USER’S GUIDE
314 CyberSWITCH
•
User Level Security
If you use user level security for authentication: configure devices on the VRA manager as well.
This will provide access to the following VRA call control management features: call
restrictions, maximum bandwidth, and grouping (in addition to the call logging feature).
User level security and VRA call control management work together as follows: VRA allows a
device to connect under an alias name until the user can be verified by its authentication server.
Once the user is properly authenticated, the device’s name is forwarded to the VRA manager.
The VRA manager can then further determine whether or not the device should be allowed
connectivity at this time.
Possible reasons VRA may disconnect the device’s call:
•
Call restrictions reached for this device.
•
Maximum bandwidth reached for this device.
•
Device and CyberSWITCH to which it is connected are not part of the same group.
•
Device on a reserved channel and not a reserved device.
•
Device not defined in VRA manager.
Note:
The alias assigned to initial calls is REMOTEx. Be sure you do not use this name for any
of your device names when configuring VRA or your authentication server.
L
IMITATIONS
/C
ONSIDERATIONS
•
VRA must not initiate outgoing connections through the CyberSWITCH using non-VRA au-
thentication.
•
VRA as Call Control Manager may not be disabled if VRA is the authentication agent.
•
VRA as Call Control Manager is not disabled when VRA as authentication agent is disabled.
•
VRA does not override information found on the authenticating server except for: call restric-
tions, maximum bandwidth, and grouping.
•
VRA does not allow device names of REMOTEx to be configured.