You may post this document on a network server for public use as long as no
modifications are ma de to th e do cu ment.
Cabletron Systems reserves the right to make changes in specifications and other
information contained in this document without prior notice. The reader should in
all cases consult Cabletron Systems to determine whether any such changes have
been made.
The hardware, firmware, or software described in this manual is subject to change
without notice.
IN NO EVENT SHALL CABLETRON SYSTEMS BE LIABLE FOR ANY
INCIDENTAL, INDIRECT, SPECIAL, OR CONSEQUENTIAL DAMAGES
WHATSOEVER (INCLUDING BUT NOT LIMITED TO LOST PROFITS) ARISING
OUT OF OR RELATED TO THIS MANUAL OR THE INFORMATION
CONTAINED IN IT, EVEN IF CABLETRON SYSTEMS HAS BEEN ADVISED OF,
KNOWN, OR SHOULD HAVE KNOWN, THE POSSIBILITY OF SUCH
DAMAGES.
Only qualified personnel should pe rform installation
procedures.
Cabletron Systems, Inc.
P.O. Box 5005
Rochester, NH 03866-500 5
Order Number: 9032187-02
VIRU S D ISCLAIMER
Cabletron Systems has tested its software with current virus checking
technologies. H owev er, because no anti-virus sy stem is 100% rel iable, we strongly
cauti on you to wr ite pro tect and th en verif y that th e Licen sed Sof tware, pr ior to
installing it, is virus-free with an anti-viru s system in which yo u have confi denc e.
Cabletron Systems makes no representations or warranties to the effec t that t he
Licensed Software is virus-free.
Cabletron Systems, CyberSWITCH, MMAC-Plus, SmartSWITCH, SPECTRUM,
and SecureFast Virtual Remote Access Manager are trademarks of Cabletron
Systems, Inc.
All other product names m entioned in this manual are tradema rks or registered
trademarks of their re sp e ctive companies.
COPYRIGHTS
All of the code for this product is copyright ed by Cable tron System s , Inc.
Portio ns of the code for this p roduct are co pyrighted by the follow ing corpor ations:
Epilogue Technolo gy Co rporat io n
Copyright 1991-1993 by Epilogue Technology Corporation. All rights res erv ed.
Livingston Enterprises, Inc.
Copyright 1992 Livingston Enterprises, Inc.
Security Dynamics Technologies Inc.
Copyright 1995 by Security Dynamics Technologies Inc. All rights reserved.
Stac El e c tronics
Stac Electronics 1993, including one or more U.S. Patents No. 4701745, 5016009,
5126739 and 5146221 and other pending patents.
Telenetw orks
Copyright 1991, 92, 93 by Telene tworks. All rights reserved.
FCC NOTICE
This device complies with Part 15 of the FCC r ules. Operation is subject to the
following two conditions: (1) this de vice m a y no t caus e ha r mful interference, and
(2) this device must accept any int erference received, includ ing interference that
may caus e undesired op e ra ti on.
NOTE: This equipment has been tested and found to comply with the limits for a
Class A digital device, pursuant to Part 15 of the FCC rules. These limits are
designed to provide reasonable protection against harmful interference when the
equipment is operated in a commercial environment. This equipment uses,
generates, and can radiate radio frequency energy and if not installed in
accordance with the operator’s manual, may cause harmful interference to radio
communications. Operation of this equipment in a residential area is likely to cause
interference in which case the user will be required to correct the interference at his
own expense.
Workgroup Remote Access Switch 3
USER’S GUIDE
WARNING : Changes or modific ations made to this d evice wh ich ar e not expr essly
approved by the party responsible for compliance could void the user’s authority
to operate the equipment.
DOC NOTICE
This digital apparatus do es not exceed the Class A limits for radio no ise emissions
from digital apparatus set out in the Radio Interference Regulations of the
Canadian Department of Communications.
Le présent appareil numérique n’émet pas de bruits radioélectriques dépassant les
limites applicables aux appareils numériques de la class A prescrites dans le
Règlement sur le brouillage radioélectrique édicté par le ministère des
Communicatio ns du Cana d a.
VCCI NOTICE
This is a Class 1 product based on the standard of the Voluntary Control Council
for Interference by Information Technology Equipment (VCCI). If th is equipment
is used in a domestic environment, radio disturbance may arise. When such
trouble occurs, the user may be required to take corrective actions.
CABLETRON SYSTEMS, INC. PROGRAM LICENSE AGREEMENT
IMPORTANT: Before utilizing this product, carefully read this License Agreement.
This document is an agreement between you, the end user, and Cabletron Systems,
Inc. ("Cabletron") that sets forth your rights and obligations with respect to the
Cabletron software program (the "Program") contained in this package. The
Progra m may be contai ned in fi rmware, ch ips or ot her media. BY UTILIZ ING THE
ENCLOSED PRODUCT, YOU ARE AGREEING TO BECOME BOUND BY THE
TERMS OF THIS AGREEMENT, WHICH INCLUDES THE LICENSE AND THE
LIMITATION OF WA RRANTY A ND DISCLAIMER O F LIABILITY. IF YOU DO
NOT AGREE TO THE TERMS OF THIS AGREEMENT, PROMPTLY RETURN
THE UNUSED PRODUCT TO THE PLACE OF PURCHASE FOR A FULL
REFUND.
4 CyberSWITCH
CONTENTS
Using this Guide 23
Documentation Set 24
Guide Conventions 25
SYSTEM OVERVIEW 26
The CyberSW ITCH 27
The Cybe rS W I TC H Ne t w or k 27
Unique System Featur es 28
Interoperability Overv iew 30
The CSX1000 and NE Link 1000 (a Network Express Product) 37
Platform Descri p tio n 3 8
System Characteristics 40
The CSX1200 42
Platform Descri p tio n 4 3
System Characteristics 43
Cabling Information 44
LAN Acces s 44
Back-to-Back Setup 45
WAN Acces s 46
Administration Console Access 47
System Modules 48
The CSX1200-E11-MOD 48
The CSX1200-U4-MOD 50
Software Overview 51
Overview 51
System software 51
System Files 51
Configuration Files 51
Operational Files 52
User Level Security Files 53
Workgroup Remote Access Switch 5
USER’S GUIDE
SYSTEM INSTALLATION 54
Orderi n g IS DN Service (U S On ly ) 56
Overview 56
Orde ring NI-1 Lines Using EZ-ISDN Codes 56
Orde ring NI-1 Lines Using NI-1 ISDN Ordering Co des 56
Ordering BRI ISDN Lines using Provisioning Settings 56
Provisioning Settings for AT&T 5ESS Switches 57
AT&T 5ESS NI-1 Service 58
AT&T 5ESS Custom Point-to-Point Service 59
Provision Sett ings for Northern Telecom DMS-100 Switches 60
Northern Telecom DMS100 NI-1 Service 60
Northern Telecom DMS100 Custom Service 61
Basic Inf o rm a tio n f or Ord e ring PRI ISDN Li nes 61
Hardware Installat ion 63
Pre-Installation Requirements 63
Installing the CSX1200-E11-MOD 64
Installing the CSX1200-U4-MOD 65
Cabling 66
Accessing the CyberSWITCH 67
Overview 67
Making Connections 67
Direct Co nne ction 67
Null-Modem Connection to a PC 67
Chan g i n g th e B a u d Rate 68
Remote Connec tion using Telnet 69
Remote Connection using a Modem 69
Establishing an Administration Session 70
Powering On 70
Accessing th e Re lease Notes 72
Upgrading System Software 73
Overview 73
Upgrading Software 73
CD File Structure 73
Local Software Upgrade 76
Local Upgrade of the Second Stage Boot (SSB) 76
Local Upgrade of the Operational Software (OSW) 77
Remote Software Upgrade 77
Remote Upgrade of the Second Stage Boot (SSB) 78
Remote Upgrade of the Operational Software (OSW) 79
Chan g e De faults to Se c u re S y stem 80
Return Conf iguration to Factory Defau lts 81
Accessing th e Re lease Notes 81
6 CyberSWITCH
BASIC CONFIGURATION 82
Configuration Tools 83
Overview 83
CFGEDI T 83
Executing CFG EDIT 83
Saving CFGEDIT Changes 84
Dynamic Management 84
Executing Dynamic Management 84
Utility Dynamic Management Commands 85
Saving Dynamic Managem e n t Changes 85
Default Configuration 86
Using the Network Worksheets 86
Using the Configuration Chap ters 87
Configuring Resources and Lines 88
Overview 88
Resources 88
Configuring Resour ces 88
Resource Configuration Elements 90
Resource B ackground Information 90
Lines 92
Configuring Line s 92
Configuring a Line for a BRI Resource 92
Configuring Changes for a COM M P O RT Res ou rc e 92
Configuring a Line for a PRI Resource 93
Line Configuration Elements 94
Line Background Information 98
Subaddresses 99
Configuring a Subaddress 99
Subaddress Configuration Elements 99
Subaddresses Background Information 99
Configuring Basic Bridging 100
Overview 100
MAC Layer Bridging Option 100
Enabling/Disabling Bridging 100
MAC Layer Bridging Configuration Elements 100
MAC Layer Bridging Background Info rma tion 101
Configuring Basic IP Rou ting 102
Overview 102
Interne t P rotocol (IP) Option 102
Enabling IP 102
IP Option Configurati on Elements 103
IP Background Information 103
IP Operating Mode 103
Configuring the IP Operating Mode 103
IP Operating Mode Configuration Elements 104
IP Operating Mode Background Information 104
Workgroup Remote Access Switch 7
USER’S GUIDE
IP Network Interf aces 105
Configuring Interfaces 105
Network Interface Configuration Elements 107
IP Network Inte rface Background Inform ation 112
IP RIP and the IP Network Interfaces 117
IP RIP over Dedicated Connections 120
IP Host Operating Mode and the IP Network Interfaces 122
Using Multiple IP Addres ses 122
Static Routes 124
Configuring Static Routes 124
Static Route Configurati on Elements 126
Static Route Background Information 128
Default Routes 129
Configuring Default Routes 129
Default Route Configuration Elements 129
Routing Information Protocol (RIP) Option 130
Enabling/Disabling IP RIP 130
IP RIP Configuration Elemen ts 131
IP RIP Background Information 131
SECURITY 132
Security Overview 133
Overview 133
Security Level 133
Syste m Options and I nf ormati o n 13 4
Device Level Databases 134
User Level Databases 135
Off-node Server Information 135
Network Login Information 135
Configuring Security Level 136
Overview 136
No Security 138
Configuring No Secur ity 138
Device Level Security 139
Configuring Device Level Security 139
Device Level Security Backgr ound Info rma ti on 139
Overvie w of Device Authe ntication Pr ocess 140
User Level Security 140
Configuring User Lev e l Securit y 140
User Level Security Backgr ou nd Info rma tion 140
Authentication Using a Security Token Card 141
System Requirements 142
Authenti cation Process with User Level Security 143
Device and User Level Security 144
Configuring Device an d Us er Level S ecur ity 14 4
Device and User Level Backgroun d In formation 145
8 CyberSWITCH
Configuring System Options and Information 146
Overview 146
System Options 146
Configuring System Options 146
Syste m Options Confi g uration El e m e n t s 147
System Options Background Information 149
System Information 150
Configuring Syst em Information 150
System Information Configuration Elements 150
System Information Background Information 151
Administ rative Session 151
Configuring Administrative Sessions 151
Administrativ e Sessio n Conf igur ation Ele m ent s 152
Administrative Session Background In formation 153
Alterna tive Database Location Background Inf o rmation 153
Session Inactiv i ty Background Information 153
Number of Administrative Telnet Sess ions Background Information 153
Telnet Server TCP Port Number Background Information 153
Emergency Telnet Server Port Number Background Information 154
Configuring Device Level Databas e s 15 5
Overview 155
On-node Devi ce Database 155
Configuring an On-node Device Database 155
On-node Device Entries 156
Configuring On-node Device Entries 156
On-node Dev ice Database Con f iguration El ements 163
General Configuration Ele m ent s 163
ISDN Configuration Elements 163
Frame Relay Access Configur ation Ele m ent s 165
X.25 Access Configur ation Elements 165
Authentication Configuration Elements 165
IP Information Configuration Elements 167
IPX Information Configur ation Elements 167
AppleTalk Information Configuration Elements 168
Bridge Information Co nfiguration Elements 169
Compression Configuration Elements 170
On-node Device Database Bac k ground Informat ion 170
On-node Dev ice Database Se cu rity Requirements 170
Off-node Device Database Location 174
Configuring Off-node Device Database Location 174
Off-node Device Database Location Configuration Elements 175
Off-node Device Database Location Background Information 175
Configuring User Level Databases 176
Overview 176
User Le vel Auth e nticati o n D a ta b a s e Lo c ation 176
Configuring Authentication Database Location 176
User Level Authen tica tion Datab as e Loc ation Co nfigur a tion Ele me nt s 177
User Level Authentication Database Location Background Inform ation 177
Workgroup Remote Access Switch 9
USER’S GUIDE
Configuring Off-node Server Information 178
Overview 178
Multiple Administration Login Names 178
VRA Manager Authentication Serve r 179
Configuring VRA Manager Authentication Server 179
VRA Manager Authentication Serve r Configuratio n Elements 180
VRA Manager Authentication Server Background Informati on 180
RADIUS Authe ntication Server 180
Configuring a RADIUS Authentication Server 180
RADIUS Authentication Se rver Configuration Elements 182
RADIUS Authentication Server Backgrou nd Information 182
TACACS Authenti cation Server 183
Configuring a TACACS Authentication Server 183
TACACS Authentication Server Configuration Elements 184
TACACS Authentication Server Background Informati on 184
ACE Authentication Server 185
Configuring an ACE Authenti cation Server 185
Alternate Method of Configurati on 186
ACE Authentication Server Configuration Elements 186
ACE Authentication Server Background Information 187
Configuring Network Login Infor mation 188
Overview 188
Network Login General Configuration 188
Configuring General Network Login Information 188
Network Login General Configuration Background Information 189
Network Login Banners 190
Configuring Netw ork Lo gin Banner s 190
Network Login Banners Background Information 190
Login Configuration Specific to RADIUS Server 191
Configuring RADIU S Serve r Login Info rma tion 191
Login Configuration Specific to RADIUS Server Background Information 192
Login Configuration Specif i c to TACAC S Serv er 192
Configuring TACACS Server Login Information 192
Login Configuration Specif i c to TACAC S Serve r Backg round Information 194
ADVANCED CONFIGURATION 195
Configuring Alternate Accesses 196
Overview 196
Dedi ca te d Access e s 1 9 6
Configuring a Dedicat ed Acc es s 196
Dedicated Access Config uration Elem ents 1 96
Dedicated Access Background Information 197
Configuring a PVC 210
Frame Relay General Configuration Elements 211
Frame Relay PVC Configuration Elements 212
Frame Relay Access Background Information 214
The Local Manageme nt Interface Overview 215
Data Rate Control Overview 215
Congestion Control Overview 216
Curren t Re strictions 216
Configuring Advanced Bridgin g 21 8
Overview 218
Bridge Dial Out 218
Configuring the Device List for Bridge Dial Out 219
Spanning Tr ee Protocol 220
Configuring Spanning Tree Protocol 220
Spanning Tree Protocol Co nfigura tion Elem e nts 220
Bridge Mode of Operation 220
Configuring the Bridge Mode of Operation 220
Bridge Mode of Opera tion Co nfigu ra tion Elem ent s 220
Bridge Mode of Operation Background Infor matio n 221
Unrestricted Bridge Mode 221
Restricted Bridge Mode 221
Bridge Filters 222
Configuring Bridge Filters 222
Bridge Filter Configur atio n Elem ent s 224
Protocol Definition Configuration Elements 224
Bridge Filter Configur atio n Elem ent s 224
Bridge Filters Backgrou nd Info rma tion 225
Protocol Definition s 226
Bridge Filter Definitions 227
Dial Out Using Bridge Filters 233
Example: Bridge Dial Out Using a Destina tion MAC Add ress Filter 233
Known Connect List 235
Configuring the Known Co nnec t List 235
Using CFGEDIT 23 5
Known Connect List Configur ation Ele m ent s 236
Known Connect List Back ground Infor matio n 236
Workgroup Remote Access Switch 11
USER’S GUIDE
Configur in g A dva n c ed IP Ro uting 237
Overview 237
Static ARP Table Entries 238
Configuring Static AR P Table Entries 238
Static ARP Table Entries Conf igur ation Elements 238
Static ARP Table Entries Backgroun d Infor m ation 238
The Isolate d M ode 239
Configuring the Isolate d Mode 239
Isolated Mode Configuration Elements 239
Isolated Mode Backgroun d In formation 239
Static Route Lookup via RADIUS 239
Configuring Stati c Route Lookup via RADIUS 239
Static Route via RADIUS Configuration Elements 240
Static Route Lookup via RADIUS Background Information 240
IP Address Pool 240
Configuring an IP Address Pool 240
IP Address Pool Configuration Elements 240
IP Address Pool Background Information 241
IP Filters 241
Initiating the IP Filter Configuration 241
Configuring Packet Types 242
Configuring the Comm on IP Portio n 243
Configuring TCP 244
Configuring UDP 244
Configuring ICMP 245
Configuring Forward ing Filt ers 246
Configuring Connection Filters 247
Using CFGEDIT 24 7
Configuring Exception Filter 248
Modifying the Final Condition for a Filter 249
Applying Filters 249
Applying Filters to Network Interfaces 249
Applying the Global Forwarding Filter 249
Applying per-device Forwarding Filters 249
IP Filters Configuration Elements 250
IP Filters Background Information 251
Filter Compositio n 252
Types of Filters 252
Role of Filters in the IP Processing Flow 253
Packet Types 254
Limitations 255
Example of an IP Filter Configuration 256
DHCP Relay Agent 258
Configuring a DHCP Relay Agent 258
DHCP Configuration Elements 259
DHCP Background Information 259
DHCP/BOOTP Relay Agen t Env ironm ent s 259
Example DHCP Configurations 261
DHCP Proxy Client 265
Configuring the DHCP Proxy Client 265
DHCP Configuration Elements and Background Information 266
Sample Configuration: IP Router with DHCP Proxy Client 267
12 CyberSWITCH
Configuring IPX 269
Overview 269
Configuring IPX Information 270
IPX Routing Op tion 271
Enabling/Disabling IPX 271
IPX Option Configuration Element 271
IPX Option Background Information 272
IPX Internal Network Number 272
Configuring the IPX Internal Network Number 272
IPX Internal Network Number Configuration Element 272
IPX Network Number Background Information 273
IPX Network Interf aces 273
Configurin g IPX Net work Interfaces 273
IPX Network Interface Configuration Elements 275
General IPX Network Interface Configuration Elements 275
RIP IPX Network Interface Con figuration Elements 275
SAP IPX Network Interface Configuration Elements 276
IPX Network Interface Background Information 277
IPX Routing P rotocols 278
Configuring IPX Routing Protocols 278
IPX Routing P rotocol Configuration Ele ments 278
IPX Routing P rotocol Background Information 279
Routing/Service Tables 279
Special Conside r ations - Remo te LA N Inter f ace 280
IPX Static Routes 281
Configurin g IPX Static Routes 281
IPX Static Routes Confi g uration Elements 282
IPX Static Routes Background Information 282
IPX NetWare Static Servi ces 283
Configuring IPX NetWare Static Services 283
IPX NetWare Static Servi ces Configuration Elements 284
IPX NetWare Static Servi ces Background Information 285
IPX Spoofing 285
Configuring IPX Spoofing 285
IPX Spoofing Configuration Elements 286
IPX Spoofing Background Information 286
Watchdog Protocol 287
SPX Protocol 287
IPX Type 20 Packet Handling 288
Configuring IPX Type 20 Packet Handling 288
IPX Type 20 Packet Handling Configuration Elements 289
IPX Type 20 Packet Handling Device Configuration Elements 289
IPX Type 20 Packet Handling Background Informati on 289
IPX Isolated Mode 289
Configurin g IPX Isolated Mode 289
IPX Isolated Mode Configuration Elements 289
IPX Isolated Mode Background Information 290
IPX Triggered RIP/SAP 290
Displaying WAN Peer List 290
Configuring Triggered RIP/SAP Global Timers 291
Configuration Elements 291
Triggered RIP/SAP Back groun d In formation 292
Workgroup Remote Access Switch 13
USER’S GUIDE
IPX-Specific Infor mation for Devices 292
Configuring IPX Device s 292
WAN Devices 292
Remote LAN Devices 295
IPX Configuration Elements for Devices 296
IPX Background Information for Devices 297
IPX Triggered RIP/SAP Device Background 297
Configuring SNMP 298
Overview 298
Configuring SNMP 298
SNMP Configuration Elements 300
SNMP Background Information 301
Configuring AppleTalk Routing 3 0 5
Overview 305
AppleTalk Rou ting Option 305
Enabling AppleTalk Routing 305
AppleTalk Rou ting Option Confi guration Element 306
AppleTalk Routi ng Background Information 306
AppleTalk Ports 306
Configuring AppleTalk Ports 306
AppleTalk Ports Configuration Elements 307
AppleTalk Ports B ackground Information 308
The AppleTalk Network Type 308
Dynami c Node Address Assignment 308
The Zone Concept 309
AppleTalk Remote LAN 309
AppleTalk Static Rout e s 310
Configuring AppleTalk Static Routes 310
AppleTalk Routi ng Static Routes Conf iguration Elemen ts 311
AppleTalk Routi ng Static Routes Background Informati on 311
AppleTalk Capacities 311
Configuring AppleTalk Capacities 311
AppleTalk Capacities Configuration Elements 311
AppleTalk Capacities Background Information 312
AppleTalk Isolated Mode 312
Configuring the AppleTalk Isolated Mode 312
AppleTalk Isolated Mode Configuration Elements 312
Configuring Call Control 31 3
Overview 313
Throughput Monitor 313
Configuring the Throughp ut Monitor 313
Throughput Monitor Configuration Elements 314
Throughput Monitor Background Information 315
Overload Condition Monitori ng 316
Underload Condition Monitoring 316
Idle Condition Monit oring 317
Throughput Monitor Configuration Example 317
14 CyberSWITCH
Call Int erval Param ete r s 3 1 8
Configuring the Call Inter val P arameters 318
Call Interval Config urat ion Element s 318
Call Interval Background Information 318
Monthly Call Charge 319
Configuring Monthly Call Charge 319
Monthly Call Charge Configuration Elements 319
Monthly Call Charge Background Info rmation 319
Call Restrictions 320
Configuring Call Re strict ion s 320
Call Restriction Configuration Elements 320
Call Rest ri c tions Backg round Info rm a t ion 322
Bandwidth Reservation 323
Configuring Bandw idt h Res erv ation 323
Bandwidth Rese rvatio n Configur a tion Elem ent s 325
Bandwidth Reservation Background Information 326
Semipermanent Connections 326
Configuring Semipermanent Connections 326
Semipermanent Connections Configuration Elements 328
Semipermanent Connection s Background Information 328
Interactions with Other Features 328
VRA Manager as a Call Contro l Mana ger 33 0
Configuring VRA Mana ger for Ca ll Contro l 330
Configuration Elements 330
Background Informati on 331
Call Control Manage m ent 331
Limitations/Considerations 332
Configu ring Other Advance d O p tions 333
Overview 333
PPP Configuration 333
Configuring PPP 333
PPP Configuration Elements 334
PPP Background Information 335
PPP Link Failure Detection 335
PPP Reference Documents 336
Default Line Protocol 337
Configuring Default Line P rotocol 337
Default Li ne Protocol Configuration Ele ments 337
Default Line Protocol Background Informatio n 337
Log Options 338
Configuring Log Options 338
Log Options Configuration Elem ents 338
Log Options B ackground Information 339
Local Log File Overvie w 339
Syslog Server Overview 339
CDR Log Report Overview 340
Compression Options 345
Configur ing Compression Options 345
Compression Options Configuration Elements 345
Compression Option s Background Information 346
Compr ession and CCP 347
Workgroup Remote Access Switch 15
USER’S GUIDE
TFTP 348
Configuring TF TP 348
TFTP Configura tion Elem en ts 349
TFTP Background Information 349
File Attributes 350
Configuring File Attributes 350
File Attributes Configuration Elem ent s 350
File Attributes Background Inf orm ation 3 50
TROUBLESHOOTING 352
System Verification 353
Overview 353
Verifying Hardware Resources are Operational 353
Verifying WAN Lines are Available for Use 354
Verifying LAN Connecti o n is Operational 354
Verifying Bridge is Initialized 355
Verifying IP Router is Initialized 355
Verifying a Dedicated Con nection 356
Verifying a Frame Relay Connection 356
Verifying an X.25 Connecti on 357
Verifying Remote Device Connectivity 357
Verifying Multi-Level Security 357
Verifying IP Host Mode is Operational 359
Verifying IP Host is Initialized 359
Verifying IP Host Mode is Operational 359
Verifying I P Host Mode Operation ov e r a LAN co nne ction 359
Verifyi ng I P Host Mode Operation ov e r a WAN con nection 360
Verifying IP Routing Over Interfaces 360
Verifying IP Routing Over a LAN Interface 360
Verifying IP Routing Over a WAN Interface 361
Verifying IP Routing Over a WAN (Direct Host) Interface 363
Verifying IP Routing Over a WAN Remote LAN Interface 364
Verifying IP Routing Over a WAN UnNumbered Interface 365
Verifying IP Filters 366
Verifying IP RIP 366
Verifying IP RIP is Initialized 366
Verifying IP RIP Output Processing on a LAN Interface 367
Verifying I P RIP I nput Processi ng on a LAN Interface 368
Verifying IP RIP Output Processing on a WAN Interface 368
Verify IP RIP Inpu t Processing Oper ational on a WAN Interfac e 369
Verifying IPX Router is Initialized 370
Verifying IPX Routing is Operational 370
Verifying IPX Routing over a LAN Connection 3 71
Verifying an IPX Remote LAN Connecti on 371
Verifying IPX Rou ti ng over a WAN Connection 372
Verifying Triggered RIP/SA P 372
16 CyberSWITCH
Verifying the AppleTalk Routing Feature 372
Verifying AppleTalk Routing is Initialized 372
Verifying AppleTalk Routing is Operational 373
Verifying AppleTalk Routing Operational over the LAN connection 374
Verifying AppleTalk Routing Operation over a WAN connection 374
Verifying SNMP is Operational 375
Verifying the Dial Out Feature 376
Verifying Call Detail Recording 376
Verifying Compressio n is Op erational 3 77
Verifying Reserved Bandwidth is Operational 377
Verifying PPP Link Failure Detection is Operational 377
Verifying DHCP Relay Agent 378
Verifying DHCP Relay Agent Initialization 378
Verifying the Relay Agent is Enabled 379
Verifying the Relay Agent is Operational 379
Verifying DHCP: Proxy Client 380
Verifying DHCP Proxy Client Initialization 380
Verifying the Proxy Client is Enabled 381
Verifying the Proxy Client is Operational 381
UDP Ports 381
IP Address Pool 382
Verifying a Semipermanen t Conne cti on 382
Verifying Proxy ARP is Operational 382
Problem Diagnosis 384
Overview 384
General Procedures 384
LAN Adapter 384
Bridge Initializa tion 385
IP Routing Initialization 385
WAN Line Availability 385
Dedicated Co nnections 387
Frame Relay Connections 387
X.25 Connections 388
Remote Device Connectivity 389
Multi-Level Security 390
LAN Attach ment 390
IP Host Mode 391
IP Host Initialization 391
IP Host Mode Operation over the LAN connection 391
IP Host Mode Operation over the WAN connection 392
IP Routing Over Interface Connections 392
IP Routing Over the LAN Interf ace Co nnec tion 3 92
IP Routing Over a WAN Interface Connecti on 393
IP Routing Over a WAN (Direct Host) Interface Connection 394
IP Routing Over a WAN RLAN Interface Connection 395
IP Routing Over a WAN UnNumbered Interface Connection 396
IP Filters 396
Workgroup Remote Access Switch 17
USER’S GUIDE
IP RIP 397
IP RIP Initialization 397
IP RIP Output P rocessing on a LAN Interface 398
IP RIP Input Processing on a LAN Interface 398
IP RIP Output P rocessing on a WAN Interface 399
IP RIP Input Processing on a WAN Interface 399
IPX Routing 400
IPX Routing Initialization 400
IPX Routing ove r the LAN Connection 400
IPX Routing ove r the Remote LAN Connection 401
IPX Routing ove r the WAN Connection 402
IPX Routing and Service Tables 403
Triggered RIP/SAP Start Up 404
Triggered RIP/SAP Operation 404
AppleTalk Routing 404
AppleTalk Routi ng Initialization 405
AppleTalk Routing Operational ov er the LAN connection 405
AppleTalk Routing Operational ov er the WAN connection 407
Overview 418
Local Area Network LED Indicators 418
WAN LED Indicators 418
BRI LED Indicators 418
PRI LED Indicators 419
LANVIEW LEDs (CSX1200-E11-MOD) 420
NT1 Status LEDs (CSX1200-U4-MOD only) 421
Service I ndicator 422
Service I ndicator Re ma ins Lit 422
Service Indicator Blinks 423
Alarm LEDs (PRI Only) 424
18 CyberSWITCH
System Messages 426
Overview 426
Informational Messages 426
Boot Messages 427
Initialization Messages 427
Normal Operation Messages 427
Status Messages 427
Spanning Tree Messages 428
Warning Messages 428
Error Messages 428
System Message Summary 428
Trace Messages 487
Overview 487
Call Trace Messages 488
Call Trace Message Summary 489
IP Filters Trace Messages 494
PPP Packet Trace Messages 495
WAN FR_IETF Trace Messages 497
X.25 Trace Messages 497
X.25 Trace Message Summary 497
X.25 (LAPB) Trace Messages 500
X.25 (LAPB) Trace Message Summary 500
SYSTEM MAINTENANCE 502
Remote Management 503
Overview 503
SNMP 504
Installation and Configuration 504
Usage Instru ctions 505
Telnet 506
Installation and Configuration 507
Usage Instru ctions 508
TFTP 509
Installation and Configuration 509
Usage Instru ctions 510
Remote Installation with USER2 511
System Commands 513
Overview 513
Accessing Admin istration Servic es 513
Setti n g th e I P Ad d r e s s 5 14
Boot Device Comma nds 514
Accessing Dynamic Managem ent 515
Viewing Operational Inf orm ation 515
Viewing Throughput Information 520
Throughput Monitor Contents 521
Saving Operational Information 521
Workgroup Remote Access Switch 19
USER’S GUIDE
Clearing Opera tional Inf orm atio n 522
Configuration-R ela te d Comm an d s 522
Restarting the CyberSWITCH 523
Setti n g the D ate and Ti me 523
File Utility Commands 523
Terminating Admin istration Session s 524
AppleTalk Routing Commands 525
Bridge Commands 530
Call Control Co m ma nd s 531
Call Detail Recording Commands 534
Call Restriction Commands 534
Compression Information Commands 535
DHCP Com m an ds 53 5
Frame Relay Commands 535
IP Routing Commands 537
IPX Rou ting Commands 542
ISDN Usage Commands 544
LAN Commands 545
Log Commands 545
Packet Capture Commands 545
RADIUS Command s 549
SNMP Co mma nds 551
TCP Commands 551
Telnet Commands 551
Termina l Commands 554
TFTP Commands 555
Trace Commands 556
UDP Command s 5 5 7
User Level Security Commands 557
WAN Comm an ds 558
X.25 Commands 558
Statistics for Serve r or Rem o te initia ted TF TP Ac tiv ity 588
Statistics for Loca l or Clien t Initia ted TFTP Ac tiv ity 589
Statistics for all TFTP Activity 589
UDP Statistics 590
WAN FR_IETF Statistics 591
WAN L1P Statistics 591
PRI S/T (T1/E1) Interface Statistics 591
Layer 1 PRI Error Stat istics 592
Layer 1 General Stati stics 592
Overview 608
Main Menu 608
Physical Resources Menu 609
Options Menu 610
Security Menu 613
Getting Assistance 616
Reporting Problems 616
Contacting Cablet ron Sy stems 616
Administrative Console Commands Table 618
Manage Mode Commands Table 625
Cause Code s Ta ble 629
INDEX 636
22 CyberSWITCH
U
SING THIS GUIDE
The User’s Guide is divided into the following parts:
S
YSTEM OVERVIEW
We begin with an overview of bridging, routing, and specific CyberSWITCH features. Next, we
provide an overview for both the system software and hardware.
S
YSTEM INSTALLATION
In this sec tio n of the User’s Guide we provide guidelines for ordering ISDN service in the US, and a
step-by-step descr iption of installi ng hardw a re and upgrading software.
B
ASIC CONFIGURATION
We define basic configuration as the configura tion n eeded by most devices . These are the areas of
configuration that will get your system up and running. Note that not all configuration steps in this
part are required. For example, if you are only using bridging, you will have no need to complete
the configuration steps included in the chapter titled Configuring Basic IP Routing.
S
ECURITY CONFIGURATION
The CyberSWITCH pr ovides a great varie t y of security option s. For example, you may us e device
level se cu rity, use r l eve l secur ity , or i f pr efe rred , no secu ri ty. You m ay al so perfo rm auth enti ca tion
of a device/ user in different ways. The securi ty information may be store d on several dif f erent
types of databases, either local ly or on a variety of remote databases.
System secu rity also allows the configurat ion of administ rative session (Telnet session)
enhancements. This provides secure access to the system along with flexible control.
A
DVANCED CONFIGURATION
We defi n e advance d co n f igurati on as a way to fin e tu ne y o u r system, or to config ure opti ons that
are not necessarily needed by the majority of devices. For example, use this sectio n to configure an
alternate access, or to set up SNMP to manage your system.
T
ROUBLESHOOTING
Troubleshooting begins with information for verifying your system installation, and continues
with steps to take if there are problems with the installation. Next, it includes a description of
system LED indicators, followed by system messages and trace messag e s. Each message listing in
these chapters provides the message itself, a message definition, and where appropriate, possible
corrective actions.
S
YSTEM MAINTENANCE
In this section, we provide information to help you maintain your CyberSWITCH once it is
operating. System maintenance information includes information regarding remote management,
a chapter on both the system commands and the system sta tistics, and routine maintenance
procedures.
USER’S GUIDE
APPENDICES
The User’s Guide provides the following appendices:
N
ETWORK WORKSHEETS
These worksheets are provided to help you gather pertinent infor mat i on for co n fi guring your
system. We recommend that you print copies of these blank forms and fill in the appropriate
information before you begin configuring your system.
CFGEDI T M
AP
This map provides a guide thro ugh the Conf igur ation Ed itor str ucture, and may be a helpful
reference when configuring the CyberSWITCH using the CFGEDIT utility.
G
ETTING ASSISTANCE
This appendix provides information for getting assistance if you run into problems when
installing your system. A FAX form is included. You can print this form, fill out the information
requested, and FAX it to Cabletron Systems, using the provided FAX number.
A
DMINISTRATION CONSOLE COMMANDS
Provide s a tab ular listing of the syste m admi nistration console commands and their use s.
M
ANAGE MODE COMMANDS
Provide s a tab ular listing of the Manage Mode commands and their uses.
C
AUSE CODES
Provides a tabular listing of Q.931 Cause Codes and their meanings. These cause codes may
appear in call trace messages.
DOCUMENTATION SET
This guide, the User’ s Gu ide, provides information to install and configure your system. It also
provides information you may need to refer to keep your system running efficiently after it is up
and running. For example, it provides a li sting of system messages. Each message l i sting provides
a definition of w hat the message means, and where appropriate, corrective action you can take.
Many other subjects are covered, including routine maintenance, hardware information, system
verifi cation, and problem diagnosi s.
This gu ide is one in teg ral part of th e e n t i re do cu m e n t a tion set. Pl ease refer to th e do cuments
described below for additional information.
The Example Networks Guide includes several example networks, beginning with a simple network,
and progressing to m ore complex networks. These example network chapters provide
configuration instructions that you may find helpful in configuring your own similar network.
The Quick Start pro v ides abbr eviat ed insta lla tion and co nfiguration instructions for exper ie nced
users. Specific instructions for setting up various ty p e s of remote devi ce s are also included.
The R ADIUS Authentication User’s Guide describ e s the setup of the RADIUS server software on a
UNIX-based system. RADIUS (Remote Authentication Dial In User Service) provides multiple
24 CyberSWITCH
systems c entr al databa se ac cess for sec urity authenti catio n purpos es. I nstru ctions for ob tainin g th is
electronic document ca n be found in Configuring Off -node Server Informatio n.
If you have Internet access, you may obtain this guide by following the steps outlined below:
•Use your Web browser to get to the following address:
http:// ser vice.nei.com
•From the re su lting screen, click on Public.
•Click on the Radius director y.
•Click on the Docs directory. The guide will be under this directory.
The Release Notes provide release highlights and important information related to this release. The
Release Notes may be disp layed during software ins tallation (or upgrade). They may also be
displayed after the system is operatin g by issuing the
GUIDE CONVENTIONS
The following conventions are used throughout the documentation:
Syste m Commands
All system comma nds (A dm inist rati on and Mana ge Mo de com mand s) are italic iz ed, and in a
different font than the general text. For example, if you are instruct ed to enter the command to test
for proper LAN connections, the command would appear as follows:
lan stats
list rel_note.txt
U
SING THIS GUIDE
Guide Conventions
console command.
CFGEDI T S CREENS
Screens that appear on the monitor as you are configuring your system using the CFGEDIT utility
will be displayed using the style shown b elow:
Main Menu:
1) Physical Resources
2) Options
3) Security
4) Save Changes
Select function from above or <RET> to exit:
ONITOR DISPLAYS
M
Any messages or text that is displayed on your monitor w ill be shown in the style be low:
LAN Port <port #> is now in the LISTENING state
WAN Port <port #> is now in the FORWARDING state
LAN Port <port #> is now in the LEARNING state
LAN Port <port #> is now in the FORWARDING state
D
OCUMENTATION TITLES
All references to CyberSWITCH documentation titles will use the same font as normal text, but will
be italicized. For example, all references to the User’s Guide will appear as:
User’s Guide
Workgroup Remote Access Switch 25
S
YSTEM OVERVIEW
We inc l u de th e f ollowin g ch a p te rs in the Syst em Overv i ew segment of the User’s Guide.
•The CyberSWITCH
Provides the “big picture” view of a CyberSWITCH network. We include an overview of
unique system features, interoperability, security, interfaces, system components, remote
devices, and switches supported.
•Hardware Overview
A description of system platforms.
•Software Overview
A description of the CyberSWITCH’s system and adminis trative software. We also include a
description of system files.
T
HE CYBER
Because of the strong personal computer presence in the business environment, a move to
graphical user interfaces, and the need to make the best use of available resources, there is a
growing demand for high speed LAN access for remote devices. PC users need to be part of a workgroup or ente rprise LAN, and remote access from home , field offices, and other r e mote locati ons
has become a necessity.
With the de mand for remote LAN access, the remote device’s requireme nt for bandwi dth has
exceeded the capabilities of traditional analog modems. High-speed digital dedicated lines can
certainly provide su fficie nt band wi dt h for LAN inter con n ect ion . How ever , beca use of the high
monthly charges associated with dedicated services, the costs are prohibitive for individual users.
New forms of networking are now possible and affordable using the Integrated Services Digital
Network (ISDN) . ISDN is being deploy ed by majo r teleco mmunications companie s world- w ide.
With ISDN ser vices, t he costs o f LAN inte rconnect ion are b ased on ac tual usa ge — the user gets the
bandwidth of dedicated digital service at dial-up prices.
Our products offer internetworking solutions for small businesses as well as large corporations.
SWITCH
THE CYBER SWI TCH NETWORK
This pa rti cul ar Cyb er SWIT CH model co nsi sts of an embe dded co mmun ica ti ons p la tf or m. It use s a
flash file system (instead of a hard disk) an d a t wo-stage boot device to initi al ize the platform and
download the system software. The system softw a re is preconf igured to allow immediate
connect ion to a local area netwo rk (LAN) or a wide area net work (WAN) with Teln et and/or TFTP
access.
This system is geared toward the small office, supporting two to eight (depending on model)
simultane ous connection s. Yet the product offers a small of fice a variety of internetworking
capabilities.
USER’S GUIDE
Workstation
Remote ISDN Bridge
Workstation
Host
BRI
BRI
CSX5500
ISDN
BRI
File Server
BRI
WORKGROUP REMOTE ACCESS SWITCH
Workstation
CSX1200
LAN
B1 B3
10BASE-TRXTXSERVICE
POWER
B2 B4
E1 ONLYB-CHANNELS
B25B27
B29
B31
B21B23
B17B19
B13B15
B9B11
B5 B7
E1DT1
D
B26B28
B30L1
B22B24
B18B20
B14B16
B10B12
B6 B8
Workstation
UNIQUE SYSTEM FEATURES
The CyberSWITCH combines unique features that improve cost-effectiveness, reliability, and
performance for wide area network connections to remote devices. These features include:
•Authentication Servers
Provide a central database for networks with more than one CyberSWITCH. The central
database consists of manag e able, informational data (ref e rred to as the Device List or Device
Table). This data is acces sed and used for aut hentication when a n ew connection is esta blished
to the system.
•Bandwidth Agility
The system dynamically controls the bandwidth in use between itself and other PPP devices.
This is accomplished by estab lishing a nd dis c onn ecting calls . The num be r of calls is limited
only by the types and number of lines av ailable. The system monitors the connections for
utilization and will add and remove the connections based on user- configurable throughput
parameters. As network ba ndw id th requirem ent s increa se or decrea se, the system will
Workstation
PC
(with BRI ISDN TA)
28 CyberSWITCH
THE C
YBER
Unique System Features
automati cally adju st th e nu mber of ne twork con nect ion s. Thus, your n et work costs w il l ref lec t
the actual bandwidth being used.
•Filtering
Allows you to control the flow of frames through the network. Filtering becom es nec essary if
you need to re strict remote access or con trol widespread transmission of sporadic messages.
Customer-defined filters can forward messages based on addresses, protocol, or packet data.
•Data Compressi on
Allows the system to negotiate compression algorithms with another device on the network.
After successfully negotiating com p re ssion, data is compressed by the remote device and
transmi tte d to the system. The system deco mp resses the data, processes the information
contained in the user data, and forwards the data as required. The system can receive data
coming over a WAN or a LAN, and compress the data before transmitting it to another device
on the network. The net effect is to increase interconnect bandwidth by de creasing
transmi ssion time. If neg o tiation for compression fails, data is transmitted uncompressed.
•Dial Out Capability
The system will dial out to remo te dev ices . Th is featur e allows the sy st em to accep t user data
receiv e d on the Ethernet LAN or I S DN network and initiate a data connection to the remote
device specified in the user data. This allows devices on the local LAN to initiate connections
to networks connected to the system over th e switched di gital network. The system monitors
the connection for utilization and will rem ove the connection when it becomes idle.
SWITCH
•Dynamic Management
Provides a “real-time” management mechanism that allows many system parameters to be
changed with out interrupting the curren t e xecution state of the system sof tware. This feature
consists of a series of con sole commands that enable a user to display current system
paramet ers , c ha ng e man y par ame ter s d yna mica lly , and wri t e cha ng es t o d isk f il es s o th at the y
remain permanent.
•High Speed Digital Connections
The system supp orts 56Kbps and 64Kbps co nnections to remote locatio ns. These dial- up digital
connections provide re liable high throughpu t connections for efficient data tr ansfer for the
same cost as analog connections. If any r e mote devices conn e cted to the system support multi-
link PPP, up to 32 parallel connections can be made at either 56Kbps or 64Kbps.
•IP Filters
The IP filters allow you to control the transmission of individual IP packets based on the packet
type. You can specify packet type by IP address (source or destination) or by IP protocol (TCP,
UDP, ICMP).
Once you specify a packet type, two forms of IP filtering are available:
•Forwarding Filters, applied at discrete points of the IP processing path to determine if a
packet continues its normal processing, and a
•Connection Filter, which determines if an IP packet requiring a WAN connection may continue.
•Packet Capture
In order to monitor incoming LAN data, the CyberSWITCH packet capture feature will allow
you to capture, display, save, and load bridged or routed data packets.
Workgroup Remote Access Switch 29
USER’S GUIDE
•Protocol Discrimin ation
It is possible for multiple types of remote devices to use the same line. The system can
determine the device type and the protocol encapsulation used by remote devices.
•RS232 Port: Dual Usage
If your installation requires you to process PPP-Async data, this feature allows you to use the
RS232 port for either console acc ess or a serial data connection. This dual usage is possible
throu gh the CyberS W ITCH’s s u p p or t o f Au t osense mo de and Ter minal mo de :
•Autosense mode determines whether you are trying to connect using a VT emulation or PPP-
•Terminal mode assumes that y ou o nly wa nt to co nnec t usi ng VT emul atio n. A logi n prom pt
•Security
Security is a key issue for all central site network mana gers and is a priority with the
CyberSWITCHs. The modules provide high level features that help prevent unauthorized or
inadver tent acc ess to c riti cal data and reso urces. The mo dules su pport ex tensiv e secu rity lev els
including:
•PPP PAP and CHAP
•User n a me a n d pa ssword
•Calling Line ID (CLID)
•Ethernet Address
•User Authentication
•Device Authentication
•SecureFas t Virtual Remote Access (SFVRA)
•TACACS Client with Radius Server
•RADIUS
•Security Dynamic’s ACE/SecurID
Async, and connects you appropriately. (VT emulation requires you to perform four carriage returns to receive a login prompt.)
is displayed as soon as the connection is made.
•Simultaneous Connections
The system supp orts simultaneo u s connectio n s to multiple l o ca t i ons. Thes e lo ca tions can
connect by using different channels on the same line, or they can connect on different lines. This
pooling of lines among many potential loc ations is more cost effective than alternative pointto-point lines.
INTEROPERABILITY OVERVIEW
“Interoperability” is the ability to operate and exchange information in a heterogeneous network.
The CyberSWITCH supports interoperability with many different remote devices over ISDN.
INTEROPERABILITY PROTOCOLS
In order to commun icate wi th vari ous remot e devic es over I SDN, the CyberSWI TCH must i dentif y
the device type and the protocol it is using.
The CyberSWITCH supports the following line protocols:
•HDLC Ethernet Frames
•Ordered Protocol for Ethernet Frames
•Point-to-Point Protocol (PPP) Encapsulation for IP Datagrams
30 CyberSWITCH
Loading...
+ 614 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.