Avaya 3.7 User Manual
Page 321

Issue 4 May 2005
321
Index
Extranet, (continued)
IP Address text boxes
. . . . . . . . . . . . . .
IP Group, configuring an
. . . . . . . . . . . .
IPSec Proposals, About
. . . . . . . . . . . . .
support
. . . . . . . . . . . . . . . . . . . . .
VSU
. . . . . . . . . . . . . . . . . . . . . .
extranet, creating
. . . . . . . . . . . . . . . . .
F
Failover TEP
detailed description
. . . . . . . . . . . . . . .
Failover, reconnect
. . . . . . . . . . . . . . . . .
failover,connectivity check example
. . . . . . . . .
FAX support
. . . . . . . . . . . . . . . . . . . .
Filter Rules, parameters
. . . . . . . .
,
FilterStats, parameters
. . . . . . . . . . . . . . .
Firewall
. . . . . . . . . . . . . . . . . . . . . .
Policies
. . . . . . . . . . . . . . . . . . . .
Rules
. . . . . . . . . . . . . . . . . . . . .
Firewall Policy Management
Firewall Templates
. . . . . . . . . . . . . . .
firewall templates
. . . . . . . . . . . . . . . . .
firewall, considerations for NAT
. . . . . . . . . . .
firewall, setting FTP rules
. . . . . . . . . . . . . .
firmware version, how to find
. . . . . . . . . . . .
flood attack
. . . . . . . . . . . . . . . . . .
,
FTP, setting firewall rules for
. . . . . . . . . . . .
G
General tab
SKIP VPN Objects, for
. . . . . . . . . . . . .
User Objects, for
. . . . . . . . . . . . . . . .
VPN Objects, for
. . . . . . . . . . . . . . . .
groups
private addresses
. . . . . . . . . . . . . . . .
H
Heartbeat Interval
. . . . . . . . . . . . . . . . .
Heartbeat Retry Limit
. . . . . . . . . . . . . . . .
Help System, online
. . . . . . . . . . . . . . . .
High Availability
. . . . . . . . . . . . . . . . . .
Creating
. . . . . . . . . . . . . . . . . . . .
Deleting
. . . . . . . . . . . . . . . . . . . .
Enabling
. . . . . . . . . . . . . . . . . . . .
HMAC-MD5 as an IPSec parameter
. . . . . . . . .
HMAC-SHA as an IPSec parameter
. . . . . . . . .
Hold Down Time
. . . . . . . . . . . . . . . . . .
Hold Up Time
. . . . . . . . . . . . . . . . . . .
I
IKE Certificate Usage
. . . . . . . . . . . . . . .
IKE Identifier
. . . . . . . . . . . . . . . . . . .
IKE identifier (user)
. . . . . . . . . . . . . . . .
IKE Identifier drop-down list
. . . . . . . . . . . .
IKE radio button
. . . . . . . . . . . . . . . . .
IKE VPN
about
. . . . . . . . . . . . . . . . . . . . .
adding IP Group Objects
. . . . . . . . . . . .
adding User and User Group Objects
. . . . . .
authentication method, configuring the
. . . . .
Certificate Based radio button
. . . . . . . . .
compression, configuring
. . . . . . . . . . .
configuring
. . . . . . . . . . . . . . . . . .
creating a new
. . . . . . . . . . . . . . . .
Diffie-Hellman Group drop-down list
. . . . . .
encryption level, configuring the
. . . . . . . .
IPSec (see IPSec)
Key Lifetime, configuring
. . . . . . . . . . . .
keying algorithm (modulus), configuring the
. . .
perfect forward secrecy, configuring
. . . . . .
Preshared Secret radio button
. . . . . . . . .
shared secret, changing the
. . . . . . . . . .
import configuration
. . . . . . . . . . . . . . . .
intranet
support
. . . . . . . . . . . . . . . . . . . . .
IP (Internet Protocol)
packet
. . . . . . . . . . . . . . . . . . . .
private addresses
. . . . . . . . . . . . . . .
IP addressing, by zone
. . . . . . . . . . . . . . .
IP Group
About
. . . . . . . . . . . . . . . . . . . . . .
address/mask pair described
. . . . . . . . . . .
configuring
. . . . . . . . . . . . . . . . . .
creating
. . . . . . . . . . . . . . . . . . . . .
extranet, how to connect to an
. . . . . . . . .
finding which are associated with a VSU
. . . . .
IKE Identifier drop-down list
. . . . . . . . . .
terminal equipment to a VPN, about adding
. . . .
when to create
. . . . . . . . . . . . . . . . .
IP Group (definition)
. . . . . . . . . . . . . . . .
IP Group (deriving the Group Mask)
. . . . . . . .
IP spoofing
. . . . . . . . . . . . . . . . . .
,
IP telephone
adding device to security gateway
. . . . . .
IP telephone configuration
. . . . . . . . . . . . .
ipRouteTable, parameters
. . . . . . . . . . . . .
IPSec
headers to packets, adding IPSec
. . . . . . .
Proposal
about
. . . . . . . . . . . . . . . . . . .
authentication parameters, configuring
. . . .
encryption parameters, configuring
. . . . .
lifetime options, key
. . . . . . . . . . . .