Avaya Solution & Interoperability Test Lab Application Notes for Configuring NetScreen 50, NetScreen 25 and NetScreen-Remote Client Software with Avaya IP Office and Avaya PhoneManager - Issue 1.0 Abstract These Application Notes present a sample configuration for NetScreen 50 and NetScreen 25 security devices, as well as NetScreen-Remote Client working with Avaya IP Office and Avaya PhoneManager in an IPSec VPN environment. The objective of this test is to verify interoperability between Avaya IP Office, Avaya PhoneManager and NetScreen Products. Information in these notes has been obtained through compliance testing and additional technical discussions. Testing was conducted via the DeveloperConnection Program at the Avaya Solution and Interoperability Test Lab. SZ; Reviewed: WCH 4/29/2004 Solution & Interoperability Test Lab Application Notes ©2004 Avaya Inc. All Rights Reserved. 1 of 28 NetScreen-IPO.doc 1. Introduction These Application Notes describe the compliance-tested configuration utilizing NetScreen 25 and 50 security devices working with Avaya IP Office 2.0, as well as NetScreen-Remote client working with Avaya PhoneManager 2.0. The NetScreen 25 and 50 are configured to provide a Site-to-Site IPSec Tunnel between Site A and Site B, and the NetScreen-Remote client is configured to supply a remote IPSec tunnel between a PhoneManager on Site C and the NetScreen 25 on Site A. Static and Port NAT will also be tested in a site-to-site tunnel environment. The administration for Avaya P333T-PWR is not covered in these Application Notes. Figure 1 displays the network configuration used for verification. NetScreen-50 Site B IPSec tunnels Avaya 4620 IP Telephone Avaya P333T-PWR Avaya 6408 Digital Telephone Avaya P333T-PWR Avaya IP Office 403 Avaya P333R Stackable Switch PhoneManager Avaya 4620 IP Telephone PhoneManager Site A Avaya IP Office 412 NetScreen-25 Avaya 6408 Digital Telephone IPSec tunnels Site C PhoneManager With NetScreen-Remote Client Figure 1: Network Configuration SZ; Reviewed: WCH 4/29/2004 Solution & Interoperability Test Lab Application Notes ©2004 Avaya Inc. All Rights Reserved. 2 of 28 NetScreen-IPO.doc Table 1 lists the IP addresses and subnet masks for devices used for testing. Device Avaya IP Office 412 Avaya IP Office 403 NetScreen 25 NetScreen 50 Avaya P333R Interface LAN 1 (Private) LAN 2 (Public) LAN IP Address/Mask 150.1.1.1/24 100.1.1.2/24 10.10.42.1/24 Ethernet 1 (Private) Ethernet 2 (Public) Ethernet 1 (Private) Ethernet 2 (Public) Vlan90 (to NS25) Vlan80 (to NS50) Vlan1 (to Site C) 100.1.1.3/24 90.1.1.1/24 10.10.42.4/24 80.1.1.1/24 90.1.1.2/24 80.1.1.2/24 115.1.1.1/24 Gateway Default: 100.1.1.3 Default: 10.10.42.4 100.1.1.2 90.1.1.2 10.10.42.2 80.1.1.2 90.1.1.1 80.1.1.1 Table 1: IP Address/Mask Assignment 2. Equipment and Software Validated Table 2 shows the equipment and software used for the sample configuration provided: Equipment Avaya IP Office 412 Avaya IP Office 403 Avaya PhoneManager Avaya 4620 IP Telephone Avaya 6408 Digital Telephone Avaya P333R Switch Avaya P333T-PWR Switch NetScreen-50 NetScreen-25 NetScreen-Remote Software 2.0 2.0 2.0.13 2.0 N/A 4.0.8 4.0.17 5.0.r3.0 5.0.r3.0 10.0.0 (Build 10) Table 2: Equipment and Software Used in Testing 3. Site-to-Site IPSec Tunnel between the NetScreen 25 and NetScreen 50 Since the configuration is identical for both the NetScreen 25 and NetScreen 50 devices, only the configuration from the NetScreen 25 is presented in these Application Notes. SZ; Reviewed: WCH 4/29/2004 Solution & Interoperability Test Lab Application Notes ©2004 Avaya Inc. All Rights Reserved. 3 of 28 NetScreen-IPO.doc 3.1. Configure the NetScreen 25 The site-to-site VPN tunnel between the NetScreen 25 and NetScreen 50 is configured based on the following parameters: Phase 1 (IKE) Phase 2 VPN Authentication Encryption Hash Pre-shared key Triple DES Triple DES MD5 MD5 Key Group 2 A route-based VPN tunnel is used in this configuration. Route-based VPN is a feature in NetScreenOS where the endpoint of a VPN tunnel is seen as a network interface instead of a policy. A route-based VPN behaves from a routing standpoint very similar to other point-to-point WAN technologies like Frame Relay or ATM. ******* Set up service for H.323 signaling protocol ********** set service "Q931" protocol tcp src-port 1-65535 dst-port 1720-1720 timeout 2160 set service "ras" protocol udp src-port 1-65535 dst-port 1719-1719 timeout 2160 ******* set set set set Setup login name and password ********** hostname ns25 admin name "NetScreen" admin password "NetScreen" admin auth timeout 10 **** Create the physical interfaces and assign them to zones *********** set interface e1 zone Trust set interface e1 route set interface e1 ip 100.1.1.3/24 set interface e2 zone Untrust set interface e2 route set interface e2 ip 90.1.1.1/24 **** Create the virtual tunnel interface, which is the virtual tunnel endpoint. **** Assign the tunnel interface into the "trust" zone. ***** ***** set interface tunnel.1 zone Trust set interface tunnel.1 route set interface tunnel.1 ip unnumbered interface e1 SZ; Reviewed: WCH 4/29/2004 Solution & Interoperability Test Lab Application Notes ©2004 Avaya Inc. All Rights Reserved. 4 of 28 NetScreen-IPO.doc ***** Define the security gateway parameters for phase 1 proposal using 3DES-MD5, **** ***** and bind it to the outgoing interface Ethernet2. **** set ike gateway ns50-gw address 80.1.1.1 outgoing-interface e2 preshare netscreen proposal pre-g2-3des-md5 ***** Define the VPN parameters for phase 2 proposal using 3DES-MD5. Configure **** ***** the firewall to copy QoS bits from the original packets into the IP header of **** ***** the encrypted packets. Bind the tunnel to the outgoing interface **** set set set set vpn vpn vpn vpn ***** ***** ns50-vpn ns50-vpn ns50-vpn ns50-vpn gateway ns50-gw idletime 0 proposal g2-esp-3des-md5 monitor df-bit copy bind interface tunnel.1 Define the local and remote networks, and the traffic to be encrypted by the tunnel. ***** ***** set vpn ns50-vpn proxy-id local-ip 100.1.1.0/24 remote-ip 10.10.42.0/24 any ***** Set route into the VPN tunnel for the remote network. ***** set route 150.1.1.0/24 gateway 100.1.1.2 set route 80.1.1.0/24 gateway 90.1.1.2 set route 10.10.42.0/24 interface tunnel.1 3.2. Configure the NetScreen 25 with NAT This section describes the steps necessary to enable NAT on NetScreen 25. In order for the signaling information to reach both IP Offices correctly, the static NAT must be used for both IP Offices. Other IP end points are configured to use Port NAT. The IP address translation is done based on the following: Devices Original IP Address Translated IP Address NetScreen 25 150.1.1.1 (IP Office 412) 90.1.1.79 (Static NAT) Other IP endpoints NetScreen 50 Other IP endpoints 150.1.1.0 10.10.42.1 (IP Office 403) 10.10.42.0 90.1.1.80 (Port NAT) 80.1.1.79 (Static NAT) 80.1.1.80 (Port NAT) SZ; Reviewed: WCH 4/29/2004 Solution & Interoperability Test Lab Application Notes ©2004 Avaya Inc. All Rights Reserved. 5 of 28 NetScreen-IPO.doc Due to the similarities in the configuration, only the NAT related configuration for the NetScreen 25 is presented below. ****** Create a zone for the VPN to apply the policies between the internal ****** ****** network and the VPN tunnel. ****** set set set set zone name interface interface interface ****** vpn tunnel.1 zone vpn tunnel.1 route tunnel.1 ip unnumbered interface e1 Create the address object to implement NAT ****** set address trust local-net 150.1.1.0/24 "Local network at Site A" set address vpn remote-net 10.10.42.0/24 "Remote network at Site B" set address trust ipoffice 150.1.1.1/32 "IP Office 412" **** Define the network address translation (NAT). Note that port address translation **** **** (PAT) translates all traffic into the tunnel with the exception of IP Office itself. **** **** All outgoing traffic will be source translated to 90.1.1.80. Because IP Office **** **** needs to be reachable from the remote side, a one-to-one static NAT is **** **** configured to translate the IP Office address 150.1.1.1 to 90.1.1.79. The virtual **** **** router is set to the trust-vr, which is the default for all interfaces. **** set interface tunnel.1 dip 90.1.1.80 90.1.1.80 set interface tunnel.1 mip 90.1.1.79 host 150.1.1.1 netmask 255.255.255.255 vr trust-vr **** Create policies from the trust zone to the vpn zone. Tunnel policies are not ***** **** configured because the route-based VPN tunnel is used. ***** set policy from vpn to global remote-net MIP(90.1.1.79) any permit log set policy from trust to vpn local-net remote-net any nat src dip-id 4 permit log **** Set IP route for the NATed address ***** set route 80.1.1.0/24 interface tunnel.1 SZ; Reviewed: WCH 4/29/2004 Solution & Interoperability Test Lab Application Notes ©2004 Avaya Inc. All Rights Reserved. 6 of 28 NetScreen-IPO.doc 4. Configure the Avaya IP Office This section describes the steps necessary to configure the IP Office. Two IP Office models, IP Office 412 and 403, are used in this testing. Since the configurations are identical, only the configuration for IP Office 412 is presented in these Application Notes. 4.1. Configure the IP Office 412 Parameters IP Office 412 is configured using the IP Office Manager application. The LAN1 interface is used for protected network connectivity, and the LAN 2 interface is used for public network connectivity. Step 1. Description Configuring interface LAN1 Using the IP Office Manager, browse the configuration tree and select System Configuration and click on the LAN1 tab. • Set IP Address to 150.1.1.1 and IP Mask to 255.255.255.0. • Leave the Primary Trans. IP Address field blank. • Leave the Enable NAT box unchecked. • For the DHCP Mode, select Disabled. In the described configuration, static IP addresses are assigned to devices at all sites. SZ; Reviewed: WCH 4/29/2004 Solution & Interoperability Test Lab Application Notes ©2004 Avaya Inc. All Rights Reserved. 7 of 28 NetScreen-IPO.doc Step 2. Description Configuring interface LAN2 Click the LAN2 tab. • Set IP Address to 100.1.1.2 and IP Mask to 255.255.255.0. • Leave the Primary Trans. IP Address field blank • Leave the Enable NAT box unchecked • For the DHCP Mode, select Disabled • Click OK when done. SZ; Reviewed: WCH 4/29/2004 Solution & Interoperability Test Lab Application Notes ©2004 Avaya Inc. All Rights Reserved. 8 of 28 NetScreen-IPO.doc Step 3. Description Configuring default gateway Using the IP Office Manager, browse the configuration tree and select IP Route. • Leave the IP Address and IP Mask fields blank. • Enter 100.1.1.3 (IP address of NetScreen 25 private interface) as gateway IP address • Select LAN2 as gateway interface. • Enter 1 in Metric field and click OK. SZ; Reviewed: WCH 4/29/2004 Solution & Interoperability Test Lab Application Notes ©2004 Avaya Inc. All Rights Reserved. 9 of 28 NetScreen-IPO.doc Step 4. Description Configuring line options Using the IP Office Manager, browse the configuration tree and select Line. • Enter 02 in the Line Number field • Enter description in Telephone Number field (optional) • Enter 2 as Incoming Group and Outgoing Group ID • Enter 20 as voice and data channels as shown in figure below SZ; Reviewed: WCH 4/29/2004 Solution & Interoperability Test Lab Application Notes ©2004 Avaya Inc. All Rights Reserved. 10 of 28 NetScreen-IPO.doc Step Description Click the VoIP tab to enter H.323 trunk configuration. • • • • • • • • • • • • In the Gateway IP Address field, enter 10.10.42.1. This is the IP address of the IP Office 403 at Site B. In the Compression Mode field, select Automatic Selection. In the H.450 Support field, select H.450. The Silence Suppression box may remain unchecked. Select the Enable Faststart checkbox. Leave the Fax Transport Support box unchecked. Leave the Local Hold Music box unchecked. Leave the Local Tones box unchecked. Select the Out of Band DTMF checkbox. Select the Allow Direct Media Path checkbox. Leave the Voice Networking box checked. Click OK when done. SZ; Reviewed: WCH 4/29/2004 Solution & Interoperability Test Lab Application Notes ©2004 Avaya Inc. All Rights Reserved. 11 of 28 NetScreen-IPO.doc Step 5. Description Configuring Shortcode Configure the shortcode so that the IP Office 412 will route the calls to IP Office 403 using the H.323 trunk defined in step 4. Using the IP Office Manager, browse the configuration tree and select Shortcode. • • • • • Enter 4xxxx in the Short Code field Enter . in the Telephone Number field to pass all the dialed digits. Enter 4 in the Line Group ID field Select Dial in the Feature field Click OK when done. SZ; Reviewed: WCH 4/29/2004 Solution & Interoperability Test Lab Application Notes ©2004 Avaya Inc. All Rights Reserved. 12 of 28 NetScreen-IPO.doc Step 6. Description Configuring a user In IP Office, every extension created requires a user associated with it. The following example shows how to configure a user for a PhoneManager using extension 30002. Using the IP Office Manager, browse the configuration tree and select User. Enter information in the fields as shown in the Figure below SZ; Reviewed: WCH 4/29/2004 Solution & Interoperability Test Lab Application Notes ©2004 Avaya Inc. All Rights Reserved. 13 of 28 NetScreen-IPO.doc Step Description • Click the Telephony tab • Select VoIP in the Phone Manager Type field • Leave the other parameters as default • Click OK when done. SZ; Reviewed: WCH 4/29/2004 Solution & Interoperability Test Lab Application Notes ©2004 Avaya Inc. All Rights Reserved. 14 of 28 NetScreen-IPO.doc Step 7. Description Configuring an extension Using the IP Office Manager, browse the configuration tree and select Extension. • • • • Right click Extension and select Add. Extension ID 8004 is assigned by IP Office, leave it unchanged. Enter 30002 in the Extension field. Configure and select other parameters as shown in figure below. SZ; Reviewed: WCH 4/29/2004 Solution & Interoperability Test Lab Application Notes ©2004 Avaya Inc. All Rights Reserved. 15 of 28 NetScreen-IPO.doc Step Description • • • • 8. Select the VoIP tab. Enter 150.1.1.101 in the field of IP Address (this is the IP address of the PC where the PhoneManager is installed). Configure the other parameters as shown in figure below. Click OK when done. Save changes to the IP Office • • SZ; Reviewed: WCH 4/29/2004 Under the Manager File Menu item, select Save. At the Sending Config to dialog box, select the option to immediately reboot and press OK. If the IP Office Server IP address has been changed, update the IP address of the PC running Manager and edit the Manager “Preferences” setting under the File menu before reconnecting. Solution & Interoperability Test Lab Application Notes ©2004 Avaya Inc. All Rights Reserved. 16 of 28 NetScreen-IPO.doc 5. Remote IPSec Tunnel between the NetScreen 25 and NetScreen-Remote Client This section describes the steps necessary to configure the NetScreen 25 and the NetScreenRemote client to establish a dynamic IPSec tunnel. 5.1. Configure the NetScreen 25 The NetScreen 25 is configured as a VPN tunnel endpoint for NetScreen-Remote Client. To support a generic VPN installation packet and avoid user specific configuration on the VPN client, the user should be configured to authenticate with a password, either maintained locally on the firewall or on a RADIUS server. **** Create one common user for general authentication of the NetScreen-Remote **** **** software to the gateway. Configure that single user as a member of a group, **** **** which will be referenced later in the IKE gateway configuration. **** set set set set user nsr ike-id u-fqdn testing@testing share-limit 100 user nsr type ike user nsr enable user-group ike-users user nsr **** Create the local VPN users "avaya" and "netscreen" and add them to a **** user group "remote users". Create an IKE gateway for NSR. set set set set user user user user **** **** avaya password abc123 avaya type xauth netscreen password abc123 netscreen type xauth set user-group remote-users location local set user-group remote-users user avaya set user-group remote-users user Netscreen set ike gateway nsr-gw dialup ike-users preshare netscreen proposal pre-g23des-md5 set ike gateway nsr-gw nat-traversal set ike gateway nsr-gw xauth server local user-group remote-users ***** Alternatively a RADIUS server could be used for user authentication, The ****** ***** configuration below shows how to set up a RADIUS server for user ****** ***** authentication. Use either Local or RADIUS authentication, not both at some time. * set set set set auth-server auth-server auth-server auth-server SZ; Reviewed: WCH 4/29/2004 my-radius my-radius my-radius my-radius type radius server-name 1.1.1.1 secret password account-type xauth Solution & Interoperability Test Lab Application Notes ©2004 Avaya Inc. All Rights Reserved. 17 of 28 NetScreen-IPO.doc set user-group remote-users location external set user-group remote-users type xauth set ike gateway nsr-gw dialup ike-users preshare netscreen proposal pre-g23des-md5 set ike gateway nsr-gw nat-traversal set ike gateway nsr-gw xauth server my-radius user-group remote-users **** Create the VPN tunnel and monitor the status of the tunnel as well ***** set vpn nsr-vpn gateway nsr-gw proposal g2-esp-3des-sha set vpn nsr-vpn monitor **** **** **** **** Set up policies for the VPN tunnel "nsr-vpn". The NetScreen 25 only allows **** authenticated NSR clients to connect to internal resource "local-net" on "any" **** service. "Untrust" is the outside zone and "Trust" is the inside zone. **** "Dial-up VPN" is a reserved keyword for NSR clients. **** set address trust local-net 115.1.1.0/24 "This is our internal network" set policy from untrust to trust "Dial-up VPN" local-net any tunnel vpn nsrvpn log SZ; Reviewed: WCH 4/29/2004 Solution & Interoperability Test Lab Application Notes ©2004 Avaya Inc. All Rights Reserved. 18 of 28 NetScreen-IPO.doc 5.2. Configure the NetScreen-Remote Client Step 1. Description Configuring client connection • • • • • • • Launch the NetScreen Remote client by selecting Start Æ Programs Æ NetScreenRemote Æ Security Policy Editor. Right click the folder My Connections and select Add Æ Connection. Name the new connection as Netscreen Testing. Select Secure for Connection Security Select IP Subnet for ID Type Enter 115.1.1.0 in the field of Subnet and 255.255.255.0 in the field of Mask, Select All in the Protocol field and Secure Gateway Tunnel in the Connect using field. Check the Connect using box. Select IP Address in the IP Type field and enter 90.1.1.1 (IP Address of NetScreen 25 public interface) as the tunnel endpoint IP Address. SZ; Reviewed: WCH 4/29/2004 Solution & Interoperability Test Lab Application Notes ©2004 Avaya Inc. All Rights Reserved. 19 of 28 NetScreen-IPO.doc Step 2. Description Configuring client identity • Expand the Netscreen testing folder and select My Identity. • Select Any in the Name field under the Internet Interface. • Leave other fields as default. • Click Pre-Shared Key under My Identity. • • Click Enter Key and type key in the field Click OK when done SZ; Reviewed: WCH 4/29/2004 Solution & Interoperability Test Lab Application Notes ©2004 Avaya Inc. All Rights Reserved. 20 of 28 NetScreen-IPO.doc Step 3. Description Configuring phase 1 proposal • • • • Expand folder Security Policy Æ Authentication (Phase 1) Æ Proposal 1. Select Pre-Shared Key; Extended Authentication under Authentication Method. Select Triple DES for Encrypt Alg, and SHA-1 for Hash Alg. Select Unspecified for SA Life, and Diffe-Hellman Group 2 for Key Group. SZ; Reviewed: WCH 4/29/2004 Solution & Interoperability Test Lab Application Notes ©2004 Avaya Inc. All Rights Reserved. 21 of 28 NetScreen-IPO.doc Step 4. Description Configuring phase 2 proposal • • • • • 5. Expand folder Security Policy Æ Key Exchange (Phase 2) Æ Proposal 1. Select Unspecified for SA Life, and None for Compression. Check the Encapsulation Protocol (ESP) box . Select Triple DES for Encrypt Alg, and SHA-1 for Hash Alg. Select Tunnel for Encapsulation. Saving the configuration • At top of the menu, open the File Æ Save to save the configuration Or • Click the floppy disk icon from the tool bar to save the configuration. SZ; Reviewed: WCH 4/29/2004 Solution & Interoperability Test Lab Application Notes ©2004 Avaya Inc. All Rights Reserved. 22 of 28 NetScreen-IPO.doc 6. Configure the Avaya PhoneManager This section describes the steps necessary to configure the PhoneManager connecting to the IP Office via a remote VPN tunnel. Step 1. Description Configuring PhoneManager • Launch Avaya PhoneManager by selecting Start Æ Programs Æ IP Office Æ PhoneManager from the PC where the PhoneManager is installed. • Configure the PhoneManager to use IP Office as a Call Server by selecting Configure Æ PBX…. SZ; Reviewed: WCH 4/29/2004 Solution & Interoperability Test Lab Application Notes ©2004 Avaya Inc. All Rights Reserved. 23 of 28 NetScreen-IPO.doc Step Description • • • • In the UserName field, select Phone Manager 30002 previously created from IP Office Manager. In the Password field, enter the password previously defined. In the PBX Address field, enter the IP Office’s private interface IP Address 150.1.1.1. Click Login >> to log into IP Office. SZ; Reviewed: WCH 4/29/2004 Solution & Interoperability Test Lab Application Notes ©2004 Avaya Inc. All Rights Reserved. 24 of 28 NetScreen-IPO.doc Step 2. Description • To set codec preferences for the PhoneManager, select Configure Æ Preferences … • Highlight the codec and move it up or down by clicking the up or down button. • Check the Enable FastStart box. • Click OK when done. 7. Interoperability Compliance Testing Interoperability compliance tests included feature and functionality testing. Both site-to-site and remote IPSec VPN tunnels were tested and validated. Feature and functionality testing examined the Avaya IP Office, Avaya IP telephone and Avaya PhoneManager’ abilities to work with NetScreen security device in IPSec environment. Feature and functionality testing was verified using manual methods. 7.1. General Test Approach All interoperability and feature testing was performed manually. An IP protocol analyzer was used to verify the IPSec encryption for VoIP packets. SZ; Reviewed: WCH 4/29/2004 Solution & Interoperability Test Lab Application Notes ©2004 Avaya Inc. All Rights Reserved. 25 of 28 NetScreen-IPO.doc 7.2. Test Results All tests were completed successfully. 8. Verification Steps The following verification steps can be used in these Application Notes to verify correct system operation: • Make a call from the IP telephone on site A to the digital telephone at site B, and verify that the voice quality is good. • Use a protocol analyzer to decode the VoIP packets, and verify that the packets are encapsulated with IPSec header. • Launch the NetScreen-Remote client and verify that the remote VPN tunnel is established between the NetScreen-Remote client and the NetScreen 25. • Launch the PhoneManager and verify that the PhoneManager can register with the IP Office successfully. • Make a call from the PhoneManager at site C to the IP telephone at site A, and verify that the voice quality is good. • Make a call from digital telephone at site A to the PhoneManager at site C. While the call is active, conference the IP Telephone at site B and verify that all three parties are in conference, and the voice quality is good. 9. Support For technical support of NetScreen products, call 408-543-6768 or 1-877-638-7273, or email customerservice@netscreen.com. For sales support, visit http://www.netscreen.com/contacts/sales/index.jsp on the Internet. 10. Conclusion These Application Notes describe the configuration steps necessary to allow Avaya IP Office, Avaya PhoneManager to work with NetScreen 25, NetScreen 50, as well as NetScreen VPN client. All configurations have been compliance tested and all test cases were successful. 11. Additional References For Avaya IP Office related documentation, visit http://support.avaya.com/ on the Internet. SZ; Reviewed: WCH 4/29/2004 Solution & Interoperability Test Lab Application Notes ©2004 Avaya Inc. All Rights Reserved. 26 of 28 NetScreen-IPO.doc 11.1. Glossary Technical Term Definition as it pertains to this document LAN Local Area Network WAN Wide Area Network DIP Dynamic IP Pool MIP Mapped IP Address IKE Internet Key Exchange ESP Encapsulation Protocol VPN Virtual Private Network IPSec IP Security 3DES Triple Data Encryption Standard (168-Bit Key) SHA Secure Hash Algorithm Codec Coder/Decoder DiffServ Differentiated Services NAT Network Address Translation SZ; Reviewed: WCH 4/29/2004 Solution & Interoperability Test Lab Application Notes ©2004 Avaya Inc. All Rights Reserved. 27 of 28 NetScreen-IPO.doc ©2004 Avaya Inc. All Rights Reserved. Avaya and the Avaya Logo are trademarks of Avaya Inc. All trademarks identified by ® and ™ are registered trademarks or trademarks, respectively, of Avaya Inc. All other trademarks are the property of their respective owners. The information provided in these Application Notes is subject to change without notice. The configurations, technical data, and recommendations provided in these Application Notes are believed to be accurate and dependable, but are presented without express or implied warranty. Users are responsible for their application of any products specified in these Application Notes. Please e-mail any questions or comments pertaining to these Application Notes along with the full title name and filename, located in the lower right corner, directly to the Avaya DeveloperConnection Program at devconnect@avaya.com. SZ; Reviewed: WCH 4/29/2004 Solution & Interoperability Test Lab Application Notes ©2004 Avaya Inc. All Rights Reserved. 28 of 28 NetScreen-IPO.doc