Reference Guide for the Model RT210/RT211 ISDN Routers
Configuring the Router 3-13
7. Press [Cntl]+E to apply the changes.
8. Enter SAVE to save the changes.
9. Enter STAT ISDN to display the ISDN Port Status menu.
10. Type CALL and the ISDN phone number.
CALL must be followed by a space and the ISDN phone number of the other router. If the
connection is on a 56 KBps line, prefix the number with “#”symbol. An ISDN call is now set
up to the remote router, a path with the relevant ISDN number are created, and routing
information is exchanged. Any routes created are marked as routes learned by ISDN and are
treated as such.
11. Press [Enter] to set up the ISDN call that connects the router.
12. Leave the call running for three minutes to learn the addresses.
13. Enter CLEAR to cancel the call.
14. Enter SAVE to save the learned path to memory.
15. Repeat this procedure for each remote router you wish to connect.
Your router is now configured and the ISDN connection is made and broken automatically on
demand.
Verifying Autocall OperationYou can verify autocall operation by communicating through a software application of your choice
with the remote devices that you have configured on your network. You can do this by pinging one
of the remote routers through the built-in basic interface. For further information about pinging,
refer to “Using the Ping Utility to Troubleshoot a TCP/IP Network,” on page 5-5.
After calls are made automatically and are disconnected when idle, you can make changes to other
parameters. A call is considered idle when no real data is being sent across the path for the period
set in the Threshold Period parameter on the Configure Paths menu. After calls are made
automatically and are disconnected on other remote units, you can then make changes to
parameters on remote units.
Other path parameters that may need setting are additional bandwidth and PAP and CHAP
security. For information about setting additional bandwidth, refer to “Obtaining Additional
Bandwidth” on page 3-14. For information on PAP and CHAP security, refer to “Defining Security
Levels” on page 1-8.
NGRRT210.BK Page 13 Friday, October 17, 1997 2:37 PM