Only qualified personnel should perform installation
!
CAUTION
procedures.
NOTICE
You may post this document on a network server for public use as long as no
modificati ons are ma de to th e docume n t .
Cabletron Systems reserves the right to make changes in specifications and other
information contained in this document without prior notice. The reader should in
all cases consult Cabletron Systems to determine whether any such changes have
been made.
The hardware, firmware, or software described in this manual is subject to change
without notice.
IN NO EVENT SHALL CABLETRON SYSTEMS BE LIABLE FOR ANY
INCIDENTAL, INDIRECT, SPECIAL, OR CONSEQUENTIAL DAMAGES
WHATSOEVER (INCLUDING BUT NOT LIMITED TO LOST PROFITS) ARISING
OUT OF OR RELATED TO THIS MANUAL OR THE INFORMATION
CONTAINED IN IT, EVEN IF CABLETRON SYSTEMS HAS BEEN ADVISED OF,
KNOWN, OR SHOULD HAVE KNOWN, THE POSSIBILITY OF SUCH
DAMAGES.
Cabletron Systems, Inc.
P.O. Box 5005
Rochester, NH 03866-500 5
Order Number:9032448
VIRU S D ISCLAIMER
Cabletron Systems has tested its software with current virus checking
technologies. H owev er, because no anti-vir us sy stem is 100% reliabl e, we strongly
cauti on you to wr ite pro tect and th en verif y that th e Licen sed Sof tware, pr ior to
installing it, is virus-free with an anti-viru s system in which yo u have confi denc e.
Cabletron Systems makes no representations or warranties to the effect that the
Licensed Software is virus-free.
Cabletron Systems, CyberSWITCH, MMAC-Plus, SmartSWITCH, SPECTRUM,
and SecureFast Virtual Remote Access Manager are trademarks of Cabletron
Systems, Inc.
All other product names m entioned in this manual are tradema rks or registered
trademarks of their re sp e ctive companies.
COPYRIGHTS
All of the code for this product is copyright ed by Cable tron System s , Inc.
Portio ns of the code for this p roduct are co pyrighted by the follow ing corpor ations:
Epilogue Technolo gy Co rporat io n
Copyright 1991-1993 by Epilogue Technology Corporation. All rights reserved .
Livingston Enterprises, Inc.
Copyright 1992 Livingston Enterprises, Inc.
Security Dynamics Technologies Inc.
Copyright 1995 by Security Dynamics Technologies Inc. All rights reserved.
Stac El e c troni cs
Stac Electronics 1993, including one or more U.S. Patents No. 4701745, 5016009,
5126739 and 5146221 and other pending patents.
Telenetw orks
Copyright 1991, 92, 93 by Telene tworks. All rights reser ved .
FCC NOTICE
This device complies with Part 15 of th e FC C rules. Operation is subject to the
following two conditions: (1) this d e vice m ay no t cause har mful interference, and
(2) this device must accept any int erference received, includ ing interference that
may caus e undesire d o pe ra ti on.
NOTE: This equipment has been tested and found to comply with the limits for a
Class A digital device, pursuant to Part 15 of the FCC rules. These limits are
designed to provide reasonable protection against harmful interference when the
equipment is operated in a commercial environment. This equipment uses,
generates, and can radiate radio frequency energy and if not installed in
accordance with the operator’s manual, may cause harmful interference to radio
communications. Operation of this equipment in a residential area is likely to cause
interference in which case the user will be required to correct the interference at his
own expense.
Small Office Remote Access Switch 3
EXAMPLE NETWORKS
WARNING : Changes or modific ations made to this d evice wh ich ar e not expr essly
approved by the party responsible for compliance could void the user’s authority
to operate the equipment.
DOC NOTICE
This digital apparatus do es not exceed the Class A limits for radio noise emissions
from digital apparatus set out in the Radio Interference Regulations of the
Canadian Departme nt of Commun ications.
Le présent appareil numérique n’émet pas de bruits radioélectriques dépassant les
limites applicables aux appareils numériques de la class A prescrites dans le
Règlement sur le brouillage radioélectrique édicté par le ministère des
Communicatio ns du Cana d a.
VCCI NOTICE
This is a Class 1 product based on the standard of the Voluntary Control Council
for Interference by Information Technology Equipment (VCCI). If th is equipment
is used in a domestic environment, radio disturbance may arise. When such
trouble occurs, th e user may be requir e d to take correc tive actions.
CABLETRON SYSTEMS, INC. PROGRAM LICENSE AGREEMENT
IMPORTANT: Before utilizing this product, carefully read this License Agreement.
This document is an agreement between you, the end user, and Cabletron Systems,
Inc. ("Cabletron") that sets forth your rights and obligations with respect to the
Cabletron software program (the "Program") contained in this package. The
Progra m may be contai ned in fi rmware, ch ips or ot her media. BY UTILIZ ING THE
ENCLOSED PRODUCT, YOU ARE AGREEING TO BECOME BOUND BY THE
TERMS OF THIS AGREEMENT, WHICH INCLUDES THE LICENSE AND THE
LIMITATION OF WA RRANTY A ND DISCLAIMER O F LIABILITY. IF YOU DO
NOT AGREE TO THE TERMS OF THIS AGREEMENT, PROMPTLY RETURN
THE UNUSED PRODUCT TO THE PLACE OF PURCHASE FOR A FULL
REFUND.
Bridging 11
IP Routing 11
Configure the CyberSWITCH 12
Save Configuration Files 15
Verify the Installation 16
Remote Bridging Network with Security 17
Overview 17
Initial Installation Steps 17
Resour ce s 19
Lines 19
Device Information 20
Bridging and Routing Info rm ation 22
Bridging 22
IP Routing 22
Configure the CyberSWITCH 23
Configuring the Options 23
Configuring the Security 24
Save Configuration Files 27
Verify the Installation 27
IP Rout in g Network 28
Overview 28
Initial Installation Steps 28
System Details 30
Resour ce s 30
Lines 30
Device Information 31
Device Information 33
Bridging and Routing Info rm ation 35
Bridging 35
IP Routing 35
Configure the CyberSWITCH 36
Configuring the Cybe rSW ITCH Options 36
Configuring the Security 40
Save Configuration Files 43
Verify the Installation 44
Small Office Remote Access Switch 5
EXAMPLE NETWORKS
IP Routing Network with Remote Bridge Devices 45
Overview 45
Business A ssu mp tions 45
Initial Installation Steps 45
Resour ce s 47
Lines 47
Device Information 48
Bridging and Routing Info rm ation 50
Bridging 50
IP Routing 50
Configure the CyberSWITCH 51
Configuring the Cybe rSW ITCH Options 51
Configuring the Security 54
Verify the Installation 57
IP Routing Network with PPP Devices 58
Overview 58
Initial Installation Steps 58
System Details 60
Resour ce s 60
Lines 60
Bridging and Routing Info rm ation 61
Bridging 61
IP Routing 61
Bridging and Routing Info rm ation 62
Bridging 62
IP Routing 62
Device Information 63
Configure SITE1 65
Configur ing the Syste m Op tions 65
Finishi ng the Security Con f iguration 73
Configure SITE2 74
Configurin g SITE2 Options 74
Configuring Security 75
Save Configuration Files 75
Verify the Installation 75
IPX Routing Ne tw ork 77
Overview 77
Business A ssu mp tions 77
Initial Installation Steps 77
System Details 79
Resour ce s 79
Lines 79
Device Information 80
Bridging and Routing Info rm ation 83
Bridging 83
IP Routing 83
IPX Routing 84
6 CyberSWITCH
Configure IPX Routing: Masternet (Detroit) 85
Configure Devices 85
Configure Sy ste m Options 87
Save Configuration Files 92
Configure the Remote Devices 92
Verify the Installation 92
AppleTalk Routing Netwo rk 93
Overview 93
Initial Installation Steps 93
Resour ce s 95
Lines 95
AppleTalk Routing 96
Configure the CyberSWITCH 98
Configuring the Options 98
Configuring Device Inform a tion 101
Configuring an AppleTalk Static Route 104
Save Configuration Files 105
Verify the Installation 105
Index 106
Small Office Remote Access Switch 7
E
XAMPLE NETWORKS
We provide se ver al exam ple n etwork s , beg inni ng wit h a simpl e net work and progre ssi ng t o more
complex networks. You m ay find t he c onfigurati on instruc tions pr ovided fo r each example helpful
when configuring your own network.
We inc l u de th e f ollowi ng cha p te r s:
•Simple Remote Bri dgin g Network
An example of a s imple netwo rk u sing re mote bri dge d ev ices to acce ss a C ybe rSWI TCH’s f our
basic rate lines.
•Remote Bridg i ng Network with Security
A bridged network with Cal ling Line Id secu rity and Bridge MAC Address security enabled.
The network is configured with two devices. One device will be configured to require a Bridge
MAC Address security password, and one device will not. This network uses BRI lines.
•IP Routing Network
An IP routing network with devices accessing the network f rom their homes.
•IP Routing Network with Remote Bridge Devices
A smart brid g in g interface to allow the two remote bridge devices t o connect to an IP subnet.
The CyberSWITCH treats these devices connected to the Smart Bridging network interface as
if they were connected to the same Ethernet segment.
•IP Routin g Netwo rk w i th PP P Dev ices
Uses IP routing to connec t two of our products, both using PPP. Each sys tem is on a separat e
LAN. The configura tion for this network i s designed to allow th ree different types of accesse s.
•IPX Routing Network
A sample netw ork usi ng IPX p rotoc ol to c omm unic ate with r emot e br idge s as we ll as a r emot e
IPX router.
•AppleTalk Network
An Appl e T alk ne tw o r k ma de up of tw o L ANs, se parated by the W A N.
S
IMPLE REMOTE BRIDGING NETWORK
OVERVIEW
This chapter provides an example of a simple network using remote bridge devices to access four
basic rate lines in the CyberSWITCH. Bridges are formed between each of the LANs to which the
remote bridge device s are connected, and the LAN to which the Cyb erSWITCH is connected.
The following section provides the initial installation steps that would be used with any type of
network in stallation.
INITIAL INSTALLATION STEPS
The initial steps in the CyberS WIT CH insta llati on process ar e basica lly the same no matt er how
complicated the network. These steps are:
•completing the requirement worksheets
•ordering ISDN service
•powering on the sy stem
•accessing Release Notes
•connecti ng an administration console
•setting up Telnet access
•upgrading syste m s of t wa re
•changing defaults to secure system
•returning configuration to factory defaults
The chapt e rs Accessing the CyberSWITCH andUpgrading System Software (in the User’s Guide)
describe each of these steps in detail.
Worksheets for this network are included on the next few pages.
CONFIGURINGTHE SIMPLE REMOTE BRIDGE
Because this is a simple bridged network, you only need to fill out the System Details and Bridging
and Routing Information worksheets. The worksheets for Example 1 are on the following pages.
EXAMPLE NETWORKS
SYSTEM DETAILS
System Name:
SITE1
PAP Password:_______________ CHAP Secret:___________________
RESOURCES
TypeSlot Switch typeSynchronization type
BRI15ESS
Ethernet_12
LINES
BRI Lines
NameSlotPortLine typeCall screenTEISPIDDi rectory number
Line111PPPAuto
PRI Lines
NameSlotPortFraming typeLine coding Sig. methodLine build-out
V.35 and RS232 Lines
NameSlotPortDevice/Net wo rkIdle character
10 CyberSWITCH
BRIDGING
BRIDGINGAND ROUTING INFORMATION
S
IMPLE REMOTE BRIDGING NETWORK
Bridging and Routing Information
Bridging
Mode of Operation❒ restricted ❒ unrestricted
Bridge Filters
Bridge Dial Out/
Known Connect List
IP ROUTING
IP Routin g
Mode of Operation❒ router
Network Interface Information
LANName
Unnu m b e red W A N❒ need
Remote LANName
Tradition al WANName
Direct Host WANName
IP Host ModeIP address
X
enabled ❒ disabled
X
enabled ❒ disabled
X
IP host
IP address
Mask
❒ don’t need
IP address
Mask
IP address
Mask
IP address
Mask
Mask
192.42.1.6192.42.1.7
Static Routes
Destination network addressMaskNext hop
❒ default?
❒ default?
❒ default?
❒ default?
Small Office Remote Access Switch 11
EXAMPLE NETWORKS
CONFIGURETHE CYBERSWITCH
Using CFGEDIT, we will guide you through the steps to configure the CyberSWITCH for a simple
remote bridge network. We will execute these steps in the same order as they appear in the
configuration menus.
Start the CFGEDIT configura tion utility . Type the foll owing comm a nd at the system prom p t:
cfgedit
The following Main Menu will then be displayed:
Main Menu:
1) Physical Resources
2) Options
3) Security
4) Save Changes
Select function from above or <RET> to exit:
<return>
C
ONFIGURINGTHE PHYSICAL RESOURCE INFORMATION
We start with confi guring the P hysical Resou rce information. Pr e ss 1 at the Main Menu to display
the Physical Resource Configuration Menu:
Physical Resource Menu:
1) Resources
2) Data Lines
3) Access
4) ISDN Subaddress
Select function from above or <RET> for previous menu:
You may only configure th e switch type. The rest of the resource information may only be
displayed.
We will next add the line in formation . Press 2 at the Physic al Resour ces Menu and pres s 1 to add a
line. First, you will be prompted for the line name. You will then be asked to select which slot and
port you wish to use. We will use LINE1 as the line name, and slot 1, port 1 as the slot and port
You will then be prompted for the line interface type. For our example, we will be using point-to-
point lines. Press 1 as shown below to select this line type.
12 CyberSWITCH
S
IMPLE REMOTE BRIDGING NETWORK
Bridging and Routing Information
LINE TYPE = BR_ISDN
1) POINT_TO_POINT
2) POINT_MULTIPOINT
Select Option [default = POINT_TO_POINT] or press <RET> for previous menu: 1
The next item th at you need to c onfigure is the Dat a Link for t he line. Depending on the switch type,
there may be more than one Data Link per line. In our ex ample, we use one Data Link with
Automatic TEI Negotiat ion:
Current DATA LINK Configuration for this line:
id TEI
-- ----
There are currently no Data Links configured for this line.
Enter (1) to Add or press <RET> for previous menu: 1
Automatic TEI Negotiation (Y or N) [default = Y]? Y
Current Data Link Configuration for this line:
id TEI
-- ----
1 AUTO
(1) Add, (2) Change, (3) Delete a DATA LINK or press <RET> for previous menu? <RET>
After entering the above information, press <return> to display the lin e menu.Press <return> twice
to retu rn to th e Main Me nu .
C
ONFIGURINGTHE OPTIONS
The default configuration for the CyberSWITCH is bridging disabled and IP routing enabled. For
reasons we provide below, we want both bridging and IP routing enabled. Under the Option Menu,
select the bridging option and follow the instructions to enable bridging.
This network is a bridged network, but we are going to configure an IP option (the IP host operating
mode) so that we may use an IP application (such as Telnet, TFTP, or SNMP) to manage the
CyberSWITCH. Refer to the graphic below for clarification.
Small Office Remote Access Switch 13
EXAMPLE NETWORKS
CSX150
ISDN
CSX150
"SITE2"
IP Host Interface
192.42.1.7
192.42.1.0
Telnet Client
"SITE1"
IP Host Interface
192.42.1.6
The network illustrated above is a bridged network. Each system, SITE1 and SITE2 have been
configured with all the necessar y bridging informati on. SITE1 and S ITE2 have also been configured
in the IP host operating mode, and each have an IP host interface. This will allow each system to be
managed remotely by the PC using Telnet client software (once the initial configuration has been
completed).
Note that th e IP add ress associated with each sys te m is on the same LAN as the PC. This does not
have to be the case. As long as the P C h a s access to the systems thro u gh their IP addresses, it can
manage the systems using Telnet (or one of the oth e r IP applicati ons).
The steps below describe the configuration steps needed for the above example:
To enable the IP Host Operat ing Mode:
1.Select IP Operating Mode fr om the IP configuration menu.
2.Select IP host operating mode.
Note:The IP operating mode can not be set to host unless bridging is enabled.
3.When you select the IP host operating mode, an abbreviated IP configuration will be displayed
(similar to the following ):
IP Menu:
1) IP Routing (Enable/Disable)
2) IP Operating Mode
3) IP Interfaces
4) IP Static Routes
5) RIP (Enable/Disable)
6) IP Static ARP Table Entries
7) Isolated Mode (Enable/Disable)
8) Static Route Lookup via RADIUS (Enable/Disable)
9) IP Address Pool
10) IP Filter Information
11) DHCP Information
Select function from above or <RET> for previous menu:
14 CyberSWITCH
S
IMPLE REMOTE BRIDGING NETWORK
Bridging and Routing Information
To configure the IP host interface:
1.Select IP Interfaces from the IP configuratio n men u.
2.Select to add an interface.
3.Enter the IP address assigned to this interface. For SITE1, this is 192.42.1.6; for SITE2, this is
192.42.1.7.
4.Enter the subne t mask.
5.Ent e r the MT U size.
6.Select the transmit broad cast address.
If IP RIP is enabled, enter the following additional inf orm ation:
7.IP RIP receive control.
8.IP RIP respond con trol.
9.IP RIP v2 authentication control.
10. IP RIP v2 auth e ntication key (required only if the IP RIP v2 authentication control has been
config u r e d wi th a value other tha n “No Au thenticatio n.“
For more detailed information on the IP host operating mode, refer to the IP Operating Mode section
in the Configuring Basic IP Routing chapter of the User’s Guide.
C
ONFIGURINGTHE SECURITY
For this network configuration, we require no security. The default configuration is device security
enabled. To make the required configuration change, select Security from the Main Menu. Then
select Security Level. Finally, select No Security.
SAVE CONFIGURATION FILES
We have now configured all of the required information. Press 4 from the Main menu to save the
changes and then press <RET> to exit. Reboot the system to activate your changes.
Small Office Remote Access Switch 15
EXAMPLE NETWORKS
VERIFYTHE INSTALLATION
Steps on how to verify the installation are detailed in the System Verification chapter of the User’s
Guide. This section gives an outline of which steps should be executed.
On the CyberSWI TCH:
Verify resources are operational
Issue
dr
Look for BRI lin e me ssages
Look for LAN initialized messages
Look for Bridge initializ ed mes s age s
Verify WAN Lin es Av ai lab le
Connect WAN lines
Issue
dr
Look for “Data Link up 1,1” in reports
On each Combinet LAN:
Attempt accessing a resource on the system LAN. This may require that you reboot y ou r machine
and proceed through the logon sequence.
command
command
16 CyberSWITCH
R
EMOTE BRIDGING NETWORK WITH SECURITY
OVERVIEW
This example network is a bridged network with Calling Line Id security and Bridge MAC Address
security enabled. The network is configured with two devices. One device will be configured to
require a Bridge MAC Address security password, and one device will not. This network uses BRI
lines.
Worksheets for this network are included on t he following pages.
Note that a Hunt Group i s used for the BRI lines pictured in the Network Topology Worksheet.
Remote devi ce s wil l then on ly nee d to con fig ure on e tel ephon e numbe r (t he Hunt Group n umber)
for the CyberSWITCH instead of all four phone numbers. If the first line is busy, the next line is
automatically used, and so on until a free line is found. A Hunt Group number can be arranged
through your Service Provider.
INITIAL INSTALLATION STEPS
The initial steps in the CyberS WIT CH insta llati on process ar e basica lly the same no matt er how
complicated the network. These steps are:
•completing the requirement worksheets
•ordering ISDN service
•powering on the system
•accessing Release Notes
•connecting an administrati on console
•setting up Telnet access
•upgrading syste m s of t wa re
•changing defaults to secure system
•returning configuration to factory defaults
The chapt e rs Accessing the CyberSWITCH andUpgrading System Software (in the User’s Guide)
describe each of these steps in detail.
Worksheets for this network are included on the next few pages.
PAP Password:____________ ___ CHAP Secret:_____ ______________
RESOURCES
Type
BRI1NI-1
Ethernet_12
Slot Switch typeSynchronization type
LINES
BRI Lines
NameSlotPortLine typeCall
screen
Line111PPPAuto313555111113135551111*
TEISPIDDirectory
313555111213135551112*
number
* Hunt Group Number: 13135551111
Small Office Remote Access Switch 19
EXAMPLE NETWORKS
DEVICE INFORMATION
Devi ce N ame:
Mike Mann
Calling (ISDN, FR, etc.) Information X.25 Information
Line Protocol
Base Data RateSVC
Initial Data Rate
Max Data Rate
Dial-Out Number(s)
Authentication Information
PAP PasswordDLCI
CHAP Secret
IP Host ID
Bridge Ethernet Address*
Bridge Password*
CLID(s)
* HDLC Bridge only
Protocol fo r th is pa rt ic ul a r devi ce?
HDLC bridge
:
PVC
Frame Relay Information
000123456789
JXF30
1313555121213135552121
Bridge IP
Bridging enabled?❒ enabled ❒ disabled IP enabled?❒ enabled ❒ disabled
Make calls
for bridged data?
For IP RLAN, IP (Sub-)
network number
For IPX RLAN, external
network number
❒ enabled ❒ disabled IP Address
(on WAN link)
Make calls f or IP data?❒ enabled ❒ disabled
❒ 0.0.0.0 if
unnumbered link
IPX AppleTalk
IPX enabled?❒ enabled ❒ disabled AppleTalk enabled?❒ enabled ❒ disabled
Callable by IPX?❒ enabled ❒ disabled AppleTalk Address
IPXWAN protocol?❒ enabled ❒ disabled Make calls f o r
AT data?
IPX routing protocol?
IPX spoofing?
❒ none❒ RIP/SAP
❒ triggered RIP/SAP
AT Routing Protocol
❒ enabled ❒ disabled
20 CyberSWITCH
R
EMOTE BRIDGING NETWORK WITH SECURITY
DEVICE INFORMATION
Device Information
Devi ce N ame:
Pat Smith
Calling (ISDN, FR, etc.) Information X.25 Information
Line Protocol
Base Data RateSVC
Initial Data Rate
Max Data Rate
Dial-Out Number(s)
Authentication Information
PAP PasswordDLCI
CHAP Secret
IP Host ID
Bridge Ethernet Address*
Bridge Password*
CLID(s)
* HDLC Bridge only
Protocol fo r th is pa rt ic ul a r devi ce?
HDLC bridge
:
PVC
Frame Relay Information
003456789000
1313555678913135559876
Bridge IP
Bridging enabled?❒ enabled ❒ disabled IP enabled?❒ enabled ❒ dis abled
Make calls
for bridged data?
For IP RLAN, IP (Sub-)
network number
For IPX RLAN, external
network number
❒ enabled ❒ disabled IP Address
(on WAN link)
Make calls f or IP data?❒ enabled ❒ disabled
❒ 0.0.0.0 if
unnumbered link
IPX AppleTalk
IPX enabled?❒ enabled ❒ disabled AppleTalk enabled?❒ enabled ❒ disabled
Callable by IPX?❒ enabled ❒ disabled AppleTalk Address
IPXWAN protocol?❒ enabled ❒ disabled Make calls f o r
AT data?
IPX routing protocol?
IPX spoofing?
❒ none❒ RIP/SAP
❒ triggered RIP/SAP
AT Routing Protocol
❒ enabled ❒ disabled
Small Office Remote Access Switch 21
EXAMPLE NETWORKS
BRIDGING
Bridging X enabled ❒ disabled
Mode of Operation❒ restricted ❒ unrestricted
Bridge Filters
Bridge Dial Out/
Known Connect List
IP ROUTING
BRIDGINGAND ROUTING INFORMATION
IP Routin g
Mode of Operation❒ router ❒ IP host
Network Interface Information
LANName
Unnu m b e red W A N❒ need
Remote LANName
Tradition al WANName
Direct Host WANName
IP Host ModeIP address
X
enabled ❒ disabled
IP address
Mask
❒ don’t need
IP address
Mask
IP address
Mask
IP address
Mask
Mask
Static Routes
Destination network addressMaskNext hop
22 CyberSWITCH
❒ default?
❒ default?
❒ default?
❒ default?
CONFIGURETHE CYBERSWITCH
Note:We are assuming that the softwar e ha s al ready been installed and is running. Be sure you
are working from the system prompt.
Using the detailed instructions for these steps found in the Simple Remote Bridging chapter,
complete the following configurat ion step s.
Start the Run-Time CFGEDIT program
Select physical resources
Select to add a resource
Select Switch type to be NI-1
Select to add a line
Enter the line name
Select slot and port numbers
Select line interface type of “P oint-to-Point”
Add Data Links (Data Link explanati on follows)
Choose Auto TEI Neg otiation
Enter Service Profile ID (SPID) Value
Enter Directory Number for Data Link
Enter Maximum Number of Digits to Verify
Repeat “Add Data Links” for second Data Link
Repeat “Select to add a line” for each additional line
R
EMOTE BRIDGING NETWORK WITH SECURITY
Configure the CyberSWITCH
Data links are handled differently on a NI-1 switch. Some BRI lines have only one phone number
(for the Data Link), but can handle two calls (one for each bearer channel). For NI-1 switches, the
BRI line has two phone numbers (one for each bearer channel), and each phone number has it s own
SPID. You must enter the number of d igits to verify, so that when the system receives a phone ca ll
it can determine on which bearer to accept the phone call. Refer to the System Details worksheet for
the SPIDs, directory n umbers, and the number of digits to verify.
CONFIGURINGTHE OPTIONS
The default configuration for the CyberSWITCH is bridging disabled and IP routing enabled. For
reasons we provide below, we want both bridging and IP routing enabled. Under the Option Menu,
select the bridging option and follow the instructions to enable bridging.
This network is a bridged network, but we are going to configure an IP option (the IP host operating
mode) so that we may use an IP application (such as Telnet, TFTP, or SNMP) to manage the
CyberSWITCH. This process was described in the previous chapter (page 13) and will not be
repeated here.
Small Office Remote Access Switch 23
EXAMPLE NETWORKS
CONFIGURINGTHE SECURITY
This network has remote devices, and the device informat ion for each of those devices must be
configured. Device security is used, and th e remote devices are configured in th e on-node
authentication data base. Device secu rity using a on-node authent ic a tion database are the default
values.
To begin the security configuration, press 3 at the Main CFGEDIT Menu. The Security Menu will
then be displayed as follow s :
Security Menu:
1) Security Level
2) System Options and Information
3) Device Level Databases
4) User Level Databases (Enable/Disable)
5) Off-node Server Information
6) Network Login Information
Select function from above or <RET> for previous menu:
C
ONFIGURINGTHE SECURITY LEVEL
From the Security Menu, press 1, Security Level. Then press 2 to enable Device Level Security:
Security Level Menu:
1) No Security
2) Device Level Security
3) User Level Security
4) Device and User Level Security
Select function from above or <RET> for previous menu:
After enabling Device Level S e curity, return to the Security Menu .
C
ONFIGURINGTHE SYSTEM OPTIONSAND INFORMATION
The default configuration for System Options is all security options enabled, which is acceptable
for this network. No Sys te m Information or Administration Sessions are required. Theref ore, no
changes are n ecessary.
C
ONFIGURINGTHE DEVICE LEVEL DATABASE
From the Secu rity Menu, press 3 to displa y the Device Level Database Menu . To enable the Onnode Device Database, press 1 and follow th e on-screen instruct ions:
Device Level Databases Menu:
1) On-node Device Database (Enable/Disable)
2) On-node Device Entries
3) Off-node Device Database Location
Select function from above or <RET> for previous menu:
24 CyberSWITCH
R
EMOTE BRIDGING NETWORK WITH SECURITY
Configure the CyberSWITCH
Press 2 to configure the information for our f irst device, Mike Mann. Press 1 to add a device. You
will first be asked to enter the Device Name:
Device Name? Mike Mann
After the new device name has been specified, a screen similar to the following is displayed.
Device Table Menu: (Device = "Mike Mann")
1) ISDN
2) Frame Relay
3) X.25
4) Authentication
5) IP
6) IPX
7) AppleTalk
8) Bridging
9) POTS
10) Compression
Select function from above or <RET> for previous menu:
Information for the new device may be configured in any order. You have control over how much
information is specified for each device, and the order in which it is entered.
We will begin by specifying the type of device. We need to determine if the device will use ISDN
Line Protoc ol (choic e 1), Frame Relay (choic e 2) , or X. 25 (choice 3 ).T his d evice i s an ISDN devic e, so
we will press 1 for “ISDN Information” from the Device Table Configuration Menu.
The ISDN Configuration Menu will then be displayed with the preconfigured default values:
Device ISDN Menu: (Device = "Mike Mann")
1) ISDN Line Protocol "PPP (Point to Point Protocol)"
2) Base Data Rate "64000 bps"
3) Initial Data Rate "64000 bps"
4) Maximum Data Rate "128000 bps"
5) Dial Out Phone Number(s) ""
6) Subaddress ""
7) Profile Name "Default_Profile"
8) H0 Call Support ENABLED
Select function from above or <RET> for previous menu:
We do not want to use th e default ISDN Line Protocol of PPP. Press 1 to configure this device’ s
ISDN line protocol. The device Mike Mann uses HDLC protocol, so we will press 2:
Device ISDN Line Protocol Menu: (Device = "Mike Mann")
1) PPP (Point to Point Protocol)
2) HDLC Bridge
3) IP Host (RFC1294)
Select option to associate with device "Mike Mann",
or "0" to disable ISDN access for this device [default = 1]? 2
Small Office Remote Access Switch 25
EXAMPLE NETWORKS
The only other item on the Device ISDN Line Protoc ol Menu that this type of device needs is the
maximum data rate. We will accept the default value of 128,000 bps. No changes are required.
Return to th e Device Tab le Menu.
At the Device Table Menu, press 4 to enter the authe ntication information needed for th is device.
The authentication information needed for each device depends on the device type.
For device “Mike Mann,” we opt to configure a bridge Ethernet address (000123456789), we will
assign a bridge password (JXF30), and configure a first and second calling line Id. After the device
authentication has been entered for device “Mike Mann,” the screen will appear as follows:
Select function from above or <RET> for previous menu:
Next, enter the device info rma ti on for Pat Smit h. Th is dev ice is also an HDLC bridge , and is
configured using the same type of authentication as device Mike Mann, except we will configure
no password for device Pat Smith . Enter 003456789000 for th e bridge Ethernet address,
13135556789 for the first calling line Id, and 13135559876 for the second calling line Id.
The following screen will be displayed after information for both devices in our network has been
entered:
CURRENT DEVICE TABLE (Sorted by Device Name in Ascending ASCII Order)
(1) Add, (2) Change, (3) Delete, (4) Display a Device or press <RET> for previous menu?
26 CyberSWITCH
SAVE CONFIGURATION FILES
We have now configured all of the required information for a bridged system with Calling Line Id
Security and Bridge MAC Add ress Sec urit y enable d. Pr ess 4 at the Mai n menu t o save th e changes.
The old configuration files w ill be stored in the \CON FIG direc tor y with a file extensio n of .BAK
(e.g., the old NODE.NEI file will be called NODE.BAK).
After you sa ve the configu ration files, press <RET > to exit the CFGEDIT program. Re boot the
system to a ctivate your changes.
VERIFYTHE INSTALLATION
Steps on how to verify the installation are detailed in the System Verification chapter of the User’s
Guide. This section gives an outline of which steps should be executed.
On the CyberSWI TCH:
Verify hardware resources are operational
Issue
dr
Look for BRI messages
Look for LAN initialized messages
Verify WAN Lin es Av ai lab le
Connect WAN lines
Issue
dr
Look for “Data Link up 1,1” in reports
command
command
R
EMOTE BRIDGING NETWORK WITH SECURITY
Verify the Installation
On eac h HD LC Bridge LAN:
Attempt ac cessing a re source on the Cy berSWITCH LAN. Th is may require th at you reboot
your system and proceed through the logon sequence.
Small Office Remote Access Switch 27
IP R
OUTING NETWORK
OVERVIEW
This sample network has an IP network with devices accessing the network f rom their homes.
INITIAL INSTALLATION STEPS
The initial steps in the CyberS WIT CH insta llati on process ar e basica lly the same no matt er how
complicated the network. These steps are:
•completing the requirement worksheets
•ordering ISDN service
•powering on the system
•accessing Release Notes
•connecting an administrati on console
•setting up Telnet access
•upgrading syste m s of t wa re
•changing defaults to secure system
•returning configuration to factory defaults
The chapt e rs Accessing the CyberSWITCH andUpgrading System Software (in the User’s Guide)
describe these step s in detail.
Worksheets for this network are included on the next few pages.
IP R
OUTING NETWORK
Initial Installation Steps
NETWORK TOPOLOGY
LAN 131.1.0.0
PC
SITE:
San Fran
Host
File Server
BRI
BRI
BRI
ISDN
Router 1131.1.1.16
128.1.1.1
WAN Interface 192.1.1.1
BRI
BRI
128.1.1.16
Host
192.1.1.2
Rick Bear
Host
192.1.1.3
Victoria Moose
Host
128.1.1.3
Todd Jones
128.1.1.2
Jill Smith
Small Office Remote Access Switch 29
EXAMPLE NETWORKS
SYSTEM DETAILS
System Name:
IP Network
PAP Password:__________ _____ CHAP Se cret: __________ ______ ___
RESOURCES
TypeSlot Switch typeSynchronization type
BRI1
Ethernet_13
LINES
BRI Lines
NameSlotPortLine typeCall screenTEISPIDDi rectory number
line111Auto
NTT
30 CyberSWITCH
Loading...
+ 76 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.