USER’S GUIDE340 CyberSWITCHBelow is an example of a configuration used to verify multi-level security over an IP WANUnNumbered interface. It uses IP addresses specific to the example. Substitute the IP address ofyour network when you perform the multi-level security verification steps. It also uses the “ping”command. The “ping” command sends a packet to a specified host, waits for a response, andreports success or failure. Substitute the equivalent command on your network.The steps to verify multi-level security are:1. Determine if the client PC can ping the Service Server. On the Client PC, type:ping 100.0.0.2 If the ping is successful, then continue with the next step.If the client PC CANNOT ping to the Service Server, refer to IP Routing over a WANUnNumbered Interface Connection in the Problem Diagnosis chapter.2. Reconfigure the definition of the remote device in the device database to enable User LevelAuthentication. Attempt to ping the Service Server again. On the client PC, type:ping 100.0.0.2 If the ping is successful, disconnect the call. Ensure that User Level Authentication is enabledfor the remote device, then try the ping again. The ping should fail.If the client PC CANNOT ping to the Service Server, then continue with the next step.3. Telnet from the client PC into the central site. For example, telnet to 100.0.0.1, port 7003. Followthe normal user level authentication process.4. Once again, determine if the client PC can ping the Service Server. On the Client PC, type:ping 100.0.0.2 If the ping is successful, then multi-level security is operational.If the client PC CANNOT ping to the Service Server, refer to Multi-Level Security in the ProblemDiagnosis chapter.ISDN100.0.0.1 192.100.1.1RemoteDeviceClient PC192.100.1.2Ace Server ServiceServer100.0.0.3 100.0.0.2Telnet Portto ACE 7003