CONFIGURING CALL CONTROL

VRA Manager as a Call Control Manager

AUTHENTICATION TIMEOUT TIMER

This timer represents the amount of time the CyberSWITCH will wait for the Authentication Agent to handle a login attempt before timing out. If VRA is enabled as Call Control Manager, this time- out value must then represent the amount of time for both:

the Authenticating Agent to respond to the login attempt, and

the VRA Manager to respond to the login attempt.

CALL CONTROL FAILURE BANNER

If VRA does not permit call connectivity for any reason, the CyberSWITCH will display the message “VRA Manager Denied Access”. You may change this default message to whatever you choose through this configuration element.

BACKGROUND INFORMATION

Cabletron’s Virtual Remote Access (VRA) Manager consists of an administration program and a user interface, and runs with a database and a standard SQL server. It acts as both an authentication server and call control manager for the CyberSWITCH. This product is described in detail in the SecureFast Virtual Remote Access Manager User’s Guide which accompanies the product.

If you are interested in call control management without VRA authentication, the VRA Manager as Call Control Manager is now an available feature. This feature provides call control management with any authentication agent (e.g., RADIUS, ACE, TACACS).

To use VRA for call control management only, you must enable the feature. The call will be authenticated through the chosen method, and then call control management will pass to the VRA manager. Acceptable authentication methods are:

RADIUS at device level

VRA at device level

RADIUS at user level

ACE at user level

TACACS at user level

On-node Device Table at device level

In all cases, the device information is propagated into the CyberSWITCH from the authentication agent. (This implies that IP static routes and IP pooling are configured on the CyberSWITCH, and not the VRA manager.) When VRA is not the authenticating agent, the VRA Manager cannot initiate outgoing calls. To make outgoing calls from the CyberSWITCH, you must use other means of initiation, based on type of security (e.g., IP route lookup using RADIUS).

CALL CONTROL MANAGEMENT

VRA call control management varies depending upon the type of security in use:

Device Level Security

If you use the On-node Device Table as authentication agent, VRA merely logs call start and end times. (You do not need to configure devices in the VRA database).

If you use an off-node authentication server for authentication: configure devices on the VRA manager as well. This will provide access to the following VRA call control management features: call restrictions, maximum bandwidth, and grouping (in addition to the call logging feature).

Workgroup Remote Access Switch 331

Page 331
Image 331
Cabletron Systems CSX1200, CSX1000 manual Background Information