Page 2
You may post this document on a network server for public use as long as no modifications are made to the document. Cabletron Systems reserves the right to make changes in specifications and other information contained in this document without prior notice. The reader should in all cases consult Cabletron Systems to determine whether any such changes have been made.
CABLETRON SYSTEMS, INC. PROGRAM LICENSE AGREEMENT IMPORTANT: Before utilizing this product, carefully read this License Agreement. This document is an agreement between you, the end user, and Cabletron Systems, Inc. ("Cabletron") that sets forth your rights and obligations with respect to the Cabletron software program (the "Program") contained in this package.
Safety Considerations 36 System Platforms 37 The CSX1000 and NE Link 1000 (a Network Express Product) 37 Platform Description 38 System Characteristics 40 The CSX1200 42 Platform Description 43 System Characteristics 43 Cabling Information 44 LAN Access 44 Back-to-Back Setup 45...
Page 6
Northern Telecom DMS100 NI-1 Service 60 Northern Telecom DMS100 Custom Service 61 Basic Information for Ordering PRI ISDN Lines 61 Hardware Installation 63 Pre-Installation Requirements 63 Installing the CSX1200-E11-MOD 64 Installing the CSX1200-U4-MOD 65 Cabling 66 Accessing the CyberSWITCH 67 Overview 67...
Page 7
Internet Protocol (IP) Option 102 Enabling IP 102 IP Option Configuration Elements 103 IP Background Information 103 IP Operating Mode 103 Configuring the IP Operating Mode 103 IP Operating Mode Configuration Elements 104 IP Operating Mode Background Information 104 Workgroup Remote Access Switch...
Page 8
USER’S GUIDE IP Network Interfaces 105 Configuring Interfaces 105 Network Interface Configuration Elements 107 IP Network Interface Background Information 112 IP RIP and the IP Network Interfaces 117 IP RIP over Dedicated Connections 120 IP Host Operating Mode and the IP Network Interfaces 122 Using Multiple IP Addresses 122 Static Routes 124 Configuring Static Routes 124...
Page 9
Off-node Device Database Location Background Information 175 Configuring User Level Databases 176 Overview 176 User Level Authentication Database Location 176 Configuring Authentication Database Location 176 User Level Authentication Database Location Configuration Elements 177 User Level Authentication Database Location Background Information 177 Workgroup Remote Access Switch...
Page 10
USER’S GUIDE Configuring Off-node Server Information 178 Overview 178 Multiple Administration Login Names 178 VRA Manager Authentication Server 179 Configuring VRA Manager Authentication Server 179 VRA Manager Authentication Server Configuration Elements 180 VRA Manager Authentication Server Background Information 180 RADIUS Authentication Server 180 Configuring a RADIUS Authentication Server 180 RADIUS Authentication Server Configuration Elements 182 RADIUS Authentication Server Background Information 182...
Page 11
Example: Bridge Dial Out Using a Destination MAC Address Filter 233 Known Connect List 235 Configuring the Known Connect List 235 Using CFGEDIT 235 Known Connect List Configuration Elements 236 Known Connect List Background Information 236 Workgroup Remote Access Switch...
Page 12
USER’S GUIDE Configuring Advanced IP Routing 237 Overview 237 Static ARP Table Entries 238 Configuring Static ARP Table Entries 238 Static ARP Table Entries Configuration Elements 238 Static ARP Table Entries Background Information 238 The Isolated Mode 239 Configuring the Isolated Mode 239 Isolated Mode Configuration Elements 239 Isolated Mode Background Information 239 Static Route Lookup via RADIUS 239...
Page 13
Configuring IPX Isolated Mode 289 IPX Isolated Mode Configuration Elements 289 IPX Isolated Mode Background Information 290 IPX Triggered RIP/SAP 290 Displaying WAN Peer List 290 Configuring Triggered RIP/SAP Global Timers 291 Configuration Elements 291 Triggered RIP/SAP Background Information 292 Workgroup Remote Access Switch...
Page 14
USER’S GUIDE IPX-Specific Information for Devices 292 Configuring IPX Devices 292 WAN Devices 292 Remote LAN Devices 295 IPX Configuration Elements for Devices 296 IPX Background Information for Devices 297 IPX Triggered RIP/SAP Device Background 297 Configuring SNMP 298 Overview 298 Configuring SNMP 298 SNMP Configuration Elements 300 SNMP Background Information 301...
Page 15
Log Options Background Information 339 Local Log File Overview 339 Syslog Server Overview 339 CDR Log Report Overview 340 Compression Options 345 Configuring Compression Options 345 Compression Options Configuration Elements 345 Compression Options Background Information 346 Compression and CCP 347 Workgroup Remote Access Switch...
Page 16
USER’S GUIDE TFTP 348 Configuring TFTP 348 TFTP Configuration Elements 349 TFTP Background Information 349 File Attributes 350 Configuring File Attributes 350 File Attributes Configuration Elements 350 File Attributes Background Information 350 ROUBLESHOOTING System Verification 353 Overview 353 Verifying Hardware Resources are Operational 353 Verifying WAN Lines are Available for Use 354 Verifying LAN Connection is Operational 354 Verifying Bridge is Initialized 355...
Page 17
IP Routing Over a WAN Interface Connection 393 IP Routing Over a WAN (Direct Host) Interface Connection 394 IP Routing Over a WAN RLAN Interface Connection 395 IP Routing Over a WAN UnNumbered Interface Connection 396 IP Filters 396 Workgroup Remote Access Switch...
Page 18
Local Area Network LED Indicators 418 WAN LED Indicators 418 BRI LED Indicators 418 PRI LED Indicators 419 LANVIEW LEDs (CSX1200-E11-MOD) 420 NT1 Status LEDs (CSX1200-U4-MOD only) 421 Service Indicator 422 Service Indicator Remains Lit 422 Service Indicator Blinks 423 Alarm LEDs (PRI Only) 424...
Page 19
System Commands 513 Overview 513 Accessing Administration Services 513 Setting the IP Address 514 Boot Device Commands 514 Accessing Dynamic Management 515 Viewing Operational Information 515 Viewing Throughput Information 520 Throughput Monitor Contents 521 Saving Operational Information 521 Workgroup Remote Access Switch...
Page 20
USER’S GUIDE Clearing Operational Information 522 Configuration-Related Commands 522 Restarting the CyberSWITCH 523 Setting the Date and Time 523 File Utility Commands 523 Terminating Administration Sessions 524 AppleTalk Routing Commands 525 Bridge Commands 530 Call Control Commands 531 Call Detail Recording Commands 534 Call Restriction Commands 534 Compression Information Commands 535 DHCP Commands 535...
Page 21
Routine Maintenance 597 Overview 597 Installing/Upgrading System Software 597 Executing Configuration Changes 597 Configuration Files 597 Making Changes Using CFGEDIT 597 Making Changes Using Manage Mode 598 Configuration Backup and Restore 598 Obtaining System Custom Information 598 Workgroup Remote Access Switch...
Page 22
Overview 608 Main Menu 608 Physical Resources Menu 609 Options Menu 610 Security Menu 613 Getting Assistance 616 Reporting Problems 616 Contacting Cabletron Systems 616 Administrative Console Commands Table 618 Manage Mode Commands Table 625 Cause Codes Table 629 NDEX CyberSWITCH...
SING THIS UIDE The User’s Guide is divided into the following parts: YSTEM VERVIEW We begin with an overview of bridging, routing, and specific CyberSWITCH features. Next, we provide an overview for both the system software and hardware. YSTEM NSTALLATION In this section of the User’s Guide we provide guidelines for ordering ISDN service in the US, and a step-by-step description of installing hardware and upgrading software.
This appendix provides information for getting assistance if you run into problems when installing your system. A FAX form is included. You can print this form, fill out the information requested, and FAX it to Cabletron Systems, using the provided FAX number. DMINISTRATION ONSOLE Provides a tabular listing of the system administration console commands and their uses.
All references to CyberSWITCH documentation titles will use the same font as normal text, but will be italicized. For example, all references to the User’s Guide will appear as: User’s Guide Configuring Off-node Server Information. Workgroup Remote Access Switch SING THIS UIDE Guide Conventions...
YSTEM VERVIEW We include the following chapters in the System Overview segment of the User’s Guide. • The CyberSWITCH Provides the “big picture” view of a CyberSWITCH network. We include an overview of unique system features, interoperability, security, interfaces, system components, remote devices, and switches supported.
With ISDN services, the costs of LAN interconnection are based on actual usage — the user gets the bandwidth of dedicated digital service at dial-up prices. Our products offer internetworking solutions for small businesses as well as large corporations. SWITCH N YBER ETWORK This particular CyberSWITCH model consists of an embedded communications platform.
Connection Filter, which determines if an IP packet requiring a WAN connection may con- tinue. • Packet Capture In order to monitor incoming LAN data, the CyberSWITCH packet capture feature will allow you to capture, display, save, and load bridged or routed data packets. YBER Unique System Features Workgroup Remote Access Switch SWITCH...
USER’S GUIDE • Protocol Discrimination It is possible for multiple types of remote devices to use the same line. The system can determine the device type and the protocol encapsulation used by remote devices. • RS232 Port: Dual Usage If your installation requires you to process PPP-Async data, this feature allows you to use the RS232 port for either console access or a serial data connection.
IPX routers use the Internetwork Packet Exchange (IPX) protocol, typical of the NetWare environment. AppleTalk routers route AppleTalk datagrams based on address information. They support the following protocols: RTMP, NBP, and ZIP. YBER Interoperability Overview Workgroup Remote Access Switch SWITCH...
USER’S GUIDE ECURITY VERVIEW The system provides several options for validating remote devices and for managing network security. The security options available are dependent on the remote device type, type of access, and the level of security required. Levels of security include no security, device level security, user level security, and multi-level security.
More detailed descriptions of system software and hardware are included in the next two chapters. The following section describes remote ISDN devices. Host 192.1.1.3 Router (or Host) ISDN Interface 192.1.1.1 RLAN Interface 100.1.1.1 WORKGROUP REMOTE ACCESS SWITCH B-CHANNELS E1 ONLY B9 B11 B13 B15 B17 B19 B21 B23 B25 B27 POWER SERVICE 10BASE-T...
USER’S GUIDE ISDN D EMOTE EVICES The CyberSWITCH provides a centralized concentrator function for remote ISDN devices. The devices can be separated into the following categories: • remote ISDN bridge devices • PC based terminal adapters • ISDN enabled workstations •...
NET3 NET5 NT DMS 100 NT DMS 250 NT SL-100 NI-1 TS013 TS014 1TR6 Switch support may vary from country to country. Use the following as a guideline: Country Australia Germany Japan United States International Basic Rate Primary Rate Switches supported...
ARDWARE VERVIEW The CyberSWITCH is an embedded communications platform. It uses a flash file system (instead of a hard disk) and a two-stage boot device to initialize the platform and download system software. System software is preconfigured to allow immediate connection via a Local Area Network (LAN) or Wide Area Network (WAN) with Telnet and/or TFTP access.
CAUTION FOR CONTINUED PROTECTION AGAINST RISK OF FIRE, REPLACE ONLY WITH SAME TYPE AND RATING OF FUSE. 10Base-T The NE Link 1000 B8 Workgroup Remote Access Switch ARDWARE VERVIEW System Platforms RODUCT # Connections two connections two connections four connections...
The unit’s ON/OFF switch is located in the upper right corner of the back panel. Directly below this switch are the AC power input and fuse box. Note that the unit requires a 250V, 5 x 20 mm time- lag fuse rated at 1.6 amps. The back panel also provides connectors for WAN and LAN access, as well an RS232 port for an administration console.
Page 39
1000 platform is at the end of the line, so these DIP switches must be ON to provide proper termination. In a Point-Multipoint connection, DIP switch settings are dependent upon the physical configuration of the line. If the 1000 platform is at the end of the line, the terminating resistors should be activated (DIP switches ON).
USER’S GUIDE Refer to the following figure, which illustrates a BRI Point-Multipoint configuration. 1 2 3 4 WORKGROUP REMOTE ACCESS SWITCH LINE POWER SERVICE 10BASE-T CH-1 CH-2 SYNC D-CH (Terminating resistor ON; end of the line) YSTEM HARACTERISTICS Physical Characteristics:...
Page 41
Meets or exceeds the following: Safety: EMI: UL 1950, CSA C22.2 No. 950, EN 60950, IEC 950, and 72/23/EEC FCC Part 15, EN 55022, CSA 108.8, EN 50082-1, VCCI V-3, and 89/336/EEC Workgroup Remote Access Switch ARDWARE VERVIEW System Platforms...
The following table summarizes the CSX1200 platform options. Model CSX1201 CSX1204 CSX1223 The platform shown below is the PRI version of the CSX1200 (the CSX1223). Note that all CSX1200’s back panels have two slots for future WORKGROUP REMOTE ACCESS SWITCH SLOT 1 CyberSWITCH...
The CSX1200 is based on the NE Link 1000 platform with two major additions. The NE Link 1000 is available only with a BRI interface, whereas the CSX1200 is available with either a BRI or a PRI interface. Also, unlike the NE Link 1000, the CSX1200 includes two slots for user installed add-on modules.
USER’S GUIDE Electrical Characteristics Voltage: Frequency: Fuse: Power: Note: Main circuit card fuse labeled F1 is rated at 0.5A 63V. This fuse protects the 12V AUI circuitry on the main board. This fuse is a factory serviceable item only. Regulatory Compliance Meets or exceeds the following: Safety: EMI:...
USER’S GUIDE WAN A CCESS Since the CyberSWITCH is a factory-customized product, there is no need to install specific adapter boards in order to access the WAN. Connections for the internal BRI interface are made at the sys- tem’s back panel. On the B2, a basic rate line will connect to the RJ-45 connector labeled 1. On the B4, up to two basic rate lines will connect to the ports labeled 1 and 2.
For informational purposes, the pin list for the console follows: Pin and Signal Assignment for the RS232 Connector(s) Signal Function Carrier Detect Receive Data Transmit Data Data Terminal Ready Ground Data Set Ready Request to Send Clear to Send Ring Indicator Workgroup Remote Access Switch ARDWARE VERVIEW System Platforms...
YSTEM ODULES CSX1200-E11-MOD The CSX1200-E11-MOD is an internal 11 port Ethernet hub option card for the CSX1200 family. The CSX1200-E11-MOD is available for both the BRI (CSX1201, CSX1204) and PRI (CSX1223) models. The CSX1223 is shown below. WORKGROUP REMOTE ACCESS SWITCH SLOT 1 The internal hub addition provides affordable LAN device connectivity.
Page 49
The hub is equipped with LANVIEW LEDs. These LEDs are comprised of three types: receive, link, and collision. Refer to the LED Indicators For installation instructions refer to the SLOT 2 10Base-T CONSOLE Connectivity chapter for further information. Hardware Installation chapter. Workgroup Remote Access Switch ARDWARE VERVIEW System Modules...
North America, since North American telephone companies typically do not provide the needed U-interface conversion. The CSX1200-U4-MOD performs the function of an external NT1, and is available for the BRI (1201, 1204) CSX1200 models. Below, we show the module installed in a CSX1223.
OFTWARE VERVIEW VERVIEW The CyberSWITCH software provides: • system software for the CyberSWITCH, LAN and WAN interfaces, and administration functions • system files containing configuration and operational information This chapter provides an overview for each of the above software categories. YSTEM SOFTWARE Included with each CyberSWITCH is a CD containing upgrade software and utility software.
USER’S GUIDE node.nei This configuration file contains node-specific information like resources, lines, CyberSWITCH operating mode and security options, along with the Throughput Monitor Configuration information. If enabled, SNMP configuration information is also in this file. lan.nei This file contains configuration information used when the bridge is enabled. This file also contains information for the Spanning Tree protocol used for the bridge.
This file contains the text of the administrator-defined welcome banner. It is displayed when a user initiates a network login. motd.nei This file contains the text for the administrator-defined message of the day. It is displayed when the user is validated after log-in. OFTWARE System Files Workgroup Remote Access Switch VERVIEW...
YSTEM NSTALLATION We include the following chapters in this segment of the User’s Guide: • Ordering ISDN Service Provides guidelines for ordering ISDN service in the United States. • Hardware Installation Step-by-step instructions for installing hardware components. • Accessing the CyberSWITCH Provides a description of the possible ways to access the CyberSWITCH (for diagnostic purposes, or for software upgrade).
When the phone company installs the line, they assign it certain characteristics. These are different depending on the type of ISDN switch to which the line is attached. AT&T’s 5ESS NI-1 and Northern Telecom’s DMS100 NI-1 are among the most popular.
If the AT&T 5ESS switch type is available, the ISDN services available will be one of the following: • NI-1 • Custom Point-to-Point If Northern Telecom DMS-100 switch type is available, the ISDN services available will be one of the following: •...
USER’S GUIDE AT&T 5ESS NI-1 S ERVICE Note that some of the elements below are set per directory number. With NI-1 Service, you will typically have two directory numbers. Provisioning Element CyberSWITCH AT&T # 5ESS NI-1 Service Setting Term Type CSV ACO unrestricted CSV limit...
Provisioning Element Ordering BRI ISDN Lines using Provisioning Settings OINT ERVICE AT&T Custom Point-to-Point Service Setting Term Type CA quantity CSV CHL CSV limit CSD CHL CSD limit DSL CLS Workgroup Remote Access Switch ISDN S (US O RDERING ERVICE...
USER’S GUIDE ROVISION ETTINGS FOR ORTHERN The ISDN services supported by Northern Telecom DMS-100 switches are as follows (in order of preference of usage): NI-1 Custom Service The sections below provide the settings for each DMS-100 service type. Note that your service provider may not be able to offer all of the features listed.
Ordering BRI ISDN Lines using Provisioning Settings ERVICE Setting functional dynamic 3 is preferable 1-64 is acceptable EKTS ISDNKSET functional PRI ISDN L INES Workgroup Remote Access Switch ISDN S (US O RDERING ERVICE...
Page 62
When the phone company installs the line, they assign it certain characteristics (sometimes called translations). These are different depending on the type of ISDN switch to which the line is attached. The customer must know what type of switch is being used.
ARDWARE NSTALLATION NSTALLATION EQUIREMENTS Before you begin the installation process, be sure to: • Choose a suitable setup location Make sure the location is dry, ventilated, dust free, static free, and free from corrosive chemicals • Verify system power requirements The appropriate standard power cord is supplied with the system.
E11 and observe all antistatic precautions during this procedure. Failure to do so could result in damage to the CSX1200, E11, or both. The E11 can be installed in either of the two slots at the top, rear of the CSX1200 chassis. To install the E11: Power down the CSX1200.
U4 and observe all antistatic precautions during this procedure. Failure to do so could result in damage to the CSX1200, U4, or both. The U4 can be installed in either of the two slots at the top, rear of the CSX1200 chassis. To install the U4: Power down the CSX1200.
Note that the module consists of four pairs of numbered RJ45 ports; you must properly connect the CSX1200 BRI ports to the corresponding U4 S/T interface ports of each pair on the module. We provide four 6-inch, category 5, twisted-pair cables (with RJ45 connectors) for this purpose: Using the twisted-pair cables, connect BRI port 1 to the S/T interface port labelled number 1, BRI port 2 to S/T interface port number 2, and so on.
X-Modem communications capability (required for software upgrade only) • has ASCII transfer capability (required for SSB recovery) Any computer or terminal that meets these requirements and connects to the administration port on the system can operate as an administration console. SWITCH YBER...
USER’S GUIDE Using the provided RS232 null modem cable, attach an administration console to the system. The administration port is a 9-pin, male RS232 serial adapter as shown below: BRI (Termination switches behind plate; see diagram Connect one end of a null modem cable to the console port on the CyberSWITCH, and the other end to the communication port on the PC.
Refer to information for the COMMPORT COMMPORT Resource to change defaults. ELNET Session. Remote Management ODEM for additional information. Refer to Workgroup Remote Access Switch SWITCH CCESSING THE YBER Making Connections chapter. Resources and the background Configuring Changes for a...
USER’S GUIDE STABLISHING AN DMINISTRATION If a login prompt is displayed after the power-on initialization, the system software was preinstalled. Complete the login: The login controls which class of commands the user can access. Each access level (guest or administrator) is protected by a unique login password. This allows managers to assign different responsibility levels to their system users.
Page 71
RS232 port connected to the system. Turn on the system by pressing the POWER-ON switch located on the back of the machine. The power light emitting diode (LED) on the front panel confirms the power supply is functioning properly.
REL_NOTE.TXT | more For example, if your CD-ROM is designated as drive D, the platform you are installing is a CSX1200, you are using US ISDN standards, and have purchased the IPX option, you would use the following path: D:\CSX1200\US\IPX> type REL_NOTE.TXT | more The release notes located on the system’s FLASH file system are also in a file called...
To perform a remote upgrade refer to the section titled grade is performed over the network using Telnet and TFTP). For countries other than Japan, upgrade files are located on the CSX1200 CD. Refer to the immedi- ately following section for CD file structure information.
Page 74
IP/IPX software option, use the files found in the \CSX1223\US\ipipx di- rectory. • If you are installing a CSX1204 using a NET3 international switch, and have purchased the IP, IPX, AppleTalk and Frame Relay options, use the files found in the \CSX1204\intnet3\ipipx- at.fr directory.
If you choose to install this CD information onto your hard drive, it will be placed under the following base directory: ([drive]:\Program Files\Cabletron Systems, Inc.\) Note that these files will be specific to the configuration options you choose during installation.
To remotely upgrade the system, you are required to have a PC/workstation that is connected to the system’s network. It must have the following features: • ability to read CDs • TELNET client • TFTP client (OSW) OFTWARE autobaud Workgroup Remote Access Switch PGRADING YSTEM OFTWARE Upgrading Software boot device command to...
USER’S GUIDE To perform a remote upgrade, first upgrade to the latest SSB, if required, then upgrade the OSW. The Release Notes will indicate whether or not the SSB needs to be upgraded. Note: If, during a remote upgrade, the compressed file set cannot be uncompressed into the Flash File System due to a lack of space, the compressed file set will not be deleted from the Flash File System and the previous version of the OSW will be booted.
Make sure that the recover file that you are using is correct. Delete, Recover, and reTFTP if necessary. Hardware failure in the boot device. Contact your distributor immediately for a replacement. The SSB has been successfully updated. (OSW) OFTWARE Workgroup Remote Access Switch PGRADING YSTEM OFTWARE Upgrading Software...
USER’S GUIDE If you experience a problem transferring the file with TFTP, wait about three minutes for the TFTP to fail, delete the incomplete file, and try again. Using Telnet, reboot the system by issuing the command: restart It should take approximately 3 minutes for the system to restart and install the upgrade. Login via Telnet and type the ver command to confirm that the system software upgraded correctly.
ETURN ONFIGURATION TO The default configuration files are located on the CSX1200 CD. If you wish to return to the default configuration, download the DEFLTCFG.OSW file. Follow the same steps for Local or Remote Upgrade except download the file DEFLTCFG.OSW instead of the UPGRADE.OSW file.
ASIC ONFIGURATION We define basic configuration as the configuration needed by most users. Basic configuration will get your system up and running. Note that not all configuration steps in this part are required. For example, if you are only using bridging, you will have no need to complete the configuration steps included in Configuring Basic IP Routing.
ONFIGURATION VERVIEW We provide the following configuration tools to set up and/or alter your configuration: • CFGEDIT, the configuration utility • Manage Mode, the dynamic management utility Your CyberSWITCH is shipped with a configuration files provide basic functions which will allow you to perform initial installation tests with no additional configuration.
USER’S GUIDE As long as there is no other “change” session active (CFGEDIT or Manage Mode), access is granted, and the following menu is displayed: Main Menu: 1) Physical Resources 2) Options 3) Security 4) Save Changes Select function from above or <RET> to exit: From this screen you will begin the configuration process.
Dynamic Management command since the last commit was performed. To return to the normal operating mode after you have committed your changes, issue the following command: MANAGE> exit OMMANDS HANGES Workgroup Remote Access Switch ONFIGURATION OOLS Dynamic Management...
USER2 configured as PPP device (USER2 as secret) IP address 002.002.002.003 • Single BRI line and resource configured on country-specific basis (for BRI platforms): JAPAN: Point-Multipoint Automatic TEI Switch type: NTT INS EUROPE: Point-Multipoint Automatic TEI Switch type: NET3 (default country code: Norway) U.S.:...
A brief outline of the configuration procedure using Manage Mode (if applicable). A definition of each configuration element. Background feature information providing a more detailed explanation of the feature. HAPTERS of the configuration utility CFGEDIT. Workgroup Remote Access Switch ONFIGURATION OOLS Using the Configuration Chapters...
Physical Resources may or may not be configurable, depending upon the country of operation. The WAN resource, Ethernet resource and Serial resource (COMMPORT) are preinstalled and preconfigured on all systems. However, switch type selection is country-dependent. Refer to the country or switch type descriptions below.
Page 89
For all others (International configurations other than Japan, US, 1TR6, TS013 and TS014 users): The default switch type is NET3 (or NET5 for primary rate). You must specify the region and then country in which the switch is to operate. Select Resources to display the following:...
For the NET3 and NET5 switchtypes. The country in which the system is operating. ENERIC UMBER For PRI_4ESS primary rate switch type only. The software load (generic # ) the switch is running. YNCHRONIZATION For Primary adapters only. Every framed transmission line requires a clock source from which it must derive the appropriate bit timing and channel timing relative to the start of a frame.
Page 91
The T1-E1-PRI can be used for any T1, E1, or PRI resource, and directly terminates a standard USOC RJ45 connector. It is supplied with a standard S/T interface and supports one port. It also provides support for the following switch types: •...
Will this Data Link support X.25 communications (Y/N)? [default N] If the line uses a NI-1 or a DMS-100 switch type, you must also enter the following: SPID(s) - supplied by your carrier b. Directory Number(s) associated with the SPID(s) - supplied by your carrier Number of digits to verify.
You must delete the data link for a Robbed Bit line. SING ANAGE OMMANDS line Displays the current line configuration. datalink Display the current data link configuration. ESOURCE PRI/T1 lines B8ZS Common_Channel Workgroup Remote Access Switch ONFIGURING ESOURCES AND INES Lines E1 line Multiframe CRC...
USER’S GUIDE datalink add Allows you to add a data link. The following sample screen shows how a data link is added. Current LINE Configuration: LINE NAME -------------------------------------------------------------------------------- LINE.BASICRATE1 LINE.BASICRATE2 DMS100.LINE1 Select line id for new data link or press <RET> to cancel: 3<RET> Automatic TEI negotiation (Y or N) [default = Y]? N<RET>...
Page 95
All switch types, except the DMS100 and the NI-1, require a single data link per line. The NI-1 switch type can have either one or two data links per line. The DMS100s generally require two data links per line, one for each B channel. For both NI-1 and DMS100 switch types, contact your Service Provider for the number of data links required.
ERVICE ROFILE For basic rate lines only. SPIDs are only required for DMS100 and NI-1 switch types. A SPID is a number that identifies ISDN equipment attached to your ISDN line. Depending on the type of ISDN service you have, you may have one, 2, or no SPIDs. When ordering your ISDN service, your service provider should supply you with SPID information.
If you are using an external CSU, you will specify a value under Short Haul Build Out. Specify the length of the line, in meters, from CPE to the CSU by selecting a range from zero to 210 meters. ONFIGURING ESOURCES AND Workgroup Remote Access Switch INES Lines...
For example, if the distance to the Telco switch is great (6000 foot maximum), or the line is old, you may need a decibel value of 0.0 (meaning no attenuation). If the distance is much closer (for example, 1000 ft.), the decibel value may be -15.0 (i.e., the signal is strong enough that it needs a certain amount of...
A subaddress may be configured for a point-multipoint line. This element is a call screening method. A subaddress is only needed if you have a line interface type of point-multipoint, and you choose the subaddress call screening method. LEMENTS NFORMATION Workgroup Remote Access Switch ONFIGURING ESOURCES AND INES Subaddresses...
ONFIGURING ASIC VERVIEW This chapter provides information for configuring basic bridging features. Basic bridging configuration includes: • enabling/disabling bridging A separate chapter, Configuring Advanced bridging features. Advanced bridging features include: • bridge dial out • Spanning Tree Protocol • mode of operation •...
If the bridge and the IP options are both enabled, the system will act as a “brouter.” A brouter operates as a router for protocols it can route, and operates as a bridge for protocols it cannot route. NFORMATION Workgroup Remote Access Switch ONFIGURING ASIC RIDGING...
ONFIGURING ASIC VERVIEW This chapter provides information for configuring basic IP routing features. Basic IP routing configuration includes: • enabling/disabling the Internet Protocol (IP) When you enable this option, the system operates as an IP Router. If you also enable bridging, it will route IP packets and bridge all other packet types.
SING Select IP Operating Mode from the IP configuration menu. Select either the IP router or IP host operating mode. If you select IP router, the following menu is displayed: LEMENTS Workgroup Remote Access Switch IP R ONFIGURING ASIC OUTING...
USER’S GUIDE IP Configuration Menu: IP Routing (Enable/Disable) IP Operating Mode IP Interfaces Static Routes RIP (Enable/Disable) IP Static ARP Table Entries Isolated Mode (Enable/Disable) Static Route Lookup via RADIUS (Enable/Disable) IP Address Pool 10) IP Filter Information 11) DHCP Select function from above or <RET>...
If IP RIP is enabled, enter the following additional information: IP RIP send control k. IP RIP respond control IP RIP receive control m. IP RIP v2 authentication control IP R ONFIGURING ASIC IP Network Interfaces Workgroup Remote Access Switch OUTING...
Page 106
USER’S GUIDE n. IP RIP v2 authentication key (required only if the IP RIP v2 authentication control has been configured with a value other than “No Authentication” Note: With the Secondary IP Addressing feature, you may add more than one LAN network interface.
The IP address (using dotted decimal notation) assigned to this interface. The IP address applies to LAN type interfaces and WAN type interfaces only. Each LAN interface must be configured with a unique IP address. LEMENTS Workgroup Remote Access Switch IP R ONFIGURING ASIC...
USER’S GUIDE UBNET The Subnet Mask value (the number of significant bits for the subnet mask) associated with the IP address specified for this interface. The Subnet mask is specified by entering the number of contiguous bits that are set for the mask. The mask bits start at the most significant bit of the IP address field and proceed to the least significant bit.
Page 109
RIP information. You may also configure a set of RIP parameters for each RLAN or numbered WAN interface. IP R ONFIGURING ASIC IP Network Interfaces for the primary interface on a LAN port. Workgroup Remote Access Switch OUTING...
Page 110
Send Control Options Do Not Send* IP RIP v1** IP RIP v1 Compatible IP RIP v2 (*) The default switch for WAN RLAN interface. (**) The default switch for LAN interfaces. For numbered WAN interfaces: Send Control Options Do Not Send*...
Page 111
This switch indicates responding only to IP RIP requests compliant with RFC 1058. IP RIP v2 Only This switch indicates responding only to IP RIP v2 requests compliant with RFC 1723. IP RIP v1 or IP RIP v2 * This switch indicates responding with the same IP RIP version format as the version of the request.
The following table provides the possible choices for IP RIP v2 authentication control Type No Authentication * Simple Password * This is the default switch. IP RIP UTHENTICATION If IP RIP is enabled for a specific interface, this key is required if the following condition has been met: the “IP RIP v2 Authentication Control”...
Page 113
LAN IP network interfaces on the same LAN port. Refer to Network Flattening for more information. ONFIGURING IP RIP and the IP Network Associated Remote Device IP Host (RFC1294) IP Host (RFC1294) HDLC Bridge Workgroup Remote Access Switch IP R ASIC OUTING IP Network Interfaces Interfaces.
Page 114
USER’S GUIDE The WAN IP Network Interface is used to define remote IP devices (hosts or routers) that require access to the central network. This network interface represents a different subnet than that connected to a LAN network interface. The WAN IP Network Interface is used for both IP Host and PPP remote devices.
B22 B24 B26 B28 192.2.2.1 ISDN 192.2.2.3 198.1.2.3 Subnet 198.1.2.0 (Uses WAN Interface) for multiple LAN IP addresses). Workgroup Remote Access Switch IP R ONFIGURING ASIC OUTING IP Network Interfaces Interfaces: LAN Interface 128.1.1.1 WAN Direct Host Interface WAN Interface 192.2.2.1...
Page 116
Thus it makes a simple bridge device appear to be an IP router. This is accomplished by having the system extend its Ethernet to handle the ARPs for the remote bridge. CyberSWITCH File Server Subnet 128.1.1.0 128.1.1.3 CSX1200 B-CHANNELS E1 ONLY POWER SERVICE 10BASE - T B13 B15 B17 B19...
B17 B19 B21 B23 B25 B27 B29 B31 SERVICE 10BASE - T B10 B12 B14 B16 B18 B20 B22 B24 B26 B28 Network 3 Elements. Workgroup Remote Access Switch IP R ONFIGURING ASIC OUTING IP Network Interfaces (1.0.0.0) (2.0.0.0) (3.0.0.0)
Page 118
Example 2. It is better for SITE1 and SITE2 to advertise the IP RIP information for each of the remote devices on the logical network on each IP Host device as it connects to the system. CyberSWITCH (1.0.0.0) (2.0.0.0) i/f 1 2.0.0.2 CSX1200 POWER POWER SERVICE 10BASE - T Service 10BASE - T i/f 2 3.0.0.2...
Page 119
B10 B12 B14 B16 B18 B20 i/f 2 3.0.0.2 CSX1200 3.0.0.11 WAN RIP Interfaces: Example 2 For the WAN interface to function properly with IP RIP, additional WAN interface information is configured. The additional information required involves selecting one of the following: disabling host routes propagation (needed for Example 1), or enabling host routes propagation (needed for Example 2).
WAN IP Interface to Router 2 (R2). Therefore, SITE1 would know about Networks 1 and 2, but would not learn anything about Network 3. In this situation, a static route would have to be configured on the CyberSWITCH. For information on the configuration of static routes, refer to Static Routes. CSX1200 IP RIP OVER EDICATED ONNECTIONS IP RIP is supported over LAN, Remote LAN, and numbered WAN interfaces.
Page 121
CSX1200 B-CHANNELS POWER SERVICE 10BASE - T B10 B12 1.1.1.2 1.1.1.1 In the previous graphic, the WAN network interface 1.1.1.1 on SITE1 is used to connect to a dedicated line and an ISDN line. You need to specify to which remote device, either SITE2 or SITE3, SITE1 should exchange RIP packets.
USER’S GUIDE IP H PERATING ODE AND THE Only one network interface can be configured when the IP operating mode is host. The network interface configuration is not much different from the others available in router mode except that the following configuration items will not be asked: •...
Page 123
B17 B19 B21 B23 B25 B27 B29 B31 SERVICE 10BASE - T B10 B12 B14 B16 B18 B20 B22 B24 B26 B28 CSX1200 ISDN Workgroup Remote Access Switch IP R ONFIGURING ASIC OUTING IP Network Interfaces 3.3.3.3 Host D 1.1.1.3...
1.x.x.x. The CyberSWITCH generates an ARP response, containing its own MAC address. Host B then communicates with Host C by sending packets to the Cyber- SWITCH. The CyberSWITCH forwards the packets over the WAN to Host C. TATIC...
Page 125
LAN interface or one of the CyberSWITCH IP sites. If next hop is one of the system’s IP sites, the IP address for that site should be used. ETRIC ALUE Hop count to the destination network or the host. Workgroup Remote Access Switch IP R ONFIGURING ASIC OUTING...
USER’S GUIDE IP RIP P ROPAGATION The IP RIP propagation control determines how a static route is propagated via IP RIP. The following table provides an explanation of how a IP RIP propagation control flag is assigned to a static route. Flag Propagate Always Propagate only...
Page 127
Do Not Propagate This flag indicates that the static route information is not propagated over the interface. This flag is available only when the next hop is over a WAN interface. IP R ONFIGURING ASIC Static Routes Workgroup Remote Access Switch OUTING...
Line POWER Service 10BASE - T CH-1 CH-2 CH-1 CH-2 CH-1 CH-2 CH-1 CH-2 SYNC D-CHAN SYNC D-CHAN SYNC D-CHAN SYNC D-CHAN CSX1200 128.1.1.1 LAN Interface 128.1.1.2 Router 131.1.0.0 156.1.0.0 Router 192.1.1.2 Static Route IP Address 156.1.0.0 Next Hop 192.1.1.2...
LAN connections, you may want to assign a low metric to this route so that a route is taken that is local, thus, no toll charges. Or, perhaps there is a route with a low number of hops, but the Routes). LEMENTS Workgroup Remote Access Switch IP R ONFIGURING ASIC...
USER’S GUIDE connection is over a WAN. You may want to assign this route a high number of hops to limit toll charges, in case there is a local route that could be used. IP RIP P ROPAGATION ONTROL This controls how a default route is propagated via IP RIP. The following table provides an explanation of how a IP RIP propagation control flag can be assigned to a default route.
WAN links, such as dedicated or semi-permanent dial-up. For a more detailed explanation, refer to ONFIGURING Routing Information Protocol (RIP) Option Elements. IP RIP and the IP Network Interfaces. Workgroup Remote Access Switch IP R ASIC OUTING...
ECURITY The CyberSWITCH provides a great variety of security options. These options include device level security, user level security, a combination of the two, or if preferred, no security. There are different ways to authenticate, as well as different locations (both local and remote) to store security information.
ECURITY VERVIEW VERVIEW Security is an important issue to consider when you are setting up a network. The CyberSWITCH provides several security options, and this chapter describes the “Big Picture” of how these options work and interoperate. This information will better equip you to proceed with the following phases of security configuration: configuring the level of security configuring system options and information...
USER’S GUIDE Multilevel security provides both user level security and device level security for local (on-node) database, Radius, and SFVRA. This provides added protection; first, a device will be authenticated, and then a particular user (on the device) will be authenticated. The feature also allows the configuration of an on-node device database at the same time as an off- node device database.
You may also specify the number of login attempts and password change attempts. Specific login elements, such as prompt order, for RADIUS and TACACS are defined here. ECURITY User Level Databases Workgroup Remote Access Switch VERVIEW...
ONFIGURING ECURITY VERVIEW The CyberSWITCH offers the following levels of network security: no security, device level security, user level security, or device and user level security. The network security level determines the type of security you want activated on your network. As the name implies, no security is used if you configure your network security level as “no security.”...
Page 137
POWER SERVICE 10BASE - T B13 B15 B17 B19 B21 B23 B25 B27 B29 B31 B10 B12 B14 B16 B18 B20 B22 B24 B26 B28 ISDN ISDN Router User Level Administration Security Sessions Workgroup Remote Access Switch ECURITY EVEL Overview...
USER’S GUIDE ECURITY ONFIGURING ECURITY CFGEDIT SING To begin the configuration of an on-node database or any of the Security Database options, start at the main menu and progress through the screens as shown below: Main Menu: 1) Physical Resources 2) Options 3) Security 4) Save Changes...
Device Type IP Host IP Host HDLC Bridge Security Options CLID, CHAP, PAP CLID, MAC Address Security CLID, IP Host ID Configuring Basic IP Routing Options Workgroup Remote Access Switch ONFIGURING ECURITY EVEL Device Level Security configuration section. Security Required? optional...
USER’S GUIDE VERVIEW OF EVICE UTHENTICATION When a remote device connects, the CyberSWITCH negotiates the required authentication. It then collects the information which is used to identify and authenticate the remote device. The system compares this collected information against information maintained in a device database. If the information collected from the remote device matches the information found in the database, the connection is valid and the device is allowed access to network resources.
The following picture shows the relationship between the security server, an end user, and the computer that prompts for the input. The security clients and the security server communicate with each other using some special protocol, such as TACACS. OKEN Workgroup Remote Access Switch ONFIGURING ECURITY EVEL...
USER’S GUIDE YSTEM EQUIREMENTS When providing user level security for the CyberSWITCH, you must establish Remote User-to- LAN Connectivity (like terminal servers). You may not establish LAN-to-LAN Connectivity as routers usually do. There are two different ways of establishing Remote User-to-LAN Connectivity: •...
Refer to the section below that summarizes the login procedure required for the type of server you are using. RADIUS: does not use security token card Enter login Id. Enter password. EVEL ECURITY Workgroup Remote Access Switch ONFIGURING ECURITY EVEL User Level Security...
USER’S GUIDE TACACS: with PINPAD SecureID Card Enter login Id (remote machine). Enter password onto SecurID card, which generates a dynamic password. Enter dynamic password onto remote machine’s password prompt. Press <RET> key when prompted for dynamic password. with non-PINPAD SecureID Card Enter login Id (remote machine).
For example, Scally is using the PC on the LAN attached to Sparky, a CSX1200. Scally needs to download some files off of the Service Server, which is on the LAN connecting to Zoe, a CSX1200.
ONFIGURING YSTEM VERVIEW System options include security options for remote devices. The security required for the authentication of each device will depend on the information you have entered for that device. System information includes a system name, system password, and a system secret. These values are required only if there are remote devices on the network that require this information for system validation.
If, for some reason, you wish to disable an option, select the Id of the option and press <RET>. The CSX1200, CSX1000, and CSX150 no longer connect to devices which use the RFC 1294 protocol to define their datalink headers. For these particular products only, disregard (i.e., do not select) the IP Host (RFC 1294) Link option on the System Options...
Page 148
USER’S GUIDE Authentication Authentication Note: If a system is brought on line with a device that has a required Calling Line Id that is a duplicate of another device’s Calling Line Id, and no other type of authentication is used, a warning message is logged at initialization.
The possible security options that can be enabled include: • Calling Line Id • IP Host Id • Bridge Ethernet Address • • CHAP ONFIGURING NFORMATION Workgroup Remote Access Switch YSTEM PTIONS AND NFORMATION System Options...
USER’S GUIDE The following table summarizes the identifying and authenticating information used by each remote device type to connect to the system: Device Type HDLC Bridge (MAC Layer Bridge) IP Host (with RFC 1294 encapsulation) YSTEM NFORMATION ONFIGURING YSTEM NFORMATION CFGEDIT SING Select option (2), System Information from the System Options and Information menu.
3) RADIUS 4) TACACS 5) ACE Current Database Location is "On-node". Select function from above or <RET> for previous menu: ONFIGURING NFORMATION ESSIONS is On-node is DISABLED is 3 is 23 Workgroup Remote Access Switch YSTEM PTIONS AND NFORMATION Administrative Session...
USER’S GUIDE You may specify an authentication database location for administrative sessions that is different from the user authentication database location. Note: If you select RADIUS, TACACS, or ACE, you must be sure that the selected server is active before you initiate an administrative session. From the Administrative Session menu select (2) Session Inactivity Timeout.
23. However, if you choose to use a different port number, you may adjust this value through CFGEDIT. The Client must be aware of the port number you have configured. ONFIGURING UMBER TCP P UMBER NFORMATION ACKGROUND NFORMATION NFORMATION ESSIONS ACKGROUND NFORMATION ACKGROUND NFORMATION Workgroup Remote Access Switch YSTEM PTIONS AND NFORMATION Administrative Session...
USER’S GUIDE MERGENCY ELNET ERVER There are some Telnet client programs that do not clear Telnet connections when terminating Telnet sessions. Since they do not clear the Telnet connections, those connections stay alive and soon all Telnet sessions are used up. Once this happens, no more Telnet sessions can be established until the inactivity timer of one of the sessions expires.
ONFIGURING EVICE VERVIEW Device level security is an authentication process between internetworking devices, in which authentication takes place automatically. Both bridges and routers support this form of security.Device level security is available to the network locally through the On-node Device Database or remotely through the VRA Manager or RADIUS Server.
USER’S GUIDE Device Level Databases Menu: 1) On-node Device Database (Enable/Disable) 2) On-node Device Entries 3) Off-node Device Location Select function from above or <RET> for previous menu: 1 Select option (1) On-node Device Database from the Device level Databases menu. The following screen will be displayed.
H0 Call Support can be enabled for devices who need more bandwidth to accomplish large file transfers or video conferencing. ONFIGURING "PPP (Point to Point Protocol)" "64000 bps" "64000 bps" "128000 bps" "" "Default_Profile" DISABLED Workgroup Remote Access Switch EVICE EVEL ATABASES On-node Device Entries...
Page 158
USER’S GUIDE For Frame Relay devices: Note: You must first configure the Frame Relay Access. Instructions for configuring the access is found in the chapter. Begin by selecting Frame Relay from the Device Table Menu. A screen similar to the following is displayed: Device Frame Relay Menu: (Device = "DAN") 1) PVC Information...
CHAP secret. Or, for an HDLC device, enter a Bridge Ethernet Address. ONFIGURING [default 2]: 1 [default 2]: 2 "" "" ENABLED DISABLED "" "" "" "" for details). For example, for a PPP device, Workgroup Remote Access Switch EVICE EVEL ATABASES On-node Device Entries...
Page 160
Note: The CSX1200, CSX1000, and CSX150 no longer connect to devices which use the RFC 1294 protocol to define their datalink headers. For these particular products only, disregard (i.e., do not select) the IP Host (RFC 1294) menu option on the Device Authentication Menu.
Page 161
Remote LAN port, enable bridging. If you want dial out capabilities to this device, enable Make calls for Bridge data. ONFIGURING Configuration Elements for more information. DISABLED None DISABLED None for more information. NONE ENABLED NONE NONE Workgroup Remote Access Switch EVICE EVEL ATABASES On-node Device Entries...
Page 162
USER’S GUIDE For IP Remote LAN networks, you must explicitly configure the IP (Sub)Network number. For IPX Remote LAN networks, you may configure the IPX external network number, or you may leave the value at NONE. The IPX Spoofing Options for IPX Remote LAN devices are not available at this time.
IP Host (RFC 1294) RFC 1294 provides a simple security exchange at connection time, along with an encapsulation method for IP datagrams. RFC 1294 devices are not interoperable with the CSX1200, CSX1000, and CSX150 products. Only used for Dial-Out. This value represents the throughput on a B-channel or pre-ISDN link connecting the CyberSWITCH to a device.
USER’S GUIDE calls. The system will not accept or make a call when the added bandwidth will exceed the configured maximum. The value is configured as a number from 2,400 bps to 3,072,000 bps. You may configure any value in this range. For example, if you have configured the base data rate at 64,000 bps, and the maximum data rate at 512,000 bps, the system would use a maximum of eight calls (connections) running in parallel to open up bandwidth (512,000 / 64,000 = 8).
CHAP Secret for validation. If the calculation’s results do not match the expected results, the connection is terminated. LEMENTS LEMENTS Workgroup Remote Access Switch ONFIGURING EVICE EVEL ATABASES...
Page 166
USER’S GUIDE UTBOUND UTHENTICATION This parameter allows you to enable or disable PPP outbound authentication procedures. When PPP outbound authentication is enabled, PPP (CHAP or PAP) authentication is required at both ends of the connection. When PPP outbound authentication is disabled, the CyberSWITCH does not authenticate the remote device when dialing out.
ROUTING PROTOCOL Indicates the protocol the remote device will be using to communicate with the CSX system: • none • RIP/SAP • triggered RIP/SAP LEMENTS IP D ALLS FOR LEMENTS Workgroup Remote Access Switch ONFIGURING EVICE EVEL ATABASES On-node Device Entries...
USER’S GUIDE WAN P Specifies an active WAN peer (receives and sends information at all times) or a passive WAN peer (receives/sends information only when a connection is up). In order for an active peer type to work properly, the Make Calls field must also be enabled. POOFING PTIONS Spoofing allows you to prohibit excessive ISDN connections by internally generating a desired...
If this parameter remains none, the CyberSWITCH will assume an association with the first configured AppleTalk Remote LAN port. LEMENTS refer to page 222. UMBER Workgroup Remote Access Switch ONFIGURING EVICE EVEL ATABASES On-node Device Entries refer to page 235.
USER’S GUIDE OMPRESSION ONFIGURATION LEMENTS EVICE OMPRESSION TATUS Allows you to enable or disable compression for the individual device. If this option is enabled, then the CyberSWITCH will negotiate compression with this device. Otherwise, the system will not negotiate compression with this device, leaving the compression resources available for other devices.
Page 171
Optional per Requested device entry Conditionally Optional per Required* Required* device entry (if entry specifies an Ethernet Address) Workgroup Remote Access Switch ONFIGURING EVICE EVEL ATABASES On-node Device Entries Bridge Password Not Requested Optional per device entry Optional per device entry...
Page 172
USER’S GUIDE IP Routing with IP Host Devices (RFC1294) To allow an IP Host device to connect to the CyberSWITCH, you must have IP Routing and IP Host Security enabled. For each IP Host device using this type of connection, you may need to enter the device’s IP address, IP Host Id, and Calling Line Id.
Page 173
Calling Line Id Security Enabled Not Requested Enabled Optional per device entry Disabled Required for information regarding the System Secret. If Outbound Workgroup Remote Access Switch ONFIGURING EVICE EVEL ATABASES On-node Device Entries Data PAP Password or CHAP Secret Required...
USER’S GUIDE The following table identifies the configuration requirements for possible security options for IP Routing with PPP Bridge Devices. Security Mode Configuration Calling Line Id PAP or CHAP Security Disabled Enabled Enabled Enabled Enabled Disabled Note: If CHAP Security is enabled, and Outbound Authentication has not been disabled, a CHAP Secret must be entered for both the remote device and for the CyberSWITCH.
The system will not attempt to continue searching the remaining database entries or additional off-node database for the correct peer. OCATION ONFIGURATION Configuring Call Control OCATION ACKGROUND NFORMATION Workgroup Remote Access Switch ONFIGURING EVICE EVEL ATABASES Off-node Device Database Location LEMENTS chapter of this...
Select function from above or <RET> for previous menu: Select the option you wish to configure and press <RET>. This prompt acts like a toggle switch. If you select a server that is currently enabled, the system will prompt you to disable it. If you select a server that is currently disabled, follow the onscreen instructions to enable the server, including entering the Telnet port number for the server.
If the user’s information matches what is configured in the database, then the connection is allowed. User Level Authentication Database Location ATABASE OCATION ONFIGURATION UMBER ATABASE OCATION ACKGROUND Workgroup Remote Access Switch ONFIGURING EVEL ATABASES LEMENTS NFORMATION...
ONFIGURING VERVIEW You can configure both local device entries and remote authentication databases for device authentication. When a device needs to be authenticated, the CyberSWITCH will first look the device up locally, and, if there is no device entry, will then check the remote database for device authentication.
Enter the TCP port number used by the VRA Manager. SING ANAGE OMMANDS Displays the current VRA Manager configuration data. vra change Allows you to change the VRA Manager TCP port number. ONFIGURING ERVER UTHENTICATION ERVER is 2000 Workgroup Remote Access Switch NODE ERVER NFORMATION VRA Manager Authentication Server...
RADIUS Server. The static routes then do not need to be duplicated on all of the Cabletron systems. This is done by enabling the “IP Routes via RADIUS” feature available under CFGEDIT’s IP Information Menu, and including a Framed Route attribute for each system’s RADIUS device entry.
Page 181
ONFIGURING NODE RADIUS Authentication Server VRA Manager Authentication Server is 128.111.011.001 is "SHAREDSECRET1234" is 5800 is Not Configured is 5 is 2 seconds Workgroup Remote Access Switch ERVER NFORMATION...
USER’S GUIDE RADIUS A UTHENTICATION IP A DDRESS The IP address in dotted decimal notation for the RADIUS Server. This information is required for the Primary RADIUS Server, and also required if a Secondary RADIUS Server is configured. If a Secondary RADIUS Server is configured, it must have a different IP address than the Primary RADIUS Server.
UDP port number used by the Authentication Server ONFIGURING describes the device authentication ERVER ERVER is 001.002.003.004 is 49 is 001.002.003.008 is 49 is 3 is 1 second is (ID CODE,PIN) Workgroup Remote Access Switch NODE ERVER NFORMATION TACACS Authentication Server VRA Manager Authentication Server...
USER’S GUIDE Optional: configure a secondary TACACS Server with selection (2). In the event that the primary server does not respond to system requests, the secondary server will be queried for device authentication information. The address and port number of the Secondary Server must not be the same as the Primary Server.
ONFIGURING ERVER ERVER is Not Configured is Not Configured is 3 is 1 second is Not Configured Workgroup Remote Access Switch NODE ERVER NFORMATION ACE Authentication Server VRA Manager Authentication Server...
USER’S GUIDE Select Miscellaneous Information to finish the configuration. Specify the number of access request retries that the system will send to the Authentication Server. b. Specify the time between retries. Choose between the DES or SDI Encryption Method. The algorithm you select must be compatible with the ACE Server setup.
The ACE Server software is installed on a UNIX-based system connected to the network. The client protocols allow the CyberSWITCH to communicate with the ACE Server, ultimately authenticating users. ONFIGURING ETRIES ETRIES ACKGROUND NFORMATION Workgroup Remote Access Switch NODE ERVER NFORMATION ACE Authentication Server...
ONFIGURING ETWORK VERVIEW The CyberSWITCH offers a number of configurable options to control the login process for this system and for off-node authentication servers. These options include: • general network login configuration • network login banners • login configuration specific to RADIUS •...
When using DHCP to provide temporary IP addresses to remote clients, it is important to enable BOOTP before Authentication if user authentication is used. ONFIGURATION ACKGROUND Workgroup Remote Access Switch ONFIGURING ETWORK OGIN NFORMATION...
USER’S GUIDE ETWORK OGIN ANNERS ONFIGURING ETWORK OGIN CFGEDIT SING Select option (2), Network Login Banners from the Network Login Information menu. If you need guidance to find this menu, refer to the instructions provided in the Configuration configuration section. The following screen will be displayed: Device Network Login Banner Menu: The file "\CONFIG\Welcome.NEI"...
Selection (1) from the RADIUS Specific Device Login Menu allows you to change the password control character: Enter control character used to switch from LOGIN to CHANGE PASSWORD mode. Select the control character that you wish to us by typing caret (‘^’) followed by another character (example: ^A),...
If you need to change this order, you may specify this order of prompts in the login process. The password control character is a key sequence you specify to switch between the login mode and the change password mode. In order to enable this feature for the general user, you need to configure this password control character.
Page 193
Selection (1) from the TACACS Specific Device Login Menu allows you to change the password control character: Enter control character used to switch from LOGIN to CHANGE PASSWORD mode. Select the control character that you wish to us by typing caret (‘^’) followed by another character (example: ^A),...
If you need to change this order, you may specify this order of prompts in the login process. The password control character is a key sequence you specify to switch between the login mode and the change password mode. In order to enable this feature for the general user, you need to configure this password control character.
DVANCED ONFIGURATION We define advanced configuration as the configuration you may use to fine tune your system, or to configure options that are not necessarily needed by the majority of users. For example, if you would like to configure an alternate access (an alternate to ISDN access); this would be considered advanced configuration.
ONFIGURING LTERNATE VERVIEW An access defines the connection details the CyberSWITCH uses to reach the network. The default access is ISDN access, a switched-network access. Configurable accesses are required for dedicated network connections, for packet-switched network connections including X.25 and frame relay connections.
Keep in mind that you can aggregate a maximum of 32 connections. These connections can be any combination of dedicated and/or switched connections to the same device. For maximum performance, however, we recommend aggregating no more than eight connections at a time. NFORMATION Workgroup Remote Access Switch ONFIGURING LTERNATE CCESSES Dedicated Accesses...
USER’S GUIDE X.25 A CCESSES X.25 A ONFIGURING AN CCESS Note the following: • X.25 accesses are available only if you have purchased the additional software module for packet switched accesses. • To establish virtual circuits over X.25, you must enable device level security •...
This timer designates the time limit in which a clear confirmation must be returned by the DCE (the PPSN) after a clear request has been issued by the DTE (the CyberSWITCH). ONFIGURING LTERNATE X.25 Accesses Workgroup Remote Access Switch CCESSES...
Page 200
USER’S GUIDE Configure the X.25 Reliability, Windows, and Acknowledgment Facilities. Select the type of sequence numbers to be used for X.25: regular or extended. Extended sequence numbering allows for packets to be assigned sequence numbers from 0-127 (modulo 128), as opposed to 0-7 (modulo 8). b.
The X.121 address to be used as the local DTE address. The X.121 address is the public data network address assigned by your X.25 provider. The local DTE (Data Terminal Equipment) in our application refers to the CyberSWITCH. ONFIGURING LTERNATE X.25 Accesses Workgroup Remote Access Switch CCESSES...
USER’S GUIDE The data rate that applies to the line being used for this X.25 access. The configured data rate can be 56 or 64 Kbps. EARER HANNELS A list of bearers (a channel map) that will be used on the line associated with this X.25 access. For PRI lines, the range of channels is from 1 to 24.
DCE (the PPSN) after a clear request has been issued by the DTE (the CyberSWITCH). The range for the this timer is 1 to 200 seconds. The default for this timer is 180 seconds. SSIGNMENTS Workgroup Remote Access Switch ONFIGURING LTERNATE CCESSES X.25 Accesses...
Page 204
USER’S GUIDE X.25 R ELIABILITY INDOWS X.25 S EQUENCE The type of sequence numbers to be used for X.25; regular or extended. Extended sequence numbering allows for packets to be assigned sequence numbers from 0-127 (modulo 128), as opposed to 0-7 (modulo 8). The default value is modulo 8. AXIMUM INDOW This is the largest possible window size to be supported on any virtual circuit.
Page 205
The default configuration is to not allow outgoing X.25 calls to request reverse charging. ONFIGURING RANSMIT INDOW ECEIVE INDOW RANSMIT ACKET ECEIVE ACKET RANSMIT HROUGHPUT LASS ECEIVE HROUGHPUT LASS HARGING HARGING Workgroup Remote Access Switch LTERNATE CCESSES X.25 Accesses...
USER’S GUIDE X.25 R ESTRICTION ACILITIES These facilities are used to place restrictions upon incoming and outgoing X.25 calls. ARRING NCOMING Allows to you bar X.25 calls coming in to the system. The default configuration is to not bar incoming X.25 calls. ARRING UTGOING Allows you to bar X.25 calls going out of the system.
Virtual circuits are used to establish a virtual path from one DTE to another. This virtual path appears to have the same characteristics that you might get from a physical telephone circuit. With ECEIVE INDOW RANSMIT ACKET ECEIVE ACKET RANSMIT HROUGHPUT LASS ECEIVE HROUGHPUT LASS NFORMATION Workgroup Remote Access Switch ONFIGURING LTERNATE CCESSES X.25 Accesses...
Page 208
B10 B12 B14 B16 B18 B20 B22 B24 B26 B28 CSX1200 = X.25 Virtual Circuits Note: In the illustration, the DTEs are all CyberSWITCH systems. Throughout the X.25 Access section, the term “DTE” can be interchanged with “CyberSWITCH”. Public Packet Switched Networks are typically more cost effective for users who transmit data in the mid-traffic range.
USER’S GUIDE Enter a list of bearers (a channel map). For T1 lines, the range of channels is from 1 to 24. For BRI lines, the range of channels is from 1 to 2. Separate bearer channels by commas, and/or list a range by using a dash (-).
Link Failure Detection is only supported across PPP permanent virtual circuits. Some Frame Relay networks have a per packet charge, therefore, the administrator should be cautious when enabling this feature. ONFIGURING LEMENTS Workgroup Remote Access Switch LTERNATE CCESSES Frame Relay Accesses...
PVC. The DLCI identifies a pre-established path, or permanent virtual circuit, within the access line to the frame relay network. The frame relay switch at the edge of the frame relay network, the one to which the access line is directly connected, routes the packet to the intended destination based on the DLCI therein.
PVC. This parameter should only be changed for those users very familiar with the Frame Relay Service. For a more in-depth explanation, refer to ONFIGURING BITS SECOND Data Rate Control Overview. SECOND Congestion Control Overview. SECS Data Rate Control Workgroup Remote Access Switch LTERNATE CCESSES Frame Relay Accesses Data Overview.
(DLCI). The DLCI identifies a pre-established path, or permanent virtual circuit, within the access line to the frame relay network. The frame relay switch at the edge of the frame relay network, the one to which the access line is directly connected, routes the packet to the intended destination based upon the DLCI therein.
A frame relay PVC has two transmission rates associated with it: the Committed Information Rate (CIR) and an Excess Information Rate (EIR). The committed information rate is the bandwidth requested for a PVC at service subscription time. It is essentially the guaranteed transmission rate VERVIEW Workgroup Remote Access Switch ONFIGURING LTERNATE CCESSES...
Frame relay supports only a single Permanent Virtual Circuit connecting any two given systems. To illustrate this point, the following diagram shows a frame relay network configuration that would be allowed: CSX1200 B-CHANNELS E1 ONLY POWER SERVICE...
However, under the above stated conditions, the network configuration shown below would not be allowed: CSX1200 B-CHANNELS E1 ONLY POWER B17 B19 B29 B31 SERVICE 10BASE - T B13 B15 B21 B23 B25 B27 B10 B12 B14 B16 B18 B20...
ONFIGURING DVANCED VERVIEW When bridging is enabled, optional advanced features are available. Optional bridging features include: • bridge dial out • Spanning Tree Protocol • mode of operation • bridging filters • known connect lists This chapter includes a section for each advanced bridging feature. RIDGE With bridging enabled, bridge dial out is supported.
Return to the Device Table Menu, and select Bridge: RIDGE chapter contains the information needed to "PPP (Point to Point Protocol)" "64000 bps" "64000 bps" "128000 bps" "" "Default_Profile" DISABLED Workgroup Remote Access Switch ONFIGURING DVANCED RIDGING Bridge Dial Out...
USER’S GUIDE Device Bridging: (Device = "DAN") 1) IP (sub)network number 2) Bridging 3) Make Calls for bridge data 4) IPX Network Number 5) IPX Spoofing Options Id of option to change or press <RET> for previous menu? 3 Enable Bridging. 10.
If the device is not on the Known Connect list, the packet is discarded. No Filter Match - Destination Unknown The packet is discarded. ACKGROUND NFORMATION Workgroup Remote Access Switch ONFIGURING DVANCED RIDGING Bridge Mode of Operation...
USER’S GUIDE RIDGE ILTERS ONFIGURING RIDGE ILTERS Note: Bridge dial out calls can be initiated through the use of a Known Connect list or through the use of bridge filters. For a description of bridge dial out through bridge filters, refer to the section titled CFGEDIT SING...
Page 223
Allows a destination address filter to be deleted from the current configuration. Protocol Filter Commands protfilt Displays the current protocol filter configuration data. (page 226). (page (page Workgroup Remote Access Switch ONFIGURING DVANCED RIDGING Bridge Filters 222). Configure any needed 222). 222).
USER’S GUIDE protfilt add Allows a protocol filter to be added to the current configuration. Refer to the CFGEDIT section for required configuration elements protfilt change Allows the current protocol filter configuration to be changed. protfilt delete Allows a protocol filter to be deleted from the current configuration. Packet Data Filter Commands pktfilt Displays the current packet filter configuration data.
If the mode of operation is changed, any previously defined filters will be deleted. Any previously defined protocol definitions will remain unchanged. NFORMATION Filter Type Maximum Number of Each filter (in manual mode) Workgroup Remote Access Switch ONFIGURING DVANCED RIDGING Bridge Filters Protocol Definitions.)
USER’S GUIDE MAC address filters reference either the source or destination MAC address fields in a packet. Protocol filters use the protocol Id field in a packet. Packet data filters reference data outside the address and protocol fields in a packet. Each filter has a distribution list that identifies the potential destinations for a filtered packet.
NOT be forwarded as specified in the distribution list. If no distribution list is specified, the frame will not be forwarded. Forwarding Action SOURCE DISCARD SOURCE CONNECT DISCARD CONNECT PROTOCOL DISCARD PROTOCOL CONNECT PACKET DISCARD PACKET CONNECT Workgroup Remote Access Switch ONFIGURING DVANCED RIDGING Bridge Filters...
Page 228
USER’S GUIDE DESTINATION MAC-address CONNECT< distribution list > This filter allows you to connect MAC frames addressed to the specified MAC address. When the specified MAC address appears in the destination address field of the MAC frame, the frame will be forwarded as specified in the distribution list. PROTOCOL protocol-Id DISCARD <...
Page 229
A packet matching this filter will not be forwarded to any sites on the specified Device List. A packet matching this filter will be connected and forwarded to the sites on the specified Device List. Workgroup Remote Access Switch DVANCED RIDGING Bridge Filters...
Page 230
USER’S GUIDE Restricted Mode Bridge Filters Restricted Mode Type of Filter available DESTINATION DESTINATION SOURCE unicast-address FORWARD <distribution list> This filter allows you to stipulate access privileges of a given device. When the specified unicast address appears in the source address field of a MAC frame, the frame will be forwarded as specified in the distribution list.
Page 231
For example you may forward all IPX data packets but restrict workstation watchdog packets. ONFIGURING for more information. Workgroup Remote Access Switch DVANCED RIDGING Bridge Filters...
Page 232
USER’S GUIDE The following chart summarizes the forward filter actions available for Restricted Bridging: Filter Distribution Action FORWARD FORWARD FORWARD FORWARD Device List* CONNECT Device List* It is possible to use a discard filter action to selectively discard packets that have been forwarded through the previous restricted bridging forwarding filters.
Follow the item selection process shown in the screens (the selections are in bold). MAC A ESTINATION DDRESS ILTER page 227. Configuring Resources and Lines Configuring a On-node Device Database Workgroup Remote Access Switch ONFIGURING DVANCED RIDGING Bridge Filters for details. in the Configuring Device...
Page 234
USER’S GUIDE Bridge Filter Menu: 1) Protocol Definition 2) Source MAC Address Filter 3) Destination MAC Address Filter 4) Protocol Filter 5) Packet Data Filter Select function from above or <RET> for previous menu: 3 Current Destination Address Filter: DEST ADDRESS ACTION -------------------------------------------------------- There are currently no Destination Address Filters configured.
Repeat step 2 for all devices you want included on this list. DISTRIBUTION LIST John ONNECT On-node Device Database section found in the Configuring Device Level page 220 Workgroup Remote Access Switch ONFIGURING DVANCED RIDGING Known Connect List Configuring Resources and Lines for instructions on changing the...
USER’S GUIDE NOWN ONNECT ONFIGURATION EVICE The name of a bridge device that has been preconfigured in the the Configuring Device Level Databases chapter. This is a device to which you want the system to connect and forward bridged unicast packets. NOWN ONNECT ACKGROUND...
ONFIGURING DVANCED VERVIEW By default, IP routing is disabled when you first install your system software. After IP routing is enabled, there are optional advanced features available. Optional advanced IP routing features include: • Static ARP Table Entries ARP (Address Resolution Protocol) is used to translate IP addresses to Ethernet addresses. As a rule, this translation is handled dynamically.
USER’S GUIDE ARP T TATIC ABLE NTRIES ARP T ONFIGURING TATIC CFGEDIT SING Once IP has been enabled, the full IP Configuration menu will be displayed as shown below: IP Routing Menu: P Routing (Enable/Disable) IP Operating Mode IP Interfaces IP Static Routes RIP (Enable/Disable) IP Static ARP Table Entries...
Disables the lookup of IP routes lookup via RADIUS. ipradius on Enables the lookup of IP routes lookup via RADIUS. LEMENTS NFORMATION RADIUS RADIUS OOKUP VIA Workgroup Remote Access Switch IP R ONFIGURING DVANCED OUTING The Isolated Mode...
USER’S GUIDE RADIUS C TATIC OUTE VIA RADIUS S TATIC OUTE VIA You may enable or disable this option. RADIUS B TATIC OUTE OOKUP VIA The Static Routes Lookup via RADIUS option allows you to maintain static routes for devices on the RADIUS Server.
NITIATING THE ILTER ONFIGURATION CFGEDIT SING To begin the configuration process, IP must be enabled. Access IP Filter configuration through the extended IP Routing Menu: NFORMATION Information. section for details. Workgroup Remote Access Switch IP R ONFIGURING DVANCED OUTING IP Filters...
USER’S GUIDE IP Routing Menu: IP Routing (Enable/Disable) IP Operating Mode IP Interfaces IP Static Routes RIP (Enable/Disable) IP Static ARP Table Entries Isolated Mode(Enable/Disable) Static Route Lookup via RADIUS(Enable/Disable) IP Address Pool 10) DHCP Configuration 11) IP Filter Information. Select function from above or <RET>...
If you select NOT EQUAL, you may choose between a specific upper-level protocol or an ar- bitrary numeric value only. Select IP protocol. If you choose an upper-level protocol, refer to the three following configuration sections: Configuring TCP, Configuring UDP, and Configuring ICMP. IP R ONFIGURING DVANCED Workgroup Remote Access Switch OUTING IP Filters...
USER’S GUIDE ONFIGURING If you have selected TCP as your IP protocol, a screen similar to the following is displayed. Note that the following TCP defaults constitute a wild card match for any TCP packet: PACKET TYPE "Type_One": 1) IP Source Address 2) IP Destination Address 3) IP Protocol 4) TCP Source Port...
If you choose “NOT EQUAL”, you may only specify a numeric value for the ICMP code. ONFIGURING AND 0.0.0.0 EQUAL 0.0.0.0 AND 0.0.0.0 EQUAL 0.0.0.0 EQUAL ICMP EQUAL ANY EQUAL ANY Workgroup Remote Access Switch IP R DVANCED OUTING IP Filters...
USER’S GUIDE ONFIGURING ORWARDING The configuration of Forwarding Filters is a two-part process. First you must name the filter, and then you must create a list of conditions for the filter. To add a condition, you must name a previously-created packet type, and then name the action to perform on the specified packet type (i.e., forward or discard).
All Other Types (3) Delete, (4) Move a CONDITION, or press <RET> for previous menu? "Type_Two" All Other Types (3) Delete, (4) Move a CONDITION, or press <RET> for previous menu? Workgroup Remote Access Switch IP R ONFIGURING DVANCED OUTING IP Filters...
USER’S GUIDE ONFIGURING XCEPTION ILTER The IP Exception Filter is intended for temporary, special conditions within an existing forwarding filter. When enabled, it is logically appended to the beginning of each forwarding filter in effect. CFGEDIT SING Select Exception Filter from the IP Filter menu. Enable the Exception Filter.
Select Apply Global Forwarding Filter. Provide the global filter name. PPLYING PER DEVICE ORWARDING Return to the Main Menu. Select Security. Select Device Level Databases. Select On-node Device Entries. ILTER ILTER ILTERS Workgroup Remote Access Switch IP R ONFIGURING DVANCED OUTING IP Filters...
USER’S GUIDE Select the device to which you want to apply the forwarding filter. Select IP Information. Select either IP Input Filter or IP Output filter. Provide the filter name. IP F ILTERS ONFIGURATION The following elements are described in terms of the individual comparisons which make up the packet types.
The following illustrates a packet that is passing through a filter. The packet is checked against each of the individual conditions of the filter before an action is performed: IP R ONFIGURING DVANCED Workgroup Remote Access Switch OUTING IP Filters...
USER’S GUIDE IP Packet Packet Types: Type 1: www,www,www Type 2: xxx,xxx,xxx Type 3: yyy,yyy Type 4: zzz,zzz ILTER OMPOSITION The IP filtering mechanism is composed of three fundamental building blocks: Packet Types The criteria for describing an IP datagram’s contents: IP Source and Destination Addresses, Protocol (TCP, UDP, etc.), Protocol-specific fields (TCP port, etc.).
WAN and it is necessary to first establish a connection, the Connection Filter, if enabled, is applied. Finally, any User-specific filter is applied (again, only if the datagram is being transmitted on WAN interface). for more information on these filtering mechanisms. Workgroup Remote Access Switch IP R ONFIGURING DVANCED...
USER’S GUIDE Because the Packet Types within the conditions specify both source and destination address information, Global application may often be sufficient to filter IP traffic across the entire system. However, the Input, Output and User-Based application points are defined in case the administrator needs to apply a finer level of filtering which cannot be obtained on a Global basis.
EQ <port> /NEQ < port > / GT < port > /LT < port > / RANGE <p1> <p2> EQ / NEQ n / ANY EQ / NEQ n / ANY Central Office Remote Access Switches Workgroup Remote Access Switch IP R ONFIGURING DVANCED OUTING IP Filters...
CyberSWITCH SFVRA Manager Server Server 128.131.25.12 128.131.25.10 128.131.25.11 128.131.25.15 POWER SERVICE 10BASE - T CSX1200 ISDN Remote User Remote User Internet 193.57.50.1 B-CHANNELS E1 ONLY B13 B15 B17 B19 B21 B23 B25 B27 B29 B31...
Page 257
Permits all ICMP packets to enter (in- cluding ECHO packets for PING). No-match action. Denies access to the Netserver. Denies access to the CyberSWITCH it- self. Denies access to the CyberSWITCH it- self. No-match action Workgroup Remote Access Switch IP R OUTING IP Filters...
USER’S GUIDE FORWARD IP Src 255.255.255.255, 201.55.89.100 IP Dst: 255.255.255.255, 128.131.25.11 IP Prot: ANY FORWARD All other packet types Once the offsite maintenance is completed, the Exception filter would be disabled. Configuration control over the Exception filter is available both through CFGEDIT and Manage Mode (with Manage Mode being the most practical method due to its dynamic nature).
DHCP/BOOTP Relay Agent processing is extensively discussed in RFC 1542. DHCP/BOOTP R ELAY GENT NVIRONMENTS The following sections describe the different environments in which the DHCP/BOOTP Relay Agent may be used. GENT NABLE ISABLE DDRESSES Workgroup Remote Access Switch IP R ONFIGURING DVANCED OUTING DHCP Relay Agent...
Page 260
USER’S GUIDE Bridge to Bridge Environment CSX1200 Remote Bridge DHCP Client As shown in the picture above, when a remote LAN is connected with bridge devices, the DHCP server and clients communicate with each other as if they were on the same LAN. This is one example configuration of how DHCP can be used to accomplish the dynamic IP address assignment to the remote IP devices.
B14 B16 B18 B20 B22 B24 B26 B28 CSX1200 IP Router w/ DHCP Relay Agent ("Alex") In this configuration, the DHCP Client is able to obtain its IP address from the DHCP Server (and any other information that the server provides), using the Relay Agents contained in both IP...
Page 262
USER’S GUIDE Routers shown in the diagram above. Sample configurations for the objects in the above network diagram are as follows: Configuration for IP Router "Alex" System Information: System Name = Alex System Password = stone Security Level = Device Level (On-node Device Database, PAP security) Bridging disabled IP enabled (router mode)
Page 263
B14 B16 B18 B20 B22 B24 B26 B28 CSX1200 IP Router w/ DHCP Relay Agent ("Alex") In this configuration, the DHCP Client is able to obtain its IP address from the DHCP Server (and any other information that the server provides), using the Relay Agent contained in the DHCP- enabled router “Alex.”...
Page 264
USER’S GUIDE Configuration for IP Router "Alex" System Information: System Name = Alex System Password = stone Security Level = Device Level (On-node Device Database, PAP security) Bridging disabled IP enabled (router mode) I/F = LAN (192.168.1.168) I/F = WAN RLAN (204.157.42.190) DHCP enabled Relay Destination # 1 = 192.168.1.5...
SING ANAGE dhcp Displays the current DHCP configuration values. dhcp change Displays the same DHCP menu as CFGEDIT, allowing you to change the current DHCP configuration. LIENT Workgroup Remote Access Switch IP R ONFIGURING DVANCED OUTING DHCP Proxy Client...
USER’S GUIDE DHCP C ONFIGURATION LEMENTS DHCP P ROXY LIENT NABLE A global flag that indicates whether the DHCP Proxy Client feature is enabled or not. The proxy client is disabled by default. IP A AXIMUM UMBER OF Refers to the maximum number of IP addresses obtained from DHCP servers for this network interface.
192.168.1.168 POWER SERVICE 10BASE - T CSX1200 IP Router w/ DHCP Proxy Client ("Chloe") In this configuration, the remote IPCP device, “Summer”, is able to negotiate and obtain its IP address from the system’s IP Address Pool. IP addresses have been obtained from the DHCP server for the WAN interface 192.168.10.0.
Page 268
USER’S GUIDE System Information: System Name = Chloe System Password =pets Security Level = Device Level (On-node Device Database, PAP security) Bridging disabled IP enabled (router mode) DHCP configuration: Device = “Summer” CyberSWITCH Configuration for IP Router “Chloe” I/F = LAN (192.168.1.168); LAN port 1 I/F = WAN explicit (192.168.10.168) DHCP related: max addrs to obtain=10...
ONFIGURING VERVIEW IPX protocol accepts data from remote devices and formats the data for transmission onto the network, and conversely, accepts data from the LAN and formats it so it can be understood by remote devices. In short, IPX allows remote devices and their servers to communicate. The CyberSWITCH supports the standard method of routing datagrams over a network.
You may find it helpful to refer to the graphic and to the sample screens for clarification while completing your IPX configuration. External Network Number Internal Network Number Network # 55555555 CSX1200 B-CHANNELS POWER SERVICE 10BASE - T B10 B12 Remote2 (Remote Bridge)
IPX data packets at the IPX network layer. If the option is set to disable, the system will process and forward IPX data packets at the MAC or bridging layer. LEMENT Workgroup Remote Access Switch ONFIGURING IPX Routing Option...
USER’S GUIDE IPX O PTION ACKGROUND NFORMATION The Internetwork Packet Exchange (IPX) protocol is a datagram, connectionless protocol in the NetWare environment analogous to the Internet Protocol (IP) in the TCP/IP environment. With the help of Routing Information Protocol (RIP) and Service Advertising Protocol (SAP), the IPX router performs the network layer tasks of addressing, routing and switching information packets, to move packets from one location to another in a complex network.
Select the packet encapsulation type from the displayed list. Enter the MTU size. Note that the maximum value for the MTU size varies based on the packet encapsulation type chosen. NFORMATION NTERFACES Workgroup Remote Access Switch ONFIGURING IPX Network Interfaces...
Page 274
USER’S GUIDE If IPX RIP has been enabled for the system, enter the following: RIP send control (do not respond or respond) b. frequency (in seconds) of sending RIP updates RIP receive control (do not respond or respond) d. time (in seconds) to age RIP entries RIP respond control (do not respond or respond) 10.
IPX RIP packets on this network interface. If this parameter is set to do not send, the system will not transmit any IPX RIP packets on this network interface. LEMENTS ONFIGURATION LEMENTS (MTU) LEMENTS Workgroup Remote Access Switch ONFIGURING IPX Network Interfaces...
USER’S GUIDE REQUENCY Specifies the frequency at which the system will transmit RIP packets, if the Send control parameter is set to send for this interface. This parameter is a decimal value specified in seconds from 1 to 300. The default value is 60 seconds. ECEIVE ONTROL Specifies how the system will process RIP packets received on this network interface.
IPX Remote LAN interface, and uses it as a default. Currently, we do not support a remote LAN with both NetWare servers and clients connected to it. NFORMATION Workgroup Remote Access Switch ONFIGURING IPX Network Interfaces...
USER’S GUIDE IPX R OUTING ROTOCOLS IPX R ONFIGURING OUTING CFGEDIT SING Select Routing Protocols from the IPX menu. The following will be displayed: IPX Routing Protocol Menu: IPX RIP Processing is currently ENABLED IPX RIP Table maximum IPX SAP Processing is currently ENABLED IPX SAP Table maximum number of entries is 282141 Select function from above or <RET>...
IPX address of the server. The following service entries are stored in this table: • static • NTRIES NFORMATION by events) to update other routers. RIP determines the fastest path Workgroup Remote Access Switch ONFIGURING IPX Routing Protocols...
USER’S GUIDE Static services are configured locally on the system. SAP entries are learned from incoming SAP packets. All services are stored, used internally and advertised to other routers. The same factors that affect the maximum number of routes stored also affect the maximum number of services stored.
Enter a RIP Propagation Scheme from the above menu [default = 3]? 3 Follow the onscreen instructions to save the configured static route information. ONFIGURING IPX Static Routes (page 292), the configuration of static routes is Workgroup Remote Access Switch...
USER’S GUIDE SING ANAGE OMMANDS ipxroute Displays the current IPX routes (both statically entered and "learned"). ipxroute [add/change/delete] Allows you to add/change/delete an IPX route. IPX S TATIC OUTES ONFIGURATION ESTINATION ETWORK The IPX network number reachable through this static route entry. This parameter is a hexadecimal value from 1 to 4 bytes in length.
Displays the current IPX service data (both statically entered and "learned"). ipxsvc [add/change/delete] Allows you to add/change/delete an IPX service. ERVICES (page TATIC ERVICES Workgroup Remote Access Switch ONFIGURING IPX NetWare Static Services 292), the configuration of static services...
USER’S GUIDE IPX N TATIC ERVICES ERVICE Specifies the NetWare service name that is the target of this static service definition. This parameter is a 48 character NetWare service name. ERVICE Indicates the type of NetWare service that is the target of this static service definition. You may enter the hexadecimal service type value, or request a list of common service types.
Press 1 to select the serialization packet handling configuration level. Follow the onscreen instructions to select either device level or system level. Return to the serialization packet handling menu. ACKGROUND NFORMATION Workgroup Remote Access Switch ONFIGURING IPX Spoofing...
USER’S GUIDE b. Press 2 to select the system serialization packet handling level. The default values for all parameters will be displayed. Enter the Id of any parameters you need to change. Follow the onscreen instructions for changing the default values. Return to the IPX spoofing menu. Press 4 to configure the message packet handling.
USER’S GUIDE without generating a keep-alive response. The duration timer T starts when a device is disconnected and is reset each time a new connection is established. Some of these <SYS> packets are overloaded in that they are not just keep-alive packets but are control packets needed for the application to run successfully and hence have to be routed like regular SPX data packets.
USER’S GUIDE IPX I SOLATED ACKGROUND When operating with isolated mode enabled, the CyberSWITCH does not relay IPX datagrams received from the WAN to other IPX routers/hosts located on the WAN. IPX datagrams received from the WAN will be discarded if they need to be forwarded over the WAN. IPX datagrams received on the LAN interface are forwarded to the proper interface.
Valid range for timer: 1 to 10,000 seconds (165 minutes); default: 5 minutes. LOBAL IMERS Current Settings 180 sec. 20 sec. 5 sec. 5 min. 180 sec. Workgroup Remote Access Switch ONFIGURING IPX Triggered RIP/SAP...
USER’S GUIDE SUBSCRIPTION IMER Over subscription is the situation in which there are more next-hop routers on the WAN that need updates than there are channels available. When a WAN circuit goes down, a delay (per the over- subscription timer) is incorporated in marking the routes unreachable. This allows the calls to time- multiplex over the limited channels.
Page 293
Serialization Packet Handling Message Packet Handling Select function from above or <RET> for previous menu: 1 Press 1 to configure IPX watchdog spoofing. The following menu will be displayed: ONFIGURING IPX-Specific Information for Devices ISDN Authentication Workgroup Remote Access Switch...
Page 294
USER’S GUIDE Device Level IPX Watchdog Spoofing Menu: 1) Default Handling 2) Handling while the connection is up 3) Handling for the special period after disconnecting is Spoof 4) Special period of time after disconnecting Select function from above or <RET> for previous menu: b.
Allows you to change information for a specific device entry. This will allow you, for example, to add IPX information to a previously configured device entry. IPX-Specific Information for Devices ISDN NONE ENABLED DISABLED NONE page Workgroup Remote Access Switch ONFIGURING Authentication 277.
USER’S GUIDE IPX C ONFIGURATION LEMENTS FOR IPX R OUTING Indicates that the remote device is an IPX router and that the system should route IPX datagrams to this device. The system will forward IPX datagrams to this device based on IPX network layer information if this parameter is set to enabled.
Triggered RIP/SAP. The information about IPX Triggered RIP/SAP may be fetched from an off- node server, if applicable, and then Triggered RIP/SAP will start for the configured routers. UMBER EVICES ACKGROUND Workgroup Remote Access Switch ONFIGURING IPX-Specific Information for Devices WAN peer list.
SNMP ONFIGURING VERVIEW A Network Management Station (NMS) is a device that contains SNMP-specific software, giving it the ability to query SNMPAgents using various SNMP commands. If you have purchased an NMS (such as Cabletron’s SPECTRUM® Management Platform), you should enable and configure the CyberSWITCH to be an SNMP Agent.
Page 299
If you want ISDN B-channel usage traps, follow the onscreen instructions for enabling them. d. Set the threshold value for ISDN B-channel usage traps. Optional: change the values of the MIB-2 system group objects. ONFIGURING Configuring SNMP Workgroup Remote Access Switch SNMP...
USER’S GUIDE SING ANAGE OMMANDS Currently you cannot configure SNMP using the Manage Mode, but the following command is available: snmp This Manage Mode command displays the current SNMP configuration data. An example output screen is shown below: MANAGE> SNMP The SNMP feature is enabled.
SNMP messages. Thus only those systems that have enabled the IP routing operating mode can make use of SNMP. RAPS TATUS RAPS TATUS HRESHOLD Workgroup Remote Access Switch SNMP ONFIGURING SNMP Background Information ISDN Usage Related...
Page 302
Address Translation (AT) group, the Internet Protocol (IP) group, the Internet Control Message Protocol (ICMP) group, the User Datagram Protocol (UDP) group, the Transmission Control Protocol (TCP) group, and the Simple Network Management Protocol (SNMP) group. CyberSWITCH CSX1200 B-CHANNELS E1 ONLY POWER...
Page 303
Trap An SNMP Agent will generate an isdnUsageNormal Trap PDU when the Agent detects that the number of B-Channels in use has returned to a value below the configured threshold value. ONFIGURING SNMP Background Information Workgroup Remote Access Switch SNMP...
Page 304
USER’S GUIDE • authTimeout Trap An SNMP Agent will generate an authTimeout Trap PDU anytime an off-node server times out. • clidDisconnect Trap An SNMP Agent will generate an clidDisconnect Trap PDU anytime there is a configuration problem with a device’s Calling Line Id. •...
ONFIGURING PPLE VERVIEW The AppleTalk routing feature allows the CyberSWITCH to efficiently route AppleTalk data as opposed to bridging all data relating to the protocol. With the addition of the AppleTalk Remote LAN feature, the CyberSWITCH can be configured to be a router, bridge or a mix of both when handling AppleTalk traffic.
USER’S GUIDE PPLE OUTING PTION PPLE PERATIONAL You can enable or disable the AppleTalk Routing option. When AppleTalk Routing is enabled, the CyberSWITCH acts as an AppleTalk Router, routing AppleTalk datagrams based on AppleTalk address information. When AppleTalk Routing is disabled, the CyberSWITCH will simply bridge AppleTalk protocol network traffic.
The NonExtended Network indicates that the system is connected to a NonExtended AppleTalk network, which supports addressing of up to 254 nodes and supports only one zone. LEMENTS port type allows remote bridge devices to connect to other AppleTalk Workgroup Remote Access Switch ONFIGURING PPLE OUTING...
USER’S GUIDE PPLE ETWORK ANGE The AppleTalk network range (for Extended network) or the AppleTalk network number (for NonExtended network) of the LAN segment that the port is connected to. Specifying 0.0 (for Extended) or 0 (for NonExtended) places the port in discovery mode (a.k.a., non-seed router), in which the system learns its configuration information from the seed router.
This means that if an RTMP packet is received with a different network number/range than configured, the LAN port assumes the RTMP packet contains the ONFIGURING PPLE AppleTalk Ports bridge device table entry. Workgroup Remote Access Switch OUTING...
USER’S GUIDE correct network/range and begins using the learned network number/range. If the network number/range configured for the Remote LAN port differs from the network number/range that is being broadcasted in RTMP packets by other remote routers, the port becomes unusable. Configuration In order to properly set up an AppleTalk Remote LAN, you must: •...
Allows you to set the maximum number of defined and learned zone table entries. The default value is 512. The maximum is 2,000. OUTES ONFIGURATION LEMENTS ANGE UMBER OUTES ACKGROUND NFORMATION LEMENTS AXIMUM UMBER OF NTRIES AXIMUM UMBER OF NTRIES Workgroup Remote Access Switch ONFIGURING PPLE OUTING AppleTalk Capacities...
USER’S GUIDE PPLE APACITIES ACKGROUND This option allows you to control the maximum number of table entries (routing and zone tables) for your network. PPLE SOLATED ONFIGURING THE PPLE CFGEDIT SING Select Isolated Mode (Enable/Disable) from the AppleTalk Routing Menu. Follow the onscreen instructions to either enable or disable the isolated mode.
ONFIGURING VERVIEW The CyberSWITCH offers a number of configurable options to control how the system will make and accept calls. These options include: • configuring throughput monitor parameters • configuring call interval parameters • configuring monthly call charge parameters • configuring call restriction parameters •...
USER’S GUIDE Follow the onscreen instructions to keep the feature enabled. Enter the sample rate in seconds. Enter the overload trigger number. Enter the overload window size. Enter the overload percentage utilization. Enter the underload trigger number. Enter the underload window size. 10.
Condition Overload Underload Idle Note: For adding calls, these parameters only apply to calls initiated by the system. NFORMATION Trigger Number Window Size Workgroup Remote Access Switch ONFIGURING ONTROL Throughput Monitor Utilization...
USER’S GUIDE The throughput monitor feature constantly monitors the use of the connections and looks for the following conditions: • The overload condition, which indicates that demand exceeds the current aggregate capacity of the WAN connections. The system can add more bandwidth when this occurs. •...
(the trigger of 2) out of 3 samples (the window of 3) before any action is taken. This condition has not been met. XAMPLE 0 of 1 1 of 2 1 of 3 Sliding Window 1 of 3 1 of 3 2 of 3 Overload condition met 0 of 1 Workgroup Remote Access Switch ONFIGURING ONTROL Throughput Monitor...
USER’S GUIDE The average throughput is 40% for the third sample rate period. This is less than the configured utilization, so out of the last 3 samples (a sliding window is in use), 1 out of 3 samples have throughput that is greater than the configured utilization. The overload condition has still not been met.
At the beginning of a new month, the current total call charges will be reset to 0. HARGE LEMENTS NFORMATION Workgroup Remote Access Switch ONFIGURING ONTROL Monthly Call Charge...
USER’S GUIDE ESTRICTIONS ONFIGURING ESTRICTIONS Note: Certain restrictions apply to the use of Refer to the Background Information discussion. CFGEDIT SING Select Call Restrictions from the Call Control Options menu. Follow the onscreen instructions for enabling this feature. The current call restriction configuration will be displayed. Enter the number Id associated with the parameter you want to change.
Page 321
The call will be allowed; however, a warning will be written to the report log. 3:00 4:00 5:00 6:00 3:59 4:59 5:59 6:59 Entry 9-18 all hours 1-24 11-19, 21, 24 9-18, 20-22 Workgroup Remote Access Switch ONFIGURING ONTROL Call Restrictions 7:00 8:00 9:00 10:00 11:00 7:59 8:59 9:59 10:59 11:59...
USER’S GUIDE INUTES PER The limit of number of call minutes per day. The default value is 240 call minutes per day. Call minutes will be calculated periodically while calls are active (not when a call is disconnected). Statistics will be kept to track the total number of call minutes made per day. This statistic will be written to the statistics log every half hour, and available through the ds command.
Note that there are four lines in the default profile: (1,1), (1,2), (1,3), and (1,4). The leading “1” in the pair of numbers represents the slot number. The second number in the pair represents ESERVATION LINES (SLOT,PORT) (1,1 1,2 1,3 1,4) Workgroup Remote Access Switch ONFIGURING ONTROL Bandwidth Reservation...
Page 324
USER’S GUIDE the port number. This example shows that there is only one BRI adapter, and it is installed in slot number one, and has four ports. There is a line for each port number. Press 1 to add a device profile. Enter a user-defined unique name to identify the profile.
This element identifies the line or lines to be reserved for the specified Device Profile. Overlap of lines between profiles is allowed. Note that this is a BRI-only feature since bandwidth is reserved per-line. [delete] ONFIGURATION LEMENTS Workgroup Remote Access Switch ONFIGURING ONTROL Bandwidth Reservation...
USER’S GUIDE ANDWIDTH ESERVATION This feature allows a portion of the possible connections to always be available to specific devices for both inbound and outbound calls. To increase flexibility, this feature may be configured to either allow or prevent bandwidth overlap. Bandwidth overlap will allow normal devices to use a certain number of lines, while a special class of super devices would be allowed access to both the normal bandwidth (designated in the default profile) as well as special super device bandwidth (designated in the configured device profile).
Page 327
Adds, changes, or deletes a semipermanent connection from the current configuration. Max Retries Over Interval Session Interval ( ALWAYS CALL BACK ) Max Retries Over Interval Session Interval 10 Mins Max Retries Over Interval Session Interval 10 Mins Workgroup Remote Access Switch ONFIGURING ONTROL Semipermanent Connections 60 Mins...
USER’S GUIDE EMIPERMANENT ONNECTIONS EVICE Specify the device name (from the Device List) that you wish to make a semipermanent connection. Once specified, the semipermanent feature will (at least) keep the Initial Data Rate active to the specified device, as long as it is not prohibited by call restrictions or a physical or configuration problem.
Page 329
If this happens, you will need to use the call device command to restart the feature. ONFIGURING Semipermanent Connections parameter values. Workgroup Remote Access Switch ONTROL...
USER’S GUIDE VRA M ANAGER AS A This feature allows you to use the Virtual Remote Access (VRA) Manager for call control management only. This feature allows you to continue to use other authentication servers (e.g., RADIUS, ACE) yet still gain the benefits of VRA call control management. VRA M ONFIGURING ANAGER FOR...
This will provide access to the following VRA call control management features: call restrictions, maximum bandwidth, and grouping (in addition to the call logging feature). IMER ANNER Workgroup Remote Access Switch ONFIGURING ONTROL VRA Manager as a Call Control Manager...
USER’S GUIDE • User Level Security If you use user level security for authentication: configure devices on the VRA manager as well. This will provide access to the following VRA call control management features: call restrictions, maximum bandwidth, and grouping (in addition to the call logging feature). User level security and VRA call control management work together as follows: VRA allows a device to connect under an alias name until the user can be verified by its authentication server.
ONFIGURING THER VERVIEW This chapter provides information for configuring advanced system options that are not covered in the previous chapters. These options include: • configuring PPP • configuring default line protocol • configuring log options • configuring system compression options •...
USER’S GUIDE PPP C ONFIGURATION LEMENTS ERMINATE The number of Terminate-Request packets sent without receiving a Terminate-Ack before assuming that the peer is unable to respond. ONFIGURE The number of Configure-Request packets sent without receiving a valid Configure-Ack, Configure-Nak or Configure-Reject before assuming that the peer is unable to respond. AILURE The number of Configure-Nak packets sent without sending a Configure-Ack before assuming that configuration is not converging.
B-channel has failed. Similarly, the Local Management Interface (LMI) facility of a Frame Relay circuit may provide feedback suitable for determining that an end- to-end Virtual Circuit has failed. TATUS Workgroup Remote Access Switch ONFIGURING THER DVANCED...
USER’S GUIDE However, the PPP link exists on an end-to-end basis with the remote peer, a domain which exceeds that controlled by the signalling-type entities just cited. Thus, not every end-to-end failure will be detected. Some examples of such failures include: •...
It is possible to change the timeout value for waiting for responses. You may also change the action on frame timeout. Instead of disconnecting after the frame timeout value has been reached, you can select a default protocol for the system to use. ROTOCOL LEMENTS NFORMATION Workgroup Remote Access Switch ONFIGURING THER DVANCED PTIONS Default Line Protocol...
USER’S GUIDE PTIONS Log options allow you to direct log reports to a specific location. Reports an be directed to a local log file, or to a UNIX-style syslogs server. Currently, only call detail recording (CDR) reports can be directed to a specific location. ONFIGURING PTIONS CFGEDIT...
90 to 180 seconds of operation. When we use the term UNIX Syslog Server, we are, more precisely, referring to the “syslogd” daemon running on a UNIX system. Syslogd reads and forwards messages to the appropriate log NFORMATION Workgroup Remote Access Switch ONFIGURING THER DVANCED...
USER’S GUIDE files and devices depending upon its configuration. Refer to your UNIX system documentation for more information on syslogd. Each log message sent to a syslogd server has a priority tag associated with it. The priority tag is encoded as a combination: facility.level. The facility identifies the part of the system creating the log message and the level describes the severity of the condition which caused the log message to be written.
Page 341
A verify event is generated by issuing the cdr verify console command. This command verifies the configuration of the CDR feature. It causes a message to be sent to all configured CDR log ONFIGURING ISDN POWER SERVICE 10BASE - T Bridge CSX1200 Workgroup Remote Access Switch THER DVANCED PTIONS Log Options B-CHANNELS E1 ONLY...
Page 342
USER’S GUIDE servers. The proper logging of the message can then be inspected to verify that CDR configuration is as desired. Event Report Contents A CDR event triggers a report which can consist of one or more records. Each record corresponds to a line in the log file.
Page 343
ISDN connect message was received from the switch. An incoming phone number is displayed if it is provided by the telephone switch. Not all switches provide calling line identification. A phone number is always displayed for outbound calls.
Page 344
On a reject event, records 1 through 4 are used. The event type is REJECT. The timestamp reflects the time that the decision to disconnect was made. An incoming phone number is displayed if it is provided by the telephone switch. Not all switches provide calling line identification. A phone number is always displayed for outbound calls.
You may enable or disable the compression subsystem status. This option provides enable/disable control over the entire compression subsystem within the system. If this option is enabled, the system will negotiate compression with remote devices per their individual PTIONS LEMENTS TATUS Workgroup Remote Access Switch ONFIGURING THER DVANCED PTIONS Compression Options...
USER’S GUIDE configuration. If this option is disabled, the system will not negotiate compression with any remote device. The default value is enabled. Note that enable/disable applies to all protocols which support compression. EFAULT EVICE OMPRESSION You may enable or disable the per-device compression setting. This is in addition to the global compression enable/disable state described above.
The peer will be expected to also discard its outbound history and respond with a CCP Reset-Acknowledgment. At this point, both sides will have been resynchronized and compressed data transfers can continue. ONFIGURING THER DVANCED Compression Options Workgroup Remote Access Switch PTIONS...
USER’S GUIDE When using Extended mode, a coherency count is checked to detect lost packets. If a packet loss is detected by the receiver, a Reset-Request is sent to the transmitter. The next compressed data packet transmitted will have a bit set to indicate that the history has been reset. With the use of sequence numbers, the decompressed output of all in-order compressed frames is assumed to be valid.
Whenever a remote host invokes the TFTP Server function in the system, the file access rights associated with the configured device ID are applied to all file accesses by the remote host. TFTP F EATURE TFTP C LIENT TFTP S ERVER TFTP S ERVER Workgroup Remote Access Switch ONFIGURING THER DVANCED PTIONS TFTP...
USER’S GUIDE Each device has pre-assigned configurable access rights to the TFTP permissible file types. The access rights are configurable using the fileattr change Manage Mode command. Refer to Attributes for more information regarding configuring the file attributes. When a device remotely access the TFTP server, it doesn’t matter what level the device is logged in as.
Page 351
CfgFiles File types included in the category RPRT_LOG.1 - 5 STAT_LOG.1 - 5 *.NEI (with the exception of CFGTOKEN.NEI) All other file types i.e. .EXE, .COM, .TXT, (CFGTOKEN.NEI), etc. Workgroup Remote Access Switch THER DVANCED PTIONS File Attributes Other Files...
ROUBLESHOOTING We include the following chapters in the Troubleshooting segment of the User’s Guide: • System Verification After your CyberSWITCH has been configured, and before proceeding with normal system operations, you may want to verify that the system is functional. System Verification provides instructions for verifying the system hardware and system configuration.
YSTEM ERIFICATION VERVIEW After your CyberSWITCH has been configured, and before proceeding with normal system operation, it is necessary to verify that the system is functional. This chapter provides instructions for verifying the system hardware and system configuration. You only need to perform the verification procedures for the options that apply to your configuration.
Data Link up: <slot #> <port #> <ces> Depending on the resource switch type, the system will delay up to 2 minutes before attempting to bring up the data links.
If you see these IP router initialization messages, then the IP router is operational. If these IP router initialization messages are NOT displayed, refer to Diagnosis chapter. Bridge Initialization NITIALIZED Workgroup Remote Access Switch YSTEM ERIFICATION Verifying Bridge is Initialized LAN Attachment...
USER’S GUIDE ERIFYING A EDICATED To verify a dedicated connection to the CyberSWITCH, the WAN lines that are connected to the system must be available for use, and the routing option must be properly initialized. To verify that you have a dedicated connection: View the system messages by entering the following console command: dr <return>...
Authentication initially disabled. A client PC on the LAN of the remote device must a user ID and password for a user level database on an off-node server. Both databases must be enabled and available. of the Problem Diagnosis chapter. ONNECTIVITY ECURITY Workgroup Remote Access Switch YSTEM ERIFICATION Verifying an X.25 Connection Remote Device Connectivity...
Page 358
It also uses the “ping” command. The “ping” command sends a packet to a specified host, waits for a response, and reports success or failure. Substitute the equivalent command on your network. WORKGROUP REMOTE ACCESS SWITCH LINE LINE...
The steps to verify the operation of IP Host mode feature over a LAN connection are: Determine if the CyberSWITCH can access the local IP host. Type: ip ping 100.0.0.2 PERATIONAL PERATIONAL CONNECTION Workgroup Remote Access Switch YSTEM ERIFICATION Verifying IP Host Mode is Operational IP Host Initialization of the...
USER’S GUIDE If a message similar to the following is displayed, the IP host mode feature over the specified LAN port is operational. Repeat this step for each LAN port on your Ethernet resource. 100.0.0.2 is alive If this message is not displayed, then the IP Host mode feature over the LAN connection is not operational.
CSX1200 WORKGROUP REMOTE ACCESS SWITCH POWER SERVICE 10BASE-T 100.0.0.0 To verify IP Routing over a LAN connection: Determine if the CyberSWITCH can access the local IP host. On the administration console type: ip ping 100.0.0.2 <return> Issuing this command will result in a response similar to the following: 100.000.000.002 is alive...
Page 362
USER’S GUIDE WORKGROUP REMOTE ACCESS SWITCH CSX1200 100.0.0.0 Host A 100.0.0.2 The steps to verify the operation of IP routing over a WAN interface are: Determine if a remote IP host can access the WAN interface of the CyberSWITCH over the WAN connection.
Host) interface is operational. Repeat the above steps for each WAN (Direct Host) interface through which you wish to get access. If the remote IP host CANNOT ping to the local IP host, refer to Host) Interface Connection WAN (D IRECT NTERFACE CSX1200 LINE LINE LINE LINE POWER SERVICE...
Determine if a remote IP host can access the local IP host through the CyberSWITCH over the WAN connection. On the remote IP host type: ping 100.0.0.2 <return> CyberSWITCH WAN R LAN I EMOTE NTERFACE CSX1200 192.100.1.1 LINE LINE LINE LINE POWER SERVICE...
It uses IP addresses specific to the example. Substitute the IP addresses of your network when you perform the IP routing verification steps. It also uses the “ping” command. The “ping” command sends a packet to a specified host, waits for a response, and reports success or failure. CSX1200 "SITE1" WORKGROUP REMOTE ACCESS SWITCH...
USER’S GUIDE IP F ERIFYING ILTERS To verify that IP Filters are functioning, perform the following test: Configure and apply at least one IP filter that contains at least one condition whose action is to DISCARD the matching packet. Perform a trace on discarded packets. On the administration console issue the command: ip filter trace discard <return>...
It uses IP addresses specific to the example. Substitute the IP addresses of your network when you perform the verification steps. It also uses the netstat administration console command. The netstat command displays the IP routing table of the system. Substitute the equivalent command on your IP host. CSX1200 "SITE1" WORKGROUP REMOTE ACCESS SWITCH LINE...
Below is an example of a configuration used to verify IP RIP output processing on a WAN interface. It uses IP addresses specific to the example. Substitute the IP addresses of your network when you CyberSWITCH LAN I NTERFACE Router 1 128.1.1.1 CSX1200 LINE LINE LINE LINE POWER SERVICE...
Determine if system has learned the route to 192.1.2.0 from the Router. On the CyberSWITCH administration console: Type: ip route <return> If the route to 192.1.2.0 is displayed, the IP RIP input processing is operational. If the route is NOT displayed, refer to Diagnosis chapter. CSX1200 Dedicated Connection LINE LINE LINE LINE...
The example also uses NetWare commands available for the Windows 95 workstation. Substitute the equivalent commands on your NetWare client. "SITE1" CSX1200 WORKGROUP REMOTE ACCESS SWITCH LINE LINE POWER...
Problem Diagnosis chapter. LAN C ONNECTION in the Problem Diagnosis chapter. ONNECTION is the IPX Network Number is the router’s MAC address IPX Routing over the Remote LAN Connection Workgroup Remote Access Switch YSTEM ERIFICATION Verifying IPX Routing is Operational...
USER’S GUIDE IPX R ERIFYING OUTING OVER A To verify the operation of IPX Routing over a WAN connection: Determine if NetWare Client A can see the remote NetWare Server “remote.” To do this, activate NetWare Client A’s desktop network neighborhood feature. Then check to see if “remote”...
Below is an example of a configuration used to verify AppleTalk Routing operation. It uses AppleTalk addresses, zones and resource names specific to the example. Substitute those of your network when you perform the AppleTalk Routing feature verification steps. CSX1200 "Site1" WORKGROUP REMOTE ACCESS SWITCH...
USER’S GUIDE ERIFYING PPLE OUTING The steps to verify the operation of AppleTalk Routing feature over a LAN connection are: Determine if the local Macintosh can see all zones. Bring up the Chooser on the Local Mac: If a list of all zones (Left Zone and Right Zone) appear in the Chooser as shown above, then the AppleTalk Routing over a LAN connection is operational.
MIB objects are ds , udp stats , ip stats, and snmp stats. AppleTalk Routing Operation Over the WAN Connection SNMP in the Problem Diagnosis chapter for Workgroup Remote Access Switch YSTEM ERIFICATION Verifying SNMP is Operational in the Problem...
USER’S GUIDE ERIFYING THE To perform the Dial Out verification for a remote device, you need to know the configured device name associated with the device’s device table entry. Note that the device name is case sensitive. If you already know the device name, skip to step 4. Otherwise, begin the verification process with step 1.
USER’S GUIDE Set up two systems in a back-to-back, dedicated, BRI scenario where at least one of the systems is a PC-Platform. Configure a dedicated access between the 2 systems. The usage of a PC-platform exploits the fact that the layer 1 of a PC-based BRI board stays active even when you exit the software.
Problem DHCP Client 204.157.42.168 WORKGROUP REMOTE ACCESS SWITCH LINE LINE LINE LINE POWER SERVICE 10BASE-T CH-1 CH-2 CH-1 CH-2 CH-1 CH-2 CH-1 CH-2 SYNC D-CH SYNC D-CH SYNC D-CH SYNC D-CH CSX1200 IP Router w/ DHCP Relay Agent ("Ruby")
USER’S GUIDE Shortly after a DHCP Client is powered on, it will attempt to get its IP address from a DHCP Server. If it is successful, its IP-related features (e.g., ping, telnet, etc.) will become operational. If the client could not obtain its IP address, it will retry periodically to do so. From the DHCP Client, attempt to ping the Relay Agent (“Ruby”) that is on the same LAN: C:\>...
If neither of these error messages is found in the report log, refer to the Problem Diagnosis chapter. DHCP Proxy Client Initialization NABLED Enabling the Proxy Client PERATIONAL Workgroup Remote Access Switch YSTEM ERIFICATION Verifying DHCP: Proxy Client in the in the Problem...
If not, follow the instructions actions in the dial out verification section. ERIFYING ROXY Use the following graphic to help you in verifying that Proxy ARP is operational. When following the steps below, substitute your addresses for the addresses used in the example. CSX1200 "Site1" WORKGROUP REMOTE ACCESS SWITCH POWER SERVICE 10BASE-T 128.168.1.x...
Page 383
ARP feature. If the target IP addresses are not shown or are mapped to MAC addresses that are not then refer to the the Problem Diagnosis chapter. YSTEM ERIFICATION Verifying Proxy ARP is Operational Proxy ARP Operation section of Workgroup Remote Access Switch...
ROBLEM IAGNOSIS VERVIEW This chapter, when used in conjunction with the correct problems encountered in the verification process. During some of the diagnosis procedures, we ask you to enter an administration console command. To enter these commands, you must have an active administration session. If you need instructions for starting an administration session, refer to ENERAL ROCEDURES...
If the line was correctly attached in action 1, try restarting the system. If actions 1 and 2 fail to correct the problem, call your phone company (carrier) to check the status of the line. has initialized correctly. Workgroup Remote Access Switch ROBLEM IAGNOSIS Bridge Initialization...
Page 386
USER’S GUIDE Problem: The system does not display the WAN line availability messages. Instead, the system displays the following message after the status console command is issued: Out Svc 1 (slot #, port #) This means that Layer 1 cannot be established, most likely due to WAN cabling problems. Action: If the system has been operational for longer than 2 minutes, verify that the line is correctly attached to the proper system resource and port.
The device indicated device database does not have a device entry corresponding to the permanent virtual circuit. Start up the run-time configuration utility CFGEDIT by entering the following console command: cfgedit For the Frame Relay PVC, change the PVC name to match the remote device name. ROBLEM Dedicated Connections Workgroup Remote Access Switch IAGNOSIS...
USER’S GUIDE X.25 C ONNECTIONS Problem: An X.25 access is configured, but the x.25 stats command response is: No X.25 Access configured Action: Verify that the proper line and port have been selected. Enter the er command to erase the report log. Enter the trace lapb on command.
If the system displays the following messages among the system messages: IP Call Dropped: ID_RSP was not received from remote IP Call Dropped: XID was not received from remote ROBLEM Remote Device Connectivity System Messages Workgroup Remote Access Switch IAGNOSIS...
USER’S GUIDE IP Security Rejection - Digit string wrong length IP Security Rejection - Invalid Security ID <Id string> Review the system configuration for the Device List. You can also refer to the chapter for the message meanings and the appropriate actions to be taken. The first two messages indicate that the system did not receive the required protocol data.
Try to ping the Host from another device on the LAN. If this is also unsuccessful, this may indicate a problem with the Host. CONNECTION System Commands chapter.) If the ARP cache entry for the Workgroup Remote Access Switch ROBLEM IAGNOSIS IP Host Mode...
USER’S GUIDE Verify that the hardware address (MAC address) for the IP Host in the CyberSWITCH’s ARP cache is correct. If it is not correct, verify the configuration in the IP Host. IP H PERATION OVER THE Problem: The remote IP Host connected to a WAN RLAN interface on the CyberSWITCH does not receive a ping response from the WAN RLAN interface.
Verify that the remote IP Host is initiating a call to the CyberSWITCH. Since the LAN interface has an IP address assigned with a different network number than the one for the remote IP IP Routing Over Interface Connections ONNECTION Remote Device Workgroup Remote Access Switch ROBLEM IAGNOSIS Connectivity.
USER’S GUIDE Host, the remote IP Host may need a proper route entry for the local network where the CyberSWITCH is located. Make corrections to the remote IP Host configuration. Problem: The remote IP Host connected to a WAN interface on the CyberSWITCH does not receive a ping response from the local IP Host.
If the proper interface does not exist, use CFGEDIT to make the necessary corrections. IP Routing Over Interface Connections Verifying IP Routing Over a LAN Interface NTERFACE ONNECTION Remote Device Connectivity. Workgroup Remote Access Switch ROBLEM IAGNOSIS in the...
USER’S GUIDE Verify that the remote bridge device is initiating a call to the CyberSWITCH. Since the CyberSWITCH LAN interface has an IP address assigned with a different network number than the one for the remote IP Host, the remote IP Host may need a proper route entry for the local network where the CyberSWITCH is located.
[IP RIP] Initialization failed, unable to allocate buffers [IP RIP] Unable to open RIP/UDP port 512 Action: There is an unexpected condition present within the CyberSWITCH software. Contact Customer Support. ROBLEM Workgroup Remote Access Switch IAGNOSIS IP RIP...
USER’S GUIDE IP RIP O UTPUT ROCESSING ON A Problem: The local IP Host does not display the correct route entry, for example, the IP Host does not seem to be learning route information from the CyberSWITCH via RIP. Action: Using the ipnetif Manage Mode command, verify that the IP RIP Send Control is set to a RIP version that the IP Host can understand.
Refer to page 398 for instructions regarding check RIP versions. Support. WAN I NTERFACE page 398 for instructions regarding check RIP versions. page 398 for instructions regarding checking the WAN I NTERFACE Workgroup Remote Access Switch ROBLEM IAGNOSIS IP RIP...
USER’S GUIDE Enter the ip rip stats administration console command. Look for the IfStatRcvResponses counter for the interface. This statistics is the number of RIP update messages received on the interface. If the total number of these counters is 0, check the Router to verify that it is configured to send IP RIP update messages.
Data is not forwarded from the remote bridge to the router over the Remote LAN interface. Action: Check the configuration: Verify Remote LAN interface configuration. Refer to details. LAN C ONNECTION Configuring IPX Network Interfaces Remote LAN Devices Configuring IPX Network Interfaces Workgroup Remote Access Switch ROBLEM IAGNOSIS IPX Routing for details.
USER’S GUIDE Verify device configuration on remote bridge. Bridge devices should be configured to make calls over the interface defined to go to the router. Problem: The router does not forward typical data (RIP, SAP, Type 20 packets) to the remote bridge. Action: Make sure a call is up.
Run CFGEDIT. From Options, select IPX Routing. Select IPX SAP Table maximum number... Increase the size of the table based upon your calculations. ABLES Workgroup Remote Access Switch ROBLEM IAGNOSIS IPX Routing and Service Tables...
USER’S GUIDE RIP/SAP S RIGGERED TART Problem: The CyberSWITCH does not display a triggered RIP/SAP starting message for a WAN peer. Action: Verify that the WAN peer is properly configured. Issue the device command in Manage Mode to display the current Device List. Or, you may view the WAN peer list through CFGEDIT, Options, IPX Configuration, Triggered RIP/SAP.
CSX1200 "Site1" WORKGROUP REMOTE ACCESS SWITCH POWER SERVICE 10BASE-T CH-1 SYNC Net Range: 10-11 Zone: Left Zone Local Mac PPLE OUTING NITIALIZATION Problem: The CyberSWITCH does not display the correct AppleTalk Routing Initialization messages. Action: Check the system configuration. Make sure that the AppleTalk feature is enabled for the system.
Page 406
USER’S GUIDE If EtherTalk is selected, and no zones are displayed, then contact your Distributor or Customer Support. If you are using Open Transport, verify that Local Mac has chosen a proper AppleTalk address within the valid network range (this would be 10-11 for the AppleTalk control panel as shown below: If the Network Range is correct and the AppleTalk address is not within that range, then try to close the AppleTalk control panel once, and then reopen it.
Make sure that the information on the remote CyberSWITCH (labeled Site 2 in the example network) contains a proper AppleTalk address, and that Make calls for AppleTalk data for the device is enabled. CONNECTION Workgroup Remote Access Switch ROBLEM IAGNOSIS AppleTalk Routing...
USER’S GUIDE If the remote resources can not be seen even when the connection is up, then make sure the AppleTalk address of the remote device is valid. If the remote device is on an unnumbered network, then AppleTalk an address of 0.0 must be configured for the remote device in the device table.
Page 409
Use CFGEDIT to change the MIB access level of the indicated Community Name to the desired access level or change the configuration of your Network Management Station so that it uses a Community Name that has the desired MIB access level. ROBLEM Workgroup Remote Access Switch IAGNOSIS SNMP...
USER’S GUIDE Problem: A Dial Out call was not completed successfully. Action: If you issued the call device <device name> console command to initiate the call, check to see that you entered the device name correctly. Device names are case sensitive. If you issued the call peer <telephone number data rate>...
Check that the priority value that you assigned in the CFGEDIT Call Detail Recording menu (default of 38) matches the priority setting on your syslog server (default of auth.info). Cause Code table. If help is necessary to resolve the Workgroup Remote Access Switch ROBLEM IAGNOSIS Call Detail Recording...
USER’S GUIDE OMPRESSION Problem: Compression is not established for a device for which it is expected. Action: Issue the cmp stats console command then issue the dr console command to check the message report log. A message will inform you if the compression failed due to memory constraints.
Check the DHCP configuration. This can be done by using CFGEDIT, or by using the dhcp command from Manage Mode. Make sure that the Relay Agent is enabled. CFG REQ Id=0xEC Len=9 Hist Count: 01 Chk Mode: 0x03 (SEQ#) TERM ACK Id=0xEC Len=4 Workgroup Remote Access Switch ROBLEM IAGNOSIS DHCP: Relay Agent...
USER’S GUIDE If desired, enter MANAGE mode, and use the dhcp change command to enable the Relay Agent. (Note: CFGEDIT can also be used to change the Relay Agent configuration; but the changes will not take effect until the system is restarted.) When Manage Mode is exited, an attempt will be made to enable the Relay Agent.
Check the DHCP-related configuration for WAN and WAN (Direct Host) IP network interfaces which should have IP addresses obtained from DHCP servers for them. Use CFGEDIT, or use the ipnetif command from Manage Mode. Correct if necessary. ROBLEM DHCP: Proxy Client Workgroup Remote Access Switch IAGNOSIS...
USER’S GUIDE Make sure that the maximum addresses to obtain for the interface is non-zero. Make sure that the number of addresses to pre-fetch for the interface is non-zero. The DHCP Server must be configured to distribute addresses to clients on the DHCP Client’s subnetwork.
Page 417
On both platforms, issue the iproute manage mode command to make sure that each system knows about the IP subnet at the other Ethernet segment. If the two IP host devices still can not communicate with each other, contact your Distributor or Customer Support. ROBLEM Proxy ARP Operation Workgroup Remote Access Switch IAGNOSIS...
LED I NDICATORS VERVIEW The front panel of the CyberSWITCH has several LED indicators. The POWER indicator will remain lit while the unit is on. There is a series of three LAN indicators: they will light to indicate transmissions, receptions, or good link integrity on the 10Base-T port. The bank of WAN indicators provide you with the status of each WAN line.
LANVIEW LED CSX1200-E11-MOD) The LANVIEW LEDs are located on the hub portion of the CSX1200-E11-MOD’s back panel. These LEDs are convenient troubleshooting tools that can help you diagnose power failures, collisions, cable faults, and link problems. There are three categories of LANVIEW LEDs: Receive LEDs, Collision LEDs, and Link LEDs.
TATUS The NT1 Status LEDs are located between the S/T and U-interface jacks for each port on the CSX1200-U4-MOD’s back panel. These LEDs are convenient troubleshooting tools to help diagnose NT1 and related link problems on a port-by-port basis. U and S/T active (ON)
USER’S GUIDE ERVICE NDICATOR The Service indicator comes on normally during system power-up, and then goes off. If the Service indicator remains lit or blinks after power-up, it is signaling that something needs attention in the system. Refer to the section below that pertains to the Service indicator’s activity. Also, you may access your administrative console for further information (issue the dr console command to view system messages).
Communications error during recovery of SSB Incompatibility between FSB* and new SSB versions Currently not used Bad address information contained in SSB received during recovery SSB, received during Recovery, contained a bad checksum for entire image Workgroup Remote Access Switch LED I NDICATORS Service Indicator...
Lights up when layer 1 detects a qualified unframed all ones signal. AIS may be generated by intermediate device (the equipment between the 1200 and the switch) when the intermediate device sees an improper receive signal (or lack of signal) from the switch.
Page 425
Lights up when layer 1 has detected a qualified loss of frame condition (excluding AIS). A loss of frame condition occurs when signals are still being received by the switch, but the 1200 can not detect the frames in the receive path.
Page 426
YSTEM ESSAGES VERVIEW System Messages provide useful system information. They are listed in the system’s report log, a memory resident table. To manipulate the report log, use the following commands at the administrative console: dr or ds er or es wr or ws When the CyberSWITCH writes system messages to disk, it stores them in the following locations: Directory:...
For point-to-point lines, status messages will more accurately reflect the status of the data link and/or line. This is because the data link remains up even though a call has been terminated. LED Indicators chapter. Note the number of blinks in the Workgroup Remote Access Switch YSTEM ESSAGES Informational Messages...
USER’S GUIDE PANNING ESSAGES The Spanning Tree protocol is only supported by the Ethernet-2 interface card. Spanning Tree protocol messages are prefaced with [STP]. During normal operation, when Spanning Tree protocol is enabled, the system may report informational messages such as: [STP] A new Root Bridge has been detected [STP] LAN Port <port #>...
Page 429
Passwords may only be changed via the ACE Server administrator initiation. During an administrative login, the user attempted to change password. ACE only supports password change initiated by ACE Server administrator. AppleTalk routing initialized successfully. This message is posted when the system AppleTalk routing feature has initialized successfully. Workgroup Remote Access Switch...
Page 430
USER’S GUIDE AppleTalk routing RTMP initialization error, AppleTalk disabled AppleTalk is disabled because there is an initialization problem with the Routing Table Maintenance Protocol (RTMP). Contact your distributor or Customer Support. AppleTalk routing ZIP initialization error, AppleTalk disabled AppleTalk is disabled because there is an initialization problem with the Zone Information Protocol (ZIP).
Page 431
The < interface name> is not in the remote Authentication server’s database. The < interface name > is entered incorrectly in the remote Authentication server’s database. YSTEM System Message Summary Workgroup Remote Access Switch ESSAGES...
Page 432
USER’S GUIDE [AUTH] RADIUS IP HOST rejected IP Host id: <IP host Id> The remote Authentication server rejected the IP Host id. This indicates that one of the following has occurred: The <IP Host Id> is not in the remote Authentication server’s database. The <IP Host Id>...
Page 433
The System could not obtain enough internal resources for the user authentication operation. Contact your Distributor or Customer Support. [AUTH] Warning code: 0009 Server failed message digest test A message received from the authentication server did not have the correct authenticator field value. YSTEM System Message Summary Workgroup Remote Access Switch ESSAGES...
Page 434
USER’S GUIDE [AUTH] Warning code: 0010 Received unexpected authentication response code from server A message was received from an authentication server that contained an invalid response message identifier. [AUTH] Warning code: 0011 An unexpected server responded to the access request An access response message was received from an authentication server that is not configured in the System.
Page 435
Call Rejected, No Called TN IE The switch did not deliver an Information Element for the call. This problem normally occurs if you are connected to a point-to-point line and have the System configured for a multipoint line. If you are connected to a multipoint line and get this message, call your phone company and report the problem.
Page 436
USER’S GUIDE Call Restriction statistics reset for new day Call Restriction device information. Call Restriction statistics reset for new month Call Restriction device information. Call Restrictions will allow calls to be made this hour Call Restriction device information. Call Restrictions will allow calls, but this hour is restricted Calls are restricted during this hour but the action configured is to “Warn”.
Page 437
The system will revert to its original level and the upgrade process will not be allowed. Contact your Distributor or Customer Support. Note: Duplicating serial numbers on all systems is a license violation. YSTEM System Message Summary Workgroup Remote Access Switch ESSAGES...
Page 438
USER’S GUIDE Cause <cause code> received for DLCI <dlci index> A CLLM message was received indicating that the PVC associated with the indicated DLCI is subject to the event denoted by the indicated cause code. These events are listed below with their corresponding cause code: Cause Code CB disconnect:(1) Password Incorrect...
Page 439
Monitor Connection window may show brief periods (<1 second) where the indicated Bandwidth suddenly increases and then decreases. This is due to the changeover between Frame Relay and switched calls and is not a problem. YSTEM System Message Summary Workgroup Remote Access Switch ESSAGES...
Page 440
USER’S GUIDE CNTR-TMR:Timed out waiting for TMR <number> interrupt! The i386s specified timer did not respond during a POST testing its interrupt capabilities. The boot process should continue; however, make note of the error message in the event of a future problem. Configured adapter # ’x’...
Page 441
IP network interface’s LAN port on which the DHCP server is to be reached. This will result in no IP addresses being obtained for the network interface in question. Contact your Distributor or Customer Support. Workgroup Remote Access Switch...
Page 442
USER’S GUIDE [DHCP-P] Proxy Client disabled This message indicates that the DHCP Proxy Client has been successfully disabled. This message will appear after the DHCP Proxy Client has been disabled from Manage Mode. [DHCP-P] Proxy Client enabled This message will appear whenever the DHCP Proxy Client has been successfully enabled. This could be during system initialization (if configuration values have enabled it), or after the DHCP Proxy Client has been enabled from Manage Mode.
Page 443
DM card in slot <slot # > in unknown state The Digital Modem card is in an unrecognizable state. Reseat the card in its ISA slot, and/or check the MVIP cabling. If the problem persists, contact your Distributor or Customer Support. Workgroup Remote Access Switch...
Page 444
The system was unable to initialize the Digital Modem in the specified slot correctly. Check all switch and/or jumper settings on the board to ensure they match the values in CFGEDIT. If the board is configured properly, and this message still appears, contact your Distributor or Customer Support.
Page 445
ECP negotiation failed to converge Verify compatible encryption parameters on each side of the link. EDRV transmit error <error code> An error was returned upon the software’s request to transmit a data frame. Contact your Distributor or Customer Support. Workgroup Remote Access Switch...
Page 446
Error loading WAN board, data verify error: adapter ’x’ The WAN card initialization subsystem encountered an error during download verification. The specified adapter card may be faulty. Contact your Distributor or Customer Support. CyberSWITCH switch settings.
Page 447
If seen repeatedly, the above message indicates a problem with your file system. Contact your Distributor or Customer Support. Error reading file \system\ethernet2.bin,section = <file type> The specified section of the LAN adapter executable file could not be read. Check for proper software installation. Workgroup Remote Access Switch...
Page 448
Facility not subscribed - Slot=<slot # > Port=<port # > This probably indicates a SPID configuration error on the indicated line. The configuration should be corrected on the system or the switch. Failed to allocate enough memory for XILINX load file The WAN card initialization subsystem failed to allocate a buffer for use in downloading files.
Page 449
Below are possible error messages and their corresponding definitions: DISC rcvd The Network has sent a Layer 2 DISC (Disconnect), terminating the data link. An attempt will be made to re-establish the data link after a switchtype-dependent delay. YSTEM System Message Summary Workgroup Remote Access Switch ESSAGES...
Page 450
USER’S GUIDE DM rcvd The Network will not allow establishment of the data link at this time. An attempt will be made to re-establish the data link after a switchtype dependent delay. MDL_ERR_RESP rcvd The Network has not responded to TEI requests - no data link was established. An attempt will be made to re-establish the data link after a switchtype dependent delay.
The administrator must change the PVC configuration on one of the devices. Frame Relay event queue full Indicates a lack of system resources to handle the level of traffic being experienced. Contact your Distributor or Customer Support. YSTEM System Message Summary Workgroup Remote Access Switch ESSAGES...
Page 452
USER’S GUIDE Frame Relay PVC connection down: Slot=<slot number>, Port=<port number> The Frame Relay PVC connection is down for the indicated slot and port number. Frame Relay PVC connection up: Slot=<slot number>, Port=<port number>, DLCI=<DLCI index> The Frame Relay PVC connection is up for the indicated slot, port, and DLCI index. FrBufFree: error <error code>...
Page 453
A failure was encountered by the IP subsystem during initialization processing. IP made an unsuccessful attempt to add a “static” address to the IP Address Pool. An unknown error code was returned by the IP Address Pool Manager. Contact your Distributor or Customer Support. Workgroup Remote Access Switch...
Page 454
USER’S GUIDE [IPAP] ResMem returned invalid device maximum value (x) A memory allocation failure was encountered by the IP Address Pool Manager during initialization processing. Contact your Distributor or Customer Support. [IP] Cannot get system memory for xxxx There is not enough system memory available for IP software to operate (“xxxx” is a variable name internally used).
Page 455
There is another WAN (Direct Host) type interface that is configured for the LAN port indicated, and it was already initialized successfully. This means that there are multiple WAN (Direct Host) type interfaces configured for the same LAN port. Use CFGEDIT to specify primary or secondary interface. Workgroup Remote Access Switch...
Page 456
USER’S GUIDE [IP] WAN (Direct Host) Interface <WAN interface name>, invalid associated LAN interface <LAN interface name> The WAN (Direct Host) type interface could not come up; the associated LAN network interface, specified by configuration, was not found. Use CFGEDIT to delete old WAN (Direct Host) interface.
Page 457
You can use the packet capture commands to try to determine if a device is advertising an unusual number of routes. If you are unable to track down the problem, contact your Distributor or Customer Support. Workgroup Remote Access Switch...
Page 458
USER’S GUIDE [IP RIP] Unable to open RIP/UDP port 520 The UDP port for RIP was unable to be opened. There are 63 possible UDP ports, and none are available for use at this time. No RIP information can be transmitted or received. Contact your Distributor or Customer Support.
The internal network number of the system must be changed to ensure proper IPXWAN negotiation to occur. [IPXWAN] IPX Internal Network Number must be configured. You must configure a valid internal network number in order for IPX routing to work properly. Workgroup Remote Access Switch...
Page 460
USER’S GUIDE L3_CallRefSelect Call Reference wrapped Status message indicating that Layer 3’s call reference value has wrapped. If this message is posted frequently, report the problem. LAN Adapter Abort The Ethernet adapter or subsystem is being interrupted as part of the error recovery process. If the system fails to operate normally, or the warning continues to occur, then report the event using the problem reporting form included in Getting Assistance.
Page 461
LAN Port <port # > detected open LAN media The system detected a problem with the physical LAN on the indicated port. The LAN is not properly terminated or the LAN is not fully connected to the system. Check for proper LAN installation. Workgroup Remote Access Switch...
Page 462
USER’S GUIDE LAN Port <port # > detected shorted LAN media The system detected a problem with the physical LAN on the indicated port. The LAN is not properly terminated or the LAN is not fully connected to the system. Check for proper LAN installation.
Page 463
Contact your Distributor or Customer Support. Mild congestion CLLM received for DLCI <dlci index> A CLLM message was received indicating mild congestion may be expected on the PVC associated with the indicated DLCI. Workgroup Remote Access Switch...
Page 464
Mismatch of configured and installed DM card in slot <slot # > The switch and/or jumper settings on the specified Digital Modem card are not properly set to match how the card is configured in software. Check the hardware and software configuration and restart.
Page 465
The indicated line does not support SPIDs; however, a SPID is configured for use on the line. Is the SPID configured incorrectly? Do you have the right switch type? Check the configuration. If the message persists, contact your BRI provider to determine corrective action.
Page 466
No UA seen in response to SABMEs - Slot=<slot # > Port=<port # > Ces=<communication endpoint suffix> Layer 2 cannot be established between the system and the switch. This could be a TEI configuration mismatch between the system and the switch for the indicated line. Check the configuration of the system.
Page 467
TEI to be configured TEI value AUTO is 0 change TEI to be non- if problem happens auto for over 5 minutes, report problem to phone company Workgroup Remote Access Switch YSTEM ESSAGES System Message Summary...
Page 468
USER’S GUIDE [PAP] Remote device rejected System Information <error message> The system received the PAP Authenticate-Nak packet with the error message <error message> against the previous PAP Authenticate-Request sent by the system. The <error message> is from the remote device, and is device-specific. Contact the remote site for assistance. [PAP] Unknown name <name>...
Page 469
RBS_out_SM<channel # >: Timeout waiting for WINK. The system went off-hook and the switch never “winked” back, going off-hook for a specified amount of time and then returning to on-hook. The switch must wink back in order to tell the Workgroup Remote Access Switch...
Page 470
USER’S GUIDE system to start dialing. Contact the telephone company and ensure that the line is configured for wink-start. RBS: Unexpected event chan = <channel # >, state = <state ID> An illegal signaling event occurred in the RBS task on the specified channel. Ensure that the line is configured correctly and that it is using the expected RBS protocol.
Page 471
System Device table. Security Rejection - No Bridge Address given by caller A normal Bridge Security negotiation packet was received, but did not contain a bridge address. Check configuration. If problem persists, contact your Distributor or Customer Support. Workgroup Remote Access Switch...
Page 472
USER’S GUIDE Security Rejection - No Password given by caller A properly formed Bridge Security negotiation packet was received, and the bridge is registered in the system Device Table, but a password is required and none was provided by the calling bridge. Check configuration.
Page 473
[SNMP] Unable to obtain an SNMP Trap queue header The SNMP Agent attempted to generate a TRAP PDU but was unsuccessful because it could not obtain necessary memory. The TRAP was not sent. Contact your Distributor or Customer Support. YSTEM System Message Summary Workgroup Remote Access Switch ESSAGES...
Page 474
USER’S GUIDE SPID FSM got unidentifiable INFO msg - Slot=<slot # > Port=<port # > Ces=<communication endpoint suffix> An unexpected information message was received from the network on the indicated line. If you are having trouble establishing calls on this line, the problem should be reported to your phone company.
Page 475
The remote device will only accept the stream connection if the MTU is set to be > 1514. Check to make sure that the remote device and the CyberSWITCH MTU value is set to > 1514. Workgroup Remote Access Switch...
Page 476
The specified release of System software was successfully loaded into memory. Switch could not recognize phone number nnnnnnn The switch did not accept the phone number dialed as a complete number. Check the correctness of the phone number (including any leading digits such as 8 or 9).
Page 477
The TFTP protocol received a packet that was too big. There may be a problem with the specified file; try replacing it. If this message appears consistently, contact your Distributor or Customer Support. YSTEM System Message Summary Workgroup Remote Access Switch ESSAGES...
Page 478
USER’S GUIDE [TFTP] Local error # 13: Received unexpected opcode <filename> The TFTP protocol received a packet that was not expected. There may be a problem with the specified file; try replacing it. If this message appears consistently, contact your Distributor or Customer Support.
Page 479
The call deflection selection is prior to CCITT 1988 Verify that the facilities provided by the service provider are CCITT 1988. The call has been disconnected A call has been up longer than the amount of time configured and has been taken down. Workgroup Remote Access Switch...
Page 480
Timeout on SPID Exchange - Slot=<slot# > Port=<port # > Ces=<communication endpoint suffix> SPID exchange was not completed in time (i.e., switch never responded to the SPID). Check switch configuration to make sure the correct SPID value has been entered.
Page 481
A Digital Modem dial-out call was attempted, and the system was unable to open a resource to place the call. Using the modem status command, check to ensure that there are usable modems available. If there are, and the problem persists, contact your Distributor or Customer Support. Workgroup Remote Access Switch...
Page 482
USER’S GUIDE Unable to Identify a remote device A device that was not identified by any active security measures (for example, PAP or CHAP) was rejected. Unable to Identify a remote device - <calling line id A device that was not identified by any active security measures (for example, PAP or CHAP) was rejected and is identified by its Calling Line Id.
Page 483
WAN port connections used by the bridge are now entering the specified state. WAN Port is now in the <new state> state The WAN connection port used by the bridge is entering the specified new state. Workgroup Remote Access Switch...
Page 484
USER’S GUIDE WAN: RBS Not Available on this card. A RBS debugging command was attempted on a PRI card that is not configured for RBS. Check the card configuration and ensure you have the proper type of card. Watchdog timeout detected on DM board in slot <slot # > The Digital Modem card in the specified slot is not functioning properly.
Page 485
X25 facilities warning, charge inform not available The service provider does provide charging information. No action required. X25 facilities warning, call redirect notification not available The service provider does provide call redirect information. No action required. Workgroup Remote Access Switch...
Page 486
USER’S GUIDE X25 facilities warning, NUI not available Network device identification not available. No action required. X25 permanent virtual circuit down: Access=<access index>, PVC=<PVC index>, LCN=<LCN> The indicated X.25 virtual circuit is down. Switched backup connections will be used, if available. This message will occur if the other system is down, or if the network interface line is not connected, or if the authentication of the remote device failed.
Page 487
RACE ESSAGES VERVIEW Trace messages include the following categories of messages: Call Trace Messages IP Filter Trace Messages PPP Packet Trace Messages WAN FR_IETF Trace Messages X.25 Trace Messages X.25 (LAPB) Trace Messages Before trace messages can be logged to the system report log, you must first enable the type of trace you would like to use.
A feature of the CyberSWITCH console is the ability to save and display a record of the high level ISDN calls between the system and the local telephone switch. If calls are unable to be completed, this is normally the first area to look.
Page 489
These tone values indicate a temporary network failure. Check the outbound phone number and try again. If the problem persists, contact your phone company. Expensive routing tone on Informational call trace message. Workgroup Remote Access Switch...
Page 490
USER’S GUIDE In - ABNORMAL RPT Call Id=<call Id> Slot=<slot # > Port=<port # > ConnId=<connect Id> Ces=<communication endpoint suffix> The system has detected an internal error condition. The <parameters> are included for your Distributor or Cabletron Customer Support. An error message describing the problem should be reported following this trace message.
Page 491
The system has received a call proceeding message from the network. This is usually received in response to sending a call request. The Call Id and Ces values are included for your Distributor or Cabletron Customer Support. The remaining parameters are used to report line details. Workgroup Remote Access Switch...
Page 492
USER’S GUIDE In - PROGRESS Call Id=<call Id> Slot=<slot # > Port=<port # > Chans=<bearer channel map> CauseLoc=<cause location> Cause=<cause value> Signal=<signal value> ProgLoc=<progress location> Prog=<progress value> Ces=<communication endpoint suffix> ConnId=<connect Id> The system has received a call progress message from the network. This is usually received in response to sending a call request.
Page 493
Informational call trace message. It is used to indicate additional details on the <signal value> received in the “call progress” information message. The <tone value> is displayed as one of the following: dial, ring back, answer, call waiting, off hook warning, custom, recall dial, stutter dial, or expensive routing. Workgroup Remote Access Switch...
USER’S GUIDE IP F ILTERS RACE ESSAGES You can trace packets that are discarded as a result of IP Filters. Enable this feature by using the ip filter trace discard command, and disable it with ip filter trace off . Note that when you enable this feature, the report log has the potential of filling quickly.
Page 496
USER’S GUIDE • Configure Request The Configure Request is used to indicate the options that are supported by this sending device. The Request contains an option list and the desired values if they are different from the default value. • Configure ACK The Configure ACK is transmitted in response to a Configure Request.
In - X25 Call Connect LCN <logical channel number>, <number of bytes> bytes The DTE has accepted an incoming SVC call. In - X25 Clear Ind LCN <logical channel number>, <number of bytes> bytes An SVC call has been cleared by the DCE. RACE X.25 Trace Messages Workgroup Remote Access Switch ESSAGES...
Page 498
USER’S GUIDE In - X25 CONNECTION CONFIRMATION ConnId=<connection Id> Access=<access index> RemDteAddr=<x121 address or protocol/route id> The system has received a connect message from the network. This indicates that a new call is now established. In - X25 CONNECTION INDICATION ConnId=<connection Id> Access=<access index > RemDteAddr=<x121 address or protocol/route id>...
Page 499
Out - X25 DTE Restart Conf LCN <logical channel number>, <number of bytes> bytes The DTE is confirming that all virtual circuits have been reset. Out - X25 DTE RNR LCN <logical channel number>, <number of bytes> bytes The DTE is not ready to receive more data packets. Workgroup Remote Access Switch...
USER’S GUIDE Out - X25 DTE RR LCN <logical channel number>, <number of bytes> bytes The DTE is acknowledging 1 or more data packets received from the DCE. Out - X25 Reset Ind LCN <logical channel number>, <number of bytes> bytes The DCE is resetting a virtual circuit.
Page 501
Out - LAPB SABM The DTE is resetting the link layer. Out - LAPB SABME The DTE is resetting the link layer. Out - LAPB UA The DTE is acknowledging a SABM or SABME from the DCE. Workgroup Remote Access Switch...
YSTEM AINTENANCE This grouping of information provides information to help you maintain your CyberSWITCH once it is operating. Note that the included system statistics information may also prove valuable in troubleshooting. We include the following chapters in the System Maintenance segment of the User’s Guide: •...
Page 503
EMOTE ANAGEMENT VERVIEW Once your system is initially configured (and thus assigned an IP address), you may use a variety of methods to remotely access and manage your system. This chapter describes many of these methods. For information on first-time access (either local or remote), refer to The CyberSWITCH has various tools to manage the system remotely.
USER’S GUIDE SNMP SITE.HQ Network Management Station WORKGROUP REMOTE ACCESS SWITCH LINE POWER SERVICE 10BASE-T CH-1 SYNC SNMP: The NMS gathers information (including problem reports) from any CyberSWITCH SNMP (Simple Network Management Protocol) is a standard way of monitoring communication devices in IP networks.
Page 505
As an example, the information displayed in the dr command would be located in the MIB structure under: [private] [enterprises] [networkExpress] for background information on SNMP and details on configuring the [ih000] [ih000StatusReports] [ihStatusReportTable] Workgroup Remote Access Switch EMOTE ANAGEMENT SNMP...
Page 506
USER’S GUIDE ELNET IN_A> LAN TEST Telnet Client LAN Test Passed IN_A> LAN TEST LAN Test Passed WORKGROUP REMOTE ACCESS SWITCH LINE POWER SERVICE 10BASE-T CH-1 SYNC Remote 1 Telnet is the standard way of providing remote login service. With Telnet, any user on the LAN or WAN executing a standard Telnet client program can remotely login to the CyberSWITCH and get an CyberSWITCH console session.
CH-1 CH-2 CH-1 CH-2 CH-1 CH-2 CH-1 CH-2 SYNC D-CH SYNC D-CH SYNC D-CH SYNC D-CH CSX1200 (Sub) Network 2 CSX1200 Can fix configuration problem in SITE2 remotely through SITE1 ISDN LINE LINE LINE LINE POWER SERVICE 10BASE-T CH-1 CH-2...
USER’S GUIDE SAGE NSTRUCTIONS To access the CyberSWITCH using Telnet, you must have a Telnet client software package. A Telnet client software package is built into the CyberSWITCH. With the CyberSWITCH acting as the Telnet client, simply enter the telnet <ip address> command to Telnet into the target host.
Page 509
TFTP TFTP Client PC WORKGROUP REMOTE ACCESS SWITCH POWER SERVICE Remote 1 Remote 1 TFTP (Trivial File Transfer Protocol) is the standard way of providing file transfers between devices. With TFTP any WAN or LAN user executing a standard TFTP client program can transfer files to and from the CyberSWITCH.
Page 510
USER’S GUIDE The default file access for the GUEST user is “read” access to all files. The default file access for the ADMIN user is “read” access to the report and statistics files, and “read and write” access to all other files.
Page 511
After you have your setup complete, you must: Minimally configure the remote CyberSWITCH: switch type (US only) b. point-to-point or point-multi-point line SPIDS for DMS-100 and NI-1 lines Configure your local ISDN device using the following information:...
Page 512
CyberSWITCH site or use the call peer command to call the CyberSWITCH without configuring the phone number for the device explicitly. Modify the switch type and the line type (point-to-point or point-multipoint) to match your local ISDN line.
YSTEM OMMANDS VERVIEW Two classes of system administration commands are available on the CyberSWITCH: guest commands and administrator commands. Guest commands provide current operational information only, and are available to all security levels. Administrator commands allows access to the complete system command set. The log-in to the system controls command access.
Page 514
USER’S GUIDE logout Terminates the administration session by logging-out the current administrator. You can start another session by using one of the two log-in commands outlined above. pswd Changes the password for the current access level (administrator or guest). Your password must be a 3 to 8 nonblank character string.
Page 515
Displays a help screen outlining all of the commands that are available. br stats Displays the current system packet statistics. Refer to statistics and their definitions. Clears the administration screen. YSTEM Accessing Dynamic Management Upgrading System Software. Bridge Statistics, for a list of available Workgroup Remote Access Switch OMMANDS...
Page 516
USER’S GUIDE Displays the list of connected devices along with the data rate for each device. The output for this command contains the connection time for each device along with a detailed breakdown (per connection type) of channel usage and available data rates. If there is at least one device connected, the display will look as follows.
Page 517
“up” for the line. The dedicated access does not have to be “up” for the interface to be considered “up”. A Primary Rate (Permanent) interface is considered to be down if the serial layer 1 is “down” for the line. Viewing Operational Information Slot Port Status ---- ---- ------ down down Workgroup Remote Access Switch YSTEM OMMANDS...
Page 518
USER’S GUIDE This command pertains to semipermanent connections. This command will list each semipermanent device, as well as the connection status, initial data rate and current data rate for each semipermanent device. The connection status will be one of the following: ONNECTED The system is connected to the device at the initial data rate or greater.
Page 519
To view throughput monitoring for the selected site. Refer to the section titled Throughput Information, for details. <Esc> To exit the Connection Monitor screen. Viewing Operational Information Potential Actual X.25 Frame Relay Workgroup Remote Access Switch YSTEM OMMANDS Statistics, for a list of Viewing...
Page 520
USER’S GUIDE IEWING HROUGHPUT NFORMATION The Throughput Monitor screen displays the system throughput monitoring feature in action. To enter this screen: Issue the mc command to display the connection monitor screen. Use the <arrow keys> to move the cursor down to the specific site for which you would like to view throughput information.
Page 521
<esc> To exit the Throughput Monitor and return to the Connection Monitor screen. AVING PERATIONAL NFORMATION The following commands are used to save system operational information to disk: Writes the current system messages to disk file. YSTEM Saving Operational Information Workgroup Remote Access Switch OMMANDS...
Page 522
USER’S GUIDE Writes the current system statistics to disk file. Note: For details on these disk files, refer to the chapter titled LEARING PERATIONAL The following commands are used to clear current system operational information: Erases the current system messages held in memory. Erases the current system statistics held in memory.
Page 523
Used only when you need to update the system software. It prepares for a software update by rebooting the system. When you receive the message “Waiting for Download,” transfer the new software files to the system via your communications package. SWITCH Workgroup Remote Access Switch YSTEM OMMANDS Restarting the CyberSWITCH...
Page 524
USER’S GUIDE flash recover Specific to the remote upgrade of the Second Stage Boot or when recommended by the Release Notes. The SSB update should be performed only upon recommendation of Customer Support personnel. In the event that it is necessary to upgrade the SSB, this command starts the remote upgrade, and bases its update on the \system\recover1 file.
Page 525
This command will allow you to “ping” a specified device. If the ping is successful, you have connectivity to the device. If it is unsuccessful, you do not have connectivity to the device. The parameters for this command are: YSTEM AppleTalk Routing Commands Workgroup Remote Access Switch OMMANDS...
Page 526
USER’S GUIDE dnet Required parameter. The destination network number. dnode Required parameter. The destination node Id. timeout Optional parameter. The number of seconds to wait for a reply message. The valid range is from 1 to 60 seconds. The default value is 10 seconds. nnnn Optional parameter.
Page 527
For LAN ports only. Indicates the Ethernet resource’s port number associated with this AppleTalk LAN port. physical address For LAN ports only. The device’s MAC address. remote device For WAN UnNumbered ports only. The remote device configured to use this port. YSTEM AppleTalk Routing Commands Workgroup Remote Access Switch OMMANDS...
Page 528
USER’S GUIDE atalk port stats [clear] This command will display or clear current AppleTalk port statistics. Refer to Statistics, for a list of available atalk port statistics and their definitions. atalk route This command will display AppleTalk static route information. A sample output screen is shown below: network range distance...
Page 529
The AppleTalk zone name for the network that the AppleTalk port is connected to. network range Specifies the network range associated with the indicated zone. network range ------------- 225 - 226 236 - 237 Workgroup Remote Access Switch YSTEM OMMANDS AppleTalk Routing Commands...
USER’S GUIDE RIDGE OMMANDS The following commands are used to display bridging information and statistics. pkt mac Enables the MAC address monitor display. The MAC Address Monitor screen displays information contained in the LAN frames that are sent over the ISDN connections. The packets represented by the displayed MAC address pairs will not be captured unless the br pkt capture feature is on (enabled).
Page 531
Schultz, and a device configured with the name Schmidt, this message would be displayed. You would then need to enter at least call device Schu to successfully initiate a call to the device Schultz. YSTEM Call Control Commands Workgroup Remote Access Switch OMMANDS...
Page 532
USER’S GUIDE <device name> is not callable Each PPP device in the device database can have one or two phone numbers at which they can be called. This message is displayed if the device has no phone number specified. Re-enter the name, or <RET> to cancel The device name must be re-entered.
Page 533
Calling <phone number> at <data rate>, device PPP The phone number will show what is sent to the switch. Any imbedded dashes will have been removed. The data rate that is used is displayed. If an invalid data rate is entered, the default of 56 Kbps will use used.
Page 534
USER’S GUIDE with the name Schultz, and a device configured with the name Schmidt, this message would be displayed. You would then need to enter at least call device Schu to successfully initiate a call to the device Schultz. Re-enter the name, or <RET> to cancel The device name must be re-entered.
<access n> command. The <access n> is the access index that is assigned to each frame relay access during the frame relay access configuration. Compression Information Commands OMMANDS Workgroup Remote Access Switch YSTEM OMMANDS Compression Statistics, for...
Page 536
USER’S GUIDE Note that this command may be used in conjunction with all other fr commands. For example, fr a 1 lmi would be a valid command, changing the frame relay access to 1 before displaying information relating to the LMI link. fr d <DLCI m>...
The following commands are used to display IP routing information: ip addrpool Displays the current IP address pool. There are three fields displayed: address, origin, and in use: • address: lists the IP address in the pool YSTEM IP Routing Commands Workgroup Remote Access Switch OMMANDS...
Page 538
USER’S GUIDE • origin: specifies how the IP address has come to be placed into the IP address pool. If the origin is DHCP, the IP address was obtained from a DHCP server. If the origin is STATIC, the IP address was manually configured via CFGEDIT. •...
Page 539
Displays information pertaining to the routing table(s) that are maintained by the IP RIP protocol. The following example screen illustrates the output from this command. Following the table is an explanation of the fields displayed for each route. YSTEM IP Routing Commands Workgroup Remote Access Switch OMMANDS...
Page 540
USER’S GUIDE [System Name]> IP RIP ROUTES Active Routes Destination Subnet-Mask ---------------------------------------------------------------------- 3.2.0.0 255.255.0.0 3.3.0.0 255.255.0.0 192.168.5.0 255.255.255.0 4.4.4.1 255.255.255.255 0.0.0.0 Inactive Routes Destination Subnet-Mask ---------------------------------------------------------------------- 4.0.0.0 255.0.0.0 Destination The route destination. This destination may be a network number, a subnet address, or a host address.
Page 541
<IP address> Displays the routing information for the indicated device. The meaning of each displayed field for a route entry is included in the above ip route command explanation. YSTEM IP Routing Commands Workgroup Remote Access Switch OMMANDS...
USER’S GUIDE ip stats Displays the current IP related statistics. Refer to their definitions. IPX R OUTING OMMANDS IPX routing must be enabled before these commands can be used. The following commands are used to display IPX routing information: ipx ipxwan clear Clears IPXWAN statistics.
Page 543
Statistics, for a list of available statistics and IPX Route Statistics. IPX SAP Statistics, for a list of available statistics and IPX General Statistics, for a list of available statistics and Workgroup Remote Access Switch YSTEM OMMANDS IPX Routing Commands...
Page 544
USER’S GUIDE ipx trigreq [device] Generates a triggered RIP/SAP update request to the specified device. You may use this command to initiate an update request to synchronize with the routing database of a particular WAN device. ipx trigrip stats Displays the triggered RIP statistics. Refer to ipx trigsap stats Displays the triggered SAP statistics.
Packet capture commands are available for both local and remote (Telnet) connections. The following diagnostic packet commands are available: pkt [on/off] Enables or disables the Packet Capture feature. YSTEM Statistics, for a list of LAN Attachment to determine the reason for the Workgroup Remote Access Switch OMMANDS LAN Commands...
Page 546
USER’S GUIDE pkt capture [all/idle/reqd/pend/actv/none] Specifies which packets will be captured by the Packet Capture feature. A definition of each possible parameter follows. All packets will be captured. none No packets will be captured. reqd Only packets causing a connection to be requested will be captured. pend Only packets received while a requested connection is pending will be captured.
Page 548
USER’S GUIDE Banyan Vines Packet Detail Screen Packet Number Received at Time 0021 Destination Address FFFFFFFFFFFF EtherNet Type is 0BAD, Check Sum Packet Length D75D 0x001A Transport Control Dest Network Dest SubNet FFFFFFFF FFFF Packet Type Network Number Query 126697007 Hit Escape to EXIT Packet Details IP Datagram Detail Screen Packet Number...
IP HOST id of the Host logging in (<RET> to abort)? 811145678234567812345678 Send Radius Authentication Request... Please wait [AUTH] Warning code: 0002 Missing required attribute from server. Framed-Data-Rate: 64KB Missing attribute: Device-Name YSTEM RADIUS Commands Workgroup Remote Access Switch OMMANDS...
Page 550
USER’S GUIDE radius ipres Attempts an authentication session using the IP resolution. The following is an example display of the screen. [System Name]>radius ipres IP Address of the Host logging in (<RET> to abort)? 19.63.4.5 Send Radius Authentication Request... Please wait [AUTH] Warning code: 0001 Timeout.
For more information regarding the system’s Telnet client feature, refer to the Telnet section of the Remote System Management chapter. YSTEM SNMP Commands SNMP Statistics, for a list of available Statistics, for a list of available Workgroup Remote Access Switch OMMANDS...
Page 552
USER’S GUIDE telnet ? Displays the help screen for the telnet command. The help screen provides the syntax for the command described below. telnet <ip-address> [port number] Begins a Telnet session for the Telnet host at the indicated IP address. The port number is an optional parameter that can be used to specify the destination port number.
Page 553
Typically, Telnet “escape” characters have the form ‘<CTRL><char>‘ (i.e., the CTRL key + some other key must be pressed). The <value> parameter for the “set escape” command may have any of the following values: YSTEM Telnet Commands Workgroup Remote Access Switch OMMANDS...
Page 554
USER’S GUIDE • <CTRL><char>, where <char> is in the range of ASCII 'A' to ASCII '_' • <CTRL><char>, where <char> is in the range of ASCII 'a' to ASCII 'z' (note that lower case letters are converted to upper case before they are used) •...
File Transfer Complete... tftp session Displays the TFTP session information of active TFTP sessions. To get detailed information on a specific session, enter the session’s Id number when prompted. You can not display the YSTEM TFTP Commands Workgroup Remote Access Switch OMMANDS...
Page 556
USER’S GUIDE session information for a TFTP session that has terminated. The screen below illustrates the use of this command. > TFTP SESSION Id Sess-Id Local file ---------------------------------------------------------- 5 temp.txt 6 tmp 7 text.txt Select the ID of the TFTP Session to display or <RET> to cancel? 2 TFTP Session ID: Type: Server...
This command acts as a toggle switch, enabling or disabling user authentication rejection messages. If enabled, authentication rejection messages (identifying users who generated the messages) are written to the log file. To display the log file, issue the dr console command. This option is initially disabled.
USER’S GUIDE sentry ace Attempts an authentication session using ACE. The system will report whether the authentication attempted was successful or rejected. WAN C OMMANDS The following commands are used to display current system WAN diagnostic information: wan fr-ietf stats [device/fr_accessname_dlci] [prot] Displays the current frame relay IETF related statistics.
Page 559
Clears the statistics for the default VC. x25 vc stats Displays the statistics for the default VC. Refer to and their definitions. YSTEM X.25 Commands X.25 Statistics for a list of X.25 Statistics for a list of available statistics Workgroup Remote Access Switch OMMANDS...
YSTEM TATISTICS VERVIEW Statistics can either be generated by issuing the ds command to display the set of statistics known as the System Statistics, or by issuing a specific command to display statistics in a specific category. In addition to using the ds command to display the system statistics, they are also automatically written to a statistics log every 30 minutes.
You can access these statistics by issuing the ds console command. Overload The number of bandwidth overload conditions. Underload The number of bandwidth underload conditions. Idle The number of idle conditions that caused the last switched connection to be disconnected. TATISTICS Workgroup Remote Access Switch YSTEM TATISTICS Call Statistics...
USER’S GUIDE PPLE TATISTICS You may display AppleTalk protocol statistics (subdivided into six subgroups) and AppleTalk port statistics. You can display all six subgroups of the AppleTalk protocol statistics by issuing the atalk stats command, or you can display the individual subgroups by adding an extra variable to the atalk stats command.
Page 563
You can display this subgroup of AppleTalk statistics by issuing the atalk stats echo console command. atechoRequests The number of AppleTalk Echo requests received. atechoReplies The number of AppleTalk Echo replies sent. atechoOutRequests The count of AppleTalk Echo requests sent. Workgroup Remote Access Switch...
Page 564
USER’S GUIDE atechoInReplies The count of AppleTalk Echo replies received. PPLE OUTING ABLE AINTENANCE You can display this subgroup of AppleTalk statistics by issuing the atalk stats rtmp console command. rtmpInDataPkts A count of the number of good RTMP data packets received by this system. rtmpOutDataPkts A count of the number of RTMP packets sent by this system.
Page 565
The number of times the release timer expired, as a result of which a Request Control Block had to be deleted. (NBP) S TATISTICS (ATP) S TATISTICS Workgroup Remote Access Switch YSTEM TATISTICS AppleTalk Statistics...
Page 566
USER’S GUIDE atpRetryCntExceeds The number of times the retry count was exceeded, and an error was returned to the client of ATP. PPLE TATISTICS You can display the AppleTalk port statistics by issuing the atalk port stats console command. portInPackets The number of AppleTalk packets received on this port by this system.
Page 567
This counter reflects the number of reject events that have occurred since the system was loaded. This is an unsigned long integer; it will wrap after 0FFFFFFFF hex or 4,294,967,295 decimal. TATISTICS Workgroup Remote Access Switch YSTEM TATISTICS Bridge Statistics...
USER’S GUIDE OMPRESSION TATISTICS The system collects the following compression statistics for each active compression connection. These statistics can be displayed by issuing the cmp stats or the cmp stats <device name> command at the administration console. The cmp stats command will display the compression statistics for all active connections.
DHCP/BOOTP msg too small Stat incremented whenever a DHCP/BOOTP message is received with a total length less than the minimum BOOTP header length. Messages that are too small are discarded. YSTEM DHCP Statistics Workgroup Remote Access Switch TATISTICS...
Page 570
USER’S GUIDE DHCP/BOOTP invalid’op’ Stat incremented whenever a DHCP/BOOTP message is received with an’op’ field that is not equal to either BOOTREQUEST or BOOTREPLY. These messages are discarded. DHCP R ELAY GENT TATISTICS BOOTREQUEST msgs rcvd Incremented whenever the system identifies a UDP datagram as a DHCP/BOOTP BOOTREQUEST message.
Page 571
Incremented whenever an unsuccessful result is returned from UDP, when the DHCP Proxy Client was trying to send a DHCDECLINE message. DHCPOFFERSs recd Incremented whenever the DHCP Proxy Client has received a DHCPOFFER message from a DHCP server. Workgroup Remote Access Switch...
USER’S GUIDE DHCPACKs rcvd Incremented whenever the DHCP Proxy Client has received a DHCPACK message from a DHCP server. DHCPNAKs rcvd Incremented whenever the DHCP Proxy Client has received a DHCPNAK message from a DHCP server. Invalid DHCP pkts rcvd Incremented whenever the DHCP Proxy Client encounters a DHCP message that is invalid due to either of the following: •...
Page 573
(or frames) was lost. # Invalid Frame Size The number of times a frame is discarded because it exceeded the maximum frame size supported by the frame relay network. # Timed Lost Rx Frame Not currently supported. Workgroup Remote Access Switch...
Page 574
USER’S GUIDE # No Control Block Not currently supported. # NEW & Existing PVC The number of times a NEW PVC was indicated by a LMI STATUS message—but the frame relay software believed the PVC already existed. # PVC Not Configured The number of times a frame was received containing an unknown DLCI value, and hence, an unconfigured PVC.
The number of good frames discarded because there were no resources available. pkts xmit The number of packets transmitted on the LAN port. xmit errors The number of packets transmitted with errors on the LAN port. Workgroup Remote Access Switch...
Page 576
USER’S GUIDE IP S TATISTICS You can access IP statistics by using the ip stats console command. These statistics are parts of the IP Group and the ICMP Group MIB variables that are defined in RFC-1213:MIB-II. IP G ROUP TATISTICS ipForwarding The indication of whether the system is acting as an IP gateway in respect to the forwarding of datagrams received by, but not addressed to, this CyberSWITCH.
Page 577
The total number of ICMP messages that the system received. Note that this counter includes all those counted by icmpInErrors. icmpInErrors The number of ICMP messages that the system received but determined as having ICMP-specific errors (bad ICMP checksums, bad length, etc.). Workgroup Remote Access Switch...
Page 578
USER’S GUIDE icmpInDestUnreachs The number of ICMP Destination Unreachable messages received. icmpInTimeExcds The number of ICMP Time Exceeded messages received. icmpInParmProbs The number of ICMP Parameter Problem messages received. icmpInSrcQuenchs The number of ICMP Source Quench messages received. icmpInRedirects The number of ICMP Redirect messages received. icmpInEchos The number of ICMP Echo (request) messages received.
The network number portion of the IPX address of this system. ipxBasicSysName The readable name for this system. ipxBasicSysInReceives The total number of IPX packets received, including those received in error. YSTEM IPX Statistics Workgroup Remote Access Switch TATISTICS...
Page 580
USER’S GUIDE ipxBasicSysInHdrErrors The number of IPX packets discarded due to errors in their headers, including any IPX packet with a size less than the minimum of 30 bytes. ipxBasicSysInUnknownSockets The number of IPX packets discarded because the destination socket was not open. ipxBasicSysInDiscards The number of IPX packets received but discarded due to reasons other than those accounted for by ipxBasicSysInHdrErrors, ipxBasicSysInUnknownSockets, ipxAdvSysInDiscards, and...
Page 581
With the CyberSWITCH, the value of this statistic is always 1. With other products, this statistic is useful. Currently, it is not useful for the CyberSWITCH. ripIncorrectPackets The number of times incorrect RIP packets were received. ripState Represents the status of the IPX RIP feature: 1 = disabled, 2 = enabled. Workgroup Remote Access Switch...
USER’S GUIDE IPX T RIP S RIGGERED TATISTICS You can access IPX triggered RIP statistics by using the ipx trigrip stats command. trigRipUpdateRequestsSent Number of triggered RIP update requests sent. trigRipUpdateRequestsRcvd Number of triggered RIP update requests received. trigRipUpdateResponsesSent Number of triggered RIP update responses sent. trigRipUpdateResponsesRcvd Number of triggered RIP update responses received.
Number of static services configured on this router. Sap Services Number of services learned through SAP from other routers. Total Services Total number of services. Should be equal to the sum of Static and SAP services. YSTEM IPX Statistics Workgroup Remote Access Switch TATISTICS...
USER’S GUIDE Maximum Services Maximum number of services this router is configured to handle. Available Services Number of services currently available on this router. High Water Mark Peak number of services this router has used. RIP S TATISTICS You can access RIP statistics by using the ip rip stats console command. Global RIP statistics and statistics for each configured RIP interface are included.
The total number of SNMP PDUs that were delivered to the SNMP Agent and for which the value of the error-status field is “noSuchName”. snmpInBadValues The total number of SNMP PDUs that were delivered to the SNMP Agent and for which the value of the error-status field is “badValue”. Workgroup Remote Access Switch...
Page 586
USER’S GUIDE snmpInReadOnlys The total number of valid SNMP PDUs that were delivered to the SNMP Agent and for which the value of the error-status field is “readOnly”. It should be noted that it is a protocol error to generate an SNMP PDU that contains the value “readOnly”...
The number of times TCP connections have made a direct transition to the SYN-SENT state from the CLOSED state. tcpPassiveOpens The number of times TCP connections have made a direct transition to the SYN-RCVD state from the LISTEN state. Workgroup Remote Access Switch...
Page 588
USER’S GUIDE tcpAttemptFails The number of times TCP connections have made a direct transition to the CLOSED state from either the SYN-SENT state or the SYN-RCVD state, plus the number of times TCP connections have made a direct transition to the LISTEN state from the SYN-RCVD state. tcpEstabResets The number of times TCP connections have made a direct transition to the CLOSED state from either the ESTABLISHED state or the CLOSE-WAIT state.
Page 589
Displays the total number of Read Requests received. Write Requests Sent Displays the total number of Write Requests sent. Write Requests Received Displays the total number of Write Requests received. TFTP A LIENT NITIATED CTIVITY CTIVITY Workgroup Remote Access Switch YSTEM TATISTICS TFTP Statistics...
USER’S GUIDE Data Packets Sent Displays the total number of Data Packets sent. Data Packets Received Displays the total number of Data Packets received. Error Packets Sent Displays the total number of Error Packets sent. Error Packets Received Displays the total number of Error Packets received. ACK Packets Sent Displays the total number of ACK Packets sent.
Page 591
The number of times layer 1 has detected a qualified loss of frame condition; excluding AIS (alarm indication signal). Loss of Signal (RED) The number of times layer 1 has detected an all zero signal (or complete lack of signal). TATISTICS Workgroup Remote Access Switch YSTEM TATISTICS WAN FR_IETF Statistics...
Page 592
USER’S GUIDE AIS (Blue) The number of times layer 1 has detected a qualified unframed all ones signal. RAI (Yellow) The number of times layer 1 has detected a qualified RAI (remote alarm indication) signal. 1 PRI E AYER RROR TATISTICS Note: Layer 1 PRI error statistics apply to the line connected to the indicated slot.
A counter that is incremented each time a WAN board is restarted after it originally comes up. call minutes (day) The total call minutes that have been logged for the day. Workgroup Remote Access Switch...
Page 594
USER’S GUIDE call minutes (month) The total call minutes that have been logged for the month. calls (day) The total number of calls that have been made for the day. calls (month) The total number of calls that have been made for the month. X.25 S TATISTICS There are two sets of statistics available related to an X.25 access: statistics for the access itself, and...
Page 595
You can access these statistics by issuing the x25 vc stats console command. The statistics displayed will be associated with the currently selected default VC. Access Name The name of the access on which this VC resides. LCN index The index assigned to the VC LCN. Workgroup Remote Access Switch...
Page 596
USER’S GUIDE Permanent Virtual Circuit or Switched Virtual Circuit Identifies the type of VC in use. Local Address The local DTE X.121 address. Remote Address The remote DTE X.121 address. # Packets Sent count The number of X.25 data packets sent. # Packets Received The number of X.25 data packets received.
OUTINE AINTENANCE VERVIEW The information in this chapter provides instructions for performing routing maintenance on the CyberSWITCH. The information falls into the following categories: • installing/upgrading system software • executing configuration changes • performing a configuration backup and restore • obtaining system custom information NSTALLING PGRADING...
Page 598
USER’S GUIDE changes are NOT dynamic. The changes are saved in a temporary copy of configuration data, and will not affect the current run-time operation of the system in any way. To terminate the session, return to the main CFGEDIT menu. Select the save changes option. Then press <RET>...
Page 599
PPENDICES The User’s Guide includes the following appendices: • System Worksheets We have designed a set of worksheets you can fill out before you begin your CyberSWITCH configuration. Once filled out, they will contain information you will need for the configuration process.
Page 600
Worksheet. This worksheet identifies the following information for each CyberSWITCH in your network: • The resource details for each adapter in your CyberSWITCH. Note the switch type. • Details on each ISDN line attached to your CyberSWITCH. If a line has more than one SPID, use an extra worksheet line to record that SPID and its associated directory number.
System Name: _____________________ PAP Password:_______________ CHAP Secret:___________________ ESOURCES Type INES BRI Lines Name Slot Port PRI Lines Name Slot CyberSWITCH YSTEM ETAILS Slot Switch type Line type Call screen Port Framing type Line coding Synchronization type SPID Directory number Sig. method Line build-out...
Page 603
Clocking of local DTE Internal Data rate Bearer channels 56 Kbps 64 Kbps Clocking Data rate Internal External Workgroup Remote Access Switch YSTEM ORKSHEETS System Details Line Device tied to this protocol access Line Device tied to this protocol access...
USER’S GUIDE Device Name: _____________________________ Calling (ISDN, FR, etc.) Information Line Protocol Base Data Rate Initial Data Rate Max Data Rate Dial-Out Number(s) Authentication Information : PAP Password CHAP Secret IP Host ID Bridge Ethernet Address* Bridge Password* CLID(s) * HDLC Bridge only Protocol for this particular device? Bridge Bridging enabled?
IP address Mask Input filters Output filters Name IP address Mask Input filters Output filters Name IP address Mask Input filters Output filters IP address Mask Input filters Output filters Workgroup Remote Access Switch YSTEM ORKSHEETS Bridging and Routing Information...
Page 606
USER’S GUIDE IP R OUTING CONTINUED Static Routes Destination network address IPX R OUTING Routing Information IPX routing Internal network number Network Interface Information Name External network number Remote LAN Name External network number Static Routes Destination network number NetWare Static Services Service name CyberSWITCH Mask...
Page 607
Zone name(s) Name Network type extended nonextended Netwk range/ number AppleTalk address Zone name(s) Next hop Next hop address name Workgroup Remote Access Switch YSTEM ORKSHEETS Bridging and Routing Information extended extended nonextended nonextended extended extended nonextended nonextended extended extended...
Page 608
CFGEDIT M VERVIEW The following pages provide an outline of the CyberSWITCH CFGEDIT configuration utility. As you configure your system, you may find it helpful to use this outline as a map to help you navigate through CFGEDIT. Note: All options listed may not be available on your particular system. The availability of these options depends upon the platform and software you have ordered, as well as your configuration choices.
Page 609
Data rate Bearers list Line protocol HDLC FR DBU Device name • X.25 Name Data rate X.121 address Bearers list LAPB info • Frame Relay Data rate Bearers Access info PVCs Workgroup Remote Access Switch CFGEDIT M Physical Resources Menu...
On-node Device Database (Enable/Disable) • On-node Device Entries (by name) ISDN line protocol data rate dial out numbers subaddress Frame Relay X.25 SVC, PVC Digital Modem line protocol baud rate bearer capability dial out numbers CFGEDIT M Security Menu Workgroup Remote Access Switch...
Page 614
USER’S GUIDE Authentication PAP password CHAP secret outbound authentication user level authentication IP host ID bridge Ethernet calling line ID IP information IP address IP enable/disable make calls for IP data enable/disable calls for IPX data IPXWAN IPX routing none RIP/SAP trig RIP/SAP IPX spoofing...
Page 615
(SDI or DES) source IP address Load Server Configuration file ETWORK OGIN NFORMATION • Network login configuration (Terminal Server Security) • Network login banners • Login configuration RADIUS • Login configuration TACACS CFGEDIT M Security Menu Workgroup Remote Access Switch...
The System Problem Report has been designed as a FAX form. Please fill in all information in this area before you FAX the report to Cabletron Systems. If you plan to mail the System Problem Report, please fill in the company information in this section for reference information.
Page 618
DMINISTRATIVE The following table lists all system administration commands. Guest commands are identified in the command column. Command (GUEST) autobaud atalk arp atalk ping <dnet>.<dnode> {timeout/dnnn] example: atalk ping 1.3 30 /d200 atalk port atalk port stats [clear] atalk route atalk stats atalk stats atp atalk stats ddp...
Page 619
<frame relay access “n”> sets frame relay access index to “n” as default context for all subsequent “fr” console commands DMINISTRATIVE Workgroup Remote Access Switch ONSOLE OMMANDS ABLE...
Page 620
USER’S GUIDE Command fr clear fr clearall fr cong fr d <DLCI “m”> fr dbg level fr dbg level <level> fr display fr lmi fr stats ip addrpool ip arp ip filter trace <discard> <off> ip ping <host ip address> ip rip interface ip rip routes ip rip send...
Page 621
(GUEST) terminates a session manage switches the system to the Manage Mode, allowing Dynamic Management to operate (GUEST) displays connection monitor screen DMINISTRATIVE useful for displaying Release Notes (“list rel_notes.txt”) Workgroup Remote Access Switch ONSOLE OMMANDS ABLE...
Page 622
USER’S GUIDE Command neif pkt capture <connection mode> pkt mac pkt [on/off] pkt display pkt load <filename> pkt save <filename> pswd (GUEST) radius chap radius iphost radius ipres radius macres radius pap recover restore restart sentry ace sentry radius sentry status sentry log session session kill <session id>...
Page 623
SSB for download of software via XMODEM (GUEST) displays current software version and hardware resource revision information wan fr-ietf stats [device/ displays WAN frame relay connection information for fr_accessname_dlci] [prot] devices configured for the FR_IETF line protocol DMINISTRATIVE Workgroup Remote Access Switch ONSOLE OMMANDS ABLE...
Page 625
ANAGE OMMANDS The following table displays the available Dynamic Management commands: Command ace change ace reinit admlogin [change] alarm alarm [off/on] bwres bwres [on/off] callrest callrest [off/on] commit commit status datalink datalink [add/change/delete] dedacc destfilt destfilt [add/change/delete] device device [add/change/delete] dhcp dhcp change exit...
Page 626
USER’S GUIDE Command fileattr fileattr change help ipfilt ipnetif ipradius ipradius off ipradius on iprip iprip [off/on] iproute iproute [add/change/delete] ipxaddrpool ipxaddrpool [add/change/delete] ipxinet ipxiso ipxnetif ipxnetif [add/change/delete] ipxrip ipxrip [off/on] ipxroute ipxroute [add/change/delete] ipxsap ipxsap [off/on] ipxsvc ipxsvc [add/change/delete] ipxspoof CyberSWITCH displays the current user file access rights (guest or admin)
Page 627
[add/change/delete] adds/changes/deletes the a source address filter tacacs displays TACACS off-node server configuration tacacs change allows changes to the TACACS off-node server configuration adds/deletes a semi-permanent connection Workgroup Remote Access Switch ANAGE OMMANDS ABLE...
Page 628
USER’S GUIDE Command tftp tftp change thruput thruput change vra change CyberSWITCH displays the current TFTP configuration allows the current TFTP configuration to be changed displays the current throughput monitor configuration data allows the current throughput monitor configuration data to be changed displays current VRA manager configuration data allows you to change the VRA TCP port number...
Page 629
AUSE ODES ABLE The following table provides Q.931 cause codes and their corresponding meanings. Cause codes may appear in Call Trace Messages. Dec Value Hex Value Q.931 Cause valid cause code not yet received unallocated (unassigned number) Indicates that, although the ISDN number was presented in a valid format, it is not currently assigned to any destination equipment.
Page 630
USER’S GUIDE Dec Value Hex Value CyberSWITCH Q.931 Cause no answer from device (device alerted) Indicates that the destination has responded to the connection request but has failed to complete the connection within the prescribed time. Problem at remote end. call rejected Indicates that the destination was capable of accepting the call (was neither busy nor incompatible) but rejected the call for some reason.
Page 631
X.213) could not be provided by the network. This may be a subscription problem. requested facility not subscribed Indicates that the remote equipment supports the requested supplementary service but that this is available only by subscription. reverse charging not allowed AUSE ODES Workgroup Remote Access Switch ABLE...
Page 632
USER’S GUIDE Dec Value Hex Value CyberSWITCH Q.931 Cause outgoing calls barred outgoing calls barred within CUG incoming calls barred incoming calls barred within CUG call waiting not subscribed bearer capability not authorized Indicates that the device has requested a bearer capability that the network is able to provide, but that the device is not authorized to use.
Page 633
Indicates that the receiving equipment received a message that did not include one of the mandatory information elements. D-channel error. If this error is returned systematically, report the occurrence to your authorized service provider. AUSE ODES Workgroup Remote Access Switch ABLE...
Page 634
USER’S GUIDE Dec Value Hex Value CyberSWITCH Q.931 Cause message type non-existent or not implemented Indicates that the receiving equipment received a message that was not recognized either because the message type was invalid, or because the message type was valid but not supported. This is either a problem with the remote configuration or a problem with the local D-channel.
Page 635
Indicates that an event occurrent but that the network does not provide causes for the actions that it takes, therefore the precise nature of the event cannot be ascertained. This may, or may not, indicate the occurrence of an error. Workgroup Remote Access Switch...
Page 636
USER’S GUIDE NDEX 184, 187 access request retries accesses alternate accesses X.25 accessing the CyberSWITCH ACE Authentication Server alternate method of configuring configuring active WAN peer adapters configuring adapters overview 70, 513 admin admin login names administration commands administration console requirements alarm LEDs AMI encoding...
Page 637
Console Information Port (CIP), refers to RS232 port country code 90, 97 cr stats 61, 97 CSX1200-E11-MOD installation CSX1200-U4-MOD LEDs custom information data links database timer (triggered RIP/SAP) datalink date D-CHAN indicator decompression statistics...
Page 638
H0 call support hardware verification HDLC bridge devices HDLC data polarity 85, 515 help hold-down timer (triggered RIP/SAP) hunt group ICMP ICMP group statistics idle condition initial data rate initialization messages installation CSX1200-E11-MOD requirements 246, 252...
Page 639
277, 280 remote LAN interface RIP table size routing tables SAP table size service tables statistics triggered RIP/SAP verification WAN interface IPX WAN protocol ipxinet ipxiso ipxnetif ipxrip ipxroute ipxsap ipxsvc ipxt20 Workgroup Remote Access Switch...
Page 640
USER’S GUIDE ISDN configuration elements ordering profile information provisioning settings isdn isolated mode known connect list LAN adapter problem diagnosis verification messages LAN connection operation verification LAN IP interface LAN LED indicators LAN statistics lan test LANVIEW LEDs LAPB LED indicators alarm LANVIEW NT1 status...
Need help?
Do you have a question about the CSX1200 and is the answer not in the manual?
Questions and answers