Cabletron Systems CyberSWITCH CSX150, CyberSWITCH CSX154, CyberSWITCH CSX155, CyberSWITCH CSX500, SMALL OFFICE CyberSwitch 150 User manual

  • Hello! I am an AI chatbot trained to assist you with the Cabletron Systems CyberSWITCH CSX150 User manual. I’ve already reviewed the document and can help you find the information you need or explain it in simple terms. Just ask your questions, and providing more details will help me assist you more effectively!
SMALL OFFICE
REMOTE ACCESS SWITCH
USER’S GUIDE
Release 7.2
Cabletron Systems
(603) 332-9400 phone
(603) 337-3075 fax
support@ctron.com
USER’S GUIDE
2 CyberSWITCH
NOTICE
You may post this document on a network server for public use as long as no
modifications are made to the document.
Cabletron Systems reserves the right to make changes in specifications and other
information contained in this document without prior notice. The reader should in
all cases consult Cabletron Systems to determine whether any such changes have
been made.
The hardware, firmware, or software described in this manual is subject to change
without notice.
IN NO EVENT SHALL CABLETRON SYSTEMS BE LIABLE FOR ANY
INCIDENTAL, INDIRECT, SPECIAL, OR CONSEQUENTIAL DAMAGES
WHATSOEVER (INCLUDING BUT NOT LIMITED TO LOST PROFITS) ARISING
OUT OF OR RELATED TO THIS MANUAL OR THE INFORMATION
CONTAINED IN IT, EVEN IF CABLETRON SYSTEMS HAS BEEN ADVISED OF,
KNOWN, OR SHOULD HAVE KNOWN, THE POSSIBILITY OF SUCH
DAMAGES.
©Copyright 1998 by Cabletron Systems, Inc. All rights reserved.
Cabletron Systems, Inc.
P.O. Box 5005
Rochester, NH 03866-5005
Order Number: 9032450
VIRUS DISCLAIMER
Cabletron Systems has tested its software with current virus checking
technologies. However, because no anti-virus system is 100% reliable, we strongly
caution you to write protect and then verify that the Licensed Software, prior to
installing it, is virus-free with an anti-virus system in which you have confidence.
Cabletron Systems makes no representations or warranties to the effect that the
Licensed Software is virus-free.
Copyright © July 1997, by Cabletron Systems, Inc. All rights reserved.
Only qualified personnel should perform installation
procedures.
!
CAUTION
Small Office Remote Access Switch 3
TRADEMARKS
Cabletron Systems, CyberSWITCH, MMAC-Plus, SmartSWITCH, SPECTRUM,
and SecureFast Virtual Remote Access Manager are trademarks of Cabletron
Systems, Inc.
All other product names mentioned in this manual are trademarks or registered
trademarks of their respective companies.
COPYRIGHTS
All of the code for this product is copyrighted by Cabletron Systems, Inc.
© Copyright 1991-1997 Cabletron Systems, Inc. All rights reserved. Printed in the
United States of America.
Portions of the code for this product are copyrighted by the following corporations:
Epilogue Technology Corporation
Copyright 1991-1993 by Epilogue Technology Corporation. All rights reserved.
Livingston Enterprises, Inc.
Copyright 1992 Livingston Enterprises, Inc.
Security Dynamics Technologies Inc.
Copyright 1995 by Security Dynamics Technologies Inc. All rights reserved.
Stac Electronics
Stac Electronics 1993, including one or more U.S. Patents No. 4701745, 5016009,
5126739 and 5146221 and other pending patents.
Telenetworks
Copyright 1991, 92, 93 by Telenetworks. All rights reserved.
FCC NOTICE
This device complies with Part 15 of the FCC rules. Operation is subject to the
following two conditions: (1) this device may not cause harmful interference, and
(2) this device must accept any interference received, including interference that
may cause undesired operation.
NOTE: This equipment has been tested and found to comply with the limits for a
Class A digital device, pursuant to Part 15 of the FCC rules. These limits are
designed to provide reasonable protection against harmful interference when the
equipment is operated in a commercial environment. This equipment uses,
generates, and can radiate radio frequency energy and if not installed in
accordance with the operator’s manual, may cause harmful interference to radio
communications. Operation of this equipment in a residential area is likely to cause
interference in which case the user will be required to correct the interference at his
own expense.
USER’S GUIDE
4 CyberSWITCH
WARNING: Changes or modifications made to this device which are not expressly
approved by the party responsible for compliance could void the user’s authority
to operate the equipment.
DOC NOTICE
This digital apparatus does not exceed the Class A limits for radio noise emissions
from digital apparatus set out in the Radio Interference Regulations of the
Canadian Department of Communications.
Le présent appareil numérique n’émet pas de bruits radioélectriques dépassant les
limites applicables aux appareils numériques de la class A prescrites dans le
Règlement sur le brouillage radioélectrique édicté par le ministère des
Communications du Canada.
VCCI NOTICE
This is a Class 1 product based on the standard of the Voluntary Control Council
for Interference by Information Technology Equipment (VCCI). If this equipment
is used in a domestic environment, radio disturbance may arise. When such
trouble occurs, the user may be required to take corrective actions.
CABLETRON SYSTEMS, INC. PROGRAM LICENSE AGREEMENT
IMPORTANT: Before utilizing this product, carefully read this License Agreement.
This document is an agreement between you, the end user, and Cabletron Systems,
Inc. ("Cabletron") that sets forth your rights and obligations with respect to the
Cabletron software program (the "Program") contained in this package. The
Program may be contained in firmware, chips or other media. BY UTILIZING THE
ENCLOSED PRODUCT, YOU ARE AGREEING TO BECOME BOUND BY THE
TERMS OF THIS AGREEMENT, WHICH INCLUDES THE LICENSE AND THE
LIMITATION OF WARRANTY AND DISCLAIMER OF LIABILITY. IF YOU DO
NOT AGREE TO THE TERMS OF THIS AGREEMENT, PROMPTLY RETURN
THE UNUSED PRODUCT TO THE PLACE OF PURCHASE FOR A FULL
REFUND.
Small Office Remote Access Switch 5
CONTENTS
Using this Guide 22
Documentation Set 23
Guide Conventions 24
SYSTEM OVERVIEW 25
The CyberSWITCH 26
The CyberSWITCH Network 26
Unique System Features 27
Interoperability Overview 29
Interoperability Protocols 29
Interoperability Devices 30
Security Overview 31
Network Interface Overview 31
System Components 32
Remote ISDN Devices 32
Switches Supported 33
Hardware Overview 34
Safety Considerations 34
System Platforms 35
CyberSWITCH Characteristics 35
CyberSWITCH Series 36
CyberSWITCH Front Panel 36
CyberSWITCH Back Panel 37
Software Overview 39
Overview 39
System software 39
System Files 39
Configuration Files 39
Operational Files 40
User Level Security Files 41
SYSTEM INSTALLATION 42
Ordering ISDN Service (US Only) 43
Overview 43
Ordering NI-1 Lines Using EZ-ISDN Codes 43
Ordering NI-1 Lines Using NI-1 ISDN Ordering Codes 43
For Non-POTS Devices 43
For Single POTS Devices 43
For Dual POTS Devices 44
USER’S GUIDE
6 CyberSWITCH
Ordering BRI ISDN Lines using Provisioning Settings 44
Provisioning Settings for AT&T 5ESS Switches 45
AT&T 5ESS NI-1 Service 45
AT&T 5ESS Custom Point-to-Point Service 46
Provision Settings for Northern Telecom DMS-100 Switches 46
Northern Telecom DMS100 NI-1 Service 47
Northern Telecom DMS100 Custom Service 48
Hardware Installation 49
Pre-Installation Requirements 49
Accessing the CyberSWITCH 50
Overview 50
Making Connections 50
Direct Connection 50
Null-Modem Connection to a PC 50
Changing the Baud Rate 52
Remote Connection using Telnet 52
Establishing an Administration Session 53
Powering On 53
Accessing the Release Notes 54
Upgrading System Software 56
Overview 56
Upgrading Software 56
Local Software Upgrade 57
Local Upgrade of the Second Stage Boot (SSB) 57
Local Upgrade of the Operational Software (OSW) 58
Remote Software Upgrade 58
Remote Upgrade of the Second Stage Boot (SSB) 59
Remote Upgrade of the Operational Software (OSW) 60
Change Defaults to Secure System 61
Return Configuration to Factory Defaults 62
Accessing the Release Notes 62
BASIC CONFIGURATION 63
Configuration Tools 64
Overview 64
CFGEDIT 64
Executing CFGEDIT 64
Saving CFGEDIT Changes 65
Dynamic Management 65
Executing Dynamic Management 65
Utility Dynamic Management Commands 66
Saving Dynamic Management Changes 66
Default Configuration 67
Using the Network Worksheets 67
Using the Configuration Chapters 68
Small Office Remote Access Switch 7
Configuring Resources and Lines 69
Overview 69
Resources 69
Configuring Resources 69
Resource Configuration Elements 71
Resource Background Information 71
Lines 72
Configuring Lines 72
Configuring Changes for a COMMPORT Resource 73
Line Configuration Elements 74
Line Background Information 77
Subaddresses 78
Configuring a Subaddress 78
Subaddress Configuration Elements 78
Subaddresses Background Information 78
POTS Option 78
Configuring the POTS Option 78
POTS Configuration Elements 80
POTS Background Information 80
Configuring Basic Bridging 81
Overview 81
MAC Layer Bridging Option 81
Enabling/Disabling Bridging 81
MAC Layer Bridging Configuration Elements 81
MAC Layer Bridging Background Information 82
Configuring Basic IP Routing 83
Overview 83
Internet Protocol (IP) Option 83
Enabling IP 83
IP Option Configuration Elements 84
IP Background Information 84
IP Operating Mode 84
Configuring the IP Operating Mode 84
IP Operating Mode Configuration Elements 85
IP Operating Mode Background Information 85
IP Network Interfaces 86
Configuring Interfaces 86
Network Interface Configuration Elements 88
IP Network Interface Background Information 93
IP RIP and the IP Network Interfaces 97
IP RIP over Dedicated Connections 101
IP Host Operating Mode and the IP Network Interfaces 103
Using Multiple IP Addresses 103
Static Routes 105
Configuring Static Routes 105
Static Route Configuration Elements 107
Static Route Background Information 109
Default Routes 110
Configuring Default Routes 110
Default Route Configuration Elements 110
USER’S GUIDE
8 CyberSWITCH
Routing Information Protocol (RIP) Option 111
Enabling/Disabling IP RIP 111
IP RIP Configuration Elements 112
IP RIP Background Information 112
SECURITY 113
Security Overview 114
Overview 114
Security Level 114
System Options and Information 115
Device Level Databases 115
User Level Databases 116
Off-node Server Information 116
Network Login Information 116
Configuring Security Level 117
Overview 117
No Security 119
Configuring No Security 119
Device Level Security 120
Configuring Device Level Security 120
Device Level Security Background Information 120
Overview of Device Authentication Process 121
User Level Security 121
Configuring User Level Security 121
User Level Security Background Information 121
Authentication Using a Security Token Card 122
System Requirements 123
Authentication Process with User Level Security 124
Device and User Level Security 125
Configuring Device and User Level Security 125
Device and User Level Background Information 126
Configuring System Options and Information 127
Overview 127
System Options 127
Configuring System Options 127
System Options Configuration Elements 128
System Options Background Information 130
System Information 131
Configuring System Information 131
System Information Configuration Elements 131
System Information Background Information 132
Administrative Session 132
Configuring Administrative Sessions 132
Administrative Session Configuration Elements 133
Administrative Session Background Information 134
Alternative Database Location Background Information 134
Session Inactivity Background Information 134
Number of Administrative Telnet Sessions Background Information 134
Small Office Remote Access Switch 9
Telnet Server TCP Port Number Background Information 134
Emergency Telnet Server Port Number Background Information 135
Configuring Device Level Databases 136
Overview 136
On-node Device Database 136
Configuring an On-node Device Database 136
On-node Device Entries 137
Configuring On-node Device Entries 137
On-node Device Database Configuration Elements 144
General Configuration Elements 144
ISDN Configuration Elements 144
Frame Relay Access Configuration Elements 146
X.25 Access Configuration Elements 146
Authentication Configuration Elements 146
IP Information Configuration Elements 148
IPX Information Configuration Elements 148
AppleTalk Information Configuration Elements 149
Bridge Information Configuration Elements 150
POTS Information 151
Compression Configuration Elements 151
On-node Device Database Background Information 151
On-node Device Database Security Requirements 152
Off-node Device Database Location 156
Configuring Off-node Device Database Location 156
Off-node Device Database Location Configuration Elements 156
Off-node Device Database Location Background Information 156
Configuring User Level Databases 157
Overview 157
User Level Authentication Database Location 157
Configuring Authentication Database Location 157
User Level Authentication Database Location Configuration Elements 158
User Level Authentication Database Location Background Information 158
Configuring Off-node Server Information 159
Overview 159
Multiple Administration Login Names 159
VRA Manager Authentication Server 160
Configuring VRA Manager Authentication Server 160
VRA Manager Authentication Server Configuration Elements 161
VRA Manager Authentication Server Background Information 161
RADIUS Authentication Server 161
Configuring a RADIUS Authentication Server 161
RADIUS Authentication Server Configuration Elements 163
RADIUS Authentication Server Background Information 163
TACACS Authentication Server 164
Configuring a TACACS Authentication Server 164
TACACS Authentication Server Configuration Elements 165
TACACS Authentication Server Background Information 165
USER’S GUIDE
10 CyberSWITCH
ACE Authentication Server 166
Configuring an ACE Authentication Server 166
ACE Authentication Server Configuration Elements 167
ACE Authentication Server Background Information 168
Configuring Network Login Information 169
Overview 169
Network Login General Configuration 169
Configuring General Network Login Information 169
Network Login General Configuration Background Information 170
Network Login Banners 171
Configuring Network Login Banners 171
Network Login Banners Background Information 171
Login Configuration Specific to RADIUS Server 172
Configuring RADIUS Server Login Information 172
Login Configuration Specific to RADIUS Server Background Information 173
Login Configuration Specific to TACACS Server 173
Configuring TACACS Server Login Information 173
Login Configuration Specific to TACACS Server Background Information 175
ADVANCED CONFIGURATION 176
Configuring Alternate Accesses 177
Dedicated Accesses 177
Configuring a Dedicated Access 177
Dedicated Access Configuration Elements 177
Dedicated Access Background Information 178
X.25 Accesses 179
Configuring an X.25 Access 179
Basic Configuration Information 179
LAPB Configuration Information 180
X.25 Configuration Information 180
Permanent Virtual Circuit Information 182
X.25 Configuration Elements 182
X.25 Line Configuration Elements 182
LAPB Configuration Elements 183
X.25 Access Configuration Elements 184
PVC Configuration Elements 187
X.25 Access Background Information 188
Current X.25 Restrictions 190
Frame Relay Accesses 190
Configuring a Frame Relay Access 190
Configuring General Access Information 190
Configuring a PVC 191
Frame Relay General Configuration Elements 192
Frame Relay PVC Configuration Elements 193
Frame Relay Access Background Information 195
The Local Management Interface Overview 196
Data Rate Control Overview 196
Congestion Control Overview 197
Current Restrictions 197
Small Office Remote Access Switch 11
Configuring Advanced Bridging 199
Overview 199
Bridge Dial Out 199
Configuring the Device List for Bridge Dial Out 200
MAC Hardware Filtering 201
Enabling/Disabling MAC Hardware Filtering 201
MAC Hardware Filtering Background Information 201
Spanning Tree Protocol 202
Configuring Spanning Tree Protocol 202
Spanning Tree Protocol Configuration Elements 202
Bridge Mode of Operation 202
Configuring the Bridge Mode of Operation 202
Bridge Mode of Operation Configuration Elements 202
Bridge Mode of Operation Background Information 202
Unrestricted Bridge Mode 202
Restricted Bridge Mode 203
Mode of Hardware Filtering 203
Configuring Mode of Hardware Filtering 203
Hardware Filtering Mode Background Information 203
Manual Mode Hardware Filtering 204
Auto Mode Hardware Filtering 204
Bridge Filters 204
Configuring Bridge Filters 204
Bridge Filter Configuration Elements 207
Protocol Definition Configuration Elements 207
Bridge Filter Configuration Elements 207
Hardware Filter Configuration Elements 208
Bridge Filters Background Information 209
Protocol Definitions 209
Bridge Filter Definitions 210
Dial Out Using Bridge Filters 216
Example: Bridge Dial Out Using a Destination MAC Address Filter 216
Known Connect List 218
Configuring the Known Connect List 218
Known Connect List Configuration Elements 219
Known Connect List Background Information 219
Configuring Advanced IP Routing 220
Overview 220
Static ARP Table Entries 220
The Isolated Mode 220
Configuring the Isolated Mode 220
Isolated Mode Configuration Elements 221
Isolated Mode Background Information 221
Static Route Lookup via RADIUS 221
Configuring Static Route Lookup via RADIUS 221
Static Route via RADIUS Configuration Elements 221
Static Route Lookup via RADIUS Background Information 221
IP Address Pool 222
Configuring an IP Address Pool 222
IP Address Pool Configuration Elements 222
IP Address Pool Background Information 222
USER’S GUIDE
12 CyberSWITCH
IP Filters 223
Initiating the IP Filter Configuration 223
Configuring Packet Types 224
Configuring the Common IP Portion 225
Configuring TCP 226
Configuring UDP 226
Configuring ICMP 227
Configuring Forwarding Filters 228
Configuring Connection Filters 229
Using CFGEDIT 229
Configuring Exception Filter 230
Modifying the Final Condition for a Filter 231
Applying Filters 231
Applying Filters to Network Interfaces 231
Applying the Global Forwarding Filter 231
Applying per-device Forwarding Filters 231
IP Filters Configuration Elements 232
IP Filters Background Information 233
Filter Composition 234
Types of Filters 234
Role of Filters in the IP Processing Flow 235
Packet Types 236
Limitations 237
Example of an IP Filter Configuration 238
DHCP Relay Agent 240
Configuring a DHCP Relay Agent 240
DHCP Configuration Elements 241
DHCP Background Information 241
DHCP/BOOTP Relay Agent Environments 241
Example DHCP Configurations 243
DHCP Proxy Client 247
Configuring the DHCP Proxy Client 247
DHCP Configuration Elements 248
DHCP Background Information 248
Sample Configuration: IP Router with DHCP Proxy Client 249
Configuring IPX 251
Overview 251
Configuring IPX Information 252
IPX Routing Option 253
Enabling/Disabling IPX 253
IPX Option Configuration Element 253
IPX Option Background Information 254
IPX Internal Network Number 254
Configuring the IPX Internal Network Number 254
IPX Internal Network Number Configuration Element 254
IPX Network Number Background Information 255
Small Office Remote Access Switch 13
IPX Network Interfaces 255
Configuring IPX Network Interfaces 255
IPX Network Interface Configuration Elements 257
General IPX Network Interface Configuration Elements 257
RIP IPX Network Interface Configuration Elements 257
SAP IPX Network Interface Configuration Elements 258
IPX Network Interface Background Information 259
IPX Routing Protocols 260
Configuring IPX Routing Protocols 260
IPX Routing Protocol Configuration Elements 260
IPX Routing Protocol Background Information 261
Routing/Service Tables 261
Special Considerations - Remote LAN Interface 262
IPX Static Routes 263
Configuring IPX Static Routes 263
IPX Static Routes Configuration Elements 264
IPX Static Routes Background Information 264
IPX NetWare Static Services 265
Configuring IPX NetWare Static Services 265
IPX NetWare Static Services Configuration Elements 266
IPX NetWare Static Services Background Information 267
IPX Spoofing 267
Configuring IPX Spoofing 267
IPX Spoofing Configuration Elements 268
IPX Spoofing Background Information 268
Watchdog Protocol 269
SPX Protocol 269
IPX Type 20 Packet Handling 270
Configuring IPX Type 20 Packet Handling 270
IPX Type 20 Packet Handling Configuration Elements 271
IPX Type 20 Packet Handling Device Configuration Elements 271
IPX Type 20 Packet Handling Background Information 271
IPX Isolated Mode 271
Configuring IPX Isolated Mode 271
IPX Isolated Mode Configuration Elements 271
IPX Isolated Mode Background Information 272
IPX Triggered RIP/SAP 272
Displaying WAN Peer List 272
Configuring Triggered RIP/SAP Global Timers 273
Configuration Elements 273
Triggered RIP/SAP Background Information 274
IPX-Specific Information for Devices 274
Configuring IPX Devices 274
WAN Devices 274
Remote LAN Devices 277
IPX Configuration Elements for Devices 278
IPX Background Information for Devices 279
IPX Triggered RIP/SAP Device Background 279
USER’S GUIDE
14 CyberSWITCH
Configuring SNMP 280
Configuring SNMP 280
SNMP Configuration Elements 282
SNMP Background Information 283
Configuring AppleTalk Routing 287
AppleTalk Routing Option 287
Enabling AppleTalk Routing 287
AppleTalk Routing Option Configuration Element 288
AppleTalk Routing Background Information 288
AppleTalk Ports 288
Configuring AppleTalk Ports 288
AppleTalk Ports Configuration Elements 289
AppleTalk Ports Background Information 290
The AppleTalk Network Type 290
Dynamic Node Address Assignment 290
The Zone Concept 291
AppleTalk Remote LAN 291
AppleTalk Static Routes 292
Configuring AppleTalk Static Routes 292
AppleTalk Routing Static Routes Configuration Elements 293
AppleTalk Routing Static Routes Background Information 293
AppleTalk Capacities 293
Configuring AppleTalk Capacities 293
AppleTalk Capacities Configuration Elements 293
AppleTalk Capacities Background Information 294
AppleTalk Isolated Mode 294
Configuring the AppleTalk Isolated Mode 294
AppleTalk Isolated Mode Configuration Elements 294
Configuring Call Control 295
Overview 295
Throughput Monitor 295
Configuring the Throughput Monitor 295
Throughput Monitor Configuration Elements 296
Throughput Monitor Background Information 297
Overload Condition Monitoring 298
Underload Condition Monitoring 298
Idle Condition Monitoring 299
Throughput Monitor Configuration Example 299
Call Interval Parameters 300
Configuring the Call Interval Parameters 300
Call Interval Configuration Elements 300
Call Interval Background Information 300
Monthly Call Charge 301
Configuring Monthly Call Charge 301
Monthly Call Charge Configuration Elements 301
Monthly Call Charge Background Information 301
Call Restrictions 302
Configuring Call Restrictions 302
Call Restriction Configuration Elements 302
Call Restrictions Background Information 304
Small Office Remote Access Switch 15
Bandwidth Reservation 305
Configuring Bandwidth Reservation 305
Bandwidth Reservation Configuration Elements 307
Bandwidth Reservation Background Information 308
Semipermanent Connections 308
Configuring Semipermanent Connections 308
Semipermanent Connections Configuration Elements 310
Semipermanent Connections Background Information 310
Interactions with Other Features 310
VRA Manager as a Call Control Manager 312
Configuring VRA Manager for Call Control 312
Configuration Elements 312
Background Information 313
Call Control Management 313
Limitations/Considerations 314
Configuring Other Advanced Options 315
Overview 315
PPP Configuration 315
Configuring PPP 315
PPP Configuration Elements 316
PPP Background Information 317
PPP Link Failure Detection 317
PPP Reference Documents 318
Default Line Protocol 319
Configuring Default Line Protocol 319
Default Line Protocol Configuration Elements 319
Default Line Protocol Background Information 319
Log Options 320
Configuring Log Options 320
Log Options Configuration Elements 320
Log Options Background Information 321
Local Log File Overview 321
Syslog Server Overview 321
CDR Log Report Overview 322
Compression Options 327
Configuring Compression Options 327
Compression Options Configuration Elements 327
Compression Options Background Information 328
Compression and CCP 329
TFTP 330
Configuring TFTP 330
TFTP Configuration Elements 331
TFTP Background Information 331
File Attributes 332
Configuring File Attributes 332
File Attributes Configuration Elements 332
File Attributes Background Information 332
USER’S GUIDE
16 CyberSWITCH
TROUBLESHOOTING 334
System Verification 335
Verifying Hardware Resources are Operational 335
Verifying WAN Lines are Available for Use 336
Verifying LAN Connection is Operational 336
Verifying Bridge is Initialized 337
Verifying IP Router is Initialized 337
Verifying a Dedicated Connection 338
Verifying a Frame Relay Connection 338
Verifying an X.25 Connection 339
Verifying Remote Device Connectivity 339
Verifying Multi-Level Security 339
Verifying IP Host Mode is Operational 341
Verifying IP Host is Initialized 341
Verifying IP Host Mode is Operational 341
Verifying IP Host Mode Operation over a LAN connection 341
Verifying IP Host Mode Operation over a WAN connection 342
Verifying IP Routing Over Interfaces 342
Verifying IP Routing Over a LAN Interface 342
Verifying IP Routing Over a WAN Interface 343
Verifying IP Routing Over a WAN (Direct Host) Interface 345
Verifying IP Routing Over a WAN Remote LAN Interface 346
Verifying IP Routing Over a WAN UnNumbered Interface 347
Verifying IP Filters 348
Verifying IP RIP 348
Verifying IP RIP is Initialized 348
Verifying IP RIP Output Processing on a LAN Interface 349
Verifying IP RIP Input Processing on a LAN Interface 350
Verifying IP RIP Output Processing on a WAN Interface 350
Verify IP RIP Input Processing Operational on a WAN Interface 351
Verifying IPX Router is Initialized 352
Verifying IPX Routing is Operational 352
Verifying IPX Routing over a LAN Connection 353
Verifying an IPX Remote LAN Connection 353
Verifying IPX Routing over a WAN Connection 354
Verifying Triggered RIP/SAP 354
Verifying the AppleTalk Routing Feature 354
Verifying AppleTalk Routing is Initialized 354
Verifying AppleTalk Routing is Operational 355
Verifying AppleTalk Routing Operational over the LAN connection 356
Verifying AppleTalk Routing Operation over a WAN connection 356
Verifying SNMP is Operational 357
Verifying the Dial Out Feature 358
Verifying Call Detail Recording 358
Verifying Compression is Operational 359
Verifying Reserved Bandwidth is Operational 359
Verifying PPP Link Failure Detection is Operational 359
Verifying DHCP Relay Agent 360
Verifying DHCP Relay Agent Initialization 360
Verifying the Relay Agent is Enabled 361
Verifying the Relay Agent is Operational 361
Small Office Remote Access Switch 17
Verifying DHCP: Proxy Client 362
Verifying DHCP Proxy Client Initialization 362
Verifying the Proxy Client is Enabled 363
Verifying the Proxy Client is Operational 363
UDP Ports 363
IP Address Pool 364
Verifying a Semipermanent Connection 364
Verifying Proxy ARP is Operational 364
Problem Diagnosis 366
Overview 366
LAN Adapter 366
Bridge Initialization 367
IP Routing Initialization 367
WAN Line Availability 367
Dedicated Connections 369
Frame Relay Connections 369
X.25 Connections 370
Remote Device Connectivity 371
Multi-Level Security 372
LAN Attachment 372
IP Host Mode 373
IP Host Initialization 373
IP Host Mode Operation over the LAN connection 373
IP Host Mode Operation over the WAN connection 374
IP Routing Over Interface Connections 374
IP Routing Over the LAN Interface Connection 374
IP Routing Over a WAN Interface Connection 375
IP Routing Over a WAN (Direct Host) Interface Connection 376
IP Routing Over a WAN RLAN Interface Connection 377
IP Routing Over a WAN UnNumbered Interface Connection 378
IP Filters 378
IP RIP 379
IP RIP Initialization 379
IP RIP Output Processing on a LAN Interface 380
IP RIP Input Processing on a LAN Interface 380
IP RIP Output Processing on a WAN Interface 381
IP RIP Input Processing on a WAN Interface 381
IPX Routing 382
IPX Routing Initialization 382
IPX Routing over the LAN Connection 382
IPX Routing over the Remote LAN Connection 383
IPX Routing over the WAN Connection 384
IPX Routing and Service Tables 385
Triggered RIP/SAP Start Up 386
Triggered RIP/SAP Operation 386
AppleTalk Routing 386
AppleTalk Routing Initialization 387
AppleTalk Routing Operational over the LAN connection 387
AppleTalk Routing Operational over the WAN connection 389
SNMP 390
Dial Out 392
USER’S GUIDE
18 CyberSWITCH
Call Detail Recording 393
Compression 393
DHCP: Relay Agent 395
Relay Agent Initialization 395
Enabling the Relay Agent 395
Relay Agent Operation 396
DHCP: Proxy Client 396
Proxy Client Initialization 396
Enabling the Proxy Client 396
Proxy Client Operation 397
Proxy ARP Operation 398
LED Indicators 399
Overview 399
Local Area Network LED Indicators 399
WAN LED Indicators 399
Service Indicator 400
Service Indicator Remains Lit 401
Service Indicator Blinks 401
System Messages 403
Overview 403
Informational Messages 403
Boot Messages 404
Initialization Messages 404
Normal Operation Messages 404
Status Messages 404
Spanning Tree Messages 405
Warning Messages 405
Error Messages 405
System Message Summary 405
Trace Messages 464
Overview 464
Call Trace Messages 465
Call Trace Message Summary 466
IP Filters Trace Messages 471
PPP Packet Trace Messages 472
WAN FR_IETF Trace Messages 474
X.25 Trace Messages 474
X.25 Trace Message Summary 474
X.25 (LAPB) Trace Messages 477
X.25 (LAPB) Trace Message Summary 477
SYSTEM MAINTENANCE 479
Remote Management 480
Overview 480
AMP Out-of-Band Management 480
Installation and Configuration 480
Usage Instructions 481
Small Office Remote Access Switch 19
SNMP 482
Installation and Configuration 483
Usage Instructions 483
Telnet 484
Installation and Configuration 485
Usage Instructions 485
TFTP 487
Installation and Configuration 487
Usage Instructions 488
Remote Installation with USER2 489
System Commands 491
Overview 491
Accessing Administration Services 491
Setting the IP Address 492
Boot Device Commands 492
Accessing Dynamic Management 493
Viewing Operational Information 493
Viewing Throughput Information 497
Throughput Monitor Contents 498
Saving Operational Information 499
Clearing Operational Information 499
Configuration-Related Commands 500
Restarting the CyberSWITCH 500
Setting the Date and Time 501
File Utility Commands 501
Terminating Administration Sessions 502
AppleTalk Routing Commands 503
Bridge Commands 507
Call Control Commands 508
Call Detail Recording Commands 511
Call Restriction Commands 512
Compression Information Commands 512
DHCP Commands 512
Frame Relay Commands 513
IP Routing Commands 515
IPX Routing Commands 519
ISDN Usage Commands 521
LAN Commands 522
Log Commands 522
Packet Capture Commands 522
RADIUS Commands 526
SNMP Commands 528
TCP Commands 528
Telnet Commands 528
Terminal Commands 531
TFTP Commands 532
Trace Commands 533
UDP Commands 534
User Level Security Commands 534
WAN Commands 535
X.25 Commands 535
USER’S GUIDE
20 CyberSWITCH
System Statistics 537
Overview 537
Connectivity Statistics 537
Call Restriction Statistics 538
Call Statistics 538
Throughput Monitoring Statistics 538
AppleTalk Statistics 539
AppleTalk Protocol Statistics 539
AppleTalk Data Delivery Protocol (DDP) Statistics 539
AppleTalk Echo Protocol (AEP) Statistics 540
AppleTalk Routing Table Maintenance Protocol (RTMP) Statistics 541
AppleTalk Zone Information Protocol (ZIP) Statistics 541
AppleTalk Name Binding Protocol (NBP) Statistics 542
AppleTalk Transaction Protocol (ATP) Statistics 542
AppleTalk Port Statistics 543
Bridge Statistics 544
Call Detail Recording Statistics 544
Compression Statistics 545
Compression Related Statistics 545
Decompression Related Statistics 545
DHCP Statistics 546
Common DHCP Statistics 546
DHCP Relay Agent Statistics 547
DHCP Proxy Client Statistics 548
Frame Relay Statistics 549
Access Related Statistics 549
PVC Related Statistics 551
LAN Statistics 552
IP Statistics 553
IP Group Statistics 553
ICMP Group Statistics 554
IPX Statistics 556
IPX General Statistics 556
IPX Basic System Table Statistics 556
IPX Advanced System Table Statistics 557
IPX RIP Statistics 558
IPX Triggered RIP Statistics 559
IPX Route Statistics 559
IPX SAP Statistics 560
IPX Triggered SAP Statistics 560
IPX Service Statistics 560
RIP Statistics 561
RIP Global Statistics 561
RIP Interface Statistics 561
SNMP Statistics 562
TCP Statistics 564
TFTP Statistics 565
Statistics for Server or Remote initiated TFTP Activity 565
Statistics for Local or Client Initiated TFTP Activity 566
Statistics for all TFTP Activity 566
UDP Statistics 567
WAN FR_IETF Statistics 568
/