Small Office Remote Access Switch 27
R
EMOTE
B
RIDGING
N
ETWORK
WITH
S
ECURITY
Verify the Installation
S
AVE
C
ONFIGURATION
F
ILES
We have now configured all of the required information for a bridged system with Calling Line Id
Security and Bridge MAC Address Security enabled. Press 4 at the Main menu to save the changes.
The old configuration files will be stored in the \CONFIG directory with a file extension of .BAK
(e.g., the old NODE.NEI file will be called NODE.BAK).
After you save the configuration files, press <RET> to exit the CFGEDIT program. Reboot the
system to activate your changes.
V
ERIFY
THE
I
NSTALLATION
Steps on how to verify the installation are detailed in the System Verification chapter of the User’s
Guide. This section gives an outline of which steps should be executed.
On the CyberSWITCH:
Verify hardware resources are operational
Issue
dr
command
Look for BRI messages
Look for LAN initialized messages
Verify WAN Lines Available
Connect WAN lines
Issue
dr
command
Look for “Data Link up 1,1” in reports
On each HDLC Bridge LAN:
Attempt accessing a resource on the CyberSWITCH LAN. This may require that you reboot
your system and proceed through the logon sequence.