Avaya Bay Dial VPN Networks Manual de usuario Pagina 7

  • Descarga
  • Añadir a mis manuales
  • Imprimir
  • Pagina
    / 206
  • Tabla de contenidos
  • SOLUCIÓN DE PROBLEMAS
  • MARCADORES
  • Valorado. / 5. Basado en revisión del cliente
Vista de pagina 6
308606-14.00 Rev 00
vii
Using Secondary Gateways .........................................................................................3-13
Using a Backup Gateway .......................................................................................3-15
Using Load Distribution ..........................................................................................3-15
Configuring Secondary Gateways ..........................................................................3-15
Starting the Connection ................................................................................................3-16
A Day in the Life of a Layer 3 Packet ............................................................................3-18
How a Packet Moves Through a Dial VPN Network ...............................................3-20
How a Packet Returns to the Remote Node ..........................................................3-21
When Does Dial VPN Tear Down the Tunnel? .......................................................3-23
Chapter 4
Configuring the Remote Access Concentrator
Installing and Configuring the RAC Software .................................................................4-1
Loading Software and Booting the RAC .........................................................................4-6
Configuring Active RIP ...................................................................................................4-7
Defining Routes ........................................................................................................4-7
Configuring the RAC to Advertise RIP 1 and/or RIP 2 Updates ...............................4-8
Chapter 5
Configuring TMS and Security for
erpcd
Networks
Managing TMS Using the TMS Default Database ..........................................................5-2
Using Tunnel Management Commands ..........................................................................5-4
Tunnel Management Commands ....................................................................................5-4
Command Arguments .....................................................................................................5-6
Configuring Local Authentication Using the ACP .........................................................5-12
Alternatives to the Default Database ............................................................................5-13
TMS System Log (Syslog) Messages ..........................................................................5-13
Chapter 6
Configuring the TMS Using RADIUS
Managing RADIUS-Based TMS .....................................................................................6-1
Tunnel Negotiation Message Sequence .........................................................................6-2
Using RADIUS Accounting .............................................................................................6-4
Service Provider Accounting Messages ..................................................................6-4
RADIUS Attributes That Support Tunneling ....................................................................6-7
RADIUS Attributes for Backup and Distributed Gateways ..............................................6-9
Configuring Secondary Gateways ................................................................................6-12
Vista de pagina 6
1 2 3 4 5 6 7 8 9 10 11 12 ... 205 206

Comentarios a estos manuales

Sin comentarios