Interface configuration......................................................................................................................
422
Unnumbered IP interfaces................................................................................................................
426
Routing sources...............................................................................................................................
429
Routing table configuration...............................................................................................................
430
GRE tunneling..................................................................................................................................
434
DHCP and BOOTP relay..................................................................................................................
444
DHCP server....................................................................................................................................
447
Broadcast relay................................................................................................................................
456
ARP table.........................................................................................................................................
458
Proxy ARP........................................................................................................................................
461
ICMP errors......................................................................................................................................
461
RIP...................................................................................................................................................
462
OSPF................................................................................................................................................
468
Route redistribution..........................................................................................................................
472
VRRP...............................................................................................................................................
474
Fragmentation..................................................................................................................................
477
Chapter 19: IPSec VPN.......................................................................................................
479
IPSec VPN................................................................................................................................................
479
Overview of IPSec VPN configuration..............................................................................................
480
Typical failover applications.............................................................................................................
529
Chapter 20: Policy lists.......................................................................................................
557
Policy lists.................................................................................................................................................
557
Types of policy lists..........................................................................................................................
557
Policy list management....................................................................................................................
560
Policy list configuration.....................................................................................................................
561
Policy list attachments......................................................................................................................
564
Device-wide policy lists....................................................................................................................
567
Defining global rules.........................................................................................................................
567
Policy rule configuration...................................................................................................................
568
Composite operations......................................................................................................................
574
DSCP table.......................................................................................................................................
577
Policy list displays and tests.............................................................................................................
579
Summary of access control list commands......................................................................................
581
Summary of QoS list commands......................................................................................................
583
Chapter 21: Policy-based routing......................................................................................
587
Policy-based routing..................................................................................................................................
587
Applications for policy-based routing................................................................................................
588
Setting up policy-based routing........................................................................................................
589
PBR rules.........................................................................................................................................
592
Next hop lists....................................................................................................................................
594
Editing and deleting PBR lists..........................................................................................................
596
PBR list commands in context..........................................................................................................
597
Policy-based routing application example........................................................................................
598
Summary of policy-based routing commands..................................................................................
601
Chapter 22: Synchronization.............................................................................................
605
Synchronization.........................................................................................................................................
605
Defining a stratum clock source.......................................................................................................
605
10 Administering Avaya G430 Branch Gateway October 2013