . .
97
IP Group (deriving the Group Mask)
. . . . . . . .
100
IP spoofing
. . . . . . . . . . . . . . . . . .
28
,
174
IP telephone
adding device to security gateway
. . . . . .
74
,
75
IP telephone configuration
. . . . . . . . . . . . .
72
ipRouteTable, parameters
. . . . . . . . . . . . .
254
IPSec
headers to packets, adding IPSec
. . . . . . .
154
Proposal
about
. . . . . . . . . . . . . . . . . . .
154
authentication parameters, configuring
. . . .
155
encryption parameters, configuring
. . . . .
154
lifetime options, key
. . . . . . . . . . . .
155
Содержание 3.7
Страница 1: ...VPNmanager Configuration Guide Release 3 7 670 100 600 Issue 4 May 2005...
Страница 4: ......
Страница 20: ...Preface 20 Avaya VPNmanager Configuration Guide Release 3 7...
Страница 32: ...Overview of implementation 32 Avaya VPNmanager Configuration Guide Release 3 7...
Страница 53: ...Preferences Issue 4 May 2005 53 Figure 16 Tunnel End Point Policy...
Страница 54: ...Using VPNmanager 54 Avaya VPNmanager Configuration Guide Release 3 7...
Страница 244: ...Using advanced features 244 Avaya VPNmanager Configuration Guide Release 3 7...
Страница 292: ...Upgrading firmware and licenses 292 Avaya VPNmanager Configuration Guide Release 3 7...