Enterasys Networks CSX7000 Manuel d'utilisateur

Naviguer en ligne ou télécharger Manuel d'utilisateur pour Mise en réseau Enterasys Networks CSX7000. Enterasys Networks CSX7000 User's Manual Manuel d'utilisatio

  • Télécharger
  • Ajouter à mon manuel
  • Imprimer
  • Page
    / 729
  • Table des matières
  • MARQUE LIVRES
  • Noté. / 5. Basé sur avis des utilisateurs
Vue de la page 0
CENTRAL SITE
REMOTE ACCESS SWITCH
USERS GUIDE
Release 7.4
Cabletron Systems
(603) 332-9400 phone
(603) 337-3075 fax
support@ctron.com
Vue de la page 0
1 2 3 4 5 6 ... 728 729

Résumé du contenu

Page 1 - USER’S GUIDE

CENTRAL SITEREMOTE ACCESS SWITCHUSER’S GUIDERelease 7.4Cabletron Systems(603) 332-9400 phone(603) 337-3075 [email protected]

Page 2 - VIRUS DISCLAIMER

USER’S GUIDE10 CyberSWITCHConfiguring System Options and Information 174Overview 174System Options 174Configuring System Options 174System Option

Page 3 - FCC NOTICE

USER’S GUIDE100 CyberSWITCH4. Ensure that the administration console is properly connected to the administration port on the CyberSWITCH.5. Plug

Page 4 - VCCI NOTICE

Central Site Remote Access Switch 101ACCESSING THE CYBERSWITCHMaking ConnectionsAfter you make a Telnet connection, you will be presented with a

Page 5 - SYSTEM OVERVIEW 29

USER’S GUIDE102 CyberSWITCHInitiating a Call:1. Execute Carbon Copy’s cchelp program which invokes Carbon Copy for guest operation.2. Select Call

Page 6 - SYSTEM INSTALLATION 74

Central Site Remote Access Switch 103ACCESSING THE CYBERSWITCHEstablishing an Administration SessionESTABLISHING AN ADMINISTRATION SESSIONIf a lo

Page 7 - Upgrading System Software 105

USER’S GUIDE104 CyberSWITCHACCESSING THE RELEASE NOTESThe Release Notes provide release highlights and important information related to this rele

Page 8 - BASIC CONFIGURATION 110

UPGRADING SYSTEM SOFTWAREOVERVIEW This chapter describes how to install system software onto the CyberSWITCH. Instructions are included for the follow

Page 9 - Security Overview 161

USER’S GUIDE106 CyberSWITCHmachine being installed. If you cannot determine the platform being used, temporarily configure the platform type as “

Page 10

Central Site Remote Access Switch 107UPGRADING SYSTEM SOFTWAREUpgrading System SoftwareUPGRADING SYSTEM SOFTWARELOCAL UPGRADEThe system upgrade p

Page 11

USER’S GUIDE108 CyberSWITCHError reading platform type: type was not converted to an intError reading platform type: there is no “plat name” fiel

Page 12 - ADVANCED CONFIGURATION 241

Central Site Remote Access Switch 109UPGRADING SYSTEM SOFTWAREAccessing the Release Notes• TFTP feature is enabled• TFTP server is enabled• TFTP

Page 13

Central Site Remote Access Switch 11Configuring Off-node Server Information 207Overview 207Multiple Administration Login Names 207CSM Authenticat

Page 14 - Configuring IPX 321

BASIC CONFIGURATIONWe define basic configuration as the configuration needed by most users. Basic configuration will get your system up and running. N

Page 15

CONFIGURATION TOOLSOVERVIEWWe provide the following configuration tools to set up and/or alter your configuration:• CFGEDIT, the configuration utility

Page 16 - Configuring Call Control 365

USER’S GUIDE112 CyberSWITCHEXECUTING CFGEDITAfter the system software has been loaded, you can start CFGEDIT by entering the following command at

Page 17

Central Site Remote Access Switch 113CONFIGURATION TOOLSDynamic ManagementBefore using Dynamic Management commands, you must first enter the spec

Page 18 - Verifying the Base System 418

USER’S GUIDE114 CyberSWITCHUSING THE NETWORK WORKSHEETSPlease take the time to fill out the requirements worksheets located in System Worksheets.

Page 19 - Verifying System Options 457

CONFIGURING RESOURCES AND LINESOVERVIEWThis chapter describes the configuration of physical resources, lines and subaddresses. Resources refer to the

Page 20 - SYSTEM MAINTENANCE 559

USER’S GUIDE116 CyberSWITCH4. For BRI and PRI resource types: select the proper BRI/PRI switch type for the lines you will be using. The table in

Page 21 - System Commands 576

Central Site Remote Access Switch 117CONFIGURING RESOURCES AND LINESResourcesREGIONFor NET3 and NET5 switchtypes. When configuring switches, firs

Page 22 - System Statistics 627

USER’S GUIDE118 CyberSWITCH•1TR6• TS0-14The expander resource provides additional connections to the PRI resource. It supports eight additional c

Page 23 - APPENDICES 667

Central Site Remote Access Switch 119CONFIGURING RESOURCES AND LINESLinesa three card maximum for DM-24s or DM-30s. These cards may also be combi

Page 24 - INDEX 719

USER’S GUIDE12 CyberSWITCHConfiguring Encryption 231Configuration 231Configuring an Encryption adapter 231Configuring Security Associations and A

Page 25

USER’S GUIDE120 CyberSWITCH3. Select following line characteristics:• framing type• line coding type• T1 signaling methodIf you are unsure of y

Page 26 - DOCUMENTATION SET

Central Site Remote Access Switch 121CONFIGURING RESOURCES AND LINESLinescare that the idle character is set to a value that the receiving device

Page 27 - GUIDE CONVENTIONS

USER’S GUIDE122 CyberSWITCHdatalink deleteDeletes an existing data link.LINE CONFIGURATION ELEMENTSLINE NAMEA 1 to 16 user-defined character stri

Page 28

Central Site Remote Access Switch 123CONFIGURING RESOURCES AND LINESLinesNI-1 and DMS100 switch types, contact your Service Provider for the numb

Page 29

USER’S GUIDE124 CyberSWITCHThe SPID format for Northern Telecom DMS-100 NI-1 Service is:aaannnnnnnsswhere aaa is the 3 digit area code of the BRI

Page 30

Central Site Remote Access Switch 125CONFIGURING RESOURCES AND LINESLinesLINE ENCODING For Primary Rate lines only. Line encoding specifies the n

Page 31 - UNIQUE SYSTEM FEATURES

USER’S GUIDE126 CyberSWITCHdecibel value of 0.0 (meaning no attenuation). If the distance is much closer (for example, 1000 ft.), the decibel val

Page 32

Central Site Remote Access Switch 127CONFIGURING RESOURCES AND LINESSubaddressesR2 SIGNALINGR2 Signaling is a particular framing type commonly fo

Page 33 - Unique System Features

CONFIGURING BASIC BRIDGINGOVERVIEWThis chapter provides information for configuring basic bridging features. Basic bridging configuration includes:• e

Page 34 - NTEROPERABILITY PROTOCOLS

Central Site Remote Access Switch 129CONFIGURING BASIC BRIDGINGMAC Layer Bridging OptionMAC LAYER BRIDGING BACKGROUND INFORMATIONYou are given th

Page 35 - INTEROPERABILITY DEVICES

Central Site Remote Access Switch 13Configuring Advanced Bridging 264Overview 264Bridge Dial Out 264Configuring the Device List for Bridge Dial O

Page 36 - INK LAYER

CONFIGURING BASIC IP ROUTINGOVERVIEWThis chapter provides information for configuring basic IP routing features. Basic IP routing configuration includ

Page 37 - NETWORK INTERFACE OVERVIEW

Central Site Remote Access Switch 131CONFIGURING BASIC IP ROUTINGIP Operating ModeIP OPTION CONFIGURATION ELEMENTSIP OPERATIONAL STATUSYou can en

Page 38 - SYSTEM COMPONENTS

USER’S GUIDE132 CyberSWITCHb. If you select the IP host operating mode, an abbreviated IP configuration is displayed: Notes: Static ARP entries,

Page 39 - REMOTE ISDN DEVICES

Central Site Remote Access Switch 133CONFIGURING BASIC IP ROUTINGIP Network Interfacesinternally, while all other traffic is bridged. With IP hos

Page 40 - SWITCHES SUPPORTED

USER’S GUIDE134 CyberSWITCHl. IP RIP receive controlm. IP RIP v2 authentication control n. IP RIP v2 authentication key (required only if the IP

Page 41 - SYSTEM PLATFORMS

Central Site Remote Access Switch 135CONFIGURING BASIC IP ROUTINGIP Network InterfacesIf IP RIP is enabled, enter the following additional inform

Page 42 - THE CSX5500

USER’S GUIDE136 CyberSWITCHSUBNET MASKThe Subnet Mask value (the number of significant bits for the subnet mask) associated with the IP address s

Page 43 - System Platforms

Central Site Remote Access Switch 137CONFIGURING BASIC IP ROUTINGIP Network Interfacesentered for the interface. For example, if the IP address o

Page 44 - LATFORM CHARACTERISTICS

USER’S GUIDE138 CyberSWITCHIP RIP SEND CONTROLIf IP RIP is enabled for a specific interface (LAN, WAN RLAN, and/or numbered WAN interfaces), an I

Page 45

Central Site Remote Access Switch 139CONFIGURING BASIC IP ROUTINGIP Network InterfacesThe following table provides the possible choices for IP RI

Page 46 - THE CSX6000

USER’S GUIDE14 CyberSWITCHIP Filters 291Initiating the IP Filter Configuration 292Configuring Packet Types 292Configuring the Common IP Portion 2

Page 47

USER’S GUIDE140 CyberSWITCHThe following table provides the possible choices for IP RIP v2 authentication control* This is the default switch. IP

Page 48

Central Site Remote Access Switch 141CONFIGURING BASIC IP ROUTINGIP Network InterfacesAn IP Host device has only one network interface that it us

Page 49 - THE CSX7000

USER’S GUIDE142 CyberSWITCHThe WAN IP Network Interface is used to define remote IP devices (hosts or routers) that require access to the central

Page 50

Central Site Remote Access Switch 143CONFIGURING BASIC IP ROUTINGIP Network InterfacesIn example 1, we show three different types of network inte

Page 51

USER’S GUIDE144 CyberSWITCHIn example 2, the WAN UnNumbered interface is used to eliminate an unnecessary IP Subnet. The RLAN interface is unique

Page 52

Central Site Remote Access Switch 145CONFIGURING BASIC IP ROUTINGIP Network InterfacesIP RIP AND THE IP NETWORK INTERFACESRouting Information Pro

Page 53

USER’S GUIDE146 CyberSWITCHSee illustration, Example 1. Because SITE1 is the only CyberSWITCH that is connected to the logical network, it is rea

Page 54

Central Site Remote Access Switch 147CONFIGURING BASIC IP ROUTINGIP Network InterfacesFor the WAN interface to function properly with IP RIP, add

Page 55 - Express

USER’S GUIDE148 CyberSWITCHCurrently, IP RIP is not supported across an UnNumbered WAN interface. For example, in the following network setup, SI

Page 56 - Back Panel

Central Site Remote Access Switch 149CONFIGURING BASIC IP ROUTINGIP Network InterfacesBecause each IP WAN network interface on the CyberSWITCH is

Page 57

Central Site Remote Access Switch 15IPX Network Interfaces 325Configuring IPX Network Interfaces 325IPX Network Interface Configuration Elements

Page 58 - THERNET-1 ADAPTER

USER’S GUIDE150 CyberSWITCHIP HOST OPERATING MODE AND THE IP NETWORK INTERFACESOnly one network interface can be configured when the IP operating

Page 59 - BASIC RATE ADAPTERS

Central Site Remote Access Switch 151CONFIGURING BASIC IP ROUTINGIP Network Interfaceswith a remote device on a different subnet, the local devic

Page 60 - ONNECTION

USER’S GUIDE152 CyberSWITCHWhen a local host ARPs for a remote host, the CyberSWITCH (with Proxy ARP enabled) determines if it provides the best

Page 61 - PRIMARY RATE ADAPTERS

Central Site Remote Access Switch 153CONFIGURING BASIC IP ROUTINGStatic RoutesUSING MANAGE MODE COMMANDSiprouteDisplays the current IP static rou

Page 62 - HE PRI-23/30

USER’S GUIDE154 CyberSWITCHIP RIP PROPAGATION CONTROLThe IP RIP propagation control determines how a static route is propagated via IP RIP. The f

Page 63 - EXPANDER ADAPTER

Central Site Remote Access Switch 155CONFIGURING BASIC IP ROUTINGStatic Routesreachable directly and therefore no intermediate router will be use

Page 64 - ARDWARE CHARACTERISTICS

USER’S GUIDE156 CyberSWITCHSTATIC ROUTE BACKGROUND INFORMATIONYou only need to configure Static Routing entries if you need to access a WAN netwo

Page 65 - RS232 ADAPTER

Central Site Remote Access Switch 157CONFIGURING BASIC IP ROUTINGDefault RoutesDEFAULT ROUTESCONFIGURING DEFAULT ROUTESThe default route is a for

Page 66

USER’S GUIDE158 CyberSWITCHconnection is over a WAN. You may want to assign this route a high number of hops to limit toll charges, in case there

Page 67 - DIGITAL MODEMS

Central Site Remote Access Switch 159CONFIGURING BASIC IP ROUTINGRouting Information Protocol (RIP) OptionUSING MANAGE MODE COMMANDSipripThis com

Page 68 - HE DM-24+AND DM-30+

USER’S GUIDE16 CyberSWITCHConfiguring SNMP 350Overview 350Configuring SNMP 350SNMP Configuration Elements 352SNMP Background Information 353Using

Page 69 - ENCRYPTION ADAPTER

SECURITY AND ENCRYPTION OPTIONSThe CyberSWITCH product allows you to decide the extent and type of security for your network. This security may consis

Page 70 - ADMINISTRATION SOFTWARE

SECURITY OVERVIEWOVERVIEWSecurity is an important issue to consider when you are setting up a network. The CyberSWITCH provides several security optio

Page 71 - SYSTEM FILES

USER’S GUIDE162 CyberSWITCHMultilevel security provides both user level security and device level security for local (on-node) database, Radius,

Page 72 - PERATIONAL FILES

Central Site Remote Access Switch 163SECURITY OVERVIEWUser Level DatabasesThese environments include an on-node database and a variety of off-node

Page 73 - USER LEVEL SECURITY FILES

CONFIGURING SECURITY LEVELOVERVIEWThe CyberSWITCH offers the following levels of network security: no security, device level security, user level secu

Page 74 - NSTALLATION

Central Site Remote Access Switch 165CONFIGURING SECURITY LEVELOverviewPlan what level(s) of security you will use, and configure them now. You w

Page 75

USER’S GUIDE166 CyberSWITCHNO SECURITYCONFIGURING NO SECURITYUSING CFGEDIT1. To begin the configuration of an on-node database or any of the Secu

Page 76

Central Site Remote Access Switch 167CONFIGURING SECURITY LEVELDevice Level SecurityDEVICE LEVEL SECURITYCONFIGURING DEVICE LEVEL SECURITYUSING C

Page 77

USER’S GUIDE168 CyberSWITCHOVERVIEW OF DEVICE AUTHENTICATION PROCESSWhen a remote device connects, the CyberSWITCH negotiates the required authen

Page 78 - USTOM POINT-TO-POINT SERVICE

Central Site Remote Access Switch 169CONFIGURING SECURITY LEVELUser Level SecurityThe following sections provide information regarding authentica

Page 79

Central Site Remote Access Switch 17Call Restrictions 372Configuring Call Restrictions 372Call Restriction Configuration Elements 373Call Restric

Page 80

USER’S GUIDE170 CyberSWITCHSYSTEM REQUIREMENTSWhen providing user level security for the CyberSWITCH, you must establish Remote User-to-LAN Conne

Page 81

Central Site Remote Access Switch 171CONFIGURING SECURITY LEVELUser Level SecurityAUTHENTICATION PROCESS WITH USER LEVEL SECURITYMaking a Telnet

Page 82

USER’S GUIDE172 CyberSWITCHTACACS:with PINPAD SecureID Card1. Enter login Id (remote machine).2. Enter password onto SecurID card, which generate

Page 83

Central Site Remote Access Switch 173CONFIGURING SECURITY LEVELDevice and User Level SecurityDEVICE AND USER LEVEL BACKGROUND INFORMATIONMulti-le

Page 84

CONFIGURING SYSTEM OPTIONS AND INFORMATIONOVERVIEWSystem options include security options for remote devices. The security required for the authentica

Page 85 - Adapter Settings

Central Site Remote Access Switch 175CONFIGURING SYSTEM OPTIONS AND INFORMATIONSystem OptionsNote: It is not necessary to disable a security opti

Page 86 - DAPTER I/O ADDRESS SETTINGS

USER’S GUIDE176 CyberSWITCHNote: If a system is brought on line with a device that has a required Calling Line Id that is a duplicate of another

Page 87

Central Site Remote Access Switch 177CONFIGURING SYSTEM OPTIONS AND INFORMATIONSystem OptionsThe above process applies to the system’s authentica

Page 88

USER’S GUIDE178 CyberSWITCHThe following table summarizes the identifying and authenticating information used by each remote device type to conne

Page 89 - MVIP SETTINGS

Central Site Remote Access Switch 179CONFIGURING SYSTEM OPTIONS AND INFORMATIONAdministrative SessionSYSTEM PASSWORDThe System Password is a user

Page 90 - DDITIONAL ADAPTER SETTINGS

USER’S GUIDE18 CyberSWITCHDefault Line Protocol 399Configuring Default Line Protocol 399Default Line Protocol Configuration Elements 400Default L

Page 91

USER’S GUIDE180 CyberSWITCH4. You may specify an authentication database location for administrative sessions that is different from the user aut

Page 92

Central Site Remote Access Switch 181CONFIGURING SYSTEM OPTIONS AND INFORMATIONAdministrative SessionTIMEOUT VALUEAllows you to terminate login s

Page 93

USER’S GUIDE182 CyberSWITCHEMERGENCY TELNET SERVER PORT NUMBER BACKGROUND INFORMATIONThere are some Telnet client programs that do not clear Teln

Page 94 - ONNECTING MULTIPLE ADAPTERS

CONFIGURING DEVICE LEVEL DATABASESOVERVIEWDevice level security is an authentication process between internetworking devices, in which authentication

Page 95

USER’S GUIDE184 CyberSWITCH2. Select option (1) On-node Device Database from the Device level Databases menu. The following screen will be displa

Page 96

Central Site Remote Access Switch 185CONFIGURING DEVICE LEVEL DATABASESOn-node Device Entries4. The Device Table menu will then be displayed simi

Page 97 - SUMMARY OF GUIDELINES

USER’S GUIDE186 CyberSWITCH6. For Frame Relay devices:Note: You must first configure the Frame Relay Access. Instructions for configuring the acc

Page 98

Central Site Remote Access Switch 187CONFIGURING DEVICE LEVEL DATABASESOn-node Device EntriesIf you select PVC, the list of available PVCs are di

Page 99 - NULL-MODEM CONNECTION TO A PC

USER’S GUIDE188 CyberSWITCH9. Enter the authentication information needed. To begin entering the information, select Authentication from the Devi

Page 100 - EMOTE CONNECTION USING TELNET

Central Site Remote Access Switch 189CONFIGURING DEVICE LEVEL DATABASESOn-node Device EntriesIf your device requires an IP address, enter it now.

Page 101 - Making Connections

Central Site Remote Access Switch 19Alternate Accesses 429Dedicated Connections 429Frame Relay Connections 430PPP Link Failure Detection 430X.25

Page 102

USER’S GUIDE190 CyberSWITCHb. Press 2 at the above menu to enter the device’s AppleTalk address. If the device is over an unnumbered link, enter

Page 103 - CCESSING

Central Site Remote Access Switch 191CONFIGURING DEVICE LEVEL DATABASESOn-node Device EntriesUSING MANAGE MODE COMMANDSdeviceDisplays the current

Page 104 - ACCESSING THE RELEASE NOTES

USER’S GUIDE192 CyberSWITCH• IP Host (RFC 1294)RFC 1294 provides a simple security exchange at connection time, along with an encapsulation metho

Page 105 - PGRADING

Central Site Remote Access Switch 193CONFIGURING DEVICE LEVEL DATABASESOn-node Device EntriesDIAL-OUT PHONE NUMBER(S)This configuration element i

Page 106 - Release n.n.n

USER’S GUIDE194 CyberSWITCHX.121 ADDRESSIf you choose an SVC for your virtual circuit, you must provide the X.121 address of the remote device yo

Page 107 - UPGRADING SYSTEM SOFTWARE

Central Site Remote Access Switch 195CONFIGURING DEVICE LEVEL DATABASESOn-node Device EntriesOUTBOUND AUTHENTICATIONThis parameter allows you to

Page 108 - EMOTE UPGRADE

USER’S GUIDE196 CyberSWITCHcompare the incoming CLID with the value configured in the On-node Device Table. If the numbers are identical the conn

Page 109

Central Site Remote Access Switch 197CONFIGURING DEVICE LEVEL DATABASESOn-node Device EntriesIPX EXTERNAL WAN NETWORK NUMBERSpecifies a user-conf

Page 110 - ONFIGURATION

USER’S GUIDE198 CyberSWITCHBRIDGE INFORMATION CONFIGURATION ELEMENTSIP (SUB) NETWORK NUMBERIf the CyberSWITCH uses an IP RLAN interface to connec

Page 111

Central Site Remote Access Switch 199CONFIGURING DEVICE LEVEL DATABASESOn-node Device EntriesCOMPRESSION CONFIGURATION ELEMENTSDEVICE COMPRESSION

Page 112 - DYNAMIC MANAGEMENT

USER’S GUIDE2 CyberSWITCHNOTICEYou may post this document on a network server for public use as long as nomodifications are made to the document.

Page 113 - Dynamic Management

USER’S GUIDE20 CyberSWITCHModem Callback 470Verifying a Semipermanent Connection 471Proxy ARP 472TROUBLESHOOTING 474LCD Messages 475Overview 475L

Page 114 - USING THE NETWORK WORKSHEETS

USER’S GUIDE200 CyberSWITCHThe following table identifies the configuration requirements for possible security options for remote bridge devices.

Page 115 - ESOURCES

Central Site Remote Access Switch 201CONFIGURING DEVICE LEVEL DATABASESOn-node Device EntriesIP Routing with IP Host Devices (RFC1294)To allow an

Page 116

USER’S GUIDE202 CyberSWITCHBridging with PPP Bridge Devices (Using BCP)To allow a PPP Bridge device to connect to the CyberSWITCH, you must have

Page 117 - Resources

Central Site Remote Access Switch 203CONFIGURING DEVICE LEVEL DATABASESOff-node Device Database LocationThe following table identifies the config

Page 118

USER’S GUIDE204 CyberSWITCHOFF-NODE DEVICE DATABASE LOCATION CONFIGURATION ELEMENTSDATABASE LOCATIONThe database location for device level securi

Page 119 - CONFIGURING LINES

CONFIGURING USER LEVEL DATABASESOVERVIEWUser level security is an authentication process between a specific user and a device. The authentication proc

Page 120

USER’S GUIDE206 CyberSWITCHUSER LEVEL AUTHENTICATION DATABASE LOCATION CONFIGURATION ELEMENTSDATABASE LOCATIONThe database location for user leve

Page 121

CONFIGURING OFF-NODE SERVER INFORMATIONOVERVIEWThis chapter provides information on configuring the CyberSWITCH so that it will be able to communicate

Page 122 - INE CONFIGURATION ELEMENTS

USER’S GUIDE208 CyberSWITCHCSM AUTHENTICATION SERVERCONFIGURING CSM AUTHENTICATION SERVERNotes: In order for the CyberSWITCH to reference CSM fo

Page 123 - ERVICE PROFILE ID (SPID)

Central Site Remote Access Switch 209CONFIGURING OFF-NODE SERVER INFORMATIONRADIUS ServerCSM AUTHENTICATION SERVER CONFIGURATION ELEMENTSTCP PORT

Page 124

Central Site Remote Access Switch 21TFTP 568Installation and Configuration 568Usage Instructions 569Carbon Copy 570Installation and Configuration

Page 125 - INE BUILD OUT

USER’S GUIDE210 CyberSWITCHFor Device Level Security:• Specify Device Level Security (from Main Menu, Security, Security Level)• Select RADIUS fr

Page 126 - INE BACKGROUND INFORMATION

Central Site Remote Access Switch 211CONFIGURING OFF-NODE SERVER INFORMATIONRADIUS ServerUSING MANAGE MODE COMMANDSradiusDisplays the current RAD

Page 127 - SUBADDRESSES

USER’S GUIDE212 CyberSWITCHThe Remote Authentication Dial-In User Service (RADIUS) is a central database supported by the CyberSWITCH. RADIUS ope

Page 128

Central Site Remote Access Switch 213CONFIGURING OFF-NODE SERVER INFORMATIONRADIUS Server4. Select (1) Primary Server to enter the following info

Page 129 - MAC Layer Bridging Option

USER’S GUIDE214 CyberSWITCHradiusDisplays the current RADIUS server configuration data. radaccAllows you to change the current RADIUS Accounting

Page 130

Central Site Remote Access Switch 215CONFIGURING OFF-NODE SERVER INFORMATIONRADIUS RFC2138VERIFICATION AND DIAGNOSISAfter configuring the RADIUS

Page 131 - IP OPERATING MODE

USER’S GUIDE216 CyberSWITCHUSING MANAGE MODEoffnodeAllows you to change current settings for off-node server options. You may use this command to

Page 132

Central Site Remote Access Switch 217CONFIGURING OFF-NODE SERVER INFORMATIONDynamic Device OptionUSING MANAGE MODEoffnodeAllows you to change cur

Page 133 - IP NETWORK INTERFACES

USER’S GUIDE218 CyberSWITCHIf a specific set of parameters is required for a particular device, configure the specific device independently, eith

Page 134

Central Site Remote Access Switch 219CONFIGURING OFF-NODE SERVER INFORMATIONTACACS Authentication ServerUSING MANAGE MODE COMMANDStacacsDisplays

Page 135 - IP Network Interfaces

USER’S GUIDE22 CyberSWITCHTelnet Commands 618Terminal Commands 620TFTP Commands 621Trace Commands 622UDP Commands 623User Level Security Commands

Page 136

USER’S GUIDE220 CyberSWITCHACE AUTHENTICATION SERVER CONFIGURING AN ACE AUTHENTICATION SERVERNote: In order for the CyberSWITCH to reference an A

Page 137

Central Site Remote Access Switch 221CONFIGURING OFF-NODE SERVER INFORMATIONACE Authentication Serverb. Specify the time between retries. c. Choo

Page 138

USER’S GUIDE222 CyberSWITCHTIME BETWEEN ACCESS REQUEST RETRIESThe time between Access Request Retries sent from the system. The initial default v

Page 139

CONFIGURING NETWORK LOGIN INFORMATIONOVERVIEWThe CyberSWITCH offers a number of configurable options to control the login process for this system and

Page 140

USER’S GUIDE224 CyberSWITCHTelnet session for authentication. Item (11), Terminal Server Security, allows you to specify type of security for thi

Page 141

Central Site Remote Access Switch 225CONFIGURING NETWORK LOGIN INFORMATIONNetwork Login BannersNETWORK LOGIN GENERAL CONFIGURATION BACKGROUND INF

Page 142

USER’S GUIDE226 CyberSWITCHnetlogin changeAllows you to change the current network login configuration data. After entering the netlogin change c

Page 143

Central Site Remote Access Switch 227CONFIGURING NETWORK LOGIN INFORMATIONLogin Configuration Specific to RADIUS ServerUSING MANAGE MODEnetloginD

Page 144

USER’S GUIDE228 CyberSWITCHThe password control character is a key sequence you specify to switch between the login mode and the change password

Page 145

Central Site Remote Access Switch 229CONFIGURING NETWORK LOGIN INFORMATIONLogin Configuration Specific to TACACS ServerNote: There is no customi

Page 146

Central Site Remote Access Switch 23RIP Statistics 651RIP Global Statistics 651RIP Interface Statistics 651Serial Interface Statistics 652SNMP St

Page 147 - (3.0.0.0)

USER’S GUIDE230 CyberSWITCHTACACS may provide return code messages upon user login. You may customize these messages through CFGEDIT. The default

Page 148

CONFIGURING ENCRYPTIONOVERVIEWThe CyberSWITCH encryption option provides 56-bit data encryption through two different implementations:• IP (or Network

Page 149

USER’S GUIDE232 CyberSWITCHCONFIGURING SECURITY ASSOCIATIONS AND AUTHENTICATION (IP SECURITY ONLY)IP Security encryption configuration consists o

Page 150 - SING MULTIPLE IP ADDRESSES

Central Site Remote Access Switch 233CONFIGURING ENCRYPTIONConfigurationNote: For the Final Destination and Source IP addresses, you may enter th

Page 151

USER’S GUIDE234 CyberSWITCH7. Enable the Decryption/Encryption feature. (This selection is a toggle switch).8. Configure encryption key implement

Page 152 - SING CFGEDIT

Central Site Remote Access Switch 235CONFIGURING ENCRYPTIONConfigurationassociations for incoming and outgoing packets. The incoming packet secur

Page 153 - Static Routes

USER’S GUIDE236 CyberSWITCH SECURITY PARAMETER INDEX (SPI)A 32-bit number (eight hexadecimal digits) used to identify the security associations b

Page 154

Central Site Remote Access Switch 237CONFIGURING ENCRYPTIONEncryption Background InformationThe peer must also have corresponding Security Associ

Page 155

USER’S GUIDE238 CyberSWITCHOn the CyberSWITCH, AH is added to a packet after ESP application. When a remote node receives the encrypted packet, i

Page 156

Central Site Remote Access Switch 239CONFIGURING ENCRYPTIONEncryption Background InformationAUTOMATED KEY EXCHANGEThe CyberSWITCH’s automated key

Page 157 - DEFAULT ROUTES

USER’S GUIDE24 CyberSWITCHSystem Worksheets 683Network Topology 684System Details 685Resources 685Lines 685Accesses 686Device Information 687Brid

Page 158 - NABLING/DISABLING IP RIP

USER’S GUIDE240 CyberSWITCHMULTIPLE MAC/IP ADDRESSESFor backup purposes, you may want to consider using the multiple MAC or multiple IP address f

Page 159 - IP RIP BACKGROUND INFORMATION

ADVANCED CONFIGURATIONWe define advanced configuration as the configuration you may use to fine tune your system, or to configure options that are not

Page 160 - NCRYPTION

CONFIGURING ALTERNATE ACCESSESOVERVIEWAn access defines the connection details the CyberSWITCH uses to reach the network. The default access is ISDN a

Page 161 - SECURITY LEVEL

Central Site Remote Access Switch 243CONFIGURING ALTERNATE ACCESSESDedicated AccessesDEDICATED ACCESS CONFIGURATION ELEMENTSLINESThe line that wil

Page 162 - DEVICE LEVEL DATABASES

USER’S GUIDE244 CyberSWITCHTo define a Dedicated Access, you must select a previously defined line. Then, input the details required to use the l

Page 163 - User Level Databases

Central Site Remote Access Switch 245CONFIGURING ALTERNATE ACCESSESX.25 Accesses4. Enter the X.121 address of the local DTE (the CyberSWITCH).5. S

Page 164

USER’S GUIDE246 CyberSWITCH3. Configure the X.25 Reliability, Windows, and Acknowledgment Facilities.a. Select the type of sequence numbers to be

Page 165 - ISDN Router

Central Site Remote Access Switch 247CONFIGURING ALTERNATE ACCESSESX.25 AccessesPERMANENT VIRTUAL CIRCUIT INFORMATIONNote: SVCs and PVCs are speci

Page 166 - NO SECURITY

USER’S GUIDE248 CyberSWITCHBEARER CHANNELS A list of bearers (a channel map) that will be used on the line associated with this X.25 access. For

Page 167 - DEVICE LEVEL SECURITY

Central Site Remote Access Switch 249CONFIGURING ALTERNATE ACCESSESX.25 AccessesX.25 ACCESS CONFIGURATION ELEMENTSThe X.25 Access configuration el

Page 168 - SING MANAGE MODE

USING THIS GUIDEThe User’s Guide is divided into the following parts:SYSTEM OVERVIEWWe begin with an overview of bridging, routing, and specific Cyber

Page 169 - User Level Security

USER’S GUIDE250 CyberSWITCHX.25 RELIABILITY, WINDOWS, AND ACKNOWLEDGMENTX.25 SEQUENCE NUMBER RANGEThe type of sequence numbers to be used for X.2

Page 170 - Security Server

Central Site Remote Access Switch 251CONFIGURING ALTERNATE ACCESSESX.25 AccessesNONSTANDARD DEFAULT TRANSMIT WINDOW SIZEThe number of frames that

Page 171

USER’S GUIDE252 CyberSWITCHX.25 RESTRICTION FACILITIES These facilities are used to place restrictions upon incoming and outgoing X.25 calls. BAR

Page 172

Central Site Remote Access Switch 253CONFIGURING ALTERNATE ACCESSESX.25 AccessesNONSTANDARD DEFAULT RECEIVE WINDOW SIZEThe number of frames that a

Page 173

USER’S GUIDE254 CyberSWITCHa virtual path, although it appears that a real circuit exits, in reality, the network routes the device’s information

Page 174 - NFORMATION

Central Site Remote Access Switch 255CONFIGURING ALTERNATE ACCESSESFrame Relay AccessesCURRENT X.25 RESTRICTIONS• X.25 virtual circuits must be tw

Page 175 - ALLING LINE ID SECURITY

USER’S GUIDE256 CyberSWITCH6. Enter a list of bearers (a channel map). For T1 or PRI lines, the range of channels is from 1 to 24.For BRI lines,

Page 176

Central Site Remote Access Switch 257CONFIGURING ALTERNATE ACCESSESFrame Relay Accesses8. Indicate whether or not Congestion Control should be ena

Page 177 - OST ID SECURITY

USER’S GUIDE258 CyberSWITCHhave a per packet charge, therefore, the administrator should be cautious when enabling this feature.LMIIndicates whet

Page 178 - SYSTEM INFORMATION

Central Site Remote Access Switch 259CONFIGURING ALTERNATE ACCESSESFrame Relay Accessesnetwork, the one to which the access line is directly conne

Page 179 - ADMINISTRATIVE SESSION

USER’S GUIDE26 CyberSWITCHAPPENDICESThe User’s Guide provides the following appendices:NETWORK WORKSHEETS These worksheets are provided to help y

Page 180

USER’S GUIDE260 CyberSWITCHFRAME RELAY ACCESS BACKGROUND INFORMATIONFrame Relay is a frame mode service in which data is switched on a per frame

Page 181 - ELNET SERVER TCP PORT NUMBER

Central Site Remote Access Switch 261CONFIGURING ALTERNATE ACCESSESFrame Relay Accessesconfigured in the device table. It will find the PVC and th

Page 182

USER’S GUIDE262 CyberSWITCH-- the rate at which data frames may be sent into the network without incurring congestion. This is generally accepted

Page 183 - ATABASES

Central Site Remote Access Switch 263CONFIGURING ALTERNATE ACCESSESFrame Relay AccessesHowever, under the above stated conditions, the network con

Page 184 - ON-NODE DEVICE ENTRIES

CONFIGURING ADVANCED BRIDGINGOVERVIEWWhen bridging is enabled, optional advanced features are available. Optional bridging features include:• bridge d

Page 185 - On-node Device Entries

Central Site Remote Access Switch 265CONFIGURING ADVANCED BRIDGINGBridge Dial OutCONFIGURING THE DEVICE LIST FOR BRIDGE DIAL OUTNote: The Configu

Page 186

USER’S GUIDE266 CyberSWITCH9. Enable Bridging.10. Enable Make Calls for bridge data. You must have already configured the device’s phone number (

Page 187

Central Site Remote Access Switch 267CONFIGURING ADVANCED BRIDGINGSpanning Tree ProtocolSPANNING TREE PROTOCOL CONFIGURATION ELEMENTSOnly the Eth

Page 188

USER’S GUIDE268 CyberSWITCHBRIDGE MODE OF OPERATIONCONFIGURING THE BRIDGE MODE OF OPERATIONUSING CFGEDIT1. Select Mode of Operation from the Brid

Page 189

Central Site Remote Access Switch 269CONFIGURING ADVANCED BRIDGINGBridge FiltersRESTRICTED BRIDGE MODEIf the Restricted Bridge Mode is selected,

Page 190

Central Site Remote Access Switch 27Guide ConventionsThe Quick Start provides abbreviated installation and configuration instructions for experie

Page 191

USER’S GUIDE270 CyberSWITCH5. Configure protocol filters.a. Select to add a protocol filter.b. Select a protocol definition Id.c. Select a distri

Page 192

Central Site Remote Access Switch 271CONFIGURING ADVANCED BRIDGINGBridge FiltersDestination MAC Filter CommandsdestfiltDisplays the current desti

Page 193

USER’S GUIDE272 CyberSWITCHBRIDGE FILTER CONFIGURATION ELEMENTSPROTOCOL DEFINITION CONFIGURATION ELEMENTS PROTOCOL NAMEA user-defined name for th

Page 194

Central Site Remote Access Switch 273CONFIGURING ADVANCED BRIDGINGBridge FiltersBRIDGE FILTERS BACKGROUND INFORMATIONUser-defined bridge filters

Page 195

USER’S GUIDE274 CyberSWITCHTwo of the more common protocols used today are:•The IP Protocol Id, which identifies DOD Internet Protocol packets wi

Page 196

Central Site Remote Access Switch 275CONFIGURING ADVANCED BRIDGINGBridge Filters3. DESTINATION MAC-address DISCARD < distribution list >Thi

Page 197

USER’S GUIDE276 CyberSWITCHThe following charts summarize the filter actions available for Unrestricted Bridging: Filter Action Distribution List

Page 198

Central Site Remote Access Switch 277CONFIGURING ADVANCED BRIDGINGBridge FiltersFor Unrestricted Bridging, the following additional filter action

Page 199

USER’S GUIDE278 CyberSWITCHRestricted Mode Bridge Filters1. SOURCE unicast-address FORWARD <distribution list>This filter allows you to sti

Page 200

Central Site Remote Access Switch 279CONFIGURING ADVANCED BRIDGINGBridge Filters5. PROTOCOL protocol-Id FORWARD < distribution list >This f

Page 201

USER’S GUIDE28 CyberSWITCHDOCUMENTATION TITLESAll references to CyberSWITCH documentation titles will use the same font as normal text, but will

Page 202

USER’S GUIDE280 CyberSWITCHThe following chart summarizes the forward and connect filter actions available for Restricted Bridging: Filter Action

Page 203

Central Site Remote Access Switch 281CONFIGURING ADVANCED BRIDGINGBridge FiltersFor Restricted Bridging, the following additional filter actions

Page 204

USER’S GUIDE282 CyberSWITCH* Device List may be the on-node device database, or it may be located on an off-node authentication server.For Restri

Page 205

Central Site Remote Access Switch 283CONFIGURING ADVANCED BRIDGINGBridge FiltersDIAL OUT USING BRIDGE FILTERSEach type of bridge filter for each

Page 206

USER’S GUIDE284 CyberSWITCH3. From the Bridging Menu, select Bridge Filters. The menus similar to the following will then be displayed. Follow th

Page 207

Central Site Remote Access Switch 285CONFIGURING ADVANCED BRIDGINGKnown Connect ListYour filter is now configured for this example. Remember, eac

Page 208 - CSM AUTHENTICATION SERVER

USER’S GUIDE286 CyberSWITCHKNOWN CONNECT LIST CONFIGURATION ELEMENTSDEVICE NAMEThe name of a bridge device that has been preconfigured in the On-

Page 209 - RADIUS SERVER

CONFIGURING ADVANCED IP ROUTINGOVERVIEWBy default, IP routing is disabled when you first install your system software. After IP routing is enabled, th

Page 210

USER’S GUIDE288 CyberSWITCHSTATIC ARP TABLE ENTRIESCONFIGURING STATIC ARP TABLE ENTRIESUSING CFGEDITOnce IP has been enabled, the full IP Configu

Page 211 - ORT NUMBER

Central Site Remote Access Switch 289CONFIGURING ADVANCED IP ROUTINGThe Isolated ModeTHE ISOLATED MODECONFIGURING THE ISOLATED MODEUSING CFGEDIT1

Page 212

SYSTEM OVERVIEWWe include the following chapters in the System Overview segment of the User’s Guide.• The CyberSWITCHProvides the “big picture” view o

Page 213

USER’S GUIDE290 CyberSWITCHSTATIC ROUTE VIA RADIUS CONFIGURATION ELEMENTSSTATIC ROUTE VIA RADIUS STATUSYou may enable or disable this option.STAT

Page 214 - ERFORMANCE

Central Site Remote Access Switch 291CONFIGURING ADVANCED IP ROUTINGIP FiltersIP ADDRESS POOL BACKGROUND INFORMATIONThe IP Address Pool feature a

Page 215 - RADIUS RFC2138

USER’S GUIDE292 CyberSWITCHINITIATING THE IP FILTER CONFIGURATIONUSING CFGEDITTo begin the configuration process, IP must be enabled. Access IP F

Page 216 - ACKGROUND INFORMATION

Central Site Remote Access Switch 293CONFIGURING ADVANCED IP ROUTINGIP FiltersThe screen identifies the common portion of the packet type, which

Page 217 - BACKGROUND INFORMATION

USER’S GUIDE294 CyberSWITCH8. Select IP protocol. If you choose an upper-level protocol, refer to the three following configuration sections: Con

Page 218 - TACACS AUTHENTICATION SERVER

Central Site Remote Access Switch 295CONFIGURING ADVANCED IP ROUTINGIP Filters1. Select UDP Source Port. Note that the ports are specified in ter

Page 219 - PACKET FORMAT

USER’S GUIDE296 CyberSWITCHCONFIGURING FORWARDING FILTERSThe configuration of Forwarding Filters is a two-part process. First you must name the f

Page 220 - ACE AUTHENTICATION SERVER

Central Site Remote Access Switch 297CONFIGURING ADVANCED IP ROUTINGIP FiltersCONFIGURING CONNECTION FILTERSThe IP Connection Filter is used at t

Page 221

USER’S GUIDE298 CyberSWITCHCONFIGURING EXCEPTION FILTERThe IP Exception Filter is intended for temporary, special conditions within an existing f

Page 222

Central Site Remote Access Switch 299CONFIGURING ADVANCED IP ROUTINGIP FiltersMODIFYING THE FINAL CONDITION FOR A FILTERTo change the final condi

Page 223

Central Site Remote Access Switch 3TRADEMARKSCabletron Systems, CyberSWITCH, MMAC-Plus, SmartSWITCH, SPECTRUM,and SecureFast Virtual Remote Acces

Page 224

THE CYBERSWITCHThe CyberSWITCH family of products represents the latest in high-speed remote access hardware and software tools. These products allow

Page 225 - NETWORK LOGIN BANNERS

USER’S GUIDE300 CyberSWITCH6. Select IP Information.7. Select either IP Input Filter or IP Output filter. 8. Provide the filter name.IP FILTERS C

Page 226

Central Site Remote Access Switch 301CONFIGURING ADVANCED IP ROUTINGIP FiltersEQ equal to <port>NEQ not equal to <port>LT less than &

Page 227

USER’S GUIDE302 CyberSWITCHSample packet passing through a filterFILTER COMPOSITIONThe IP filtering mechanism is composed of three fundamental bu

Page 228

Central Site Remote Access Switch 303CONFIGURING ADVANCED IP ROUTINGIP Filtersattached network.• through the Output Network Interface: applies th

Page 229

USER’S GUIDE304 CyberSWITCHBecause the Packet Types within the conditions specify both source and destination address information, Global applica

Page 230

Central Site Remote Access Switch 305CONFIGURING ADVANCED IP ROUTINGIP FiltersCommon Portion:Protocol-Specific Portion TCP:Protocol-Specific Port

Page 231

USER’S GUIDE306 CyberSWITCHEXAMPLE OF AN IP FILTER CONFIGURATIONThis example provides a simple filtering scenario in which a corporate LAN utiliz

Page 232

Central Site Remote Access Switch 307CONFIGURING ADVANCED IP ROUTINGIP FiltersThe corporate dial-in access is realized with a WAN Direct Interfac

Page 233 - Configuration

USER’S GUIDE308 CyberSWITCHOnce the offsite maintenance is completed, the Exception filter would be disabled. Configuration control over the Exce

Page 234

Central Site Remote Access Switch 309CONFIGURING ADVANCED IP ROUTINGDHCP Relay AgentDHCP CONFIGURATION ELEMENTSDHCP/BOOTP RELAY AGENT ENABLE/DISA

Page 235

Central Site Remote Access Switch 31THE CYBERSWITCHUnique System FeaturesUNIQUE SYSTEM FEATURESThe CyberSWITCH combines unique features that impr

Page 236 - MPLEMENTATION

USER’S GUIDE310 CyberSWITCHBridge to Bridge EnvironmentAs shown in the picture above, when a remote LAN is connected with bridge devices, the DHC

Page 237 - UTHENTICATION HEADERS

Central Site Remote Access Switch 311CONFIGURING ADVANCED IP ROUTINGDHCP Relay AgentEXAMPLE DHCP CONFIGURATIONSBelow we have included two of the

Page 238 - LINK LAYER ENCRYPTION

USER’S GUIDE312 CyberSWITCHRouters shown in the diagram above. Sample configurations for the objects in the above network diagram are as follows:

Page 239 - UTOMATED KEY EXCHANGE

Central Site Remote Access Switch 313CONFIGURING ADVANCED IP ROUTINGDHCP Relay AgentRemote Bridge to IP Router (w/Relay Agent)This configuration

Page 240 - OMPRESSION

USER’S GUIDE314 CyberSWITCHNotes: The DHCP Server must have a route specified to get back to the DHCP-enabled router Alex, or use Alex as its def

Page 241

Central Site Remote Access Switch 315CONFIGURING ADVANCED IP ROUTINGDHCP Proxy ClientDHCP PROXY CLIENTCONFIGURING THE DHCP PROXY CLIENTIn order t

Page 242 - LTERNATE

USER’S GUIDE316 CyberSWITCHDHCP CONFIGURATION ELEMENTSDHCP PROXY CLIENT ENABLE/DISABLE FLAGA global flag that indicates whether the DHCP Proxy Cl

Page 243 - Dedicated Accesses

Central Site Remote Access Switch 317CONFIGURING ADVANCED IP ROUTINGDHCP Proxy ClientThe DHCP Proxy Client feature is not applicable for the Cybe

Page 244 - ONFIGURING AN X.25 ACCESS

USER’S GUIDE318 CyberSWITCHSECURITY ASSOCIATIONSThe steps to configure security associations are merely listed here. For more detailed informatio

Page 245 - X.25 Accesses

Central Site Remote Access Switch 319CONFIGURING ADVANCED IP ROUTINGDNS and NetBIOS AddressesDNS AND NETBIOS ADDRESSESCONFIGURING DNS AND NETBIOS

Page 246

USER’S GUIDE32 CyberSWITCH• Data EncryptionThe CyberSWITCH encryption option provides data encryption through the Data Encryption Standard (DES)

Page 247 - X.25 CONFIGURATION ELEMENTS

USER’S GUIDE320 CyberSWITCHUSING MANAGE MODEipnamesvThis command displays the Name Servers menu from which you can enable, disable or change an I

Page 248 - ONFIGURATION ELEMENTS

CONFIGURING IPXOVERVIEWIPX protocol accepts data from remote devices and formats the data for transmission onto the network, and conversely, accepts d

Page 249

USER’S GUIDE322 CyberSWITCHCONFIGURING IPX INFORMATIONNote: IPX is available only if you have purchased the additional software module for our IP

Page 250

Central Site Remote Access Switch 323CONFIGURING IPXIPX Routing OptionIPX ROUTING OPTIONENABLING/DISABLING IPXNote: The CyberSWITCH does not curr

Page 251

USER’S GUIDE324 CyberSWITCHIPX OPTION BACKGROUND INFORMATIONThe Internetwork Packet Exchange (IPX) protocol is a datagram, connectionless protoco

Page 252

Central Site Remote Access Switch 325CONFIGURING IPXIPX Network InterfacesIPX NETWORK NUMBER BACKGROUND INFORMATIONNovell NetWare networks use IP

Page 253 - CCESS BACKGROUND INFORMATION

USER’S GUIDE326 CyberSWITCH9. If IPX RIP has been enabled for the system, enter the following:a. RIP send control (do not respond or respond)b.

Page 254

Central Site Remote Access Switch 327CONFIGURING IPXIPX Network InterfacesIPX NETWORK INTERFACE CONFIGURATION ELEMENTSGENERAL IPX NETWORK INTERFA

Page 255 - FRAME RELAY ACCESSES

USER’S GUIDE328 CyberSWITCHSEND FREQUENCYSpecifies the frequency at which the system will transmit RIP packets, if the Send control parameter is

Page 256 - ONFIGURING A PVC

Central Site Remote Access Switch 329CONFIGURING IPXIPX Network InterfacesIPX NETWORK INTERFACE BACKGROUND INFORMATIONTraditional routing product

Page 257 - Frame Relay Accesses

Central Site Remote Access Switch 33THE CYBERSWITCHUnique System Features•IP SecurityThe CyberSWITCH encryption option implements Encapsulating S

Page 258

USER’S GUIDE330 CyberSWITCHIPX ROUTING PROTOCOLSCONFIGURING IPX ROUTING PROTOCOLSUSING CFGEDIT1. Select Routing Protocols from the IPX menu. The

Page 259

Central Site Remote Access Switch 331CONFIGURING IPXIPX Routing ProtocolsRIP/SAP NUMBER OF TABLE ENTRIESSpecifies the maximum number of routing e

Page 260

USER’S GUIDE332 CyberSWITCHStatic services are configured locally on the system. SAP entries are learned from incoming SAP packets. All services

Page 261

Central Site Remote Access Switch 333CONFIGURING IPXIPX Static RoutesIPX STATIC ROUTESNote: With the availability of Triggered RIP/SAP (page 343)

Page 262

USER’S GUIDE334 CyberSWITCHUSING MANAGE MODE COMMANDSipxrouteDisplays the current IPX routes (both statically entered and "learned").ip

Page 263 - NOT ALLOWED

Central Site Remote Access Switch 335CONFIGURING IPXIPX NetWare Static ServicesIPX NETWARE STATIC SERVICESNote: With the availability of Triggere

Page 264

USER’S GUIDE336 CyberSWITCHIPX NETWARE STATIC SERVICES CONFIGURATION ELEMENTSSERVICE NAMESpecifies the NetWare service name that is the target of

Page 265 - Bridge Dial Out

Central Site Remote Access Switch 337CONFIGURING IPXIPX SpoofingIPX NETWARE STATIC SERVICES BACKGROUND INFORMATIONThis IPX feature allows you to

Page 266 - SPANNING TREE PROTOCOL

USER’S GUIDE338 CyberSWITCHb. Press 2 to select the system serialization packet handling level. The default values for all parameters will be dis

Page 267 - Spanning Tree Protocol

Central Site Remote Access Switch 339CONFIGURING IPXIPX SpoofingWATCHDOG PROTOCOLWatchdog Protocol is used by NetWare Servers to detect “dead” cl

Page 268 - NRESTRICTED BRIDGE MODE

USER’S GUIDE34 CyberSWITCH• User name and password• Calling Line ID (CLID)• Ethernet Address• User Authentication• Device Authentication• Connect

Page 269 - BRIDGE FILTERS

USER’S GUIDE340 CyberSWITCHSome of these <SYS> packets are overloaded in that they are not just keep-alive packets but are control packets

Page 270 - SING MANAGE MODE COMMANDS

Central Site Remote Access Switch 341CONFIGURING IPXIPX Isolated ModeIPX TYPE 20 PACKET HANDLING DEVICE CONFIGURATION ELEMENTSOnce you enable the

Page 271 - Bridge Filters

USER’S GUIDE342 CyberSWITCHIPX TRIGGERED RIP/SAPIPX Triggered RIP/SAP is a type of broadcast protocol used over WAN circuits for router-to-router

Page 272

Central Site Remote Access Switch 343CONFIGURING IPXIPX Triggered RIP/SAPCONFIGURATION ELEMENTSDATABASE TIMER This timer starts when an update re

Page 273

USER’S GUIDE344 CyberSWITCHSpecifically, triggered RIP and SAP updates are only transmitted on the WAN:• when a specific request for a routing/se

Page 274 - RIDGE FILTER DEFINITIONS

Central Site Remote Access Switch 345CONFIGURING IPXIPX-Specific Information for Devices7. Enable IPX routing. Select IPX Routing and follow on-s

Page 275

USER’S GUIDE346 CyberSWITCHc. Press <RET> to return to the IPX Device Spoofing menu. Press 2 to configure SPX Watchdog Spoofing. The follow

Page 276

Central Site Remote Access Switch 347CONFIGURING IPXIPX-Specific Information for Devices3. Select On-node Device Entries from the device level da

Page 277

USER’S GUIDE348 CyberSWITCHOtherwise, a WAN connection is not established. With triggered RIP/SAP, this field must also be enabled for an active

Page 278

Central Site Remote Access Switch 349CONFIGURING IPXIPX-Specific Information for DevicesThis parameter is only necessary for IPX over Frame Relay

Page 279

Central Site Remote Access Switch 35THE CYBERSWITCHInteroperability Overview• Authentication ProtocolsChallenge Handshake Authentication Protocol

Page 280

CONFIGURING SNMPOVERVIEWA Network Management Station (NMS) is a device that contains SNMP-specific software, giving it the ability to query SNMPAgents

Page 281

Central Site Remote Access Switch 351CONFIGURING SNMPConfiguring SNMP1. Enable IP routing if you have not already done so.2. Select SNMP from the

Page 282

USER’S GUIDE352 CyberSWITCHUSING MANAGE MODE COMMANDSCurrently you cannot configure SNMP using the Manage Mode, but the following command is avai

Page 283

Central Site Remote Access Switch 353CONFIGURING SNMPSNMP Background InformationIP ADDRESSThe IP address assigned to the management station that

Page 284

USER’S GUIDE354 CyberSWITCHThe SNMP Agent will process all SNMP Protocol Data Units (PDUs) which are received at a LAN port or which are received

Page 285 - KNOWN CONNECT LIST

Central Site Remote Access Switch 355CONFIGURING SNMPSNMP Background InformationProtocol (ICMP) group, the User Datagram Protocol (UDP) group, th

Page 286

USER’S GUIDE356 CyberSWITCH• isdnUsageNormal TrapAn SNMP Agent will generate an isdnUsageNormal Trap PDU when the Agent detects that the number o

Page 287

CONFIGURING APPLETALK ROUTINGOVERVIEWThe AppleTalk routing feature allows the CyberSWITCH to efficiently route AppleTalk data as opposed to bridging a

Page 288 - STATIC ARP TABLE ENTRIES

USER’S GUIDE358 CyberSWITCHAPPLETALK ROUTING OPTION CONFIGURATION ELEMENTAPPLETALK OPERATIONAL STATUSYou can enable or disable the AppleTalk Rout

Page 289 - THE ISOLATED MODE

Central Site Remote Access Switch 359CONFIGURING APPLETALK ROUTINGAppleTalk Ports8. If you are configuring your system in the nondiscovery mode (

Page 290 - ONFIGURING AN IP ADDRESS POOL

USER’S GUIDE36 CyberSWITCHENCRYPTION OVERVIEWCabletron’s encryption options provide two popular approaches for encrypting WAN communications, eac

Page 291 - IP FILTERS

USER’S GUIDE360 CyberSWITCHAPPLETALK NETWORK RANGE/NUMBERThe AppleTalk network range (for Extended network) or the AppleTalk network number (for

Page 292 - CONFIGURING PACKET TYPES

Central Site Remote Access Switch 361CONFIGURING APPLETALK ROUTINGAppleTalk PortsTHE ZONE CONCEPTA zone is a logical group of nodes on an interne

Page 293 - IP Filters

USER’S GUIDE362 CyberSWITCHnumber/range configured for the Remote LAN port differs from the network number/range that is being broadcasted in RTM

Page 294 - ONFIGURING UDP

Central Site Remote Access Switch 363CONFIGURING APPLETALK ROUTINGAppleTalk CapacitiesAPPLETALK ROUTING STATIC ROUTES CONFIGURATION ELEMENTSAPPLE

Page 295

USER’S GUIDE364 CyberSWITCHAPPLETALK CAPACITIES BACKGROUND INFORMATIONThis option allows you to control the maximum number of table entries (rout

Page 296

CONFIGURING CALL CONTROLOVERVIEWThe CyberSWITCH offers a number of configurable options to control how the system will make and accept calls. These op

Page 297 - ONFIGURING CONNECTION FILTERS

USER’S GUIDE366 CyberSWITCHTHROUGHPUT MONITOR CONFIGURING THE THROUGHPUT MONITOR Notes: Throughput Monitoring parameters do not apply to Digital

Page 298 - CONFIGURING EXCEPTION FILTER

Central Site Remote Access Switch 367CONFIGURING CALL CONTROLThroughput MonitorTHROUGHPUT MONITOR CONFIGURATION ELEMENTSSAMPLE RATEA Sample Rate

Page 299 - APPLYING FILTERS

USER’S GUIDE368 CyberSWITCHThe default Throughput Monitor configuration will work for initial installation. These parameters can be changed to be

Page 300 - ILTERS CONFIGURATION ELEMENTS

Central Site Remote Access Switch 369CONFIGURING CALL CONTROLThroughput MonitorUNDERLOAD CONDITION MONITORINGThe underload condition is monitored

Page 301 - ILTERS BACKGROUND INFORMATION

Central Site Remote Access Switch 37THE CYBERSWITCHSecurity OverviewLink layer encryption is independent of any network layer protocols. Since PP

Page 302 - Type 4: zzz,zzz

USER’S GUIDE370 CyberSWITCHAfter 5 seconds the sample is checked and the average utilization for the 5 seconds was 40 percent. This is less than

Page 303

Central Site Remote Access Switch 371CONFIGURING CALL CONTROLCall Interval ParametersCALL INTERVAL PARAMETERSCONFIGURING THE CALL INTERVAL PARAME

Page 304 - Filter Execution Order

USER’S GUIDE372 CyberSWITCHMONTHLY CALL CHARGE CONFIGURATION ELEMENTSSTATUSAllows you to enable or disable the monthly call charge option.MAXIMUM

Page 305 - LIMITATIONS

Central Site Remote Access Switch 373CONFIGURING CALL CONTROLCall RestrictionsUSING MANAGE MODE COMMANDSalarmDisplays the current status of the a

Page 306

USER’S GUIDE374 CyberSWITCHThe following chart provides example entries for hours calls are allowed:MAXIMUM CALLS PER DAYAllows you to limit the

Page 307

Central Site Remote Access Switch 375CONFIGURING CALL CONTROLCall RestrictionsTwo actions are available if this limit is exceeded. These actions

Page 308 - DHCP RELAY AGENT

USER’S GUIDE376 CyberSWITCHCALL RESTRICTIONS BACKGROUND INFORMATIONThe Call Restriction feature provides the ability to place limits on the toll

Page 309 - DHCP BACKGROUND INFORMATION

Central Site Remote Access Switch 377CONFIGURING CALL CONTROLBandwidth ReservationNote that there are four lines in the default profile: (1,1), (

Page 310 - DHCP Server

USER’S GUIDE378 CyberSWITCH5. Under ISDN information, enter the profile information. This is a profile name you configured in the previous sectio

Page 311 - DHCP Relay Agent

Central Site Remote Access Switch 379CONFIGURING CALL CONTROLSemipermanent ConnectionsBANDWIDTH RESERVATION BACKGROUND INFORMATIONThis feature al

Page 312

USER’S GUIDE38 CyberSWITCH• WAN IP Network Interface• WAN (Direct Host) IP Network Interface• WAN RLAN IP Network Interface• WAN RLAN IPX Network

Page 313

USER’S GUIDE380 CyberSWITCH6. Determine if the CyberSWITCH should always retry a call. If yes, then configuration for the device is done, the dev

Page 314

Central Site Remote Access Switch 381CONFIGURING CALL CONTROLSemipermanent ConnectionsSEMIPERMANENT CONNECTIONS CONFIGURATION ELEMENTSDEVICE NAME

Page 315 - DHCP PROXY CLIENT

USER’S GUIDE382 CyberSWITCHCall RestrictionsYou may wish to disable call restrictions when using semipermanent connections. Call restrictions are

Page 316

Central Site Remote Access Switch 383CONFIGURING CALL CONTROLCSM as a Call Control ManagerCSM AS A CALL CONTROL MANAGERThis feature allows you to

Page 317 - DHCP Proxy Client

USER’S GUIDE384 CyberSWITCHAUTHENTICATION TIMEOUT TIMERThis timer represents the amount of time the CyberSWITCH will wait for the Authentication

Page 318

Central Site Remote Access Switch 385CONFIGURING CALL CONTROLD Channel CallbackIf you use user level security for authentication: configure devic

Page 319 - DNS AND NETBIOS ADDRESSES

USER’S GUIDE386 CyberSWITCH3. The current status D Channel Callback will be displayed. Select 1 to toggle from disabled to enabled (as shown by t

Page 320

Central Site Remote Access Switch 387CONFIGURING CALL CONTROLDigital Modem Inactivity TimeoutDIGITAL MODEM INACTIVITY TIMEOUTThis feature allows

Page 321

USER’S GUIDE388 CyberSWITCHMODEM INACTIVITY TIMEOUT BACKGROUND INFORMATIONThe Modem Inactivity Timeout feature allows the CyberSWITCH to terminat

Page 322 - CONFIGURING IPX INFORMATION

CONFIGURING OTHER ADVANCED OPTIONSOVERVIEWThis chapter provides information for configuring advanced system options that are not covered in the previo

Page 323 - IPX ROUTING OPTION

Central Site Remote Access Switch 39THE CYBERSWITCHRemote ISDN DevicesMore detailed descriptions of system software and hardware are included in

Page 324 - PTION BACKGROUND INFORMATION

USER’S GUIDE390 CyberSWITCHRouting chapter). Note that Digital Modem does not support WAN RLAN or WAN unNumbered interfaces.For IPX routing:a. Ma

Page 325 - IPX NETWORK INTERFACES

Central Site Remote Access Switch 391CONFIGURING OTHER ADVANCED OPTIONSThe Digital ModemThe Digital Modem software identifies, directs, and conve

Page 326

USER’S GUIDE392 CyberSWITCHRELATIONSHIPS BETWEEN DIGITAL MODEM AND OTHER FEATURESNote the following:• RADIUS Authentication: Authentication is pe

Page 327 - IPX Network Interfaces

Central Site Remote Access Switch 393CONFIGURING OTHER ADVANCED OPTIONSDefault Async ProtocolTERMINAL MODEUSING CFGEDIT1. From Options, select De

Page 328

USER’S GUIDE394 CyberSWITCHIf no data is received within the data timeout duration, the following events will occur:•If Disconnect is configured,

Page 329

Central Site Remote Access Switch 395CONFIGURING OTHER ADVANCED OPTIONSDefault Async ProtocolNote: If the CyberSWITCH is configured for PPP Mode,

Page 330 - IPX ROUTING PROTOCOLS

USER’S GUIDE396 CyberSWITCHPPP CONFIGURATIONCONFIGURING PPP Note: A thorough understanding of PPP protocol is required before you attempt to chan

Page 331 - IPX Routing Protocols

Central Site Remote Access Switch 397CONFIGURING OTHER ADVANCED OPTIONSPPP ConfigurationRESTART TIMERTimes transmissions of Configure-Request and

Page 332

USER’S GUIDE398 CyberSWITCHPPP BACKGROUND INFORMATIONPoint-to-Point Protocol (PPP) can provide standard interoperability for remote devices. Inte

Page 333 - IPX STATIC ROUTES

Central Site Remote Access Switch 399CONFIGURING OTHER ADVANCED OPTIONSDefault Line ProtocolPPP Link Failure Detection can be enabled or disabled

Page 334

USER’S GUIDE4 CyberSWITCHWARNING: Changes or modifications made to this device which are not expresslyapproved by the party responsible for compl

Page 335 - IPX NETWARE STATIC SERVICES

USER’S GUIDE40 CyberSWITCHSWITCHES SUPPORTED Switch types supported by the CyberSWITCH’s basic rate and primary rate ISDN adapters:Switch support

Page 336

USER’S GUIDE400 CyberSWITCHUSING MANAGE MODElineprot Displays the current default line protocol configuration.lineprot changeAllows you to change

Page 337 - IPX SPOOFING

Central Site Remote Access Switch 401CONFIGURING OTHER ADVANCED OPTIONSLog Options2. Configure a Syslog Server:a. Select Log Servers. (Note that

Page 338

USER’S GUIDE402 CyberSWITCHUDP PORTThe default port number is “514”, which should work for most installations. Consult your UNIX documentation if

Page 339 - IPX Spoofing

Central Site Remote Access Switch 403CONFIGURING OTHER ADVANCED OPTIONSLog Options• the ease of data retrieval• the management of a multi-node si

Page 340 - IPX TYPE 20 PACKET HANDLING

USER’S GUIDE404 CyberSWITCHSYSTEM MESSAGESThe CyberSWITCH reports three different types of system messages: informational, warning, and error mes

Page 341 - IPX ISOLATED MODE

Central Site Remote Access Switch 405CONFIGURING OTHER ADVANCED OPTIONSLog Optionsmust configure IP Routing, a LAN IP interface and an IP route t

Page 342 - IPX TRIGGERED RIP/SAP

USER’S GUIDE406 CyberSWITCHCall Detail Recording EventsFor switched ISDN services:There are five ISDN CDR events: connect, disconnect, reject, sy

Page 343 - CONFIGURATION ELEMENTS

Central Site Remote Access Switch 407CONFIGURING OTHER ADVANCED OPTIONSLog OptionsWhen multiple systems are logging to a shared, central log serv

Page 344 - CONFIGURING IPX DEVICES

USER’S GUIDE408 CyberSWITCHEVENT TYPEThis field indicates what type of event the associated message is reporting. The possible values are ‘CONNEC

Page 345

Central Site Remote Access Switch 409CONFIGURING OTHER ADVANCED OPTIONSLog OptionsThe duration is calculated by subtracting the connect event tim

Page 346

HARDWARE OVERVIEWThe product you have purchased is integrated on the following platforms: the CSX5500, CSX6000, and CSX7000. Through the use of adapte

Page 347 - AKE CALLS FOR IPX DATA

USER’S GUIDE410 CyberSWITCHExample:Chicago-Schaumburg SYSTEM UP 1 OF 1Verify Event Report ContentsOn a Verify event, only record 1 is used. The e

Page 348

Central Site Remote Access Switch 411CONFIGURING OTHER ADVANCED OPTIONSCompression OptionsCOMPRESSION OPTIONS CONFIGURATION ELEMENTSCOMPRESSION S

Page 349 - POOFING OPTIONS

USER’S GUIDE412 CyberSWITCHCOMPRESSION OPTIONS BACKGROUND INFORMATIONThe system data compression capability allows the system to negotiate compre

Page 350

Central Site Remote Access Switch 413CONFIGURING OTHER ADVANCED OPTIONSCompression OptionsWhen using Sequence Number check mode and a non-zero nu

Page 351 - Configuring SNMP

USER’S GUIDE414 CyberSWITCHTFTPCONFIGURING TFTPNote: You cannot configure TFTP through CFGEDIT. The configuration can only be done through Manage

Page 352 - SNMP CONFIGURATION ELEMENTS

Central Site Remote Access Switch 415CONFIGURING OTHER ADVANCED OPTIONSFile AttributesAccess to files on an system will be controlled by configur

Page 353 - SNMP Background Information

USER’S GUIDE416 CyberSWITCHFILE ATTRIBUTES BACKGROUND INFORMATIONThe tftp change Manage Mode command allows you to assign the file access rights

Page 354 - MIB Formatter

VERIFICATION AND DIAGNOSISAfter configuring your CyberSWITCH and before proceeding with normal system operations, we suggest you verify that the syste

Page 355

VERIFYING THE BASE SYSTEMOVERVIEWThis chapter describes the verification process for the base system. It includes the verification process for:• hardw

Page 356 - SING CABLETRON NMS SYSTEMS

Central Site Remote Access Switch 419VERIFYING THE BASE SYSTEMHardware Resources Operational?Error mapping WAN adapter # into Host memory mapType

Page 357

USER’S GUIDE42 CyberSWITCHTHE CSX5500PLATFORM DESCRIPTIONThe CSX5500 is a high capacity, central site communications platform. This platform is a

Page 358 - ONFIGURING APPLETALK PORTS

USER’S GUIDE420 CyberSWITCHTo correct the problem, try the following:a. Verify the resource type and adapter configuration settings as described

Page 359 - AppleTalk Ports

Central Site Remote Access Switch 421VERIFYING THE BASE SYSTEMWAN Lines Available for Use?a. If the system has been operational for longer than 2

Page 360 - HE APPLETALK NETWORK TYPE

USER’S GUIDE422 CyberSWITCH3. To correct the problem, try the following:Error mapping adapter # into Host memory mapType mismatch of configured &

Page 361

Central Site Remote Access Switch 423VERIFYING THE BASE SYSTEMBridge Initialized?This command will display a message similar to the following:LAN

Page 362

USER’S GUIDE424 CyberSWITCH4. If you do NOT see the initialization message, check the configuration to verify that IP routing is enabled.5. If IP

Page 363 - APPLETALK CAPACITIES

Central Site Remote Access Switch 425VERIFYING THE BASE SYSTEMRemote Device Connectivityfix> ConnId=<connect Id>In - CONNECT Call Id=<

Page 364

USER’S GUIDE426 CyberSWITCH MULTI-LEVEL SECURITYTo verify device and user level security to the CyberSWITCH, the WAN lines that are connected to

Page 365

Central Site Remote Access Switch 427VERIFYING THE BASE SYSTEMIP Host Mode3. Telnet from the client PC into the central site. For example, telnet

Page 366

USER’S GUIDE428 CyberSWITCHEach section below uses example entries to verify IP Host mode operation. IP addresses are specific to the examples. S

Page 367 - Throughput Monitor

Central Site Remote Access Switch 429VERIFYING THE BASE SYSTEMAlternate AccessesVERIFICATION OVER A WAN CONNECTION1. Determine if a remote IP Hos

Page 368 - VERLOAD CONDITION MONITORING

Central Site Remote Access Switch 43HARDWARE OVERVIEWSystem PlatformsThe CSX5500 is a rack-mountable platform. The front panel has an air-intake

Page 369

USER’S GUIDE430 CyberSWITCHFRAME RELAY CONNECTIONSTo verify a frame relay connection to the CyberSWITCH, the WAN lines that are connected to the

Page 370

Central Site Remote Access Switch 431VERIFYING THE BASE SYSTEMAlternate Accesses5. Display the system log (dr command). If the feature is operati

Page 371 - MONTHLY CALL CHARGE

USER’S GUIDE432 CyberSWITCHc. Wait 20 seconds, then enter the dr command to display the report log. The status log should display a sequence of t

Page 372 - ONFIGURING CALL RESTRICTIONS

VERIFYING ROUTING PROTOCOLSOVERVIEWThis chapter describes the verification process for the following CyberSWITCH routing protocols:•IP Routing•IPX Rou

Page 373 - Call Restrictions

USER’S GUIDE434 CyberSWITCHYou should receive a response similar to the following:100.000.000.002 is aliveIf the system displays this message, th

Page 374 - ALL MINUTES PER DAY

Central Site Remote Access Switch 435VERIFYING ROUTING PROTOCOLSIP Routing Operational?Below is an example of a configuration used to verify IP r

Page 375

USER’S GUIDE436 CyberSWITCH4. If the remote IP host CANNOT ping to the CyberSWITCH, try the following:a. Verify that the LAN interface is properl

Page 376 - BANDWIDTH RESERVATION

Central Site Remote Access Switch 437VERIFYING ROUTING PROTOCOLSIP Routing Operational?1. Determine if a remote IP host can access the CyberSWITC

Page 377 - Bandwidth Reservation

USER’S GUIDE438 CyberSWITCHIP ROUTING OVER A WAN REMOTE LAN INTERFACETo verify that IP routing is properly operational over a WAN Remote LAN inte

Page 378

Central Site Remote Access Switch 439VERIFYING ROUTING PROTOCOLSIP Routing Operational?3. Determine if a remote IP host can access the LAN interf

Page 379 - SEMIPERMANENT CONNECTIONS

USER’S GUIDE44 CyberSWITCHTo clean the air filter:1. Power down the system and disconnect the system’s power cord from the power source.2. Open t

Page 380

USER’S GUIDE440 CyberSWITCH1. Determine if SITE1 can access SITE2 over the WAN connection. On system A type:ip ping 192.1.0.2 <return>2. De

Page 381 - Semipermanent Connections

Central Site Remote Access Switch 441VERIFYING ROUTING PROTOCOLSIP Routing Operational?5. If no packets have been discarded, check to see if the

Page 382

USER’S GUIDE442 CyberSWITCHIf you see this IP RIP initialization message, the IP RIP has initialized successfully.3. If the CyberSWITCH does not

Page 383 - CSM AS A CALL CONTROL MANAGER

Central Site Remote Access Switch 443VERIFYING ROUTING PROTOCOLSIP Routing Operational?3. Determine if a local IP Host A has learned the route to

Page 384 - ALL CONTROL MANAGEMENT

USER’S GUIDE444 CyberSWITCH1. Determine if the CyberSWITCH has learned the route to 131.1.0.0 from Router 1. On the administration console type:

Page 385 - D CHANNEL CALLBACK

Central Site Remote Access Switch 445VERIFYING ROUTING PROTOCOLSIP Routing Operational?perform the verification steps. It also uses the show ip r

Page 386

USER’S GUIDE446 CyberSWITCHThe same example that is used in the previous section is used to verify IP RIP input processing on a WAN interface.1.

Page 387 - ODEM INACTIVITY TIMEOUT VALUE

Central Site Remote Access Switch 447VERIFYING ROUTING PROTOCOLSIPXIPX ROUTING OPERATIONAL?To verify that IPX routing feature is properly operati

Page 388

USER’S GUIDE448 CyberSWITCHRIP. The output of an ipx route command contains a protocol (P) field for each route en-try, which indicate if it is s

Page 389

Central Site Remote Access Switch 449VERIFYING ROUTING PROTOCOLSIPX4. From the remote bridge (SITE2), attempt to access the IPX router by issuing

Page 390

Central Site Remote Access Switch 45HARDWARE OVERVIEWSystem PlatformsCAUTION FOR DC-POWERED CSX5500S• Connect to a reliably-grounded SELV source.

Page 391 - The Digital Modem

USER’S GUIDE450 CyberSWITCHIPX ROUTING OVER A WAN CONNECTION1. Determine if NetWare Client A can see the remote NetWare Server “remote.” To do th

Page 392

Central Site Remote Access Switch 451VERIFYING ROUTING PROTOCOLSIPX6. Create a change in the route (for example, shut down a server). Again exami

Page 393 - CALL DISCONNECT

USER’S GUIDE452 CyberSWITCHconstraints. We recommend this value be at least 10% more than what you predict to be needed (more than 10% with large

Page 394

Central Site Remote Access Switch 453VERIFYING ROUTING PROTOCOLSAppleTalk RoutingBelow is an example of a configuration used to verify AppleTalk

Page 395 - Default Async Protocol

USER’S GUIDE454 CyberSWITCHa. Verify that the AppleTalk LAN port that Local Mac is attached to is in up state by entering the following console c

Page 396 - ONFIGURING PPP

Central Site Remote Access Switch 455VERIFYING ROUTING PROTOCOLSAppleTalk RoutingIf the Network Range is correct and the AppleTalk address is not

Page 397 - PPP Configuration

USER’S GUIDE456 CyberSWITCH2. If Remote Mac appears in Select a file server: box, then AppleTalk Routing over the WAN connection is operational.

Page 398 - INK FAILURE DETECTION

VERIFYING SYSTEM OPTIONSOVERVIEWThis chapter describes the verification process for various system options. It includes the verification process for:•

Page 399 - DEFAULT LINE PROTOCOL

USER’S GUIDE458 CyberSWITCH4. However, if one of the following messages appears, there is an unexpected condition present within the CyberSWITCH

Page 400 - ONFIGURING LOG OPTIONS

Central Site Remote Access Switch 459VERIFYING SYSTEM OPTIONSDial Outc. Enter dr at the administrative console to display the current system mess

Page 401 - Log Options

USER’S GUIDE46 CyberSWITCHTHE CSX6000PLATFORM DESCRIPTIONThe CSX6000 is a high density, modular, central-site communications platform. It utilize

Page 402 - YSLOG SERVER OVERVIEW

USER’S GUIDE460 CyberSWITCH5. A message will be displayed indicating whether or not the call was made successfully. If the Dial Out call was not

Page 403

Central Site Remote Access Switch 461VERIFYING SYSTEM OPTIONSCall Detail Recording• If there are no problems, check for the following system mes

Page 404 - ALL DETAIL RECORDING

USER’S GUIDE462 CyberSWITCHe. If syslogd is running but does not receive any log messages, make sure CDR is configured for the UDP port that sysl

Page 405

Central Site Remote Access Switch 463VERIFYING SYSTEM OPTIONSReserved Bandwidth• Peer Protocol-Rejects CCPIf the peer does not actually support P

Page 406

USER’S GUIDE464 CyberSWITCHDHCP RELAY AGENTThe following sections provide instructions to verify that the DHCP/BOOTP Relay Agent is working prope

Page 407

Central Site Remote Access Switch 465VERIFYING SYSTEM OPTIONSDHCP Relay Agent4. If an error occurred while trying to enable the Relay Agent, the

Page 408

USER’S GUIDE466 CyberSWITCHIn this configuration, the DHCP Client is able to obtain its IP address from the DHCP Server, using the Relay Agent co

Page 409

Central Site Remote Access Switch 467VERIFYING SYSTEM OPTIONSDHCP: Proxy ClientDHCP: PROXY CLIENTThe following sections provide instructions to v

Page 410 - COMPRESSION OPTIONS

USER’S GUIDE468 CyberSWITCHc. If desired, enter MANAGE mode, and use the dhcp change command to enable the Proxy Client. (Note: CFGEDIT can also

Page 411 - Compression Options

Central Site Remote Access Switch 469VERIFYING SYSTEM OPTIONSD Channel CallbackVERIFICATION OF IP ADDRESS POOLAs IP addresses are obtained from D

Page 412 - OMPRESSION AND CCP

Central Site Remote Access Switch 47HARDWARE OVERVIEWSystem PlatformsCLEANING THE CSX6000 AIR FILTERThe CSX6000 has a removable air filter. This

Page 413

USER’S GUIDE470 CyberSWITCHc. Configure a calling line ID for the number the device will be using when calling into the CyberSWITCH (under the de

Page 414 - ONFIGURING TFTP

Central Site Remote Access Switch 471VERIFYING SYSTEM OPTIONSVerifying a Semipermanent Connection3. On the CyberSWITCH:a. Enable the call trace m

Page 415 - FILE ATTRIBUTES

USER’S GUIDE472 CyberSWITCHPROXY ARPUse the following graphic to help you in verifying that Proxy ARP is operational. When following the verifica

Page 416 - fileattr change

Central Site Remote Access Switch 473VERIFYING SYSTEM OPTIONSProxy ARPc. On both platforms, issue the iproute manage mode command to make sure th

Page 417 - IAGNOSIS

TROUBLESHOOTINGWe include the following chapters in the Troubleshooting segment of the User’s Guide:• LCD MessagesProvides an explanation of the LCD m

Page 418 - ERIFYING

LCD MESSAGESOVERVIEWThe CyberSWITCH has an LCD display on its front panel, which displays information in a two-line format. The first line displays in

Page 419 - LAN ADAPTER INITIALIZED?

USER’S GUIDE476 CyberSWITCHERROR LCD MESSAGESThe system keeps track of all active errors and displays/records them in a cycle. When the system de

Page 420 - WAN LINES AVAILABLE FOR USE?

Central Site Remote Access Switch 477LCD MESSAGESLCD Message GroupsSystem unable to access file. Check for one of the following log error message

Page 421 - DEDICATED SERIAL CONNECTIONS

USER’S GUIDE478 CyberSWITCHISDN line failure. The line connected to slot “s” port “p” is out of service for the reason indicated by #.1 = No laye

Page 422 - LAN CONNECTION OPERATIONAL?

Central Site Remote Access Switch 479LCD MESSAGESLCD Message GroupsMonthly call charges exceeded. Monthly call charge tracking is enabled and the

Page 423 - IP ROUTER INITIALIZED?

USER’S GUIDE48 CyberSWITCHEnvironmental Characteristics Operating Temp: 0° to 55° C (32° to 131° F)Operating Humidity: 5 to 95% non-condensingOpe

Page 424 - REMOTE DEVICE CONNECTIVITY

SYSTEM MESSAGESOVERVIEWSystem Messages provide useful system information. They are listed in the system’s report log, a memory resident table. To mani

Page 425 - Remote Device Connectivity

Central Site Remote Access Switch 481SYSTEM MESSAGESInformational MessagesINFORMATIONAL MESSAGESThe system records informational messages. These

Page 426 - MULTI-LEVEL SECURITY

USER’S GUIDE482 CyberSWITCHSYSTEM MESSAGE SUMMARYThe following pages list all the informational, warning and error messages alphabetically. The t

Page 427 - IP HOST MODE

Central Site Remote Access Switch 483SYSTEM MESSAGESSystem Message Summary[ACCT] Warning code: TimeoutThis message is logged when there is no com

Page 428

USER’S GUIDE484 CyberSWITCHAppleTalk successfully initialized on WAN port with address <AppleTalk address>.This message is posted when the

Page 429 - ALTERNATE ACCESSES

Central Site Remote Access Switch 485SYSTEM MESSAGESSystem Message Summary[AUTH] ACE Error receiving server log message acknowledgment.A client s

Page 430 - RAME RELAY CONNECTIONS

USER’S GUIDE486 CyberSWITCH[AUTH] RADIUS IP HOST rejected IP Host id: <IP host Id>The remote Authentication server rejected the IP Host id.

Page 431 - X.25 CONNECTIONS

Central Site Remote Access Switch 487SYSTEM MESSAGESSystem Message Summary[AUTH] TACACS LOGIN rejected user: <user name>The remote Authenti

Page 432 - AND A TERMINAL SERVER MENU

USER’S GUIDE488 CyberSWITCH[AUTH] Warning code: 0010 Received unexpected authentication response code from serverA message was received from an a

Page 433 - ROTOCOLS

Central Site Remote Access Switch 489SYSTEM MESSAGESSystem Message SummaryBridge is operating in RESTRICTED modeBridge is operating in UNRESTRICT

Page 434 - OUTING OVER A WAN INTERFACE

Central Site Remote Access Switch 49HARDWARE OVERVIEWSystem PlatformsTHE CSX7000PLATFORM DESCRIPTIONThe CSX7000 is designed for large, central si

Page 435 - IP Routing Operational?

USER’S GUIDE490 CyberSWITCHCall Restrictions have been enabled by user commandThe user has enabled Call Restrictions via the callrest on Dynamic

Page 436

Central Site Remote Access Switch 491SYSTEM MESSAGESSystem Message SummaryCalls Activexxx to <sitename>Bandwidth to each site.Capability de

Page 437

USER’S GUIDE492 CyberSWITCHCause <cause code> received for DLCI <dlci index>A CLLM message was received indicating that the PVC assoc

Page 438

Central Site Remote Access Switch 493SYSTEM MESSAGESSystem Message SummaryCHANNEL in use in HOST_CALL_REQUESTAn error has been detected in the R2

Page 439

USER’S GUIDE494 CyberSWITCHConfigured adapter #’x’ type does not existThe interface adapter indicated does not match the resource configuration i

Page 440

Central Site Remote Access Switch 495SYSTEM MESSAGESSystem Message SummaryData link test successful: DSL <port #>, CES 1This message applie

Page 441 - IP RIP INITIALIZED?

USER’S GUIDE496 CyberSWITCH[DHCP-P] Ignoring offers from DHCP server x.x.x.x; the server MUST be on a primary LAN interface, or IP addresses will

Page 442

Central Site Remote Access Switch 497SYSTEM MESSAGESSystem Message Summary[DHCP-R] Failed to close UDP port (67), erc = <x>An error occurre

Page 443

USER’S GUIDE498 CyberSWITCHDM card failed FLASH download bad xx SRECThe Digital Modem card has failed the firmware update due to a corrupt file.

Page 444

Central Site Remote Access Switch 499SYSTEM MESSAGESSystem Message SummaryCFGEDIT. If the board is configured properly, and the message still app

Page 445

Central Site Remote Access Switch 5CONTENTSUSING THIS GUIDE 25Documentation Set 26Guide Conventions 27SYSTEM OVERVIEW 29The CyberSWITCH 30Unique

Page 446 - OUTER INITIALIZED?

USER’S GUIDE50 CyberSWITCHPhysical CharacteristicsHeight: 218 mm (8.60 in)Width: 483 mm (19.0 in)Depth: 641 mm (25.25 in)Weight: 36 kg max. (80 l

Page 447 - IPX ROUTING OPERATIONAL?

USER’S GUIDE500 CyberSWITCHDuplicate Calling Line ID <Calling line Id> detected for devices <device name> and <device name>This

Page 448 - EMOTE LAN CONNECTION

Central Site Remote Access Switch 501SYSTEM MESSAGESSystem Message SummaryError during channel initialization Access <access index>An error

Page 449

USER’S GUIDE502 CyberSWITCH(Direct Host) interface. Afterwards, configure a LAN interface and then read the WAN (Direct Host) interface.Error par

Page 450 - RIGGERED RIP/SAP

Central Site Remote Access Switch 503SYSTEM MESSAGESSystem Message SummaryFacility not subscribed - Slot=<slot #> Port=<port #> This

Page 451

USER’S GUIDE504 CyberSWITCHFailure during read of file <file name> for WAN card in slot <slot #>If seen repeatedly, the above message

Page 452 - PPLETALK ROUTING OPERATIONAL?

Central Site Remote Access Switch 505SYSTEM MESSAGESSystem Message SummaryB, DThe Network sent a DM(F=1) or a UA and will not allow establishment

Page 453 - AppleTalk Routing

USER’S GUIDE506 CyberSWITCHFile Access ErrSystem unable to access file. Check for one of the following log error messages: Error opening file <

Page 454

Central Site Remote Access Switch 507SYSTEM MESSAGESSystem Message SummaryIePvcStatus: Received Status Report for unknown PVC # <dlci index>

Page 455

USER’S GUIDE508 CyberSWITCHInvalid return code from SIG_get_rsc_inboundInvalid return code from SIG_get_rsc_outboundAn error has been detected in

Page 456

Central Site Remote Access Switch 509SYSTEM MESSAGESSystem Message Summary[IP] Cannot process incoming remote IP device <IP address>, no rs

Page 457

Central Site Remote Access Switch 51HARDWARE OVERVIEWSystem PlatformsTHE NE 2000-II (A NETWORK EXPRESS PLATFORM)PLATFORM DESCRIPTIONThe NE 2000-I

Page 458

USER’S GUIDE510 CyberSWITCH[IP] Invalid Peer IP Address <IP address>, WAN IP Stream ClosedA PPP or RFC 1294 (IP Host) connection came up, a

Page 459 - DIAL OUT

Central Site Remote Access Switch 511SYSTEM MESSAGESSystem Message Summary[IP] WAN (Direct Host) Interface for network <network #> on LAN p

Page 460

USER’S GUIDE512 CyberSWITCH[IP RIP] All network interfaces usedAll RIP interface data structures are in use. No RIP information will be sent to a

Page 461 - CALL DETAIL RECORDING

Central Site Remote Access Switch 513SYSTEM MESSAGESSystem Message Summary[IP RIP] Unable to register with Network Interface MaintenanceThe IP RI

Page 462 - COMPRESSION

USER’S GUIDE514 CyberSWITCH[IPX SAP] Buffers allocatedThe IPX SAP successfully allocated the buffers needed to transmit IPX SAP packets.[IPX SAP]

Page 463 - RESERVED BANDWIDTH

Central Site Remote Access Switch 515SYSTEM MESSAGESSystem Message SummaryLAN Adapter Command TimeoutThe system expected a command from the LAN a

Page 464

USER’S GUIDE516 CyberSWITCHLAN Adapter ResetThis is an initialization message. The Ethernet adapter has been reset as part of the adapter initial

Page 465

Central Site Remote Access Switch 517SYSTEM MESSAGESSystem Message SummaryLAN Port is now in the Listening stateThe bridge LAN port is entering t

Page 466

USER’S GUIDE518 CyberSWITCHManual restart initiated on DM board in slot <slot #>There was an attempt to restart the specified Digital Modem

Page 467 - DHCP: PROXY CLIENT

Central Site Remote Access Switch 519SYSTEM MESSAGESSystem Message SummaryMissing BEARER_CAPABILITY in HOST_CALL_REQUESTMissing CALLED_NUMBER_IE

Page 468 - ERIFICATION OF UDP PORTS

USER’S GUIDE52 CyberSWITCHPLATFORM CHARACTERISTICSPhysical CharacteristicsHeight: 107 mm (4.2 in)Width: 437 mm (17.2 in)Depth: 411 mm (16.2 in)We

Page 469

USER’S GUIDE520 CyberSWITCHNetwork sent Cause - SPID not supported - <slot #, port #>The indicated line does not support SPIDs; however, a

Page 470 - MODEM CALLBACK

Central Site Remote Access Switch 521SYSTEM MESSAGESSystem Message SummaryNo Sites ConnectedCurrently, no sites are connected to the system.Not e

Page 471

USER’S GUIDE522 CyberSWITCHOut Svc # <slot #, port #>ISDN line failure. The line connected to the indicated slot and port is out of service

Page 472 - PROXY ARP

Central Site Remote Access Switch 523SYSTEM MESSAGESSystem Message Summarynot be working properly. Check the configuration of the remote device a

Page 473 - Proxy ARP

USER’S GUIDE524 CyberSWITCHPVC for DLCI <dlci index> not ACTIVEA frame was received on the PVC associated with the indicated DLCI which was

Page 474 - ROUBLESHOOTING

Central Site Remote Access Switch 525SYSTEM MESSAGESSystem Message SummaryRBS: Encountered unknown source ID.RBS_out_SM<channel #>: NO Dial

Page 475 - LCD MESSAGE GROUPS

USER’S GUIDE526 CyberSWITCHReceived charge amount - <charge amount>The system has received an advice of charge from the network for the cal

Page 476 - ERROR LCD MESSAGES

Central Site Remote Access Switch 527SYSTEM MESSAGESSystem Message SummarySecurity Rejection - Bridge Address Security cannot use Authentication

Page 477 - LCD Message Groups

USER’S GUIDE528 CyberSWITCHSemipermanent. Device "x" disconnected by adminThe administrator has issued a disc device <device name>

Page 478 - Out Svc # (s,p)

Central Site Remote Access Switch 529SYSTEM MESSAGESSystem Message Summary[SNMP] Authentication failure, improper access rightsThere are two poss

Page 479 - Semiperm Error

Central Site Remote Access Switch 53HARDWARE OVERVIEWSystem PlatformsTHE NE 4000 (A NETWORK EXPRESS PLATFORM)PLATFORM DESCRIPTIONThe NE 4000 plat

Page 480

USER’S GUIDE530 CyberSWITCHSSB: i960 I/O memory copy differs from flash image at <address>After loading the i960 POST tests into the I/O me

Page 481 - ERROR MESSAGES

Central Site Remote Access Switch 531SYSTEM MESSAGESSystem Message SummarySSB: Post 32 i960hdlc_1 FAILUREThe i960 failed its 80532 test using the

Page 482 - SYSTEM MESSAGE SUMMARY

USER’S GUIDE532 CyberSWITCHSuccessfully Loaded Release <X.Y> Issue <Z>The specified release of System software was successfully loade

Page 483 - System Message Summary

Central Site Remote Access Switch 533SYSTEM MESSAGESSystem Message Summary[TFTP] Local error #2: Feature not initializedThe TFTP feature was not

Page 484

USER’S GUIDE534 CyberSWITCH[TFTP] Local error #14: Bad file nameThe local file (as defined from a remote host) was not recognized as a valid file

Page 485

Central Site Remote Access Switch 535SYSTEM MESSAGESSystem Message Summary[TFTP] Remote error #1: (Text from Remote Host)The REMOTE HOST could no

Page 486

USER’S GUIDE536 CyberSWITCHThe conformance selection is prior to CCITT 1988Verify that the facilities provided by the service provider are CCITT

Page 487

Central Site Remote Access Switch 537SYSTEM MESSAGESSystem Message SummaryToo many digits in TN in HOST_CALL_REQUEST(R2 Signaling) This illegal e

Page 488

USER’S GUIDE538 CyberSWITCHUnable to get Digital Modem resource to place callA Digital Modem dial-out call was attempted, and the system was unab

Page 489

Central Site Remote Access Switch 539SYSTEM MESSAGESSystem Message SummaryUnable to send device information request to CSM after a terminal authe

Page 490

USER’S GUIDE54 CyberSWITCHEnvironmental Characteristics Operating Temp: 10° to 35° C (50° to 95° F)Operating Humidity: 80% non-condensingOperatin

Page 491

USER’S GUIDE540 CyberSWITCHUser Level Authentication flag is enabled for Terminal User xxx. Setting flag to disabled. The device definition for x

Page 492

Central Site Remote Access Switch 541SYSTEM MESSAGESSystem Message SummaryX25 facilities error, bad facility lengthThe facilities length is missi

Page 493

USER’S GUIDE542 CyberSWITCHX25 facilities error, facility not availableA facility was requested which is not enabled. Verify that the specific fa

Page 494

Central Site Remote Access Switch 543SYSTEM MESSAGESSystem Message SummaryZone allocation failed, maximum capacity already configuredThe maximum

Page 495

TRACE MESSAGESOVERVIEWTrace messages include the following categories of messages:1. Call Trace Messages2. IP Filter Trace Messages3. PPP Packet Trace

Page 496

Central Site Remote Access Switch 545TRACE MESSAGESCall Trace MessagesCALL TRACE MESSAGESA feature of the CyberSWITCH console is the ability to s

Page 497

USER’S GUIDE546 CyberSWITCHCALL TRACE MESSAGE SUMMARYAccess information discarded causeCall trace message. This message is used to indicate addit

Page 498

Central Site Remote Access Switch 547TRACE MESSAGESCall Trace MessagesIn - ABNORMAL RPT Call Id=<call Id> Slot=<slot #> Port=<port

Page 499

USER’S GUIDE548 CyberSWITCHIn - DISCONNECT Call Id=<call Id> Slot=<slot #> Port=<port #> Loc=<location> Cause=<cause v

Page 500

Central Site Remote Access Switch 549TRACE MESSAGESCall Trace MessagesIn - PROGRESS Call Id=<call Id> Slot=<slot #> Port=<port #&g

Page 501

Central Site Remote Access Switch 55HARDWARE OVERVIEWSystem PlatformsTHE NE 5000 PLATFORM (A NETWORK EXPRESS PLATFORM)PLATFORM DESCRIPTIONThe NE

Page 502

USER’S GUIDE550 CyberSWITCHOut - DL CFG Slot=<slot #> Port=<port #> Ces=<communication endpoint suffix>The system is initializi

Page 503

Central Site Remote Access Switch 551TRACE MESSAGESIP Filters Trace MessagesIP FILTERS TRACE MESSAGESYou can trace packets that are discarded as

Page 504

USER’S GUIDE552 CyberSWITCHPPP PACKET TRACE MESSAGESPPP Packet Trace allows you to display the PPP protocol negotiation that takes place when a l

Page 505

Central Site Remote Access Switch 553TRACE MESSAGESPPP Packet Trace Messages• Configure RequestThe Configure Request is used to indicate the opti

Page 506

USER’S GUIDE554 CyberSWITCH•Echo ReplyThe Echo Reply is transmitted in response to an Echo Request. The Echo Reply packet contains the magic numb

Page 507

Central Site Remote Access Switch 555TRACE MESSAGESX.25 Trace MessagesIn - X25 CONNECTION CONFIRMATION ConnId=<connection Id> Access=<ac

Page 508

USER’S GUIDE556 CyberSWITCHOut - X25 Call Accept LCN <logical channel number>, <number of bytes> bytesThe DTE is accepting an SVC cal

Page 509

Central Site Remote Access Switch 557TRACE MESSAGESX.25 (LAPB) Trace MessagesOut - X25 DTE RR LCN <logical channel number>, <number of b

Page 510

USER’S GUIDE558 CyberSWITCHIn - LAPB SABME The DCE is resetting the link layer.In - LAPB UA The DCE is acknowledging a SABM or SABME from the DTE

Page 511

SYSTEM MAINTENANCEThis grouping of information provides information to help you maintain your CyberSWITCH once it is operating. Note that the included

Page 512

USER’S GUIDE56 CyberSWITCHCLEANING THE NE 5000 AIR FILTERThe NE 5000 has a removable air filter. This filter is provided to ensure system cleanli

Page 513

REMOTE MANAGEMENTOVERVIEWOnce your system is initially configured (and thus assigned an IP address), you may use a variety of methods to remotely acce

Page 514

Central Site Remote Access Switch 561REMOTE MANAGEMENTSNMPSNMP SNMP: The NMS gathers information (including problem reports) from any CyberSWITCH

Page 515

USER’S GUIDE562 CyberSWITCHINSTALLATION AND CONFIGURATIONSNMP has two basic components: the SNMP Agent, which is executed on the CyberSWITCH, and

Page 516

Central Site Remote Access Switch 563REMOTE MANAGEMENTTelnetTELNET Telnet is the standard way of providing remote login service. With Telnet, any

Page 517

USER’S GUIDE564 CyberSWITCHon the same subnetwork as the Telnet client on System 1’s LAN, a static route is needed to allow System 2 to communica

Page 518

Central Site Remote Access Switch 565REMOTE MANAGEMENTTelnetIP address of the CyberSWITCH. You will then be presented with the “Enter Login id:”

Page 519

USER’S GUIDE566 CyberSWITCHWIN95 DIAL-UP NETWORKINGMany dial-up client software packages support a terminal type of connection. One such popular

Page 520

Central Site Remote Access Switch 567REMOTE MANAGEMENTWIN95 Dial-Up NetworkingDIALING OUT1. Double click on your new dialing icon to bring up the

Page 521

USER’S GUIDE568 CyberSWITCHTFTPTFTP (Trivial File Transfer Protocol) is the standard way of providing file transfers between devices. With TFTP a

Page 522

Central Site Remote Access Switch 569REMOTE MANAGEMENTTFTPThe default file access for the GUEST user is “read” access to all files. The default f

Page 523

Central Site Remote Access Switch 57HARDWARE OVERVIEWSystem Platforms6. Insert the clean and dry air filter back into its slot behind the chassis

Page 524

USER’S GUIDE570 CyberSWITCHCARBON COPY The Carbon Copy feature gives you complete remote management. Any command that you can issue on a local co

Page 525

Central Site Remote Access Switch 571REMOTE MANAGEMENTCarbon CopyEnter the following command to start up the CCINSTAL program:C:\admin>ccinsta

Page 526

USER’S GUIDE572 CyberSWITCHBaud RateIf you wish to enter a new baud rate, enter a menu selection of “B “(for Baud Rate). Continue to press B unti

Page 527

Central Site Remote Access Switch 573REMOTE MANAGEMENTCarbon CopyThe system will prompt you for a password. The default password set on each Cybe

Page 528

USER’S GUIDE574 CyberSWITCHTo initiate the File Transfer Program, press the function key <F5>.The file transfer facility will display a one

Page 529

Central Site Remote Access Switch 575REMOTE MANAGEMENTCarbon CopyNote: The above graph represents the guaranteed throughput without CRC errors. T

Page 530

SYSTEM COMMANDSOVERVIEWTwo classes of system administration commands are available on the CyberSWITCH: guest commands and administrator commands. Gues

Page 531

Central Site Remote Access Switch 577SYSTEM COMMANDSSetting the IP AddressexitTerminates the administration session by logging-out the current ad

Page 532

USER’S GUIDE578 CyberSWITCHVIEWING OPERATIONAL INFORMATIONThe following commands are used to view system operational information:?Displays a help

Page 533

Central Site Remote Access Switch 579SYSTEM COMMANDSViewing Operational Informationsystem prompt after the entire file has been displayed. If you

Page 534 - <session Id>

USER’S GUIDE58 CyberSWITCHSYSTEM ADAPTERSThis section describes the following adapters which are supported by Central Site CyberSWITCH platforms:

Page 535

USER’S GUIDE580 CyberSWITCHPrimary Rate (D-Channel)Each Primary Rate line which contains at least one data link is considered a Primary Rate (D-C

Page 536

Central Site Remote Access Switch 581SYSTEM COMMANDSViewing Operational InformationTRYINGThe system is attempting to call the device. Some connec

Page 537

USER’S GUIDE582 CyberSWITCHIf there was enough memory for all connections, the connection table would reflect both potential and actual connectio

Page 538

Central Site Remote Access Switch 583SYSTEM COMMANDSViewing Throughput InformationNote: If data compression is being used, an extra line will be

Page 539

USER’S GUIDE584 CyberSWITCH#4. Example of three samples where actual bandwidth utilization was around 70% and underload was being monitored at ar

Page 540

Central Site Remote Access Switch 585SYSTEM COMMANDSTerminating and Restarting the CyberSWITCHCONFIGURATION-RELATED COMMANDSThe following command

Page 541

USER’S GUIDE586 CyberSWITCHeffect, you would need to issue the restart command from the Telnet session of your remote terminal.Note: If you lose

Page 542

Central Site Remote Access Switch 587SYSTEM COMMANDSAppleTalk Routing CommandsSess-IdThe session Id number associated with the session.Date/TimeT

Page 543

USER’S GUIDE588 CyberSWITCHdnetRequired parameter. The destination network number.dnodeRequired parameter. The destination node Id.timeoutOptiona

Page 544

Central Site Remote Access Switch 589SYSTEM COMMANDSAppleTalk Routing Commandsget_info - The port is verifying network information and obtaining

Page 545 - Call Trace Messages

Central Site Remote Access Switch 59HARDWARE OVERVIEWSystem AdaptersThe Ethernet-1 incorporates an Intel i960 RISC processor executing at 16Mhz.

Page 546 - ALL TRACE MESSAGE SUMMARY

USER’S GUIDE590 CyberSWITCHatalk port stats [clear]This command will display or clear current AppleTalk port statistics. Refer to AppleTalk Port

Page 547

Central Site Remote Access Switch 591SYSTEM COMMANDSBridge Commandsatalk stats rtmpDisplays the AppleTalk Routing Table Maintenance Protocol (RTM

Page 548

USER’S GUIDE592 CyberSWITCHIn the above example, the DEST field is the destination MAC address field of the LAN frame. The SOURCE field is the so

Page 549

Central Site Remote Access Switch 593SYSTEM COMMANDSCall Control CommandsTo use this command for troubleshooting, you must use the System Call Tr

Page 550

USER’S GUIDE594 CyberSWITCHUnable to prompt for device name at this timeIndicates that the call command would prompt you for a device name, but t

Page 551 - IP Filters Trace Messages

Central Site Remote Access Switch 595SYSTEM COMMANDSCall Control CommandsCalling <phone number> at <data rate>, device PPPThe phone n

Page 552 - PPP PACKET TRACE MESSAGES

USER’S GUIDE596 CyberSWITCHUnable to prompt for device name at this timeIndicates that the call command would prompt you for a device name, but t

Page 553 - PPP Packet Trace Messages

Central Site Remote Access Switch 597SYSTEM COMMANDSCompression Information CommandsCOMPRESSION INFORMATION COMMANDSCompression statistics are on

Page 554 - RACE MESSAGE SUMMARY

USER’S GUIDE598 CyberSWITCHDHCP stats clearClears the DHCP statistics.ip addrpoolDisplays the current IP address pool. Refer to the ip addrpool c

Page 555 - X.25 Trace Messages

Central Site Remote Access Switch 599SYSTEM COMMANDSFrame Relay CommandsSlot number refers to the slot in which the digital modem card resides, a

Page 556

USER’S GUIDE6 CyberSWITCHSystem Adapters 58Ethernet Adapters 58Ethernet-2 Adapter 58Ethernet-1 Adapter 58Hardware Characteristics 59LAN Connectio

Page 557 - X.25 (LAPB) TRACE MESSAGES

USER’S GUIDE60 CyberSWITCHHardware CharacteristicsProcessor: Intel 80C186Speed: 16 MhzNumber of Ports: 4Connector: RJ-45Interface: Point-to-Point

Page 558

USER’S GUIDE600 CyberSWITCHfr clearClears the statistics counters associated with the fr stat command for the currently selected access and DLCI.

Page 559 - AINTENANCE

Central Site Remote Access Switch 601SYSTEM COMMANDSIP Routing CommandsAccess. In particular, the DLCI list is maintained within the code to iden

Page 560 - ANAGEMENT

USER’S GUIDE602 CyberSWITCHThe first line indicates:• the number of the condition within that filter which matched the packet and consequently ca

Page 561

Central Site Remote Access Switch 603SYSTEM COMMANDSIP Routing Commandsip rip routesDisplays information pertaining to the routing table(s) that

Page 562 - SAGE INSTRUCTIONS

USER’S GUIDE604 CyberSWITCHPThe propagation flag, whereA = Always propagateN = Do not propagateH = Propagate when Next Hop Device Connected1/2RIP

Page 563 - LAN Test Passed

Central Site Remote Access Switch 605SYSTEM COMMANDSIPX Routing CommandsT/P (Type/Protocol)TypeThe destination type is “R” for a remote network o

Page 564 - RELEASES

USER’S GUIDE606 CyberSWITCHDisplays Negotiation Parameters when device name specified and connected:ipx diag <host ipx address> [timeout]Te

Page 565

Central Site Remote Access Switch 607SYSTEM COMMANDSISDN Usage Commandsipx routeDisplays the current routing table for the system, including stat

Page 566 - ETTING UP SERVER TYPE

USER’S GUIDE608 CyberSWITCHThis information can help you determine if additional lines and/or systems are necessary. For example, the high water

Page 567 - DIALING OUT

Central Site Remote Access Switch 609SYSTEM COMMANDSPacket Capture CommandsPACKET CAPTURE COMMANDSIn many applications, it is often desirable to

Page 568

Central Site Remote Access Switch 61HARDWARE OVERVIEWSystem AdaptersPRIMARY RATE ADAPTERSPrimary Rate is a communications service that provides u

Page 569 - USAGE INSTRUCTIONS

USER’S GUIDE610 CyberSWITCHpkt displayDisplays captured packets that have been collected via pkt on or via pkt load. Note that this command is no

Page 570

Central Site Remote Access Switch 611SYSTEM COMMANDSPacket Capture CommandsBanyan Vines Packet Detail Screen

Page 571 - Carbon Copy

USER’S GUIDE612 CyberSWITCHRADIUS COMMANDSThe following console commands may be used to diagnose problems with: • connections to the off-node RAD

Page 572

Central Site Remote Access Switch 613SYSTEM COMMANDSRADIUS Commandsradius ipresAttempts an authentication session using the IP resolution. The fo

Page 573

USER’S GUIDE614 CyberSWITCHSERIAL INTERFACE COMMANDSThese commands are available only when you have a serial interface card (V.35 or RS232) prope

Page 574 - RUNNING WITHOUT CARBON COPY

Central Site Remote Access Switch 615SYSTEM COMMANDSSpanning Tree CommandsStateThe current state of the port. Possible values are; DISABLED, BLOC

Page 575 - 2048Kb 3072Kb

USER’S GUIDE616 CyberSWITCHRoot PriorityThe bridge priority of the root bridge.Root Path CostThe path cost to the root bridge.Root Port NumThe po

Page 576

Central Site Remote Access Switch 617SYSTEM COMMANDSTCP CommandsSTP EnabledA flag that is set to “1” if the Spanning Tree protocol is enabled.TCP

Page 577 - Setting the IP Address

USER’S GUIDE618 CyberSWITCHTELNET COMMANDSThese commands are Telnet client console commands. These commands provide tools for you when you are us

Page 578

Central Site Remote Access Switch 619SYSTEM COMMANDSTelnet CommandsThe possible send parameters are defined as follows:send aytThe send ayt comma

Page 579 - <escape>

USER’S GUIDE62 CyberSWITCHThe PRI-23 adapter is fully compatible with our other WAN adapters and the digital modem. It has both a TDM and an MVIP

Page 580 - call device

USER’S GUIDE620 CyberSWITCHThe set escape command can be used to change the “escape” character for the current Telnet session. This command may b

Page 581

Central Site Remote Access Switch 621SYSTEM COMMANDSTFTP CommandsThe following commands are used to display the terminal type currently in use or

Page 582 - IEWING THROUGHPUT INFORMATION

USER’S GUIDE622 CyberSWITCHtftp sessionDisplays the TFTP session information of active TFTP sessions. To get detailed information on a specific s

Page 583 - THROUGHPUT MONITOR CONTENTS

Central Site Remote Access Switch 623SYSTEM COMMANDSUDP Commandstrace ipxwan [on/off]Enables or disables the IPXWAN tracing option, which tracks

Page 584 - AVING OPERATIONAL INFORMATION

USER’S GUIDE624 CyberSWITCHsentry logThis command acts as a toggle switch, enabling or disabling user authentication rejection messages. If enabl

Page 585 - ONFIGURATION-RELATED COMMANDS

Central Site Remote Access Switch 625SYSTEM COMMANDSX.25 Commandswan l1p error [display or clear] <slot #>When display is used, this comman

Page 586 - SETTING THE DATE AND TIME

USER’S GUIDE626 CyberSWITCHtrace x25 [on/off] Enables or disables the X.25 packet tracing option. This feature displays up to 15 octets of the pa

Page 587 - APPLETALK ROUTING COMMANDS

SYSTEM STATISTICSOVERVIEWStatistics can either be generated by issuing the ds command to display the set of statistics known as the System Statistics,

Page 588

USER’S GUIDE628 CyberSWITCHCALL RESTRICTION STATISTICSThe system keeps a tally of the following Call Restriction statistics. These statistics can

Page 589 - AppleTalk Routing Commands

Central Site Remote Access Switch 629SYSTEM STATISTICSAppleTalk StatisticsAPPLETALK STATISTICSYou may display AppleTalk protocol statistics (subd

Page 590

Central Site Remote Access Switch 63HARDWARE OVERVIEWSystem AdaptersHardware CharacteristicsProcessor: Intel 80C186Speed: 16 MhzNumber of Ports:

Page 591 - BRIDGE COMMANDS

USER’S GUIDE630 CyberSWITCHddpTooShortErrorsThe total number of input DDP datagrams dropped because the received data length was less than the da

Page 592 - CALL CONTROL COMMANDS

Central Site Remote Access Switch 631SYSTEM STATISTICSAppleTalk StatisticsatechoInRepliesThe count of AppleTalk Echo replies received.APPLETALK R

Page 593 - Call Control Commands

USER’S GUIDE632 CyberSWITCHzip ZoneConflctErrorsThe number of times a conflict has been detected between this entity’s zone information and anoth

Page 594

Central Site Remote Access Switch 633SYSTEM STATISTICSAppleTalk StatisticsatpRetryCntExceedsThe number of times the retry count was exceeded, and

Page 595

USER’S GUIDE634 CyberSWITCHBRIDGE STATISTICSThe system collects bridge statistics for each LAN port and for WAN connections. These bridge statist

Page 596 - CALL RESTRICTION COMMANDS

Central Site Remote Access Switch 635SYSTEM STATISTICSCompression StatisticsCOMPRESSION STATISTICSThe system collects the following compression s

Page 597 - DHCP COMMANDS

USER’S GUIDE636 CyberSWITCHpeer sent resetsThe number of decompression resets sent from peer devices.system sent resetsThe number of decompressio

Page 598 - DIGITAL MODEM COMMANDS

Central Site Remote Access Switch 637SYSTEM STATISTICSDHCP StatisticsDHCP RELAY AGENT STATISTICSBOOTREQUEST msgs rcvdIncremented whenever the sys

Page 599 - Frame Relay Commands

USER’S GUIDE638 CyberSWITCHBOOTREPLY bad ’giaddr’:Number of DHCP/BOOTP BOOTREPLY messages that were discarded by the DHCP Relay Agent because the

Page 600

Central Site Remote Access Switch 639SYSTEM STATISTICSDigital Modem StatisticsDHCPNAKs rcvdIncremented whenever the DHCP Proxy Client has receive

Page 601 - IP Routing Commands

USER’S GUIDE64 CyberSWITCHV.35 ADAPTERThe V.35 adapter provides two V.35 ports. The card contains two female DB26 connectors. A V.35 adapter cabl

Page 602

USER’S GUIDE640 CyberSWITCHINITThe access state entered when the access is first initialized. The access has entered the LMI dialogue phase, but

Page 603

Central Site Remote Access Switch 641SYSTEM STATISTICSFrame Relay Statistics# Lost Rx FrameRelated to the “# Lost Rx Seq” counter in that it repr

Page 604

USER’S GUIDE642 CyberSWITCHNOT READYThe PVC state entered when the PVC has been marked unavailable by the network via a STATUS message, an alarm

Page 605 - IPX ROUTING COMMANDS

Central Site Remote Access Switch 643SYSTEM STATISTICSIP Statisticscrc errorsThe number of aligned frames discarded because of a CRC error.align

Page 606 - WAN Link Delay =

USER’S GUIDE644 CyberSWITCHipInUnknownProtos The number of locally addressed datagrams received successfully but discarded because of an unknown

Page 607 - ISDN Usage Commands

Central Site Remote Access Switch 645SYSTEM STATISTICSIP StatisticsipFragCreates The number of IP datagram fragments that have been generated as

Page 608 - LOG COMMANDS

USER’S GUIDE646 CyberSWITCHicmpOutErrors The number of ICMP messages that this system did not send due to problems discovered within ICMP, such a

Page 609 - Packet Capture Commands

Central Site Remote Access Switch 647SYSTEM STATISTICSIPX StatisticsIPX BASIC SYSTEM TABLE STATISTICSipxBasicSysExistStateThe validity of this en

Page 610

USER’S GUIDE648 CyberSWITCHipxBasicSysOpenSocketFailsThe number of IPX socket open calls which failed.IPX ADVANCED SYSTEM TABLE STATISTICSipxAdvS

Page 611

Central Site Remote Access Switch 649SYSTEM STATISTICSIPX StatisticsripIncorrectPacketsThe number of times incorrect RIP packets were received.ri

Page 612 - RADIUS COMMANDS

Central Site Remote Access Switch 65HARDWARE OVERVIEWSystem AdaptersPin and Signal Assignments for the V.35 ConnectionRS232 ADAPTERThe RS232 adap

Page 613 - RADIUS Commands

USER’S GUIDE650 CyberSWITCHAvailable RoutesNumber of routes currently available on this router.High Water MarkPeak number of routes this router h

Page 614 - PANNING TREE PORT INFORMATION

Central Site Remote Access Switch 651SYSTEM STATISTICSRIP StatisticsIPX SERVICE STATISTICSYou can access IPX Service statistics by using the ipx

Page 615 - Spanning Tree Commands

USER’S GUIDE652 CyberSWITCHIfStatRcvBadRoutesThe number of routes, in valid RIP packets, which were ignored for any reason. Example reasons inclu

Page 616

Central Site Remote Access Switch 653SYSTEM STATISTICSSNMP StatisticssnmpInBadVersionsThe total number of SNMP messages that were delivered to th

Page 617 - TCP Commands

USER’S GUIDE654 CyberSWITCHsnmpInGetNextsThe total number of SNMP Get-Next PDUs that have been accepted and processed by the SNMP Agent.snmpInSet

Page 618 - Escape character is ‘^]’

Central Site Remote Access Switch 655SYSTEM STATISTICSTCP StatisticsTCP STATISTICSYou can access these statistics by issuing the tcp stats consol

Page 619 - Telnet Commands

USER’S GUIDE656 CyberSWITCHtcpInErrsThe total number of segments received in error (for example, bad TCP checksums).tcpOutRstsThe number of TCP s

Page 620 - TERMINAL COMMANDS

Central Site Remote Access Switch 657SYSTEM STATISTICSTFTP StatisticsFailed file getsDisplays the count of failed gets.(Local system failed to do

Page 621 - TFTP COMMANDS

USER’S GUIDE658 CyberSWITCHUDP STATISTICSIf the IP operating mode is enabled, you can access the following UDP statistics by using the udp stats

Page 622 - TRACE COMMANDS

Central Site Remote Access Switch 659SYSTEM STATISTICSWAN L1P StatisticsWAN L1P STATISTICS You can access WAN L1P statistics by issuing the wan l

Page 623 - UDP Commands

USER’S GUIDE66 CyberSWITCHHARDWARE CHARACTERISTICSNumber of Ports: 4 (using RS232 adapter cable)Connectors: DB26Interface: RS232 DTE/DCE (using R

Page 624 - WAN COMMANDS

USER’S GUIDE660 CyberSWITCHRecv Positive SlipsThe number of PRI frames lost due to timing problems in the positive direction.Recv Parity ErrorsTh

Page 625 - X.25 Commands

Central Site Remote Access Switch 661SYSTEM STATISTICSX.25 Statisticsswitched call completedA counter that is incremented each time a switched ca

Page 626

USER’S GUIDE662 CyberSWITCH# Max ConnectionsThe maximum number of active VCs allowed at any time.# Active ConnThe number of currently active VCs.

Page 627 - TATISTICS

Central Site Remote Access Switch 663SYSTEM STATISTICSX.25 Statistics# Restarts ReceivedThe number of times the X.25 network has been restarted b

Page 628 - CALL STATISTICS

USER’S GUIDE664 CyberSWITCH# RNR Sent countThe number of receive not ready packets sent.# RNR ReceivedThe number of receive not ready packets rec

Page 629 - APPLETALK STATISTICS

ROUTINE MAINTENANCEOVERVIEWThe information in this chapter provides instructions for performing routing maintenance on the CyberSWITCH. The informatio

Page 630

USER’S GUIDE666 CyberSWITCHchanges are NOT dynamic. The changes are saved in a temporary copy of configuration data, and will not affect the curr

Page 631 - AppleTalk Statistics

APPENDICESThe User’s Guide includes the following appendices:• System WorksheetsWe have designed a set of worksheets you can fill out before you begin

Page 632

SYSTEM ADAPTERSThis appendix includes the following illustrations of available CyberSWITCH adapters: • Ethernet•Basic Rate• Primary Rate:PRI-8PRI-23PR

Page 633 - APPLETALK PORT STATISTICS

Central Site Remote Access Switch 669SYSTEM ADAPTERSETHERNET ADAPTERDRAM(2 SIMMS)i960 RISCCPUAUIConnectorsInterrupt Block(JP1)I/O Address(JP2)Eth

Page 634 - BRIDGE STATISTICS

Central Site Remote Access Switch 67HARDWARE OVERVIEWSystem AdaptersDIGITAL MODEMSThe CyberSWITCH supports the DM-8, DM-24, DM-24+ and DM-30+ Dig

Page 635 - COMPRESSION STATISTICS

USER’S GUIDE670 CyberSWITCHBASIC RATE ADAPTERThis adapter is set for slot 3:RJ-45ConnectorsTDM BusConnectorPin 1BRI-4 AdapterSide ViewFront ViewI

Page 636 - OMMON DHCP STATISTICS

Central Site Remote Access Switch 671SYSTEM ADAPTERSPRIMARY RATE ADAPTERSTHE PRI-8This adapter is set for slot 5:J12(jumper onbottom)J11(jumper o

Page 637 - DHCP RELAY AGENT STATISTICS

USER’S GUIDE672 CyberSWITCHTHE PRI-237KLVDGDSWHULVVHWIRUVORWTDM BusConnectorMVIP BusConnectorLCDConnectorPRI-23 AdapterPin 1RJ-45Connecto

Page 638 - ROXY CLIENT STATISTICS

Central Site Remote Access Switch 673SYSTEM ADAPTERSTHE PRI-23/307KLVDGDSWHULVVHWIRUVORW1RWHWKDW6RQWKH,26ZLWFKLVQRWXVHG7KH

Page 639 - FRAME RELAY STATISTICS

USER’S GUIDE674 CyberSWITCHEXPANDER ADAPTERThis adapter is set for slot 5:TDM BusConnectorPin 1PRI-8 Expander AdapterSide ViewFront ViewInterrupt

Page 640

Central Site Remote Access Switch 675SYSTEM ADAPTERSV.35 ADAPTERThis adapter is set for slot 5:Note: Switch label “OPEN” is the same as OFF on I

Page 641 - PVC RELATED STATISTICS

USER’S GUIDE676 CyberSWITCHRS232 ADAPTERThis adapter is set for slot 5:Note: Switch label “OPEN” is the same as OFF on I/O switch.RS232 AdapterS

Page 642 - LAN STATISTICS

Central Site Remote Access Switch 677SYSTEM ADAPTERSDIGITAL MODEMSTHE DM-8 This card is configured as the second DM-8 in the system as well as th

Page 643 - IP STATISTICS

USER’S GUIDE678 CyberSWITCHTHE DM-24 The DM-24 adapter consists of a mother board/daughter board combination; daughter board sets on top of large

Page 644

Central Site Remote Access Switch 679SYSTEM ADAPTERSDM-24, back view (Illustration does not depict switches set for any particular slot): Note: I

Page 645 - ICMP GROUP STATISTICS

USER’S GUIDE68 CyberSWITCHTHE DM-8 Hardware CharacteristicsProcessor: LSI LOGIC - LR33000RISCSpeed: 25 MhzNumber of Ports: 8Connector: MVIPMTBF:

Page 646 - ENERAL STATISTICS

USER’S GUIDE680 CyberSWITCHTHE DM-24+/DM-30+The DM-24+ and the DM-30+ adapters consist of a mother board/daughter board combination. The two adap

Page 647 - IPX Statistics

Central Site Remote Access Switch 681SYSTEM ADAPTERSPertinent switches are located on the back side of the mother board. The following illustrate

Page 648

USER’S GUIDE682 CyberSWITCHENCRYPTION ADAPTERDES ADAPTER (US VERSION)Note: Jumper J1 must be installed for the board to be operational.BatteryRS

Page 649 - IPX ROUTE STATISTICS

SYSTEM WORKSHEETSThe worksheets included in this appendix will be helpful in configuring and managing your system. They capture important network info

Page 650 - RIGGERED SAP STATISTICS

USER’S GUIDE684 CyberSWITCHNETWORK TOPOLOGY

Page 651 - RIP STATISTICS

Central Site Remote Access Switch 685SYSTEM WORKSHEETSSystem DetailsSystem Name: _____________________ PAP Password:_______________ CHAP Sec

Page 652 - SNMP STATISTICS

USER’S GUIDE686 CyberSWITCHACCESSESDedicated AccessesOver ISDN:Over Serial connection:X.25 AccessesOver ISDN:Over serial connection:Frame Relay A

Page 653 - SNMP Statistics

Central Site Remote Access Switch 687SYSTEM WORKSHEETSDevice InformationDevice Name: _____________________________Calling (ISDN, FR, etc.) Inform

Page 654

USER’S GUIDE688 CyberSWITCHBRIDGINGIP ROUTINGNetwork Interface InformationBridging ❒ enabled ❒ disabledMode of Operation ❒ restricted

Page 655 - TCP Statistics

Central Site Remote Access Switch 689SYSTEM WORKSHEETSBridging and Routing InformationIP ROUTING, CONTINUEDStatic RoutesIPX ROUTINGRouting Inform

Page 656 - TFTP STATISTICS

Central Site Remote Access Switch 69HARDWARE OVERVIEWSystem AdaptersENCRYPTION ADAPTERThe CyberSWITCH supports the DES/RSA Encryption adapter. Th

Page 657 - TFTP Statistics

USER’S GUIDE690 CyberSWITCHAPPLETALK ROUTINGAppleTalk Routing/Port InformationAppleTalk Port Static RoutesAppleTalk routing ❒ enabled ❒ disabled

Page 658 - WAN FR_IETF STATISTICS

CFGEDIT MAPOVERVIEWThe following pages provide an outline of the CyberSWITCH CFGEDIT configuration utility. As you configure your system, you may find

Page 659 - WAN L1P STATISTICS

USER’S GUIDE692 CyberSWITCHPHYSICAL RESOURCES MENURESOURCES• COMMPORT• Basic Rateswitch type•T1/E1/PRIswitch typesynchronization•Expander•V.35• R

Page 660 - AYER 1 GENERAL STATISTICS

Central Site Remote Access Switch 693CFGEDIT MAPOptions MenuOPTIONS MENUBRIDGING• Enable/Disable• Spanning Tree• Mode of Operation unrestricted,

Page 661 - X.25 STATISTICS

USER’S GUIDE694 CyberSWITCHIPX ROUTING• Enable/Disable•IPX Network Number•IPX InterfacesLAN Remote LAN• Routing ProtocolsIPX RIP, IPX SAPnumber t

Page 662

Central Site Remote Access Switch 695CFGEDIT MAPOptions MenuPPP• Global options• LCP options• IPCP options• Link failure optionsCALL CONTROL• Thr

Page 663 - X.25 Statistics

USER’S GUIDE696 CyberSWITCHSECURITY MENUSECURITY LEVEL•No Security• Device Level Security• User Level Security• Device and User Level SecuritySYS

Page 664

Central Site Remote Access Switch 697CFGEDIT MAPSecurity MenuAuthentication PAP passwordCHAP secretoutbound authenticationuser level authenticati

Page 665

USER’S GUIDE698 CyberSWITCHOFF-NODE SERVER INFORMATION•CSMTCP port•RADIUSPrimary ServerSecondary ServerMiscellaneous infonumber of retriestime be

Page 666

GETTING ASSISTANCEREPORTING PROBLEMSFor a fast response, please take the time to fill out the System Problem Report to inform us of any difficulties y

Page 667 - PPENDICES

Central Site Remote Access Switch 7Hardware Installation 83Overview 83Pre-Installation Requirements 83Selecting Slots for the Adapters 84Adapter

Page 668

SOFTWARE OVERVIEWOVERVIEWThe system software fits into one of three categories:• system software for the System, adapter modules and administration fu

Page 669 - THERNET ADAPTER

DATE: ______________ NUMBER OF PAGES INCLUDING THIS PAGE: ______TO: CUSTOMER SERVICE FROM: ______________________________________Cabletron Sy

Page 670

ADMINISTRATIVE CONSOLE COMMANDS TABLEThe following table lists all system administration commands. Guest commands are identified in the command column

Page 671 - Front View

USER’S GUIDE702 CyberSWITCHcdr verify (GUEST) verifies call detail recording servers are configuredcfg provides information on

Page 672 - PRI-23 Adapter

Central Site Remote Access Switch 703ADMINISTRATIVE CONSOLE COMMANDS TABLEfr dbg level displays the current debug level for frame relayfr dbg le

Page 673 - PRI-23/30 Adapter

USER’S GUIDE704 CyberSWITCHipx sap stats displays IPX SAP statisticsipx spoof stats displays IPX spoofing statisticsipx stats displays IPX statis

Page 674 - XPANDER ADAPTER

Central Site Remote Access Switch 705ADMINISTRATIVE CONSOLE COMMANDS TABLEmodem upgrade <slot# modem#>installs new modem firmware onto spec

Page 675 - V.35 Adapter

USER’S GUIDE706 CyberSWITCHser <slot #> signal displays current state of input signals for each serial line attached to card in specified s

Page 676 - RS232 Adapter

Central Site Remote Access Switch 707ADMINISTRATIVE CONSOLE COMMANDS TABLEtrace lapb[on/off] enables or disables the packet tracing option for LA

Page 677 - (jumpers 3 & 4

MANAGE MODE COMMANDS TABLE The following table displays the available Dynamic Management commands:CommandUseace displays ACE off-node server configura

Page 678 - HE DM-24

Central Site Remote Access Switch 709MANAGE MODE COMMANDS TABLEexit exits from Manage Mode and returns to the normal system command modefileattr

Page 679 - DM-24 Adapter

Central Site Remote Access Switch 71SOFTWARE OVERVIEWSystem FilesSYSTEM FILESThe system files consist of the required configuration files, as wel

Page 680 - Connector

USER’S GUIDE710 CyberSWITCHipxsvc [add/change/delete] adds/changes/deletes an IPX serviceipxspoof allows you to configure system level spoofing d

Page 681 - (back view)

Central Site Remote Access Switch 711MANAGE MODE COMMANDS TABLEsrcfilt [add/change/delete] adds/changes/deletes the a source address filter tacac

Page 682 - DAPTER (US VERSION)

CAUSE CODES TABLEThe following table provides Q.931 cause codes and their corresponding meanings. Cause codes may appear in Call Trace Messages.Dec Va

Page 683 - ORKSHEETS

Central Site Remote Access Switch 713CAUSE CODES TABLE19 13 no answer from device (device alerted)Indicates that the destination has responded to

Page 684 - ETWORK TOPOLOGY

USER’S GUIDE714 CyberSWITCH34 22 no circuit/channel availableIndicates that the connection could not be established because there was no appropri

Page 685 - YSTEM DETAILS

Central Site Remote Access Switch 715CAUSE CODES TABLE52 34 outgoing calls barred53 35 outgoing calls barred within CUG54 36 incoming calls barre

Page 686 - ACCESSES

USER’S GUIDE716 CyberSWITCH81 51 invalid call reference valueIndicates that the remote equipment has received a call with a call reference that i

Page 687 - * HDLC Bridge only

Central Site Remote Access Switch 717CAUSE CODES TABLE97 61 message type non-existent or not implementedIndicates that the receiving equipment re

Page 688 - Network Interface Information

USER’S GUIDE718 CyberSWITCHUNKNOWN Indicates that an event occurrent but that the network does not provide causes for the actions that it takes,

Page 689 - OUTING, CONTINUED

Central Site Remote Access Switch 719INDEXAaccess request retries 219, 221accessesalternate accesses 242, 429dedicated 242frame relay 255ISDN acc

Page 690 - PPLETALK ROUTING

USER’S GUIDE72 CyberSWITCHatalk.neiThis file contains configuration information used when AppleTalk Routing is enabled. This file also contains i

Page 691 - CFGEDIT M

USER’S GUIDE720 CyberSWITCHbridgingbridge password 195configuration 268dial out 264device list configuration 265using bridge filters 283using kno

Page 692 - ATA LINES

Central Site Remote Access Switch 721configurationfiles 71, 665packet types 292restoring 666toolsCFGEDIT 111dynamic management 112congestion cont

Page 693 - Options Menu

USER’S GUIDE722 CyberSWITCHdynamic device option 216dynamic management 577command summary 708EE1/R2 signaling 127EMS 49Encapsulating Security Pay

Page 694

Central Site Remote Access Switch 723IP filters, continuedpacket type configuration 292per-device 299TCP configuration 294trace messages 551UDP c

Page 695

USER’S GUIDE724 CyberSWITCHLLAN adapterinitialization messages 419problem diagnosis 423verification messages 422, 423lan commands 608LAN IP inter

Page 696 - EVICE LEVEL DATABASES

Central Site Remote Access Switch 725network number 327network securityconfiguring device and user level security 172configuring device level sec

Page 697 - Security Menu

USER’S GUIDE726 CyberSWITCHRADIUS Serverconfiguring 211, 214configuring a RADIUS Accounting Server 212configuring login information 226configurin

Page 698 - ETWORK LOGIN INFORMATION

Central Site Remote Access Switch 727semipermanent connections 379, 381and call device commands 381and call restrictions 382and throughput monito

Page 699 - SSISTANCE

USER’S GUIDE728 CyberSWITCHTCP 294, 300, 305statistics 655tcp commands 617TDM 94, 124bus connections 95Teleos Simulator 116Telnet 100, 563remote

Page 700 - SYSTEM PROBLEM REPORT

Central Site Remote Access Switch 729verifying the installation, continuedIP host mode 427IP router initialized 423IP routing over interfaces 433

Page 701 - DMINISTRATIVE

Central Site Remote Access Switch 73SOFTWARE OVERVIEWSystem FilesUSER LEVEL SECURITY FILESAs administrator, you may create a welcome banner file

Page 702

SYSTEM INSTALLATIONWe include the following chapters in this segment of the User’s Guide:• Ordering ISDN ServiceProvides guidelines for ordering ISDN

Page 703

ORDERING ISDN SERVICE (US ONLY)OVERVIEWThis chapter was designed to be a guideline for ordering ISDN service in the United States.For BRI ISDN Service

Page 704

USER’S GUIDE76 CyberSWITCHIf the AT&T 5ESS switch type is available, the ISDN services available will be one of the following:•NI-1• Custom P

Page 705

Central Site Remote Access Switch 77ORDERING ISDN SERVICE (US ONLY)Ordering BRI ISDN Lines using Provisioning SettingsAT&T 5ESS NI-1 SERVICEN

Page 706

USER’S GUIDE78 CyberSWITCHAT&T 5ESS CUSTOM POINT-TO-POINT SERVICENote that some of the elements below are set per directory number. With Cust

Page 707

Central Site Remote Access Switch 79ORDERING ISDN SERVICE (US ONLY)Ordering BRI ISDN Lines using Provisioning SettingsNORTHERN TELECOM DMS100 NI-

Page 708

USER’S GUIDE8 CyberSWITCHBASIC CONFIGURATION 110Configuration Tools 111Overview 111CFGEDIT 111Executing CFGEDIT 112Saving CFGEDIT Changes 112Dyna

Page 709

USER’S GUIDE80 CyberSWITCHNORTHERN TELECOM DMS100 CUSTOM SERVICENote that you must set either EKTS or ACO to yes. You may not set both of them to

Page 710

Central Site Remote Access Switch 81ORDERING ISDN SERVICE (US ONLY)Ordering BRI ISDN Lines using Provisioning Settingsis ordered, the customer ma

Page 711

USER’S GUIDE82 CyberSWITCH3. What type of switch is the line connected to?4. For #4ESS, what release of software is running on the switch?When th

Page 712

HARDWARE INSTALLATIONOVERVIEWThis chapter provides a description of the hardware installation process. It includes: • pre-installation requirements• s

Page 713

USER’S GUIDE84 CyberSWITCH• Verify administration console requirementsYou will need an administration console to install your system. (We do not

Page 714

Central Site Remote Access Switch 85HARDWARE INSTALLATIONAdapter Settingsc. If you are installing WAN adapters and an Encryption adapter:Select s

Page 715

USER’S GUIDE86 CyberSWITCHADAPTER INTERRUPT AND I/O ADDRESS SETTINGSWAN ADAPTERSThe WAN adapters (except for the RS-232 and V.35) use jumpers to

Page 716

Central Site Remote Access Switch 87HARDWARE INSTALLATIONAdapter Settingsfirst DM-8 installed, 388 for the second, 390 for the third, and 398 for

Page 717

USER’S GUIDE88 CyberSWITCHDM-24+ AND THE DM-30+ ADAPTER ADDRESS SETTINGSThe DM-24+ and the DM-30+ adapters both use switches to set the interrupt

Page 718

Central Site Remote Access Switch 89HARDWARE INSTALLATIONAdapter SettingsENCRYPTION ADAPTER SETTINGSDES/RSA AdapterThe DES/RSA adapter is availab

Page 719

Central Site Remote Access Switch 9IP Network Interfaces 133Configuring Interfaces 133Network Interface Configuration Elements 135IP Network Inte

Page 720

USER’S GUIDE90 CyberSWITCHADDITIONAL ADAPTER SETTINGSOn certain adapters, there are specific jumper settings which are independent of slot config

Page 721

Central Site Remote Access Switch 91HARDWARE INSTALLATIONAdapter SettingsPRI-23 Clock SettingsIn addition to the interrupt jumper and I/O address

Page 722

USER’S GUIDE92 CyberSWITCHPRI-23/30 In addition to the interrupt jumper and I/O address settings, the PRI-23/30 requires settings for:• channel s

Page 723

Central Site Remote Access Switch 93HARDWARE INSTALLATIONInserting the Adapters into the CyberSWITCHINSERTING THE ADAPTERS INTO THE CYBERSWITCHNo

Page 724

USER’S GUIDE94 CyberSWITCHCONNECTING ADAPTER INTER-BOARD CABLESThere are three possible cables used to connect adapters: flat, crossover, and LCD

Page 725

Central Site Remote Access Switch 95HARDWARE INSTALLATIONConnecting Adapter Inter-Board CablesIf you have PRI-23/30 cards: Use an MVIP bus connec

Page 726

USER’S GUIDE96 CyberSWITCHThe following graphic illustrates a crossover cable application. The adapter with the TDM connector can be one of the f

Page 727

Central Site Remote Access Switch 97HARDWARE INSTALLATIONConnecting Adapter Inter-Board CablesCAUTION:Failure to line up triangles on LCD cable a

Page 728

ACCESSING THE CYBERSWITCHOVERVIEW This chapter describes accessing your CyberSWITCH, which includes:• making proper connections• establishing an admin

Page 729

Central Site Remote Access Switch 99ACCESSING THE CYBERSWITCHMaking Connections6. Turn on the CyberSWITCH by pressing the POWER-ON button.7. Turn

Commentaires sur ces manuels

Pas de commentaire