Cabletron Systems 1200, 1000 manual Configure The Cyberswitch, Configuring The Options

Models: 1200 1000

1 106
Download 106 pages 14.3 Kb
Page 23
Image 23
CONFIGURE THE CYBERSWITCH

REMOTE BRIDGING NETWORK WITH SECURITY

Configure the CyberSWITCH

CONFIGURE THE CYBERSWITCH

Note: We are assuming that the software has already been installed and is running. Be sure you are working from the system prompt.

Using the detailed instructions for these steps found in the Simple Remote Bridging chapter, complete the following configuration steps.

Start the Run-Time CFGEDIT program

Select physical resources

Select to add a resource

Select Switch type to be NI-1

Select to add a line

Enter the line name

Select slot and port numbers

Select line interface type of “Point-to-Point”

Add Data Links (Data Link explanation follows)

Choose Auto TEI Negotiation

Enter Service Profile ID (SPID) Value

Enter Directory Number for Data Link

Enter Maximum Number of Digits to Verify

Repeat “Add Data Links” for second Data Link

Repeat “Select to add a line” for each additional line

Data links are handled differently on a NI-1 switch. Some BRI lines have only one phone number (for the Data Link), but can handle two calls (one for each bearer channel). For NI-1 switches, the BRI line has two phone numbers (one for each bearer channel), and each phone number has its own SPID. You must enter the number of digits to verify, so that when the system receives a phone call it can determine on which bearer to accept the phone call. Refer to the System Details worksheet for the SPIDs, directory numbers, and the number of digits to verify.

CONFIGURING THE OPTIONS

The default configuration for the CyberSWITCH is bridging disabled and IP routing enabled. For reasons we provide below, we want both bridging and IP routing enabled. Under the Option Menu, select the bridging option and follow the instructions to enable bridging.

This network is a bridged network, but we are going to configure an IP option (the IP host operating mode) so that we may use an IP application (such as Telnet, TFTP, or SNMP) to manage the CyberSWITCH. This process was described in the previous chapter (page 13) and will not be repeated here.

CONFIGURING THE SECURITY

This network has remote devices, and the device information for each of those devices must be configured. Device security is used, and the remote devices are configured in the on-node

Workgroup Remote Access Switch 23

Page 23
Image 23
Cabletron Systems 1200, 1000 manual Configure The Cyberswitch, Configuring The Options, Configuring The Security