Central Site Remote Access Switch 243CONFIGURING A LTERNATE ACCESSESDedicated AccessesDEDICATED ACCESS CONFIGURATION ELEMENTSLINESThe line that will be used for the dedicated access. A dedicated access can be defined on either aBRI, a PRI, a network V.35, or a network RS232 line.BEARER CHANNELSFor BRI and PRI lines only. Also referred to as B channels. B channels can carry voice or data ineither direction.CLOCKING T YPEFor V.35 and RS232 lines only. Clocking types can be either external or internal. Dedicatedconnections usually use external clocking.LINE PROTOCOLDesignates the type of line protocol that will be used on the dedicated connection. PPP line protocolis the correct selection for most configurations. HDLC protocol may work for devices that onlysupport HDLC protocol.D EVICE N AME (OPTIONAL )Optional parameter. The device name of the device assigned to this dedicated connection. Thedevice name may be up to 17 characters in length, and is case sensitive. If you configure thisparameter, and, in addition, turn off outbound authentication for this device, no authentication willbe needed for this particular device. If you do not configure this parameter, device authorization isrequired for the device.DEDICATED ACCESS BACKGROUND I NFORMATIONTo access dedicated network connections, there must be a physical connection between thenetwork and the CyberSWITCH. The dedicated access defines how the CyberSWITCH will use thisphysical connection.The dedicated connection is used in addition to any switched connections that can be made toprovide overflow data capacity to the remote device. The dedicated connection is brought up atinitialization time. The Throughput Monitor starts monitoring the dedicated connection for anoverload condition. When link utilization causes an overload condition, additional switchedconnections will be made to the remote device based on the data rate configured for that device.When the link utilization causes an underload condition, the switched connections will be releasedwith the dedicated connection remaining active.Switched connections can also be used to provide backup connectivity to the remote device in casethe dedicated connection fails. If the dedicated connection goes down, and there is network traffic,switched connections will be made to the remote device based on the data rate configured for thatdevice thus providing backup for the dedicated connection. When the dedicated connection comesback up, it will be aggregated together with any switched connections that may be active.When the link utilization causes an underload condition, the switched connections will be releasedwith the dedicated connection remaining active.Device level authentication must be enabled for dedicated accesses to properly identify the remotedevice and provide switched backup and overflow to that device.