Cabletron Systems CSX1200, CSX1000, CyberSWITCH 1000, CyberSWITCH 1200, CyberSWITCH CSX1000, CyberSWITCH CSX1200 User manual

  • Hello! I am an AI chatbot trained to assist you with the Cabletron Systems CSX1200 User manual. I’ve already reviewed the document and can help you find the information you need or explain it in simple terms. Just ask your questions, and providing more details will help me assist you more effectively!
WORKGROUP
REMOTE ACCESS SWITCH
USER’S GUIDE
Release 7.2
Cabletron Systems
(603) 332-9400 phone
(603) 337-3075 fax
support@ctron.com
USER’S GUIDE
2 CyberSWITCH
NOTICE
You may post this document on a network server for public use as long as no
modifications are made to the document.
Cabletron Systems reserves the right to make changes in specifications and other
information contained in this document without prior notice. The reader should in
all cases consult Cabletron Systems to determine whether any such changes have
been made.
The hardware, firmware, or software described in this manual is subject to change
without notice.
IN NO EVENT SHALL CABLETRON SYSTEMS BE LIABLE FOR ANY
INCIDENTAL, INDIRECT, SPECIAL, OR CONSEQUENTIAL DAMAGES
WHATSOEVER (INCLUDING BUT NOT LIMITED TO LOST PROFITS) ARISING
OUT OF OR RELATED TO THIS MANUAL OR THE INFORMATION
CONTAINED IN IT, EVEN IF CABLETRON SYSTEMS HAS BEEN ADVISED OF,
KNOWN, OR SHOULD HAVE KNOWN, THE POSSIBILITY OF SUCH
DAMAGES.
©Copyright 1998 by Cabletron Systems, Inc. All rights reserved.
Cabletron Systems, Inc.
P.O. Box 5005
Rochester, NH 03866-5005
Order Number: 9032187-02
VIRUS DISCLAIMER
Cabletron Systems has tested its software with current virus checking
technologies. However, because no anti-virus system is 100% reliable, we strongly
caution you to write protect and then verify that the Licensed Software, prior to
installing it, is virus-free with an anti-virus system in which you have confidence.
Cabletron Systems makes no representations or warranties to the effect that the
Licensed Software is virus-free.
Copyright © July 1997, by Cabletron Systems, Inc. All rights reserved.
Only qualified personnel should perform installation
procedures.
!
CAUTION
Workgroup Remote Access Switch 3
TRADEMARKS
Cabletron Systems, CyberSWITCH, MMAC-Plus, SmartSWITCH, SPECTRUM,
and SecureFast Virtual Remote Access Manager are trademarks of Cabletron
Systems, Inc.
All other product names mentioned in this manual are trademarks or registered
trademarks of their respective companies.
COPYRIGHTS
All of the code for this product is copyrighted by Cabletron Systems, Inc.
© Copyright 1991-1997 Cabletron Systems, Inc. All rights reserved. Printed in the
United States of America.
Portions of the code for this product are copyrighted by the following corporations:
Epilogue Technology Corporation
Copyright 1991-1993 by Epilogue Technology Corporation. All rights reserved.
Livingston Enterprises, Inc.
Copyright 1992 Livingston Enterprises, Inc.
Security Dynamics Technologies Inc.
Copyright 1995 by Security Dynamics Technologies Inc. All rights reserved.
Stac Electronics
Stac Electronics 1993, including one or more U.S. Patents No. 4701745, 5016009,
5126739 and 5146221 and other pending patents.
Telenetworks
Copyright 1991, 92, 93 by Telenetworks. All rights reserved.
FCC NOTICE
This device complies with Part 15 of the FCC rules. Operation is subject to the
following two conditions: (1) this device may not cause harmful interference, and
(2) this device must accept any interference received, including interference that
may cause undesired operation.
NOTE: This equipment has been tested and found to comply with the limits for a
Class A digital device, pursuant to Part 15 of the FCC rules. These limits are
designed to provide reasonable protection against harmful interference when the
equipment is operated in a commercial environment. This equipment uses,
generates, and can radiate radio frequency energy and if not installed in
accordance with the operator’s manual, may cause harmful interference to radio
communications. Operation of this equipment in a residential area is likely to cause
interference in which case the user will be required to correct the interference at his
own expense.
USER’S GUIDE
4 CyberSWITCH
WARNING: Changes or modifications made to this device which are not expressly
approved by the party responsible for compliance could void the user’s authority
to operate the equipment.
DOC NOTICE
This digital apparatus does not exceed the Class A limits for radio noise emissions
from digital apparatus set out in the Radio Interference Regulations of the
Canadian Department of Communications.
Le présent appareil numérique n’émet pas de bruits radioélectriques dépassant les
limites applicables aux appareils numériques de la class A prescrites dans le
Règlement sur le brouillage radioélectrique édicté par le ministère des
Communications du Canada.
VCCI NOTICE
This is a Class 1 product based on the standard of the Voluntary Control Council
for Interference by Information Technology Equipment (VCCI). If this equipment
is used in a domestic environment, radio disturbance may arise. When such
trouble occurs, the user may be required to take corrective actions.
CABLETRON SYSTEMS, INC. PROGRAM LICENSE AGREEMENT
IMPORTANT: Before utilizing this product, carefully read this License Agreement.
This document is an agreement between you, the end user, and Cabletron Systems,
Inc. ("Cabletron") that sets forth your rights and obligations with respect to the
Cabletron software program (the "Program") contained in this package. The
Program may be contained in firmware, chips or other media. BY UTILIZING THE
ENCLOSED PRODUCT, YOU ARE AGREEING TO BECOME BOUND BY THE
TERMS OF THIS AGREEMENT, WHICH INCLUDES THE LICENSE AND THE
LIMITATION OF WARRANTY AND DISCLAIMER OF LIABILITY. IF YOU DO
NOT AGREE TO THE TERMS OF THIS AGREEMENT, PROMPTLY RETURN
THE UNUSED PRODUCT TO THE PLACE OF PURCHASE FOR A FULL
REFUND.
Workgroup Remote Access Switch 5
CONTENTS
Using this Guide 23
Documentation Set 24
Guide Conventions 25
SYSTEM OVERVIEW 26
The CyberSWITCH 27
The CyberSWITCH Network 27
Unique System Features 28
Interoperability Overview 30
Interoperability Protocols 30
Interoperability Devices 31
Security Overview 32
Network Interface Overview 32
System Components 33
Remote ISDN Devices 34
Switches Supported 35
Hardware Overview 36
Safety Considerations 36
System Platforms 37
The CSX1000 and NE Link 1000 (a Network Express Product) 37
Platform Description 38
System Characteristics 40
The CSX1200 42
Platform Description 43
System Characteristics 43
Cabling Information 44
LAN Access 44
Back-to-Back Setup 45
WAN Access 46
Administration Console Access 47
System Modules 48
The CSX1200-E11-MOD 48
The CSX1200-U4-MOD 50
Software Overview 51
Overview 51
System software 51
System Files 51
Configuration Files 51
Operational Files 52
User Level Security Files 53
USER’S GUIDE
6 CyberSWITCH
SYSTEM INSTALLATION 54
Ordering ISDN Service (US Only) 56
Overview 56
Ordering NI-1 Lines Using EZ-ISDN Codes 56
Ordering NI-1 Lines Using NI-1 ISDN Ordering Codes 56
Ordering BRI ISDN Lines using Provisioning Settings 56
Provisioning Settings for AT&T 5ESS Switches 57
AT&T 5ESS NI-1 Service 58
AT&T 5ESS Custom Point-to-Point Service 59
Provision Settings for Northern Telecom DMS-100 Switches 60
Northern Telecom DMS100 NI-1 Service 60
Northern Telecom DMS100 Custom Service 61
Basic Information for Ordering PRI ISDN Lines 61
Hardware Installation 63
Pre-Installation Requirements 63
Installing the CSX1200-E11-MOD 64
Installing the CSX1200-U4-MOD 65
Cabling 66
Accessing the CyberSWITCH 67
Overview 67
Making Connections 67
Direct Connection 67
Null-Modem Connection to a PC 67
Changing the Baud Rate 68
Remote Connection using Telnet 69
Remote Connection using a Modem 69
Establishing an Administration Session 70
Powering On 70
Accessing the Release Notes 72
Upgrading System Software 73
Overview 73
Upgrading Software 73
CD File Structure 73
Local Software Upgrade 76
Local Upgrade of the Second Stage Boot (SSB) 76
Local Upgrade of the Operational Software (OSW) 77
Remote Software Upgrade 77
Remote Upgrade of the Second Stage Boot (SSB) 78
Remote Upgrade of the Operational Software (OSW) 79
Change Defaults to Secure System 80
Return Configuration to Factory Defaults 81
Accessing the Release Notes 81
Workgroup Remote Access Switch 7
BASIC CONFIGURATION 82
Configuration Tools 83
Overview 83
CFGEDIT 83
Executing CFGEDIT 83
Saving CFGEDIT Changes 84
Dynamic Management 84
Executing Dynamic Management 84
Utility Dynamic Management Commands 85
Saving Dynamic Management Changes 85
Default Configuration 86
Using the Network Worksheets 86
Using the Configuration Chapters 87
Configuring Resources and Lines 88
Overview 88
Resources 88
Configuring Resources 88
Resource Configuration Elements 90
Resource Background Information 90
Lines 92
Configuring Lines 92
Configuring a Line for a BRI Resource 92
Configuring Changes for a COMMPORT Resource 92
Configuring a Line for a PRI Resource 93
Line Configuration Elements 94
Line Background Information 98
Subaddresses 99
Configuring a Subaddress 99
Subaddress Configuration Elements 99
Subaddresses Background Information 99
Configuring Basic Bridging 100
Overview 100
MAC Layer Bridging Option 100
Enabling/Disabling Bridging 100
MAC Layer Bridging Configuration Elements 100
MAC Layer Bridging Background Information 101
Configuring Basic IP Routing 102
Overview 102
Internet Protocol (IP) Option 102
Enabling IP 102
IP Option Configuration Elements 103
IP Background Information 103
IP Operating Mode 103
Configuring the IP Operating Mode 103
IP Operating Mode Configuration Elements 104
IP Operating Mode Background Information 104
USER’S GUIDE
8 CyberSWITCH
IP Network Interfaces 105
Configuring Interfaces 105
Network Interface Configuration Elements 107
IP Network Interface Background Information 112
IP RIP and the IP Network Interfaces 117
IP RIP over Dedicated Connections 120
IP Host Operating Mode and the IP Network Interfaces 122
Using Multiple IP Addresses 122
Static Routes 124
Configuring Static Routes 124
Static Route Configuration Elements 126
Static Route Background Information 128
Default Routes 129
Configuring Default Routes 129
Default Route Configuration Elements 129
Routing Information Protocol (RIP) Option 130
Enabling/Disabling IP RIP 130
IP RIP Configuration Elements 131
IP RIP Background Information 131
SECURITY 132
Security Overview 133
Overview 133
Security Level 133
System Options and Information 134
Device Level Databases 134
User Level Databases 135
Off-node Server Information 135
Network Login Information 135
Configuring Security Level 136
Overview 136
No Security 138
Configuring No Security 138
Device Level Security 139
Configuring Device Level Security 139
Device Level Security Background Information 139
Overview of Device Authentication Process 140
User Level Security 140
Configuring User Level Security 140
User Level Security Background Information 140
Authentication Using a Security Token Card 141
System Requirements 142
Authentication Process with User Level Security 143
Device and User Level Security 144
Configuring Device and User Level Security 144
Device and User Level Background Information 145
Workgroup Remote Access Switch 9
Configuring System Options and Information 146
Overview 146
System Options 146
Configuring System Options 146
System Options Configuration Elements 147
System Options Background Information 149
System Information 150
Configuring System Information 150
System Information Configuration Elements 150
System Information Background Information 151
Administrative Session 151
Configuring Administrative Sessions 151
Administrative Session Configuration Elements 152
Administrative Session Background Information 153
Alternative Database Location Background Information 153
Session Inactivity Background Information 153
Number of Administrative Telnet Sessions Background Information 153
Telnet Server TCP Port Number Background Information 153
Emergency Telnet Server Port Number Background Information 154
Configuring Device Level Databases 155
Overview 155
On-node Device Database 155
Configuring an On-node Device Database 155
On-node Device Entries 156
Configuring On-node Device Entries 156
On-node Device Database Configuration Elements 163
General Configuration Elements 163
ISDN Configuration Elements 163
Frame Relay Access Configuration Elements 165
X.25 Access Configuration Elements 165
Authentication Configuration Elements 165
IP Information Configuration Elements 167
IPX Information Configuration Elements 167
AppleTalk Information Configuration Elements 168
Bridge Information Configuration Elements 169
Compression Configuration Elements 170
On-node Device Database Background Information 170
On-node Device Database Security Requirements 170
Off-node Device Database Location 174
Configuring Off-node Device Database Location 174
Off-node Device Database Location Configuration Elements 175
Off-node Device Database Location Background Information 175
Configuring User Level Databases 176
Overview 176
User Level Authentication Database Location 176
Configuring Authentication Database Location 176
User Level Authentication Database Location Configuration Elements 177
User Level Authentication Database Location Background Information 177
USER’S GUIDE
10 CyberSWITCH
Configuring Off-node Server Information 178
Overview 178
Multiple Administration Login Names 178
VRA Manager Authentication Server 179
Configuring VRA Manager Authentication Server 179
VRA Manager Authentication Server Configuration Elements 180
VRA Manager Authentication Server Background Information 180
RADIUS Authentication Server 180
Configuring a RADIUS Authentication Server 180
RADIUS Authentication Server Configuration Elements 182
RADIUS Authentication Server Background Information 182
TACACS Authentication Server 183
Configuring a TACACS Authentication Server 183
TACACS Authentication Server Configuration Elements 184
TACACS Authentication Server Background Information 184
ACE Authentication Server 185
Configuring an ACE Authentication Server 185
Alternate Method of Configuration 186
ACE Authentication Server Configuration Elements 186
ACE Authentication Server Background Information 187
Configuring Network Login Information 188
Overview 188
Network Login General Configuration 188
Configuring General Network Login Information 188
Network Login General Configuration Background Information 189
Network Login Banners 190
Configuring Network Login Banners 190
Network Login Banners Background Information 190
Login Configuration Specific to RADIUS Server 191
Configuring RADIUS Server Login Information 191
Login Configuration Specific to RADIUS Server Background Information 192
Login Configuration Specific to TACACS Server 192
Configuring TACACS Server Login Information 192
Login Configuration Specific to TACACS Server Background Information 194
ADVANCED CONFIGURATION 195
Configuring Alternate Accesses 196
Overview 196
Dedicated Accesses 196
Configuring a Dedicated Access 196
Dedicated Access Configuration Elements 196
Dedicated Access Background Information 197
X.25 Accesses 198
Configuring an X.25 Access 198
Basic Configuration Information 198
LAPB Configuration Information 199
X.25 Configuration Information 199
Permanent Virtual Circuit Information 201
Workgroup Remote Access Switch 11
X.25 Configuration Elements 201
X.25 Line Configuration Elements 201
LAPB Configuration Elements 202
X.25 Access Configuration Elements 203
PVC Configuration Elements 206
X.25 Access Background Information 207
Current X.25 Restrictions 209
Frame Relay Accesses 209
Configuring a Frame Relay Access 209
Configuring General Access Information 209
Configuring a PVC 210
Frame Relay General Configuration Elements 211
Frame Relay PVC Configuration Elements 212
Frame Relay Access Background Information 214
The Local Management Interface Overview 215
Data Rate Control Overview 215
Congestion Control Overview 216
Current Restrictions 216
Configuring Advanced Bridging 218
Overview 218
Bridge Dial Out 218
Configuring the Device List for Bridge Dial Out 219
Spanning Tree Protocol 220
Configuring Spanning Tree Protocol 220
Spanning Tree Protocol Configuration Elements 220
Bridge Mode of Operation 220
Configuring the Bridge Mode of Operation 220
Bridge Mode of Operation Configuration Elements 220
Bridge Mode of Operation Background Information 221
Unrestricted Bridge Mode 221
Restricted Bridge Mode 221
Bridge Filters 222
Configuring Bridge Filters 222
Bridge Filter Configuration Elements 224
Protocol Definition Configuration Elements 224
Bridge Filter Configuration Elements 224
Bridge Filters Background Information 225
Protocol Definitions 226
Bridge Filter Definitions 227
Dial Out Using Bridge Filters 233
Example: Bridge Dial Out Using a Destination MAC Address Filter 233
Known Connect List 235
Configuring the Known Connect List 235
Using CFGEDIT 235
Known Connect List Configuration Elements 236
Known Connect List Background Information 236
USER’S GUIDE
12 CyberSWITCH
Configuring Advanced IP Routing 237
Overview 237
Static ARP Table Entries 238
Configuring Static ARP Table Entries 238
Static ARP Table Entries Configuration Elements 238
Static ARP Table Entries Background Information 238
The Isolated Mode 239
Configuring the Isolated Mode 239
Isolated Mode Configuration Elements 239
Isolated Mode Background Information 239
Static Route Lookup via RADIUS 239
Configuring Static Route Lookup via RADIUS 239
Static Route via RADIUS Configuration Elements 240
Static Route Lookup via RADIUS Background Information 240
IP Address Pool 240
Configuring an IP Address Pool 240
IP Address Pool Configuration Elements 240
IP Address Pool Background Information 241
IP Filters 241
Initiating the IP Filter Configuration 241
Configuring Packet Types 242
Configuring the Common IP Portion 243
Configuring TCP 244
Configuring UDP 244
Configuring ICMP 245
Configuring Forwarding Filters 246
Configuring Connection Filters 247
Using CFGEDIT 247
Configuring Exception Filter 248
Modifying the Final Condition for a Filter 249
Applying Filters 249
Applying Filters to Network Interfaces 249
Applying the Global Forwarding Filter 249
Applying per-device Forwarding Filters 249
IP Filters Configuration Elements 250
IP Filters Background Information 251
Filter Composition 252
Types of Filters 252
Role of Filters in the IP Processing Flow 253
Packet Types 254
Limitations 255
Example of an IP Filter Configuration 256
DHCP Relay Agent 258
Configuring a DHCP Relay Agent 258
DHCP Configuration Elements 259
DHCP Background Information 259
DHCP/BOOTP Relay Agent Environments 259
Example DHCP Configurations 261
DHCP Proxy Client 265
Configuring the DHCP Proxy Client 265
DHCP Configuration Elements and Background Information 266
Sample Configuration: IP Router with DHCP Proxy Client 267
Workgroup Remote Access Switch 13
Configuring IPX 269
Overview 269
Configuring IPX Information 270
IPX Routing Option 271
Enabling/Disabling IPX 271
IPX Option Configuration Element 271
IPX Option Background Information 272
IPX Internal Network Number 272
Configuring the IPX Internal Network Number 272
IPX Internal Network Number Configuration Element 272
IPX Network Number Background Information 273
IPX Network Interfaces 273
Configuring IPX Network Interfaces 273
IPX Network Interface Configuration Elements 275
General IPX Network Interface Configuration Elements 275
RIP IPX Network Interface Configuration Elements 275
SAP IPX Network Interface Configuration Elements 276
IPX Network Interface Background Information 277
IPX Routing Protocols 278
Configuring IPX Routing Protocols 278
IPX Routing Protocol Configuration Elements 278
IPX Routing Protocol Background Information 279
Routing/Service Tables 279
Special Considerations - Remote LAN Interface 280
IPX Static Routes 281
Configuring IPX Static Routes 281
IPX Static Routes Configuration Elements 282
IPX Static Routes Background Information 282
IPX NetWare Static Services 283
Configuring IPX NetWare Static Services 283
IPX NetWare Static Services Configuration Elements 284
IPX NetWare Static Services Background Information 285
IPX Spoofing 285
Configuring IPX Spoofing 285
IPX Spoofing Configuration Elements 286
IPX Spoofing Background Information 286
Watchdog Protocol 287
SPX Protocol 287
IPX Type 20 Packet Handling 288
Configuring IPX Type 20 Packet Handling 288
IPX Type 20 Packet Handling Configuration Elements 289
IPX Type 20 Packet Handling Device Configuration Elements 289
IPX Type 20 Packet Handling Background Information 289
IPX Isolated Mode 289
Configuring IPX Isolated Mode 289
IPX Isolated Mode Configuration Elements 289
IPX Isolated Mode Background Information 290
IPX Triggered RIP/SAP 290
Displaying WAN Peer List 290
Configuring Triggered RIP/SAP Global Timers 291
Configuration Elements 291
Triggered RIP/SAP Background Information 292
USER’S GUIDE
14 CyberSWITCH
IPX-Specific Information for Devices 292
Configuring IPX Devices 292
WAN Devices 292
Remote LAN Devices 295
IPX Configuration Elements for Devices 296
IPX Background Information for Devices 297
IPX Triggered RIP/SAP Device Background 297
Configuring SNMP 298
Overview 298
Configuring SNMP 298
SNMP Configuration Elements 300
SNMP Background Information 301
Configuring AppleTalk Routing 305
Overview 305
AppleTalk Routing Option 305
Enabling AppleTalk Routing 305
AppleTalk Routing Option Configuration Element 306
AppleTalk Routing Background Information 306
AppleTalk Ports 306
Configuring AppleTalk Ports 306
AppleTalk Ports Configuration Elements 307
AppleTalk Ports Background Information 308
The AppleTalk Network Type 308
Dynamic Node Address Assignment 308
The Zone Concept 309
AppleTalk Remote LAN 309
AppleTalk Static Routes 310
Configuring AppleTalk Static Routes 310
AppleTalk Routing Static Routes Configuration Elements 311
AppleTalk Routing Static Routes Background Information 311
AppleTalk Capacities 311
Configuring AppleTalk Capacities 311
AppleTalk Capacities Configuration Elements 311
AppleTalk Capacities Background Information 312
AppleTalk Isolated Mode 312
Configuring the AppleTalk Isolated Mode 312
AppleTalk Isolated Mode Configuration Elements 312
Configuring Call Control 313
Overview 313
Throughput Monitor 313
Configuring the Throughput Monitor 313
Throughput Monitor Configuration Elements 314
Throughput Monitor Background Information 315
Overload Condition Monitoring 316
Underload Condition Monitoring 316
Idle Condition Monitoring 317
Throughput Monitor Configuration Example 317
Workgroup Remote Access Switch 15
Call Interval Parameters 318
Configuring the Call Interval Parameters 318
Call Interval Configuration Elements 318
Call Interval Background Information 318
Monthly Call Charge 319
Configuring Monthly Call Charge 319
Monthly Call Charge Configuration Elements 319
Monthly Call Charge Background Information 319
Call Restrictions 320
Configuring Call Restrictions 320
Call Restriction Configuration Elements 320
Call Restrictions Background Information 322
Bandwidth Reservation 323
Configuring Bandwidth Reservation 323
Bandwidth Reservation Configuration Elements 325
Bandwidth Reservation Background Information 326
Semipermanent Connections 326
Configuring Semipermanent Connections 326
Semipermanent Connections Configuration Elements 328
Semipermanent Connections Background Information 328
Interactions with Other Features 328
VRA Manager as a Call Control Manager 330
Configuring VRA Manager for Call Control 330
Configuration Elements 330
Background Information 331
Call Control Management 331
Limitations/Considerations 332
Configuring Other Advanced Options 333
Overview 333
PPP Configuration 333
Configuring PPP 333
PPP Configuration Elements 334
PPP Background Information 335
PPP Link Failure Detection 335
PPP Reference Documents 336
Default Line Protocol 337
Configuring Default Line Protocol 337
Default Line Protocol Configuration Elements 337
Default Line Protocol Background Information 337
Log Options 338
Configuring Log Options 338
Log Options Configuration Elements 338
Log Options Background Information 339
Local Log File Overview 339
Syslog Server Overview 339
CDR Log Report Overview 340
Compression Options 345
Configuring Compression Options 345
Compression Options Configuration Elements 345
Compression Options Background Information 346
Compression and CCP 347
USER’S GUIDE
16 CyberSWITCH
TFTP 348
Configuring TFTP 348
TFTP Configuration Elements 349
TFTP Background Information 349
File Attributes 350
Configuring File Attributes 350
File Attributes Configuration Elements 350
File Attributes Background Information 350
TROUBLESHOOTING 352
System Verification 353
Overview 353
Verifying Hardware Resources are Operational 353
Verifying WAN Lines are Available for Use 354
Verifying LAN Connection is Operational 354
Verifying Bridge is Initialized 355
Verifying IP Router is Initialized 355
Verifying a Dedicated Connection 356
Verifying a Frame Relay Connection 356
Verifying an X.25 Connection 357
Verifying Remote Device Connectivity 357
Verifying Multi-Level Security 357
Verifying IP Host Mode is Operational 359
Verifying IP Host is Initialized 359
Verifying IP Host Mode is Operational 359
Verifying IP Host Mode Operation over a LAN connection 359
Verifying IP Host Mode Operation over a WAN connection 360
Verifying IP Routing Over Interfaces 360
Verifying IP Routing Over a LAN Interface 360
Verifying IP Routing Over a WAN Interface 361
Verifying IP Routing Over a WAN (Direct Host) Interface 363
Verifying IP Routing Over a WAN Remote LAN Interface 364
Verifying IP Routing Over a WAN UnNumbered Interface 365
Verifying IP Filters 366
Verifying IP RIP 366
Verifying IP RIP is Initialized 366
Verifying IP RIP Output Processing on a LAN Interface 367
Verifying IP RIP Input Processing on a LAN Interface 368
Verifying IP RIP Output Processing on a WAN Interface 368
Verify IP RIP Input Processing Operational on a WAN Interface 369
Verifying IPX Router is Initialized 370
Verifying IPX Routing is Operational 370
Verifying IPX Routing over a LAN Connection 371
Verifying an IPX Remote LAN Connection 371
Verifying IPX Routing over a WAN Connection 372
Verifying Triggered RIP/SAP 372
Workgroup Remote Access Switch 17
Verifying the AppleTalk Routing Feature 372
Verifying AppleTalk Routing is Initialized 372
Verifying AppleTalk Routing is Operational 373
Verifying AppleTalk Routing Operational over the LAN connection 374
Verifying AppleTalk Routing Operation over a WAN connection 374
Verifying SNMP is Operational 375
Verifying the Dial Out Feature 376
Verifying Call Detail Recording 376
Verifying Compression is Operational 377
Verifying Reserved Bandwidth is Operational 377
Verifying PPP Link Failure Detection is Operational 377
Verifying DHCP Relay Agent 378
Verifying DHCP Relay Agent Initialization 378
Verifying the Relay Agent is Enabled 379
Verifying the Relay Agent is Operational 379
Verifying DHCP: Proxy Client 380
Verifying DHCP Proxy Client Initialization 380
Verifying the Proxy Client is Enabled 381
Verifying the Proxy Client is Operational 381
UDP Ports 381
IP Address Pool 382
Verifying a Semipermanent Connection 382
Verifying Proxy ARP is Operational 382
Problem Diagnosis 384
Overview 384
General Procedures 384
LAN Adapter 384
Bridge Initialization 385
IP Routing Initialization 385
WAN Line Availability 385
Dedicated Connections 387
Frame Relay Connections 387
X.25 Connections 388
Remote Device Connectivity 389
Multi-Level Security 390
LAN Attachment 390
IP Host Mode 391
IP Host Initialization 391
IP Host Mode Operation over the LAN connection 391
IP Host Mode Operation over the WAN connection 392
IP Routing Over Interface Connections 392
IP Routing Over the LAN Interface Connection 392
IP Routing Over a WAN Interface Connection 393
IP Routing Over a WAN (Direct Host) Interface Connection 394
IP Routing Over a WAN RLAN Interface Connection 395
IP Routing Over a WAN UnNumbered Interface Connection 396
IP Filters 396
USER’S GUIDE
18 CyberSWITCH
IP RIP 397
IP RIP Initialization 397
IP RIP Output Processing on a LAN Interface 398
IP RIP Input Processing on a LAN Interface 398
IP RIP Output Processing on a WAN Interface 399
IP RIP Input Processing on a WAN Interface 399
IPX Routing 400
IPX Routing Initialization 400
IPX Routing over the LAN Connection 400
IPX Routing over the Remote LAN Connection 401
IPX Routing over the WAN Connection 402
IPX Routing and Service Tables 403
Triggered RIP/SAP Start Up 404
Triggered RIP/SAP Operation 404
AppleTalk Routing 404
AppleTalk Routing Initialization 405
AppleTalk Routing Operational over the LAN connection 405
AppleTalk Routing Operational over the WAN connection 407
SNMP 408
Dial Out 410
Call Detail Recording 411
Compression 412
DHCP: Relay Agent 413
Relay Agent Initialization 413
Enabling the Relay Agent 413
Relay Agent Operation 414
DHCP: Proxy Client 414
Proxy Client Initialization 414
Enabling the Proxy Client 415
Proxy Client Operation 415
Proxy ARP Operation 416
LED Indicators 418
Overview 418
Local Area Network LED Indicators 418
WAN LED Indicators 418
BRI LED Indicators 418
PRI LED Indicators 419
LANVIEW LEDs (CSX1200-E11-MOD) 420
NT1 Status LEDs (CSX1200-U4-MOD only) 421
Service Indicator 422
Service Indicator Remains Lit 422
Service Indicator Blinks 423
Alarm LEDs (PRI Only) 424
Workgroup Remote Access Switch 19
System Messages 426
Overview 426
Informational Messages 426
Boot Messages 427
Initialization Messages 427
Normal Operation Messages 427
Status Messages 427
Spanning Tree Messages 428
Warning Messages 428
Error Messages 428
System Message Summary 428
Trace Messages 487
Overview 487
Call Trace Messages 488
Call Trace Message Summary 489
IP Filters Trace Messages 494
PPP Packet Trace Messages 495
WAN FR_IETF Trace Messages 497
X.25 Trace Messages 497
X.25 Trace Message Summary 497
X.25 (LAPB) Trace Messages 500
X.25 (LAPB) Trace Message Summary 500
SYSTEM MAINTENANCE 502
Remote Management 503
Overview 503
SNMP 504
Installation and Configuration 504
Usage Instructions 505
Telnet 506
Installation and Configuration 507
Usage Instructions 508
TFTP 509
Installation and Configuration 509
Usage Instructions 510
Remote Installation with USER2 511
System Commands 513
Overview 513
Accessing Administration Services 513
Setting the IP Address 514
Boot Device Commands 514
Accessing Dynamic Management 515
Viewing Operational Information 515
Viewing Throughput Information 520
Throughput Monitor Contents 521
Saving Operational Information 521
USER’S GUIDE
20 CyberSWITCH
Clearing Operational Information 522
Configuration-Related Commands 522
Restarting the CyberSWITCH 523
Setting the Date and Time 523
File Utility Commands 523
Terminating Administration Sessions 524
AppleTalk Routing Commands 525
Bridge Commands 530
Call Control Commands 531
Call Detail Recording Commands 534
Call Restriction Commands 534
Compression Information Commands 535
DHCP Commands 535
Frame Relay Commands 535
IP Routing Commands 537
IPX Routing Commands 542
ISDN Usage Commands 544
LAN Commands 545
Log Commands 545
Packet Capture Commands 545
RADIUS Commands 549
SNMP Commands 551
TCP Commands 551
Telnet Commands 551
Terminal Commands 554
TFTP Commands 555
Trace Commands 556
UDP Commands 557
User Level Security Commands 557
WAN Commands 558
X.25 Commands 558
System Statistics 560
Overview 560
Connectivity Statistics 560
Call Restriction Statistics 560
Call Statistics 561
Throughput Monitoring Statistics 561
AppleTalk Statistics 562
AppleTalk Protocol Statistics 562
AppleTalk Data Delivery Protocol (DDP) Statistics 562
AppleTalk Echo Protocol (AEP) Statistics 563
AppleTalk Routing Table Maintenance Protocol (RTMP) Statistics 564
AppleTalk Zone Information Protocol (ZIP) Statistics 564
AppleTalk Name Binding Protocol (NBP) Statistics 565
AppleTalk Transaction Protocol (ATP) Statistics 565
AppleTalk Port Statistics 566
Bridge Statistics 567
Call Detail Recording Statistics 567
Compression Statistics 568
Compression Related Statistics 568
Decompression Related Statistics 568
/