Only qualified personnel should pe rform installation
!
CAUTION
procedures.
NOTICE
You may post this document on a network server for public use as long as no
modifications are ma de to th e do cu ment.
Cabletron Systems reserves the right to make changes in specifications and other
information contained in this document without prior notice. The reader should in
all cases consult Cabletron Systems to determine whether any such changes have
been made.
The hardware, firmware, or software described in this manual is subject to change
without notice.
IN NO EVENT SHALL CABLETRON SYSTEMS BE LIABLE FOR ANY
INCIDENTAL, INDIRECT, SPECIAL, OR CONSEQUENTIAL DAMAGES
WHATSOEVER (INCLUDING BUT NOT LIMITED TO LOST PROFITS) ARISING
OUT OF OR RELATED TO THIS MANUAL OR THE INFORMATION
CONTAINED IN IT, EVEN IF CABLETRON SYSTEMS HAS BEEN ADVISED OF,
KNOWN, OR SHOULD HAVE KNOWN, THE POSSIBILITY OF SUCH
DAMAGES.
Cabletron Systems, Inc.
P.O. Box 5005
Rochester, NH 03866-500 5
Order Number:9032236-02
VIRU S D ISCLAIMER
Cabletron Systems has tested its software with current virus checking
technologies. H owev er, because no anti-virus sy stem is 100% rel iable, we strongly
cauti on you to wr ite pro tect and th en verif y that th e Licen sed Sof tware, pr ior to
installing it, is virus-free with an anti-viru s system in which yo u have confi denc e.
Cabletron Systems makes no representations or warranties to the effec t that t he
Licensed Software is virus-free.
Cabletron Systems, CyberSWITCH, MMAC-Plus, SmartSWITCH, SPECTRUM,
and SecureFast Virtual Remote Access Manager are trademarks of Cabletron
Systems, Inc.
All other product names m entioned in this manual are tradema rks or registered
trademarks of their re sp e ctive companies.
COPYRIGHTS
All of the code for this product is copyright ed by Cable tron System s , Inc.
Portio ns of the code for this p roduct are co pyrighted by the follow ing corpor ations:
Epilogue Technolo gy Co rporat io n
Copyright 1991-1993 by Epilogue Technology Corporation. All rights res erv ed.
Livingston Enterprises, Inc.
Copyright 1992 Livingston Enterprises, Inc.
Security Dynamics Technologies Inc.
Copyright 1995 by Security Dynamics Technologies Inc. All rights reserved.
Stac El e c tronics
Stac Electronics 1993, including one or more U.S. Patents No. 4701745, 5016009,
5126739 and 5146221 and other pending patents.
Telenetw orks
Copyright 1991, 92, 93 by Telene tworks. All rights reserved.
FCC NOTICE
This device complies with Part 15 of the FCC r ules. Operation is subject to the
following two conditions: (1) this de vice m a y no t caus e ha r mful interference, and
(2) this device must accept any int erference received, includ ing interference that
may caus e undesired op e ra ti on.
NOTE: This equipment has been tested and found to comply with the limits for a
Class A digital device, pursuant to Part 15 of the FCC rules. These limits are
designed to provide reasonable protection against harmful interference when the
equipment is operated in a commercial environment. This equipment uses,
generates, and can radiate radio frequency energy and if not installed in
accordance with the operator’s manual, may cause harmful interference to radio
communications. Operation of this equipment in a residential area is likely to cause
interference in which case the user will be required to correct the interference at his
own expense.
Workgroup Remote Access Switch 3
EXAMPLE NETWORKS
WARNING : Changes or modific ations made to this d evice wh ich ar e not expr essly
approved by the party responsible for compliance could void the user’s authority
to operate the equipment.
DOC NOTICE
This digital apparatus do es not exceed the Class A limits for radio no ise emissions
from digital apparatus set out in the Radio Interference Regulations of the
Canadian Department of Communications.
Le présent appareil numérique n’émet pas de bruits radioélectriques dépassant les
limites applicables aux appareils numériques de la class A prescrites dans le
Règlement sur le brouillage radioélectrique édicté par le ministère des
Communicatio ns du Cana d a.
VCCI NOTICE
This is a Class 1 product based on the standard of the Voluntary Control Council
for Interference by Information Technology Equipment (VCCI). If th is equipment
is used in a domestic environment, radio disturbance may arise. When such
trouble occurs, the user may be required to take corrective actions.
CABLETRON SYSTEMS, INC. PROGRAM LICENSE AGREEMENT
IMPORTANT: Before utilizing this product, carefully read this License Agreement.
This document is an agreement between you, the end user, and Cabletron Systems,
Inc. ("Cabletron") that sets forth your rights and obligations with respect to the
Cabletron software program (the "Program") contained in this package. The
Progra m may be contai ned in fi rmware, ch ips or ot her media. BY UTILIZ ING THE
ENCLOSED PRODUCT, YOU ARE AGREEING TO BECOME BOUND BY THE
TERMS OF THIS AGREEMENT, WHICH INCLUDES THE LICENSE AND THE
LIMITATION OF WA RRANTY A ND DISCLAIMER O F LIABILITY. IF YOU DO
NOT AGREE TO THE TERMS OF THIS AGREEMENT, PROMPTLY RETURN
THE UNUSED PRODUCT TO THE PLACE OF PURCHASE FOR A FULL
REFUND.
Configure Sy ste m Options 87
Save Configuration Files 92
Configure the Remote Devices 92
Verify the Installation 92
6 CyberSWITCH
AppleTalk Routing Netwo rk 93
Overview 93
Initial Installation Steps 93
Resour ce s 95
Lines 95
AppleTalk Routing 96
Configure the CyberSWITCH 98
Configuring the Options 98
Configuring Device Inform a tion 101
Configuring an AppleTalk Static Route 104
Save Configuration Files 105
Verify the Installation 105
Index 106
Workgroup Remote Access Switch 7
E
XAMPLE NETWORKS
We provide se ver al exam ple n etwork s , beg inni ng wit h a simpl e net work and progre ssi ng t o more
complex networks. You m ay find t he c onfigurati on instruc tions pr ovided fo r each example helpful
when configuring your own network.
We inc l u de th e f ollowin g ch a p te rs:
•Simple Remote Bri dgin g Network
An example of a s imple netwo rk u sing re mote bri dge d ev ices to acce ss a C ybe rSWI TCH’s f our
basic rate lines.
•Remote Bridgi ng Network with Securit y
A bridged network with C a lling Line Id security and Bridge MAC Address security enabled.
The network is configured with two devices. One device will be configured to require a Bridge
MAC Address security password, and one device will not. This network uses BRI lines.
•IP Routing Network
An IP routing network wi th devices accessing the network f rom their homes.
•IP Routing Network with Remote Bridge Devices
A smart brid g in g interface to allow the two remote bridge devices to co nne ct to an IP subn e t.
The CyberSWITCH treats these devices connected to the Smart Bridging network interface as
if they were connected to the same Ethe rnet segment.
•IP Routin g Netwo rk w i th PP P Dev ices
Uses IP routing to connect two of our products, both us ing PPP. Each sys te m is on a separate
LAN. The configuration for this network is designed to allow th ree different types of accesses.
•IPX Routing Network
A sample netw ork usi ng IPX p rotoc ol to c omm unic ate with r emot e br idge s as we ll as a r emot e
IPX router.
•AppleTalk Network
An Appl e T alk netw o rk ma de up of tw o L ANs, separ a te d by the W AN.
S
IMPLE REMOTE BRIDGING NETWORK
OVERVIEW
This chapter provides an example of a simple network using remote bridge devices to access four
basic rate lines in the CyberSWITCH. Bridges are formed between each of the LANs to which the
remote bridge devices are con nected, and the LAN to whic h the CyberSWITC H is connected.
The following section provides the initial installation steps that would be used with any type of
network in stallation.
INITIAL INSTALLATION STEPS
The initial steps in the CyberS WIT CH insta llati on process ar e basica lly the same no matt er how
complicated the network. These steps are:
•completing the requirement worksheets
•ordering ISDN service
•powering on the sy stem
•accessing Release Notes
•connecti ng an administration console
•setting up Telnet access
•upgrading system s of t wa re
•changing defaults to sec ur e system
•returning configuration to factory defaults
The chapt e rs Accessing the CyberSWITCH andUpgrading System Software (in the User’s Guide)
describe each of these steps in detail .
Worksheets for this network are included on the next few pages.
CONFIGURINGTHE SIMPLE REMOTE BRIDGE
Because this is a simple bridged network, you only need to fill out the System Details and Bridging
and Routing Information worksheets. The worksheets for Example 1 are on the following pages.
EXAMPLE NETWORKS
SYSTEM DETAILS
System Name:
SITE1
PAP Password:_______________ CHAP Secret:___________________
RESOURCES
TypeSlot Switch typeSynchronization type
BRI15ESS
Ethernet_12
LINES
BRI Lines
NameSlotPortLine typeCall screenTEISPIDDi rectory number
You will then be prompted for the line interface type. For our example, we will be using point-to-
point lines. Press 1 as shown below to select this line type.
12 CyberSWITCH
S
IMPLE REMOTE BRIDGING NETWORK
Bridging and Routing Information
LINE TYPE = BR_ISDN
1) POINT_TO_POINT
2) POINT_MULTIPOINT
Select Option [default = POINT_TO_POINT] or press <RET> for previous menu: 1
The next item th at you need to c onfigure is the Dat a Link for t he line. Depending on the switch type,
there may be more than one Data Link per line. In our example, we use one Data Link with
Automatic TEI Negotiat ion:
Current DATA LINK Configuration for this line:
id TEI
-- ----
There are currently no Data Links configured for this line.
Enter (1) to Add or press <RET> for previous menu: 1
Automatic TEI Negotiation (Y or N) [default = Y]? Y
Current Data Link Configuration for this line:
id TEI
-- ----
1 AUTO
(1) Add, (2) Change, (3) Delete a DATA LINK or press <RET> for previous menu? <RET>
After entering the above information, press <return> to display the line menu. Because there are
four lines in this example, the steps for adding a line should be repeated for lines 2, 3, and 4. After
all lines have been added, press <return> twice to return to the Main Menu.
C
ONFIGURINGTHE OPTIONS
The default configuration for the CyberSWITCH is bridging disabled and IP routing enabled. For
reasons we provide below, we want both bridging and IP routing enabled. Under the Option Menu,
select the bridging option and follow the instructions to enable bridging.
This network is a bridged network, but we are going to configure an IP option (the IP host operating
mode) so that we may use an IP application (such as Telnet, TFTP, or SNMP) to manage the
CyberSWITCH. Refer to the graphic below for clarification.
Workgroup Remote Access Switch 13
EXAMPLE NETWORKS
CSX1200 "A"
POWER
SERVICE
TX
LAN B-CHANNELS E1 ONLY
B17 B19
B9 B11
B5 B7
B13 B15
B1 B3
10BASE - T
RX
E1
D
B18 B20
B10 B12
B6 B8
B14 B16
B2 B4
B29 B31
B21 B23
B25 B27
T1
D
B30 L1
B22 B24
B26 B28
ISDN
IP Host Interface
192.42.1.0
192.42.1.6
CSX1200 "B"
LAN B-CHANNELS E1 ONLY
POWER
B17 B19
B29 B31
B9 B11
B5 B7
B21 B23
B13 B15
B1 B3
SERVICE
B25 B27
10BASE - T
TX
RX
E1
T1
D
D
B18 B20
B30 L1
B10 B12
B6 B8
B22 B24
B14 B16
B2 B4
B26 B28
IP Host Interface
Telnet Client
192.42.1.7
The network illustrated above is a bridged network. Each system, SITE1 and SITE2 have been
configured with all the necessar y bridging informati on. SITE1 and S ITE2 have also been configured
in the IP host operating mode, and each have an IP host interface. This will allow each system to be
managed remotely by the PC using Telnet client software (once the initial configuration has been
completed).
Note that th e IP add ress associated with each sys te m is on the same LAN as the PC. T his does not
have to be the case. As long as the P C h as access to the systems thro ugh their IP addre sses, it can
manage the systems using Telnet (or one of the oth e r IP applications).
The steps below describe the configuration steps needed for the above example:
To enable the IP Host Operating Mode:
1.Select IP Operating Mode fr om the IP configuration menu.
2.Select IP host operating mode.
Note:The IP operating mode can not be set to host unless bridging is enabled.
3.When you select the IP host operating mode, an abbreviated IP configuration will be displayed
(similar to the following ):
IP Menu:
1) IP Routing (Enable/Disable)
2) IP Operating Mode
3) IP Interfaces
4) IP Static Routes
5) RIP (Enable/Disable)
6) IP Static ARP Table Entries
7) Isolated Mode (Enable/Disable)
8) Static Route Lookup via RADIUS (Enable/Disable)
9) IP Address Pool
10) IP Filter Information
11) DHCP Information
Select function from above or <RET> for previous menu:
14 CyberSWITCH
S
IMPLE REMOTE BRIDGING NETWORK
Bridging and Routing Information
To configure the IP host interface:
1.Select IP Interfaces from the IP configuratio n men u.
2.Select to add an interface.
3.Enter the IP address assigned to this interface. For SITE1, this is 192.42.1.6; for SITE2, this is
192.42.1.7.
4.Enter the subne t mask.
5.Ent e r the MTU size.
6.Select the transmit broadcast address.
If IP RIP is enabled, enter the following additional inf orm ation:
7.IP RIP receive control.
8.IP RIP respond con trol.
9.IP RIP v2 authentication control.
10. IP RIP v2 auth e ntication key (required on ly if the IP RIP v2 authentication control has been
config u r e d wi th a value oth e r tha n “No Auth e n tication . “
For more detailed information on the IP host operating mode, refer to the IP Operating Mode section
in the Configuring Basic IP Routing chapter of the User’s Guide .
C
ONFIGURINGTHE SECURITY
For this network configuration, we require no security. The default configuration is device security
enabled. To make the required configuration change, select Security from the Main Menu. Then
select Security Level. Finally, select No Security.
SAVE CONFIGURATION FILES
We have now configured all of the required information. Press 4 from the Main menu to save the
changes and then press <RET> to exit. Reboot the sy stem to activate your changes.
Workgroup Remote Access Switch 15
EXAMPLE NETWORKS
VERIFYTHE INSTALLATION
Steps on how to verify the in stallation are detailed in the System Verification chapter of the User’s
Guide. This section gives an outline of which steps should be executed.
On the CyberSWITCH:
Verify resources are operational
Issue
dr
Look for BRI lin e me ssages
Look for LAN initialized messages
Look for Bridge initializ ed mes s age s
Verify WAN Lin es Av ai lab le
Connect WAN lines
Issue
dr
Look for “Data Link up 1,1” in reports
On each Combinet LAN:
Attempt accessing a r e source on the system LAN. This may require that you reboot your machin e
and proceed through the logon sequence.
command
command
16 CyberSWITCH
R
EMOTE BRIDGING NETWORK WITH SECURITY
OVERVIEW
This example network is a bridged network with Calling Line Id security and Bridge MAC Address
security enabled. The network is configured with two devices. One device will be configured to
require a Bridge MAC Address security password, and one device will not. This network uses BRI
lines.
Worksheets for this network are included on the following pages.
Note that a Hunt Group i s used for the BRI lines pictured in the Network Topology Worksheet.
Remote devi ce s wil l then on ly nee d to con fig ure on e tel ephon e numbe r (t he Hunt Group n umber)
for the CyberSWITCH instead of all four phone numbers. If the first line is busy, the next line is
automatically used, and so on until a free line is found. A Hunt Group number can be arranged
through your Service Provider.
INITIAL INSTALLATION STEPS
The initial steps in the CyberS WIT CH insta llati on process ar e basica lly the same no matt er how
complicated the network. These steps are:
•completing the requirement worksheets
•ordering ISDN service
•powering on the system
•accessing Release Notes
•connecting an administration console
•setting up Telnet access
•upgrading system s of t wa re
•changing defaults to secure syst e m
•returning configuration to factory defaults
The chapt e rs Accessing the CyberSWITCH andUpgrading System Software (in the User’s Guide)
describe each of these steps in detail .
Worksheets for this network are included on the next few pages.
PAP Password:____________ ___ CHAP Secret:_____ ______________
RESOURCES
Type
BRI1NI-1
Ethernet_12
Slot Switch typeSynchronization type
LINES
BRI Lines
NameSlotPortLine typeCall
screen
Line111PPPAuto313555111113135551111*
Line212PPPAuto313555111313135551113*
TEISPIDDirectory
313555111213135551112*
313555111413135551114*
number
PRI Lines
* Hunt Group Number: 13135551111
NameSlotPortFraming typeLine coding Sig. methodLine build-out
Workgroup Remote Access Switch 19
EXAMPLE NETWORKS
DEVICE INFORMATION
Devi ce N ame:
Mike Mann
Calling (ISDN, FR, etc.) Information X.25 Information
Line Protocol
Base Data RateSVC
Initial Data Rate
Max Data Rate
Dial-Out Number(s)
Authentication Information
PAP PasswordDLCI
CHAP Secret
IP Host ID
Bridge Ethernet Address*
Bridge Password*
CLID(s)
* HDLC Bridge only
Protocol fo r th is pa rt ic ul a r devi ce?
HDLC bridge
:
PVC
Frame Relay Information
000123456789
JXF30
1313555121213135552121
Bridge IP
Bridging enabled?❒ enabled ❒ disabled IP enabled?❒ enabled ❒ disabled
Make calls
for bridged data?
For IP RLAN, IP (Sub-)
network number
For IPX RLAN, external
network number
❒ enabled ❒ disabled IP Address
(on WAN link)
Make calls f or IP data?❒ enabled ❒ disabled
❒ 0.0.0.0 if
unnumbered link
IPX AppleTalk
IPX enabled?❒ enabled ❒ disabled AppleTalk enabled?❒ enabled ❒ disabled
Callable by IPX?❒ enabled ❒ disabled AppleTalk Address
IPXWAN protocol?❒ enabled ❒ disabled Make calls for
AT data?
IPX routing protocol?
IPX spoofing?
❒ none❒ RIP/SAP
❒ triggered RIP/SAP
AT Routing Protocol
❒ enabled ❒ disabled
20 CyberSWITCH
R
DEVICE INFORMATION
EMOTE BRIDGING NETWORK WITH SECURITY
Device Information
Devi ce N ame:
Pat Smith
Calling (ISDN, FR, etc.) Information X.25 Information
Line Protocol
Base Data RateSVC
Initial Data Rate
Max Data Rate
Dial-Out Number(s)
Authentication Information
PAP PasswordDLCI
CHAP Secret
IP Host ID
Bridge Ethernet Address*
Bridge Password*
CLID(s)
* HDLC Bridge only
Protocol fo r th is pa rt ic ul a r devi ce?
HDLC bridge
:
PVC
Frame Relay Information
003456789000
1313555678913135559876
Bridge IP
Bridging enabled?❒ enabled ❒ disabled IP enabled?❒ enabled ❒ dis abled
Make calls
for bridged data?
For IP RLAN, IP (Sub-)
network number
For IPX RLAN, external
network number
❒ enabled ❒ disabled IP Address
(on WAN link)
Make calls f or IP data?❒ enabled ❒ disabled
❒ 0.0.0.0 if
unnumbered link
IPX AppleTalk
IPX enabled?❒ enabled ❒ disabled AppleTalk enabled?❒ enabled ❒ disabled
Callable by IPX?❒ enabled ❒ disabled AppleTalk Address
IPXWAN protocol?❒ enabled ❒ disabled Make calls for
AT data?
IPX routing protocol?
IPX spoofing?
❒ none❒ RIP/SAP
❒ triggered RIP/SAP
AT Routing Protocol
❒ enabled ❒ disabled
Workgroup Remote Access Switch 21
EXAMPLE NETWORKS
BRIDGING
Bridging X enabled ❒ disabled
Mode of Operation❒ restricted ❒ unrestricted
Bridge Filters
Bridge Dial Out/
Known Connect List
IP ROUTING
BRIDGINGAND ROUTING INFORMATION
IP Routin g
Mode of Operation❒ router ❒ IP host
Network Interface Information
LANName
Unnu m b e red WA N❒ need
Remote LANName
Tradition al WANName
Direct Host WANName
IP Host ModeIP address
X
enabled ❒ disabled
IP address
Mask
❒ don’t need
IP address
Mask
IP address
Mask
IP address
Mask
Mask
Static Routes
Destination network addressMaskNext hop
22 CyberSWITCH
❒ default?
❒ default?
❒ default?
❒ default?
CONFIGURETHE CYBERSWITCH
Note:We are assuming that the softwar e ha s al ready been installed and i s running. Be sure you
are working from the system prompt.
Using the detailed instructions for these steps found in the Simple Remote Bridging chapter,
complete the following configurat ion step s.
Start the Run-Time CFGEDIT program
Select physical resources
Select to add a resource
Select Switch type to be NI-1
Select to add a line
Enter the line name
Select slot and port numbers
Select line interface type of “Poi nt-to-Point”
Add Data Links (Data Link explanati on follows)
Choose Auto TEI Neg otiation
Enter Service Profile ID (SPID) Value
Enter Directory Number for Data Link
Enter Maximum Number of Digits to Verify
Repeat “Add Data Links” for second Data Link
Repeat “Select to add a line” for each additional line
R
EMOTE BRIDGING NETWORK WITH SECURITY
Configure the CyberSWITCH
Data links are handled differently on a NI-1 switch. Some BRI lines have only one phone number
(for the Data Link), but can handle two calls (one for each bearer channel). For NI-1 switches, the
BRI line has two phone numbers (one for each bearer channel), and each phone number has it s own
SPID. You must enter the number of digits to ve rify, so that wh e n the system receiv e s a phone call
it can determine on which bearer to accept the phone call. Refer to the System Details worksheet for
the SPIDs, directory numbers, an d the number of digits to verify.
CONFIGURINGTHE OPTIONS
The default configuration for the CyberSWITCH is bridging disabled and IP routing enabled. For
reasons we provide below, we want both bridging and IP routing enabled. Under the Option Menu,
select the bridging option and follow the instructions to enable bridging.
This network is a bridged network, but we are going to configure an IP option (the IP host operating
mode) so that we may use an IP application (such as Telnet, TFTP, or SNMP) to manage the
CyberSWITCH. This process was described in the previous chapter (page 13) and will not be
repeated here.
CONFIGURINGTHE SECURITY
This network has remote devices, and the device information for each of those devices must be
configured. Device security is used, and the remote devices are configured in the on-node
Workgroup Remote Access Switch 23
EXAMPLE NETWORKS
authentication datab a se . Device security using a on-node authent ic a tion database are the default
values.
To begin the security configuration, press 3 at the Main CFGEDIT Menu. The Security Menu will
then be displayed as follow s :
Security Menu:
1) Security Level
2) System Options and Information
3) Device Level Databases
4) User Level Databases (Enable/Disable)
5) Off-node Server Information
6) Network Login Information
Select function from above or <RET> for previous menu:
C
ONFIGURINGTHE SECURITY LEVEL
From the Security Menu, press 1, Security Level. Then press 2 to enable Device Level Security:
Security Level Menu:
1) No Security
2) Device Level Security
3) User Level Security
4) Device and User Level Security
Select function from above or <RET> for previous menu:
After enabling Devi ce Level Security, return to the Security Menu.
C
ONFIGURINGTHE SYSTEM OPTIONSAND INFORMATION
The default configuration for System Options is all security options enabled, which is acceptable
for this network. No Syste m I nformation or Administra tion Sessions are re quired. Therefore, no
changes are n ecessary.
C
ONFIGURINGTHE DEVICE LEVEL DATABASE
From the Secu rity Menu, press 3 to displa y the Device Level Database Menu. To enable the Onnode Device Database, pr e ss 1 and follow the on- screen instructions:
Device Level Databases Menu:
1) On-node Device Database (Enable/Disable)
2) On-node Device Entries
3) Off-node Device Database Location
Select function from above or <RET> for previous menu:
Press 2 to configure the infor mation for our first device, Mike Mann. Press 1 to add a device. You
will first be asked to enter the Device Name:
24 CyberSWITCH
R
EMOTE BRIDGING NETWORK WITH SECURITY
Configure the CyberSWITCH
Device Name? Mike Mann
After the new device name has been specified, a screen similar to the following is displayed.
Device Table Menu: (Device = "Mike Mann")
1) ISDN
2) Frame Relay
3) X.25
4) Authentication
5) IP
6) IPX
7) AppleTalk
8) Bridging
9) Compression
Select function from above or <RET> for previous menu:
Information for the new device may be configured in any order. You have control over how much
information is specified for each device, and the order in which it is entered.
We will begin by specifying the type of device. We need to determine if the device will use ISDN
Line Protoc ol (choic e 1), Frame Relay (choic e 2) , or X. 25 (choice 3 ).T his d evice i s an ISDN devic e, so
we will press 1 for “ISDN Information” from the Device Table Configuration Menu.
The ISDN Configuration Menu will then be displayed with the preconfigured default values:
Device ISDN Menu: (Device = "Mike Mann")
1) ISDN Line Protocol "PPP (Point to Point Protocol)"
2) Base Data Rate "64000 bps"
3) Initial Data Rate "64000 bps"
4) Maximum Data Rate "128000 bps"
5) Dial Out Phone Number(s) ""
6) Subaddress ""
7) Profile Name "Default_Profile"
8) H0 Call Support ENABLED
Select function from above or <RET> for previous menu:
We do not want to use th e default ISDN Line Protocol of PPP. Press 1 to configure this device’s
ISDN line protocol. The device Mike Mann uses HDLC protocol, so we will press 2:
Device ISDN Line Protocol Menu: (Device = "Mike Mann")
1) PPP (Point to Point Protocol)
2) HDLC Bridge
3) IP Host (RFC1294)
Select option to associate with device "Mike Mann",
or "0" to disable ISDN access for this device [default = 1]? 2
The only other item on the Device ISDN Line Protoc ol Menu that thi s type of device nee ds is the
maximum data rate. We will accept the default value of 128,000 bps. No changes are required.
Return to th e Device Tab le Menu.
Workgroup Remote Access Switch 25
EXAMPLE NETWORKS
At the Device Table Menu, press 4 to enter the authe ntication information needed for this device.
The authentication information needed for each device depends on the device type.
For device “Mike Mann,” we opt to configure a bridge Ethernet address (000123456789), we will
assign a bridge password (JXF30), and configure a first and second calling line Id. After the device
authentication has been entered for device “Mike Mann,” the screen will appear as follows:
Select function from above or <RET> for previous menu:
Next, enter the device info rma ti on for Pat Smit h. Th is dev ice is also an HDLC bridge , and is
configured using the same type of authentication as device Mike Mann, except we will configure
no password for device Pat Smith . Enter 003456789000 for the bridge Et her net address,
13135556789 for the first calling line Id, and 13135559876 for the second calling line Id.
The following screen will be displayed after information for both devices in our network has been
entered:
CURRENT DEVICE TABLE (Sorted by Device Name in Ascending ASCII Order)
(1) Add, (2) Change, (3) Delete, (4) Display a Device or press <RET> for previous menu?
SAVE CONFIGURATION FILES
We have now configured all of the required information for a bridged system with Calling Line Id
Security and Bridge MAC Add ress Sec urit y enable d. Pr ess 4 at the Mai n menu t o save th e changes.
The old configuration files w ill be stored in the \CON FIG direc tor y with a file extensio n of .BAK
(e.g., the old NODE.NEI file will be called NODE.BAK).
After you sa ve the configuration files, press <RET> to exit the CFGED IT program. Reb oot the
system to a ctivate your changes.
26 CyberSWITCH
VERIFYTHE INSTALLATION
Steps on how to verify the in stallation are detailed in the System Verification chapter of the User’s
Guide. This section gives an outline of which steps should be executed.
On the CyberSWITCH:
Verify hardware resources are operational
Issue
dr
Look for BRI line messages
Look for LAN initialized messages
Verify WAN Lin es Av ai lab le
Connect WAN lines
Issue
dr
Look for “Data Link up 1,1” in reports
On eac h HD LC Bridge LAN:
Attempt ac cessing a re source on the Cy berSWITCH LAN. Th is may require th at you reboot
your system and proceed through the logon sequence.
command
command
R
EMOTE BRIDGING NETWORK WITH SECURITY
Verify the Installation
Workgroup Remote Access Switch 27
IP R
OUTING NETWORK
OVERVIEW
This sample network has an IP network with devices accessing the network from their homes.
INITIAL INSTALLATION STEPS
The initial steps in the CyberS WIT CH insta llati on process ar e basica lly the same no matt er how
complicated the network. These steps are:
•completing the requirement worksheets
•ordering ISDN service
•powering on the system
•accessing Release Notes
•connecting an administration console
•setting up Telnet access
•upgrading system s of t wa re
•changing defaults to secure syst e m
•returning configuration to factory defaults
The chapt e rs Accessing the CyberSWITCH andUpgrading System Software (in the User’s Guide)
describe these steps in detail.
Worksheets for this network are included on the next few pages.
NETWORK TOPOLOGY
Initial Installation Steps
LAN 131.1.0.0
IP R
OUTING NETWORK
PC
SITE:
San Fran
File Server
LAN B-CHANNELS E1 ONLY
POWER
SERVICE
TX
RX
PRI
ISDN
10BASE - T
Router 1131.1.1.16
128.1.1.1
B17 B19
B29 B31
B9 B11
B5 B7
B21 B23
B13 B15
B1 B3
B2 B4
B25 B27
E1
T1
D
D
B18 B20
B30 L1
B10 B12
B6 B8
B22 B24
B14 B16
B26 B28
128.1.1.16
WAN Direct Host Interface and
WAN Interface 192.1.1.1
Host
192.1.1.2
Fred Bear
BRI
Host
192.1.1.3
Ralph Moose
BRIBRI
BRI
Host
Host
128.1.1.3
Todd Jones
128.1.1.2
Jill Smith
Workgroup Remote Access Switch 29
EXAMPLE NETWORKS
SYSTEM DETAILS
System Name:
IP Network
PAP Password:__________ _____ CHAP Se cret: __________ ______ ___
RESOURCES
TypeSlot Switch typeSynchronization type
BRI1
Ethernet_13
LINES
BRI Lines
NameSlotPortLine typeCall screenTEISPIDDi rectory number
line111Auto
NTT
PRI Lines
NameSlotPortFraming typeLine coding Sig. methodLine build-out
30 CyberSWITCH
Loading...
+ 76 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.