Avaya IPO R9 SIP TRNK 1 PLDS LIC 273941 Manuel D’Utilisation

Codes de produits
273941
Page de 473
Product Description
IP Office 9.0
© 2014 AVAYA All rights reserved.
Page 317
Issue 27.02.0 (Monday, January 06, 2014)
Routing Information Protocol (RIP)
RIP is a distance vector protocol that allows routers to determine the shortest route to a destination network.
It does this by measuring the number of intermediary routers that need to be traversed to reach the
destination network. If more than one route exists to the same destination the shortest route is used. If a fault
occurs on the shortest route it will be remarked as being infinite and any alternative route will become the new
shortest route. This behavior can be used to add resilience into a data network. Where a customer has an
existing data network comprising of third party routers, IP Office added to the network can provide back up
using its routing and dial-up capability. RIP enabled routers share their knowledge of the network with each
other by advertising and listening to routing table changes. IP Office Supports both the RIP I and RIP II
standards.
VPN: IPSec Tunneling
IPSec tunnels allow a company to pass data between locations over unsecured IP networks such as the public
internet. The company data is secured using 3DES encryption making it unintelligible to other parties that
might be 'eaves dropping' on the traffic. Tunneling can be applied to link offices together or provide workers
access to the office over the internet. All IP Office systems support up to a total of 256K worth of encrypted
traffic to multiple locations. Initially, inter-working is supported only between IP Offices that are connected
either directly on a WAN port or via the LAN using a 3
rd
 Party router. IPSec is optional and enabled on IP Office
through a License Key.
Note: Check with Avaya for supported scenarios and 3
rd
 party devices.
 
VPN: Layer 2 Tunneling Protocol
PPP authentication using PAP or CHAP takes place between directly connected routers only. When using a
public IP Network to connect sites this authentication takes place between the customers router and the
service provide router that it is connected to. In some circumstances it is desirable to authenticate between
the customer owned routers, jumping over all the intermediary routers of the service provider's network.
Layer 2 Tunneling Protocol allow this to happen by facilitating a two stage authentication, firstly with the
service provider router then the customer router on the remote network.