control-port ........................................................
cookie, access control list .........................................
cookie, capture list ....................................................
cookie, policy list .......................................................
cookie, QoS list .........................................................
copy announcement-file ftp ............
,
,
copy announcement-file scp ..................
,
copy announcement-file usb ..................
,
copy auth-file ftp ..............................................
,
copy auth-file scp ............................................
,
copy auth-file tftp ........................................................
copy auth-file usb ............................................
,
copy capture-file ftp ..............................................
copy capture-file scp .............................................
copy capture-file usb .............................................
copy cdr-file ftp .....................................................
copy cdr-file scp ....................................................
copy cdr-file usb ....................................................
copy dhcp-binding ftp ............................................
copy dhcp-binding scp ..........................................
copy dhcp-binding usb ..........................................
copy file usb ...............................................................
copy ftp announcement-file ...............................
copy ftp auth-file .........................................................
copy ftp EW_archive ..................................................
copy ftp module ....................................................
copy ftp startup-config ................................................
copy ftp sw_imageA ..............................................
copy ftp SW_imageA ..................................................
copy ftp SW_imageB ..................................................
copy license-file usb .............................................
copy phone-script usb ...........................................
copy running-config ftp ...............................................
copy running-config scp .............................................
copy running-config startup-config .............................
copy running-config tftp ..............................................
copy scp announcement-file ......................
,
copy scp auth-file .......................................................
copy scp startup-config ..............................................
copy startup-config ftp ................................................
copy startup-config scp ..............................................
copy startup-config tftp ...............................................
copy startup-config usb ...................................
,
copy syslog-file ftp .............................................
copy syslog-file scp ...........................................
copy syslog-file tftp ...................................................
copy syslog-file usb ................................
,
copy tftp auth-file ........................................................
copy tftp EW_archive .................................................
copy tftp module .........................................................
copy tftp startup-config ...............................................
copy tftp sw_imageA .............................................
copy tftp SW_imageA .................................................
copy tftp SW_imageB .................................................
copy usb .....................................................................
copy usb announcement-file ........................
,
copy usb auth-file ..................................................
copy usb EW_archive .................................................
copy usb modules ......................................................
copy usb phone-image ...............................................
copy usb phone-script ................................................
copy usb startup-config .........................................
copy usb SW_image ..................................................
cos .....................................................................
Cost ..........................................................................
Country Protocol .......................................................
crypto ipsec df-bit .....................................................
crypto ipsec minimal pmtu ........................................
crypto ipsec minimal-pmtu ........................................
crypto ipsec nat-transparency udp-encapsulation ...
crypto ipsec transform-set ..................
,
,
crypto isakmp invalid-spi-recovery ....................
crypto isakmp nat keepalive ..............................
crypto isakmp peer .............................
,
,
crypto isakmp peer-group ..........................
,
crypto isakmp policy ..................................
,
crypto isakmp suggest-key .......................................
crypto ispec nat-transparency udp-encapsulation ....
crypto ispec transform-set ........................................
crypto key generate ..............................................
crypto list ..................................................................
overview .............................................................
Crypto list ..........................................................
configuring ..........................................................
deactivating ........................................................
crypto list parameters ...............................................
changing .............................................................
crypto map ..........................................
,
,
Crypto map ........................................................
configuring ..........................................................
overview .............................................................
crypto-group .............................................................
cyrpto isakmp policy .................................................
D
data and VoIP control backup ..................................
Date Format on Terminals ........................................
DCP stations data .....................................................
DCP telephones .......................................................
DCP/ANALOG Bearer Capability .............................
decrypted IPSec VPN packets .................................
Administering Avaya G430 Branch Gateway
October 2013 673
Содержание G430
Страница 1: ...Administering Avaya G430 Branch Gateway Release 6 3 03 603228 Issue 5 October 2013 ...
Страница 12: ...12 Administering Avaya G430 Branch Gateway October 2013 ...
Страница 214: ...Ethernet ports 214 Administering Avaya G430 Branch Gateway October 2013 Comments infodev avaya com ...
Страница 232: ...System logging 232 Administering Avaya G430 Branch Gateway October 2013 Comments infodev avaya com ...
Страница 246: ...VoIP QoS 246 Administering Avaya G430 Branch Gateway October 2013 Comments infodev avaya com ...
Страница 250: ...Modems and the Branch Gateway 250 Administering Avaya G430 Branch Gateway October 2013 Comments infodev avaya com ...
Страница 302: ...Emergency Transfer Relay ETR 302 Administering Avaya G430 Branch Gateway October 2013 Comments infodev avaya com ...
Страница 556: ...IPSec VPN 556 Administering Avaya G430 Branch Gateway October 2013 Comments infodev avaya com ...
Страница 604: ...Policy based routing 604 Administering Avaya G430 Branch Gateway October 2013 Comments infodev avaya com ...
Страница 610: ...Synchronization 610 Administering Avaya G430 Branch Gateway October 2013 Comments infodev avaya com ...
Страница 668: ...Traps and MIBs 668 Administering Avaya G430 Branch Gateway October 2013 Comments infodev avaya com ...