User`s guide

SFVRA Connection Manager 63
C
ONFIGURING
U
SERS
Access
CONFIGURING RESTRICTIONS
1. On the Functions menu, select Users, or click on the toolbar. The User List dialog appears.
2. Select a user that which you want to configure restrictions, or click Add to configure a new user.
The User dialog appears.
3. Select the Restrictions tab.
4. Select 56000 bps or 64000 bps for the Base Data Rate. 64000 bps is the default.
5. Determine the Initial Bandwidth and Maximum Bandwidth. These values do not have to be
multiples of the Base Data Rate.
6. H0 Call Support can be enabled for users who need bandwidth to accomplish large file transfers
or video conferencing. This feature is not cost effective for users who generate a smaller
amount of network traffic.
7. Determine any time restrictions for the user. The default is no restrictions. Disable No
Restrictions in order to configure time restrictions.
Note: If No Restrictions is disabled, you must configure the non-zero values for each
restriction parameter for a specific call direction before the user is allowed to connect.
8. Click Update to write the new information for the user to the database, or click Add to create the
newly configured user.
Note: If you are adding a new user to the database, a User Name must be defined on the
Address tab.
9. Click Close.
ACCESS
SFVRA Connection Manager performs device level security. Device level security is an
authentication process between internetworking devices, in which authentication takes place
automatically. Both bridges and routers support this form of security. An offnode authentication
server can perform User level security as an optional feature. Configure device level security for
each remote device. Group assignments and other features such as call back and compression are
configured in this section.
AUTHENTICATION
DEVICE LEVEL AUTHENTICATION ON SFVRA-CONN
When a remote device calls a CyberSWITCH, the CyberSWITCH accepts the call. The
authentication process begins by the user sending its authentication data to the CyberSWITCH. The
CyberSWITCH passes this information on to SFVRA Connection Manager in an Authentication
Request message. The SFVRA-CONN validates the information against its database, and sends an
Authentication Reply to the CyberSWITCH indicating whether the user is valid or not. If the
remote device is a valid user, the CyberSWITCH will negotiate connection parameters, such as the