T1 AND E1 REMOTE ACCESS CONCENTRATORS
72
5.2 CSM Configuration
To configure CSM, these prerequisites need to be in place:
1. The CSM software should be properly installed and running.
2. Make sure that these critical authentication values for the Concentrator have been configured in the
Concentrator’s Local Management utility (see
Sections 4.3.1.A
,
4.3.3
, and
4.3.7
) and that you set them
to match in CSM:
• The Concentrator’s IP address, name, and secret.
• The CSM secret.
These values should be readily available if you recorded them on a copy of the Concentrator’s Worksheet;
see
Section 4.1
.
3. Determine whether or not you will use the Concentrator to initiate calls:
• If the Concentrator
will
initiate calls, you must assign permanent IP addresses to all remote devices
receiving calls.
• If the Concentrator does
not
need to initiate calls, you may use an IP-address pool for remote devices.
When these things are ready/decided, you can configure CSM for your application. Full configuration
information is in CSM’s HTML documentation, but the basic CSM-configuration elements consist of:
• Establishing IP-pool information (optional); see
Section 5.2.1
.
• Setting up CSM to work with the Access Server (that is, the Concentrator); see
Section 5.2.2
.
• Setting up CSM to work with your remote devices; see
Section 5.2.3
.