Avaya 4600 Series IP Telephones Application Note

Add to My manuals
20 Pages

advertisement

Avaya 4600 Series IP Telephones Application Note | Manualzz

Avaya Solution & Interoperability Test Lab

Application Notes for Configuring the Expand Networks

Accelerator 4820 with Avaya IP Telephony through Avaya

SG203 and SG208 Security Gateways - Issue 1.0

Abstract

These Application Notes describe the steps for configuring the Expand Networks Accelerator

4820 to preserve WAN link bandwidth for H.323 Voice over IP (VoIP) traffic generated by

Avaya IP telephones while offering data compression and acceleration. During compliance testing, H.323 phone calls traversing the WAN link were successfully established and maintained while non-VoIP competing traffic was compressed and queued according to their priority. Information in these Application Notes has been obtained through

DeveloperConnection compliance testing and additional technical discussions. Testing was conducted via the DeveloperConnection Program at the Avaya Solution and Interoperability

Test Lab.

AL; Reviewed:

SPOC 2/21/2006

Solution & Interoperability Test Lab Application Notes

©2006 Avaya Inc. All Rights Reserved.

1 of 20

ExpandAccltor.doc

1. Introduction

These Application Notes describe a compliance-tested solution comprised of Avaya Communication

Managers, Avaya IP Telephones, Avaya Security Gateways and Expand Networks Accelerators.

The Accelerator is a WAN optimization appliance that employs techniques such as compression,

QoS, Bandwidth management, and TCP acceleration to increase capacity, applications performance and throughput, while maintaining proper prioritization for Voice over IP (VoIP) traffic going over

Wide Area Network (WAN) links. Typically placed between the WAN router and LAN, the Expand

Network Accelerator establishes a virtual connection between its peers and manages network traffic flow based on user-defined rules and priorities. The Expand Networks Accelerator can also set aside explicit bandwidth for VoIP traffic within the WAN link capacity to maintain the proper Quality of

Service.

1.1. Configuration

Figure 1 illustrates the configuration used in these Application Notes. The extension numbers beginning with the number 4 are registered with Avaya Communication Manager in the Main Site and extension numbers beginning with the number 5 are registered with Avaya Communication

Manager at the Branch Site. A 768K PPP link simulating a WAN link connects the Main and

Branch Site together while the Avaya Security Gateways provide the VPN tunnel over this link. An

H.323 trunk routes telephone calls between the two Avaya Media Gateways.

AL; Reviewed:

SPOC 2/21/2006

Solution & Interoperability Test Lab Application Notes

©2006 Avaya Inc. All Rights Reserved.

2 of 20

ExpandAccltor.doc

Router fa0/0

172.16.1.62/28

Public int

172.16.1.49/28

Private int

172.16.1.46/28

Avaya SG203

Security Gateway

Cisco 1841

Router

VPN tunnel

Expand Networks

Accelerator 4820

172.16.1.45/28

VLAN 1000

172.16.1.33/28

Avaya S8300 Media Server

50.1.1.10

Avaya G350 Media Gateway

50.1.1.11

P333T-PWR Stackable Switch

With X330W-2DS1 WAN

Access Router Module

VLAN 50 - 50.1.1.0/24

VLAN 51 - 51.1.1.0/24

VLAN 101 - 192.45.101.0/24

Avaya

4602 IP

Ext-40011

Avaya

4620 SW IP

Ext-40012

Avaya

4620 SW IP

Ext-50003

Main Site

Branch Site

768 kbps

PPP

Avaya S8300 Media Server

10.1.1.1

Avaya G700 Media Gateway

10.1.1.2

Cisco 1751V

Router

Router fa0/0

172.16.2.62/28

Public int

172.16.2.49/28

Avaya SG208

Security Gateway

Private int

172.16.2.46/28

VLAN 1000

172.16.2.33/28

Expand Networks

Accelerator 4820

172.16.2.45/28

Avaya

4610 SW IP

Ext-40013

Avaya

4620 SW IP

Ext-50000

Avaya

4620 SW IP

Ext-50001

P333T-PWR Stackable Switch

With X330W-2DS1 WAN

Access Router Module

VLAN 10 - 10.1.1.0/24

VLAN 11 - 11.1.1.0/24

Figure 1: Sample Network Configuration

AL; Reviewed:

SPOC 2/21/2006

Solution & Interoperability Test Lab Application Notes

©2006 Avaya Inc. All Rights Reserved.

3 of 20

ExpandAccltor.doc

2. Equipment and Software Validated

The following equipment and software/firmware were used for the sample configuration provided:

Equipment

Avaya S8300 Media Server with G350 Avaya Media

Gateway

Software/Firmware

Avaya Communication Manager

3.0 (R0.13x.00.0.346.0)

Avaya S8300 Media Server with G700 Avaya Media

Gateway

Avaya P333T-PWR Stackable Switch with a

X330W-2DS1 WAN Access Router Module

Avaya Communication Manager

3.0 (R0.13x.00.0.346.0)

3.12.1

Avaya SG203 Security Gateway

Avaya SG208 Security Gateway

Avaya 46xxSW IP Telephones (H.323)

Expand Networks Accelerator 4820

Cisco 1751V Router

Cisco 1841 Router

4.6.22

4.6.22

1.8.2 (4602SW)

2.2.3 (4610SW/4620SW)

5.0(7) Build 1.45

12.3(13a)

12.3(8)T6

3. Avaya Communication Manager

This section highlights the important areas in Avaya Communication Manager that need to be

configured. For complete documentation, see references [1] and [2]. Use the System Access

Terminal (SAT) interface to perform these steps. Log in with the appropriate credentials.

3.1. IP Network region

Use the change ip-network-region command for the network region the telephone is configured for to display IP Network Region information. Note the UDP Port Min and UDP Port Max value as well as the settings for Call Control PHB Value and Audio PHB Value (DiffServ/TOS parameters). These values will be needed later when configuring the Expand Networks

Accelerators. change ip-network-region 1 Page 1 of 19

IP NETWORK REGION

Region: 1

Location: 1 Authoritative Domain: devcon.com

MEDIA PARAMETERS Intra-region IP-IP Direct Audio: yes

Codec Set: 1 Inter-region IP-IP Direct Audio: yes

UDP Port Min: 2048 IP Audio Hairpinning? y

UDP Port Max: 3027

DIFFSERV/TOS PARAMETERS RTCP Reporting Enabled? y

Call Control PHB Value: 34 RTCP MONITOR SERVER PARAMETERS

Audio PHB Value: 46 Use Default Server Parameters? y

Video PHB Value: 26

802.1P/Q PARAMETERS

Call Control 802.1p Priority: 6

Audio 802.1p Priority: 6

Video 802.1p Priority: 5 AUDIO RESOURCE RESERVATION PARAMETERS

H.323 IP ENDPOINTS RSVP Enabled? n

H.323 Link Bounce Recovery? y

Idle Traffic Interval (sec): 20

Keep-Alive Interval (sec): 5

Keep-Alive Count: 5

AL; Reviewed:

SPOC 2/21/2006

Solution & Interoperability Test Lab Application Notes

©2006 Avaya Inc. All Rights Reserved.

4 of 20

ExpandAccltor.doc

3.2. Avaya SG203 and SG208 Security Gateway

The Avaya SG203 and SG208 Security Gateways were used to establish a VPN tunnel between the

Main and Branch sites. The following steps outline the configuration for the interfaces of the Avaya

Security Gateways and the VPN tunnel. Refer to [3] for additional information on configuring

Avaya SG203 and SG208 Security Gateways.

The steps in this section depict screen displays for the Avaya Security Gateway at the Main Site.

These steps need to be repeated for the Avaya Security Gateway at the Branch Site.

Step Description

1. Enter the URL https://IP address of the Avaya Security Gateway to access the Avaya

Security Gateway. The following screen will be displayed after successful log in. Click on Configure on the left and highlight ethernet0, and click on Modify to bring up the

Media Interface Configuration screen.

AL; Reviewed:

SPOC 2/21/2006

Solution & Interoperability Test Lab Application Notes

©2006 Avaya Inc. All Rights Reserved.

5 of 20

ExpandAccltor.doc

Step Description

2. At the Media Interface Configuration screen for ethernet0, enter the appropriate IP address information and zone configuration. The sample network uses ethernet0 as the private side of the Security Gateway. Click Save to continue.

AL; Reviewed:

SPOC 2/21/2006

Solution & Interoperability Test Lab Application Notes

©2006 Avaya Inc. All Rights Reserved.

6 of 20

ExpandAccltor.doc

Step Description

3. Repeats Step 2, except now highlight the ethernet1 interface and click Modify to display the Media Interface Configuration screen for ethernet1.

At the Media Interface Configuration screen for ethernet1, enter the appropriate IP address information and zone configuration. The sample network uses ethernet1 as the public side of the Security Gateway. The Route is the IP address of the router. Click

Save to continue.

AL; Reviewed:

SPOC 2/21/2006

Solution & Interoperability Test Lab Application Notes

©2006 Avaya Inc. All Rights Reserved.

7 of 20

ExpandAccltor.doc

Step Description

4. At the Avaya Security Gateway main menu, select Routing under Properties and click on Add to add a static route entry.

AL; Reviewed:

SPOC 2/21/2006

Solution & Interoperability Test Lab Application Notes

©2006 Avaya Inc. All Rights Reserved.

8 of 20

ExpandAccltor.doc

Step Description

5. At the Modify Static Route display, enter the appropriate Next Hop IP address for the local IP Networks. For the Main Site, the Next hop IP address to reach the three local IP

Networks (192.45.101.0/24, 50.1.1.0/24, and 51.1.1.0/24) is 172.16.1.33. Enter the IP

Address information and click Add after each entry. Click OK after all the IP networks have been entered.

AL; Reviewed:

SPOC 2/21/2006

Solution & Interoperability Test Lab Application Notes

©2006 Avaya Inc. All Rights Reserved.

9 of 20

ExpandAccltor.doc

Step Description

6. The next step is to configure the VPN tunnel between the two sites. Select Configure on the left and the Security tab. Highlight VPN Setup and click Add to begin configuration.

AL; Reviewed:

SPOC 2/21/2006

Solution & Interoperability Test Lab Application Notes

©2006 Avaya Inc. All Rights Reserved.

10 of 20

ExpandAccltor.doc

Step Description

7. At the Modify VPN screen display, enter the following information and click Next to continue.

VPN Name A user-friendly name to identify the VPN connection.

Preshared Secret An alphanumeric string used to establish the tunnel between the two Avaya Security Gateways. This same string needs to be entered on both Avaya Security Gateways. This string can be entered in either ASCII or Hexadecimal.

Local IP Address All local IP Networks that need to be routed through the VPN tunnel. This includes the IP subnetwork that the Expand

Networks Accelerator is in. For the sample network, it is

172.16.1.32 with a 255.255.255.240 mask. Click Add after entering each IP Network.

AL; Reviewed:

SPOC 2/21/2006

Solution & Interoperability Test Lab Application Notes

©2006 Avaya Inc. All Rights Reserved.

11 of 20

ExpandAccltor.doc

Step Description

8. In the next Modify VPN screen, enter the following information. After completing, click

Next to continue.

Zone public

Remote TEP IP This is the Public Interface of the Avaya Security Gateway at the other end that will be terminating the VPN connection. Click

IP Group(s)

Add after entering the Remote TEP IP address.

All local IP Networks that are at the other end of the VPN tunnel.

This includes the IP subnet network that the Expand Networks

Accelerator is in. For the sample network, it is 172.16.2.32 with a

255.255.255.240 mask. Click Add after entering each IP network.

AL; Reviewed:

SPOC 2/21/2006

Solution & Interoperability Test Lab Application Notes

©2006 Avaya Inc. All Rights Reserved.

12 of 20

ExpandAccltor.doc

Step Description

9. Leave everything as default (blank) and click Next to continue.

AL; Reviewed:

SPOC 2/21/2006

Solution & Interoperability Test Lab Application Notes

©2006 Avaya Inc. All Rights Reserved.

13 of 20

ExpandAccltor.doc

Step Description

10. The last step in configuring the VPN tunnel is to select the encryption and authentication algorithm. In the sample configuration, everything is left to the default value except compression. Compression is set to NONE. Expand Networks Accelerators will be performing all the compression and bandwidth management. Click Finish to complete the VPN configuration.

11. Repeat Steps 1 to 10 for the Avaya Security Gateway at the Branch Site.

AL; Reviewed:

SPOC 2/21/2006

Solution & Interoperability Test Lab Application Notes

©2006 Avaya Inc. All Rights Reserved.

14 of 20

ExpandAccltor.doc

4. Expand Networks Accelerator

Configuration can be accomplished through either a Command Line Interface (CLI) or a Web

Browser. The sample configuration uses the CLI. The following steps describe the configuration for the Expand Networks Accelerator located in the Main Site. Repeat all steps in this section for

Accelerator located in the Branch Site, and ensure proper IP address information is used.

Step Description

1. Enter the IP address information into the Expand Networks Accelerator using the keypad on the front of the unit. Using the up/down/left/right arrow keys to maneuver and change the digit in the LCD display and press the ENTER key accept the value. The sample configuration uses the following information for the Accelerator at the Main Site.

IP Address 172.16.1.45

Mask 255.255.255.240

Default Gateway 172.16.1.46

2. Telnet to the Expand Networks Accelerator IP address and log in using an appropriate user name and password.

AcceleratorOS, Accelerator 4800 Series

Version v5.0(7) (Build1.45)

login:

3. Define a link between the two Accelerators. The destination IP address is 172.16.2.45 with a WAN bandwidth of 768kbps. Enter configuration mode by typing in enable and configure .

Datacenter> en

Datacenter# configure

Datacenter(config)# wan default

Datacenter(WAN)# bandwidth 768

Datacenter(WAN)# !

Datacenter(config)# interface link 1

Datacenter(LINK)# description L-172.16.2.45

Datacenter(LINK)# link destination 172.16.2.45

This will limit the amount of traffic coming out from the Accelerator onto this link to no more than 768kbps.

4. Enter the local IP Networks that need to be connected through the Expand Networks

Accelerator.

Datacenter(config)# subnets

Datacenter(SUBNETS)# network 50.1.1.0 255.255.255.0 advertise metric 1

Datacenter(SUBNETS)# network 51.1.1.0 255.255.255.0 advertise metric 1

Datacenter(SUBNETS)# network 192.45.101.0 255.255.255.0 advertise metric 1

AL; Reviewed:

SPOC 2/21/2006

Solution & Interoperability Test Lab Application Notes

©2006 Avaya Inc. All Rights Reserved.

15 of 20

ExpandAccltor.doc

Step Description

5. Define two policies for the voice traffic, one for the signaling “h323-gatekeeper-stat” and the other for the media “avayavoip” (RTP stream). The UDP port number from

2048 to 3027 was defined in Avaya Communication Manager in Section 3.1. UDP port number 1719 is the default port number used for H.323 trunk signaling between the two

Media Gateways.

Datacenter(config)# application h323-gatekeeper-stat udp 1719

Datacenter(config)# application avayavoip udp from 2048 to 3027

6. Define policy to prioritize the different traffic flow.

Rule 2 was defined for traffic destined to Avaya Communication Manager (IP 10.1.1.1) at the Branch Site. This traffic is mainly for call establishment. It is set with a priority of real-time and a Desired Bandwidth of 25kbps. This 25kbps setting was tested to be adequate based on the number of stations in the sample configuration.

Datacenter(config)# policy-rule 2 global outbound

Datacenter(RULE)# match ip dest 10.1.1.1 255.255.255.255

Datacenter(RULE)# set policy priority real-time

Datacenter(RULE)# set policy rate desired 25

Rule 23 was defined for general VoIP traffic using the DiffServ bits. In Section 3.1,

Signaling and Audio were set to use DiffServ value 34 and 46 respectively in Avaya

Communication Manager. In configuring the Accelerator, these values - 34 and 46 translate to 136 and 184, respectively. See note below for details on how these values are calculated.

Datacenter(config)# policy-rule 23 global outbound

Datacenter(RULE)# match tos bits 136

Datacenter(RULE)# match tos bits 184

Datacenter(RULE)# set policy priority real-time

Datacenter(RULE)# set policy rate desired 200

Note: The DiffServ value of 34 in Avaya Communication Manager translates into

100010 in binary, a 6-digit number. The Accelerator calculation is based on an 8-digit number; therefore two additional zeroes must be added to the end before converting the number back to decimal. 100010 becomes 10001000, or the number 136 in decimal.

7. Define a decision to turn off acceleration for RTP traffic. Since G.729 codec already has compression and compression may affect voice quality when using G.711 codec, compression was disabled for all voice media traffic in the sample configuration. By default, the Accelerator compresses all traffic unless compression is explicitly disabled.

Datacenter(config)# decision 1

Datacenter(DECISION)# match application avayavoip

Datacenter(DECISION)# set accelerate disable

AL; Reviewed:

SPOC 2/21/2006

Solution & Interoperability Test Lab Application Notes

©2006 Avaya Inc. All Rights Reserved.

16 of 20

ExpandAccltor.doc

Step Description

8. By default, IPComp compression is enabled and there is no need to configure it. The default configuration is not listed when the “show run” command is entered into the system to list current running configuration.

9. Repeat Steps 1 to 8 for the Expand Network Accelerator in the Branch Site. Ensure the proper IP addresses are entered, as the IP addresses may be different from what is shown above for the Main Site.

5. Interoperability Compliance Testing

The interoperability compliance testing focused on assessing the impact that the Expand Networks

Accelerator has on Avaya VoIP traffic traversing the PPP link connecting the Main and Branch sites simulating a WAN. Compression and TCP acceleration were enabled for competing non-VoIP traffic while bandwidth preservation was enabled for Avaya VoIP traffic on the Accelerators.

5.1. General Test Approach

The general test approach was to verify that the Avaya IP telephones could successfully place and receive calls through the network infrastructure comprised of Avaya SG203 and SG208 Security

Gateway and Expand Networks Accelerators through a VPN tunnel while competing with simulated non-VoIP low priority traffic and compression. Compression and Acceleration was implemented in the Expand Networks Accelerator for all non-voice traffic to maximize throughput over the WAN link.

The main objectives were to verify that:

• Calls between telephones in different sites are successfully completed and maintained with good voice quality.

• Multiple telephones calls between sites can be completed as per the Desired Bandwidth configured in the Accelerator.

• Non-VoIP traffic does not encroach upon the bandwidth reserved for voice applications.

• The solution supports G.711 and G.729 codecs.

• The solution supports DTMF.

• Layer-3 DiffServ information is preserved.

5.2. Test Results

The objectives in Section 5.1 were successfully verified during compliance testing. Multiple telephone calls were successfully placed and received as per bandwidth policies defined by the

Expand Network Accelerators during varying levels of simulated competing traffic. Voice quality was good throughout testing regardless of traffic flow.

AL; Reviewed:

SPOC 2/21/2006

Solution & Interoperability Test Lab Application Notes

©2006 Avaya Inc. All Rights Reserved.

17 of 20

ExpandAccltor.doc

6. Verification Steps

The following steps may be used to verify the configuration:

• Ensure that all the Accelerator interfaces are reachable by using ping.

• Place and receive call from the Avaya IP telephones.

• From the Accelerator, verify the status of the Link.

• From the Accelerator, verify that the Rule is correctly configured using the “debug trafficstatistics policy-rule” command.

• From the Accelerator, verify the Application is configure correctly by using “show application” command.

7. Support

For technical support on the Expand Network Accelerator, contact Expand Networks, Inc. at http://www.expand.com/CustomerSupport/Overview.html

Email: [email protected]

North America 1-877-4-EXPAND (877-439-7263)

International +1-920-490-7337

UK 1800559803

Netherlands 08000233047

France 0800906560

8. Conclusion

These Application Notes have described the administration steps required to configure the Expand

Networks Accelerator to interoperate with and prioritize WAN bandwidth for an Avaya VoIP solution. During compliance testing, H.323 phone calls traversing the WAN link were successfully established and maintained while sharing the link with non-VoIP traffic.

AL; Reviewed:

SPOC 2/21/2006

Solution & Interoperability Test Lab Application Notes

©2006 Avaya Inc. All Rights Reserved.

18 of 20

ExpandAccltor.doc

9. Additional References

[1] Administrator Guide for Avaya Communication Manager, Doc # 03-300509, Issue 1, June 2005

[2] Avaya Communication Manager Advanced Administration Quick Reference, Doc # 03-300364,

Issue 2, June 2005 Release 3.0

[3] Avaya Security Gateway Configuration Guide for VPNos Release 4.6, Doc # 670-100-602, Issue

4, May 2005

[4] Expand Network Accelerator Configuration Guide version 5.7

Product documentation for Avaya products may be found at http://support.avaya.com

Product documentation for Expand Networks products may be found at http://www.expand.com

AL; Reviewed:

SPOC 2/21/2006

Solution & Interoperability Test Lab Application Notes

©2006 Avaya Inc. All Rights Reserved.

19 of 20

ExpandAccltor.doc

© 2006 Avaya Inc. All Rights Reserved.

Avaya and the Avaya Logo are trademarks of Avaya Inc. All trademarks identified by ® and ™ are registered trademarks or trademarks, respectively, of Avaya Inc. All other trademarks are the property of their respective owners. The information provided in these Application Notes is subject to change without notice. The configurations, technical data, and recommendations provided in these Application Notes are believed to be accurate and dependable, but are presented without express or implied warranty. Users are responsible for their application of any products specified in these Application Notes.

Please e-mail any questions or comments pertaining to these Application Notes along with the full title name and filename, located in the lower right corner, directly to the Avaya

DeveloperConnection Program at [email protected].

AL; Reviewed:

SPOC 2/21/2006

Solution & Interoperability Test Lab Application Notes

©2006 Avaya Inc. All Rights Reserved.

20 of 20

ExpandAccltor.doc

advertisement

Related manuals