USER’S GUIDE

AUTHENTICATION TIMEOUT TIMER

This timer represents the amount of time the CyberSWITCH will wait for the Authentication Agent to handle a login attempt before timing out. If CSM is enabled as Call Control Manager, this time- out value must then represent the amount of time for both:

the Authenticating Agent to respond to the login attempt, and

CSM to respond to the login attempt.

CALL CONTROL FAILURE BANNER

If CSM does not permit call connectivity for any reason, the CyberSWITCH will display the message “CSM Denied Access”. You may change this default message to whatever you choose through this configuration element.

BACKGROUND INFORMATION

Cabletron’s CSM consists of an administration program and a user interface, and runs with a database and a standard SQL server. It acts as both an authentication server and call control manager for the CyberSWITCH. This product is described in detail in the CSM User’s Guide which accompanies the product.

If you are interested in call control management without CSM authentication, the CSM as Call Control Manager is now an available feature. This feature provides call control management with any authentication agent (e.g., RADIUS, ACE, TACACS).

To use CSM for call control management only, you must enable the feature. The call will be authenticated through the chosen method, and then call control management will pass to CSM. Acceptable authentication methods are:

RADIUS at device level

CSM at device level

RADIUS at user level

ACE at user level

TACACS at user level

On-node Device Table at device level

In all cases, the device information is propagated into the CyberSWITCH from the authentication agent. (This implies that IP static routes and IP pooling are configured on the CyberSWITCH, and not CSM.) When CSM is not the authenticating agent, CSM cannot initiate outgoing calls. To make outgoing calls from the CyberSWITCH, you must use other means of initiation, based on type of security (e.g., IP route lookup using RADIUS).

CALL CONTROL MANAGEMENT

CSM call control management varies depending upon the type of security in use:

Device Level Security

If you use the On-node Device Table as authentication agent, CSM merely logs call start and end times. (You do not need to configure devices in the CSM database).

If you use an off-node authentication server for authentication: configure devices on CSM as

well. This will provide access to the following CSM call control management features: call restrictions, maximum bandwidth, and grouping (in addition to the call logging feature).

User Level Security

384 CyberSWITCH

Page 384
Image 384
Enterasys Networks CSX5500, CSX6000, CSX7000 manual Call Control Management