background image

USER’S GUIDE

314      CyberSWITCH

User Level Security
If you use user level security for authentication: configure devices on the VRA manager as well. 
This will provide access to the following VRA call control management features: call 
restrictions, maximum bandwidth, and grouping (in addition to the call logging feature).

User level security and VRA call control management work together as follows: VRA allows a 
device to connect under an alias name until the user can be verified by its authentication server. 
Once the user is properly authenticated, the device’s name is forwarded to the VRA manager. 
The VRA manager can then further determine whether or not the device should be allowed 
connectivity at this time. 

Possible reasons VRA may disconnect the device’s call:

Call restrictions reached for this device.

Maximum bandwidth reached for this device.

Device and CyberSWITCH to which it is connected are not part of the same group.

Device on a reserved channel and not a reserved device.

Device not defined in VRA manager.

Note:

The alias assigned to initial calls is REMOTEx. Be sure you do not use this name for any 
of your device names when configuring VRA or your authentication server.

L

IMITATIONS

/C

ONSIDERATIONS

VRA must not initiate outgoing connections through the CyberSWITCH using non-VRA au-
thentication.

VRA as Call Control Manager may not be disabled if VRA is the authentication agent.

VRA as Call Control Manager is not disabled when VRA as authentication agent is disabled.

VRA does not override information found on the authenticating server except for: call restric-
tions, maximum bandwidth, and grouping.

VRA does not allow device names of REMOTEx to be configured.

Summary of Contents for CyberSWITCH CSX150

Page 1: ...SMALL OFFICE REMOTE ACCESS SWITCH USER S GUIDE Release 7 2 Cabletron Systems 603 332 9400 phone 603 337 3075 fax support ctron com...

Page 2: ...TED TO THIS MANUAL OR THE INFORMATION CONTAINED IN IT EVEN IF CABLETRON SYSTEMS HAS BEEN ADVISED OF KNOWN OR SHOULD HAVE KNOWN THE POSSIBILITY OF SUCH DAMAGES Copyright 1998 by Cabletron Systems Inc A...

Page 3: ...ics 1993 including one or more U S Patents No 4701745 5016009 5126739 and 5146221 and other pending patents Telenetworks Copyright 1991 92 93 by Telenetworks All rights reserved FCC NOTICE This device...

Page 4: ...ontrol Council for Interference by Information Technology Equipment VCCI If this equipment is used in a domestic environment radio disturbance may arise When such trouble occurs the user may be requir...

Page 5: ...2 Switches Supported 33 Hardware Overview 34 Safety Considerations 34 System Platforms 35 CyberSWITCH Characteristics 35 CyberSWITCH Series 36 CyberSWITCH Front Panel 36 CyberSWITCH Back Panel 37 Soft...

Page 6: ...ion 53 Powering On 53 Accessing the Release Notes 54 Upgrading System Software 56 Overview 56 Upgrading Software 56 Local Software Upgrade 57 Local Upgrade of the Second Stage Boot SSB 57 Local Upgrad...

Page 7: ...ion Elements 81 MAC Layer Bridging Background Information 82 Configuring Basic IP Routing 83 Overview 83 Internet Protocol IP Option 83 Enabling IP 83 IP Option Configuration Elements 84 IP Background...

Page 8: ...1 Authentication Using a Security Token Card 122 System Requirements 123 Authentication Process with User Level Security 124 Device and User Level Security 125 Configuring Device and User Level Securi...

Page 9: ...tion 156 Configuring Off node Device Database Location 156 Off node Device Database Location Configuration Elements 156 Off node Device Database Location Background Information 156 Configuring User Le...

Page 10: ...Information 175 ADVANCED CONFIGURATION 176 Configuring Alternate Accesses 177 Dedicated Accesses 177 Configuring a Dedicated Access 177 Dedicated Access Configuration Elements 177 Dedicated Access Bac...

Page 11: ...Bridge Filter Configuration Elements 207 Protocol Definition Configuration Elements 207 Bridge Filter Configuration Elements 207 Hardware Filter Configuration Elements 208 Bridge Filters Background In...

Page 12: ...Filters in the IP Processing Flow 235 Packet Types 236 Limitations 237 Example of an IP Filter Configuration 238 DHCP Relay Agent 240 Configuring a DHCP Relay Agent 240 DHCP Configuration Elements 24...

Page 13: ...nfiguration Elements 266 IPX NetWare Static Services Background Information 267 IPX Spoofing 267 Configuring IPX Spoofing 267 IPX Spoofing Configuration Elements 268 IPX Spoofing Background Informatio...

Page 14: ...293 AppleTalk Capacities Configuration Elements 293 AppleTalk Capacities Background Information 294 AppleTalk Isolated Mode 294 Configuring the AppleTalk Isolated Mode 294 AppleTalk Isolated Mode Con...

Page 15: ...315 PPP Configuration Elements 316 PPP Background Information 317 PPP Link Failure Detection 317 PPP Reference Documents 318 Default Line Protocol 319 Configuring Default Line Protocol 319 Default Li...

Page 16: ...348 Verifying IP RIP 348 Verifying IP RIP is Initialized 348 Verifying IP RIP Output Processing on a LAN Interface 349 Verifying IP RIP Input Processing on a LAN Interface 350 Verifying IP RIP Output...

Page 17: ...ns 374 IP Routing Over the LAN Interface Connection 374 IP Routing Over a WAN Interface Connection 375 IP Routing Over a WAN Direct Host Interface Connection 376 IP Routing Over a WAN RLAN Interface C...

Page 18: ...stem Messages 403 Overview 403 Informational Messages 403 Boot Messages 404 Initialization Messages 404 Normal Operation Messages 404 Status Messages 404 Spanning Tree Messages 405 Warning Messages 40...

Page 19: ...aring Operational Information 499 Configuration Related Commands 500 Restarting the CyberSWITCH 500 Setting the Date and Time 501 File Utility Commands 501 Terminating Administration Sessions 502 Appl...

Page 20: ...ed Statistics 545 DHCP Statistics 546 Common DHCP Statistics 546 DHCP Relay Agent Statistics 547 DHCP Proxy Client Statistics 548 Frame Relay Statistics 549 Access Related Statistics 549 PVC Related S...

Page 21: ...and Restore 573 Obtaining System Custom Information 573 APPENDICES 574 System Worksheets 575 Network Topology 576 System Details 577 Resources 577 Lines 577 Accesses 578 Device Information 579 Bridgi...

Page 22: ...ecurity information may be stored on several different types of databases either locally or on a variety of remote databases System security also allows the configuration of administrative session Tel...

Page 23: ...codes may appear in call trace messages DOCUMENTATION SET This guide the User s Guide provides information to install and configure your system It also provides information you may need to refer to k...

Page 24: ...the documentation System Commands All system commands Administration and Manage Mode commands are italicized and in a different font than the general text For example if you are instructed to enter t...

Page 25: ...a CyberSWITCH network We include an overview of unique system features interoperability security interfaces system components remote devices and switches supported Hardware Overview A description of s...

Page 26: ...ive for individual users New forms of networking are now possible and affordable using the Integrated Services Digital Network ISDN ISDN is being deployed by major telecommunications companies world w...

Page 27: ...The system dynamically controls the bandwidth in use between itself and other PPP devices This is accomplished by establishing and disconnecting calls The number of calls is limited only by the types...

Page 28: ...em over the switched digital network The system monitors the connection for utilization and will remove the connection when it becomes idle Dynamic Management Provides a real time management mechanism...

Page 29: ...eatures that help prevent unauthorized or inadvertent access to critical data and resources The modules support extensive security levels including PPP PAP and CHAP User name and password Calling Line...

Page 30: ...Routers AppleTalk Routers MAC layer bridges connect to the system using the HDLC bridge encapsulation line protocol These devices send transparently bridged Ethernet frames to the system MAC layer br...

Page 31: ...grammed in conjunction with the authentication server generates random passwords These passwords must be supplied correctly at system login time or access to the network will be denied The security to...

Page 32: ...wing section describes remote ISDN devices REMOTE ISDN DEVICES The CyberSWITCH provides a centralized concentrator function for remote ISDN devices The devices can be separated into the following cate...

Page 33: ...S NA Yes AT T 5ESS Yes Yes AT T Definity Yes Yes AT T Legend Yes NA NET3 Yes NA NET5 NA Yes NT DMS 100 Yes Yes NT DMS 250 NA Yes NT SL 100 Yes Yes NTT Yes Yes NI 1 Yes NA TS013 Yes NA TS014 NA Yes 1TR...

Page 34: ...Service POTS interface which supports up to two telephone type devices including standard phones modems fax machines and answering machines The System s POTS service supports tone dialing only System...

Page 35: ...b Environmental Characteristics Operating Temp 0 to 40 C 32 to 104 F Operating Humidity 5 95 non condensing Operating Altitude 3000 m maximum 10 000 ft maximum Non operating Shock 30 G 11 ms 1 2 sinew...

Page 36: ...RX and 10BaseT These light to indicate transmissions receptions or good link integrity on the 10Base T port The WAN indicators CH 1 CH 2 D Chan and Sync When Sync is lit it indicates the line is conne...

Page 37: ...he BRI line Conversely when the switches are off the resistors for the connector are not providing termination for the BRI line On an S T interface it is important to have the termination switches set...

Page 38: ...0Base T LAN connector Note The 10Base T connector and the WAN connector are both RJ45 connectors However they do have different electrical interfaces Take care to keep these separate Pin Signal Functi...

Page 39: ...default are combined in this file SYSTEM FILES The CyberSWITCH uses a flash file system instead of a hard disk and a two stage boot device to initialize the platform and download the system software T...

Page 40: ...ns which contained filter information in the lan nei and or ip nei files With Release 7 2 configuration changes and configuration file updates this filter information will be moved to filter nei atalk...

Page 41: ...time a new file is written USER LEVEL SECURITY FILES As administrator you may create a welcome banner file as well as a message of the day file to display at login with user level security Neither fil...

Page 42: ...ering ISDN service in the United States Hardware Installation Step by step instructions for installing hardware components Accessing the CyberSWITCH Provides a description of the possible ways to acce...

Page 43: ...guration information and to POTS configuration elements definitions ORDERING NI 1 LINES USING NI 1 ISDN ORDERING CODES If you are using a NI 1 switch type and your service provider supports ordering c...

Page 44: ...orthern Telecom s DMS100 NI 1 are among the most popular When ordering an ISDN line there are general steps to follow that apply to all types and there are steps specific to your line type The general...

Page 45: ...nt The sections below provide the settings for each 5ESS service type Note that your service provider may not be able to offer all of the features listed AT T 5ESS NI 1 SERVICE Note that some of the e...

Page 46: ...COM DMS 100 SWITCHES The ISDN services supported by Northern Telecom DMS 100 switches are as follows in order of preference of usage 1 NI 1 2 Custom Service The sections below provide the settings for...

Page 47: ...set both of them to yes Northern Telecom DMS100 NI 1 Service Provisioning Element Setting signaling functional PVC 2 TEI assignment dynamic maxkeys 3 is preferable 1 64 is acceptable release key no r...

Page 48: ...r ACO to yes You may not set both of them to yes Northern Telecom DMS100 Custom Service Provisioning Element Setting signaling functional PVC 1 TEI assignment dynamic maxkeys 3 is preferable 1 64 is a...

Page 49: ...t This cable is a 9 pin female to 9 pin female null modem cable Jack screws are included Note The BRI PRI LAN cables are straight through CAT5 patch cables The quantity shipped varies based on device...

Page 50: ...n you merely connect up an ASCII terminal to the Console port How ever this method can only be used to configure or manage the system To install or upgrade system software you must use the null modem...

Page 51: ...WITCH and the other end to the communication port on the PC On the PC you must then execute a communication package to emulate a terminal VT100 Your communication package should support file transfer...

Page 52: ...device s IP address to be on the same subnet as the CyberSWITCH We recommend that you use 1 1 1 2 and do this on a LAN that is not connected to the internet Then place the CyberSWITCH on the LAN and T...

Page 53: ...elow admin 3 It is recommended that the preconfigured password be changed to a user defined password To do this enter the following command at the system prompt pswd Follow the prompts to change the c...

Page 54: ...and valid system software is detected the Second Stage Boot begins to load the system software Dots are displayed to indicate progress The display will look like the following 5 Log in and password pr...

Page 55: ...atform directory ISDN standard directory option directory type REL_NOTE TXT more For example if your CD ROM is designated as drive D the platform you are installing is a CSX150 you are using US ISDN s...

Page 56: ...d remote To perform a local upgrade refer to the section titled Local Software Upgrade A local upgrade is performed via the administration console attached to the system s RS232 port To perform a remo...

Page 57: ...follow with the update of the OSW LOCAL UPGRADE OF THE SECOND STAGE BOOT SSB 1 Restart the CyberSWITCH 2 When Waiting for Commands appears on the system screen enter the following command recover 3 W...

Page 58: ...nd until the download has started 7 After the file has been downloaded the system will reboot automatically and load using the new software REMOTE SOFTWARE UPGRADE Note For security purposes we recomm...

Page 59: ...ng to install the OSW package each time REMOTE UPGRADE OF THE SECOND STAGE BOOT SSB WARNING If power is lost on the remote CyberSWITCH during this process a local upgrade of the SSB may be necessary b...

Page 60: ...sfer varies depending upon your TFTP client Note If you experience a transmission timeout check the retransmission setting on the TFTP package A retransmission rate of 10 seconds is usually sufficient...

Page 61: ...ts Use Dynamic Management s manage mode to carry out either of these functions To enter the manage mode type manage at the system prompt If you have no need for these types of devices PPP devices simp...

Page 62: ...Local or Remote Upgrade except download the file DEFLTCFG OSW instead of the UPGRADE OSW file ACCESSING THE RELEASE NOTES The Release Notes provide release highlights and important information relate...

Page 63: ...ent of the User s Guide Configuration Tools A description of the configuration tools provided for configuring the CyberSWITCH Configuring Lines and Resources Instructions for configuring your system s...

Page 64: ...ode does have its limitations So when making configuration changes you usually need to use a combination of both of these two tools You may only have one CFGEDIT or Dynamic Management session active a...

Page 65: ...yet but return to the Main Menu for further configuration RET To save changes at this point answer Y for yes The save process also includes all unsaved Manage Mode changes which were made prior to th...

Page 66: ...ode help command lists the available Dynamic Management commands and instructs the user to enter the command followed by a question mark to see help information for that specific command readme Displa...

Page 67: ...ult Configuration Summary Bridging Disabled IP Routing Enabled IP LAN Interface with IP address 1 1 1 1 Device Level Security CHAP enabled USER1 configured as PPP device USER1 as secret UnNumbered IP...

Page 68: ...format is 1 A brief outline of the configuration procedure using CFGEDIT if applicable Note In this guide we have included a map of the configuration utility CFGEDIT 2 A brief outline of the configura...

Page 69: ...of operation The WAN resource Ethernet resource and Serial resource COMMPORT are preinstalled and preconfigured on all systems However switch type selection is country dependent Refer to the country...

Page 70: ...riate region Based upon the region you select a list of countries will be displayed 4 Select the country of operation 5 If you cannot find your country on any list return to the Region Menu and select...

Page 71: ...ON The basic rate BRI resource directly terminates a standard USOC RJ45 connector It is supplied with a standard S T interface A U interface option is not available for this adapter The BRI resource s...

Page 72: ...e named ASYNDMPORT This line may not be deleted from the CyberSWITCH configuration but its values including mode of operation are changeable A single WAN line and resource are also preconfigured To ch...

Page 73: ...s supplied by your carrier c Number of digits to verify CONFIGURING CHANGES FOR A COMMPORT RESOURCE 1 Select Change from the Data Lines menu of Physical Resources 2 Select ASYNCDMPORT 3 You will be pr...

Page 74: ...The point to point interface type is the type most often used in the U S point multipoint is most often used in Japan AUTO TEI The default setting for automatic TEI negotiation is yes For 5ESS and DMS...

Page 75: ...ink to the telephone switch Your Carrier Service can provide you with the data link values you need to configure All switch types except the DMS100 and the NI 1 require a single data link per line The...

Page 76: ...de of the BRI line The SPID format for Northern Telecom DMS 100 NI 1 Service is aaannnnnnnss where aaa is the 3 digit area code of the BRI line nnnnnnn is the 7 digit phone number of the BRI line ss i...

Page 77: ...ems using the asynchronous management port COMMPORT for out of band management These elements control how the port will function Elements include modem name baud rate data bits stop bits parity value...

Page 78: ...e dual line Plain Old Telephone Service POTS feature allows one or both of the ISDN B channels to alternatively be used with traditional phone equipment including faxes and answering machines There ar...

Page 79: ...is busy If you disable this option the system will reject the incoming call c Select the Type of Device Connected to this Jack Select telephone or other Configuring POTS Information Per Device To conf...

Page 80: ...he system can use both B channels for data until a call is initiated or received When a call comes up it may then drop back to a single B channel for data and reserve the other B channel for POTS use...

Page 81: ...bridging filters known connect lists MAC LAYER BRIDGING OPTION ENABLING DISABLING BRIDGING USING CFGEDIT 1 Select Bridging from the Options Menu The following menu will then be displayed 2 Select Enab...

Page 82: ...ging is enabled the system bridges data packets to the proper destination regardless of the network protocols being used The default configuration is bridging enabled Note If the bridge and the IP opt...

Page 83: ...etwork that support IP RIP will not need static routes IP RIP will maintain those routes However static routes must be configured to identify remote networks connected across the WAN and for routers t...

Page 84: ...mode which allows you to use IP applications such as Telnet and SNMP on a bridged network is a selectable option The Simple Remote Bridging chapter of the Examples Guide provides an example of a simpl...

Page 85: ...subnet number assigned to it The IP host operating mode allows the management of a device using IP applications such as Telnet and SNMP while operating as a bridge IP host mode is useful in situations...

Page 86: ...se routes IP NETWORK INTERFACES CONFIGURING INTERFACES USING CFGEDIT Note IP RIP v1 refers to IP RIP Version 1 and IP RIP v2 refers to IP RIP Version 2 IP RIP v1 supports broadcasting and IP RIP v2 su...

Page 87: ...transmit broadcast address You will then enter one address This is because the system can only exchange RIP packets with one device over this type of connection Refer to IP RIP over Dedicated Connect...

Page 88: ...rol h IP RIP v2 authentication key required only if the IP RIP v2 authentication control has been configured with a value other than No Authentication USING MANAGE MODE COMMANDS ipnetif This command d...

Page 89: ...can be transmitted on the network interface Some devices on the network may not be able to receive large data packets This parameter allows you to maintain compatibility with these devices by setting...

Page 90: ...BROADCAST IP ADDRESS Requested only if you selected Specify Explicitly for the transmit broadcast address The IP address of the device with whom the CyberSWITCH will be exchanging RIP packets For mul...

Page 91: ...specific interface then designation of this element is required This element controls how the system responds to IP RIP requests on the interface The default value is automatically preconfigured when...

Page 92: ...default value is automatically preconfigured when IP RIP is enabled Switch Meaning Do Not Respond This switch indicates responding to no IP RIP requests at all IP RIP v1 Only This switch indicates re...

Page 93: ...ACKGROUND INFORMATION Network Interface is a term used to represent the physical connection of the system to a data network For example the Ethernet resource provides a network interface to an Etherne...

Page 94: ...ct to the system Even MAC layer bridge devices can connect to the system and use IP protocols through a IP RLAN Network Interface With the LAN WAN and WAN RLAN IP interfaces you may enable the Routing...

Page 95: ...umbers can be saved Note that if a WAN UnNumbered Interface is configured you must first add any devices that will be used as next hop devices for static routes before you can configure the static rou...

Page 96: ...on the same subnet as one of the configured LAN interfaces Since only one LAN interface is configured that IP address must correspond to the one config ured LAN IP address See Secondary IP Addressing...

Page 97: ...RIP determines the shortest path between two points on a network in terms of the number of hops between those points LAN type interfaces LAN and RLAN Interfaces and WAN interfaces are used by devices...

Page 98: ...are updated Basically RLAN IP RIP interfaces function in the same manner For both LAN type interfaces to function properly with IP RIP additional LAN interface information is configured The additional...

Page 99: ...ways advertise the remote IP devices IP RIP information Suppose there is a second CyberSWITCH that belongs to the logical Network 3 as shown in Example 2 It is better for SITE1 and SITE2 to advertise...

Page 100: ...propagation needed for Example 1 or enabling host routes propagation needed for Example 2 The definition of this configuration element is included in the section Network Interface Configuration Eleme...

Page 101: ...LAN Remote LAN and numbered WAN interfaces When devices are connected over WAN links in which cost is not a major concern such as dedicated links and semi permanent connections RIP can be used to prov...

Page 102: ...ITE1 should exchange RIP packets If it is necessary to run the RIP between SITE1 and SITE3 as well as between SITE1 and SITE2 then another WAN network interface for example 2 1 1 1 on SITE1 and 2 1 1...

Page 103: ...s on the same LAN Should the VRA manager notice some condition which prevents one of the CyberSWITCH nodes from properly performing its function for example link down it will order the other CyberSWIT...

Page 104: ...traffic from hosts on different subnets attached to the LAN port would be dropped With the secondary IP addressing feature multiple IP network interfaces may be configured for each LAN port All existi...

Page 105: ...t C is considered a log ical extension of network 1 x x x The CyberSWITCH generates an ARP response containing its own MAC address Host B then communicates with Host C by sending packets to the Cyber...

Page 106: ...be taken when specifying a default route All IP datagrams that specify a destination IP address that do not have an explicit routing table entry will be sent to the default route If this destination...

Page 107: ...the device name for the next hop gateway that provides access to the target sub network or host The IP address or the device name of the Next Hop must be on the sub network connected to a defined inte...

Page 108: ...l charges in case there is a local route that could be used IP RIP PROPAGATION CONTROL This controls how a static route is propagated via IP RIP The following table provides an explanation of how a IP...

Page 109: ...tes that access to IP Network 156 1 0 0 is available through the external router at 192 1 1 2 A static route is not needed for the CyberSWITCH to access WAN Direct Host 128 1 1 3 Because these two dev...

Page 110: ...routes The same Manage Mode commands are used to configure both type of routes DEFAULT ROUTE CONFIGURATION ELEMENTS NEXT HOP ADDRESS IP address using dotted decimal notation or if an unnumbered WAN in...

Page 111: ...ou are installing new system software the IP RIP processing is enabled by default if IP routing has been enabled Therefore if you have already enabled IP routing you do not need to enable IP RIP If yo...

Page 112: ...nes the shortest path between two points on a network in terms of the number of hops between those points If routing is enabled and IP RIP is enabled there will be default IP RIP information configure...

Page 113: ...vel security Configuring System Options and Information Instructions for enabling system options such as PPP Link security for configuring system information such as a system password and for configur...

Page 114: ...r security configuration is required No database is needed for this option Device level security is an authentication process between internetworking devices Authentication happens automatically witho...

Page 115: ...ol through the configuration of certain options such as Selecting an authentication database for administration sessions You may select an on node database a RADIUS server a TACAS Server or an ACE Ser...

Page 116: ...sers A TCP connection allows the CyberSWITCH to communicate with the VRA Manager The Remote Authentication Dial In User Service RADIUS is a central database supported by the CyberSWITCH RADIUS operate...

Page 117: ...user level security supports user authentication on top of device level authentication Often referred to as multilevel security this option increases the security on your network First authentication...

Page 118: ...igure and to administration sessions The table below identifies the types of authentication databases that are applicable specified by yes for each type of network security and for administration sess...

Page 119: ...gured on node device database all entries will be lost USING MANAGE MODE seclevel Displays the current security level configuration data Main Menu 1 Physical Resources 2 Options 3 Security 4 Save Chan...

Page 120: ...the On node Device Database or remotely through the VRA Manager or RADIUS Server Device level security is the default configuration Through device level security you have several options for validatin...

Page 121: ...s with a large number of devices or several systems Only one device database would need to be configured and maintained The Remote Authentication Dial In User Service RADIUS and the SecureFast Virtual...

Page 122: ...emote user is being authenticated a data filter is placed on the connection This filter only allows the Telnet session traffic to flow over the connection between the user and the CyberSWITCH During t...

Page 123: ...sfer IP datagrams over ISDN without MAC headers such as an IP PPP host device Bridging connectivity refers to the connectivity between the CyberSWITCH and a remote user computer that is connected to t...

Page 124: ...mpt order you have configured Responses to prompts may vary depending upon whether or not you have a security token card and the type of security token card you have The ACE and TACACS servers support...

Page 125: ...machine prompt with non PINPAD SecureID Card 1 Enter login Id remote machine 2 At the passcode prompt enter your 4 digit PIN followed by the 6 digit dynamic password on your SecurID card This makes u...

Page 126: ...device level authentication begins Zoe checks its on node device database to see if Sparky is a valid device and whether its IP address and password are also valid If valid Zoe allows the connection...

Page 127: ...istration security enhancements include selecting a database server for administration sessions and specifying an inactivity time out In addition you can restrict Telnet access by setting the number o...

Page 128: ...Calling Line Id with the value configured if any in the Device List If the numbers are identical the connection will be established Otherwise the system will reject the incoming call When the Calling...

Page 129: ...gins with sending a CHAP challenge request to the remote device The CHAP request contains a string of bytes known as the challenge value which is changed on each challenge Using the hash algorithm ass...

Page 130: ...ecurity option allows you to configure specific Bridge Ethernet Addresses and an optional password on a per device basis When Bridge Ethernet Address security is enabled the System will look up the re...

Page 131: ...etwork that require this information for system validation SYSTEM INFORMATION CONFIGURATION ELEMENTS SYSTEM NAME The System Name is a user defined name for the CyberSWITCH This name is preconfigured b...

Page 132: ...information for system validation The System Name is passed during both PAP and CHAP negotiation The System Password is passed during PAP negotiation The System Secret is the CHAP Secret used during C...

Page 133: ...e the value of the port number select 4 Telnet Server TCP Port Number from the from the Administrative Session menu 10 Follow the onscreen instructions for entering the port number 11 Select option 5...

Page 134: ...PCs and files on those platforms could be changed while the database server can be physically more secure As an alternative to the local password file the user can now use security token cards along w...

Page 135: ...is available to clean up dead Telnet sessions This Telnet server needs a unique port number in order to function The following example screen illustrates a successful emergency Telnet session The foll...

Page 136: ...CONFIGURING AN ON NODE DEVICE DATABASE Before configuring an on node device database you must first configure network interfaces For further information regarding network interfaces and their corresp...

Page 137: ...l be displayed Follow the onscreen instructions to add a device 3 Enter the device name The example screen below shows device DAN being added Device Level Databases Menu 1 On node Device Database Enab...

Page 138: ...PPP as your line protocol select 1 ISDN Line Protocol and select the type you will be using b Check to see if the default base data rate initial data rate and maximum data rate are acceptable If not c...

Page 139: ...sage ensure that the PVC Name matches the device name No pvc configured for Device DAN In order to associate a device to a specific PVC you must also provide authentication information see step 9 7 Fo...

Page 140: ...tails For example for a PPP device specify a CHAP secret Or for an HDLC device enter a Bridge Ethernet Address Select the type of the Virtual Circuit 1 Permanent Virtual Circuit PVC 2 Switched Virtual...

Page 141: ...ard i e do not select the IP Host RFC 1294 menu option on the Device Authentication Menu 9 To enter any needed IP information for your device select IP from the Device Table Menu The following screen...

Page 142: ...tions to configure whether or not dial out to this device is allowed for this device d Press 4 at the above menu to specify an AppleTalk routing protocol the system should use with this device The opt...

Page 143: ...and follow the onscreen instructions to change the configuration to enabled b If the remote device does not use 1 as the starting PPP STAC LZS sequence number press 2 to enter a new value for the star...

Page 144: ...s to the system ISDN CONFIGURATION ELEMENTS Note These elements are configured for ISDN devices and devices over dedicated connections only ISDN LINE PROTOCOL The available line protocols for ISDN acc...

Page 145: ...additional connection and yet the remote device may initiate another call to the system This inbound call causes the maximum data rate to be exceeded and the system will drop a connection If the remot...

Page 146: ...ses for both local and remote devices are provided by your X 25 provider AUTHENTICATION CONFIGURATION ELEMENTS PAP PASSWORD This password is used by PPP line protocol for PAP authentication This is an...

Page 147: ...ntical to the identifier configured on the device s IP Host system This field is only required when the IP routing operating mode is enabled The identifier entered here must be identical to the config...

Page 148: ...in an error message being logged and the call being rejected IP INFORMATION CONFIGURATION ELEMENTS IP ADDRESS The device s IP address if any on the WAN link connecting it to the CyberSWITCH Options a...

Page 149: ...ed port must be configured and the address must be 0 0 If the device is over a MAC dial in port no AppleTalk address needs to be entered The device is assigned a random AppleTalk address within the sp...

Page 150: ...UMBER If the CyberSWITCH uses an IPX RLAN interface to connect to a remote bridge you may choose to change this information This parameter associates the bridge with the IPX network to which it connec...

Page 151: ...vices which connect using the PPP protocol STARTING PPP STAC LZS SEQUENCE NUMBER When using the PPP compression with the STAC LZS protocol certain devices may not adhere to the protocol specification...

Page 152: ...ge devices Conditionally Required means you must specify at least one of either the Calling Line Id or the Ethernet Address You may specify both IP Routing with HDLC Bridge Devices To allow devices to...

Page 153: ...evice to connect to the CyberSWITCH you must have IP routing enabled For each PPP IP Device using this type of connection you may need to enter the device s IP address a PAP Password or a CHAP Secret...

Page 154: ...rd or a CHAP Secret and a Calling Line Id The following table identifies the configuration requirements for possible security options for PPP Bridge Devices Note If CHAP Security is enabled and Outbou...

Page 155: ...for IP Routing with PPP Bridge Devices Note If CHAP Security is enabled and Outbound Authentication has not been disabled a CHAP Secret must be entered for both the remote device and for the CyberSWI...

Page 156: ...node central database allows a network with more than one CyberSWITCH to access one database for device authentication The CyberSWITCH will access the off node database to locate authentication infor...

Page 157: ...from the main menu 2 Select option 4 User Level Databases Enable Disable from the Security Menu The following screen be displayed 3 Select the option you wish to configure and press RET This prompt ac...

Page 158: ...te For user level security the CyberSWITCH s default Telnet port number is 7000 not the normal default 23 The Telnet port number used for remote administration sessions is the 23 If you wish you can r...

Page 159: ...ISTRATION LOGIN NAMES When configuring the off node server itself you may configure up to 101 different names for system administration login You may assign administration capabilities to specific per...

Page 160: ...wide Call Restrictions System wide Call Restrictions will override Call Restrictions configured on the VRA Manager on a per device basis USING CFGEDIT 1 Select Security from the main menu 2 Select op...

Page 161: ...TION SERVER Note In order for the CyberSWITCH to reference a RADIUS Server for device authentication the following configuration steps must first be completed IP Routing must be enabled If you try to...

Page 162: ...ondary RADIUS Server must not be the same as the Primary RADIUS Server 4 Select Miscellaneous Information to finish the configuration Specify the number of access request retries that the system will...

Page 163: ...er and also required if a Secondary RADIUS Server is configured The default value of 1645 is almost always used NUMBER OF ACCESS REQUEST RETRIES The number of Access Request Retries that the system wi...

Page 164: ...CH to reference the TACACS server basic IP information must be configured If the IP Host mode is not in use you must also configure the following a LAN Network interface must be configured appropriate...

Page 165: ...TACACS Server UDP PORT NUMBER The UDP port number used by the TACACS Server The default value of 49 is almost always used NUMBER OF ACCESS REQUEST RETRIES The number of Access Request Retries that the...

Page 166: ...CFGEDIT 1 Select option 4 ACE from the Off node Server Information menu If you need guidance to find this menu refer to the instructions provided in the VRA Manager Authentication Server configuration...

Page 167: ...c file ace reinit Allows you to reinitialize the system ACE client This is required only if the server s IP address or encryption method has been changed A reinitialization removes the user named serv...

Page 168: ...also configured to use SDI encryption then any authentication attempts via the system will fail SOURCE IP ADDRESS The source IP address for the ACE client should be a valid address in dotted decimal...

Page 169: ...8 allow you to change the number of attempts for login or password change Item 9 allows you to specify the amount of time before an authentication timeout Enabling Item 10 allows BOOTP DHCP to transm...

Page 170: ...splay user level security general configuration login banners login configuration specific to RADIUS and login configuration specific to TACACS netlogin change Allows you to change the current network...

Page 171: ...gin configuration specific to RADIUS and login configuration specific to TACACS netlogin change Allows you to change the current network login configuration data After entering the netlogin change com...

Page 172: ...ticularly important because the order of prompts must be the same as the order expected by the RADIUS server Selection 2 displays the following RADIUS Specific Device Login Menu 1 Change Password Cont...

Page 173: ...ORMATION Login configuration parameters specific to RADIUS include the specification of prompt order and a password control character The prompt order specified on the system must match the prompt ord...

Page 174: ...screen in which this information was originally configured You may display user level security general configuration login banners login configuration specific to RADIUS and login configuration specif...

Page 175: ...ion of messages for TACACS return codes The prompt order specified on the system must match the prompt order specified on the TACACS server The default order is First prompt LOGIN ID PROMPT fixed Seco...

Page 176: ...following advanced bridging options bridge dial out Spanning Tree Protocol mode of operation and bridging filters Configuring Advanced IP Routing Instructions for configuring the following advanced IP...

Page 177: ...Select the line protocol In almost all cases select PPP Select HDLC only if you are connecting to a device that uses HDLC over a dedicated access 5 Enter the device name tied to this access optional...

Page 178: ...evice based on the data rate configured for that device When the link utilization causes an underload condition the switched connections will be released with the dedicated connection remaining active...

Page 179: ...scribed below You can then select to edit individual categories without paging through all of the parameters It is important to note that the line used for an existing X 25 access cannot be changed In...

Page 180: ...range for this parameter will be 1 7 if the Modulo 8 sequence numbers are being used for LAPB or 1 127 if Modulo 128 sequence numbers are being used X 25 CONFIGURATION INFORMATION 1 Configure the X 2...

Page 181: ...Control Negotiation is to be supported for SVCs negotiation is not performed on PVCs c Choose whether Throughput Class Negotiation is to be supported for SVCs negotiation is not performed on PVCs The...

Page 182: ...tandard default transmit throughput class 8 Select the nonstandard default receive throughput class 9 After all of the above information has been entered for your PVC repeat the above steps to add the...

Page 183: ...value is modulo 8 TIMER T1 This timer defines the maximum time to wait for responses to pending commands The range for the T1 timer is 1 to 10 seconds The default value is 1 second TIMER T3 This time...

Page 184: ...SVCs supported for this X 25 access X 25 TIMERS Your PPSN provider should be able to provide you with the optimum values for the X 25 timers If you are unable to obtain these values select the default...

Page 185: ...configuration elements are for SVCs that support negotiation MAXIMUM THROUGHPUT CLASS This value is used to determine the maximum throughput class that the system will support for X 25 connections Th...

Page 186: ...achines that process the packet Larger packet sizes reduce the opportunity for other devices to share the channel On the other hand a larger packet reduces the ratio of overhead fields to user data Th...

Page 187: ...on of the X 25 access itself have been completed You may now configure the virtual circuits associated with the X 25 access PVC CONFIGURATION ELEMENTS Once the above X 25 configuration elements have b...

Page 188: ...aximum amount of data that can be received through the network when the network is operating at saturation Factors influencing throughput are line speeds window sizes and the number of active sessions...

Page 189: ...ta to be sent to that destination is simply sent in data packets using the assigned logical channel A SVC is similar to a dial up connection A call origination packet called a Call Request packet cont...

Page 190: ...over an X 25 VC FRAME RELAY ACCESSES CONFIGURING A FRAME RELAY ACCESS Notes You may configure up to 32 frame relay accesses per CyberSWITCH and a total of 48 PVCs The number of PVCs you can assign per...

Page 191: ...arrier service 12 Enter the Link Integrity Verification Timer duration in seconds 13 Enter the following counts Full Status Enquiry Polling Count the Error Threshold Count and the Monitored Events Cou...

Page 192: ...numeric characters DATA RATE The data rate that applies to the line being used for this frame relay access BEARER CHANNELS A list of bearers a channel map that will be used on the line associated with...

Page 193: ...erval is equal to the value of the configured Link Integrity Verification Timer This parameter is a component of the LMI ERROR THRESHOLD COUNT The number of errors in the last n events required to dec...

Page 194: ...o pay extra for a CIR from your carrier we recommend configuring CIR where the following is true physical speed number of PVCs CIR This configuration allows quick alleviation of congestion For a more...

Page 195: ...ly connected routes the packet to the intended destination based upon the DLCI therein Hence each packet is routed independently through the network based on the addressing information provided by thi...

Page 196: ...ts plays in the function of frame relay access THE LOCAL MANAGEMENT INTERFACE OVERVIEW Besides the steady state data transfer portion of the frame relay module the standards have provided for a frame...

Page 197: ...er equipment exceeds that node s capacity Congestion notification in the device plane is used to inform the equipment at the ingress point to the network of the congestion and allows the user equipmen...

Page 198: ...frame relay access only after that frame relay access had failed Switched and packet mode services will not be allowed to connect any given two nodes simultaneously The following diagram is provided a...

Page 199: ...he Bridge Filters section and the Known Connect List section for further information The bridge determines if a connection already exists or whether a connection should be initiated The MAC frame is s...

Page 200: ...ct Add Provide the device name as prompted and continue with device configuration as described in Configuring Device Level Databases 6 Under ISDN select Dial Out Phone Number 7 Provide device s dial o...

Page 201: ...router has been disabled USING MANAGE MODE COMMANDS hwfilt Displays the current hardware filter configuration data hwfilt enable Enables the hardware filter hwfilt disable Disables the hardware filter...

Page 202: ...lue is unrestricted bridging BRIDGE MODE OF OPERATION BACKGROUND INFORMATION Selecting the bridge mode of operation allows you to determine the forwarding method that the bridge will use to distribute...

Page 203: ...packet matches a discard filter packet filter only it is discarded If the packet matches a forward filter it is forwarded to the distribution list If the packet matches a connect filter it is connect...

Page 204: ...out remote MAC addresses they are added to the MAC address list for hardware filtering Once either the time limit or the limit of number of addresses is reached the hardware filtering feature will be...

Page 205: ...earn Time Out USING MANAGE MODE COMMANDS Manage Mode can be used to complete all of the bridge filter configuration This section provides you with the commands available for each bridge filter type Pr...

Page 206: ...ed from the current configuration Protocol Filter Commands protfilt Displays the current protocol filter configuration data protfilt add Allows a protocol filter to be added to the current configurati...

Page 207: ...mber from 0000 to FFFF that checks the protocol Id of a MAC frame BRIDGE FILTER CONFIGURATION ELEMENTS FILTER ACTION For each filter category there are three filtering actions that the system can perf...

Page 208: ...trol address as defined by IEEE 802 3 specifications MAC addresses are specified as 12 character hexadecimal numbers Up to 63 MAC addresses can be configured The mode of hardware filtering be in manua...

Page 209: ...OTOCOL DEFINITIONS If you configure any protocol filters you must first configure any needed protocol definitions After you define a protocol filter it will automatically be assigned a protocol Id The...

Page 210: ...given device When the specified unicast address appears in the source address field of a MAC frame the frame will NOT be forwarded as specified in the distribution list If no distribution list is spec...

Page 211: ...format The Ethernet type or LSAP field will be checked based on packet format See the section titled Protocol Definitions for more information 7 PACKET OFFSET dd MASK xxxxxxxxxxxx VALUE xxxxxxxxxxxx D...

Page 212: ...o the normal learning bridge methods DISCARD WAN A packet matching this filter will not be forwarded to any remote sites connected on the WAN The packet will be sent to the LAN ports according to the...

Page 213: ...s specified in the distribution list In this manner you can specify remote sites and LANs for connection 3 DESTINATION MAC address FORWARD distribution list This filter allows you to forward MAC frame...

Page 214: ...s within the frame data are significant and will be compared to the value The frame data is logically anded with the mask and then compared to the specified value The value field must be a subset of t...

Page 215: ...this filter will only be forward ed to remote sites connected on the WAN The packet will not be sent to the LAN ports FORWARD ALL A packet matching this filter will be forwarded on the LAN ports and f...

Page 216: ...etween filters and their forwarding actions refer to the discussion beginning on page 210 Preliminaries Be sure your system s resources are properly configured This includes resources lines and datali...

Page 217: ...ol Filter 5 Packet Data Filter 6 Hardware Filters Select function from above or RET for previous menu 3 Current Destination Address Filter id DEST ADDRESS ACTION DISTRIBUTION LIST There are currently...

Page 218: ...abase section found in the Configuring Device Level Databases chapter The dial out call must be made within a configured amount of time from its last connection This time is configurable through the B...

Page 219: ...s the CyberSWITCH builds its bridge table and associates each MAC address it sees with an interface When a remote bridge establishes a connection and begins sending traffic to the CyberSWITCH the Cybe...

Page 220: ...on allows you to either enable or disable maintaining static routes for devices on the RADIUS Server This option is only applicable when a RADIUS Server is in use IP Address Pool The IP Address Pool a...

Page 221: ...TIC ROUTE LOOKUP VIA RADIUS USING CFGEDIT 1 Select Static Route Lookup via RADIUS Enable Disable from the IP menu 2 Follow the onscreen instructions to either enable or disable this feature USING MANA...

Page 222: ...e IP address contained in a configured range a Select to delete an IP address b Select the Id of the range you want to delete the address from c Select to delete a single IP address contained in the r...

Page 223: ...uld not be configured for the device either in the on node device database or in a remote authentication database if an IP address is to be assigned to the device from the IP address pool IP FILTERS T...

Page 224: ...The system will then display the new packet with wild card values similar to the following IP Routing Menu 1 IP Routing Enable Disable 2 IP Operating Mode 3 IP Interfaces 4 IP Static Routes 5 RIP Ena...

Page 225: ...lue with wild card valid only with an EQUAL operator or an arbitrary numeric value The upper level protocols include TCP UDP ICPM CONFIGURING THE COMMON IP PORTION USING CFGEDIT 1 To change the source...

Page 226: ...operator other than RANGE you will be prompted for a specific TCP port number 7 Select TCP Control 8 Specify a control value any established or not established CONFIGURING UDP If you have selected UDP...

Page 227: ...you have selected ICMP as your IP protocol a screen similar to the following is displayed Note that the following ICMP defaults constitute a wild card match for any ICMP packet 1 Select ICMP Type 2 S...

Page 228: ...to take when an IP packet matches that type forward or discard A screen similar to the following will then be displayed 6 If the filter already has a forwarding condition other than the final conditi...

Page 229: ...6 If the filter already has a forwarding condition other than the final condition an additional prompt is presented concerning the condition s position within the filter Enter the location within the...

Page 230: ...rning the condition s position within the filter Enter the location within the filter where the condition is to be added at the beginning at the end after the existing condition with id number n Note...

Page 231: ...hange 4 Select the interface on which the filter is to be applied 5 Press RET until you reach the prompt which asks for Input Filter Name 6 If you want to apply an Input filter provide the filter name...

Page 232: ...OT EQUAL comparison Symbolic mnemonics are supplied for the most popular upper level protocols TCP UDP ICMP when using an EQUAL comparison on these values the corresponding protocol specific compariso...

Page 233: ...ared against the target values These values may be a numeric quantity between 0 and 255 or the mnemonic ANY can be used with an EQUAL comparison as the wild card value IP FILTERS BACKGROUND INFORMATIO...

Page 234: ...pass is made through the individual conditions The first complete match of a Packet Type dictates the action which is applied to the datagram When the action is DISCARD the datagram is dropped The fil...

Page 235: ...r this purpose The Exception Filter is a built in filter which is selectively enabled and disabled When enabled it is logically appended before each Forwarding Filter which an IP packet encounters The...

Page 236: ...Interfaces are created dynamically at run time with the name of the remote WAN device providing the unique identifier for the Interface Consequently when a filter is applied to the externally visible...

Page 237: ...this applies even if the packet is not used in a condition and the filter is not enabled IP Source Address AND mmm mmm mmm mmm EQ NEQ ttt ttt ttt ttt IP Destination Address AND mmm mmm mmm mmm EQ NEQ...

Page 238: ...here Corporate hosts including dial in devices may initiate TCP based sessions with the Internet but not vice versa This covers the main IP applications such as TELNET FTP SMTP server and HTTP An assu...

Page 239: ...ilter When traffic arrives from the Internet the Exception filter will be executed first thereby allowing an override of the existing conditions of the Input filter The Exception filter would be set u...

Page 240: ...you have entered 255 255 255 255 for the IP address you will need to select the network interface to which DHCP BOOTP request messages should be relayed 5 Press 3 to configure the hop count threshold...

Page 241: ...ral LAN through ISDN remote bridges are now able to obtain their IP addresses from a DHCP server located on a central LAN The Dynamic Host Configuration Protocol DHCP provides configuration parameters...

Page 242: ...ge is a broadcast storm Since all remote LANs are connected through bridge devices all broadcast traffic will be forwarded from one remote LAN to all the other LANs and from a central LAN to all other...

Page 243: ...p to the DHCP Server is another DHCP BOOTP Relay Agent In this configuration the DHCP Client is able to obtain its IP address from the DHCP Server and any other information that the server provides us...

Page 244: ...de Device Database PAP security Bridging disabled Bridging disabled IP enabled router mode I F LAN 192 168 1 168 I F WAN 192 168 10 168 Static Route dest 204 157 42 0 next hop 192 168 10 1 IP enabled...

Page 245: ...vice should work In this configuration the DHCP Client is able to obtain its IP address from the DHCP Server and any other information that the server provides using the Relay Agent contained in the D...

Page 246: ...Level Device Level On node Device Database PAP security Bridging disabled Bridging enabled Bridge Packet Data Filter offset 1 mask 00 value 00 action CONNECT dist list Alex IP enabled router mode I F...

Page 247: ...onfiguration submenu 6 Select 1 Enter the maximum number of IP addresses that may be obtained from a DHCP server for this interface 7 Select 2 Enter the number of IP addresses obtained from DHCP serve...

Page 248: ...configured LAN ports The default for this value is 1 DHCP BACKGROUND INFORMATION The DHCP Proxy Client feature enables the CyberSWITCH to dynamically obtain IP addresses from a DHCP server for IP hos...

Page 249: ...pical use of the DHCP Proxy Client This configuration has the DHCP server and the CyberSWITCH located on the same LAN In this configuration the remote IPCP device Summer is able to negotiate and obtai...

Page 250: ...Bridging disabled IP enabled router mode I F LAN 192 168 1 168 LAN port 1 I F WAN explicit 192 168 10 168 DHCP related max addrs to obtain 10 num addrs to pre fetch 5 LAN port to reach server 1 DHCP...

Page 251: ...g is enabled the full IPX feature is available for configuration The IPX configuration process includes configuring the IPX internal network number configuring IPX interface information enabling disab...

Page 252: ...nd it helpful to refer to the graphic and to the sample screens for clarification while completing your IPX configuration CSX5500 Remote Router CSX1200 External Network Number 11111111 33333333 555555...

Page 253: ...eing the default If the option is set to enable the system will process and forward IPX data packets at the IPX network layer If the option is set to disable the system will process and forward IPX da...

Page 254: ...unnumbered WAN network interface in their latest versions of their IPX router When two routers communicate they will try to use the unnumbered network interface type If both routers support this type...

Page 255: ...connect to remote bridge devices over the WAN In other words when incorporating a Remote LAN interface along with traditional WAN interfaces the CyberSWITCH can connect to routers or bridges or a mix...

Page 256: ...tered a summary screen will be displayed similar to the sample screen below 12 As shown above enter Y to save the interface configuration 13 Repeat this procedure to add additional interfaces USING MA...

Page 257: ...same network must be assigned the same external network number in order to communicate MAXIMUM TRANSMISSION UNIT MTU Specifies the maximum number of bytes that can be transmitted on the network interf...

Page 258: ...es how the system will send SAP information on this network interface If this parameter is set to send the system will transmit IPX SAP packets on this network interface If this parameter is set to do...

Page 259: ...on Protocol RIP to transmit its routing information on the network This protocol periodically broadcasts routing table updates on the network A dynamically learned entry is aged out of the system s ro...

Page 260: ...lows you to disable enable IPX SAP IPX ROUTING PROTOCOL CONFIGURATION ELEMENTS IPX RIP PROCESSING OPTION Specifies whether the system should process the NetWare Routing Information Protocol RIP If thi...

Page 261: ...ICE TABLES The system stores IPX routing information in a table Each time a packet is received the routing table is referenced to determine to which network interface to forward the packet There are t...

Page 262: ...hed for long periods of time For more efficient operation consider the following when using a remote LAN interface Link utilization parameters Most bridges and routers allow you to configure link util...

Page 263: ...mber of hops for this route 6 Enter the number of ticks for this route 7 Select a RIP propagation scheme from the displayed list Note that the third option propagate only when the Next Hop is connecte...

Page 264: ...number is used to calculate the best route to the destination IPX network when multiple routes exists This parameter is a decimal value from 1 to 15 NUMBER OF TICKS Indicates the time in ticks that a...

Page 265: ...for this service 6 Enter the hexadecimal IPX node number for this service 7 Enter the hexadecimal IPX socket number for this service 8 Enter the number of hops to this service 9 Select the SAP propaga...

Page 266: ...ated This parameter is a hexadecimal value 2 bytes in length Some common IPX Socket numbers are 0x0451 NetWare Core Protocol File Server 0x0452 Service Advertising protocol 0x0453 Routing Information...

Page 267: ...o all devices regardless of their individual spoofing configurations b Press 2 to select the system IPX watchdog spoofing level The default values for all parameters will be displayed Enter the Id of...

Page 268: ...the following IPX elements IPX watchdog spoofing SPX watchdog spoofing serial packet handling message packet handling PACKET HANDLING METHOD Available for Serial Packet Handling and Message Packet Han...

Page 269: ...The implementation of watchdog spoofing eliminates unnecessary connections while allowing clients to be aged out and does not require any client side spoofing or end to end protocol The parameters fo...

Page 270: ...led By default the option is enabled When disabled the SPX keep alives are routed without any special handling If the option is enabled the SPX spoofing duration time T is specified in minutes The def...

Page 271: ...ATION In order for certain protocol implementations such as NetBIOS to function in the NetWare environment routes must allow a broadcast packet to be propagated throughout an IPX internet The IPX type...

Page 272: ...e costs of periodic broadcasts over WAN links Triggered RIP and triggered SAP are user configurable items which you enable in the on node device database page 275 Under the Options Menu IPX Routing Tr...

Page 273: ...When this timer expires and the unreachability information is communicated to all the reachable WAN routers this route is deleted Valid range for timer 1 to 10 000 seconds default 120 seconds RETRANS...

Page 274: ...P and SAP updates are only transmitted on the WAN when a specific request for a routing service update has been received when the routing or service databases are modified by new information from anot...

Page 275: ...the WAN peer type as either active or passive An active peer receives broadcasts at all times a passive peer receives broadcasts only when a connection is up 12 Select Spoofing Options Make changes t...

Page 276: ...X Watchdog Spoofing Menu 1 Default Handling is Discard 2 Handling while the connection is up is Forward 3 Handling for the special period after disconnecting is Spoof 4 Special period of time after di...

Page 277: ...or bridge data 8 Select IPX Remote LAN Network Number Provide the external network number for the Remote LAN interface if desired The default value NONE means the remote IPX external number will be th...

Page 278: ...utes and service tables NONE Specifies no RIP and SAP protocols neither periodic nor triggered You must configure static routes and static services Use the NONE option when the remote device such as a...

Page 279: ...G OPTIONS For IPX routing IPX spoofing options are configurable by device and correspond to the system level spoofing options For IPX Remote LAN devices IPX spoofing options are currently not availabl...

Page 280: ...rSWITCH must be running the latest software release to take advantage of the available SNMP features If you are using Cabletron s SPECTRUM Element Manager as NMS the enterprise MIB is already built in...

Page 281: ...unity Name 5 Enter the SNMP trap information optional a Configure IP address es and Community Name used in SNMP Trap PDUs Enter the IP address of the NMS s that should receive the traps The NMS is a d...

Page 282: ...he level of access available to the associated Community Name The following is a chart of the three possible access levels and their access privileges MANAGE SNMP The SNMP feature is enabled Current S...

Page 283: ...formation to aid in monitoring the B channel usage Refer to the System Commands chapter s ISDN Usage Related Commands section for information regarding this command The generated B Channel Usage Traps...

Page 284: ...s valid the corresponding MIB access level is then checked to determine if the Community Name has the access rights needed to perform the desired PDU action If either the Community Name or the MIB acc...

Page 285: ...hange data the SNMP Agent will also generate SNMP Trap PDUs to inform the Network Management Station of important system events Whenever such an event occurs the appropriate SNMP Trap PDU will be sent...

Page 286: ...off node server times out clidDisconnect Trap An SNMP Agent will generate an clidDisconnect Trap PDU anytime there is a configuration problem with a device s Calling Line Id cdrOutOfBuffer The number...

Page 287: ...eTalk capacities enable disable the AppleTalk isolated mode optional APPLETALK ROUTING OPTION ENABLING APPLETALK ROUTING USING CFGEDIT 1 AppleTalk routing is disabled by default To perform any AppleTa...

Page 288: ...n increases the CyberSWITCH will make additional connections as required to provide a consistent level of performance to the device As link utilization decreases connections will be released APPLETALK...

Page 289: ...AppleTalk networks over WAN It creates a logical Apple Talk network that comprises of multiple numbered point to point links with the same Apple Talk network range The WAN UnNumbered port type also cr...

Page 290: ...ION THE APPLETALK NETWORK TYPE An AppleTalk network consists of four basic pieces the nodes networks network numbers and routers All these pieces together form an AppleTalk internet Initial implementa...

Page 291: ...head associated with dynamic naming APPLETALK REMOTE LAN Overview An AppleTalk WAN Remote LAN port connects remote bridge devices to other AppleTalk router ports The AppleTalk router treats all bridge...

Page 292: ...oofing is not currently supported for this feature Off node route lookup is not currently supported for this feature APPLETALK STATIC ROUTES CONFIGURING APPLETALK STATIC ROUTES USING CFGEDIT 1 Select...

Page 293: ...emote AppleTalk network APPLETALK ROUTING STATIC ROUTES BACKGROUND INFORMATION You only need to configure static routing entries if you need to access a WAN network that is not directly connected to t...

Page 294: ...w the onscreen instructions to either enable or disable the isolated mode APPLETALK ISOLATED MODE CONFIGURATION ELEMENTS ISOLATED MODE STATUS You may enable or disable the AppleTalk Isolated Mode When...

Page 295: ...control options using CFGEDIT follow the steps outlined below 1 Select Options from the main menu 2 Select Call Control Options from the options menu This will display the following call control menu...

Page 296: ...FGEDIT section for specific parameters THROUGHPUT MONITOR CONFIGURATION ELEMENTS SAMPLE RATE A Sample Rate identifies the number of seconds for each sample period The default setting for the sample ra...

Page 297: ...lls depending on the amount of WAN traffic If no information is being sent the call will be terminated The system will also make additional calls to a site if it is determined that extra bandwidth is...

Page 298: ...dwidth can be increased it will add a new channel into the connection group At this time the system adjusts its upper threshold for the new aggregate capacity and resets its counters If the new capaci...

Page 299: ...peak loads and backup THROUGHPUT MONITOR CONFIGURATION EXAMPLE In the above example the sample rate is 5 seconds the number of samples to examine per sample rate the window is 3 the configured percent...

Page 300: ...ocess will be reset CALL INTERVAL PARAMETERS CONFIGURING THE CALL INTERVAL PARAMETERS USING CFGEDIT 1 Select Call Intervals from the Call Control Options menu 2 Enter the minimum time interval between...

Page 301: ...ONTHLY CALL CHARGE CONFIGURATION ELEMENTS STATUS Allows you to enable or disable the monthly call charge option MAXIMUM MONTHLY CHARGE The maximum monthly charge value The legal values are from 1 to 1...

Page 302: ...lays the current Call Restriction configuration data callrest off Disables the Call Restriction feature callrest on Enables the Call Restriction feature CALL RESTRICTION CONFIGURATION ELEMENTS STATUS...

Page 303: ...ll be allowed however a warning will be written to the report log MAXIMUM CALLS PER MONTH The maximum number allowed per month The default value is 6900 calls per month Statistics will be logged to tr...

Page 304: ...and available through the ds command The current value of this statistic will be displayed on the monitor when the cr stats command is used Two actions are available if this limit is exceeded These a...

Page 305: ...connection time If desired the system can be configured to issue a warning when the limit is exceeded instead of stopping the calls BANDWIDTH RESERVATION The bandwidth reservation feature allows a po...

Page 306: ...You may want to consider deleting the lines you are reserving for your profile from the default profile To delete the reserved lines from the default profile press 2 at the Device Profile screen to c...

Page 307: ...TION CONFIGURATION ELEMENTS DEFAULT PROFILE The Default Profile is the available profile for all valid devices not identified with a specific device profile The Default Profile initially contains all...

Page 308: ...ured for use by all devices that are not configured to use an alternate profile in the reserved list This default profile list may be configured to remove lines from general use SEMIPERMANENT CONNECTI...

Page 309: ...d into the semipermanent device list and appears as shown below USING MANAGE MODE COMMANDS semiperm Displays the semipermanent connection menu The configuration screens are identical to those displaye...

Page 310: ...rSWITCH attempts to connect to the device The default is 60 minutes N A appears when the CyberSWITCH will not attempt a call again after a rejection Note When the Session Interval is configured a devi...

Page 311: ...o systems together with semipermanent connections For each system configure a semipermanent connection to the other and enable Throughput Monitoring on both However you may occasionally see a glare co...

Page 312: ...ou are using User Level Security you may wish to adjust the Authentication Time out and or change the Call Control Failure banner Continue with the following steps 6 Select Security and then Network L...

Page 313: ...re This feature provides call control management with any authentication agent e g RADIUS ACE TACACS To use VRA for call control management only you must enable the feature The call will be authentica...

Page 314: ...sconnect the device s call Call restrictions reached for this device Maximum bandwidth reached for this device Device and CyberSWITCH to which it is connected are not part of the same group Device on...

Page 315: ...rate with devices that do not provide a standard PPP implementation Changing these parameters can result in PPP option negotiation failure and the inability to communicate with remote devices The defa...

Page 316: ...elds RECEIVE SETTINGS The receive settings for PFC and ACFC control whether and how the system receives PPP Packets with PFC or ACFC Receive setting options include mandatory requested repeated indefi...

Page 317: ...ily transmitted over point to point links 2 A Link Control Protocol LCP for establishing configuring and testing the data link connection 3 A family of Network Control Protocols NCPs for establishing...

Page 318: ...ce data transfer is allowed Echo Requests will be sent at a configured frequency As long as Echo Replies are received the link is deemed to be functional A second parameter specifies the maximum numbe...

Page 319: ...ENTS ACTION ON FRAME TIMEOUT The action to be taken if no frame is received before the configured frame timeout value has expired The default value is to disconnect the call The complete list of choic...

Page 320: ...server to which the CDR log reports will be sent Enter the ID of the log file you wish to use If a preconfigured Syslog Server is selected enter the decimal UNIX priority value USING MANAGE MODE COMM...

Page 321: ...that each system be assigned a system name that is unique within its environment LOCAL LOG FILE OVERVIEW The CDR local log file is a circular file stored in RAM It contains a fixed number of records A...

Page 322: ...n result priority of authentication info is encoded as 26 hex Note Because the values for both the facilities and the severity levels may vary from one version of UNIX to the next the system allows yo...

Page 323: ...ction describes CDR events for switched ISDN services There are five ISDN CDR events connect disconnect reject system up and verify A connect event occurs when the system authenticates the remote devi...

Page 324: ...e that happen to coincide The record format of all CDR reports is consistent so that all reports have a first record with identical fields all reports which have a second record have identical fields...

Page 325: ...The field contains the time and date The meaning of this field varies depending upon the report Connect Event Report Contents On a connect event records 1 through 3 are used The event type is CONNECT...

Page 326: ...vided by the telephone switch Not all switches provide calling line identification A phone number is always displayed for outbound calls The duration is calculated by subtracting the ISDN connection t...

Page 327: ...no value is delivered by the off node database 4 Option 3 is only applicable when using PPP compression with the STAC LZS protocol This allows you to change the starting PPP STAC LZS sequence number f...

Page 328: ...his configuration item the device will be given its starting sequence number from the value on this menu As its name implies this option only applies to connections which utilize the PPP protocol with...

Page 329: ...so encapsulated will be considered to be uncompressed data and will be forwarded on in the order they were received Transmitted packets whose compressed size increases to the point of exceeding the li...

Page 330: ...links and packets will be compressed before they are fragmented for transmission across the multiple links The following documents provide additional information about PPP Compression The PPP Compres...

Page 331: ...types to or from target remote systems through a console invoked TFTP Client function Access to files on an system will be controlled by configuration through Manage Mode File access attributes are a...

Page 332: ...ION ELEMENTS FILE ATTRIBUTE The access right for each access level assigned to each file type Access rights include read only access R write only access W read and write access RW no access rights N F...

Page 333: ...or no access rights for the corresponding file type The file types that fall under the headings shown above are as follows File category File types included in the category REPORT RPRT_LOG 1 STATISTIC...

Page 334: ...ems encountered in the verification process LED Indicators Provides an explanation of the LED indicators These indicators can provide valuable information for troubleshooting System Messages Provides...

Page 335: ...CyberSWITCH Note At least one remote device is required to proceed with many of the verification procedures VERIFYING HARDWARE RESOURCES ARE OPERATIONAL To verify the operation of the WAN and LAN hard...

Page 336: ...sage should be displayed among the system messages Data Link up slot port ces Depending on the resource switch type the system will delay up to 2 minutes before attempting to bring up the data links N...

Page 337: ...displayed with these LAN messages If you see these bridge initialization messages then bridging is operational If these bridge initialization messages are NOT displayed refer to Bridge Initialization...

Page 338: ...ection is functioning If the following message appears the dedicated connection is not functioning Dedicated connection down Slot slot Port port Refer to Remote Device Connectivity in the Problem Diag...

Page 339: ...e device connectivity 1 In a controlled manner initiate an ISDN connection from each remote device 2 When each remote device connects to the system it will appear as either a REMOTE site or as the con...

Page 340: ...hapter 2 Reconfigure the definition of the remote device in the device database to enable User Level Authentication Attempt to ping the Service Server again On the client PC type ping 100 0 0 2 return...

Page 341: ...s then the IP host is operational If these IP host initialization messages are NOT displayed refer to IP Host Initialization of the Problem Diagnosis chapter VERIFYING IP HOST MODE IS OPERATIONAL The...

Page 342: ...e ping 100 0 0 1 2 If a message similar to the following is displayed the IP host mode feature over the specified WAN connection is operational 100 0 0 1 is alive 3 If this message is not displayed th...

Page 343: ...gnosis chapter 2 Once IP routing is operational on each LAN port on your Ethernet resource then IP routing over the LAN Connection is operational VERIFYING IP ROUTING OVER A WAN INTERFACE To verify th...

Page 344: ...0 0 1 return If the remote IP host successfully pings to the CyberSWITCH then continue with the next step If the remote IP host CANNOT ping to the CyberSWITCH refer to IP Routing Over a WAN Interface...

Page 345: ...AN Direct Host interface are 1 Determine if a remote IP host can access the CyberSWITCH over the WAN connection On the remote IP host type ping 100 0 0 1 return If the remote IP host successfully ping...

Page 346: ...N Remote LAN interface are 1 Determine if a remote IP host can access the WAN Remote LAN interface of the CyberSWITCH over the WAN connection On the remote IP host type ping 192 100 1 1 return If the...

Page 347: ...esses specific to the example Substitute the IP addresses of your network when you perform the IP routing verification steps It also uses the ping command The ping command sends a packet to a specifie...

Page 348: ...1 0 7 Pr 17 9A00 UDP Src 5001 Dst 69 If no packets have been discarded refer to IP Filters in the Problem Diagnosis chapter 5 When test completed turn off the trace Issue the administrative console co...

Page 349: ...n console command The netstat command displays the IP routing table of the system Substitute the equivalent command on your IP host To verify the operation of IP RIP output processing on a LAN interfa...

Page 350: ...oute to 131 1 0 0 from Router 1 On the administration console type ip route return If the following route entry is displayed among other route entries the IP RIP input processing is operational The P...

Page 351: ...P RIP INPUT PROCESSING OPERATIONAL ON A WAN INTERFACE To verify that IP RIP Input Processing routes learning is properly operational on a WAN interface the IP RIP processing must be successfully initi...

Page 352: ...alization messages the IPX router is initialized If these IPX router initialization messages are NOT displayed refer to IPX Routing Initialization in the Problem Diagnosis chapter VERIFYING IPX ROUTIN...

Page 353: ...e operational and connected to the Remote LAN The remote bridge device in our example this is SITE2 must be operational and available to initiate connections 1 From the router SITE1 verify that the IP...

Page 354: ...le command dr RET 2 Look for following message among the system messages Starting Triggered RIP SAP for WAN Peer 3 If this message is displayed continue check to see if Triggered RIP SAP is operationa...

Page 355: ...alization in the Problem Diagnosis chapter VERIFYING APPLETALK ROUTING IS OPERATIONAL To verify that AppleTalk routing is properly operational a remote Macintosh must be operational and available to i...

Page 356: ...bove then the AppleTalk Routing over a LAN connection is operational Continue with the next step 3 If all zones are NOT displayed then AppleTalk Routing over the LAN connection is not operational Refe...

Page 357: ...NMP feature operational 2 To verify that the MIB objects can be retrieved via the SNMP get command begin by making sure that the latest version of the enterprise MIB the ih_mib asn file has been compi...

Page 358: ...the call was made successfully Refer to Dial Out in the Problem Diagnosis chapter if the call was not made successfully VERIFYING CALL DETAIL RECORDING The cdr verify console command is used to verif...

Page 359: ...guration of the profiles and how they are assigned to each device refer to the Bandwidth Reservation in the Configuring Call Control chapter VERIFYING PPP LINK FAILURE DETECTION IS OPERATIONAL To veri...

Page 360: ...6 Check the log for the message which indicates that a link failure has been detected 7 If there is a failure refer to WAN Line Availability for corrective actions VERIFYING DHCP RELAY AGENT The follo...

Page 361: ...og DHCP R Failed to open UDP port 67 erc error return code If this error message is found in the report log refer to Enabling the Relay Agent in the Problem Diagnosis chapter VERIFYING THE RELAY AGENT...

Page 362: ...ke the following the client was not able to obtain its IP address from the DHCP Server C ping 204 157 42 168 Pinging 204 157 42 168 with 32 bytes of data Destination host unreachable Destination host...

Page 363: ...g to enable the Proxy Client the following message will be present in the report log DHCP P Failed to register with the IP Address Pool Manager erc error code If this error message is found in the rep...

Page 364: ...the instructions actions in the dial out verification section VERIFYING PROXY ARP IS OPERATIONAL Use the following graphic to help you in verifying that Proxy ARP is operational When following the ste...

Page 365: ...IP host devices to see what MAC addresses are mapped to the target IP address On many operating systems the arp a command displays the ARP cache If the target IP addresses are mapped into the nearest...

Page 366: ...u will need to use the system s configuration editor To use CFGEDIT enter the cfgedit command at the system prompt Although this utility allows you to make changes to the configuration while the Cyber...

Page 367: ...he failure to see the following IP message for each IP interface IP Network initialized successfully on ddd ddd ddd ddd indicates that you may have either not configured a needed interface or have inc...

Page 368: ...heck the status of the line If it is determined that there is no problem with the line contact Customer Support Problem The system does not display the WAN line availability messages Instead the syste...

Page 369: ...ill be using the dedicated connection and make any necessary corrections FRAME RELAY CONNECTIONS Problem The system displays the following message in the report log Unexpected error during transmissio...

Page 370: ...cket access and the LAPB addressing format modulo 8 or 128 is consistent with the line provisioning 5 If the log contains a sequence similar to the following I 17 33 32 32 1067 IN LAPB SABM I 17 33 42...

Page 371: ...ports these messages then continue with the next step If the system does not report these messages the remote device is not correctly connecting to the system Check and verify the configuration of the...

Page 372: ...s and the appropriate actions to be taken MULTI LEVEL SECURITY Problem A remote device is not able to receive a ping response from a local device when the remote device is authenticated on both the de...

Page 373: ...ng the iproute add Manage Mode command 3 Check that the CyberSWITCH and the specified Host both have the same Subnet mask and Sub network number for that ip address using the ipnetif Manage Mode comma...

Page 374: ...message No response from ip address Action 1 Verify that the routing entry for the destination network exists by entering the following administrative console command iproute ip address If the comman...

Page 375: ...e with the next step If the proper WAN interface does not exist make corrections to the system configuration using CFGEDIT 3 Check that the IP address configured in the Device list for the IP Host dev...

Page 376: ...hapter If the local IP Host does not have the proper route entry make corrections to the local IP Host configuration IP ROUTING OVER A WAN DIRECT HOST INTERFACE CONNECTION Problem The remote IP Host c...

Page 377: ...y initialized Use the ipnetif command a Manage Mode command to check for the proper WAN RLAN interface If the proper WAN RLAN interface exists then continue with the next step If the proper interface...

Page 378: ...te entry for the remote network with the CyberSWITCH as the next hop If it does refer to Verify IP Routing Over a LAN Connection in the System Verification chapter If the local IP Host does not have t...

Page 379: ...Filter using Manage Mode ipfilt command The Exception Filter overrides all other filters If the Exception Filter is enabled this could be the problem 2 With per device and network interface filters it...

Page 380: ...r is still 0 there is an unexpected condition present within the CyberSWITCH software Contact Customer Support 4 If the RIP Send Control is set to RIP Version 1 or RIP Version 1 Compatibility use Mana...

Page 381: ...e address is not the correct address for the Router correct the transmit broadcast address for the interface using CFGEDIT Refer to page 380 for instructions regarding checking the address 3 Enter the...

Page 382: ...X routing over the WAN connection IPX routing service tables triggered RIP SAP start up triggered RIP SAP operation IPX ROUTING INITIALIZATION Problem The CyberSWITCH does not display the correct IPX...

Page 383: ...n use the ipxnetif Manage Mode command If they are not using the same encapsulation then correct it either on the CyberSWITCH or the NetWare server 5 Verify that the CyberSWITCH and the NetWare server...

Page 384: ...elated to the Remote LAN verify the IPX Network Number for the remote bridge in the router s configuration under bridging properties Refer to Remote LAN Devices for details IPX ROUTING OVER THE WAN CO...

Page 385: ...network interfaces plug this data into previously described formula 2 Run CFGEDIT From Options select IPX Routing 3 Select IPX RIP Table maximum number 4 Increase the size of the table based upon you...

Page 386: ...console command and look for the starting message in the log 2 Generate a triggered RIP SAP update request to the devices in question Issue the following console command for each device ipx trigreq d...

Page 387: ...ng the following console command atalk port If the command shows the port is not in up state wait for a couple of minutes and repeat this step 2 Check to see if the LAN connection of the port is opera...

Page 388: ...s is not within that range then try to close the AppleTalk control panel once and then reopen it If the AppleTalk address is still invalid then try to assign a valid address manually by marking User d...

Page 389: ...sing CFGEDIT 2 If the static route is not configured correctly make the appropriate corrections 3 If the static route is properly configured then contact your Distributor or Customer Support APPLETALK...

Page 390: ...one of the following messages appears there is an unexpected condition present within the CyberSWITCH software Contact Customer Support SNMP SNMP initialization failure unable to allocate necessary m...

Page 391: ...pOutTraps counter is not increasing while these reports are being logged there is an unexpected condition present within the CyberSWITCH System software Contact Customer Support SNMP Unable to obtain...

Page 392: ...CALL RQST ACK Call Id call Id Rate data rate Slot slot Port port Chans bearer channel map TN telephone number di aled Ces communication endpoint suffix ConnId connect Id In CALL RQST ACK CallId call...

Page 393: ...at the syslogd daemon is running on the syslog server This can be done with your UNIX system s process status ps command This command should result in a display of the syslogd process If none is displ...

Page 394: ...e indicate the CCP protocol 0x80FD The CyberSWITCH does not have Compression ENABLED In this case the CyberSWITCH will respond to all attempts by the peer to open CCP with a TERM ACK frame The connect...

Page 395: ...le trying to open a UDP port for use by the DHCP BOOTP Relay Agent Therefore the relay agent will not operate correctly Contact your Distributor or Customer Support Problem The following message is NO...

Page 396: ...r you should be able to ping the DHCP Relay Agent closest to the DHCP Client If you cannot you need to add static routes that allow you to do so 6 From the DHCP Relay Agent closest to the DHCP Client...

Page 397: ...not take effect until the system is restarted 4 When Manage Mode is exited an attempt will be made to enable the Proxy Client 5 Re examine the report log for the Proxy Client Enabled message 6 Remembe...

Page 398: ...yberSWITCH and the DHCP server These static routes are required for smooth operation of the DHCP protocol 6 If the DHCP server is not on a directly connected LAN another test may be performed If at al...

Page 399: ...e the system transmits data across the LAN Note that at least 128 bytes of data must be transmitted to trigger the TX indicator The RX indicator flashes while the system is receiving data from another...

Page 400: ...vice indicator s activity Also you may access your administrative console for further information issue the dr console command to view system messages D CHAN LED status One Data Link Multiple Data Lin...

Page 401: ...ble below provides an error description corresponding to the number of consecutive LED blinks FSB First Stage Boot SSB Second Stage Boot SERVICE INDICATOR BLINKS If the Service indicator blinks at any...

Page 402: ...ink if semipermanent devices are configured and a connection to one of these devices is faulty Use the sp command to check the status of the semipermanent connection Once you correct the problem the S...

Page 403: ...essage text describes the actual message being reported This chapter describes the types of system messages available for example informational and error It also lists each message individually with s...

Page 404: ...essages Bridge is operating in UNRESTRICTED mode Data link up Slot slot Port port Ces comm endpoint suffix SNMP SNMP initialized successfully NORMAL OPERATION MESSAGES The system normal operation mess...

Page 405: ...Y The following pages list all the informational warning and error messages alphabetically The text describes the messages and includes suggestions for problem resolution if applicable Note that the t...

Page 406: ...ond adapter x The WAN card initialization subsystem encountered an error on the indicated adapter Restart the system If the problem persists the indicated adapter card may be faulty and you should con...

Page 407: ...e system is attempting to initialize the Digital Modem card again after a failed attempt Check the subsequent log messages for the status of the card Attempt to initialize unconfigured DM card in slot...

Page 408: ...server has been configured or an error occurred when parsing the ACE server configuration AUTH RADIUS CHAP rejected for device device name The remote Authentication server rejected the CHAP mode auth...

Page 409: ...rectly in the remote Authentication server s database AUTH RADIUS PAP rejected device device name The remote Authentication server rejected the PAP mode authentication request for the indicated device...

Page 410: ...Warning code 0003 No UDP buffer available Internal resources were not available to send receive an authentication message Contact your Distributor or Customer Support AUTH Warning code 0004 No authen...

Page 411: ...allocation of SCC controllers is not in a consistent state Restart the system Bad FR Frame Size frame size Indicates that a frame was received with an invalid length size Contact your Distributor or C...

Page 412: ...contained within the database Calling Line ID Security Failure off node authentication server not supported The system authentication type is configured to obtain device information off node for examp...

Page 413: ...ay month year Calls Day x Calls Mth x Mins Day x Mins Mth x Call Restriction device information Displays daily monthly call totals at the end of a day or a month Cannot make Bridge Dial Out call No de...

Page 414: ...ection and one Frame Relay virtual connection Contact your Distributor or Customer Support Note Duplicating serial numbers on all systems is a license violation Capability upgrade processing error cap...

Page 415: ...lementation and is thus considered a unrecoverable error The system will close the CCP protocol meaning that the connection continues to operate but in an uncompressed mode CCP Option Negotiation Fail...

Page 416: ...not received a challenge response from the peer The cycle is attempted the configured number of times after which a failure is declared Check your remote device CHAP Authentication Failure unable to i...

Page 417: ...fcr packet buffer AppleTalk related Contact your distributor or Customer Support Couldn t find speech service slot port An incoming call was received which specified Speech Bearer Service capability S...

Page 418: ...UDP ports used by the DHCP Proxy Client should open Contact your Distributor or Customer Support DHCP P Failed to open UDP port x erc y This message appears when the DHCP Proxy Client is being enable...

Page 419: ...y Client has been enabled from Manage Mode If the DHCP Relay Agent is also enabled it may not be necessary for the Proxy Client to open this UDP port DHCP P UDP port 68 closed The DHCP Proxy Client is...

Page 420: ...d under Device Table Menu Bridging Discrepancy in dynamically obtained device data The System authentication type is configured to obtain device information off node In an outbound call scenario with...

Page 421: ...t the Digital Modem is now ready for use DM card type configured in slot slot does not exist Using the resource database the system has tried to initialize a Digital Modem card that doesn t exist Chec...

Page 422: ...after the Bootstrap came alive message for a given adapter DSL test failed to establish Layer 1 port port During power up all WAN lines undergo a test to see if Layer 1 can be established This messag...

Page 423: ...n for the adapter If the problem persists the indicated adapter card may be faulty and you should contact your Distributor or Customer Support Error during channel initialization Access access index A...

Page 424: ...y display after upgrading software which contains secondary IP addressing and an old style WAN Direct Host interface To correct use CFGEDIT to delete the problematic WAN Direct Host interface Afterwar...

Page 425: ...ed Access The event is given in both textual event and numeric code forms Facility not subscribed Slot slot Port port This probably indicates a SPID configuration error on the indicated line The confi...

Page 426: ...repeatedly the above message indicates a problem with your hard drive Contact your Distributor or Customer Support Failure during read of file s The WAN card initialization subsystem encountered an er...

Page 427: ...ssible error codes and their corresponding definitions based on Table 11 1 from CCITT Q 921 specification A The Network sent a RNR Receiver not Read or REJ Reject B D The Network sent a DM F 1 or a UA...

Page 428: ...pening file file name Failure on file closure file name Failure on write of file file name If you see any of these log messages repeatedly there may be a problem with the file system Contact your Dist...

Page 429: ...sconnected If you see this message often check the remote device s configuration to prevent wasted calls Initial TDM Clock Master slot line The external line indicated has been selected as the master...

Page 430: ...name An IP packet could not be forwarded to a remote network because the next hop device for that network is not configured as IP Callable The CyberSWITCH returns a network unreachable message to the...

Page 431: ...Distributor or Customer Support IP Datagram with destination address of destination address cannot be forwarded IP Reason Invalid Device Info Device device name is not IP callable These two message a...

Page 432: ...rt already exists There is another network interface that is configured for the LAN port indicated and it was already initialized successfully This means that there are multiple network interfaces con...

Page 433: ...tails of protocol Refer to the specific documentation for the device in question to determine if it is configured correctly Then contact your Distributor or Customer Support IPCP Remote device does no...

Page 434: ...of the routing table configuration will not be reflected in the RIP packets sent to other routes contact your Distributor or Customer Support IP RIP Send queue full The RIP transmission queue has bec...

Page 435: ...t indicated was not initialized because there is no Ethernet resource configured or the Ethernet resource that is configured does not have the corresponding port You should correct the system configur...

Page 436: ...e increased Note This message will not recur in the log until space becomes available in the service table IPXCP Add Network Address to Pool with value above network address This message informs the a...

Page 437: ...oper LAN adapter configuration and hardware installation LAN Adapter FIFO not empty status status value The LAN adapter did not enter the proper state after it was restarted Check for proper LAN adapt...

Page 438: ...ssor If the versions do not match this message is posted The upgrade did not work properly contact your Distributor or Customer Support LAN Adapter System resource error LAN Adapter hardware failure d...

Page 439: ...ocol is terminated because the CyberSWITCH and the device cannot agree on a common way of communicating The device may not be configured properly Refer to the specific documentation for device set up...

Page 440: ...The next log message will indicate whether calls will still be allowed or not Maximum calls per month limit x has been reached The described limit has been exceeded The next log message will indicate...

Page 441: ...stently appears for the same modem number contact your distributor or Customer Support Modem revision on modem modem of slot slot failed Individual modems on a Digital Modem card are failing Check the...

Page 442: ...o a 12Mb system minimum If you are still encountering problems disable unused protocols and or contact your Distributor or Customer Support to reduce your number of available connections NO FR LMI tra...

Page 443: ...nal message identifies that there is not enough memory available to accommodate the system s total capacity load for required connections Offnode server lookup of Dial Out User failed Off node authent...

Page 444: ...call charges exceeded Monthly call charge tracking is enabled and the configured maximum has been exceeded PAP Identification timeout on remote device The remote device did not send the PAP Authentica...

Page 445: ...icated HDLC controller 80532 Device failed an internal register test The boot process should continue however make note of the error message in the event of a future problem Post number HDLC number Te...

Page 446: ...ntinued the outgoing call in order to allow the incoming call to be established RBS Encountered unknown source ID RBS_out_SM channel NO Dial Digits supplied RBS Received unknown primitive from CC RBS...

Page 447: ...ch causes the entire system to reboot Received charge amount charge amount The system has received an advice of charge from the network for the call just disconnected The charge for this call is indic...

Page 448: ...led or been powered off without an indication of the failure from the network If the event continues contact your Distributor or Customer Support Security Rejection Bridge Address Security cannot use...

Page 449: ...anent connection will be disabled Compare the authentication device information configured on the system with the actual configuration of the remote device Make corrections as needed Then issue the ca...

Page 450: ...st was discarded SNMP Authentication failure unknown community name The SNMP Agent received a request PDU whose community name is not configured in the Community Names Table The request was discarded...

Page 451: ...e shared memory area I O memory and the peripheral buffer memory an error was detected The boot process should continue however make note of the error message in the event of a future problem SSB i960...

Page 452: ...Post 34 i960hdlc_3 FAILURE The i960 failed its 80532 test using the third HDLC controller The boot process should continue however make note of the error message in the event of a future problem SSB...

Page 453: ...ected TACACS authentication is not available You must first ENABLE TACACS user level authentication An attempt was made to configure the Terminal Server Security for TACACS and TACACS was not configur...

Page 454: ...If this message appears consistently contact your Distributor or Customer Support TFTP Local error 7 Received packet with size zero The TFTP protocol received a packet with no data TFTP Local error 8...

Page 455: ...replacing it If this message appears consistently contact your Distributor or Customer Support TFTP Local error 20 Error while writing file filename An error occurred while writing to a file The file...

Page 456: ...r 6 Text from Remote Host The REMOTE HOST is unable to overwrite the specified file No file transfer will be attempted TFTP Remote error 7 Text from Remote Host This message indicates that the specifi...

Page 457: ...esponse from the network Verify that the remote site is active and that the network is operational Timeout detected on receiving caller s number The incoming call security feature is enabled and the c...

Page 458: ...leTalk Address Contact your Distributor or Customer Support Unable to allocate unnumbered wan port for device device name Contact your Distributor or Customer Support Unable to complete Bridge Dial Ou...

Page 459: ...curity prompt was not found in the on node database and SFVRA Connection Manager was not configured Unable to open config devdb nei file Disregard this message if you have not yet added at least one d...

Page 460: ...net version attempted to connect to the system Contact your Distributor You may need to upgrade software to support this Updating CyberSWITCH from FileName The specified file received during a Reliabl...

Page 461: ...X25 facilities error fast select with restriction on response was required The fast select with restriction on response is required Verify that fast select is enabled by both DTE s and the service pr...

Page 462: ...on No action required X25 facilities error facility not available A facility was requested which is not enabled Verify that the specific facility is enabled by both DTE s and the service provider X25...

Page 463: ...rational XMODEM DATA FAILED CRC CHECKS A file contained in the X Modem file set has failed the CRC check The system will automatically reset and attempt a reboot in an effort to correct the problem If...

Page 464: ...them in the following locations Directory log File Name rprt_log nn where nn is an integer that is incremented each time a new file is written The system reports messages using the following format W...

Page 465: ...ssages have a cause field This is the value in hex that was in the message It explains why either a call was disconnected or why a call attempt was not able to be completed There are also parameters s...

Page 466: ...to the ISDN Informational call trace message Call is not end to end ISDN One or more of the WAN phone networks used to connect the call is not an ISDN network The call must be at 56 Kbps Call waiting...

Page 467: ...ation acknowledgment message for the indicated adapter It is in response to a configure message In CALL RQST ACK Call Id call Id Slot slot Port port Ces communication endpoint suffix ConnId connect Id...

Page 468: ...n message from the network The Call Id and Ces values are included for your Distributor or Cabletron Customer Support The remaining parameters are used to report line details Refer to the Cause Codes...

Page 469: ...ess is non ISDN Informational call trace message Out ALERTING Call Id call Id Slot slot Port port Chans bearer channel map The system is sending a connection to the network This is sent in response to...

Page 470: ...ted The charge for this call is indicated in the charge amount parameter Received unknown abnormal report value Slot slot Port port Ces communication endpoint suffix Informational call trace message R...

Page 471: ...aused a discard action the point at which the filter was applied or a designation of global For an IP network interface this will be the configured name of the interface For a device based filter this...

Page 472: ...the format of a PPP trace line as it is displayed by dr connection Id packet direction protocol type packet type where connection Id Identifies the connection The Id is a numerical value allowing you...

Page 473: ...re Reject The Configure Reject is transmitted in response to a Configure Request It indicates that the sending device does not understand the options specified in the option list of the Configure Reje...

Page 474: ...or IPX to be traced The following is the format of a FR_IETF trace line as it is displayed by dr packet direction device name or fr_accessname_dlci protocol size NN where packet direction Indicates th...

Page 475: ...s bytes The DCE has detected a packet sequence error In X25 DCE Restart Conf LCN logical channel number number of bytes bytes The DCE is confirming that all virtual circuits have been reset In X25 DCE...

Page 476: ...index Cause cause for disconnect The system is sending a disconnect to the network to terminate a call Out X25 DISCONNECT RESPONSE ConnId connection Id Access access index The system has received a d...

Page 477: ...g up or going down defining the state it is in and the event that is occurring X 25 LAPB TRACE MESSAGES You can trace X 25 Link Access Procedure Balanced LAPB incoming and outgoing packets This LAPB t...

Page 478: ...sequence Id Rx Sequence sequence Id The DTE has sent a data frame from the DCE Out LAPB REJ Rx Sequence sequence Id The DTE has detected a sequence error in the link layer Out LAPB RNR Rx Sequence se...

Page 479: ...ance segment of the User s Guide Remote Management Once the CyberSWITCH is initially configured you may use methods to remotely manage the CyberSWITCH This chapter provides information for using each...

Page 480: ...d Management SNMP Simple Network Management Protocol Telnet TFTP Trivial File Transfer Protocol This chapter also describes a method of remotely configuring an CyberSWITCH through another CyberSWITCH...

Page 481: ...using AMP out of band management your PC must have a communications package to connect the PC s modem to the modem connected to the CyberSWITCH After you have connected to the CyberSWITCH via modem y...

Page 482: ...you purchase and then set up a Network Management Station such as SPECTRUM or SPECTRUM Element Manager for your environment This Network Management Station NMS is then used to monitor your network Fr...

Page 483: ...figure SNMP trap information if desired change MIB 2 system group objects if desired For the NMS follow its specific installation instructions Note that the NMS you are using must also have the latest...

Page 484: ...stration see previous page the Telnet client is not an CyberSWITCH It is also possible to use the CyberSWITCH as the Telnet client This allows you to remotely manage an CyberSWITCH with an CyberSWITCH...

Page 485: ...he CyberSWITCH using Telnet you must have a Telnet client software package A Telnet client software package is built into the CyberSWITCH With the CyberSWITCH acting as the Telnet client simply enter...

Page 486: ...with the CyberSWITCH Terminate the Telnet session by typing logout This will ensure that the Telnet session has been terminated regardless of the specific Telnet client used Notes If you need to quit...

Page 487: ...ion INSTALLATION AND CONFIGURATION TFTP is available to the user by default No installation or configuration steps are required You can limit the access to files by using the fileattr and tftp command...

Page 488: ...s files to the remote host the tftp get command retrieves files from the remote host For either command you will then be prompted for the IP address of the remote host the complete path of local file...

Page 489: ...LAN connection we recommend an CyberSWITCH a simple two node LAN and a computer with a TCP IP stack with a Telnet client which you can reconfigure After you have your setup complete you must 1 Minimal...

Page 490: ...h your local ISDN line 2 Configure your TCP IP stack on your PC or similar LAN based TCP IP device with the following information IP Address an unused IP address on your local LAN Default Gateway the...

Page 491: ...ition for each command ACCESSING ADMINISTRATION SERVICES The following commands are available for system login admin Logs you into the system and provides access to all system commands The system will...

Page 492: ...one After responding to the prompts the system will ask you if you wish to restart the system in order to put into effect these changes BOOT DEVICE COMMANDS System software consists of three distinct...

Page 493: ...tem parameters without interrupting the current execution state of the system software This feature consists of a series of console commands that allow you to display current system parameters change...

Page 494: ...escape The system will automatically return to the normal system prompt after the entire file has been displayed If you are viewing the Release Notes press the escape key to exit the release notes an...

Page 495: ...rmanent interface A Basic Rate Permanent interface is up if the serial layer 1 is up for the line The dedicated access does not have to be up for the interface to be considered up A Basic Rate Permane...

Page 496: ...rrently running on the system II III etc In addition it displays all other custom information for this copy of the system software such as the platform the installed resources and the hardware resourc...

Page 497: ...VIEWING THROUGHPUT INFORMATION The Throughput Monitor screen displays the system throughput monitoring feature in action To enter this screen 1 Issue the mc command to display the connection monitor s...

Page 498: ...ion Monitor screen 2 Indicates the current bandwidth in place to the connected site This number will be updated as calls are added or released 3 Example of three samples where actual bandwidth utiliza...

Page 499: ...0 utilization of current bandwidth In this example neither overload nor underload is occurring From the Throughput Monitor screen press f To freeze the current throughput monitor display r To resume t...

Page 500: ...nfiguration Y or N If you indeed want to restore the old configuration type Y If not type N default Note that you must have saved configuration changes at least one time before the restore command wil...

Page 501: ...ty commands include the flash commands and the simple file utilities The flash commands give you the ability to update format and reclaim unused space in the embedded system s resident flash array It...

Page 502: ...h the session Possible access levels include admin administrator access guest guest access nobody someone has initiated a Telnet session with the CyberSWITCH but did not login Note If you have configu...

Page 503: ...state value can be either valid or pending If the state is valid an address will have been logged as shown If the state is pending the address would not yet be logged and would appear as 00 00 00 00 0...

Page 504: ...nother router on the network if another router is present up The port is ready for use down The port is not ready for use unnum_wait_addr This state will exist with the following scenario When an UnNu...

Page 505: ...work and a response comes back indicating that the address is already in use and cannot be used by this port soft seed This flag is triggered if the port is not configured in the discovery mode it is...

Page 506: ...ssociated zones When a device has learned the complete list of zones for that route the zones valid field will display TRUE atalk stats AppleTalk statistics are comprised of six subgroups of statistic...

Page 507: ...It displays the Destination MAC Address Source MAC Address and Ethernet type field for each LAN frame In the above example the DEST field is the destination MAC address field of the LAN frame The SOU...

Page 508: ...name to distinguish it from any other configured device name For example you could enter call device sm if there are no other devices whose names begin with sm The call device command can be used to t...

Page 509: ...P device in the device database can have one or two phone numbers at which they can be called This message is displayed if the device has no phone number specified Re enter the name or RET to cancel T...

Page 510: ...you are testing In response to the call peer command you will see the following message echoed back for informational purposes Calling phone number at data rate device PPP The phone number will show...

Page 511: ...tered and there is a device configured with the name Schultz and a device configured with the name Schmidt this message would be displayed You would then need to enter at least call device Schu to suc...

Page 512: ...ections that are using a compression protocol The following commands are used to display current compression information cmp stats Displays the compression statistics for all active connections Refer...

Page 513: ...uent frame relay system console commands entered DLCI m will remain the default DLCI until the default is changed through reissuing the fr d DLCI m command The DLCI value is provided by the service pr...

Page 514: ...mes received on the LMI link Good LMI Frames Received The number of valid LMI frames received during the last N391 period This count is reset after each N391 events The N391 parameter is the configure...

Page 515: ...and the corresponding interface name are displayed ip filter trace discard off Controls the tracing of packets which are discarded as a result of IP filters Issuing the command without an optional par...

Page 516: ...ings ddd ddd ddd ddd is alive The valid ICMP Echo Reply was received from host ddd ddd ddd ddd No response from ddd ddd ddd ddd No response was received from the host within the timeout value number o...

Page 517: ...ion flag where A Always propagate N Do not propagate H Propagate when Next Hop Device Connected 1 2 RIP Version 1 Version 2 visibility flags determine whether or not this route is visible when send th...

Page 518: ...ork or host A value of 255 255 255 255 indicates that this entry is for a specific IP host Next Hop IP address or device name for the next hop router that provides access to the destination network or...

Page 519: ...d connected ipx diag host ipx address timeout Tests device connectivity to specified IPX host by sending out a diag packet If connection is up host sends a message in response to this packet to confir...

Page 520: ...d the ipx diag commands both test device connectivity although both send back different types of responses However due to the variety of vendors and equipment available to networks one command may wor...

Page 521: ...s in use The value which the number of ISDN B channels in use must meet or exceed in order to cause an isdnUsageHigh SNMP trap to be generated by the system The enabled status for the generation of th...

Page 522: ...isplay Displays the local call detail recording report log log cdr erase Erases the local call detail recording log report log cdr write Writes the local CDR log to disk The file is written to the LOG...

Page 523: ...s could be caused by the destination site not being in the Initiate Connection List or by the route not being in the IP Routing Table The pkt capture command allows multiple connection modes to be spe...

Page 524: ...0000001980 0064 00AA00302D25 02608C4C0EAD 8137 PEND 0008 0000001980 0064 00AA00302D25 02608C4C0EAD 8137 PEND 0009 0000003190 0028 001 001 001 001 001 001 001 001 IP ACTV 0010 0000003190 0028 001 001...

Page 525: ...that marked packet will have progressively higher positive time values Packet Number Received at Time Packet Length 0021 0000022190 mSEC 0060 Destination Address Source Address FFFFFFFFFFFF 02608C9BE...

Page 526: ...cret RET to abort secret123 Send Radius Authentication Request Please wait Authentication Successful Device Name doe Framed Address 150 001 001 001 Phone Number 1 800 555 1212 Phone Subaddress 3456 Ca...

Page 527: ...Please wait AUTH Warning code 0001 Timeout System Name radius macres MAC Address of the Host logging in RET to abort 0ab34252d546 Enter password password123 Send Radius Authentication Request Please...

Page 528: ...dows for the local and remote ends of this TCP connection tstate The current state of this TCP connection outq s u The number of bytes that has been sent but not acknowledged yet and the number of byt...

Page 529: ...can enter the IP address of the target host and optionally the remote port number to connect to If no remote port number is specified the default Telnet port is used 23 The valid range for port numbe...

Page 530: ...Telnet connections send synch The send synch command sends the Telnet SYNCH signal the DM control function as TCP urgent data to the target host This command may be useful when trying correct a situa...

Page 531: ...debug mode is turned on messages beginning with TELNET C may appear in the system log file Most users will not find these messages helpful If you have difficulty with the system Telnet client feature...

Page 532: ...he TFTP Client function The following is an example display of a TFTP PUT screen tftp session Displays the TFTP session information of active TFTP sessions To get detailed information on a specific se...

Page 533: ...bles the LAPB data link information packet tracing option This feature displays up to 15 octets of the packet To display the log file issue the dr console command This option is initially disabled tra...

Page 534: ...of available statistics and their definitions USER LEVEL SECURITY COMMANDS The following console commands are available to provide information on the authentication servers for user level security Th...

Page 535: ...t tracing option This feature displays up to 15 octets of the packet To display the log file issue the dr console command This option is initially disabled trace x25 on off Enables or disables the X 2...

Page 536: ...cuit information for the X 25 access named acc1 x25 stats Displays the statistics associated with the X 25 access Refer to X 25 Statistics for a list of available statistics and their definitions x25...

Page 537: ...nged by function These are connectivity statistics call restriction statistics call statistics throughput monitoring statistics The rest of the statistics are arranged in alphabetical order These stat...

Page 538: ...e been made for the month CALL STATISTICS You can access these statistics by issuing the ds console command Initiated The number of switched calls initiated Completed The number of switched call attem...

Page 539: ...lude a section of available statistics and their definitions for each subgroup APPLETALK DATA DELIVERY PROTOCOL DDP STATISTICS You can display this subgroup of AppleTalk statistics by issuing the atal...

Page 540: ...e but failed due to overflow ddpForwRequests The number of input datagrams for which this system was not their final DDP destination as a result of which an attempt was made to find a route to forward...

Page 541: ...e was equal to the current hop count for a particular network rtmpNextIRLesChanges A count of the number of times RTMP changes the Next Internet Router in a routing entry because the hop count adverti...

Page 542: ...received nbpInBroadcastReqs The number of NBP Broadcast Requests received nbpInforwardRequests The number of NBP Broadcast Requests received nbpOutLookUpReplies The number of NBP LookUp Replies sent n...

Page 543: ...t this port by this system zipInGetNetInfoReplies The number of ZIP GetNetInfo Reply packets received on this port by this system zipOutGetNetInfoReplies The number of ZIP GetNetInfo Reply packets sen...

Page 544: ...on any port LAN or WAN and forwarded to any other port unless it is discarded A forwarded frame is one which is not deliberately discarded for example via filters by the CyberSWITCH Once the frame get...

Page 545: ...atios and counters for the direction s without an actual compression algorithm negotiated will not indicate any effective compression or decompression COMPRESSION RELATED STATISTICS cmp ratio The numb...

Page 546: ...been through the initial DHCP packet consistency checks yet If packets pass these checks they will be dispatched to the DHCP Proxy Client BOOTPS msgs sent to Relay Number of datagrams received on the...

Page 547: ...ed interfaces It will not be possible to return a reply to the client since we have not determined on which network interface the client is located BOOTREQUEST bad rly dest Number of DHCP BOOTP BOOTRE...

Page 548: ...P Proxy Client was trying to broadcast a DHCPDISCOVER message DHCPREQUESTS sent Incremented whenever the DHCP Proxy Client has successfully sent a DHCPREQUEST message DHCPREQUEST xmit fail Incremented...

Page 549: ...pool This can happen whenever we are trying to send BOOTREQUEST messages to a DHCP server FRAME RELAY STATISTICS You can access these statistics by issuing the fr stats console command The statistics...

Page 550: ...0 is received from the network Reset Tx Seq The number of times the transmit sequence variable had to be reset This event occurs when a transmit sequence number of 0 is received from the network Lost...

Page 551: ...which the LMI encapsulation header was errored PVC RELATED STATISTICS PVC State The condition of the Frame Relay Permanent Virtual Circuit Possible values are TERMINATED INIT NOT READY and NETWORK OU...

Page 552: ...ongestion LAN STATISTICS You can access LAN statistics by issuing the lan stats console command pkts rcvd The total number of packets received on the LAN port rcv overruns The number of frames known t...

Page 553: ...datagrams discarded because the IP address in their IP header s destination field was not a valid address to be received at this system This count includes invalid addresses e g 0 0 0 0 and addresses...

Page 554: ...qds The number of IP fragments received which needed to be reassembled at this system ipReasmOKs The number of IP datagrams successfully reassembled ipReasmFails The number of failures detected by the...

Page 555: ...s received icmpInAddrMasks The number of ICMP Address Mask Request messages received icmpInAddrMaskReps The number of ICMP Address Mask Reply messages received icmpOutMsgs The total number of ICMP mes...

Page 556: ...STATISTICS You can access the following types of IPX statistics general RIP and triggered RIP SAP and triggered SAP and IPX spoofing The sections below provide information for each category IPX GENERA...

Page 557: ...times no route to a destination was found ipxBasicSysOutRequests The number of IPX packets supplied locally for transmission not including any packets counted in ipxAdvForwPackets ipxBasicSysOutMalfo...

Page 558: ...sDiscards The number of outgoing IPX packets discarded due to compression errors ipxAdvSysCircCount The number of circuits known to this instance of IPX ipxAdvSysDestCount The number of currently reac...

Page 559: ...triggered RIP update acknowledgments received trigRipInputErrors Number of Triggered RIP input message errors IPX ROUTE STATISTICS You can access IPX Route statistics by using the ipx route stats cons...

Page 560: ...update requests sent trigSapUpdateRequestsRcvd Number of triggered SAP update requests received trigSapUpdateResponsesSent Number of triggered SAP update responses sent trigSapUpdateResponsesRcvd Numb...

Page 561: ...terface statistics are displayed for each configured RIP interface IfStatAddress The IP address of this system on the indicated RIP interface For unnumbered interfaces the value 0 0 0 N where the last...

Page 562: ...ered to the SNMP Agent and were for an unsupported SNMP version snmpInBadCommunityNames The total number of SNMP messages delivered to the SNMP Agent that used an SNMP community name not known to said...

Page 563: ...tRequests The total number of SNMP Get Request PDUs that have been accepted and processed by the SNMP Agent snmpInGetNexts The total number of SNMP Get Next PDUs that have been accepted and processed...

Page 564: ...xample it provides a means whereby all authentication failure traps may be disabled TCP STATISTICS You can access these statistics by issuing the tcp stats console command tcpRtoAlgorithm The algorith...

Page 565: ...established connections tcpOutSegs The total number of segments sent including those on current connections but excluding those containing only retransmitted octets tcpRetransSegs The total number of...

Page 566: ...system Files downloaded from remote hosts to the local system Failed file puts Displays the count of failed puts Local system failed to upload a file to a remote host Failed file gets Displays the co...

Page 567: ...Sessions that have been opened TFTP Sessions Closed Displays the total number of TFTP Sessions that have been closed TFTP Sessions still open Displays the total number of TFTP Sessions that are still...

Page 568: ...l Receive Errors The number of errored frames received for the indicated protocol WAN STATISTICS You can access WAN statistics by issuing the wan stats console command data link up A counter that is i...

Page 569: ...ed for the month calls day The total number of calls that have been made for the day calls month The total number of calls that have been made for the month X 25 STATISTICS There are two sets of stati...

Page 570: ...ive ready packets received RNR Sent count The number of receive not ready packets sent RNR Received The number of receive not ready packets received REJ Sent count The number of remote connection requ...

Page 571: ...ss The local DTE X 121 address Remote Address The remote DTE X 121 address Packets Sent count The number of X 25 data packets sent Packets Received The number of X 25 data packets received Resets Sent...

Page 572: ...sections briefly describe these tools For a detailed explanation of the configuration process refer to Configuration Tools For information on configuration elements refer to the configuration chapters...

Page 573: ...ting in this mode only Dynamic Management commands are available All other system commands are ignored until you exit Manage Mode and return to the normal system command mode To return to the system c...

Page 574: ...h the configuration process this map can help you understand where you are in the CFGEDIT structure Getting Assistance Includes a System Problem Report you can use to inform us of any difficulties you...

Page 575: ...ote Sites in your network Password information related to the Users or Remote Sites in your network 2 System Details Worksheet This worksheet identifies the following information for each CyberSWITCH...

Page 576: ...USER S GUIDE 576 CyberSWITCH NETWORK TOPOLOGY...

Page 577: ...System Details System Name _____________________ PAP Password _______________ CHAP Secret ___________________ RESOURCES LINES BRI Lines Type Slot Switch type Synchronization type Name Slot Port Line t...

Page 578: ...64 Kbps Line name Clocking Data rate Line protocol Device tied to this access Internal External Internal External Internal External Internal External Line name Access name X 121 address of local DTE...

Page 579: ...hernet Address Bridge Password CLID s Bridging enabled enabled disabled IP enabled enabled disabled Make calls for bridged data enabled disabled IP Address on WAN link For IP RLAN IP Sub network numbe...

Page 580: ...ed disabled Mode of Operation router IP host LAN Name IP address Mask Unnumbered WAN need don t need Input filters Output filters Remote LAN Name IP address Mask Input filters Output filters Tradition...

Page 581: ...atic Routes NetWare Static Services Destination network address Mask Next hop default default default default IPX routing enabled disabled Internal network number LAN Name External network number Remo...

Page 582: ...extended Netwk range number AppleTalk address Zone name s Unnumbered WAN need don t need MAC Dial In WAN Network type extended nonextended extended nonextended extended nonextended Netwk range number...

Page 583: ...icular system The availability of these options depends upon the platform and software you have ordered as well as your configuration choices Physical Resources Resources Lines Accesses ISDN SubAddres...

Page 584: ...Name Slot Port Framing Line coding Signalling Line build out Datalinks PPP TEI negotiation PMP Call Screen Method name subaddress telephone number ACCESSES Dedicated Data rate Bearers list Line proto...

Page 585: ...t router Interfaces LAN WAN WAN Direct Host WAN RLAN WAN unnumbered IP Host Static Routes RIP enable disable Static ARP table Isolated Mode enable disable Static Route via RADIUS IP Address Pool IP Fi...

Page 586: ...service type service name IPX Spoofing IPX SPX watchdog serial packet handling message packet handling Type 20 Protocol change devices enable WAN forwarding Isolated Mode enable disable Triggered RIP...

Page 587: ...vice Profile Bandwidth Reservation Semipermanent Connection VRA Manager for Call Control enable disable TCP port number DEFAULT LINE PROTOCOL Action Timeout Timeout Value LOG OPTIONS Log Server Defini...

Page 588: ...Information system name system password system secret Administrative Session Database Location On node VRA Manager RADIUS TACACS ACE Inactivity time outs Telnet admin sessions TCP port number Emergen...

Page 589: ...data IPXWAN IPX routing none RIP SAP trig RIP SAP IPX spoofing AppleTalk information AppleTalk address enable disable make calls for AppleTalk data AppleTalk routing protocol Bridge information IP sub...

Page 590: ...Server Miscellaneous info number of retries time between retries packet format ACE Primary Server Secondary Server Miscellaneous info number of retries time between retries encryption method SDI or D...

Page 591: ...ng sections Release Issue and Version From the VERsion command Hardware Select the Platform and resources that you are using Problem Please fill in the following sections Type Software Hardware Unknow...

Page 592: ..._________ CABLETRON SYSTEMS SYSTEM PROBLEM REPORT SOFTWARE HARDWARE PROBLEM DESCRIPTION including sequence of events prior to problem occurrence CABLETRON SYSTEMS USE ONLY Release __________ Issue ___...

Page 593: ...plays all six groups of current AppleTalk statistics the commands below display individual group statistics atalk stats atp displays current AppleTalk ATP statistics atalk stats ddp displays current A...

Page 594: ...displays DHCP statistics dhcp stats clear clears DHCP statistics diags pots device number parameter for the POTS option runs interactive diagnostics including ringing tone generation and DTMF detecti...

Page 595: ...ame relay access and DLCI fr cong displays congestion control information for the selected frame relay access and DLCI fr d DLCI m sets DLCI value to m as default DLCI for the selected frame relay acc...

Page 596: ...PX routing table ipx route stats displays IPX routing table statistics ipx sap stats displays IPX SAP statistics ipx service displays routes to IPX services ipx service stats displays current service...

Page 597: ...pkt mac enables the MAC address monitor display pkt on off enables or disables the Packet Capture feature pkt display displays captured packets pkt load filename loads previously saved Packet Capture...

Page 598: ...ommands close exit open target host port send send parameter set name value status toggle closes the current Telnet connection to a target host closes the current Telnet session establishes a Telnet s...

Page 599: ...essname_dlci prot enables or disables the tracing for WAN FR_IETF packets wan stats displays current WAN connection information wr writes current system messages to disk ws writes current system stati...

Page 600: ...USER S GUIDE 600 CyberSWITCH...

Page 601: ...isable bandwidth reservation callrest displays the current call restriction configuration data callrest off on disables enables the call restriction feature cls clears the display screen commit writes...

Page 602: ...pradius off disables lookup of IP routes via RADIUS ipradius on enables lookup of IP routes via RADIUS iprip displays selected type of RIP information iprip off on disables enables RIP iproute display...

Page 603: ...ode security options and system parameters options change allows the current system parameters to be changed pktfilt displays the current packet filter configuration data pktfilt add change delete add...

Page 604: ...TACACS off node server configuration tacacs change allows changes to the TACACS off node server configuration tftp displays the current TFTP configuration tftp change allows the current TFTP configur...

Page 605: ...channel unacceptable Indicates that the quality of service provided by the specified channel was insufficient to accept the connection 7 7 call awarded and being delivered in an established channel I...

Page 606: ...ll because it was not awarded to the device 27 1B destination out of order Indicates that the destination could not be reached because the interface was not functioning correctly and a signaling messa...

Page 607: ...he destination could not be reached because the network switching equipment was temporarily overloaded 43 2B access information discarded Indicates that the network could not provide the requested acc...

Page 608: ...de the requested service option for an unspecified reason This may be a subscription problem 65 41 bearer service or capability not implemented Indicates that the network is not capable of providing t...

Page 609: ...st The call resume request contained a Call Identity information element which once indicated a suspended call however that suspended call was cleared either by time out or by the remote device 88 58...

Page 610: ...rt the occurrence to your authorized service provider 100 64 invalid information element contents Indicates that a message was received by the remote equipment that included invalid information in the...

Page 611: ...N Indicates that an event occurrent but that the network does not provide causes for the actions that it takes therefore the precise nature of the event cannot be ascertained This may or may not indic...

Page 612: ...AUD 72 authentication 140 authentication databases 115 autobaud 493 automatic TEI negotiation 74 autosense mode 29 B backup redundant configurations 103 bandwidth 27 bandwidth reservation 305 308 359...

Page 613: ...359 problem diagnosis 393 statistics 545 configuration default 64 67 files 39 572 packet types 224 restoring 573 tools CFGEDIT 64 dynamic management 65 congestion control 194 connection filters 229 23...

Page 614: ...F factory defaults 62 FCC notice 3 features 27 file attributes 332 file utility commands 501 fileattr 332 filters 28 See also bridging dialout IP filters final condition 231 flash commands 501 flatte...

Page 615: ...rface connection problem diagnosis 378 verification 347 problem diagnosis 367 static ARP table entries 220 static route lookup via RADIUS 221 statistics 553 verifying interfaces 342 ipconfig 492 IPCP...

Page 616: ...commands 491 logout 492 M maintenance 572 make calls option 148 278 manage 65 493 Manage Mode 64 66 493 573 601 maximum data rate 145 maximum retransmissions 273 mc 494 497 messages boot 404 system me...

Page 617: ...er 151 329 verify link detection failure 359 PPP packet trace messages 472 pre emption feature 143 prefetching IP addresses 248 problem diagnosis AppleTalk routing 386 bridge initialization 367 CDR 39...

Page 618: ...IPX description 261 entry aging time 258 network interface configuration elements 258 propagation 266 seclevel 119 120 121 125 157 secondary IP addressing 87 103 104 SecurID card 114 122 security aut...

Page 619: ...39 T table size IPX RIP and IPX SAP 260 tacacs 165 TACACS Authentication Server 164 configuration elements 165 packet format 165 TCP 226 232 237 statistics 564 tcp commands 528 Telnet 52 484 remote ma...

Page 620: ...ectivity 339 reserved bandwidth 359 RIP 348 semipermanent connections 364 SNMP 357 triggered RIP SAP 354 verifying an X 25 connection 339 WAN lines 336 virtual circuits 146 188 Virtual Remote Access V...

Reviews: