Extranet, (continued)

IP Address text boxes . . . . . . . . . . . . . .103 IP Group, configuring an . . . . . . . . . . . . 102 IPSec Proposals, About . . . . . . . . . . . . . 154 support. . . . . . . . . . . . . . . . . . . . . 16 VSU . . . . . . . . . . . . . . . . . . . . . . 99

extranet, creating . . . . . . . . . . . . . . . . . 284

F

Failover TEP

detailed description . . . . . . . . . . . . . . . 218 Failover, reconnect. . . . . . . . . . . . . . . . . 229 failover,connectivity check example . . . . . . . . . 227 FAX support . . . . . . . . . . . . . . . . . . . . 19 Filter Rules, parameters . . . . . . . . 263, 264, 265 FilterStats, parameters . . . . . . . . . . . . . . . 257 Firewall . . . . . . . . . . . . . . . . . . . . . . 196

Policies . . . . . . . . . . . . . . . . . . . . 196 Rules . . . . . . . . . . . . . . . . . . . . . 164

Firewall Policy Management

Firewall Templates . . . . . . . . . . . . . . . 169 firewall templates . . . . . . . . . . . . . . . . . 297 firewall, considerations for NAT . . . . . . . . . . . 167 firewall, setting FTP rules. . . . . . . . . . . . . .167 firmware version, how to find . . . . . . . . . . . . 61 flood attack . . . . . . . . . . . . . . . . . .28, 174 FTP, setting firewall rules for . . . . . . . . . . . . 167

G

General tab

SKIP VPN Objects, for . . . . . . . . . . . . . 150 User Objects, for . . . . . . . . . . . . . . . . 118 VPN Objects, for . . . . . . . . . . . . . . . . 152

groups

private addresses . . . . . . . . . . . . . . . .135

H

Heartbeat Interval . . . . . . . . . . . . . . . . . 215 Heartbeat Retry Limit. . . . . . . . . . . . . . . .215 Help System, online . . . . . . . . . . . . . . . . 17 High Availability . . . . . . . . . . . . . . . . . .221 Creating . . . . . . . . . . . . . . . . . . . .224 Deleting . . . . . . . . . . . . . . . . . . . .225 Enabling . . . . . . . . . . . . . . . . . . . .221 HMAC-MD5 as an IPSec parameter. . . . . . . . . 155 HMAC-SHA as an IPSec parameter . . . . . . . . . 155 Hold Down Time . . . . . . . . . . . . . . . . . . 215 Hold Up Time . . . . . . . . . . . . . . . . . . . 215

Index

I

IKE Certificate Usage

. . .

240

IKE Identifier

. . .

100

IKE identifier (user)

. . .

117

IKE Identifier drop-down list

. . .

103

IKE radio button

. . .

136

IKE VPN

 

 

about

. . .

134

adding IP Group Objects

. . .

152

adding User and User Group Objects . . .

. . .

152

authentication method, configuring the . .

. . .

153

Certificate Based radio button

. . .

152

compression, configuring

. . .

153

configuring

. . .

152

creating a new

. . .

136

Diffie-Hellman Group drop-down list . . .

. . .

154

encryption level, configuring the

. . .

152

IPSec (see IPSec)

 

 

Key Lifetime, configuring

. . .

153

keying algorithm (modulus), configuring the . . . 154

perfect forward secrecy, configuring . . .

. . .

153

Preshared Secret radio button

. . .

152

shared secret, changing the

. . .

153

import configuration

. . .

281

intranet

 

 

support . . . . . . . . . . . . . . . . . . . . . 16

IP (Internet Protocol)

 

 

packet

. . .

134

private addresses

. . .

135

IP addressing, by zone

. . . . 70

IP Group

 

 

About . . . . . . . . . . . . . . . . . . . . . . 97

address/mask pair described . . . . . . . . . . . 97

configuring

. . .

101

creating. . . . . . . . . . . . . . . . . . . . . 97

extranet, how to connect to an

. . .

102

finding which are associated with a VSU .

. . . . 62

IKE Identifier drop-down list

. . .

103

terminal equipment to a VPN, about adding . . . . 97

when to create

. . . . 97

IP Group (definition)

. . . . 97

IP Group (deriving the Group Mask)

. . .

100

IP spoofing

. 28, 174

IP telephone

adding device to security gateway . . . .

. . 74, 75

IP telephone configuration

. . . . 72

ipRouteTable, parameters

. . .

254

IPSec

 

 

headers to packets, adding IPSec . . . .

. . .

154

Proposal

 

 

about

. . .

154

authentication parameters, configuring.

. . .

155

encryption parameters, configuring . .

. . .

154

lifetime options, key

. . .

155

Issue 4 May 2005 321

Page 321
Image 321
Avaya 3.7 manual 254

3.7 specifications

Avaya 3.7 represents a significant evolution in unified communications technology, designed to enhance collaboration and streamline communication workflows for organizations of all sizes. As a cornerstone of Avaya's offerings, this version incorporates a range of features and improvements that cater to contemporary business needs, emphasizing flexibility, reliability, and seamless integration.

One of the most notable features of Avaya 3.7 is its robust call management capabilities. The platform allows users to manage calls effectively through a user-friendly interface, enabling intuitive functionalities such as drag-and-drop call handling, call forwarding, and conference calling. These features help employees stay connected, facilitating better communication and teamwork across departments.

In terms of mobility, Avaya 3.7 supports mobile applications that allow users to access the system remotely. This is particularly advantageous for businesses with a workforce that relies on remote or hybrid work models. The mobile integration ensures users can make and receive calls, check voicemail, and manage their schedules directly from their smartphones, maintaining productivity regardless of location.

The system also embraces advanced collaboration tools, such as video conferencing and instant messaging. These features promote a more dynamic interaction environment, fostering real-time communication among team members. Video conferencing capabilities allow for high-definition video quality and reliable connectivity, making virtual meetings more engaging and effective.

Security is another critical characteristic of Avaya 3.7. The platform includes enhanced encryption protocols to protect sensitive communications and ensure data integrity. With cybersecurity remaining a top concern for businesses, Avaya has prioritized the security of its communications solutions, safeguarding organizations' information against potential threats.

Furthermore, Avaya 3.7 benefits from the incorporation of AI and analytics. These technologies provide businesses with valuable insights into communication patterns and user behavior, enabling them to optimize their processes. The analytics can help identify areas for improvement and drive informed decision-making, thus enhancing overall efficiency.

Interoperability with existing systems is another hallmark of Avaya 3.7. The platform easily integrates with various applications and services, allowing businesses to leverage their current technology investments and create a cohesive communication ecosystem.

In summary, Avaya 3.7 stands out as a comprehensive communication solution that addresses the modern demands of the workplace. With its advanced call management features, mobility support, collaboration tools, strong security measures, and integration capabilities, Avaya 3.7 positions itself as a vital asset for organizations aiming to enhance their communication strategies and drive business success.