REMOTE BRIDGING NETWORK WITH SECURITY

OVERVIEW

This example network is a bridged network with Calling Line Id security and Bridge MAC Address security enabled. The network is configured with two devices. One device will be configured to require a Bridge MAC Address security password, and one device will not. This network uses BRI lines.

Worksheets for this network are included on the following pages.

Note that a Hunt Group is used for the BRI lines pictured in the Network Topology Worksheet. Remote devices will then only need to configure one telephone number (the Hunt Group number) for the CyberSWITCH instead of all four phone numbers. If the first line is busy, the next line is automatically used, and so on until a free line is found. A Hunt Group number can be arranged through your Service Provider.

INITIAL INSTALLATION STEPS

The initial steps in the CyberSWITCH installation process are basically the same no matter how complicated the network. These steps are:

completing the requirement worksheets

ordering ISDN service

powering on the system

accessing Release Notes

connecting an administration console

setting up Telnet access

upgrading system software

changing defaults to secure system

returning configuration to factory defaults

The chapters Accessing the CyberSWITCH and Upgrading System Software (in the User’s Guide) describe each of these steps in detail.

Worksheets for this network are included on the next few pages.

Page 17
Image 17
Cabletron Systems 1200, 1000 manual Remote Bridging Network with Security