DRA-2 UNIVERSAL COMMUNICATION NODE
85/158
USER GUIDE - Rev.5 (January 2018)
•
Number of ICMP packets.
This allows the number of ICMP packets that are sent
in each verification to be specified.
•
Evaluation Model.
This establishes the model for the evaluation of the
accessibility test. The options are:
single
and
period
. The
single
model
establishes that, if some execution of the test fails, the behaviour of the equipment
is the one defined in the
Action
parameter. The
period
model establishes, by
means of the two following parameters, a test evaluation period and an admitted
failure percentage within it.
•
Evaluation Period (min).
When the Evaluation Model parameter is configured as
period,
this establishes a period between
1
and
6000
within which a failure of the
accessibility test can be produced. All the responses to the
Ping Keep Alive
packets sent in this period make the universe of samples that will be considered to
decide about the execution of
Action
according to the fulfilment of the criteria
established by means of the following parameter.
•
Max Lost Ratio (%).
This allows the maximum admitted percentage of failure in
the Evaluation period to be specified for the results of the Ping Keep Alive
messages.
•
Action.
This selects the desired behaviour of the equipment when the supervision
function fails. The available actions are:
None
(no action taken) or
vrrp2master
(forcing priority to 255).
5.12
VPN CONFIGURATION
As already mentioned in the WAN tunnels section, these are a method for establishing the
opportune end-to-end links between equipment. Unlike the GRE and IPIP tunnels, IPSec
tunnels are characterised by being safe; this means the information is transmitted so that its
content cannot be accessed by others, which is particularly important if the IP network upon
which it is established is not controlled by the user, or is not public.
To create an IPSec tunnel a security association must be established in each terminator:
Tunnel IP (origin) and Remote GW (destination).
An IPSec connection between two ends requires three steps:
Establishing an IKE Security association (IKE Policy).
Establishing an IPSec Security association (IPsec Association).
Sending protected data through the IPSec connection.
Содержание DRA-2
Страница 117: ...DRA 2 DRA 2 UNIVERSAL COMMUNICATION NODE 117 158 USER GUIDE Rev 5 January 2018 APPENDIX A BIBLIOGRAPHY AND ABBREVIATIONS...
Страница 122: ...DRA 2 DRA 2 UNIVERSAL COMMUNICATION NODE 122 158 USER GUIDE Rev 5 January 2018 APPENDIX B DATA STRUCTURE IN CLI...
Страница 156: ...DRA 2 DRA 2 UNIVERSAL COMMUNICATION NODE 156 158 USER GUIDE Rev 5 January 2018 APPENDIX C WIDEBAND PLC COUPLERS...