REMOTE BRIDGING N ETWORK WITH SECURITYOVERVIEWThis example network is a bridged network with Calling Line Id security and Bridge MAC Addresssecurity enabled. The network is configured with two devices. One device will be configured torequire a Bridge MAC Address security password, and one device will not. This network uses BRIlines.Worksheets for this network are included on the following pages.Note that a Hunt Group is used for the BRI lines pictured in the Network Topology Worksheet.Remote devices will then only need to configure one telephone number (the Hunt Group number)for the CyberSWITCH instead of all four phone numbers. If the first line is busy, the next line isautomatically used, and so on until a free line is found. A Hunt Group number can be arrangedthrough your Service Provider.INITIAL I NSTALLATION STEPSThe initial steps in the CyberSWITCH installation process are basically the same no matter howcomplicated the network. These steps are:• completing the requirement worksheets• ordering ISDN service• powering on the system• accessing Release Notes• connecting an administration console• setting up Telnet access• upgrading system software• changing defaults to secure system• returning configuration to factory defaultsThe chapters Accessing the CyberSWITCH and Upgrading System Software (in the User’s Guide)describe each of these steps in detail.Worksheets for this network are included on the next few pages.