Order T1 Lines

Authorized Avaya Business Partner


 

Special
Internet Marketing Services

VoiceMail Pro Home




Phone Manager Index



IP Office Licenses


Phone Locale Settings

Phone System Quote


IP Office Tek Tips






 

Routing Information Protocol (RIP)

RIP is a distance vector protocol that allows routers to determine the shortest route to a destination network. It does this by measuring the number of intermediary routers that need to be traversed to reach the destination network. If more that one route exists to the same destination the shortest route is used. If a fault occurs on the shortest route it will be remarked as being infinite and any alternative route will become the new shortest route. This behavior can be used to add resilience into a data network. Where a customer has an existing data network comprising of third party routers, IP Office added to the network can provide back up using its routing and dial-up capability. RIP enabled routers share their knowledge of the network with each other by advertising and listening to routing table changes. IP Office Supports both the RIP I and RIP II standards.

VPN: IPSec Tunneling

IPSec tunnels allow a company to pass data between locations over unsecured IP networks such as the public internet. The company data is secured using 3DES encryption making it unintelligible to other parties that might be 'eaves dropping' on the traffic. Tunneling can be applied to link offices together or provide workers access to the office over the internet. All IP Office systems support up to a total of 256K worth of encrypted traffic to multiple locations. Initially, inter-working is supported only between IP Offices that are connected either directly on a WAN port or via the LAN using a 3rd Party router. IPSec is optional and enabled on IP Office through a License Key.

Note: Check with Avaya for supported scenarios and 3rd party devices.

 

VPN: Layer 2 Tunneling Protocol

PPP authentication using PAP or CHAP takes place between directly connected routers only. When using a public IP Network to connect sites this authentication takes place between the customers router and the service provide router that it is connected to. In some circumstances it is desirable to authenticate between the customer owned routers, jumping over all the intermediary routers of the service provide network. Layer 2 Tunneling Protocol allow this to happen by facilitating a two stage authentication, firstly with the service provider router then the customer router on the remote network.

 

 

 

 

 

1-800-429-0077 ::: Fax 1-732-751-8811
5133 West Hurley Pond Rd., Farmingdale, NJ 07727
info@carrollcommunications.com
Copyright 2008 CarrollCommunications.com, All Rights Reserved.