Design Reference
Table Of Contents
- Contents
- Chapter 1: Introduction
- Chapter 2: New in this release
- Chapter 3: Network design fundamentals
- Chapter 4: Hardware fundamentals and guidelines
- Chapter 5: Optical routing design
- Chapter 6: Platform redundancy
- Chapter 7: Link redundancy
- Chapter 8: Layer 2 loop prevention
- Chapter 9: Layer 2 switch clustering and SMLT
- Chapter 10: Layer 3 switch clustering and RSMLT
- Chapter 11: Layer 3 switch clustering and multicast SMLT
- Chapter 12: Spanning tree
- Chapter 13: Layer 3 network design
- Chapter 14: SPBM design guidelines
- Chapter 15: IP multicast network design
- Multicast and VRF-Lite
- Multicast and MultiLink Trunking considerations
- Multicast scalability design rules
- IP multicast address range restrictions
- Multicast MAC address mapping considerations
- Dynamic multicast configuration changes
- IGMPv3 backward compatibility
- IGMP Layer 2 Querier
- TTL in IP multicast packets
- Multicast MAC filtering
- Guidelines for multicast access policies
- Split-subnet and multicast
- Protocol Independent Multicast-Sparse Mode guidelines
- Protocol Independent Multicast-Source Specific Multicast guidelines
- Multicast for multimedia
- Chapter 16: System and network stability and security
- Chapter 17: QoS design guidelines
- Chapter 18: Layer 1, 2, and 3 design examples
- Glossary
not only static TCP and UDP ports, like Telnet or HTTP, but also applications that create and use
dynamic ports, such as FTP, and audio and video streaming. For every packet, the state-aware
firewall finds a matching flow and conversation.
The following figure shows a typical configuration used in firewall load balancing.
Figure 79: Firewall load balancing configuration
Use this configuration to redirect incoming and outgoing traffic to a group of firewalls and to
automatically load balance across multiple firewalls. The benefits of such a configuration are:
• Increased firewall performance
• Reduced response time
• Redundant firewalls ensure Internet access
Virtual private networks (VPN) replace the physical connection between the remote client and
access server with an encrypted tunnel over a public network. VPN technology employs IP security
(IPsec) and the Secure Sockets Layer (SSL) services.
Several Avaya products support IPsec and SSL, including Avaya VPN Gateway and Secure Router.
Additional information
The following organizations provide the most up-to-date information about network security attacks
and recommendations about good practices:
• The Center of Internet Security Expertise (CERT)
• The Research and Education Organization for Network Administrators and Security
Professionals (SANS)
• The Computer Security Institute (CSI)
System and network stability and security
160 Network Design Reference for Avaya VSP 4000 Series June 2015
Comments on this document? infodev@avaya.com










