Cabletron Systems 150 User Manual

SMALL OFFICE
REMOTE ACCESS SWITCH
EXAMPLE NETWORKS
Release 7.2
Cabletron Systems
(603) 332-9400 phone (603) 337-3075 fax support@ctron.com
Only qualified personnel should perform installation
!
CAUTION
procedures.
NOTICE
You may post this document on a network server for public use as long as no modificati ons are ma de to th e docume n t .
Cabletron Systems reserves the right to make changes in specifications and other information contained in this document without prior notice. The reader should in all cases consult Cabletron Systems to determine whether any such changes have been made.
The hardware, firmware, or software described in this manual is subject to change without notice.
IN NO EVENT SHALL CABLETRON SYSTEMS BE LIABLE FOR ANY INCIDENTAL, INDIRECT, SPECIAL, OR CONSEQUENTIAL DAMAGES WHATSOEVER (INCLUDING BUT NOT LIMITED TO LOST PROFITS) ARISING OUT OF OR RELATED TO THIS MANUAL OR THE INFORMATION CONTAINED IN IT, EVEN IF CABLETRON SYSTEMS HAS BEEN ADVISED OF, KNOWN, OR SHOULD HAVE KNOWN, THE POSSIBILITY OF SUCH DAMAGES.
©Copyrigh t 1998 by Cabletron Sy stems, Inc. All rights reserved.
Cabletron Systems, Inc. P.O. Box 5005 Rochester, NH 03866-500 5
Order Number:9032448
VIRU S D ISCLAIMER
Cabletron Systems has tested its software with current virus checking technologies. H owev er, because no anti-vir us sy stem is 100% reliabl e, we strongly cauti on you to wr ite pro tect and th en verif y that th e Licen sed Sof tware, pr ior to installing it, is virus-free with an anti-viru s system in which yo u have confi denc e.
Cabletron Systems makes no representations or warranties to the effect that the Licensed Software is virus-free.
Copyright © July 1997, by Cabletron Systems, Inc. All rights reserved.
2 CyberSWITCH
TRADEMARKS
Cabletron Systems, CyberSWITCH, MMAC-Plus, SmartSWITCH, SPECTRUM, and SecureFast Virtual Remote Access Manager are trademarks of Cabletron Systems, Inc.
All other product names m entioned in this manual are tradema rks or registered trademarks of their re sp e ctive companies.
COPYRIGHTS
All of the code for this product is copyright ed by Cable tron System s , Inc.
© Copyright 1991-1997 Cabletron Systems, Inc. All rights reserved. Printed in the United States of America .
Portio ns of the code for this p roduct are co pyrighted by the follow ing corpor ations:
Epilogue Technolo gy Co rporat io n Copyright 1991-1993 by Epilogue Technology Corporation. All rights reserved .
Livingston Enterprises, Inc. Copyright 1992 Livingston Enterprises, Inc.
Security Dynamics Technologies Inc. Copyright 1995 by Security Dynamics Technologies Inc. All rights reserved.
Stac El e c troni cs Stac Electronics 1993, including one or more U.S. Patents No. 4701745, 5016009, 5126739 and 5146221 and other pending patents.
Telenetw orks Copyright 1991, 92, 93 by Telene tworks. All rights reser ved .
FCC NOTICE
This device complies with Part 15 of th e FC C rules. Operation is subject to the following two conditions: (1) this d e vice m ay no t cause har mful interference, and (2) this device must accept any int erference received, includ ing interference that may caus e undesire d o pe ra ti on.
NOTE: This equipment has been tested and found to comply with the limits for a Class A digital device, pursuant to Part 15 of the FCC rules. These limits are designed to provide reasonable protection against harmful interference when the equipment is operated in a commercial environment. This equipment uses, generates, and can radiate radio frequency energy and if not installed in accordance with the operator’s manual, may cause harmful interference to radio communications. Operation of this equipment in a residential area is likely to cause interference in which case the user will be required to correct the interference at his own expense.
Small Office Remote Access Switch 3
WARNING : Changes or modific ations made to this d evice wh ich ar e not expr essly
approved by the party responsible for compliance could void the user’s authority to operate the equipment.
DOC NOTICE
This digital apparatus do es not exceed the Class A limits for radio noise emissions from digital apparatus set out in the Radio Interference Regulations of the Canadian Departme nt of Commun ications.
Le présent appareil numérique n’émet pas de bruits radioélectriques dépassant les limites applicables aux appareils numériques de la class A prescrites dans le Règlement sur le brouillage radioélectrique édicté par le ministère des Communicatio ns du Cana d a.
VCCI NOTICE
This is a Class 1 product based on the standard of the Voluntary Control Council for Interference by Information Technology Equipment (VCCI). If th is equipment is used in a domestic environment, radio disturbance may arise. When such trouble occurs, th e user may be requir e d to take correc tive actions.
CABLETRON SYSTEMS, INC. PROGRAM LICENSE AGREEMENT
IMPORTANT: Before utilizing this product, carefully read this License Agreement.
This document is an agreement between you, the end user, and Cabletron Systems, Inc. ("Cabletron") that sets forth your rights and obligations with respect to the Cabletron software program (the "Program") contained in this package. The Progra m may be contai ned in fi rmware, ch ips or ot her media. BY UTILIZ ING THE ENCLOSED PRODUCT, YOU ARE AGREEING TO BECOME BOUND BY THE TERMS OF THIS AGREEMENT, WHICH INCLUDES THE LICENSE AND THE LIMITATION OF WA RRANTY A ND DISCLAIMER O F LIABILITY. IF YOU DO NOT AGREE TO THE TERMS OF THIS AGREEMENT, PROMPTLY RETURN THE UNUSED PRODUCT TO THE PLACE OF PURCHASE FOR A FULL REFUND.
4 CyberSWITCH
CONTENTS
Simpl e Re m ote Bridging Netwo r k 9
Overview 9 Initial Installation Steps 9 Configuring the Simple Remote Bridge 9
Resour ce s 10 Lines 10
Bridging and Routing Info rm ation 11
Bridging 11 IP Routing 11 Configure the CyberSWITCH 12 Save Configuration Files 15
Verify the Installation 16
Remote Bridging Network with Security 17
Overview 17 Initial Installation Steps 17
Resour ce s 19
Lines 19 Device Information 20 Bridging and Routing Info rm ation 22
Bridging 22
IP Routing 22 Configure the CyberSWITCH 23
Configuring the Options 23
Configuring the Security 24
Save Configuration Files 27 Verify the Installation 27
IP Rout in g Network 28
Overview 28 Initial Installation Steps 28 System Details 30
Resour ce s 30
Lines 30 Device Information 31 Device Information 33 Bridging and Routing Info rm ation 35
Bridging 35
IP Routing 35 Configure the CyberSWITCH 36
Configuring the Cybe rSW ITCH Options 36
Configuring the Security 40
Save Configuration Files 43 Verify the Installation 44
Small Office Remote Access Switch 5
IP Routing Network with Remote Bridge Devices 45
Overview 45
Business A ssu mp tions 45 Initial Installation Steps 45 Resour ce s 47 Lines 47 Device Information 48 Bridging and Routing Info rm ation 50
Bridging 50
IP Routing 50 Configure the CyberSWITCH 51
Configuring the Cybe rSW ITCH Options 51
Configuring the Security 54 Verify the Installation 57
IP Routing Network with PPP Devices 58
Overview 58 Initial Installation Steps 58 System Details 60
Resour ce s 60
Lines 60 Bridging and Routing Info rm ation 61
Bridging 61
IP Routing 61 Bridging and Routing Info rm ation 62
Bridging 62
IP Routing 62 Device Information 63 Configure SITE1 65
Configur ing the Syste m Op tions 65
Finishi ng the Security Con f iguration 73 Configure SITE2 74
Configurin g SITE2 Options 74
Configuring Security 75
Save Configuration Files 75 Verify the Installation 75
IPX Routing Ne tw ork 77
Overview 77
Business A ssu mp tions 77 Initial Installation Steps 77 System Details 79
Resour ce s 79
Lines 79 Device Information 80 Bridging and Routing Info rm ation 83
Bridging 83
IP Routing 83
IPX Routing 84
6 CyberSWITCH
Configure IPX Routing: Masternet (Detroit) 85
Configure Devices 85
Configure Sy ste m Options 87 Save Configuration Files 92 Configure the Remote Devices 92 Verify the Installation 92
AppleTalk Routing Netwo rk 93
Overview 93 Initial Installation Steps 93
Resour ce s 95
Lines 95
AppleTalk Routing 96 Configure the CyberSWITCH 98
Configuring the Options 98
Configuring Device Inform a tion 101
Configuring an AppleTalk Static Route 104
Save Configuration Files 105 Verify the Installation 105
Index 106
Small Office Remote Access Switch 7
E
XAMPLE NETWORKS
We provide se ver al exam ple n etwork s , beg inni ng wit h a simpl e net work and progre ssi ng t o more
complex networks. You m ay find t he c onfigurati on instruc tions pr ovided fo r each example helpful
when configuring your own network.
We inc l u de th e f ollowi ng cha p te r s:
Simple Remote Bri dgin g Network
An example of a s imple netwo rk u sing re mote bri dge d ev ices to acce ss a C ybe rSWI TCH’s f our basic rate lines.
Remote Bridg i ng Network with Security
A bridged network with Cal ling Line Id secu rity and Bridge MAC Address security enabled. The network is configured with two devices. One device will be configured to require a Bridge MAC Address security password, and one device will not. This network uses BRI lines.
•IP Routing Network
An IP routing network with devices accessing the network f rom their homes.
IP Routing Network with Remote Bridge Devices
A smart brid g in g interface to allow the two remote bridge devices t o connect to an IP subnet. The CyberSWITCH treats these devices connected to the Smart Bridging network interface as if they were connected to the same Ethernet segment.
IP Routin g Netwo rk w i th PP P Dev ices
Uses IP routing to connec t two of our products, both using PPP. Each sys tem is on a separat e LAN. The configura tion for this network i s designed to allow th ree different types of accesse s.
•IPX Routing Network
A sample netw ork usi ng IPX p rotoc ol to c omm unic ate with r emot e br idge s as we ll as a r emot e IPX router.
AppleTalk Network
An Appl e T alk ne tw o r k ma de up of tw o L ANs, se parated by the W A N.
S
IMPLE REMOTE BRIDGING NETWORK

OVERVIEW

This chapter provides an example of a simple network using remote bridge devices to access four
basic rate lines in the CyberSWITCH. Bridges are formed between each of the LANs to which the
remote bridge device s are connected, and the LAN to which the Cyb erSWITCH is connected.
The following section provides the initial installation steps that would be used with any type of
network in stallation.

INITIAL INSTALLATION STEPS

The initial steps in the CyberS WIT CH insta llati on process ar e basica lly the same no matt er how
complicated the network. These steps are:
completing the requirement worksheets
•ordering ISDN service
powering on the sy stem
accessing Release Notes
connecti ng an administration console
setting up Telnet access
upgrading syste m s of t wa re
changing defaults to secure system
returning configuration to factory defaults
The chapt e rs Accessing the CyberSWITCH and Upgrading System Software (in the User’s Guide)
describe each of these steps in detail.
Worksheets for this network are included on the next few pages.

CONFIGURING THE SIMPLE REMOTE BRIDGE

Because this is a simple bridged network, you only need to fill out the System Details and Bridging
and Routing Information worksheets. The worksheets for Example 1 are on the following pages.
SYSTEM DETAILS
System Name:
SITE1
PAP Password:_______________ CHAP Secret:___________________

RESOURCES

Type Slot Switch type Synchronization type
BRI 1 5ESS Ethernet_1 2

LINES

BRI Lines
Name Slot Port Line type Call screen TEI SPID Di rectory number
Line1 1 1 PPP Auto
PRI Lines
Name Slot Port Framing type Line coding Sig. method Line build-out
V.35 and RS232 Lines
Name Slot Port Device/Net wo rk Idle character
10 CyberSWITCH

BRIDGING

BRIDGING AND ROUTING INFORMATION
S
IMPLE REMOTE BRIDGING NETWORK

Bridging and Routing Information

Bridging Mode of Operation restricted unrestricted Bridge Filters
Bridge Dial Out/ Known Connect List

IP ROUTING

IP Routin g Mode of Operation ❒ router
Network Interface Information
LAN Name
Unnu m b e red W A N need
Remote LAN Name
Tradition al WAN Name
Direct Host WAN Name
IP Host Mode IP address
X
enabled disabled
X
enabled disabled
X
IP host
IP address Mask
don’t need
IP address Mask
IP address Mask
IP address Mask
Mask
192.42.1.6 192.42.1.7
Static Routes
Destination network address Mask Next hop
❒ default?
default?
default? default?
Small Office Remote Access Switch 11

CONFIGURE THE CYBERSWITCH

Using CFGEDIT, we will guide you through the steps to configure the CyberSWITCH for a simple
remote bridge network. We will execute these steps in the same order as they appear in the
configuration menus.
Start the CFGEDIT configura tion utility . Type the foll owing comm a nd at the system prom p t:
cfgedit
The following Main Menu will then be displayed:
Main Menu:
1) Physical Resources
2) Options
3) Security
4) Save Changes
Select function from above or <RET> to exit:
<return>
C
ONFIGURING THE PHYSICAL RESOURCE INFORMATION
We start with confi guring the P hysical Resou rce information. Pr e ss 1 at the Main Menu to display
the Physical Resource Configuration Menu:
Physical Resource Menu:
1) Resources
2) Data Lines
3) Access
4) ISDN Subaddress
Select function from above or <RET> for previous menu:
You may only configure th e switch type. The rest of the resource information may only be
displayed.
We will next add the line in formation . Press 2 at the Physic al Resour ces Menu and pres s 1 to add a
line. First, you will be prompted for the line name. You will then be asked to select which slot and
port you wish to use. We will use LINE1 as the line name, and slot 1, port 1 as the slot and port
combination:
LINE NAME or press <RET> for previous menu: LINE1
Currently available Ports:
SLOT Resource Type Available Ports Switch Type
---- --------------- ----------------- --------------- 1 BASIC_RATE 1, 2, 3, 4 BRI_5ESS
Slot number from above? 1
Port number from Slot 1? 1
You will then be prompted for the line interface type. For our example, we will be using point-to-
point lines. Press 1 as shown below to select this line type.
12 CyberSWITCH
S
IMPLE REMOTE BRIDGING NETWORK
Bridging and Routing Information
LINE TYPE = BR_ISDN
1) POINT_TO_POINT
2) POINT_MULTIPOINT
Select Option [default = POINT_TO_POINT] or press <RET> for previous menu: 1
The next item th at you need to c onfigure is the Dat a Link for t he line. Depending on the switch type,
there may be more than one Data Link per line. In our ex ample, we use one Data Link with
Automatic TEI Negotiat ion:
Current DATA LINK Configuration for this line:
id TEI
-- ----
There are currently no Data Links configured for this line. Enter (1) to Add or press <RET> for previous menu: 1
Automatic TEI Negotiation (Y or N) [default = Y]? Y
Current Data Link Configuration for this line:
id TEI
-- ---- 1 AUTO
(1) Add, (2) Change, (3) Delete a DATA LINK or press <RET> for previous menu? <RET>
After entering the above information, press <return> to display the lin e menu.Press <return> twice
to retu rn to th e Main Me nu .
C
ONFIGURING THE OPTIONS
The default configuration for the CyberSWITCH is bridging disabled and IP routing enabled. For
reasons we provide below, we want both bridging and IP routing enabled. Under the Option Menu,
select the bridging option and follow the instructions to enable bridging.
This network is a bridged network, but we are going to configure an IP option (the IP host operating
mode) so that we may use an IP application (such as Telnet, TFTP, or SNMP) to manage the
CyberSWITCH. Refer to the graphic below for clarification.
Small Office Remote Access Switch 13
CSX150
ISDN
CSX150
"SITE2"
IP Host Interface
192.42.1.7
192.42.1.0
Telnet Client
"SITE1"
IP Host Interface
192.42.1.6
The network illustrated above is a bridged network. Each system, SITE1 and SITE2 have been
configured with all the necessar y bridging informati on. SITE1 and S ITE2 have also been configured
in the IP host operating mode, and each have an IP host interface. This will allow each system to be
managed remotely by the PC using Telnet client software (once the initial configuration has been
completed).
Note that th e IP add ress associated with each sys te m is on the same LAN as the PC. This does not
have to be the case. As long as the P C h a s access to the systems thro u gh their IP addresses, it can
manage the systems using Telnet (or one of the oth e r IP applicati ons).
The steps below describe the configuration steps needed for the above example:
To enable the IP Host Operat ing Mode:
1. Select IP Operating Mode fr om the IP configuration menu.
2. Select IP host operating mode.
Note: The IP operating mode can not be set to host unless bridging is enabled.
3. When you select the IP host operating mode, an abbreviated IP configuration will be displayed (similar to the following ):
IP Menu:
1) IP Routing (Enable/Disable)
2) IP Operating Mode
3) IP Interfaces
4) IP Static Routes
5) RIP (Enable/Disable)
6) IP Static ARP Table Entries
7) Isolated Mode (Enable/Disable)
8) Static Route Lookup via RADIUS (Enable/Disable)
9) IP Address Pool
10) IP Filter Information
11) DHCP Information
Select function from above or <RET> for previous menu:
14 CyberSWITCH
S
IMPLE REMOTE BRIDGING NETWORK
Bridging and Routing Information
To configure the IP host interface:
1. Select IP Interfaces from the IP configuratio n men u.
2. Select to add an interface.
3. Enter the IP address assigned to this interface. For SITE1, this is 192.42.1.6; for SITE2, this is
192.42.1.7.
4. Enter the subne t mask.
5. Ent e r the MT U size.
6. Select the transmit broad cast address.
If IP RIP is enabled, enter the following additional inf orm ation:
7. IP RIP receive control.
8. IP RIP respond con trol.
9. IP RIP v2 authentication control.
10. IP RIP v2 auth e ntication key (required only if the IP RIP v2 authentication control has been
config u r e d wi th a value other tha n “No Au thenticatio n.“
For more detailed information on the IP host operating mode, refer to the IP Operating Mode section in the Configuring Basic IP Routing chapter of the User’s Guide.
C
ONFIGURING THE SECURITY
For this network configuration, we require no security. The default configuration is device security enabled. To make the required configuration change, select Security from the Main Menu. Then select Security Level. Finally, select No Security.

SAVE CONFIGURATION FILES

We have now configured all of the required information. Press 4 from the Main menu to save the changes and then press <RET> to exit. Reboot the system to activate your changes.
Small Office Remote Access Switch 15

VERIFY THE INSTALLATION

Steps on how to verify the installation are detailed in the System Verification chapter of the User’s Guide. This section gives an outline of which steps should be executed.
On the CyberSWI TCH:
Verify resources are operational
Issue
dr
Look for BRI lin e me ssages Look for LAN initialized messages Look for Bridge initializ ed mes s age s
Verify WAN Lin es Av ai lab le
Connect WAN lines Issue
dr
Look for “Data Link up 1,1” in reports
On each Combinet LAN: Attempt accessing a resource on the system LAN. This may require that you reboot y ou r machine and proceed through the logon sequence.
command
command
16 CyberSWITCH
R
EMOTE BRIDGING NETWORK WITH SECURITY

OVERVIEW

This example network is a bridged network with Calling Line Id security and Bridge MAC Address security enabled. The network is configured with two devices. One device will be configured to require a Bridge MAC Address security password, and one device will not. This network uses BRI lines.
Worksheets for this network are included on t he following pages.
Note that a Hunt Group i s used for the BRI lines pictured in the Network Topology Worksheet. Remote devi ce s wil l then on ly nee d to con fig ure on e tel ephon e numbe r (t he Hunt Group n umber) for the CyberSWITCH instead of all four phone numbers. If the first line is busy, the next line is automatically used, and so on until a free line is found. A Hunt Group number can be arranged through your Service Provider.

INITIAL INSTALLATION STEPS

The initial steps in the CyberS WIT CH insta llati on process ar e basica lly the same no matt er how complicated the network. These steps are:
completing the requirement worksheets
•ordering ISDN service
powering on the system
accessing Release Notes
connecting an administrati on console
setting up Telnet access
upgrading syste m s of t wa re
changing defaults to secure system
returning configuration to factory defaults
The chapt e rs Accessing the CyberSWITCH and Upgrading System Software (in the User’s Guide)
describe each of these steps in detail.
Worksheets for this network are included on the next few pages.
NETWORK TOPOLOGY
13135551212 13135552121
Bridge Ethernet Address: 000123456789 Password: JXF30
BRI
PC
CSX150
13135551111 13135551112
BRI
ISDN
File Server
Hunt Group Number:
13135551111
BRI
13135556789 13135559876
Bridge Ethernet Address: 003456789000 Password: None
18 CyberSWITCH
PC
User Name: Mike Mann
User Name: Pat Smith
PC
SYSTEM DETAILS
R
EMOTE BRIDGING NETWORK WITH SECURITY
Initial Installation Steps
System Name:
Remote Bridge
PAP Password:____________ ___ CHAP Secret:_____ ______________

RESOURCES

Type
BRI 1 NI-1 Ethernet_1 2
Slot Switch type Synchronization type

LINES

BRI Lines
Name Slot Port Line type Call
screen
Line1 1 1 PPP Auto 3135551111 13135551111*
TEI SPID Directory
3135551112 13135551112*
number
* Hunt Group Number: 13135551111
Small Office Remote Access Switch 19

DEVICE INFORMATION

Devi ce N ame:
Mike Mann
Calling (ISDN, FR, etc.) Information X.25 Information
Line Protocol Base Data Rate SVC Initial Data Rate Max Data Rate Dial-Out Number(s)
Authentication Information
PAP Password DLCI CHAP Secret IP Host ID Bridge Ethernet Address* Bridge Password* CLID(s)
* HDLC Bridge only
Protocol fo r th is pa rt ic ul a r devi ce?
HDLC bridge
:
PVC
Frame Relay Information
000123456789
JXF30
13135551212 13135552121
Bridge IP
Bridging enabled? enabled disabled IP enabled? enabled disabled Make calls
for bridged data? For IP RLAN, IP (Sub-)
network number For IPX RLAN, external
network number
enabled disabled IP Address
(on WAN link)
Make calls f or IP data? ❒ enabled ❒ disabled
0.0.0.0 if
unnumbered link
IPX AppleTalk
IPX enabled? enabled disabled AppleTalk enabled? enabled disabled Callable by IPX? enabled disabled AppleTalk Address IPXWAN protocol? ❒ enabled ❒ disabled Make calls f o r
AT data?
IPX routing protocol?
IPX spoofing?
none RIP/SAP
triggered RIP/SAP
AT Routing Protocol
enabled disabled
20 CyberSWITCH
R
EMOTE BRIDGING NETWORK WITH SECURITY
DEVICE INFORMATION
Device Information
Devi ce N ame:
Pat Smith
Calling (ISDN, FR, etc.) Information X.25 Information
Line Protocol Base Data Rate SVC Initial Data Rate Max Data Rate Dial-Out Number(s)
Authentication Information
PAP Password DLCI CHAP Secret IP Host ID Bridge Ethernet Address* Bridge Password* CLID(s)
* HDLC Bridge only
Protocol fo r th is pa rt ic ul a r devi ce?
HDLC bridge
:
PVC
Frame Relay Information
003456789000
13135556789 13135559876
Bridge IP
Bridging enabled? enabled disabled IP enabled? enabled dis abled Make calls
for bridged data? For IP RLAN, IP (Sub-)
network number For IPX RLAN, external
network number
enabled disabled IP Address
(on WAN link)
Make calls f or IP data? ❒ enabled ❒ disabled
0.0.0.0 if
unnumbered link
IPX AppleTalk
IPX enabled? enabled disabled AppleTalk enabled? enabled disabled Callable by IPX? enabled disabled AppleTalk Address IPXWAN protocol? ❒ enabled ❒ disabled Make calls f o r
AT data?
IPX routing protocol?
IPX spoofing?
none RIP/SAP
triggered RIP/SAP
AT Routing Protocol
enabled disabled
Small Office Remote Access Switch 21

BRIDGING

Bridging X enabled disabled Mode of Operation restricted unrestricted Bridge Filters
Bridge Dial Out/ Known Connect List

IP ROUTING

BRIDGING AND ROUTING INFORMATION

IP Routin g Mode of Operation ❒ router ❒ IP host
Network Interface Information
LAN Name
Unnu m b e red W A N need
Remote LAN Name
Tradition al WAN Name
Direct Host WAN Name
IP Host Mode IP address
X
enabled disabled
IP address Mask
don’t need
IP address Mask
IP address Mask
IP address Mask
Mask
Static Routes
Destination network address Mask Next hop
22 CyberSWITCH
❒ default?
default?
default? default?
CONFIGURE THE CYBERSWITCH
Note: We are assuming that the softwar e ha s al ready been installed and is running. Be sure you
are working from the system prompt.
Using the detailed instructions for these steps found in the Simple Remote Bridging chapter, complete the following configurat ion step s.
Start the Run-Time CFGEDIT program
Select physical resources Select to add a resource
Select Switch type to be NI-1
Select to add a line
Enter the line name Select slot and port numbers
Select line interface type of “P oint-to-Point” Add Data Links (Data Link explanati on follows)
Choose Auto TEI Neg otiation Enter Service Profile ID (SPID) Value Enter Directory Number for Data Link
Enter Maximum Number of Digits to Verify Repeat “Add Data Links” for second Data Link Repeat “Select to add a line” for each additional line
R
EMOTE BRIDGING NETWORK WITH SECURITY

Configure the CyberSWITCH

Data links are handled differently on a NI-1 switch. Some BRI lines have only one phone number (for the Data Link), but can handle two calls (one for each bearer channel). For NI-1 switches, the BRI line has two phone numbers (one for each bearer channel), and each phone number has it s own SPID. You must enter the number of d igits to verify, so that when the system receives a phone ca ll it can determine on which bearer to accept the phone call. Refer to the System Details worksheet for the SPIDs, directory n umbers, and the number of digits to verify.

CONFIGURING THE OPTIONS

The default configuration for the CyberSWITCH is bridging disabled and IP routing enabled. For reasons we provide below, we want both bridging and IP routing enabled. Under the Option Menu, select the bridging option and follow the instructions to enable bridging.
This network is a bridged network, but we are going to configure an IP option (the IP host operating mode) so that we may use an IP application (such as Telnet, TFTP, or SNMP) to manage the CyberSWITCH. This process was described in the previous chapter (page 13) and will not be repeated here.
Small Office Remote Access Switch 23

CONFIGURING THE SECURITY

This network has remote devices, and the device informat ion for each of those devices must be configured. Device security is used, and th e remote devices are configured in th e on-node authentication data base. Device secu rity using a on-node authent ic a tion database are the default values.
To begin the security configuration, press 3 at the Main CFGEDIT Menu. The Security Menu will then be displayed as follow s :
Security Menu:
1) Security Level
2) System Options and Information
3) Device Level Databases
4) User Level Databases (Enable/Disable)
5) Off-node Server Information
6) Network Login Information
Select function from above or <RET> for previous menu:
C
ONFIGURING THE SECURITY LEVEL
From the Security Menu, press 1, Security Level. Then press 2 to enable Device Level Security:
Security Level Menu:
1) No Security
2) Device Level Security
3) User Level Security
4) Device and User Level Security
Select function from above or <RET> for previous menu:
After enabling Device Level S e curity, return to the Security Menu .
C
ONFIGURING THE SYSTEM OPTIONS AND INFORMATION
The default configuration for System Options is all security options enabled, which is acceptable for this network. No Sys te m Information or Administration Sessions are required. Theref ore, no changes are n ecessary.
C
ONFIGURING THE DEVICE LEVEL DATABASE
From the Secu rity Menu, press 3 to displa y the Device Level Database Menu . To enable the On­node Device Database, press 1 and follow th e on-screen instruct ions:
Device Level Databases Menu:
1) On-node Device Database (Enable/Disable)
2) On-node Device Entries
3) Off-node Device Database Location
Select function from above or <RET> for previous menu:
24 CyberSWITCH
R
EMOTE BRIDGING NETWORK WITH SECURITY
Configure the CyberSWITCH
Press 2 to configure the information for our f irst device, Mike Mann. Press 1 to add a device. You will first be asked to enter the Device Name:
Device Name? Mike Mann
After the new device name has been specified, a screen similar to the following is displayed.
Device Table Menu: (Device = "Mike Mann")
1) ISDN
2) Frame Relay
3) X.25
4) Authentication
5) IP
6) IPX
7) AppleTalk
8) Bridging
9) POTS
10) Compression
Select function from above or <RET> for previous menu:
Information for the new device may be configured in any order. You have control over how much information is specified for each device, and the order in which it is entered.
We will begin by specifying the type of device. We need to determine if the device will use ISDN Line Protoc ol (choic e 1), Frame Relay (choic e 2) , or X. 25 (choice 3 ).T his d evice i s an ISDN devic e, so
we will press 1 for “ISDN Information” from the Device Table Configuration Menu.
The ISDN Configuration Menu will then be displayed with the preconfigured default values:
Device ISDN Menu: (Device = "Mike Mann")
1) ISDN Line Protocol "PPP (Point to Point Protocol)"
2) Base Data Rate "64000 bps"
3) Initial Data Rate "64000 bps"
4) Maximum Data Rate "128000 bps"
5) Dial Out Phone Number(s) ""
6) Subaddress ""
7) Profile Name "Default_Profile"
8) H0 Call Support ENABLED
Select function from above or <RET> for previous menu:
We do not want to use th e default ISDN Line Protocol of PPP. Press 1 to configure this device’ s ISDN line protocol. The device Mike Mann uses HDLC protocol, so we will press 2:
Device ISDN Line Protocol Menu: (Device = "Mike Mann")
1) PPP (Point to Point Protocol)
2) HDLC Bridge
3) IP Host (RFC1294)
Select option to associate with device "Mike Mann", or "0" to disable ISDN access for this device [default = 1]? 2
Small Office Remote Access Switch 25
The only other item on the Device ISDN Line Protoc ol Menu that this type of device needs is the maximum data rate. We will accept the default value of 128,000 bps. No changes are required. Return to th e Device Tab le Menu.
At the Device Table Menu, press 4 to enter the authe ntication information needed for th is device. The authentication information needed for each device depends on the device type.
For device “Mike Mann,” we opt to configure a bridge Ethernet address (000123456789), we will assign a bridge password (JXF30), and configure a first and second calling line Id. After the device authentication has been entered for device “Mike Mann,” the screen will appear as follows:
Device Authentication Menu: (Device = "Mike Mann")
PPP:
1) PAP Password ""
2) CHAP Secret ""
3) Outbound Authentication ENABLED
4) User Level Authentication DISABLED
IP Host (RFC 1294):
5) IP Host Id ""
HDLC Bridge:
6) Bridge Ethernet Address "000123456789"
7) Bridge Password "JXF30"
ISDN:
8) Calling Line Id(s) "13135551212" "13135552121"
Select function from above or <RET> for previous menu:
Next, enter the device info rma ti on for Pat Smit h. Th is dev ice is also an HDLC bridge , and is configured using the same type of authentication as device Mike Mann, except we will configure no password for device Pat Smith . Enter 003456789000 for th e bridge Ethernet address, 13135556789 for the first calling line Id, and 13135559876 for the second calling line Id.
The following screen will be displayed after information for both devices in our network has been entered:
CURRENT DEVICE TABLE (Sorted by Device Name in Ascending ASCII Order)
id Device Name
---------------------------­1 "Mike Mann" 2 "Pat Smith"
(1) Add, (2) Change, (3) Delete, (4) Display a Device or press <RET> for previous menu?
26 CyberSWITCH

SAVE CONFIGURATION FILES

We have now configured all of the required information for a bridged system with Calling Line Id Security and Bridge MAC Add ress Sec urit y enable d. Pr ess 4 at the Mai n menu t o save th e changes. The old configuration files w ill be stored in the \CON FIG direc tor y with a file extensio n of .BAK (e.g., the old NODE.NEI file will be called NODE.BAK).
After you sa ve the configu ration files, press <RET > to exit the CFGEDIT program. Re boot the system to a ctivate your changes.
VERIFY THE INSTALLATION
Steps on how to verify the installation are detailed in the System Verification chapter of the User’s Guide. This section gives an outline of which steps should be executed.
On the CyberSWI TCH:
Verify hardware resources are operational
Issue
dr
Look for BRI messages
Look for LAN initialized messages Verify WAN Lin es Av ai lab le
Connect WAN lines
Issue
dr
Look for “Data Link up 1,1” in reports
command
command
R
EMOTE BRIDGING NETWORK WITH SECURITY

Verify the Installation

On eac h HD LC Bridge LAN:
Attempt ac cessing a re source on the Cy berSWITCH LAN. Th is may require th at you reboot your system and proceed through the logon sequence.
Small Office Remote Access Switch 27
IP R
OUTING NETWORK

OVERVIEW

This sample network has an IP network with devices accessing the network f rom their homes.

INITIAL INSTALLATION STEPS

The initial steps in the CyberS WIT CH insta llati on process ar e basica lly the same no matt er how complicated the network. These steps are:
completing the requirement worksheets
•ordering ISDN service
powering on the system
accessing Release Notes
connecting an administrati on console
setting up Telnet access
upgrading syste m s of t wa re
changing defaults to secure system
returning configuration to factory defaults
The chapt e rs Accessing the CyberSWITCH and Upgrading System Software (in the User’s Guide)
describe these step s in detail.
Worksheets for this network are included on the next few pages.
IP R
OUTING NETWORK
Initial Installation Steps
NETWORK TOPOLOGY
LAN 131.1.0.0
PC
SITE: San Fran
Host
File Server
BRI
BRI
BRI
ISDN
Router 1 131.1.1.16
128.1.1.1
WAN Interface 192.1.1.1
BRI
BRI
128.1.1.16
Host
192.1.1.2 Rick Bear
Host
192.1.1.3
Victoria Moose
Host
128.1.1.3
Todd Jones
128.1.1.2 Jill Smith
Small Office Remote Access Switch 29

SYSTEM DETAILS

System Name:
IP Network
PAP Password:__________ _____ CHAP Se cret: __________ ______ ___

RESOURCES

Type Slot Switch type Synchronization type
BRI 1 Ethernet_1 3

LINES

BRI Lines
Name Slot Port Line type Call screen TEI SPID Di rectory number
line1 1 1 Auto
NTT
30 CyberSWITCH
Loading...
+ 76 hidden pages