Cabletron Systems CSX1000, CSX1200 User Manual

WORKGROUP
REMOTE ACCESS SWITCH
USERS GUIDE
Release 7.2
Cabletron Systems
(603) 332-9400 phone (603) 337-3075 fax support@ctron.com
!
CAUTION
NOTICE
You may post this document on a network server for public use as long as no modifications are ma de to th e do cu ment.
Cabletron Systems reserves the right to make changes in specifications and other information contained in this document without prior notice. The reader should in all cases consult Cabletron Systems to determine whether any such changes have been made.
The hardware, firmware, or software described in this manual is subject to change without notice.
IN NO EVENT SHALL CABLETRON SYSTEMS BE LIABLE FOR ANY INCIDENTAL, INDIRECT, SPECIAL, OR CONSEQUENTIAL DAMAGES WHATSOEVER (INCLUDING BUT NOT LIMITED TO LOST PROFITS) ARISING OUT OF OR RELATED TO THIS MANUAL OR THE INFORMATION CONTAINED IN IT, EVEN IF CABLETRON SYSTEMS HAS BEEN ADVISED OF, KNOWN, OR SHOULD HAVE KNOWN, THE POSSIBILITY OF SUCH DAMAGES.
Only qualified personnel should pe rform installation procedures.
©Copyrigh t 1998 by Cablet ron Systems, Inc . All rights reserved.
Cabletron Systems, Inc. P.O. Box 5005 Rochester, NH 03866-500 5
Order Number: 9032187-02
VIRU S D ISCLAIMER
Cabletron Systems has tested its software with current virus checking technologies. H owev er, because no anti-virus sy stem is 100% rel iable, we strongly cauti on you to wr ite pro tect and th en verif y that th e Licen sed Sof tware, pr ior to installing it, is virus-free with an anti-viru s system in which yo u have confi denc e.
Cabletron Systems makes no representations or warranties to the effec t that t he Licensed Software is virus-free.
Copyright © July 1997, by Cabletron Systems, Inc. All rights reserved.
2 CyberSWITCH
TRADEMARKS
Cabletron Systems, CyberSWITCH, MMAC-Plus, SmartSWITCH, SPECTRUM, and SecureFast Virtual Remote Access Manager are trademarks of Cabletron Systems, Inc.
All other product names m entioned in this manual are tradema rks or registered trademarks of their re sp e ctive companies.
COPYRIGHTS
All of the code for this product is copyright ed by Cable tron System s , Inc.
© Copyright 1991-1997 Cabletron Systems, Inc. All rights reserved. Printed in the United States of America .
Portio ns of the code for this p roduct are co pyrighted by the follow ing corpor ations:
Epilogue Technolo gy Co rporat io n Copyright 1991-1993 by Epilogue Technology Corporation. All rights res erv ed.
Livingston Enterprises, Inc. Copyright 1992 Livingston Enterprises, Inc.
Security Dynamics Technologies Inc. Copyright 1995 by Security Dynamics Technologies Inc. All rights reserved.
Stac El e c tronics Stac Electronics 1993, including one or more U.S. Patents No. 4701745, 5016009, 5126739 and 5146221 and other pending patents.
Telenetw orks Copyright 1991, 92, 93 by Telene tworks. All rights reserved.
FCC NOTICE
This device complies with Part 15 of the FCC r ules. Operation is subject to the following two conditions: (1) this de vice m a y no t caus e ha r mful interference, and (2) this device must accept any int erference received, includ ing interference that may caus e undesired op e ra ti on.
NOTE: This equipment has been tested and found to comply with the limits for a Class A digital device, pursuant to Part 15 of the FCC rules. These limits are designed to provide reasonable protection against harmful interference when the equipment is operated in a commercial environment. This equipment uses, generates, and can radiate radio frequency energy and if not installed in accordance with the operator’s manual, may cause harmful interference to radio communications. Operation of this equipment in a residential area is likely to cause interference in which case the user will be required to correct the interference at his own expense.
Workgroup Remote Access Switch 3
WARNING : Changes or modific ations made to this d evice wh ich ar e not expr essly
approved by the party responsible for compliance could void the user’s authority to operate the equipment.
DOC NOTICE
This digital apparatus do es not exceed the Class A limits for radio no ise emissions from digital apparatus set out in the Radio Interference Regulations of the Canadian Department of Communications.
Le présent appareil numérique n’émet pas de bruits radioélectriques dépassant les limites applicables aux appareils numériques de la class A prescrites dans le Règlement sur le brouillage radioélectrique édicté par le ministère des Communicatio ns du Cana d a.
VCCI NOTICE
This is a Class 1 product based on the standard of the Voluntary Control Council for Interference by Information Technology Equipment (VCCI). If th is equipment is used in a domestic environment, radio disturbance may arise. When such trouble occurs, the user may be required to take corrective actions.
CABLETRON SYSTEMS, INC. PROGRAM LICENSE AGREEMENT
IMPORTANT: Before utilizing this product, carefully read this License Agreement.
This document is an agreement between you, the end user, and Cabletron Systems, Inc. ("Cabletron") that sets forth your rights and obligations with respect to the Cabletron software program (the "Program") contained in this package. The Progra m may be contai ned in fi rmware, ch ips or ot her media. BY UTILIZ ING THE ENCLOSED PRODUCT, YOU ARE AGREEING TO BECOME BOUND BY THE TERMS OF THIS AGREEMENT, WHICH INCLUDES THE LICENSE AND THE LIMITATION OF WA RRANTY A ND DISCLAIMER O F LIABILITY. IF YOU DO NOT AGREE TO THE TERMS OF THIS AGREEMENT, PROMPTLY RETURN THE UNUSED PRODUCT TO THE PLACE OF PURCHASE FOR A FULL REFUND.
4 CyberSWITCH

CONTENTS

Using this Guide 23
Documentation Set 24 Guide Conventions 25
SYSTEM OVERVIEW 26
The CyberSW ITCH 27
The Cybe rS W I TC H Ne t w or k 27 Unique System Featur es 28 Interoperability Overv iew 30
Interoperability Protocols 30
Interoperability Devices 31 Security Overview 32 Network Interface Overview 32 System Compon e nts 33 Remote ISDN Devices 34 Switches Supported 35
Hardware Overvi ew 36
Safety Considerations 36 System Platforms 37
The CSX1000 and NE Link 1000 (a Network Express Product) 37
Platform Descri p tio n 3 8 System Characteristics 40
The CSX1200 42
Platform Descri p tio n 4 3 System Characteristics 43
Cabling Information 44
LAN Acces s 44 Back-to-Back Setup 45 WAN Acces s 46 Administration Console Access 47
System Modules 48
The CSX1200-E11-MOD 48
The CSX1200-U4-MOD 50
Software Overview 51
Overview 51 System software 51 System Files 51
Configuration Files 51
Operational Files 52
User Level Security Files 53
Workgroup Remote Access Switch 5
SYSTEM INSTALLATION 54
Orderi n g IS DN Service (U S On ly ) 56
Overview 56 Orde ring NI-1 Lines Using EZ-ISDN Codes 56 Orde ring NI-1 Lines Using NI-1 ISDN Ordering Co des 56 Ordering BRI ISDN Lines using Provisioning Settings 56
Provisioning Settings for AT&T 5ESS Switches 57
AT&T 5ESS NI-1 Service 58 AT&T 5ESS Custom Point-to-Point Service 59
Provision Sett ings for Northern Telecom DMS-100 Switches 60
Northern Telecom DMS100 NI-1 Service 60 Northern Telecom DMS100 Custom Service 61
Basic Inf o rm a tio n f or Ord e ring PRI ISDN Li nes 61
Hardware Installat ion 63
Pre-Installation Requirements 63 Installing the CSX1200-E11-MOD 64 Installing the CSX1200-U4-MOD 65
Cabling 66
Accessing the CyberSWITCH 67
Overview 67 Making Connections 67
Direct Co nne ction 67
Null-Modem Connection to a PC 67
Chan g i n g th e B a u d Rate 68 Remote Connec tion using Telnet 69 Remote Connection using a Modem 69
Establishing an Administration Session 70 Powering On 70 Accessing th e Re lease Notes 72
Upgrading System Software 73
Overview 73 Upgrading Software 73
CD File Structure 73 Local Software Upgrade 76
Local Upgrade of the Second Stage Boot (SSB) 76
Local Upgrade of the Operational Software (OSW) 77 Remote Software Upgrade 77
Remote Upgrade of the Second Stage Boot (SSB) 78
Remote Upgrade of the Operational Software (OSW) 79
Chan g e De faults to Se c u re S y stem 80 Return Conf iguration to Factory Defau lts 81 Accessing th e Re lease Notes 81
6 CyberSWITCH
BASIC CONFIGURATION 82
Configuration Tools 83
Overview 83 CFGEDI T 83
Executing CFG EDIT 83 Saving CFGEDIT Changes 84
Dynamic Management 84
Executing Dynamic Management 84 Utility Dynamic Management Commands 85 Saving Dynamic Managem e n t Changes 85
Default Configuration 86 Using the Network Worksheets 86 Using the Configuration Chap ters 87
Configuring Resources and Lines 88
Overview 88 Resources 88
Configuring Resour ces 88 Resource Configuration Elements 90 Resource B ackground Information 90
Lines 92
Configuring Line s 92
Configuring a Line for a BRI Resource 92
Configuring Changes for a COM M P O RT Res ou rc e 92
Configuring a Line for a PRI Resource 93 Line Configuration Elements 94 Line Background Information 98
Subaddresses 99
Configuring a Subaddress 99 Subaddress Configuration Elements 99 Subaddresses Background Information 99
Configuring Basic Bridging 100
Overview 100 MAC Layer Bridging Option 100
Enabling/Disabling Bridging 100 MAC Layer Bridging Configuration Elements 100 MAC Layer Bridging Background Info rma tion 101
Configuring Basic IP Rou ting 102
Overview 102 Interne t P rotocol (IP) Option 102
Enabling IP 102 IP Option Configurati on Elements 103 IP Background Information 103
IP Operating Mode 103
Configuring the IP Operating Mode 103 IP Operating Mode Configuration Elements 104 IP Operating Mode Background Information 104
Workgroup Remote Access Switch 7
IP Network Interf aces 105
Configuring Interfaces 105 Network Interface Configuration Elements 107 IP Network Inte rface Background Inform ation 112
IP RIP and the IP Network Interfaces 117
IP RIP over Dedicated Connections 120
IP Host Operating Mode and the IP Network Interfaces 122
Using Multiple IP Addres ses 122
Static Routes 124
Configuring Static Routes 124 Static Route Configurati on Elements 126 Static Route Background Information 128
Default Routes 129
Configuring Default Routes 129 Default Route Configuration Elements 129
Routing Information Protocol (RIP) Option 130
Enabling/Disabling IP RIP 130 IP RIP Configuration Elemen ts 131 IP RIP Background Information 131
SECURITY 132
Security Overview 133
Overview 133 Security Level 133 Syste m Options and I nf ormati o n 13 4 Device Level Databases 134 User Level Databases 135 Off-node Server Information 135 Network Login Information 135
Configuring Security Level 136
Overview 136 No Security 138
Configuring No Secur ity 138
Device Level Security 139
Configuring Device Level Security 139 Device Level Security Backgr ound Info rma ti on 139
Overvie w of Device Authe ntication Pr ocess 140
User Level Security 140
Configuring User Lev e l Securit y 140 User Level Security Backgr ou nd Info rma tion 140
Authentication Using a Security Token Card 141
System Requirements 142
Authenti cation Process with User Level Security 143
Device and User Level Security 144
Configuring Device an d Us er Level S ecur ity 14 4 Device and User Level Backgroun d In formation 145
8 CyberSWITCH
Configuring System Options and Information 146
Overview 146 System Options 146
Configuring System Options 146 Syste m Options Confi g uration El e m e n t s 147 System Options Background Information 149
System Information 150
Configuring Syst em Information 150 System Information Configuration Elements 150 System Information Background Information 151
Administ rative Session 151
Configuring Administrative Sessions 151 Administrativ e Sessio n Conf igur ation Ele m ent s 152 Administrative Session Background In formation 153
Alterna tive Database Location Background Inf o rmation 153
Session Inactiv i ty Background Information 153
Number of Administrative Telnet Sess ions Background Information 153
Telnet Server TCP Port Number Background Information 153
Emergency Telnet Server Port Number Background Information 154
Configuring Device Level Databas e s 15 5
Overview 155 On-node Devi ce Database 155
Configuring an On-node Device Database 155
On-node Device Entries 156
Configuring On-node Device Entries 156 On-node Dev ice Database Con f iguration El ements 163
General Configuration Ele m ent s 163
ISDN Configuration Elements 163
Frame Relay Access Configur ation Ele m ent s 165
X.25 Access Configur ation Elements 165
Authentication Configuration Elements 165
IP Information Configuration Elements 167
IPX Information Configur ation Elements 167
AppleTalk Information Configuration Elements 168
Bridge Information Co nfiguration Elements 169
Compression Configuration Elements 170 On-node Device Database Bac k ground Informat ion 170
On-node Dev ice Database Se cu rity Requirements 170
Off-node Device Database Location 174
Configuring Off-node Device Database Location 174 Off-node Device Database Location Configuration Elements 175 Off-node Device Database Location Background Information 175
Configuring User Level Databases 176
Overview 176 User Le vel Auth e nticati o n D a ta b a s e Lo c ation 176
Configuring Authentication Database Location 176 User Level Authen tica tion Datab as e Loc ation Co nfigur a tion Ele me nt s 177 User Level Authentication Database Location Background Inform ation 177
Workgroup Remote Access Switch 9
Configuring Off-node Server Information 178
Overview 178
Multiple Administration Login Names 178
VRA Manager Authentication Serve r 179
Configuring VRA Manager Authentication Server 179 VRA Manager Authentication Serve r Configuratio n Elements 180 VRA Manager Authentication Server Background Informati on 180
RADIUS Authe ntication Server 180
Configuring a RADIUS Authentication Server 180 RADIUS Authentication Se rver Configuration Elements 182 RADIUS Authentication Server Backgrou nd Information 182
TACACS Authenti cation Server 183
Configuring a TACACS Authentication Server 183 TACACS Authentication Server Configuration Elements 184 TACACS Authentication Server Background Informati on 184
ACE Authentication Server 185
Configuring an ACE Authenti cation Server 185
Alternate Method of Configurati on 186 ACE Authentication Server Configuration Elements 186 ACE Authentication Server Background Information 187
Configuring Network Login Infor mation 188
Overview 188 Network Login General Configuration 188
Configuring General Network Login Information 188 Network Login General Configuration Background Information 189
Network Login Banners 190
Configuring Netw ork Lo gin Banner s 190 Network Login Banners Background Information 190
Login Configuration Specific to RADIUS Server 191
Configuring RADIU S Serve r Login Info rma tion 191 Login Configuration Specific to RADIUS Server Background Information 192
Login Configuration Specif i c to TACAC S Serv er 192
Configuring TACACS Server Login Information 192 Login Configuration Specif i c to TACAC S Serve r Backg round Information 194
ADVANCED CONFIGURATION 195
Configuring Alternate Accesses 196
Overview 196 Dedi ca te d Access e s 1 9 6
Configuring a Dedicat ed Acc es s 196 Dedicated Access Config uration Elem ents 1 96 Dedicated Access Background Information 197
X.25 Accesses 198
Configuring an X.25 Ac cess 198
Basic Configuration Inf orm a tion 198
LAPB Configura tion Info rma tion 1 99
X.25 Configuration Information 199
Permanent Virtual Circuit Information 201
10 CyberSWITCH
X.25 Configuratio n Elements 201
X.25 Line Configuration Elements 201
LAPB Configuration Elements 202
X.25 Access Configur ation Elements 203
PVC Configuration Elements 206 X.25 Access Background Inf orm ation 207
Current X.25 Restrictions 209
Frame Relay Accesses 209
Configurin g a Frame Relay Access 209
Configuring General Ac ces s Informa tion 209
Configuring a PVC 210 Frame Relay General Configuration Elements 211 Frame Relay PVC Configuration Elements 212 Frame Relay Access Background Information 214
The Local Manageme nt Interface Overview 215
Data Rate Control Overview 215
Congestion Control Overview 216
Curren t Re strictions 216
Configuring Advanced Bridgin g 21 8
Overview 218 Bridge Dial Out 218
Configuring the Device List for Bridge Dial Out 219
Spanning Tr ee Protocol 220
Configuring Spanning Tree Protocol 220 Spanning Tree Protocol Co nfigura tion Elem e nts 220
Bridge Mode of Operation 220
Configuring the Bridge Mode of Operation 220 Bridge Mode of Opera tion Co nfigu ra tion Elem ent s 220 Bridge Mode of Operation Background Infor matio n 221
Unrestricted Bridge Mode 221
Restricted Bridge Mode 221
Bridge Filters 222
Configuring Bridge Filters 222 Bridge Filter Configur atio n Elem ent s 224
Protocol Definition Configuration Elements 224
Bridge Filter Configur atio n Elem ent s 224 Bridge Filters Backgrou nd Info rma tion 225
Protocol Definition s 226
Bridge Filter Definitions 227
Dial Out Using Bridge Filters 233
Example: Bridge Dial Out Using a Destina tion MAC Add ress Filter 233
Known Connect List 235
Configuring the Known Co nnec t List 235
Using CFGEDIT 23 5 Known Connect List Configur ation Ele m ent s 236 Known Connect List Back ground Infor matio n 236
Workgroup Remote Access Switch 11
Configur in g A dva n c ed IP Ro uting 237
Overview 237 Static ARP Table Entries 238
Configuring Static AR P Table Entries 238 Static ARP Table Entries Conf igur ation Elements 238 Static ARP Table Entries Backgroun d Infor m ation 238
The Isolate d M ode 239
Configuring the Isolate d Mode 239 Isolated Mode Configuration Elements 239 Isolated Mode Backgroun d In formation 239
Static Route Lookup via RADIUS 239
Configuring Stati c Route Lookup via RADIUS 239 Static Route via RADIUS Configuration Elements 240 Static Route Lookup via RADIUS Background Information 240
IP Address Pool 240
Configuring an IP Address Pool 240 IP Address Pool Configuration Elements 240 IP Address Pool Background Information 241
IP Filters 241
Initiating the IP Filter Configuration 241 Configuring Packet Types 242
Configuring the Comm on IP Portio n 243
Configuring TCP 244
Configuring UDP 244
Configuring ICMP 245 Configuring Forward ing Filt ers 246 Configuring Connection Filters 247
Using CFGEDIT 24 7 Configuring Exception Filter 248
Modifying the Final Condition for a Filter 249 Applying Filters 249
Applying Filters to Network Interfaces 249
Applying the Global Forwarding Filter 249
Applying per-device Forwarding Filters 249 IP Filters Configuration Elements 250 IP Filters Background Information 251
Filter Compositio n 252
Types of Filters 252
Role of Filters in the IP Processing Flow 253
Packet Types 254 Limitations 255 Example of an IP Filter Configuration 256
DHCP Relay Agent 258
Configuring a DHCP Relay Agent 258 DHCP Configuration Elements 259 DHCP Background Information 259
DHCP/BOOTP Relay Agen t Env ironm ent s 259
Example DHCP Configurations 261
DHCP Proxy Client 265
Configuring the DHCP Proxy Client 265 DHCP Configuration Elements and Background Information 266
Sample Configuration: IP Router with DHCP Proxy Client 267
12 CyberSWITCH
Configuring IPX 269
Overview 269 Configuring IPX Information 270 IPX Routing Op tion 271
Enabling/Disabling IPX 271 IPX Option Configuration Element 271 IPX Option Background Information 272
IPX Internal Network Number 272
Configuring the IPX Internal Network Number 272 IPX Internal Network Number Configuration Element 272 IPX Network Number Background Information 273
IPX Network Interf aces 273
Configurin g IPX Net work Interfaces 273 IPX Network Interface Configuration Elements 275
General IPX Network Interface Configuration Elements 275
RIP IPX Network Interface Con figuration Elements 275
SAP IPX Network Interface Configuration Elements 276 IPX Network Interface Background Information 277
IPX Routing P rotocols 278
Configuring IPX Routing Protocols 278 IPX Routing P rotocol Configuration Ele ments 278 IPX Routing P rotocol Background Information 279
Routing/Service Tables 279
Special Conside r ations - Remo te LA N Inter f ace 280
IPX Static Routes 281
Configurin g IPX Static Routes 281 IPX Static Routes Confi g uration Elements 282 IPX Static Routes Background Information 282
IPX NetWare Static Servi ces 283
Configuring IPX NetWare Static Services 283 IPX NetWare Static Servi ces Configuration Elements 284 IPX NetWare Static Servi ces Background Information 285
IPX Spoofing 285
Configuring IPX Spoofing 285 IPX Spoofing Configuration Elements 286 IPX Spoofing Background Information 286
Watchdog Protocol 287
SPX Protocol 287
IPX Type 20 Packet Handling 288
Configuring IPX Type 20 Packet Handling 288 IPX Type 20 Packet Handling Configuration Elements 289
IPX Type 20 Packet Handling Device Configuration Elements 289 IPX Type 20 Packet Handling Background Informati on 289
IPX Isolated Mode 289
Configurin g IPX Isolated Mode 289 IPX Isolated Mode Configuration Elements 289 IPX Isolated Mode Background Information 290
IPX Triggered RIP/SAP 290
Displaying WAN Peer List 290 Configuring Triggered RIP/SAP Global Timers 291 Configuration Elements 291 Triggered RIP/SAP Back groun d In formation 292
Workgroup Remote Access Switch 13
IPX-Specific Infor mation for Devices 292
Configuring IPX Device s 292
WAN Devices 292
Remote LAN Devices 295 IPX Configuration Elements for Devices 296 IPX Background Information for Devices 297
IPX Triggered RIP/SAP Device Background 297
Configuring SNMP 298
Overview 298 Configuring SNMP 298 SNMP Configuration Elements 300 SNMP Background Information 301
Configuring AppleTalk Routing 3 0 5
Overview 305 AppleTalk Rou ting Option 305
Enabling AppleTalk Routing 305 AppleTalk Rou ting Option Confi guration Element 306 AppleTalk Routi ng Background Information 306
AppleTalk Ports 306
Configuring AppleTalk Ports 306 AppleTalk Ports Configuration Elements 307 AppleTalk Ports B ackground Information 308
The AppleTalk Network Type 308
Dynami c Node Address Assignment 308
The Zone Concept 309
AppleTalk Remote LAN 309
AppleTalk Static Rout e s 310
Configuring AppleTalk Static Routes 310 AppleTalk Routi ng Static Routes Conf iguration Elemen ts 311 AppleTalk Routi ng Static Routes Background Informati on 311
AppleTalk Capacities 311
Configuring AppleTalk Capacities 311 AppleTalk Capacities Configuration Elements 311 AppleTalk Capacities Background Information 312
AppleTalk Isolated Mode 312
Configuring the AppleTalk Isolated Mode 312 AppleTalk Isolated Mode Configuration Elements 312
Configuring Call Control 31 3
Overview 313 Throughput Monitor 313
Configuring the Throughp ut Monitor 313 Throughput Monitor Configuration Elements 314 Throughput Monitor Background Information 315
Overload Condition Monitori ng 316
Underload Condition Monitoring 316
Idle Condition Monit oring 317
Throughput Monitor Configuration Example 317
14 CyberSWITCH
Call Int erval Param ete r s 3 1 8
Configuring the Call Inter val P arameters 318 Call Interval Config urat ion Element s 318 Call Interval Background Information 318
Monthly Call Charge 319
Configuring Monthly Call Charge 319 Monthly Call Charge Configuration Elements 319 Monthly Call Charge Background Info rmation 319
Call Restrictions 320
Configuring Call Re strict ion s 320 Call Restriction Configuration Elements 320 Call Rest ri c tions Backg round Info rm a t ion 322
Bandwidth Reservation 323
Configuring Bandw idt h Res erv ation 323 Bandwidth Rese rvatio n Configur a tion Elem ent s 325 Bandwidth Reservation Background Information 326
Semipermanent Connections 326
Configuring Semipermanent Connections 326 Semipermanent Connections Configuration Elements 328 Semipermanent Connection s Background Information 328
Interactions with Other Features 328
VRA Manager as a Call Contro l Mana ger 33 0
Configuring VRA Mana ger for Ca ll Contro l 330 Configuration Elements 330 Background Informati on 331
Call Control Manage m ent 331
Limitations/Considerations 332
Configu ring Other Advance d O p tions 333
Overview 333 PPP Configuration 333
Configuring PPP 333 PPP Configuration Elements 334 PPP Background Information 335
PPP Link Failure Detection 335
PPP Reference Documents 336
Default Line Protocol 337
Configuring Default Line P rotocol 337 Default Li ne Protocol Configuration Ele ments 337 Default Line Protocol Background Informatio n 337
Log Options 338
Configuring Log Options 338 Log Options Configuration Elem ents 338 Log Options B ackground Information 339
Local Log File Overvie w 339
Syslog Server Overview 339
CDR Log Report Overview 340
Compression Options 345
Configur ing Compression Options 345 Compression Options Configuration Elements 345 Compression Option s Background Information 346
Compr ession and CCP 347
Workgroup Remote Access Switch 15
TFTP 348
Configuring TF TP 348 TFTP Configura tion Elem en ts 349 TFTP Background Information 349
File Attributes 350
Configuring File Attributes 350 File Attributes Configuration Elem ent s 350 File Attributes Background Inf orm ation 3 50
TROUBLESHOOTING 352
System Verification 353
Overview 353 Verifying Hardware Resources are Operational 353 Verifying WAN Lines are Available for Use 354 Verifying LAN Connecti o n is Operational 354 Verifying Bridge is Initialized 355 Verifying IP Router is Initialized 355 Verifying a Dedicated Con nection 356 Verifying a Frame Relay Connection 356 Verifying an X.25 Connecti on 357 Verifying Remote Device Connectivity 357 Verifying Multi-Level Security 357 Verifying IP Host Mode is Operational 359
Verifying IP Host is Initialized 359 Verifying IP Host Mode is Operational 359
Verifying I P Host Mode Operation ov e r a LAN co nne ction 359
Verifyi ng I P Host Mode Operation ov e r a WAN con nection 360
Verifying IP Routing Over Interfaces 360
Verifying IP Routing Over a LAN Interface 360 Verifying IP Routing Over a WAN Interface 361 Verifying IP Routing Over a WAN (Direct Host) Interface 363 Verifying IP Routing Over a WAN Remote LAN Interface 364 Verifying IP Routing Over a WAN UnNumbered Interface 365
Verifying IP Filters 366 Verifying IP RIP 366
Verifying IP RIP is Initialized 366 Verifying IP RIP Output Processing on a LAN Interface 367 Verifying I P RIP I nput Processi ng on a LAN Interface 368 Verifying IP RIP Output Processing on a WAN Interface 368 Verify IP RIP Inpu t Processing Oper ational on a WAN Interfac e 369
Verifying IPX Router is Initialized 370 Verifying IPX Routing is Operational 370
Verifying IPX Routing over a LAN Connection 3 71 Verifying an IPX Remote LAN Connecti on 371 Verifying IPX Rou ti ng over a WAN Connection 372 Verifying Triggered RIP/SA P 372
16 CyberSWITCH
Verifying the AppleTalk Routing Feature 372
Verifying AppleTalk Routing is Initialized 372 Verifying AppleTalk Routing is Operational 373
Verifying AppleTalk Routing Operational over the LAN connection 374
Verifying AppleTalk Routing Operation over a WAN connection 374
Verifying SNMP is Operational 375 Verifying the Dial Out Feature 376 Verifying Call Detail Recording 376 Verifying Compressio n is Op erational 3 77 Verifying Reserved Bandwidth is Operational 377 Verifying PPP Link Failure Detection is Operational 377 Verifying DHCP Relay Agent 378
Verifying DHCP Relay Agent Initialization 378 Verifying the Relay Agent is Enabled 379 Verifying the Relay Agent is Operational 379
Verifying DHCP: Proxy Client 380
Verifying DHCP Proxy Client Initialization 380 Verifying the Proxy Client is Enabled 381 Verifying the Proxy Client is Operational 381
UDP Ports 381
IP Address Pool 382
Verifying a Semipermanen t Conne cti on 382 Verifying Proxy ARP is Operational 382
Problem Diagnosis 384
Overview 384
General Procedures 384
LAN Adapter 384 Bridge Initializa tion 385 IP Routing Initialization 385 WAN Line Availability 385 Dedicated Co nnections 387 Frame Relay Connections 387 X.25 Connections 388 Remote Device Connectivity 389 Multi-Level Security 390 LAN Attach ment 390 IP Host Mode 391
IP Host Initialization 391 IP Host Mode Operation over the LAN connection 391 IP Host Mode Operation over the WAN connection 392
IP Routing Over Interface Connections 392
IP Routing Over the LAN Interf ace Co nnec tion 3 92 IP Routing Over a WAN Interface Connecti on 393 IP Routing Over a WAN (Direct Host) Interface Connection 394 IP Routing Over a WAN RLAN Interface Connection 395 IP Routing Over a WAN UnNumbered Interface Connection 396
IP Filters 396
Workgroup Remote Access Switch 17
IP RIP 397
IP RIP Initialization 397 IP RIP Output P rocessing on a LAN Interface 398 IP RIP Input Processing on a LAN Interface 398 IP RIP Output P rocessing on a WAN Interface 399 IP RIP Input Processing on a WAN Interface 399
IPX Routing 400
IPX Routing Initialization 400 IPX Routing ove r the LAN Connection 400 IPX Routing ove r the Remote LAN Connection 401 IPX Routing ove r the WAN Connection 402
IPX Routing and Service Tables 403
Triggered RIP/SAP Start Up 404 Triggered RIP/SAP Operation 404
AppleTalk Routing 404
AppleTalk Routi ng Initialization 405 AppleTalk Routing Operational ov er the LAN connection 405 AppleTalk Routing Operational ov er the WAN connection 407
SNMP 408 Dial Out 410 Call Detail Recording 411 Compression 412 DHCP: Relay Agent 413
Relay Agent Initializa tion 413 Enabling the Relay Agent 413 Relay Agent Operatio n 414
DHCP: Proxy Client 414
Proxy Client Initialization 414 Enabling the Proxy Client 415 Proxy Client Operation 415
Proxy ARP Operation 416
LED Indicators 418
Overview 418 Local Area Network LED Indicators 418 WAN LED Indicators 418
BRI LED Indicators 418 PRI LED Indicators 419 LANVIEW LEDs (CSX1200-E11-MOD) 420 NT1 Status LEDs (CSX1200-U4-MOD only) 421
Service I ndicator 422
Service I ndicator Re ma ins Lit 422 Service Indicator Blinks 423
Alarm LEDs (PRI Only) 424
18 CyberSWITCH
System Messages 426
Overview 426 Informational Messages 426
Boot Messages 427 Initialization Messages 427 Normal Operation Messages 427 Status Messages 427 Spanning Tree Messages 428
Warning Messages 428 Error Messages 428 System Message Summary 428
Trace Messages 487
Overview 487 Call Trace Messages 488
Call Trace Message Summary 489
IP Filters Trace Messages 494 PPP Packet Trace Messages 495
WAN FR_IETF Trace Messages 497
X.25 Trace Messages 497
X.25 Trace Message Summary 497
X.25 (LAPB) Trace Messages 500
X.25 (LAPB) Trace Message Summary 500
SYSTEM MAINTENANCE 502
Remote Management 503
Overview 503 SNMP 504
Installation and Configuration 504 Usage Instru ctions 505
Telnet 506
Installation and Configuration 507 Usage Instru ctions 508
TFTP 509
Installation and Configuration 509 Usage Instru ctions 510
Remote Installation with USER2 511
System Commands 513
Overview 513 Accessing Admin istration Servic es 513 Setti n g th e I P Ad d r e s s 5 14 Boot Device Comma nds 514 Accessing Dynamic Managem ent 515 Viewing Operational Inf orm ation 515 Viewing Throughput Information 520
Throughput Monitor Contents 521
Saving Operational Information 521
Workgroup Remote Access Switch 19
Clearing Opera tional Inf orm atio n 522
Configuration-R ela te d Comm an d s 522
Restarting the CyberSWITCH 523 Setti n g the D ate and Ti me 523 File Utility Commands 523 Terminating Admin istration Session s 524 AppleTalk Routing Commands 525 Bridge Commands 530 Call Control Co m ma nd s 531 Call Detail Recording Commands 534 Call Restriction Commands 534 Compression Information Commands 535 DHCP Com m an ds 53 5 Frame Relay Commands 535 IP Routing Commands 537 IPX Rou ting Commands 542 ISDN Usage Commands 544 LAN Commands 545 Log Commands 545 Packet Capture Commands 545 RADIUS Command s 549 SNMP Co mma nds 551 TCP Commands 551 Telnet Commands 551 Termina l Commands 554 TFTP Commands 555 Trace Commands 556 UDP Command s 5 5 7 User Level Security Commands 557 WAN Comm an ds 558 X.25 Commands 558
System Statistics 560
Overview 560 Connectivity Statistics 560 Call Restriction Statistics 560 Call Statistics 561 Throughput Monitoring Statistics 561 AppleTalk Statisti cs 562
AppleTalk Protocol Statistics 562
AppleTalk Data Delivery Protocol (DDP) Statist ic s 562
AppleTalk Echo Protocol (AEP) Sta ti stics 563
AppleTalk Rou ting Table Maintenance Protocol (RTMP) Statistics 564
AppleTalk Zone Informati on Protocol (ZIP) Stati stics 564
AppleTalk Name Binding Protocol (NBP) Statistics 565
AppleTalk Transaction Protocol (ATP) Statistics 565 AppleTalk Port Statistics 566
Bridge Statistics 567 Call Detail Recording Stat istic s 567 Compression St atistics 568
Compression Related Statistics 568 Decompressi on Related Stati stics 568
20 CyberSWITCH
DHCP Statistics 569
Common DHCP Statisti cs 569 DHCP Relay Agent Statistic s 570 DHCP Proxy Client Statistics 571
Frame Relay Statisti cs 572
Access Related Statis tics 572 PVC Related Statist i cs 574
LAN Stati st ics 575 IP Statistics 576
IP Group Statistics 576 ICMP Group Statistics 577
IPX Statistics 579
IPX General Statistics 579
IPX Basic System Table Statistics 579
IPX Advanced System Table Stati stics 580 IPX RIP Statis tics 581 IPX Triggered RIP Statistics 582 IPX Route Statistics 582 IPX SAP Statistics 583 IPX Triggered SAP Statistics 583 IPX Service Statistics 583
RIP Statist ics 584
RIP Global Stati stics 584 RIP Interface Statistics 584
SNMP Statistics 585 TCP Statistics 587 TFTP Statistics 588
Statistics for Serve r or Rem o te initia ted TF TP Ac tiv ity 588 Statistics for Loca l or Clien t Initia ted TFTP Ac tiv ity 589 Statistics for all TFTP Activity 589
UDP Statistics 590 WAN FR_IETF Statistics 591 WAN L1P Statistics 591
PRI S/T (T1/E1) Interface Statistics 591 Layer 1 PRI Error Stat istics 592 Layer 1 General Stati stics 592
WAN Statistics 593 X.25 Statistics 594
X.25 Access Related Statistics 594 X.25 Virtual Circuit (VC) Rel ated Statistics 595
Routine Maintena nce 59 7
Overview 597 Installing/Upgrading System Software 597 Executing Configu ration Changes 597
Configuration Files 597 Making Changes Using CFGEDIT 597 Making Changes Using Manage Mode 598
Configuration Backup and Restore 598 Obtaining System Custom Information 598
Workgroup Remote Access Switch 21
APPENDICES 599
System Worksheets 600
Network Topology 601 System Details 602
Resources 602 Lines 602 Accesses 603
Device Information 604 Bridging and Routing Info rm ation 605
Bridging 605 IP Routing 60 5 IPX Routing 606 AppleTalk Routing 607
CFGEDIT Map 608
Overview 608 Main Menu 608 Physical Resources Menu 609 Options Menu 610 Security Menu 613
Getting Assistance 616
Reporting Problems 616 Contacting Cablet ron Sy stems 616
Administrative Console Commands Table 618 Manage Mode Commands Table 625 Cause Code s Ta ble 629
INDEX 636
22 CyberSWITCH
U
SING THIS GUIDE
The User’s Guide is divided into the following parts:
S
YSTEM OVERVIEW
We begin with an overview of bridging, routing, and specific CyberSWITCH features. Next, we provide an overview for both the system software and hardware.
S
YSTEM INSTALLATION
In this sec tio n of the User’s Guide we provide guidelines for ordering ISDN service in the US, and a step-by-step descr iption of installi ng hardw a re and upgrading software.
B
ASIC CONFIGURATION
We define basic configuration as the configura tion n eeded by most devices . These are the areas of configuration that will get your system up and running. Note that not all configuration steps in this part are required. For example, if you are only using bridging, you will have no need to complete the configuration steps included in the chapter titled Configuring Basic IP Routing.
S
ECURITY CONFIGURATION
The CyberSWITCH pr ovides a great varie t y of security option s. For example, you may us e device level se cu rity, use r l eve l secur ity , or i f pr efe rred , no secu ri ty. You m ay al so perfo rm auth enti ca tion of a device/ user in different ways. The securi ty information may be store d on several dif f erent types of databases, either local ly or on a variety of remote databases.
System secu rity also allows the configurat ion of administ rative session (Telnet session) enhancements. This provides secure access to the system along with flexible control.
A
DVANCED CONFIGURATION
We defi n e advance d co n f igurati on as a way to fin e tu ne y o u r system, or to config ure opti ons that are not necessarily needed by the majority of devices. For example, use this sectio n to configure an alternate access, or to set up SNMP to manage your system.
T
ROUBLESHOOTING
Troubleshooting begins with information for verifying your system installation, and continues with steps to take if there are problems with the installation. Next, it includes a description of system LED indicators, followed by system messages and trace messag e s. Each message listing in these chapters provides the message itself, a message definition, and where appropriate, possible corrective actions.
S
YSTEM MAINTENANCE
In this section, we provide information to help you maintain your CyberSWITCH once it is operating. System maintenance information includes information regarding remote management, a chapter on both the system commands and the system sta tistics, and routine maintenance procedures.
APPENDICES
The User’s Guide provides the following appendices:
N
ETWORK WORKSHEETS
These worksheets are provided to help you gather pertinent infor mat i on for co n fi guring your
system. We recommend that you print copies of these blank forms and fill in the appropriate
information before you begin configuring your system.
CFGEDI T M
AP
This map provides a guide thro ugh the Conf igur ation Ed itor str ucture, and may be a helpful
reference when configuring the CyberSWITCH using the CFGEDIT utility.
G
ETTING ASSISTANCE
This appendix provides information for getting assistance if you run into problems when
installing your system. A FAX form is included. You can print this form, fill out the information
requested, and FAX it to Cabletron Systems, using the provided FAX number.
A
DMINISTRATION CONSOLE COMMANDS
Provide s a tab ular listing of the syste m admi nistration console commands and their use s.
M
ANAGE MODE COMMANDS
Provide s a tab ular listing of the Manage Mode commands and their uses.
C
AUSE CODES
Provides a tabular listing of Q.931 Cause Codes and their meanings. These cause codes may
appear in call trace messages.

DOCUMENTATION SET

This guide, the User’ s Gu ide, provides information to install and configure your system. It also provides information you may need to refer to keep your system running efficiently after it is up and running. For example, it provides a li sting of system messages. Each message l i sting provides a definition of w hat the message means, and where appropriate, corrective action you can take. Many other subjects are covered, including routine maintenance, hardware information, system verifi cation, and problem diagnosi s.
This gu ide is one in teg ral part of th e e n t i re do cu m e n t a tion set. Pl ease refer to th e do cuments described below for additional information.
The Example Networks Guide includes several example networks, beginning with a simple network, and progressing to m ore complex networks. These example network chapters provide configuration instructions that you may find helpful in configuring your own similar network.
The Quick Start pro v ides abbr eviat ed insta lla tion and co nfiguration instructions for exper ie nced users. Specific instructions for setting up various ty p e s of remote devi ce s are also included.
The R ADIUS Authentication User’s Guide describ e s the setup of the RADIUS server software on a UNIX-based system. RADIUS (Remote Authentication Dial In User Service) provides multiple
24 CyberSWITCH
systems c entr al databa se ac cess for sec urity authenti catio n purpos es. I nstru ctions for ob tainin g th is electronic document ca n be found in Configuring Off -node Server Informatio n. If you have Internet access, you may obtain this guide by following the steps outlined below:
Use your Web browser to get to the following address:
http:// ser vice.nei.com
From the re su lting screen, click on Public.
•Click on the Radius director y.
•Click on the Docs directory. The guide will be under this directory.
The Release Notes provide release highlights and important information related to this release. The Release Notes may be disp layed during software ins tallation (or upgrade). They may also be displayed after the system is operatin g by issuing the
GUIDE CONVENTIONS
The following conventions are used throughout the documentation:
Syste m Commands All system comma nds (A dm inist rati on and Mana ge Mo de com mand s) are italic iz ed, and in a different font than the general text. For example, if you are instruct ed to enter the command to test for proper LAN connections, the command would appear as follows:
lan stats
list rel_note.txt
U
SING THIS GUIDE

Guide Conventions

console command.
CFGEDI T S CREENS Screens that appear on the monitor as you are configuring your system using the CFGEDIT utility will be displayed using the style shown b elow:
Main Menu:
1) Physical Resources
2) Options
3) Security
4) Save Changes
Select function from above or <RET> to exit:
ONITOR DISPLAYS
M Any messages or text that is displayed on your monitor w ill be shown in the style be low:
LAN Port <port #> is now in the LISTENING state
WAN Port <port #> is now in the FORWARDING state
LAN Port <port #> is now in the LEARNING state
LAN Port <port #> is now in the FORWARDING state
D
OCUMENTATION TITLES
All references to CyberSWITCH documentation titles will use the same font as normal text, but will be italicized. For example, all references to the User’s Guide will appear as:
User’s Guide
Workgroup Remote Access Switch 25
S
YSTEM OVERVIEW

We inc l u de th e f ollowin g ch a p te rs in the Syst em Overv i ew segment of the User’s Guide.

The CyberSWITCH
Provides the “big picture” view of a CyberSWITCH network. We include an overview of
unique system features, interoperability, security, interfaces, system components, remote
devices, and switches supported.
Hardware Overview
A description of system platforms.
Software Overview
A description of the CyberSWITCH’s system and adminis trative software. We also include a
description of system files.
T
HE CYBER
Because of the strong personal computer presence in the business environment, a move to graphical user interfaces, and the need to make the best use of available resources, there is a growing demand for high speed LAN access for remote devices. PC users need to be part of a work­group or ente rprise LAN, and remote access from home , field offices, and other r e mote locati ons has become a necessity.
With the de mand for remote LAN access, the remote device’s requireme nt for bandwi dth has exceeded the capabilities of traditional analog modems. High-speed digital dedicated lines can certainly provide su fficie nt band wi dt h for LAN inter con n ect ion . How ever , beca use of the high monthly charges associated with dedicated services, the costs are prohibitive for individual users.
New forms of networking are now possible and affordable using the Integrated Services Digital Network (ISDN) . ISDN is being deploy ed by majo r teleco mmunications companie s world- w ide.
With ISDN ser vices, t he costs o f LAN inte rconnect ion are b ased on ac tual usa ge — the user gets the bandwidth of dedicated digital service at dial-up prices.
Our products offer internetworking solutions for small businesses as well as large corporations.
SWITCH

THE CYBER SWI TCH NETWORK

This pa rti cul ar Cyb er SWIT CH model co nsi sts of an embe dded co mmun ica ti ons p la tf or m. It use s a flash file system (instead of a hard disk) an d a t wo-stage boot device to initi al ize the platform and download the system software. The system softw a re is preconf igured to allow immediate connect ion to a local area netwo rk (LAN) or a wide area net work (WAN) with Teln et and/or TFTP access.
This system is geared toward the small office, supporting two to eight (depending on model) simultane ous connection s. Yet the product offers a small of fice a variety of internetworking capabilities.
Workstation
Remote ISDN Bridge
Workstation
Host
BRI
BRI
CSX5500
ISDN
BRI
File Server
BRI
WORKGROUP REMOTE ACCESS SWITCH
Workstation
CSX1200
LAN
B1 B3
10BASE-TRXTXSERVICE
POWER
B2 B4
E1 ONLYB-CHANNELS
B25B27
B29
B31
B21B23
B17B19
B13B15
B9B11
B5 B7
E1DT1
D
B26B28
B30L1
B22B24
B18B20
B14B16
B10B12
B6 B8
Workstation

UNIQUE SYSTEM FEATURES

The CyberSWITCH combines unique features that improve cost-effectiveness, reliability, and performance for wide area network connections to remote devices. These features include:
Authentication Servers
Provide a central database for networks with more than one CyberSWITCH. The central
database consists of manag e able, informational data (ref e rred to as the Device List or Device
Table). This data is acces sed and used for aut hentication when a n ew connection is esta blished
to the system.
Bandwidth Agility
The system dynamically controls the bandwidth in use between itself and other PPP devices.
This is accomplished by estab lishing a nd dis c onn ecting calls . The num be r of calls is limited
only by the types and number of lines av ailable. The system monitors the connections for
utilization and will add and remove the connections based on user- configurable throughput
parameters. As network ba ndw id th requirem ent s increa se or decrea se, the system will
Workstation
PC
(with BRI ISDN TA)
28 CyberSWITCH
THE C
YBER
Unique System Features
automati cally adju st th e nu mber of ne twork con nect ion s. Thus, your n et work costs w il l ref lec t
the actual bandwidth being used.
Filtering
Allows you to control the flow of frames through the network. Filtering becom es nec essary if
you need to re strict remote access or con trol widespread transmission of sporadic messages.
Customer-defined filters can forward messages based on addresses, protocol, or packet data.
Data Compressi on
Allows the system to negotiate compression algorithms with another device on the network.
After successfully negotiating com p re ssion, data is compressed by the remote device and
transmi tte d to the system. The system deco mp resses the data, processes the information
contained in the user data, and forwards the data as required. The system can receive data
coming over a WAN or a LAN, and compress the data before transmitting it to another device
on the network. The net effect is to increase interconnect bandwidth by de creasing
transmi ssion time. If neg o tiation for compression fails, data is transmitted uncompressed.
Dial Out Capability
The system will dial out to remo te dev ices . Th is featur e allows the sy st em to accep t user data
receiv e d on the Ethernet LAN or I S DN network and initiate a data connection to the remote
device specified in the user data. This allows devices on the local LAN to initiate connections
to networks connected to the system over th e switched di gital network. The system monitors
the connection for utilization and will rem ove the connection when it becomes idle.
SWITCH
Dynamic Management
Provides a “real-time” management mechanism that allows many system parameters to be
changed with out interrupting the curren t e xecution state of the system sof tware. This feature
consists of a series of con sole commands that enable a user to display current system
paramet ers , c ha ng e man y par ame ter s d yna mica lly , and wri t e cha ng es t o d isk f il es s o th at the y
remain permanent.
High Speed Digital Connections
The system supp orts 56Kbps and 64Kbps co nnections to remote locatio ns. These dial- up digital
connections provide re liable high throughpu t connections for efficient data tr ansfer for the
same cost as analog connections. If any r e mote devices conn e cted to the system support multi-
link PPP, up to 32 parallel connections can be made at either 56Kbps or 64Kbps.
IP Filters
The IP filters allow you to control the transmission of individual IP packets based on the packet
type. You can specify packet type by IP address (source or destination) or by IP protocol (TCP,
UDP, ICMP).
Once you specify a packet type, two forms of IP filtering are available:
Forwarding Filters, applied at discrete points of the IP processing path to determine if a packet continues its normal processing, and a
Connection Filter, which determines if an IP packet requiring a WAN connection may con­tinue.
•Packet Capture In order to monitor incoming LAN data, the CyberSWITCH packet capture feature will allow you to capture, display, save, and load bridged or routed data packets.
Workgroup Remote Access Switch 29
Protocol Discrimin ation It is possible for multiple types of remote devices to use the same line. The system can determine the device type and the protocol encapsulation used by remote devices.
RS232 Port: Dual Usage If your installation requires you to process PPP-Async data, this feature allows you to use the RS232 port for either console acc ess or a serial data connection. This dual usage is possible throu gh the CyberS W ITCH’s s u p p or t o f Au t osense mo de and Ter minal mo de :
Autosense mode determines whether you are trying to connect using a VT emulation or PPP-
Terminal mode assumes that y ou o nly wa nt to co nnec t usi ng VT emul atio n. A logi n prom pt
•Security Security is a key issue for all central site network mana gers and is a priority with the CyberSWITCHs. The modules provide high level features that help prevent unauthorized or inadver tent acc ess to c riti cal data and reso urces. The mo dules su pport ex tensiv e secu rity lev els including:
PPP PAP and CHAP
User n a me a n d pa ssword
Calling Line ID (CLID)
Ethernet Address
User Authentication
Device Authentication
SecureFas t Virtual Remote Access (SFVRA)
TACACS Client with Radius Server
•RADIUS
Security Dynamic’s ACE/SecurID
Async, and connects you appropriately. (VT emulation requires you to perform four car­riage returns to receive a login prompt.)
is displayed as soon as the connection is made.
Simultaneous Connections The system supp orts simultaneo u s connectio n s to multiple l o ca t i ons. Thes e lo ca tions can connect by using different channels on the same line, or they can connect on different lines. This pooling of lines among many potential loc ations is more cost effective than alternative point­to-point lines.

INTEROPERABILITY OVERVIEW

“Interoperability” is the ability to operate and exchange information in a heterogeneous network. The CyberSWITCH supports interoperability with many different remote devices over ISDN.
INTEROPERABILITY PROTOCOLS
In order to commun icate wi th vari ous remot e devic es over I SDN, the CyberSWI TCH must i dentif y the device type and the protocol it is using.
The CyberSWITCH supports the following line protocols:
HDLC Ethernet Frames
Ordered Protocol for Ethernet Frames
Point-to-Point Protocol (PPP) Encapsulation for IP Datagrams
30 CyberSWITCH
Loading...
+ 614 hidden pages