Semi-private zone firewall templates

Table 37: Semi-private high security firewall rules (continued)

Rule Name

 

Action

Source

Destination

Service

 

Direc

Zone

Keep

 

Keep State

 

 

 

 

 

 

 

 

 

 

 

 

 

tion

 

State

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

OutBoundS

 

Permit

SemiPriv

Any

 

IKE_OUT

 

Out

SemiP

No

 

 

Permit outgoing

emiPrivate

 

 

 

ateIP

 

 

IPSEC_NAT_T_OUT

 

 

rivate

 

 

 

 

VPN traffic.

VPNAcces

 

 

 

PublicIP

 

 

AH

 

 

 

 

 

 

 

 

 

 

 

 

s

 

 

 

 

 

 

 

ESP

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

ICMPDestUnreach

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

OutBoundS

 

Permit

Any

Any

 

Any

 

 

 

Out

SemiP

Yes

 

 

Permit everything

emiPrivate

 

 

 

 

 

 

 

 

 

 

 

 

rivate

 

 

 

 

with Keep state.

PermitAll

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

(For any traffic

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

initiated from

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Private/

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

ManagementNET)

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

2 of 2

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Table 38: Semi-private medium security firewall rules

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Rule Name

 

Action

 

Source

Destination

Service

 

Direction

Zone

 

 

Keep

 

Description

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

State

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

InBoundSe

 

Deny

 

Any

 

Manageme

Any

 

In

SemiPrivat

 

No

 

Traffic to

 

 

miPrivateD

 

 

 

 

 

ntNet

 

 

 

 

e

 

 

 

 

 

Manageme

 

 

enyAccess

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

ntNet is

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

denied.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

InBoundSe

 

Permit

 

Any

 

SemiPrivat

IKE_IN

 

In

SemiPrivat

 

no

 

Permit

 

 

miPrivateV

 

 

 

 

 

eIP

IPSEC_NA

 

 

 

e

 

 

 

 

 

incoming

 

 

PNAccess

 

 

 

 

 

PublicIP

T_T_IN

 

 

 

 

 

 

 

 

 

VPN traffic

 

 

 

 

 

 

 

 

 

 

 

AH/ESP

 

 

 

 

 

 

 

 

 

and ICMP

 

 

 

 

 

 

 

 

 

 

 

ICMPDest

 

 

 

 

 

 

 

 

 

unreachabl

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

e packet

 

 

 

 

 

 

 

 

 

 

 

Unreach

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

InBoundSe

 

Permit

 

Any

 

Any

Any

 

In

SemiPrivat

 

Yes

 

Permit WI/

 

 

miPrivateP

 

 

 

 

 

 

 

 

 

 

 

e

 

 

 

 

 

VMGR and

 

 

ermitAll

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

VPN, clear

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

traffic to

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

PUBLIC

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

OutBound

 

Deny

 

DMZNet

Any

Any

 

Out

SemiPrivat

 

No

 

Deny

 

 

SemiPrivat

 

 

 

 

 

 

 

 

 

 

 

e

 

 

 

 

 

traffic from

 

 

eDenyAcc

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

DMZNet

 

 

ess

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

OutBound

 

Permit

 

SemiPrivat

Any

IKE_OUT

 

Out

SemiPrivat

 

no

 

Permit

 

 

SemiPrivat

 

 

 

eIP

 

 

 

IPSEC_NA

 

 

 

e

 

 

 

 

 

outgoing

 

 

eVPNAcce

 

 

 

PublicIP

 

 

T_T_OUT

 

 

 

 

 

 

 

 

 

VPN traffic

 

 

ss

 

 

 

 

 

 

 

AH/ESP

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

ICMPDest

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Unreach

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

OutBound

 

Permit

 

Any

 

Any

Any

 

Out

SemiPrivat

 

Yes

 

Permit

 

 

SemiPrivat

 

 

 

 

 

 

 

 

 

 

 

e

 

 

 

 

 

incoming

 

 

eDenyAll

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

VPN

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Issue 4 May 2005 307

Page 307
Image 307
Avaya 3.7 manual Semi-private medium security firewall rules

3.7 specifications

Avaya 3.7 represents a significant evolution in unified communications technology, designed to enhance collaboration and streamline communication workflows for organizations of all sizes. As a cornerstone of Avaya's offerings, this version incorporates a range of features and improvements that cater to contemporary business needs, emphasizing flexibility, reliability, and seamless integration.

One of the most notable features of Avaya 3.7 is its robust call management capabilities. The platform allows users to manage calls effectively through a user-friendly interface, enabling intuitive functionalities such as drag-and-drop call handling, call forwarding, and conference calling. These features help employees stay connected, facilitating better communication and teamwork across departments.

In terms of mobility, Avaya 3.7 supports mobile applications that allow users to access the system remotely. This is particularly advantageous for businesses with a workforce that relies on remote or hybrid work models. The mobile integration ensures users can make and receive calls, check voicemail, and manage their schedules directly from their smartphones, maintaining productivity regardless of location.

The system also embraces advanced collaboration tools, such as video conferencing and instant messaging. These features promote a more dynamic interaction environment, fostering real-time communication among team members. Video conferencing capabilities allow for high-definition video quality and reliable connectivity, making virtual meetings more engaging and effective.

Security is another critical characteristic of Avaya 3.7. The platform includes enhanced encryption protocols to protect sensitive communications and ensure data integrity. With cybersecurity remaining a top concern for businesses, Avaya has prioritized the security of its communications solutions, safeguarding organizations' information against potential threats.

Furthermore, Avaya 3.7 benefits from the incorporation of AI and analytics. These technologies provide businesses with valuable insights into communication patterns and user behavior, enabling them to optimize their processes. The analytics can help identify areas for improvement and drive informed decision-making, thus enhancing overall efficiency.

Interoperability with existing systems is another hallmark of Avaya 3.7. The platform easily integrates with various applications and services, allowing businesses to leverage their current technology investments and create a cohesive communication ecosystem.

In summary, Avaya 3.7 stands out as a comprehensive communication solution that addresses the modern demands of the workplace. With its advanced call management features, mobility support, collaboration tools, strong security measures, and integration capabilities, Avaya 3.7 positions itself as a vital asset for organizations aiming to enhance their communication strategies and drive business success.