changing DSCP table entries .............................
configuring composite operations ......................
copy list .......................................................
create access control lost ...................................
create QoS list ....................................................
creating policy lists .............................................
creating rules ......................................................
default actions ....................................................
defining global rules ...........................................
defining list identification attributes ....................
defining policy lists .............................................
deleting a policy list ............................................
deleting a QoS list ..............................................
destination port range ........................................
device wide policy lists .......................................
displaying access control lists ............................
displaying composite operation lists ...................
displaying ip rules ...............................................
displaying policy lists in DSCP table context ......
displaying policy lists in general context ............
displaying policy lists in QoS list context ............
displaying policy lists in QoS list rule context .....
DSCP as rule criteria ..........................................
DSCP default value ............................................
DSCP methods ..................................................
DSCP table ........................................................
edit access control list ........................................
editing policy lists ...............................................
editing rules ........................................................
example composite operation ............................
fragments ...........................................................
ICMP code .........................................................
ICMP type ..........................................................
managing policy lists ..........................................
mapping DSCP to a CoS ...................................
modem dial backup and .....................................
network security with access control lists ...........
overview .............................................................
policy lists and loopback interfaces ....................
policy-based routing, Policy-based routing ........
policy-based routing, see Policy-based routing ..
precongifured composite operations ..................
precongifured for QoS lists .................................
QoS fields ...........................................................
QoS list ...............................................................
QoS list parts ......................................................
QoS lists .............................................................
rule criteria .........................................................
sequence of device-wide policy list application ..
sequence of policy list application ......................
simulated packet properties ........................
simulating packets ..............................................
source port range ...............................................
specifying a destination ip address ....................
specifying an ip protocol .....................................
specifying operations .........................................
TCP, establish bit ...............................................
testing policy lists ...............................................
using ip wildcards ...............................................
Policy-based routing ............
–
,
applications ........................................................
applying object tracking to next-hops .................
attaching list to interface ....................................
based on DSCP .................................................
cancelling object tracking on next-hops .............
changing the object tracker on a next-hop .........
defining next hop lists .........................................
distinguishing between voice and data ..............
object tracking and .............................................
overview .............................................................
packets not considered router packets ..............
PBR lists, PBR lists ............................................
PBR lists, see PBR lists .....................................
routing to GRE tunnel .........................................
rules ...................................................................
saving the configuration .....................................
used to define backup routes .............................
VoIP ...................................................................
policy-based routing application ...............................
Port ...........................................................................
Station ................................................................
Port classification ..............................................
CLI commands ...................................................
Ports ...................................................................
Port classification, see Ports ....................................
Port mirroring ....................................................
CLI commands ...................................................
description ..........................................................
Port redundancy .....................................
,
CLI commands ...................................................
configuration .......................................................
description ..........................................................
disabling .............................................................
displaying information ........................................
enabling ..............................................................
LAN deployment .............................................
secondary port activation ...................................
setting redundancy-intervals ..............................
switchback ..........................................................
port redundancy schemes ........................................
Ports .....................
,
,
alternate .............................................................
684 Administering Avaya G430 Branch Gateway
October 2013
Содержание G430
Страница 1: ...Administering Avaya G430 Branch Gateway Release 6 3 03 603228 Issue 5 October 2013 ...
Страница 12: ...12 Administering Avaya G430 Branch Gateway October 2013 ...
Страница 214: ...Ethernet ports 214 Administering Avaya G430 Branch Gateway October 2013 Comments infodev avaya com ...
Страница 232: ...System logging 232 Administering Avaya G430 Branch Gateway October 2013 Comments infodev avaya com ...
Страница 246: ...VoIP QoS 246 Administering Avaya G430 Branch Gateway October 2013 Comments infodev avaya com ...
Страница 250: ...Modems and the Branch Gateway 250 Administering Avaya G430 Branch Gateway October 2013 Comments infodev avaya com ...
Страница 302: ...Emergency Transfer Relay ETR 302 Administering Avaya G430 Branch Gateway October 2013 Comments infodev avaya com ...
Страница 556: ...IPSec VPN 556 Administering Avaya G430 Branch Gateway October 2013 Comments infodev avaya com ...
Страница 604: ...Policy based routing 604 Administering Avaya G430 Branch Gateway October 2013 Comments infodev avaya com ...
Страница 610: ...Synchronization 610 Administering Avaya G430 Branch Gateway October 2013 Comments infodev avaya com ...
Страница 668: ...Traps and MIBs 668 Administering Avaya G430 Branch Gateway October 2013 Comments infodev avaya com ...