Workgroup Remote Access Switch 23R EMOTE B RIDGING NETWORK WITH S ECURITYConfigure the CyberSWITCHC ONFIGURE THE C YBER SWITCHNote: We are assuming that the software has already been installed and is running. Be sure youare working from the system prompt.Using the detailed instructions for these steps found in the Simple Remote Bridging chapter,complete the following configuration steps.Start the Run-Time CFGEDIT programSelect physical resourcesSelect to add a resourceSelect Switch type to be NI-1Select to add a lineEnter the line nameSelect slot and port numbersSelect line interface type of “Point-to-Point”Add Data Links (Data Link explanation follows)Choose Auto TEI NegotiationEnter Service Profile ID (SPID) ValueEnter Directory Number for Data LinkEnter Maximum Number of Digits to VerifyRepeat “Add Data Links” for second Data LinkRepeat “Select to add a line” for each additional lineData links are handled differently on a NI-1 switch. Some BRI lines have only one phone number(for the Data Link), but can handle two calls (one for each bearer channel). For NI-1 switches, theBRI line has two phone numbers (one for each bearer channel), and each phone number has its ownSPID. You must enter the number of digits to verify, so that when the system receives a phone callit can determine on which bearer to accept the phone call. Refer to the System Details worksheet forthe SPIDs, directory numbers, and the number of digits to verify.CONFIGURING THE O PTIONSThe default configuration for the CyberSWITCH is bridging disabled and IP routing enabled. Forreasons we provide below, we want both bridging and IP routing enabled. Under the Option Menu,select the bridging option and follow the instructions to enable bridging.This network is a bridged network, but we are going to configure an IP option (the IP host operatingmode) so that we may use an IP application (such as Telnet, TFTP, or SNMP) to manage theCyberSWITCH. This process was described in the previous chapter (page 13) and will not berepeated here.CONFIGURING THE S ECURITYThis network has remote devices, and the device information for each of those devices must beconfigured. Device security is used, and the remote devices are configured in the on-node