Configuring an IKE VPN

Select 3DES to divide VPN traffic into 64 bit blocks and encrypt each block three times with three different keys.

12.Use the Authentication Algorithm list to select a specific type of algorithm that each security gateway must use to authenticate each other.

Select Any if you want the security gateways to automatically negotiate which algorithm to use.

Select MD5 if you want each security gateway to authenticate each other using the Message Digest 5 (MD5) hash function.

Select SHA1 if you want each security gateway to authenticate each other using the Secure Hash Algorithm-1(SHA-1).

SHA1 is considered to be a stronger hash function than MD5, and may be required for US Federal applications that do not require a digital signature.

13.From the Lifetime text boxes and lists to configure the time limit for creating and exchanging a new set of unique keys.

14.If the Time-basedvalue expires before the Throughput value, key creation and exchange is performed, and likewise, if Throughput expires before the Time-basedvalue.

15.Click Modify Secret to open the Modify Secret dialog. Create a shared secret for authenticating security gateways and members of the VPN.

To manually create a secret, type in an alphanumeric string in the text box

To automatically create a secret, click Auto-generate.

16.Click OK.

Note:

Modify Secret is only available when creating a VPN based on Preshared Secret.

17.Click the Security (IPSec) tab to bring it to the front.

18.The Security (IPSec) tab is used to set up the desired IPSec protocol information (parameters relating to payload) that the VPNs use.Two sets of options are available. The IPSec options control packet alteration, and the IPSec Proposal options are used to create up to four different proposals for payload encryption and authentication.

19.Use the LZS list for applying compression to packet payloads.

20.According to RFC 2395, “IP Payload Compression using LZS,” experiments have shown that the LZS algorithm compressed a 64-byte file to 85% of its original size, while a 16384-byte file was compressed to 47% of its original size. Whether or not your network benefits from compression, depends on what is typically transported; for example, video and sound traffic are already compressed, so additional compression has little effect and may load the security gateway.

Select Yes to apply compression.

Select No to not apply compression.

21.Use the Perfect Forward Secrecy list to control key creation.

Issue 4 May 2005 153

Page 153
Image 153
Avaya 3.7 manual Configuring an IKE VPN

3.7 specifications

Avaya 3.7 represents a significant evolution in unified communications technology, designed to enhance collaboration and streamline communication workflows for organizations of all sizes. As a cornerstone of Avaya's offerings, this version incorporates a range of features and improvements that cater to contemporary business needs, emphasizing flexibility, reliability, and seamless integration.

One of the most notable features of Avaya 3.7 is its robust call management capabilities. The platform allows users to manage calls effectively through a user-friendly interface, enabling intuitive functionalities such as drag-and-drop call handling, call forwarding, and conference calling. These features help employees stay connected, facilitating better communication and teamwork across departments.

In terms of mobility, Avaya 3.7 supports mobile applications that allow users to access the system remotely. This is particularly advantageous for businesses with a workforce that relies on remote or hybrid work models. The mobile integration ensures users can make and receive calls, check voicemail, and manage their schedules directly from their smartphones, maintaining productivity regardless of location.

The system also embraces advanced collaboration tools, such as video conferencing and instant messaging. These features promote a more dynamic interaction environment, fostering real-time communication among team members. Video conferencing capabilities allow for high-definition video quality and reliable connectivity, making virtual meetings more engaging and effective.

Security is another critical characteristic of Avaya 3.7. The platform includes enhanced encryption protocols to protect sensitive communications and ensure data integrity. With cybersecurity remaining a top concern for businesses, Avaya has prioritized the security of its communications solutions, safeguarding organizations' information against potential threats.

Furthermore, Avaya 3.7 benefits from the incorporation of AI and analytics. These technologies provide businesses with valuable insights into communication patterns and user behavior, enabling them to optimize their processes. The analytics can help identify areas for improvement and drive informed decision-making, thus enhancing overall efficiency.

Interoperability with existing systems is another hallmark of Avaya 3.7. The platform easily integrates with various applications and services, allowing businesses to leverage their current technology investments and create a cohesive communication ecosystem.

In summary, Avaya 3.7 stands out as a comprehensive communication solution that addresses the modern demands of the workplace. With its advanced call management features, mobility support, collaboration tools, strong security measures, and integration capabilities, Avaya 3.7 positions itself as a vital asset for organizations aiming to enhance their communication strategies and drive business success.