Workgroup Remote Access Switch 23
R
EMOTE
B
RIDGING
N
ETWORK
WITH
S
ECURITY
Configure the CyberSWITCH
CONFIGURE THE CYBERSWITCH
Note: We are assuming that the software has already been installed and is running. Be sure you
are working from the system prompt.
Using the detailed instructions for these steps found in the Simple Remote Bridging chapter,
complete the following configuration steps.
Start the Run-Time CFGEDIT program
Select physical resources
Select to add a resource
Select Switch type to be NI-1
Select to add a line
Enter the line name
Select slot and port numbers
Select line interface type of “Point-to-Point”
Add Data Links (Data Link explanation follows)
Choose Auto TEI Negotiation
Enter Service Profile ID (SPID) Value
Enter Directory Number for Data Link
Enter Maximum Number of Digits to Verify
Repeat “Add Data Links” for second Data Link
Repeat “Select to add a line” for each additional line
Data links are handled differently on a NI-1 switch. Some BRI lines have only one phone number
(for the Data Link), but can handle two calls (one for each bearer channel). For NI-1 switches, the
BRI line has two phone numbers (one for each bearer channel), and each phone number has its own
SPID. You must enter the number of digits to verify, so that when the system receives a phone call
it can determine on which bearer to accept the phone call. Refer to the System Details worksheet for
the SPIDs, directory numbers, and the number of digits to verify.
CONFIGURING THE OPTIONS
The default configuration for the CyberSWITCH is bridging disabled and IP routing enabled. For
reasons we provide below, we want both bridging and IP routing enabled. Under the Option Menu,
select the bridging option and follow the instructions to enable bridging.
This network is a bridged network, but we are going to configure an IP option (the IP host operating
mode) so that we may use an IP application (such as Telnet, TFTP, or SNMP) to manage the
CyberSWITCH. This process was described in the previous chapter (page 13) and will not be
repeated here.
CONFIGURING THE SECURITY
This network has remote devices, and the device information for each of those devices must be
configured. Device security is used, and the remote devices are configured in the on-node