Configuring an IKE VPN

From the Authentication drop-down list, select the type of authentication to use.

None. Packets are not authenticated.

HMAC-MD5. Packets are authenticated using the Hash-based Message Authentication Code (HMAC) coupled with the Message Digest 5 (MD5) hash function.

HMAC-SHA. Packets are authenticated using the Hash-based Message Authentication Code (HMAC) coupled with the Secure Hash Algorithm (SHA). SHA is considered to be a stronger authentication algorithm than MD5.

Any. The security gateways negotiates which encryption method to use.

Use the Lifetime text boxes and lists to control the period for creating and exchanging a new set of unique keys.

If the Time-basedvalue expires before the Throughput value, key creation and exchange is performed, and likewise, if Throughput expires before the Time-basedvalue.

Use the Locate this Proposal options to select where to put your new proposal in the Priority Proposal List. Security gateways always start from the top of the list when making a query.

29.Click the Advanced tab to bring it to the front.

30.Select Apply VPN to clients only if you have created a VPN Object where User and User Group Objects can communicate with IP Group Objects, but IP Group Objects cannot communicate with each other.

Note:

This is an advanced control, used for a rare case. The default setting will apply to most configurations.

31.Select Use aggressive mode for clients if you want to speed-up the time needed for VPNremote Clients to establish a secure connection with the VPN.

32.Select CRL Checking if you want to automatically track certificates that have been revoked by a specific Certificate Authority (CA).

Note:

This control is only available for certificate based VPNs.

33.Tunnel endpoints (VPNRemote Clients and security gateways) that use certificates shown by a Certificate Revocation List (CRL) are denied access to the VPN. To use this feature, you must obtain a CRL from your Certificate Authority then manually install it in the directory server on a periodic basis. See Enabling CRL checking on page 156 for more information.

34.If you use CRL Checking, in the Directory Name of Certificate Authority text box, type in the distinguished name (DN) of the certificateauthority object located in directory server. The object is where the CRL is located.

35.Click Save.

Issue 4 May 2005 155

Page 155
Image 155
Avaya 3.7 manual Configuring an IKE VPN

3.7 specifications

Avaya 3.7 represents a significant evolution in unified communications technology, designed to enhance collaboration and streamline communication workflows for organizations of all sizes. As a cornerstone of Avaya's offerings, this version incorporates a range of features and improvements that cater to contemporary business needs, emphasizing flexibility, reliability, and seamless integration.

One of the most notable features of Avaya 3.7 is its robust call management capabilities. The platform allows users to manage calls effectively through a user-friendly interface, enabling intuitive functionalities such as drag-and-drop call handling, call forwarding, and conference calling. These features help employees stay connected, facilitating better communication and teamwork across departments.

In terms of mobility, Avaya 3.7 supports mobile applications that allow users to access the system remotely. This is particularly advantageous for businesses with a workforce that relies on remote or hybrid work models. The mobile integration ensures users can make and receive calls, check voicemail, and manage their schedules directly from their smartphones, maintaining productivity regardless of location.

The system also embraces advanced collaboration tools, such as video conferencing and instant messaging. These features promote a more dynamic interaction environment, fostering real-time communication among team members. Video conferencing capabilities allow for high-definition video quality and reliable connectivity, making virtual meetings more engaging and effective.

Security is another critical characteristic of Avaya 3.7. The platform includes enhanced encryption protocols to protect sensitive communications and ensure data integrity. With cybersecurity remaining a top concern for businesses, Avaya has prioritized the security of its communications solutions, safeguarding organizations' information against potential threats.

Furthermore, Avaya 3.7 benefits from the incorporation of AI and analytics. These technologies provide businesses with valuable insights into communication patterns and user behavior, enabling them to optimize their processes. The analytics can help identify areas for improvement and drive informed decision-making, thus enhancing overall efficiency.

Interoperability with existing systems is another hallmark of Avaya 3.7. The platform easily integrates with various applications and services, allowing businesses to leverage their current technology investments and create a cohesive communication ecosystem.

In summary, Avaya 3.7 stands out as a comprehensive communication solution that addresses the modern demands of the workplace. With its advanced call management features, mobility support, collaboration tools, strong security measures, and integration capabilities, Avaya 3.7 positions itself as a vital asset for organizations aiming to enhance their communication strategies and drive business success.