Avaya VF 3000 manual

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61

Ir a la página of

Buen manual de instrucciones

Las leyes obligan al vendedor a entregarle al comprador, junto con el producto, el manual de instrucciones Avaya VF 3000. La falta del manual o facilitar información incorrecta al consumidor constituyen una base de reclamación por no estar de acuerdo el producto con el contrato. Según la ley, está permitido adjuntar un manual de otra forma que no sea en papel, lo cual últimamente es bastante común y los fabricantes nos facilitan un manual gráfico, su versión electrónica Avaya VF 3000 o vídeos de instrucciones para usuarios. La condición es que tenga una forma legible y entendible.

¿Qué es un manual de instrucciones?

El nombre proviene de la palabra latina “instructio”, es decir, ordenar. Por lo tanto, en un manual Avaya VF 3000 se puede encontrar la descripción de las etapas de actuación. El propósito de un manual es enseñar, facilitar el encendido o el uso de un dispositivo o la realización de acciones concretas. Un manual de instrucciones también es una fuente de información acerca de un objeto o un servicio, es una pista.

Desafortunadamente pocos usuarios destinan su tiempo a leer manuales Avaya VF 3000, sin embargo, un buen manual nos permite, no solo conocer una cantidad de funcionalidades adicionales del dispositivo comprado, sino también evitar la mayoría de fallos.

Entonces, ¿qué debe contener el manual de instrucciones perfecto?

Sobre todo, un manual de instrucciones Avaya VF 3000 debe contener:
- información acerca de las especificaciones técnicas del dispositivo Avaya VF 3000
- nombre de fabricante y año de fabricación del dispositivo Avaya VF 3000
- condiciones de uso, configuración y mantenimiento del dispositivo Avaya VF 3000
- marcas de seguridad y certificados que confirmen su concordancia con determinadas normativas

¿Por qué no leemos los manuales de instrucciones?

Normalmente es por la falta de tiempo y seguridad acerca de las funcionalidades determinadas de los dispositivos comprados. Desafortunadamente la conexión y el encendido de Avaya VF 3000 no es suficiente. El manual de instrucciones siempre contiene una serie de indicaciones acerca de determinadas funcionalidades, normas de seguridad, consejos de mantenimiento (incluso qué productos usar), fallos eventuales de Avaya VF 3000 y maneras de solucionar los problemas que puedan ocurrir durante su uso. Al final, en un manual se pueden encontrar los detalles de servicio técnico Avaya en caso de que las soluciones propuestas no hayan funcionado. Actualmente gozan de éxito manuales de instrucciones en forma de animaciones interesantes o vídeo manuales que llegan al usuario mucho mejor que en forma de un folleto. Este tipo de manual ayuda a que el usuario vea el vídeo entero sin saltarse las especificaciones y las descripciones técnicas complicadas de Avaya VF 3000, como se suele hacer teniendo una versión en papel.

¿Por qué vale la pena leer los manuales de instrucciones?

Sobre todo es en ellos donde encontraremos las respuestas acerca de la construcción, las posibilidades del dispositivo Avaya VF 3000, el uso de determinados accesorios y una serie de informaciones que permiten aprovechar completamente sus funciones y comodidades.

Tras una compra exitosa de un equipo o un dispositivo, vale la pena dedicar un momento para familiarizarse con cada parte del manual Avaya VF 3000. Actualmente se preparan y traducen con dedicación, para que no solo sean comprensibles para los usuarios, sino que también cumplan su función básica de información y ayuda.

Índice de manuales de instrucciones

  • Página 1

    Avaya Solution & Interoperability Test Lab Avaya Hosted IP Telephony R3.0 Solution LSP Configuration with the Juniper VF 3000 SBC – Issue 1.0 Abstract These Application Notes describe the conf iguration of Avaya Communication Manager, Juniper NetScreen Firewall and Juniper VF 3000 Session Border Controller (SBC) and other network components i[...]

  • Página 2

    TC; Reviewed: PV 04/24/2006 Avaya – Proprietary Use as authorized only pursuant to your signed agreem ent or Avaya polic y. No other discl osure is pe rmitted or a uthorized. 2 of 61 HT3-LSP-VF .doc Table of Contents 1. Introduction ...................................................................................................................[...]

  • Página 3

    TC; Reviewed: PV 04/24/2006 Avaya – Proprietary Use as authorized only pursuant to your signed agreem ent or Avaya polic y. No other discl osure is pe rmitted or a uthorized. 3 of 61 HT3-LSP-VF .doc 1. Intr oduction These Application notes provide instructions on how to configure Local Survivable Processor (LSP) with the Juniper VF 3000 SBC in an[...]

  • Página 4

    data center edge and at the edge of each enterprise site. Note that the Juniper VF 3000 SBC can provide this NAT function. Figure 1 - Private-Public-Private Architecture Another method for WAN connectivity between the enterprise sites and the data center is via a VPN configuration. Figure 2 illustrates this case. The Juniper VF 3000 SBC here must s[...]

  • Página 5

    different enterprise customer. The Juniper VF 3000 SBC in the data center can make use of this VLAN information to resolve overlapping IP address issues 1 . The Juniper VF 3000 SBC segregates the access traffic into separate cust om er streams and routes the traffic to the respective Avaya Communication Managers based on the destination IP address.[...]

  • Página 6

    TC; Reviewed: PV 04/24/2006 Avaya – Proprietary Use as authorized only pursuant to your signed agreem ent or Avaya polic y. No other discl osure is pe rmitted or a uthorized. 6 of 61 HT3-LSP-VF .doc architecture that may occur. This is sim ilar to Figure 1 , except that the data center uses public IP addressing. There is no need for a NAT functi [...]

  • Página 7

    Figure 3 - Supporting LSPs in the Private-Public-Private Architecture Figure 4 shows the architecture for a corresponding solution applied to the architecture of Figure 2 . As in Figure 3 , an extra NAT/FW device has been placed at the data center edge. This FW device must be VLAN supported in order to support overlapping address spaces for differe[...]

  • Página 8

    Figure 4 - Supporting LSPs in th e Private-Private Architecture 3. Configuration Overview This section gives a high-level overview of how to configure en terprise sites and data center networks and how to administer the Avaya Co mmunication Manager servers and LSPs for LSP functionality to work in HIPT R3.0/3.1 and HCC R3.0 solutions. The basic con[...]

  • Página 9

    TC; Reviewed: PV 04/24/2006 Avaya – Proprietary Use as authorized only pursuant to your signed agreem ent or Avaya polic y. No other discl osure is pe rmitted or a uthorized. 9 of 61 HT3-LSP-VF .doc 3.1. Private-Public-Private Architecture In order to build components in Figure 3 use the following: Enterprise site network configuration: • On th[...]

  • Página 10

    TC; Reviewed: PV 04/24/2006 Avaya – Proprietary Use as authorized only pursuant to your signed agreem ent or Avaya polic y. No other discl osure is pe rmitted or a uthorized. 10 of 61 HT3-LSP-VF .doc Avaya Communication Manager server administration: • SA8853 Support of LSPs Behind NAT Gr een feature must be installed. • Add two IP node names[...]

  • Página 11

    TC; Reviewed: PV 04/24/2006 Avaya – Proprietary Use as authorized only pursuant to your signed agreem ent or Avaya polic y. No other discl osure is pe rmitted or a uthorized. 11 of 61 HT3-LSP-VF .doc 4. Equipment and Softwar e V alidated This application note details one way to set up the LSP solution. The table below provides the versions used i[...]

  • Página 12

    5. A vaya HIPT R3.0 Envir onment The overview of the HIPT R3.0 solution with LSP Support is shown in Figure 5 . Figure 5 – Avaya Hosted IP Telephony Release 3.0 LSP Solution TC; Reviewed: PV 04/24/2006 Avaya – Proprietary Use as authorized only pursuant to your signed agreem ent or Avaya policy . No other discl osure is pe rmitted or a uthorize[...]

  • Página 13

    TC; Reviewed: PV 04/24/2006 Avaya – Proprietary Use as authorized only pursuant to your signed agreem ent or Avaya polic y. No other discl osure is pe rmitted or a uthorized. 13 of 61 HT3-LSP-VF .doc 5.1. Service Provider Data Center The Data Center simulates two custom ers, PC-LAN (Private-Private) and C-LAN (Priva te- Public-Private). These cus[...]

  • Página 14

    TC; Reviewed: PV 04/24/2006 Avaya – Proprietary Use as authorized only pursuant to your signed agreem ent or Avaya polic y. No other discl osure is pe rmitted or a uthorized. 14 of 61 HT3-LSP-VF .doc Communication Manager in the Data Center is lost. All enter prise Loc al Survivable Processors (LSPs) will achieve registration a nd File Sync via t[...]

  • Página 15

    6. A vaya Hosted IP T elephony Re lease 3.0 LSP Configuration 6.1. PC-LAN Configuration (Private-Private) 6.1.1. Configure Avaya Comm unicati on Manager The following Avaya Communication Manager provi sioning is required to support the LSP Configuration. This provisioning is perform ed vi a the SAT interface. In the following example, the Avaya Com[...]

  • Página 16

    6.1.1.2. Configure Avaya Communicati on Manager for LSP Support Step 1 . Use the “ change node-names ip ” command to add the name and IP Address of the LSP Native IP Address and static 1-to-1 NAT LSP IP address configured in the NetScreen-25 Firewall ( Figure 20 ) to the node-names form shown in Figure 7 . Submit the changes. Figure 7 TC; Revie[...]

  • Página 17

    Step 2 . Use the “ change ip-network-region <region number>” comm and to add the LSP Native IP Address to the appropriate Network Region shown in Figure 8 . Submit the changes. Figure 8 Step 3 . Use the “ change lsp ” command to add the sta tic 1-to-1 LSP IP address configured in the NetScreen-25 Firewall ( Figure 20 ) to the LSP form[...]

  • Página 18

    TC; Reviewed: PV 04/24/2006 Avaya – Proprietary Use as authorized only pursuant to your signed agreem ent or Avaya polic y. No other discl osure is pe rmitted or a uthorized. 18 of 61 HT3-LSP-VF .doc 6.1.2. Configure Avaya Local Surv ivabl e Processors (LSP) Local Survivable Processors (LSP) are normally configured to register directly to Avaya C[...]

  • Página 19

    Figure 10 - LSP Configuration Web Page 7. Select “ This is a local survivable pr ocesso r with a Blade server as the primary controller ”. This option was selected for the Avaya SBS3000 shared blade server. 8. In the “ CLAN IP address of the primary controller ” and “ Primary controller’s IP address ” fields, enter the IP address of t[...]

  • Página 20

    6.1.3. Configuring the Juniper NetScreen-25 Fir ewall This Section assumes that Juniper NetScreen-25 Firewall basic provisio ning has been performed. Refer to [1] for more information. Step 1 . From a PC, connect to the Juniper Networks NetScreen-25 Firewall using a web browser, by typing https://<IP_address_NetScreen-25>. L ogin using a user[...]

  • Página 21

    Step 2 . The following WEB Admin screen appears upon successful login as shown in Figure 12 . Figure 12 Note: Virtual Router (trust-vr) has common configuration parame ters for both PC-LAN (VR-A) and G650/C-LAN (VR-B). The configuration for (tru st-vr) settings are covered in this section. TC; Reviewed: PV 04/24/2006 Avaya – Proprietary Use as au[...]

  • Página 22

    Step 3 . Create a Virtual Router for en terprise site A (VR-A) and Data Center (trust-vr). From the left pane click on Network Æ Routing Æ Virtual Routers . On the right pane, click the New button on the top right hand corner to create a ne w Virtual Router. Set Vi rtual Router Nam e and leave all other options as default values and click OK . Fi[...]

  • Página 23

    Step 4 . Create security zones and assign the zone to the appropriate Virtual Routers. From the left hand panel of the NetScreen-25 Firewall Web adm in screen, click on Network Æ Zo n es . From the right hand pane, click the New button to create a new zone . Create security zones for the Virtual Router untrusted side (VR-A) , zone name “VRA-Untr[...]

  • Página 24

    Step 5 . Create security zones and assign the zone to the appropriate Virtual Routers. From the left hand panel of the NetScreen-25 Firewall Web adm in screen, click on Network Æ Zo n es . From the right hand pane, click the New button to create a new zone . Create security zones for the Virtual Router trusted side (trust-vr), zone name “Trust?[...]

  • Página 25

    Step 6 . Select Network Æ Zo nes in the left pane to view the list of configured zones as shown in Figure 16 . Additional Zones are show n that are not related to this Application Note. Figure 16 TC; Reviewed: PV 04/24/2006 Avaya – Proprietary Use as authorized only pursuant to your signed agreem ent or Avaya policy . No other discl osure is pe [...]

  • Página 26

    Step 7 . Configure Interface with Mapped IP (MIP). Th e physical interface towa rd enterprise site A is configured using sub-interfaces. The physical interface toward the Data Center does not use sub-interfaces. From the NetScreen-25 Firewall Web Admi n screen, click on Network Æ Interfaces , and select Sub-IF on drop down menu then click the New [...]

  • Página 27

    Step 8 . Configure Sub-Interface ethernet2.1 MIP for LSP to Avaya Communication Manager Static 1-to-1 NAT. From the NetScr een-25 Firewall Sub-IF screen, select MIP , and click the New button from the right hand window pane. Configure MIP as shown in Figure 18 and click OK . Figure 18 TC; Reviewed: PV 04/24/2006 Avaya – Proprietary Use as authori[...]

  • Página 28

    Step 9 . Configure Interface with Mapped IP (MIP). The physical interface toward the Data Center does not use sub-interfaces. From the Ne tScreen-25 Firewall Web Adm in screen, click on Network Æ Interfaces and then click the New button from the right hand window pane. Create Interface ethernet1, zone Trust. Configure Interface for Zone Name, IP A[...]

  • Página 29

    Step 10 . Configure Sub-Interface ethernet1 MIP for Avaya Communication Manager to LSP Static 1-to-1 NAT. From the NetScr een-25 Firewall Sub-IF screen, select MIP , and click the New button from the right hand window pane. Configure MIP as shown in Figure 20 and click OK . Figure 20 TC; Reviewed: PV 04/24/2006 Avaya – Proprietary Use as authoriz[...]

  • Página 30

    Step 11 . Select Network Æ Interfaces in the left pane again to view the list of configured Interfaces shown in Figure 21 . Additional Interfaces are shown that are not related to this Application Note. Figure 21 TC; Reviewed: PV 04/24/2006 Avaya – Proprietary Use as authorized only pursuant to your signed agreem ent or Avaya policy . No other d[...]

  • Página 31

    Step 12 : In this network environment Static routing is used. The screen capture below is a list of all routes required for end-to-end LSP connectiv ity to Avaya Communication Manager. Select Routing Æ Destination in the left pane to view the list of all routes as shown in Figure 22 . Refer to [1] for more information. Figure 22 TC; Reviewed: PV 0[...]

  • Página 32

    Step 13 . Policies decide what traffic and protoco ls are permitted from one security zone to another. Policies for specific protocols and a pplications were not c onfigured. Any to MIP policies were configured from one zone to another to verify LSP to Avaya Communication Manager Registration and File Sync. From the Ne tScreen-25 Firewall Web Admin[...]

  • Página 33

    Step 14 . From the NetScreen-25 Firewall Web Admin screen, select Policies in the left window pane. Create a Policy for permitting traf fic from Trust Zone to VRA-Untrust Zone as shown in Figure 24 . From the Destination Address Book Entr y pull down menu select the MIP entry added in Figure 20 and leave all other options as default values and clic[...]

  • Página 34

    Step 15 . Select Policies in the left pane to view the list of configured policies as shown in Figure 25 . Figure 25 TC; Reviewed: PV 04/24/2006 Avaya – Proprietary Use as authorized only pursuant to your signed agreem ent or Avaya policy . No other discl osure is pe rmitted or a uthorized. 34 of 61 HT3-LSP-VF .doc[...]

  • Página 35

    6.1.4. Configure the Juniper VF 3000 SBC The following section describes how to configur e the Juniper VF 3000 SBC for LSP enterprise sites. Only the Signaling Card (SC) needs to be updated, not the Media Card (MC). In a High Reliability (HA) configurati on, both the master and backup (S C) needs to be updated. This document assumes that Juniper VF[...]

  • Página 36

    Step 2 . Enter command exit Æ and then show to verify sr-policy configuration as shown in Figure 27 . Figure 27 TC; Reviewed: PV 04/24/2006 Avaya – Proprietary Use as authorized only pursuant to your signed agreem ent or Avaya policy . No other discl osure is pe rmitted or a uthorized. 36 of 61 HT3-LSP-VF .doc[...]

  • Página 37

    6.2. G650/C-LAN Configuration (Private-Public-Private) 6.2.1. Configure Avaya Comm unication Manager The following Avaya Communication Manager provi sioning is required to support the LSP Configuration. This provisioning is perform ed vi a the SAT interface. In the following example, the Avaya Communication Manager for LSP support is provisioned fo[...]

  • Página 38

    6.2.1.2. Configure Avaya Communication Manager for LSP Support Step 1 . Use the “ change node-names ip ” command to add the name and IP Address of the LSP Native IP Address and static 1-to-1 NAT LSP IP address configured in the Checkpoint Firewall ( Figure 49 ) to the node-names form shown in Figure 29 . Submit the changes. Figure 29 TC; Review[...]

  • Página 39

    Step 2 . Use the “ change ip-network-region <region number>” comm and to add the LSP Native IP Address to the appropriate Network Region shown in Figure 30 . Submit the changes. Figure 30 Step 3 . Use the “change lsp” command to add the sta tic 1-to-1 LSP IP address configured in the Checkpoint Firewall ( Figure 49 ) to the LSP form s[...]

  • Página 40

    TC; Reviewed: PV 04/24/2006 Avaya – Proprietary Use as authorized only pursuant to your signed agreem ent or Avaya polic y. No other discl osure is pe rmitted or a uthorized. 40 of 61 HT3-LSP-VF .doc 6.2.2. Configure Avaya Local Sur vi vable Processors (LSP) Local Survivable Processors (LSP) are normally configured to register directly to Avaya C[...]

  • Página 41

    Figure 32 - LSP Configuration Web Page 7. Select “ This is a local survivable pr ocesso r with a Blade server as the primary controller ”. This option was selected for the Avaya SBS3000 shared blade server. 8. In the “ CLAN IP address of the primary controller ” and “ Primary controller’s IP address ” fields, enter the IP address of t[...]

  • Página 42

    6.2.3. Configuring the Junip er NetScreen-25 Firewall This Section assumes that Juniper NetScreen-25 Firewall basic provisio ning has been performed. Refer to [1] for more information. Refer to section 6.1.3 for Netscreen-25 Firewall login procedures and for common configuration pa rameters for Virtual Router (trust-vr). Step 1 . Create a Virtual R[...]

  • Página 43

    Step 2 . Create security zones and assign the zone to the appropriate Virtual Routers. From the left hand panel of the NetScreen-25 Firewall Web adm in screen, click on Network Æ Zo n es . From the right hand pane, click the New button to create a new zone . Create security zones for the Virtual Router untrusted side (VR- B), zone name “VRB-Untr[...]

  • Página 44

    Step 3 . Select Network Æ Zo nes in the left pane to view the list of configured zones as shown in Figure 35 and click OK . Additional Zones are shown that ar e not related to th is Application Note. Figure 35 TC; Reviewed: PV 04/24/2006 Avaya – Proprietary Use as authorized only pursuant to your signed agreem ent or Avaya policy . No other disc[...]

  • Página 45

    Step 4 . Configure Interface with Mapped IP (MIP). Th e physical interface towa rd enterprise site B is configured using sub-interfaces. The physical interface toward the Data Center does not use sub-interfaces. From the NetScreen-25 Firewall Web Admi n screen, click on Network Æ Interfaces , and select Sub-IF on drop down menu then click the New [...]

  • Página 46

    Step 5 . Configure Sub-Interface ethernet2.3 MIP for LSP to Avaya Communication Manager Static 1-to-1 NAT. From the NetScr een-25 Firewall Sub-IF screen, select MIP , and click the New button from the right hand window pane. Configure MIP as shown in Figure 37 and click OK . Figure 37 TC; Reviewed: PV 04/24/2006 Avaya – Proprietary Use as authori[...]

  • Página 47

    Step 6 . Configure Sub-Interface ethernet2.3 MIP for LSP to C-LAN Static 1-to-1 NAT. From the NetScreen-25 Firewall Sub-IF screen, select MIP , and click the New button from the right hand window pane. Configure MIP as shown in Figure 38 and click OK . Figure 38 TC; Reviewed: PV 04/24/2006 Avaya – Proprietary Use as authorized only pursuant to yo[...]

  • Página 48

    Step 7 . Select Network Æ Interfaces in the left pane again to view the list of configured Interfaces shown in Figure 39 . Additional Interfaces are shown that are not related to this Application Note. Figure 39 TC; Reviewed: PV 04/24/2006 Avaya – Proprietary Use as authorized only pursuant to your signed agreem ent or Avaya policy . No other di[...]

  • Página 49

    Step 8 . In this network environment St atic routing is used. In the sc reen capture belo w is a list of all routes required for end-to-end LSP connectiv ity to Avaya Communication Manager. Select Routing Æ Destination in the left pane to view the list of all routes shown in Figure 40 . Refer to [1] for more information. Figure 40 TC; Reviewed: PV[...]

  • Página 50

    Step 9 . Policies decide what traffic and protocol s are pe rmitted from one security zon e to another. Policies for specific protocols and a pplications were not c onfigured. Any to MIP policies were configured from one zone to another to verify LSP to Avaya Communication Manager Registration and File Sync. From the Ne tScreen-25 Firewall Web Admi[...]

  • Página 51

    Step 10 . From the NetScreen-25 Firewall Web Admin screen, select Policies in the left window pane. Create a Policy for perm itting traffic from VRB-Untrust Zone to Trust Zone sho wn in Figure 42. From the Destination Address Book Entr y pull down menu select the MIP entry added in Figure 38 and leave all other options as default values and click O[...]

  • Página 52

    Step 11 . From the NetScreen-25 Firewall Web Admin screen, select Policies in the left window pane. Create a Policy for permitting traf fic from Trust Zone to VRB-Untrust Zone as shown in Figure 43 and leave all options as default values and click OK . Figure 43 TC; Reviewed: PV 04/24/2006 Avaya – Proprietary Use as authorized only pursuant to yo[...]

  • Página 53

    Step 12 . Select Policies in the left pane to view the list of configured policies as shown in Figure 44 . Figure 44 TC; Reviewed: PV 04/24/2006 Avaya – Proprietary Use as authorized only pursuant to your signed agreem ent or Avaya policy . No other discl osure is pe rmitted or a uthorized. 53 of 61 HT3-LSP-VF .doc[...]

  • Página 54

    6.2.4. Configure the Juni per VF 3000 SBC The following section describes how to configur e the Juniper VF 3000 SBC for LSP enterprise sites. Only the Signaling Card (SC) needs to be updated, not the Media Card (MC). In a High Reliability (HA) configurati on, both the master and backup (S C) needs to be updated. This document assumes that Juniper V[...]

  • Página 55

    Step 2 . Enter command exit Æ and then show to verify sr-policy configuration as shown in Figure 46 . Figure 46 TC; Reviewed: PV 04/24/2006 Avaya – Proprietary Use as authorized only pursuant to your signed agreem ent or Avaya policy . No other discl osure is pe rmitted or a uthorized. 55 of 61 HT3-LSP-VF .doc[...]

  • Página 56

    6.2.5. Enterprise Customer Checkp oint Firewall Configuration The firewall at the enterprise sites must be conf igured to provide static 1-to-1 NAT for LSP to Avaya Communication Manager connec tivity. The following exam ple in Figure 47 is shown for Checkpoint Firewall HIPT-B1 located in enterp rise site B1. The Group HIPT-B1_eth4 is made up of se[...]

  • Página 57

    Step 2 . From Checkpoint Smart Dashboard application, Select Network Objects , right click mouse on Networks and select New Networks . At the General tab , add the private Network IP Address as shown in Figure 48 and click OK. Figure 48: General Properties of B1 LSP Static NAT TC; Reviewed: PV 04/24/2006 Avaya – Proprietary Use as authorized only[...]

  • Página 58

    Step 3 . Select the NAT tab , then add a static 1-to-1 NAT . The Translate to IP address is the public WAN IP address and then select HIPT-B1 from the Install on Gateway pull down menu as shown in Figure 49 and click OK . Figure 49: NAT Properties of B1 LSP Static NAT TC; Reviewed: PV 04/24/2006 Avaya – Proprietary Use as authorized only pursuant[...]

  • Página 59

    Step 4 . From Checkpoint Smart Dashboard application, Select Network Objects Æ Group Æ HIPT-B1_eth4 . Add the static 1-to-1 NAT called “HT_B1_LSP_StaticNat” f rom the Not in Group table to the In Group table and click OK as shown in Figure 50. To activate changes made to HIPT-B1, select Policy Æ Install from the Checkpoint Sm artDashboard me[...]

  • Página 60

    TC; Reviewed: PV 04/24/2006 Avaya – Proprietary Use as authorized only pursuant to your signed agreem ent or Avaya polic y. No other discl osure is pe rmitted or a uthorized. 60 of 61 HT3-LSP-VF .doc • Verify the Avaya Communication Manager is updating the LSP by running command “ save trans lsp ” from the SAT interface. Use command “ dis[...]

  • Página 61

    TC; Reviewed: PV 04/24/2006 Avaya – Proprietary Use as authorized only pursuant to your signed agreem ent or Avaya polic y. No other discl osure is pe rmitted or a uthorized. 61 of 61 HT3-LSP-VF .doc © 2006 Avaya Inc. All Rights Reserved. Avaya and the Avaya Logo are trademarks of Avay a Inc. A ll trademarks identified by ® and ™ are register[...]