Avaya 4600 Series IP Telephones Application Note
Add to My manuals20 Pages
Avaya 4600 Series IP Telephones are sophisticated business communication devices integrating voice, video, data, and multimedia applications. They can be used to make and receive calls, access voicemail, send and receive emails, participate in video conferences, and much more. These user-friendly and customizable phones feature high-quality audio and an intuitive interface. They also offer advanced capabilities such as presence, instant messaging, and collaboration tools to enhance productivity and teamwork.
advertisement
Avaya Solution & Interoperability Test Lab
Application Notes for Configuring the Expand Networks
Accelerator 4820 with Avaya IP Telephony through Avaya
SG203 and SG208 Security Gateways - Issue 1.0
Abstract
These Application Notes describe the steps for configuring the Expand Networks Accelerator
4820 to preserve WAN link bandwidth for H.323 Voice over IP (VoIP) traffic generated by
Avaya IP telephones while offering data compression and acceleration. During compliance testing, H.323 phone calls traversing the WAN link were successfully established and maintained while non-VoIP competing traffic was compressed and queued according to their priority. Information in these Application Notes has been obtained through
DeveloperConnection compliance testing and additional technical discussions. Testing was conducted via the DeveloperConnection Program at the Avaya Solution and Interoperability
Test Lab.
AL; Reviewed:
SPOC 2/21/2006
Solution & Interoperability Test Lab Application Notes
©2006 Avaya Inc. All Rights Reserved.
1 of 20
ExpandAccltor.doc
1. Introduction
These Application Notes describe a compliance-tested solution comprised of Avaya Communication
Managers, Avaya IP Telephones, Avaya Security Gateways and Expand Networks Accelerators.
The Accelerator is a WAN optimization appliance that employs techniques such as compression,
QoS, Bandwidth management, and TCP acceleration to increase capacity, applications performance and throughput, while maintaining proper prioritization for Voice over IP (VoIP) traffic going over
Wide Area Network (WAN) links. Typically placed between the WAN router and LAN, the Expand
Network Accelerator establishes a virtual connection between its peers and manages network traffic flow based on user-defined rules and priorities. The Expand Networks Accelerator can also set aside explicit bandwidth for VoIP traffic within the WAN link capacity to maintain the proper Quality of
Service.
1.1. Configuration
Figure 1 illustrates the configuration used in these Application Notes. The extension numbers beginning with the number 4 are registered with Avaya Communication Manager in the Main Site and extension numbers beginning with the number 5 are registered with Avaya Communication
Manager at the Branch Site. A 768K PPP link simulating a WAN link connects the Main and
Branch Site together while the Avaya Security Gateways provide the VPN tunnel over this link. An
H.323 trunk routes telephone calls between the two Avaya Media Gateways.
AL; Reviewed:
SPOC 2/21/2006
Solution & Interoperability Test Lab Application Notes
©2006 Avaya Inc. All Rights Reserved.
2 of 20
ExpandAccltor.doc
Router fa0/0
172.16.1.62/28
Public int
172.16.1.49/28
Private int
172.16.1.46/28
Avaya SG203
Security Gateway
Cisco 1841
Router
VPN tunnel
Expand Networks
Accelerator 4820
172.16.1.45/28
VLAN 1000
172.16.1.33/28
Avaya S8300 Media Server
50.1.1.10
Avaya G350 Media Gateway
50.1.1.11
P333T-PWR Stackable Switch
With X330W-2DS1 WAN
Access Router Module
VLAN 50 - 50.1.1.0/24
VLAN 51 - 51.1.1.0/24
VLAN 101 - 192.45.101.0/24
Avaya
4602 IP
Ext-40011
Avaya
4620 SW IP
Ext-40012
Avaya
4620 SW IP
Ext-50003
Main Site
Branch Site
768 kbps
PPP
Avaya S8300 Media Server
10.1.1.1
Avaya G700 Media Gateway
10.1.1.2
Cisco 1751V
Router
Router fa0/0
172.16.2.62/28
Public int
172.16.2.49/28
Avaya SG208
Security Gateway
Private int
172.16.2.46/28
VLAN 1000
172.16.2.33/28
Expand Networks
Accelerator 4820
172.16.2.45/28
Avaya
4610 SW IP
Ext-40013
Avaya
4620 SW IP
Ext-50000
Avaya
4620 SW IP
Ext-50001
P333T-PWR Stackable Switch
With X330W-2DS1 WAN
Access Router Module
VLAN 10 - 10.1.1.0/24
VLAN 11 - 11.1.1.0/24
Figure 1: Sample Network Configuration
AL; Reviewed:
SPOC 2/21/2006
Solution & Interoperability Test Lab Application Notes
©2006 Avaya Inc. All Rights Reserved.
3 of 20
ExpandAccltor.doc
2. Equipment and Software Validated
The following equipment and software/firmware were used for the sample configuration provided:
Equipment
Avaya S8300 Media Server with G350 Avaya Media
Gateway
Software/Firmware
Avaya Communication Manager
3.0 (R0.13x.00.0.346.0)
Avaya S8300 Media Server with G700 Avaya Media
Gateway
Avaya P333T-PWR Stackable Switch with a
X330W-2DS1 WAN Access Router Module
Avaya Communication Manager
3.0 (R0.13x.00.0.346.0)
3.12.1
Avaya SG203 Security Gateway
Avaya SG208 Security Gateway
Avaya 46xxSW IP Telephones (H.323)
Expand Networks Accelerator 4820
Cisco 1751V Router
Cisco 1841 Router
4.6.22
4.6.22
1.8.2 (4602SW)
2.2.3 (4610SW/4620SW)
5.0(7) Build 1.45
12.3(13a)
12.3(8)T6
3. Avaya Communication Manager
This section highlights the important areas in Avaya Communication Manager that need to be
configured. For complete documentation, see references [1] and [2]. Use the System Access
Terminal (SAT) interface to perform these steps. Log in with the appropriate credentials.
3.1. IP Network region
Use the change ip-network-region command for the network region the telephone is configured for to display IP Network Region information. Note the UDP Port Min and UDP Port Max value as well as the settings for Call Control PHB Value and Audio PHB Value (DiffServ/TOS parameters). These values will be needed later when configuring the Expand Networks
Accelerators. change ip-network-region 1 Page 1 of 19
IP NETWORK REGION
Region: 1
Location: 1 Authoritative Domain: devcon.com
MEDIA PARAMETERS Intra-region IP-IP Direct Audio: yes
Codec Set: 1 Inter-region IP-IP Direct Audio: yes
UDP Port Min: 2048 IP Audio Hairpinning? y
UDP Port Max: 3027
DIFFSERV/TOS PARAMETERS RTCP Reporting Enabled? y
Call Control PHB Value: 34 RTCP MONITOR SERVER PARAMETERS
Audio PHB Value: 46 Use Default Server Parameters? y
Video PHB Value: 26
802.1P/Q PARAMETERS
Call Control 802.1p Priority: 6
Audio 802.1p Priority: 6
Video 802.1p Priority: 5 AUDIO RESOURCE RESERVATION PARAMETERS
H.323 IP ENDPOINTS RSVP Enabled? n
H.323 Link Bounce Recovery? y
Idle Traffic Interval (sec): 20
Keep-Alive Interval (sec): 5
Keep-Alive Count: 5
AL; Reviewed:
SPOC 2/21/2006
Solution & Interoperability Test Lab Application Notes
©2006 Avaya Inc. All Rights Reserved.
4 of 20
ExpandAccltor.doc
3.2. Avaya SG203 and SG208 Security Gateway
The Avaya SG203 and SG208 Security Gateways were used to establish a VPN tunnel between the
Main and Branch sites. The following steps outline the configuration for the interfaces of the Avaya
Security Gateways and the VPN tunnel. Refer to [3] for additional information on configuring
Avaya SG203 and SG208 Security Gateways.
The steps in this section depict screen displays for the Avaya Security Gateway at the Main Site.
These steps need to be repeated for the Avaya Security Gateway at the Branch Site.
Step Description
1. Enter the URL https://IP address of the Avaya Security Gateway to access the Avaya
Security Gateway. The following screen will be displayed after successful log in. Click on Configure on the left and highlight ethernet0, and click on Modify to bring up the
Media Interface Configuration screen.
AL; Reviewed:
SPOC 2/21/2006
Solution & Interoperability Test Lab Application Notes
©2006 Avaya Inc. All Rights Reserved.
5 of 20
ExpandAccltor.doc
Step Description
2. At the Media Interface Configuration screen for ethernet0, enter the appropriate IP address information and zone configuration. The sample network uses ethernet0 as the private side of the Security Gateway. Click Save to continue.
AL; Reviewed:
SPOC 2/21/2006
Solution & Interoperability Test Lab Application Notes
©2006 Avaya Inc. All Rights Reserved.
6 of 20
ExpandAccltor.doc
Step Description
3. Repeats Step 2, except now highlight the ethernet1 interface and click Modify to display the Media Interface Configuration screen for ethernet1.
At the Media Interface Configuration screen for ethernet1, enter the appropriate IP address information and zone configuration. The sample network uses ethernet1 as the public side of the Security Gateway. The Route is the IP address of the router. Click
Save to continue.
AL; Reviewed:
SPOC 2/21/2006
Solution & Interoperability Test Lab Application Notes
©2006 Avaya Inc. All Rights Reserved.
7 of 20
ExpandAccltor.doc
Step Description
4. At the Avaya Security Gateway main menu, select Routing under Properties and click on Add to add a static route entry.
AL; Reviewed:
SPOC 2/21/2006
Solution & Interoperability Test Lab Application Notes
©2006 Avaya Inc. All Rights Reserved.
8 of 20
ExpandAccltor.doc
Step Description
5. At the Modify Static Route display, enter the appropriate Next Hop IP address for the local IP Networks. For the Main Site, the Next hop IP address to reach the three local IP
Networks (192.45.101.0/24, 50.1.1.0/24, and 51.1.1.0/24) is 172.16.1.33. Enter the IP
Address information and click Add after each entry. Click OK after all the IP networks have been entered.
AL; Reviewed:
SPOC 2/21/2006
Solution & Interoperability Test Lab Application Notes
©2006 Avaya Inc. All Rights Reserved.
9 of 20
ExpandAccltor.doc
Step Description
6. The next step is to configure the VPN tunnel between the two sites. Select Configure on the left and the Security tab. Highlight VPN Setup and click Add to begin configuration.
AL; Reviewed:
SPOC 2/21/2006
Solution & Interoperability Test Lab Application Notes
©2006 Avaya Inc. All Rights Reserved.
10 of 20
ExpandAccltor.doc
Step Description
7. At the Modify VPN screen display, enter the following information and click Next to continue.
VPN Name A user-friendly name to identify the VPN connection.
Preshared Secret An alphanumeric string used to establish the tunnel between the two Avaya Security Gateways. This same string needs to be entered on both Avaya Security Gateways. This string can be entered in either ASCII or Hexadecimal.
Local IP Address All local IP Networks that need to be routed through the VPN tunnel. This includes the IP subnetwork that the Expand
Networks Accelerator is in. For the sample network, it is
172.16.1.32 with a 255.255.255.240 mask. Click Add after entering each IP Network.
AL; Reviewed:
SPOC 2/21/2006
Solution & Interoperability Test Lab Application Notes
©2006 Avaya Inc. All Rights Reserved.
11 of 20
ExpandAccltor.doc
Step Description
8. In the next Modify VPN screen, enter the following information. After completing, click
Next to continue.
Zone public
Remote TEP IP This is the Public Interface of the Avaya Security Gateway at the other end that will be terminating the VPN connection. Click
IP Group(s)
Add after entering the Remote TEP IP address.
All local IP Networks that are at the other end of the VPN tunnel.
This includes the IP subnet network that the Expand Networks
Accelerator is in. For the sample network, it is 172.16.2.32 with a
255.255.255.240 mask. Click Add after entering each IP network.
AL; Reviewed:
SPOC 2/21/2006
Solution & Interoperability Test Lab Application Notes
©2006 Avaya Inc. All Rights Reserved.
12 of 20
ExpandAccltor.doc
Step Description
9. Leave everything as default (blank) and click Next to continue.
AL; Reviewed:
SPOC 2/21/2006
Solution & Interoperability Test Lab Application Notes
©2006 Avaya Inc. All Rights Reserved.
13 of 20
ExpandAccltor.doc
Step Description
10. The last step in configuring the VPN tunnel is to select the encryption and authentication algorithm. In the sample configuration, everything is left to the default value except compression. Compression is set to NONE. Expand Networks Accelerators will be performing all the compression and bandwidth management. Click Finish to complete the VPN configuration.
11. Repeat Steps 1 to 10 for the Avaya Security Gateway at the Branch Site.
AL; Reviewed:
SPOC 2/21/2006
Solution & Interoperability Test Lab Application Notes
©2006 Avaya Inc. All Rights Reserved.
14 of 20
ExpandAccltor.doc
4. Expand Networks Accelerator
Configuration can be accomplished through either a Command Line Interface (CLI) or a Web
Browser. The sample configuration uses the CLI. The following steps describe the configuration for the Expand Networks Accelerator located in the Main Site. Repeat all steps in this section for
Accelerator located in the Branch Site, and ensure proper IP address information is used.
Step Description
1. Enter the IP address information into the Expand Networks Accelerator using the keypad on the front of the unit. Using the up/down/left/right arrow keys to maneuver and change the digit in the LCD display and press the ENTER key accept the value. The sample configuration uses the following information for the Accelerator at the Main Site.
IP Address 172.16.1.45
Mask 255.255.255.240
Default Gateway 172.16.1.46
2. Telnet to the Expand Networks Accelerator IP address and log in using an appropriate user name and password.
AcceleratorOS, Accelerator 4800 Series
Version v5.0(7) (Build1.45)
login:
3. Define a link between the two Accelerators. The destination IP address is 172.16.2.45 with a WAN bandwidth of 768kbps. Enter configuration mode by typing in enable and configure .
Datacenter> en
Datacenter# configure
Datacenter(config)# wan default
Datacenter(WAN)# bandwidth 768
Datacenter(WAN)# !
Datacenter(config)# interface link 1
Datacenter(LINK)# description L-172.16.2.45
Datacenter(LINK)# link destination 172.16.2.45
This will limit the amount of traffic coming out from the Accelerator onto this link to no more than 768kbps.
4. Enter the local IP Networks that need to be connected through the Expand Networks
Accelerator.
Datacenter(config)# subnets
Datacenter(SUBNETS)# network 50.1.1.0 255.255.255.0 advertise metric 1
Datacenter(SUBNETS)# network 51.1.1.0 255.255.255.0 advertise metric 1
Datacenter(SUBNETS)# network 192.45.101.0 255.255.255.0 advertise metric 1
AL; Reviewed:
SPOC 2/21/2006
Solution & Interoperability Test Lab Application Notes
©2006 Avaya Inc. All Rights Reserved.
15 of 20
ExpandAccltor.doc
Step Description
5. Define two policies for the voice traffic, one for the signaling “h323-gatekeeper-stat” and the other for the media “avayavoip” (RTP stream). The UDP port number from
2048 to 3027 was defined in Avaya Communication Manager in Section 3.1. UDP port number 1719 is the default port number used for H.323 trunk signaling between the two
Media Gateways.
Datacenter(config)# application h323-gatekeeper-stat udp 1719
Datacenter(config)# application avayavoip udp from 2048 to 3027
6. Define policy to prioritize the different traffic flow.
Rule 2 was defined for traffic destined to Avaya Communication Manager (IP 10.1.1.1) at the Branch Site. This traffic is mainly for call establishment. It is set with a priority of real-time and a Desired Bandwidth of 25kbps. This 25kbps setting was tested to be adequate based on the number of stations in the sample configuration.
Datacenter(config)# policy-rule 2 global outbound
Datacenter(RULE)# match ip dest 10.1.1.1 255.255.255.255
Datacenter(RULE)# set policy priority real-time
Datacenter(RULE)# set policy rate desired 25
Rule 23 was defined for general VoIP traffic using the DiffServ bits. In Section 3.1,
Signaling and Audio were set to use DiffServ value 34 and 46 respectively in Avaya
Communication Manager. In configuring the Accelerator, these values - 34 and 46 translate to 136 and 184, respectively. See note below for details on how these values are calculated.
Datacenter(config)# policy-rule 23 global outbound
Datacenter(RULE)# match tos bits 136
Datacenter(RULE)# match tos bits 184
Datacenter(RULE)# set policy priority real-time
Datacenter(RULE)# set policy rate desired 200
Note: The DiffServ value of 34 in Avaya Communication Manager translates into
100010 in binary, a 6-digit number. The Accelerator calculation is based on an 8-digit number; therefore two additional zeroes must be added to the end before converting the number back to decimal. 100010 becomes 10001000, or the number 136 in decimal.
7. Define a decision to turn off acceleration for RTP traffic. Since G.729 codec already has compression and compression may affect voice quality when using G.711 codec, compression was disabled for all voice media traffic in the sample configuration. By default, the Accelerator compresses all traffic unless compression is explicitly disabled.
Datacenter(config)# decision 1
Datacenter(DECISION)# match application avayavoip
Datacenter(DECISION)# set accelerate disable
AL; Reviewed:
SPOC 2/21/2006
Solution & Interoperability Test Lab Application Notes
©2006 Avaya Inc. All Rights Reserved.
16 of 20
ExpandAccltor.doc
Step Description
8. By default, IPComp compression is enabled and there is no need to configure it. The default configuration is not listed when the “show run” command is entered into the system to list current running configuration.
9. Repeat Steps 1 to 8 for the Expand Network Accelerator in the Branch Site. Ensure the proper IP addresses are entered, as the IP addresses may be different from what is shown above for the Main Site.
5. Interoperability Compliance Testing
The interoperability compliance testing focused on assessing the impact that the Expand Networks
Accelerator has on Avaya VoIP traffic traversing the PPP link connecting the Main and Branch sites simulating a WAN. Compression and TCP acceleration were enabled for competing non-VoIP traffic while bandwidth preservation was enabled for Avaya VoIP traffic on the Accelerators.
5.1. General Test Approach
The general test approach was to verify that the Avaya IP telephones could successfully place and receive calls through the network infrastructure comprised of Avaya SG203 and SG208 Security
Gateway and Expand Networks Accelerators through a VPN tunnel while competing with simulated non-VoIP low priority traffic and compression. Compression and Acceleration was implemented in the Expand Networks Accelerator for all non-voice traffic to maximize throughput over the WAN link.
The main objectives were to verify that:
• Calls between telephones in different sites are successfully completed and maintained with good voice quality.
• Multiple telephones calls between sites can be completed as per the Desired Bandwidth configured in the Accelerator.
• Non-VoIP traffic does not encroach upon the bandwidth reserved for voice applications.
• The solution supports G.711 and G.729 codecs.
• The solution supports DTMF.
• Layer-3 DiffServ information is preserved.
5.2. Test Results
The objectives in Section 5.1 were successfully verified during compliance testing. Multiple telephone calls were successfully placed and received as per bandwidth policies defined by the
Expand Network Accelerators during varying levels of simulated competing traffic. Voice quality was good throughout testing regardless of traffic flow.
AL; Reviewed:
SPOC 2/21/2006
Solution & Interoperability Test Lab Application Notes
©2006 Avaya Inc. All Rights Reserved.
17 of 20
ExpandAccltor.doc
6. Verification Steps
The following steps may be used to verify the configuration:
• Ensure that all the Accelerator interfaces are reachable by using ping.
• Place and receive call from the Avaya IP telephones.
• From the Accelerator, verify the status of the Link.
• From the Accelerator, verify that the Rule is correctly configured using the “debug trafficstatistics policy-rule” command.
• From the Accelerator, verify the Application is configure correctly by using “show application” command.
7. Support
For technical support on the Expand Network Accelerator, contact Expand Networks, Inc. at http://www.expand.com/CustomerSupport/Overview.html
Email: [email protected]
North America 1-877-4-EXPAND (877-439-7263)
International +1-920-490-7337
UK 1800559803
Netherlands 08000233047
France 0800906560
8. Conclusion
These Application Notes have described the administration steps required to configure the Expand
Networks Accelerator to interoperate with and prioritize WAN bandwidth for an Avaya VoIP solution. During compliance testing, H.323 phone calls traversing the WAN link were successfully established and maintained while sharing the link with non-VoIP traffic.
AL; Reviewed:
SPOC 2/21/2006
Solution & Interoperability Test Lab Application Notes
©2006 Avaya Inc. All Rights Reserved.
18 of 20
ExpandAccltor.doc
9. Additional References
[1] Administrator Guide for Avaya Communication Manager, Doc # 03-300509, Issue 1, June 2005
[2] Avaya Communication Manager Advanced Administration Quick Reference, Doc # 03-300364,
Issue 2, June 2005 Release 3.0
[3] Avaya Security Gateway Configuration Guide for VPNos Release 4.6, Doc # 670-100-602, Issue
4, May 2005
[4] Expand Network Accelerator Configuration Guide version 5.7
Product documentation for Avaya products may be found at http://support.avaya.com
Product documentation for Expand Networks products may be found at http://www.expand.com
AL; Reviewed:
SPOC 2/21/2006
Solution & Interoperability Test Lab Application Notes
©2006 Avaya Inc. All Rights Reserved.
19 of 20
ExpandAccltor.doc
© 2006 Avaya Inc. All Rights Reserved.
Avaya and the Avaya Logo are trademarks of Avaya Inc. All trademarks identified by ® and ™ are registered trademarks or trademarks, respectively, of Avaya Inc. All other trademarks are the property of their respective owners. The information provided in these Application Notes is subject to change without notice. The configurations, technical data, and recommendations provided in these Application Notes are believed to be accurate and dependable, but are presented without express or implied warranty. Users are responsible for their application of any products specified in these Application Notes.
Please e-mail any questions or comments pertaining to these Application Notes along with the full title name and filename, located in the lower right corner, directly to the Avaya
DeveloperConnection Program at [email protected].
AL; Reviewed:
SPOC 2/21/2006
Solution & Interoperability Test Lab Application Notes
©2006 Avaya Inc. All Rights Reserved.
20 of 20
ExpandAccltor.doc
advertisement
Related manuals
advertisement
Table of contents
- 2 Introduction
- 2 Configuration
- 4 Equipment and Software Validated
- 4 Avaya Communication Manager
- 4 IP Network region
- 5 Avaya SG203 and SG208 Security Gateway
- 15 Expand Networks Accelerator
- 17 Interoperability Compliance Testing
- 17 General Test Approach
- 17 Test Results
- 18 Verification Steps
- 18 Support
- 18 Conclusion
- 19 Additional References