Benutzeranleitung / Produktwartung VF 3000 des Produzenten Avaya
Zur Seite of 61
Avaya Solution & Interoperability Test Lab Avaya Hosted IP Telephony R3.0 Solution LSP Configuration with the Juniper VF 3000 SBC – Issue 1.0 Abstract These Application Notes describe the conf i.
TC; Reviewed: PV 04/24/2006 Avaya – Proprietary Use as authorized only pursuant to your signed agreem ent or Avaya polic y. No other discl osure is pe rmitted or a uthorized. 2 of 61 HT3-LSP-VF .doc Table of Contents 1. Introduction ................
TC; Reviewed: PV 04/24/2006 Avaya – Proprietary Use as authorized only pursuant to your signed agreem ent or Avaya polic y. No other discl osure is pe rmitted or a uthorized.
data center edge and at the edge of each enterprise site. Note that the Juniper VF 3000 SBC can provide this NAT function. Figure 1 - Private-Public-Private Architecture Another method for WAN connectivity between the enterprise sites and the data center is via a VPN configuration.
different enterprise customer. The Juniper VF 3000 SBC in the data center can make use of this VLAN information to resolve overlapping IP address issues 1 . The Juniper VF 3000 SBC segregates the access traffic into separate cust om er streams and routes the traffic to the respective Avaya Communication Managers based on the destination IP address.
TC; Reviewed: PV 04/24/2006 Avaya – Proprietary Use as authorized only pursuant to your signed agreem ent or Avaya polic y. No other discl osure is pe rmitted or a uthorized. 6 of 61 HT3-LSP-VF .doc architecture that may occur. This is sim ilar to Figure 1 , except that the data center uses public IP addressing.
Figure 3 - Supporting LSPs in the Private-Public-Private Architecture Figure 4 shows the architecture for a corresponding solution applied to the architecture of Figure 2 . As in Figure 3 , an extra NAT/FW device has been placed at the data center edge.
Figure 4 - Supporting LSPs in th e Private-Private Architecture 3. Configuration Overview This section gives a high-level overview of how to configure en terprise sites and data center networks and how to administer the Avaya Co mmunication Manager servers and LSPs for LSP functionality to work in HIPT R3.
TC; Reviewed: PV 04/24/2006 Avaya – Proprietary Use as authorized only pursuant to your signed agreem ent or Avaya polic y. No other discl osure is pe rmitted or a uthorized.
TC; Reviewed: PV 04/24/2006 Avaya – Proprietary Use as authorized only pursuant to your signed agreem ent or Avaya polic y. No other discl osure is pe rmitted or a uthorized. 10 of 61 HT3-LSP-VF .doc Avaya Communication Manager server administration: • SA8853 Support of LSPs Behind NAT Gr een feature must be installed.
TC; Reviewed: PV 04/24/2006 Avaya – Proprietary Use as authorized only pursuant to your signed agreem ent or Avaya polic y. No other discl osure is pe rmitted or a uthorized. 11 of 61 HT3-LSP-VF .doc 4. Equipment and Softwar e V alidated This application note details one way to set up the LSP solution.
5. A vaya HIPT R3.0 Envir onment The overview of the HIPT R3.0 solution with LSP Support is shown in Figure 5 . Figure 5 – Avaya Hosted IP Telephony Release 3.0 LSP Solution TC; Reviewed: PV 04/24/2006 Avaya – Proprietary Use as authorized only pursuant to your signed agreem ent or Avaya policy .
TC; Reviewed: PV 04/24/2006 Avaya – Proprietary Use as authorized only pursuant to your signed agreem ent or Avaya polic y. No other discl osure is pe rmitted or a uthorized. 13 of 61 HT3-LSP-VF .doc 5.1. Service Provider Data Center The Data Center simulates two custom ers, PC-LAN (Private-Private) and C-LAN (Priva te- Public-Private).
TC; Reviewed: PV 04/24/2006 Avaya – Proprietary Use as authorized only pursuant to your signed agreem ent or Avaya polic y. No other discl osure is pe rmitted or a uthorized. 14 of 61 HT3-LSP-VF .doc Communication Manager in the Data Center is lost.
6. A vaya Hosted IP T elephony Re lease 3.0 LSP Configuration 6.1. PC-LAN Configuration (Private-Private) 6.1.1. Configure Avaya Comm unicati on Manager The following Avaya Communication Manager provi sioning is required to support the LSP Configuration.
6.1.1.2. Configure Avaya Communicati on Manager for LSP Support Step 1 . Use the “ change node-names ip ” command to add the name and IP Address of the LSP Native IP Address and static 1-to-1 NAT LSP IP address configured in the NetScreen-25 Firewall ( Figure 20 ) to the node-names form shown in Figure 7 .
Step 2 . Use the “ change ip-network-region <region number>” comm and to add the LSP Native IP Address to the appropriate Network Region shown in Figure 8 .
TC; Reviewed: PV 04/24/2006 Avaya – Proprietary Use as authorized only pursuant to your signed agreem ent or Avaya polic y. No other discl osure is pe rmitted or a uthorized.
Figure 10 - LSP Configuration Web Page 7. Select “ This is a local survivable pr ocesso r with a Blade server as the primary controller ”. This option was selected for the Avaya SBS3000 shared blade server.
6.1.3. Configuring the Juniper NetScreen-25 Fir ewall This Section assumes that Juniper NetScreen-25 Firewall basic provisio ning has been performed. Refer to [1] for more information. Step 1 . From a PC, connect to the Juniper Networks NetScreen-25 Firewall using a web browser, by typing https://<IP_address_NetScreen-25>.
Step 2 . The following WEB Admin screen appears upon successful login as shown in Figure 12 . Figure 12 Note: Virtual Router (trust-vr) has common configuration parame ters for both PC-LAN (VR-A) and G650/C-LAN (VR-B). The configuration for (tru st-vr) settings are covered in this section.
Step 3 . Create a Virtual Router for en terprise site A (VR-A) and Data Center (trust-vr). From the left pane click on Network Æ Routing Æ Virtual Routers . On the right pane, click the New button on the top right hand corner to create a ne w Virtual Router.
Step 4 . Create security zones and assign the zone to the appropriate Virtual Routers. From the left hand panel of the NetScreen-25 Firewall Web adm in screen, click on Network Æ Zo n es . From the right hand pane, click the New button to create a new zone .
Step 5 . Create security zones and assign the zone to the appropriate Virtual Routers. From the left hand panel of the NetScreen-25 Firewall Web adm in screen, click on Network Æ Zo n es . From the right hand pane, click the New button to create a new zone .
Step 6 . Select Network Æ Zo nes in the left pane to view the list of configured zones as shown in Figure 16 . Additional Zones are show n that are not related to this Application Note. Figure 16 TC; Reviewed: PV 04/24/2006 Avaya – Proprietary Use as authorized only pursuant to your signed agreem ent or Avaya policy .
Step 7 . Configure Interface with Mapped IP (MIP). Th e physical interface towa rd enterprise site A is configured using sub-interfaces. The physical interface toward the Data Center does not use sub-interfaces.
Step 8 . Configure Sub-Interface ethernet2.1 MIP for LSP to Avaya Communication Manager Static 1-to-1 NAT. From the NetScr een-25 Firewall Sub-IF screen, select MIP , and click the New button from the right hand window pane. Configure MIP as shown in Figure 18 and click OK .
Step 9 . Configure Interface with Mapped IP (MIP). The physical interface toward the Data Center does not use sub-interfaces. From the Ne tScreen-25 Firewall Web Adm in screen, click on Network Æ Interfaces and then click the New button from the right hand window pane.
Step 10 . Configure Sub-Interface ethernet1 MIP for Avaya Communication Manager to LSP Static 1-to-1 NAT. From the NetScr een-25 Firewall Sub-IF screen, select MIP , and click the New button from the right hand window pane. Configure MIP as shown in Figure 20 and click OK .
Step 11 . Select Network Æ Interfaces in the left pane again to view the list of configured Interfaces shown in Figure 21 . Additional Interfaces are shown that are not related to this Application Note. Figure 21 TC; Reviewed: PV 04/24/2006 Avaya – Proprietary Use as authorized only pursuant to your signed agreem ent or Avaya policy .
Step 12 : In this network environment Static routing is used. The screen capture below is a list of all routes required for end-to-end LSP connectiv ity to Avaya Communication Manager. Select Routing Æ Destination in the left pane to view the list of all routes as shown in Figure 22 .
Step 13 . Policies decide what traffic and protoco ls are permitted from one security zone to another. Policies for specific protocols and a pplications were not c onfigured. Any to MIP policies were configured from one zone to another to verify LSP to Avaya Communication Manager Registration and File Sync.
Step 14 . From the NetScreen-25 Firewall Web Admin screen, select Policies in the left window pane. Create a Policy for permitting traf fic from Trust Zone to VRA-Untrust Zone as shown in Figure 24 .
Step 15 . Select Policies in the left pane to view the list of configured policies as shown in Figure 25 . Figure 25 TC; Reviewed: PV 04/24/2006 Avaya – Proprietary Use as authorized only pursuant to your signed agreem ent or Avaya policy . No other discl osure is pe rmitted or a uthorized.
6.1.4. Configure the Juniper VF 3000 SBC The following section describes how to configur e the Juniper VF 3000 SBC for LSP enterprise sites. Only the Signaling Card (SC) needs to be updated, not the Media Card (MC). In a High Reliability (HA) configurati on, both the master and backup (S C) needs to be updated.
Step 2 . Enter command exit Æ and then show to verify sr-policy configuration as shown in Figure 27 . Figure 27 TC; Reviewed: PV 04/24/2006 Avaya – Proprietary Use as authorized only pursuant to your signed agreem ent or Avaya policy . No other discl osure is pe rmitted or a uthorized.
6.2. G650/C-LAN Configuration (Private-Public-Private) 6.2.1. Configure Avaya Comm unication Manager The following Avaya Communication Manager provi sioning is required to support the LSP Configuration. This provisioning is perform ed vi a the SAT interface.
6.2.1.2. Configure Avaya Communication Manager for LSP Support Step 1 . Use the “ change node-names ip ” command to add the name and IP Address of the LSP Native IP Address and static 1-to-1 NAT LSP IP address configured in the Checkpoint Firewall ( Figure 49 ) to the node-names form shown in Figure 29 .
Step 2 . Use the “ change ip-network-region <region number>” comm and to add the LSP Native IP Address to the appropriate Network Region shown in Figure 30 .
TC; Reviewed: PV 04/24/2006 Avaya – Proprietary Use as authorized only pursuant to your signed agreem ent or Avaya polic y. No other discl osure is pe rmitted or a uthorized.
Figure 32 - LSP Configuration Web Page 7. Select “ This is a local survivable pr ocesso r with a Blade server as the primary controller ”. This option was selected for the Avaya SBS3000 shared blade server.
6.2.3. Configuring the Junip er NetScreen-25 Firewall This Section assumes that Juniper NetScreen-25 Firewall basic provisio ning has been performed. Refer to [1] for more information. Refer to section 6.1.3 for Netscreen-25 Firewall login procedures and for common configuration pa rameters for Virtual Router (trust-vr).
Step 2 . Create security zones and assign the zone to the appropriate Virtual Routers. From the left hand panel of the NetScreen-25 Firewall Web adm in screen, click on Network Æ Zo n es . From the right hand pane, click the New button to create a new zone .
Step 3 . Select Network Æ Zo nes in the left pane to view the list of configured zones as shown in Figure 35 and click OK . Additional Zones are shown that ar e not related to th is Application Note. Figure 35 TC; Reviewed: PV 04/24/2006 Avaya – Proprietary Use as authorized only pursuant to your signed agreem ent or Avaya policy .
Step 4 . Configure Interface with Mapped IP (MIP). Th e physical interface towa rd enterprise site B is configured using sub-interfaces. The physical interface toward the Data Center does not use sub-interfaces.
Step 5 . Configure Sub-Interface ethernet2.3 MIP for LSP to Avaya Communication Manager Static 1-to-1 NAT. From the NetScr een-25 Firewall Sub-IF screen, select MIP , and click the New button from the right hand window pane. Configure MIP as shown in Figure 37 and click OK .
Step 6 . Configure Sub-Interface ethernet2.3 MIP for LSP to C-LAN Static 1-to-1 NAT. From the NetScreen-25 Firewall Sub-IF screen, select MIP , and click the New button from the right hand window pane. Configure MIP as shown in Figure 38 and click OK .
Step 7 . Select Network Æ Interfaces in the left pane again to view the list of configured Interfaces shown in Figure 39 . Additional Interfaces are shown that are not related to this Application Note. Figure 39 TC; Reviewed: PV 04/24/2006 Avaya – Proprietary Use as authorized only pursuant to your signed agreem ent or Avaya policy .
Step 8 . In this network environment St atic routing is used. In the sc reen capture belo w is a list of all routes required for end-to-end LSP connectiv ity to Avaya Communication Manager. Select Routing Æ Destination in the left pane to view the list of all routes shown in Figure 40 .
Step 9 . Policies decide what traffic and protocol s are pe rmitted from one security zon e to another. Policies for specific protocols and a pplications were not c onfigured. Any to MIP policies were configured from one zone to another to verify LSP to Avaya Communication Manager Registration and File Sync.
Step 10 . From the NetScreen-25 Firewall Web Admin screen, select Policies in the left window pane. Create a Policy for perm itting traffic from VRB-Untrust Zone to Trust Zone sho wn in Figure 42.
Step 11 . From the NetScreen-25 Firewall Web Admin screen, select Policies in the left window pane. Create a Policy for permitting traf fic from Trust Zone to VRB-Untrust Zone as shown in Figure 43 and leave all options as default values and click OK .
Step 12 . Select Policies in the left pane to view the list of configured policies as shown in Figure 44 . Figure 44 TC; Reviewed: PV 04/24/2006 Avaya – Proprietary Use as authorized only pursuant to your signed agreem ent or Avaya policy . No other discl osure is pe rmitted or a uthorized.
6.2.4. Configure the Juni per VF 3000 SBC The following section describes how to configur e the Juniper VF 3000 SBC for LSP enterprise sites. Only the Signaling Card (SC) needs to be updated, not the Media Card (MC). In a High Reliability (HA) configurati on, both the master and backup (S C) needs to be updated.
Step 2 . Enter command exit Æ and then show to verify sr-policy configuration as shown in Figure 46 . Figure 46 TC; Reviewed: PV 04/24/2006 Avaya – Proprietary Use as authorized only pursuant to your signed agreem ent or Avaya policy . No other discl osure is pe rmitted or a uthorized.
6.2.5. Enterprise Customer Checkp oint Firewall Configuration The firewall at the enterprise sites must be conf igured to provide static 1-to-1 NAT for LSP to Avaya Communication Manager connec tivity. The following exam ple in Figure 47 is shown for Checkpoint Firewall HIPT-B1 located in enterp rise site B1.
Step 2 . From Checkpoint Smart Dashboard application, Select Network Objects , right click mouse on Networks and select New Networks . At the General tab , add the private Network IP Address as shown in Figure 48 and click OK.
Step 3 . Select the NAT tab , then add a static 1-to-1 NAT . The Translate to IP address is the public WAN IP address and then select HIPT-B1 from the Install on Gateway pull down menu as shown in Figure 49 and click OK .
Step 4 . From Checkpoint Smart Dashboard application, Select Network Objects Æ Group Æ HIPT-B1_eth4 . Add the static 1-to-1 NAT called “HT_B1_LSP_StaticNat” f rom the Not in Group table to the In Group table and click OK as shown in Figure 50.
TC; Reviewed: PV 04/24/2006 Avaya – Proprietary Use as authorized only pursuant to your signed agreem ent or Avaya polic y. No other discl osure is pe rmitted or a uthorized. 60 of 61 HT3-LSP-VF .doc • Verify the Avaya Communication Manager is updating the LSP by running command “ save trans lsp ” from the SAT interface.
TC; Reviewed: PV 04/24/2006 Avaya – Proprietary Use as authorized only pursuant to your signed agreem ent or Avaya polic y. No other discl osure is pe rmitted or a uthorized. 61 of 61 HT3-LSP-VF .doc © 2006 Avaya Inc. All Rights Reserved. Avaya and the Avaya Logo are trademarks of Avay a Inc.
Ein wichtiger Punkt beim Kauf des Geräts Avaya VF 3000 (oder sogar vor seinem Kauf) ist das durchlesen seiner Bedienungsanleitung. Dies sollten wir wegen ein paar einfacher Gründe machen:
Wenn Sie Avaya VF 3000 noch nicht gekauft haben, ist jetzt ein guter Moment, um sich mit den grundliegenden Daten des Produkts bekannt zu machen. Schauen Sie zuerst die ersten Seiten der Anleitung durch, die Sie oben finden. Dort finden Sie die wichtigsten technischen Daten für Avaya VF 3000 - auf diese Weise prüfen Sie, ob das Gerät Ihren Wünschen entspricht. Wenn Sie tiefer in die Benutzeranleitung von Avaya VF 3000 reinschauen, lernen Sie alle zugänglichen Produktfunktionen kennen, sowie erhalten Informationen über die Nutzung. Die Informationen, die Sie über Avaya VF 3000 erhalten, werden Ihnen bestimmt bei der Kaufentscheidung helfen.
Wenn Sie aber schon Avaya VF 3000 besitzen, und noch keine Gelegenheit dazu hatten, die Bedienungsanleitung zu lesen, sollten Sie es aufgrund der oben beschriebenen Gründe machen. Sie erfahren dann, ob Sie die zugänglichen Funktionen richtig genutzt haben, aber auch, ob Sie keine Fehler begangen haben, die den Nutzungszeitraum von Avaya VF 3000 verkürzen könnten.
Jedoch ist die eine der wichtigsten Rollen, die eine Bedienungsanleitung für den Nutzer spielt, die Hilfe bei der Lösung von Problemen mit Avaya VF 3000. Sie finden dort fast immer Troubleshooting, also die am häufigsten auftauchenden Störungen und Mängel bei Avaya VF 3000 gemeinsam mit Hinweisen bezüglich der Arten ihrer Lösung. Sogar wenn es Ihnen nicht gelingen sollte das Problem alleine zu bewältigen, die Anleitung zeigt Ihnen die weitere Vorgehensweise – den Kontakt zur Kundenberatung oder dem naheliegenden Service.