Cabletron Systems 1200 User Manual
Size:
1.65 Mb
Download

REMOTEBRIDGINGNETWORK WITHSECURITY

Configure the CyberSWITCH

CONFIGURE THECYBERSWITCH

Note: We are assuming that the software has already been installed and is running. Be sure you are working from the system prompt.

Using the detailed instructions for these steps found in the Simple Remote Bridging chapter, complete the following configuration steps.

Start the Run-TimeCFGEDIT program

Select physical resources

Select to add a resource

Select Switch type to be NI-1

Select to add a line

Enter the line name

Select slot and port numbers

Select line interface type of “Point-to-Point”

Add Data Links (Data Link explanation follows)

Choose Auto TEI Negotiation

Enter Service Profile ID (SPID) Value

Enter Directory Number for Data Link

Enter Maximum Number of Digits to Verify

Repeat “Add Data Links” for second Data Link

Repeat “Select to add a line” for each additional line

Data links are handled differently on a NI-1switch. Some BRI lines have only one phone number (for the Data Link), but can handle two calls (one for each bearer channel). ForNI-1switches, the BRI line has two phone numbers (one for each bearer channel), and each phone number has its own SPID. You must enter the number of digits to verify, so that when the system receives a phone call it can determine on which bearer to accept the phone call. Refer to theSystem Details worksheet for the SPIDs, directory numbers, and the number of digits to verify.

CONFIGURING THEOPTIONS

The default configuration for the CyberSWITCH is bridging disabled and IP routing enabled. For reasons we provide below, we want both bridging and IP routing enabled. Under the Option Menu, select the bridging option and follow the instructions to enable bridging.

This network is a bridged network, but we are going to configure an IP option (the IP host operating mode) so that we may use an IP application (such as Telnet, TFTP, or SNMP) to manage the CyberSWITCH. This process was described in the previous chapter (page 13) and will not be repeated here.

CONFIGURING THESECURITY

This network has remote devices, and the device information for each of those devices must be configured. Device security is used, and the remote devices are configured in the on-node

Workgroup Remote Access Switch 23

EXAMPLE NETWORKS

authentication database. Device security using a on-nodeauthentication database are the default values.

To begin the security configuration, press 3 at the Main CFGEDIT Menu. The Security Menu will then be displayed as follows:

Security Menu:

1)Security Level

2)System Options and Information

3)Device Level Databases

4)User Level Databases (Enable/Disable)

5)Off-nodeServer Information

6)Network Login Information

Select function from above or <RET> for previous menu:

CONFIGURING THESECURITYLEVEL

From the Security Menu, press 1, Security Level. Then press 2 to enable Device Level Security:

Security Level Menu:

1)No Security

2)Device Level Security

3)User Level Security

4)Device and User Level Security

Select function from above or <RET> for previous menu:

After enabling Device Level Security, return to the Security Menu.

CONFIGURING THESYSTEMOPTIONS ANDINFORMATION

The default configuration for System Options is all security options enabled, which is acceptable for this network. No System Information or Administration Sessions are required. Therefore, no changes are necessary.

CONFIGURING THEDEVICELEVELDATABASE

From the Security Menu, press 3 to display the Device Level Database Menu. To enable the Onnode Device Database, press 1 and follow the on-screeninstructions:

Device Level Databases Menu:

1)On-nodeDevice Database (Enable/Disable)

2)On-nodeDevice Entries

3)Off-nodeDevice Database Location

Select function from above or <RET> for previous menu:

Press 2 to configure the information for our first device, Mike Mann. Press 1 to add a device. You will first be asked to enter the Device Name:

24 CyberSWITCH

REMOTEBRIDGINGNETWORK WITHSECURITY

Configure the CyberSWITCH

Device Name? Mike Mann

After the new device name has been specified, a screen similar to the following is displayed.

Device Table Menu: (Device = "Mike Mann")

1)ISDN

2)Frame Relay

3)X.25

4)Authentication

5)IP

6)IPX

7)AppleTalk

8)Bridging

9)Compression

Select function from above or <RET> for previous menu:

Information for the new device may be configured in any order. You have control over how much information is specified for each device, and the order in which it is entered.

We will begin by specifying the type of device. We need to determine if the device will use ISDN Line Protocol (choice 1), Frame Relay (choice 2), or X.25 (choice 3).This device is an ISDN device, so we will press 1 for “ISDN Information” from the Device Table Configuration Menu.

The ISDN Configuration Menu will then be displayed with the preconfigured default values:

Device ISDN Menu: (Device = "Mike Mann")

1)

ISDN Line Protocol

"PPP (Point to Point Protocol)"

2)

Base Data Rate

"64000 bps"

3)

Initial

Data Rate

"64000 bps"

4)

Maximum

Data Rate

"128000 bps"

5)

Dial Out Phone Number(s)

""

6)

Subaddress

""

7)

Profile

Name

"Default_Profile"

8)

H0 Call

Support

ENABLED

Select function from above or <RET> for previous menu:

We do not want to use the default ISDN Line Protocol of PPP. Press 1 to configure this device’s ISDN line protocol. The device Mike Mann uses HDLC protocol, so we will press 2:

Device ISDN Line Protocol Menu: (Device = "Mike Mann")

1)PPP (Point to Point Protocol)

2)HDLC Bridge

3)IP Host (RFC1294)

Select option to associate with device "Mike Mann",

or "0" to disable ISDN access for this device [default = 1]? 2

The only other item on the Device ISDN Line Protocol Menu that this type of device needs is the maximum data rate. We will accept the default value of 128,000 bps. No changes are required. Return to the Device Table Menu.

Workgroup Remote Access Switch 25