Remote Bridging Network With Security; Overview; Initial Installation Steps - Cabletron Systems Cyber SWITCH 1000 User Manual

Workgroup remote access switch example networks
Table of Contents

Advertisement

R
B
EMOTE
RIDGING
O
VERVIEW
This example network is a bridged network with Calling Line Id security and Bridge MAC Address
security enabled. The network is configured with two devices. One device will be configured to
require a Bridge MAC Address security password, and one device will not. This network uses BRI
lines.
Worksheets for this network are included on the following pages.
Note that a Hunt Group is used for the BRI lines pictured in the Network Topology Worksheet.
Remote devices will then only need to configure one telephone number (the Hunt Group number)
for the CyberSWITCH instead of all four phone numbers. If the first line is busy, the next line is
automatically used, and so on until a free line is found. A Hunt Group number can be arranged
through your Service Provider.
I
I
NITIAL
NSTALLATION
The initial steps in the CyberSWITCH installation process are basically the same no matter how
complicated the network. These steps are:
completing the requirement worksheets
ordering ISDN service
powering on the system
accessing Release Notes
connecting an administration console
setting up Telnet access
upgrading system software
changing defaults to secure system
returning configuration to factory defaults
The chapters Accessing the CyberSWITCH and Upgrading System Software (in the User's Guide)
describe each of these steps in detail.
Worksheets for this network are included on the next few pages.
N
ETWORK WITH
S
TEPS
S
ECURITY

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the Cyber SWITCH 1000 and is the answer not in the manual?

Subscribe to Our Youtube Channel

This manual is also suitable for:

Cyber switch 1200

Table of Contents