CONFIGURING ALTERNATE ACCESSES

Dedicated Accesses

LINE PROTOCOL

Designates the type of line protocol that will be used on the dedicated connection. PPP line protocol is the correct selection for most configurations. HDLC protocol may work for devices that only support HDLC protocol.

DEVICE NAME (OPTIONAL)

Optional parameter. The device name of the device assigned to this dedicated connection. The device name may be up to 17 characters in length, and is case sensitive. If you configure this parameter, and, in addition, turn off outbound authentication for this device, no authentication will be needed for this particular device. If you do not configure this parameter, device authorization is required for the device.

DEDICATED ACCESS BACKGROUND INFORMATION

To access dedicated network connections, there must be a physical connection between the network and the CyberSWITCH. The dedicated access defines how the CyberSWITCH will use this physical connection.

The dedicated connection is used in addition to any switched connections that can be made to provide overflow data capacity to the remote device. The dedicated connection is brought up at initialization time. The Throughput Monitor starts monitoring the dedicated connection for an overload condition. When link utilization causes an overload condition, additional switched connections will be made to the remote device based on the data rate configured for that device. When the link utilization causes an underload condition, the switched connections will be released with the dedicated connection remaining active.

Switched connections can also be used to provide backup connectivity to the remote device in case the dedicated connection fails. If the dedicated connection goes down, and there is network traffic, switched connections will be made to the remote device based on the data rate configured for that device thus providing backup for the dedicated connection. When the dedicated connection comes back up, it will be aggregated together with any switched connections that may be active.

When the link utilization causes an underload condition, the switched connections will be released with the dedicated connection remaining active.

Device level authentication must be enabled for dedicated accesses to properly identify the remote device and provide switched backup and overflow to that device.

To define a Dedicated Access, you must select a previously defined line. Then, input the details required to use the line.

Note: To achieve maximum bandwidth, you could theoretically dedicate two T1s to one remote device (3072 Kbps). Any configuration above this maximum bandwidth is not supported.

Keep in mind that you can aggregate a maximum of 32 connections. These connections can be any combination of dedicated and/or switched connections to the same device. For maximum performance, however, we recommend aggregating no more than eight connections at a time.

Workgroup Remote Access Switch 197

Page 197
Image 197
Cabletron Systems CSX1200, CSX1000 manual Dedicated Access Background Information