Идти на страницу of
Похожие руководства по эксплуатации
-
IP Phone
Avaya 4600
178 страниц 0.83 mb -
IP Phone
Avaya 7940
43 страниц 0.64 mb -
IP Phone
Avaya 1608-I
50 страниц 0.7 mb -
IP Phone
Avaya 700289937
14 страниц 0.38 mb -
IP Phone
Avaya 15-601127
68 страниц 0.38 mb -
IP Phone
Avaya 16-603155
3 страниц 0.09 mb -
IP Phone
Avaya 6416
98 страниц 2.98 mb -
IP Phone
Avaya IP OFFICE 40DHB0002USCL
70 страниц 0.26 mb
Хорошее руководство по эксплуатации
Законодательство обязывает продавца передать покупателю, вместе с товаром, руководство по эксплуатации Avaya VF 3000. Отсутствие инструкции либо неправильная информация, переданная потребителю, составляют основание для рекламации в связи с несоответствием устройства с договором. В законодательстве допускается предоставлении руководства в другой, чем бумажная форме, что, в последнее время, часто используется, предоставляя графическую или электронную форму инструкции Avaya VF 3000 или обучающее видео для пользователей. Условием остается четкая и понятная форма.
Что такое руководство?
Слово происходит от латинского "instructio", тоесть привести в порядок. Следовательно в инструкции Avaya VF 3000 можно найти описание этапов поведения. Цель инструкции заключается в облегчении запуска, использования оборудования либо выполнения определенной деятельности. Инструкция является набором информации о предмете/услуге, подсказкой.
К сожалению немного пользователей находит время для чтения инструкций Avaya VF 3000, и хорошая инструкция позволяет не только узнать ряд дополнительных функций приобретенного устройства, но и позволяет избежать возникновения большинства поломок.
Из чего должно состоять идеальное руководство по эксплуатации?
Прежде всего в инструкции Avaya VF 3000 должна находится:
- информация относительно технических данных устройства Avaya VF 3000
- название производителя и год производства оборудования Avaya VF 3000
- правила обслуживания, настройки и ухода за оборудованием Avaya VF 3000
- знаки безопасности и сертификаты, подтверждающие соответствие стандартам
Почему мы не читаем инструкций?
Как правило из-за нехватки времени и уверенности в отдельных функциональностях приобретенных устройств. К сожалению само подсоединение и запуск Avaya VF 3000 это слишком мало. Инструкция заключает ряд отдельных указаний, касающихся функциональности, принципов безопасности, способов ухода (даже то, какие средства стоит использовать), возможных поломок Avaya VF 3000 и способов решения проблем, возникающих во время использования. И наконец то, в инструкции можно найти адресные данные сайта Avaya, в случае отсутствия эффективности предлагаемых решений. Сейчас очень большой популярностью пользуются инструкции в форме интересных анимаций или видео материалов, которое лучше, чем брошюра воспринимаются пользователем. Такой вид инструкции позволяет пользователю просмотреть весь фильм, не пропуская спецификацию и сложные технические описания Avaya VF 3000, как это часто бывает в случае бумажной версии.
Почему стоит читать инструкции?
Прежде всего здесь мы найдем ответы касательно конструкции, возможностей устройства Avaya VF 3000, использования отдельных аксессуаров и ряд информации, позволяющей вполне использовать все функции и упрощения.
После удачной покупки оборудования/устройства стоит посвятить несколько минут для ознакомления с каждой частью инструкции Avaya VF 3000. Сейчас их старательно готовят или переводят, чтобы они были не только понятными для пользователя, но и чтобы выполняли свою основную информационно-поддерживающую функцию.
Содержание руководства
-
Страница 1
Avaya Solution & Interoperability Test Lab Avaya Hosted IP Telephony R3.0 Solution LSP Configuration with the Juniper VF 3000 SBC – Issue 1.0 Abstract These Application Notes describe the conf iguration of Avaya Communication Manager, Juniper NetScreen Firewall and Juniper VF 3000 Session Border Controller (SBC) and other network components i[...]
-
Страница 2
TC; Reviewed: PV 04/24/2006 Avaya – Proprietary Use as authorized only pursuant to your signed agreem ent or Avaya polic y. No other discl osure is pe rmitted or a uthorized. 2 of 61 HT3-LSP-VF .doc Table of Contents 1. Introduction ...................................................................................................................[...]
-
Страница 3
TC; Reviewed: PV 04/24/2006 Avaya – Proprietary Use as authorized only pursuant to your signed agreem ent or Avaya polic y. No other discl osure is pe rmitted or a uthorized. 3 of 61 HT3-LSP-VF .doc 1. Intr oduction These Application notes provide instructions on how to configure Local Survivable Processor (LSP) with the Juniper VF 3000 SBC in an[...]
-
Страница 4
data center edge and at the edge of each enterprise site. Note that the Juniper VF 3000 SBC can provide this NAT function. Figure 1 - Private-Public-Private Architecture Another method for WAN connectivity between the enterprise sites and the data center is via a VPN configuration. Figure 2 illustrates this case. The Juniper VF 3000 SBC here must s[...]
-
Страница 5
different enterprise customer. The Juniper VF 3000 SBC in the data center can make use of this VLAN information to resolve overlapping IP address issues 1 . The Juniper VF 3000 SBC segregates the access traffic into separate cust om er streams and routes the traffic to the respective Avaya Communication Managers based on the destination IP address.[...]
-
Страница 6
TC; Reviewed: PV 04/24/2006 Avaya – Proprietary Use as authorized only pursuant to your signed agreem ent or Avaya polic y. No other discl osure is pe rmitted or a uthorized. 6 of 61 HT3-LSP-VF .doc architecture that may occur. This is sim ilar to Figure 1 , except that the data center uses public IP addressing. There is no need for a NAT functi [...]
-
Страница 7
Figure 3 - Supporting LSPs in the Private-Public-Private Architecture Figure 4 shows the architecture for a corresponding solution applied to the architecture of Figure 2 . As in Figure 3 , an extra NAT/FW device has been placed at the data center edge. This FW device must be VLAN supported in order to support overlapping address spaces for differe[...]
-
Страница 8
Figure 4 - Supporting LSPs in th e Private-Private Architecture 3. Configuration Overview This section gives a high-level overview of how to configure en terprise sites and data center networks and how to administer the Avaya Co mmunication Manager servers and LSPs for LSP functionality to work in HIPT R3.0/3.1 and HCC R3.0 solutions. The basic con[...]
-
Страница 9
TC; Reviewed: PV 04/24/2006 Avaya – Proprietary Use as authorized only pursuant to your signed agreem ent or Avaya polic y. No other discl osure is pe rmitted or a uthorized. 9 of 61 HT3-LSP-VF .doc 3.1. Private-Public-Private Architecture In order to build components in Figure 3 use the following: Enterprise site network configuration: • On th[...]
-
Страница 10
TC; Reviewed: PV 04/24/2006 Avaya – Proprietary Use as authorized only pursuant to your signed agreem ent or Avaya polic y. No other discl osure is pe rmitted or a uthorized. 10 of 61 HT3-LSP-VF .doc Avaya Communication Manager server administration: • SA8853 Support of LSPs Behind NAT Gr een feature must be installed. • Add two IP node names[...]
-
Страница 11
TC; Reviewed: PV 04/24/2006 Avaya – Proprietary Use as authorized only pursuant to your signed agreem ent or Avaya polic y. No other discl osure is pe rmitted or a uthorized. 11 of 61 HT3-LSP-VF .doc 4. Equipment and Softwar e V alidated This application note details one way to set up the LSP solution. The table below provides the versions used i[...]
-
Страница 12
5. A vaya HIPT R3.0 Envir onment The overview of the HIPT R3.0 solution with LSP Support is shown in Figure 5 . Figure 5 – Avaya Hosted IP Telephony Release 3.0 LSP Solution TC; Reviewed: PV 04/24/2006 Avaya – Proprietary Use as authorized only pursuant to your signed agreem ent or Avaya policy . No other discl osure is pe rmitted or a uthorize[...]
-
Страница 13
TC; Reviewed: PV 04/24/2006 Avaya – Proprietary Use as authorized only pursuant to your signed agreem ent or Avaya polic y. No other discl osure is pe rmitted or a uthorized. 13 of 61 HT3-LSP-VF .doc 5.1. Service Provider Data Center The Data Center simulates two custom ers, PC-LAN (Private-Private) and C-LAN (Priva te- Public-Private). These cus[...]
-
Страница 14
TC; Reviewed: PV 04/24/2006 Avaya – Proprietary Use as authorized only pursuant to your signed agreem ent or Avaya polic y. No other discl osure is pe rmitted or a uthorized. 14 of 61 HT3-LSP-VF .doc Communication Manager in the Data Center is lost. All enter prise Loc al Survivable Processors (LSPs) will achieve registration a nd File Sync via t[...]
-
Страница 15
6. A vaya Hosted IP T elephony Re lease 3.0 LSP Configuration 6.1. PC-LAN Configuration (Private-Private) 6.1.1. Configure Avaya Comm unicati on Manager The following Avaya Communication Manager provi sioning is required to support the LSP Configuration. This provisioning is perform ed vi a the SAT interface. In the following example, the Avaya Com[...]
-
Страница 16
6.1.1.2. Configure Avaya Communicati on Manager for LSP Support Step 1 . Use the “ change node-names ip ” command to add the name and IP Address of the LSP Native IP Address and static 1-to-1 NAT LSP IP address configured in the NetScreen-25 Firewall ( Figure 20 ) to the node-names form shown in Figure 7 . Submit the changes. Figure 7 TC; Revie[...]
-
Страница 17
Step 2 . Use the “ change ip-network-region <region number>” comm and to add the LSP Native IP Address to the appropriate Network Region shown in Figure 8 . Submit the changes. Figure 8 Step 3 . Use the “ change lsp ” command to add the sta tic 1-to-1 LSP IP address configured in the NetScreen-25 Firewall ( Figure 20 ) to the LSP form[...]
-
Страница 18
TC; Reviewed: PV 04/24/2006 Avaya – Proprietary Use as authorized only pursuant to your signed agreem ent or Avaya polic y. No other discl osure is pe rmitted or a uthorized. 18 of 61 HT3-LSP-VF .doc 6.1.2. Configure Avaya Local Surv ivabl e Processors (LSP) Local Survivable Processors (LSP) are normally configured to register directly to Avaya C[...]
-
Страница 19
Figure 10 - LSP Configuration Web Page 7. Select “ This is a local survivable pr ocesso r with a Blade server as the primary controller ”. This option was selected for the Avaya SBS3000 shared blade server. 8. In the “ CLAN IP address of the primary controller ” and “ Primary controller’s IP address ” fields, enter the IP address of t[...]
-
Страница 20
6.1.3. Configuring the Juniper NetScreen-25 Fir ewall This Section assumes that Juniper NetScreen-25 Firewall basic provisio ning has been performed. Refer to [1] for more information. Step 1 . From a PC, connect to the Juniper Networks NetScreen-25 Firewall using a web browser, by typing https://<IP_address_NetScreen-25>. L ogin using a user[...]
-
Страница 21
Step 2 . The following WEB Admin screen appears upon successful login as shown in Figure 12 . Figure 12 Note: Virtual Router (trust-vr) has common configuration parame ters for both PC-LAN (VR-A) and G650/C-LAN (VR-B). The configuration for (tru st-vr) settings are covered in this section. TC; Reviewed: PV 04/24/2006 Avaya – Proprietary Use as au[...]
-
Страница 22
Step 3 . Create a Virtual Router for en terprise site A (VR-A) and Data Center (trust-vr). From the left pane click on Network Æ Routing Æ Virtual Routers . On the right pane, click the New button on the top right hand corner to create a ne w Virtual Router. Set Vi rtual Router Nam e and leave all other options as default values and click OK . Fi[...]
-
Страница 23
Step 4 . Create security zones and assign the zone to the appropriate Virtual Routers. From the left hand panel of the NetScreen-25 Firewall Web adm in screen, click on Network Æ Zo n es . From the right hand pane, click the New button to create a new zone . Create security zones for the Virtual Router untrusted side (VR-A) , zone name “VRA-Untr[...]
-
Страница 24
Step 5 . Create security zones and assign the zone to the appropriate Virtual Routers. From the left hand panel of the NetScreen-25 Firewall Web adm in screen, click on Network Æ Zo n es . From the right hand pane, click the New button to create a new zone . Create security zones for the Virtual Router trusted side (trust-vr), zone name “Trust?[...]
-
Страница 25
Step 6 . Select Network Æ Zo nes in the left pane to view the list of configured zones as shown in Figure 16 . Additional Zones are show n that are not related to this Application Note. Figure 16 TC; Reviewed: PV 04/24/2006 Avaya – Proprietary Use as authorized only pursuant to your signed agreem ent or Avaya policy . No other discl osure is pe [...]
-
Страница 26
Step 7 . Configure Interface with Mapped IP (MIP). Th e physical interface towa rd enterprise site A is configured using sub-interfaces. The physical interface toward the Data Center does not use sub-interfaces. From the NetScreen-25 Firewall Web Admi n screen, click on Network Æ Interfaces , and select Sub-IF on drop down menu then click the New [...]
-
Страница 27
Step 8 . Configure Sub-Interface ethernet2.1 MIP for LSP to Avaya Communication Manager Static 1-to-1 NAT. From the NetScr een-25 Firewall Sub-IF screen, select MIP , and click the New button from the right hand window pane. Configure MIP as shown in Figure 18 and click OK . Figure 18 TC; Reviewed: PV 04/24/2006 Avaya – Proprietary Use as authori[...]
-
Страница 28
Step 9 . Configure Interface with Mapped IP (MIP). The physical interface toward the Data Center does not use sub-interfaces. From the Ne tScreen-25 Firewall Web Adm in screen, click on Network Æ Interfaces and then click the New button from the right hand window pane. Create Interface ethernet1, zone Trust. Configure Interface for Zone Name, IP A[...]
-
Страница 29
Step 10 . Configure Sub-Interface ethernet1 MIP for Avaya Communication Manager to LSP Static 1-to-1 NAT. From the NetScr een-25 Firewall Sub-IF screen, select MIP , and click the New button from the right hand window pane. Configure MIP as shown in Figure 20 and click OK . Figure 20 TC; Reviewed: PV 04/24/2006 Avaya – Proprietary Use as authoriz[...]
-
Страница 30
Step 11 . Select Network Æ Interfaces in the left pane again to view the list of configured Interfaces shown in Figure 21 . Additional Interfaces are shown that are not related to this Application Note. Figure 21 TC; Reviewed: PV 04/24/2006 Avaya – Proprietary Use as authorized only pursuant to your signed agreem ent or Avaya policy . No other d[...]
-
Страница 31
Step 12 : In this network environment Static routing is used. The screen capture below is a list of all routes required for end-to-end LSP connectiv ity to Avaya Communication Manager. Select Routing Æ Destination in the left pane to view the list of all routes as shown in Figure 22 . Refer to [1] for more information. Figure 22 TC; Reviewed: PV 0[...]
-
Страница 32
Step 13 . Policies decide what traffic and protoco ls are permitted from one security zone to another. Policies for specific protocols and a pplications were not c onfigured. Any to MIP policies were configured from one zone to another to verify LSP to Avaya Communication Manager Registration and File Sync. From the Ne tScreen-25 Firewall Web Admin[...]
-
Страница 33
Step 14 . From the NetScreen-25 Firewall Web Admin screen, select Policies in the left window pane. Create a Policy for permitting traf fic from Trust Zone to VRA-Untrust Zone as shown in Figure 24 . From the Destination Address Book Entr y pull down menu select the MIP entry added in Figure 20 and leave all other options as default values and clic[...]
-
Страница 34
Step 15 . Select Policies in the left pane to view the list of configured policies as shown in Figure 25 . Figure 25 TC; Reviewed: PV 04/24/2006 Avaya – Proprietary Use as authorized only pursuant to your signed agreem ent or Avaya policy . No other discl osure is pe rmitted or a uthorized. 34 of 61 HT3-LSP-VF .doc[...]
-
Страница 35
6.1.4. Configure the Juniper VF 3000 SBC The following section describes how to configur e the Juniper VF 3000 SBC for LSP enterprise sites. Only the Signaling Card (SC) needs to be updated, not the Media Card (MC). In a High Reliability (HA) configurati on, both the master and backup (S C) needs to be updated. This document assumes that Juniper VF[...]
-
Страница 36
Step 2 . Enter command exit Æ and then show to verify sr-policy configuration as shown in Figure 27 . Figure 27 TC; Reviewed: PV 04/24/2006 Avaya – Proprietary Use as authorized only pursuant to your signed agreem ent or Avaya policy . No other discl osure is pe rmitted or a uthorized. 36 of 61 HT3-LSP-VF .doc[...]
-
Страница 37
6.2. G650/C-LAN Configuration (Private-Public-Private) 6.2.1. Configure Avaya Comm unication Manager The following Avaya Communication Manager provi sioning is required to support the LSP Configuration. This provisioning is perform ed vi a the SAT interface. In the following example, the Avaya Communication Manager for LSP support is provisioned fo[...]
-
Страница 38
6.2.1.2. Configure Avaya Communication Manager for LSP Support Step 1 . Use the “ change node-names ip ” command to add the name and IP Address of the LSP Native IP Address and static 1-to-1 NAT LSP IP address configured in the Checkpoint Firewall ( Figure 49 ) to the node-names form shown in Figure 29 . Submit the changes. Figure 29 TC; Review[...]
-
Страница 39
Step 2 . Use the “ change ip-network-region <region number>” comm and to add the LSP Native IP Address to the appropriate Network Region shown in Figure 30 . Submit the changes. Figure 30 Step 3 . Use the “change lsp” command to add the sta tic 1-to-1 LSP IP address configured in the Checkpoint Firewall ( Figure 49 ) to the LSP form s[...]
-
Страница 40
TC; Reviewed: PV 04/24/2006 Avaya – Proprietary Use as authorized only pursuant to your signed agreem ent or Avaya polic y. No other discl osure is pe rmitted or a uthorized. 40 of 61 HT3-LSP-VF .doc 6.2.2. Configure Avaya Local Sur vi vable Processors (LSP) Local Survivable Processors (LSP) are normally configured to register directly to Avaya C[...]
-
Страница 41
Figure 32 - LSP Configuration Web Page 7. Select “ This is a local survivable pr ocesso r with a Blade server as the primary controller ”. This option was selected for the Avaya SBS3000 shared blade server. 8. In the “ CLAN IP address of the primary controller ” and “ Primary controller’s IP address ” fields, enter the IP address of t[...]
-
Страница 42
6.2.3. Configuring the Junip er NetScreen-25 Firewall This Section assumes that Juniper NetScreen-25 Firewall basic provisio ning has been performed. Refer to [1] for more information. Refer to section 6.1.3 for Netscreen-25 Firewall login procedures and for common configuration pa rameters for Virtual Router (trust-vr). Step 1 . Create a Virtual R[...]
-
Страница 43
Step 2 . Create security zones and assign the zone to the appropriate Virtual Routers. From the left hand panel of the NetScreen-25 Firewall Web adm in screen, click on Network Æ Zo n es . From the right hand pane, click the New button to create a new zone . Create security zones for the Virtual Router untrusted side (VR- B), zone name “VRB-Untr[...]
-
Страница 44
Step 3 . Select Network Æ Zo nes in the left pane to view the list of configured zones as shown in Figure 35 and click OK . Additional Zones are shown that ar e not related to th is Application Note. Figure 35 TC; Reviewed: PV 04/24/2006 Avaya – Proprietary Use as authorized only pursuant to your signed agreem ent or Avaya policy . No other disc[...]
-
Страница 45
Step 4 . Configure Interface with Mapped IP (MIP). Th e physical interface towa rd enterprise site B is configured using sub-interfaces. The physical interface toward the Data Center does not use sub-interfaces. From the NetScreen-25 Firewall Web Admi n screen, click on Network Æ Interfaces , and select Sub-IF on drop down menu then click the New [...]
-
Страница 46
Step 5 . Configure Sub-Interface ethernet2.3 MIP for LSP to Avaya Communication Manager Static 1-to-1 NAT. From the NetScr een-25 Firewall Sub-IF screen, select MIP , and click the New button from the right hand window pane. Configure MIP as shown in Figure 37 and click OK . Figure 37 TC; Reviewed: PV 04/24/2006 Avaya – Proprietary Use as authori[...]
-
Страница 47
Step 6 . Configure Sub-Interface ethernet2.3 MIP for LSP to C-LAN Static 1-to-1 NAT. From the NetScreen-25 Firewall Sub-IF screen, select MIP , and click the New button from the right hand window pane. Configure MIP as shown in Figure 38 and click OK . Figure 38 TC; Reviewed: PV 04/24/2006 Avaya – Proprietary Use as authorized only pursuant to yo[...]
-
Страница 48
Step 7 . Select Network Æ Interfaces in the left pane again to view the list of configured Interfaces shown in Figure 39 . Additional Interfaces are shown that are not related to this Application Note. Figure 39 TC; Reviewed: PV 04/24/2006 Avaya – Proprietary Use as authorized only pursuant to your signed agreem ent or Avaya policy . No other di[...]
-
Страница 49
Step 8 . In this network environment St atic routing is used. In the sc reen capture belo w is a list of all routes required for end-to-end LSP connectiv ity to Avaya Communication Manager. Select Routing Æ Destination in the left pane to view the list of all routes shown in Figure 40 . Refer to [1] for more information. Figure 40 TC; Reviewed: PV[...]
-
Страница 50
Step 9 . Policies decide what traffic and protocol s are pe rmitted from one security zon e to another. Policies for specific protocols and a pplications were not c onfigured. Any to MIP policies were configured from one zone to another to verify LSP to Avaya Communication Manager Registration and File Sync. From the Ne tScreen-25 Firewall Web Admi[...]
-
Страница 51
Step 10 . From the NetScreen-25 Firewall Web Admin screen, select Policies in the left window pane. Create a Policy for perm itting traffic from VRB-Untrust Zone to Trust Zone sho wn in Figure 42. From the Destination Address Book Entr y pull down menu select the MIP entry added in Figure 38 and leave all other options as default values and click O[...]
-
Страница 52
Step 11 . From the NetScreen-25 Firewall Web Admin screen, select Policies in the left window pane. Create a Policy for permitting traf fic from Trust Zone to VRB-Untrust Zone as shown in Figure 43 and leave all options as default values and click OK . Figure 43 TC; Reviewed: PV 04/24/2006 Avaya – Proprietary Use as authorized only pursuant to yo[...]
-
Страница 53
Step 12 . Select Policies in the left pane to view the list of configured policies as shown in Figure 44 . Figure 44 TC; Reviewed: PV 04/24/2006 Avaya – Proprietary Use as authorized only pursuant to your signed agreem ent or Avaya policy . No other discl osure is pe rmitted or a uthorized. 53 of 61 HT3-LSP-VF .doc[...]
-
Страница 54
6.2.4. Configure the Juni per VF 3000 SBC The following section describes how to configur e the Juniper VF 3000 SBC for LSP enterprise sites. Only the Signaling Card (SC) needs to be updated, not the Media Card (MC). In a High Reliability (HA) configurati on, both the master and backup (S C) needs to be updated. This document assumes that Juniper V[...]
-
Страница 55
Step 2 . Enter command exit Æ and then show to verify sr-policy configuration as shown in Figure 46 . Figure 46 TC; Reviewed: PV 04/24/2006 Avaya – Proprietary Use as authorized only pursuant to your signed agreem ent or Avaya policy . No other discl osure is pe rmitted or a uthorized. 55 of 61 HT3-LSP-VF .doc[...]
-
Страница 56
6.2.5. Enterprise Customer Checkp oint Firewall Configuration The firewall at the enterprise sites must be conf igured to provide static 1-to-1 NAT for LSP to Avaya Communication Manager connec tivity. The following exam ple in Figure 47 is shown for Checkpoint Firewall HIPT-B1 located in enterp rise site B1. The Group HIPT-B1_eth4 is made up of se[...]
-
Страница 57
Step 2 . From Checkpoint Smart Dashboard application, Select Network Objects , right click mouse on Networks and select New Networks . At the General tab , add the private Network IP Address as shown in Figure 48 and click OK. Figure 48: General Properties of B1 LSP Static NAT TC; Reviewed: PV 04/24/2006 Avaya – Proprietary Use as authorized only[...]
-
Страница 58
Step 3 . Select the NAT tab , then add a static 1-to-1 NAT . The Translate to IP address is the public WAN IP address and then select HIPT-B1 from the Install on Gateway pull down menu as shown in Figure 49 and click OK . Figure 49: NAT Properties of B1 LSP Static NAT TC; Reviewed: PV 04/24/2006 Avaya – Proprietary Use as authorized only pursuant[...]
-
Страница 59
Step 4 . From Checkpoint Smart Dashboard application, Select Network Objects Æ Group Æ HIPT-B1_eth4 . Add the static 1-to-1 NAT called “HT_B1_LSP_StaticNat” f rom the Not in Group table to the In Group table and click OK as shown in Figure 50. To activate changes made to HIPT-B1, select Policy Æ Install from the Checkpoint Sm artDashboard me[...]
-
Страница 60
TC; Reviewed: PV 04/24/2006 Avaya – Proprietary Use as authorized only pursuant to your signed agreem ent or Avaya polic y. No other discl osure is pe rmitted or a uthorized. 60 of 61 HT3-LSP-VF .doc • Verify the Avaya Communication Manager is updating the LSP by running command “ save trans lsp ” from the SAT interface. Use command “ dis[...]
-
Страница 61
TC; Reviewed: PV 04/24/2006 Avaya – Proprietary Use as authorized only pursuant to your signed agreem ent or Avaya polic y. No other discl osure is pe rmitted or a uthorized. 61 of 61 HT3-LSP-VF .doc © 2006 Avaya Inc. All Rights Reserved. Avaya and the Avaya Logo are trademarks of Avay a Inc. A ll trademarks identified by ® and ™ are register[...]