Hewlett-Packard A5799A
Terminal Server Reference
Edition 1
HyperPlex
Datacenter Solutions
Manufacturing Part Number: A5547-90003
E0499
United States
© Copyright 1999 Hewlett-Packard Company. All rights reserved.
Download from Www.Somanuals.com. All Manuals Search And Download.
Table of Contents
PREFACE .................................................................................... VII
Overview...............................................................................................vii
In This Book ..........................................................................................ix
1. OVERVIEW OF FEATURES .....................................................1
What This Chapter Contains .................................................................1
Hardware Configuration ........................................................................2
Software Configuration – VER Command ............................................2
Displaying Menus and Issuing Commands..........................................3
Editing Modes.........................................................................................6
Using the Editing Keys ..........................................................................8
Functionality Overview ..........................................................................8
Security Management ..........................................................................10
Network Capabilities............................................................................10
Alarm Management ..............................................................................11
Data Buffering ......................................................................................13
2. THE USER DATABASE..........................................................15
What This Chapter Contains ...............................................................15
Overview...............................................................................................16
Displaying the User Maintenance Functions Menu ...........................17
Adding a User – AU Command............................................................19
Listing Users – LU Command .............................................................23
iii
Download from Www.Somanuals.com. All Manuals Search And Download.
Deleting a User Profile – XU Command..............................................25
Displaying a User Record – DU Command.........................................27
Changing User Information – CU Command......................................28
3. SYSTEM PARAMETERS........................................................33
What This Chapter Contains ...............................................................33
Systems Functions Menu ....................................................................34
Set System Parameters – SSP Command ..........................................35
Upgrading the Software.......................................................................37
Specify Network Parameters...............................................................37
Setting Network Parameters – SNP Command ..................................38
Network Initialization Parameters .......................................................40
Overview of SNMP Support by Terminal Servers ..............................42
Delivering SNMP Traps........................................................................45
SNMP Manager Parameters.................................................................46
Setting FTP Parameters.......................................................................48
4. FILE BUFFERING...................................................................57
What This Chapter Contains ...............................................................57
File Management Menu........................................................................58
RAMdisk Organization.........................................................................61
Setting the RAMdisk Protection Parameters......................................63
RAMdisk Events...................................................................................65
Buffering Data Received by a Host Port.............................................66
Using FTP to Send Files to an FTP Server .........................................69
Using FTP to Receive Files from Another Device..............................72
iv
Download from Www.Somanuals.com. All Manuals Search And Download.
5. MODEM PORT SETUP...........................................................75
What This Chapter Contains ...............................................................75
Modem Port Parameters......................................................................76
Verifying the Settings ..........................................................................82
6. TROUBLESHOOTING ............................................................83
What this Chapter Contains ................................................................83
Checking the Status of the LEDs ........................................................84
Determining Network Status ...............................................................86
Querying Remote Nodes .....................................................................87
Rebooting the Terminal Server ...........................................................87
Reinitializing the Terminal Server.......................................................88
Working with Configuration Files .......................................................88
CONFIG Command Instructions..........................................................89
DUMPF Command Instructions...........................................................92
Default Port Parameters ......................................................................93
7. ACTION AND EVENT TABLES...........................................95
What this Chapter Contains ................................................................95
Working with Action Tables ................................................................96
Structure of an Action Table ...............................................................96
Planning the Action Table .................................................................100
Action Table Commands ...................................................................105
Internal Alarms and Events ...............................................................115
Action Routines..................................................................................119
8. ACTION AND EVENT ROUTINES.....................................121
v
Download from Www.Somanuals.com. All Manuals Search And Download.
What This Chapter Contains .............................................................121
Internal Events ...................................................................................122
Action Routines..................................................................................135
GLOSSARY OF COMMAND REFERENCES.............................149
GLOSSARY OF COMMAND REFERENCES.............................149
INDEX..........................................................................................153
vi
Download from Www.Somanuals.com. All Manuals Search And Download.
PREFACE
Overview
The Hewlett-Packard Terminal Server is a muliplexer device that
enables console access to multiple datacenter servers through a single
web browser interface. It is one of the components of the Central Web
Console (CWC) Kit. The Central Web Console is a systems
management tool for the HP 9000 family of Enterprise Servers. The
Terminal server allows Telnet communication to 28-host console ports
through RS-232 connections. The Terminal server connects to a
Windows NT Server through an Ethernet link.
The Hewlett-Packard Terminal Server Reference describes the features
of the and provides a reference of user commands for system
administrators. The terminal server is pre-configured for use with the
Central Web Console. This manual introduces many of its features and
functions; use of this component beyond the scope of this manual and
the HP Central Web Console Administrator’s Guide is not
recommended.
This manual should be used in conjunction with the HP Central Web
Console Administrator Guide and the HP Central Web Console
Installation Guide.
A glossary of common terms can be found in the HP Central Web
Console Administrator’s Guide.
Audience
The HP Terminal Server Reference is designed as an aid during setup,
troubleshooting, and terminal server maintenance for site system
vii
Download from Www.Somanuals.com. All Manuals Search And Download.
administrators.
Conventions
You will find the following terms and notation used throughout this
manual.
Terms
Authentication method – A security function that verifies the user,
attempting to access the terminal server, is authorized. The terminal
server uses a Password/Callback authentication method. An internal
database stores information about each authorized user. See Chapter 2
for further information about adding, deleting, or modifying user
information.
Master user – Identifies a user with highest level of privileges. A master
user may add and delete other users, including other users with master
level privileges.
System prompt – The system prompt includes the site name followed by
the “greater than” symbol ( > ). Terminal server commands are typed at
this prompt.
SYSOP session – Identifies a communication session between a
terminal server and the CWC server through either a Telnet, dial-up, or
an AUX port connection.
Direct connection – Identifies a communication session between a
terminal server and a Telnet capable device, a dial-up connection, or an
AUX port connection.
Notation Used in this Manual
Prompts appearing on the screen are typed in italics. Data entered at
prompts are typed in bold.
viii
Download from Www.Somanuals.com. All Manuals Search And Download.
In This Book
This book consists of the following chapters:
Introduction
Chapter 1, Overview of Features - An overview of the terminal server
features and operation.
Chapter 2, The User Database - Explains how to add, delete and
change information in the user database.
Chapter 3. System Parameters - Includes instructions on how to set up
the network parameters, such as the IP and Ethernet addresses.
Chapter 4, File Buffering - Describes how the terminal server stores
data from host ports and how to manage and retrieve data buffers and
files.
Chapter 5, Modem Port Setup - Explains how to configure a terminal
server modem port. All parameters to set up modem ports are
described.
Chapter 6, Troubleshooting - Explains how to reset all unit parameters
to factory defaults and manually configure the system using a saved
configuration file.
Chapter 7, Action and Event Tables - Explains how the terminal server
manages alarms. This chapter also explains how to create, modify, and
test Action Tables.
Chapter 8, Action and Event Routines - Describes each internal event
and standard action routine. Examples are also included.
ix
Download from Www.Somanuals.com. All Manuals Search And Download.
x
Download from Www.Somanuals.com. All Manuals Search And Download.
1. OVERVIEW OF FEATURES
What This Chapter Contains
This chapter provides an overview of the features and functions of the
terminal server.
•
•
•
•
•
Hardware Configuration
Software Configuration
How to Display Menus and Issue Commands
Editing Modes
Functionality Overview
1
Download from Www.Somanuals.com. All Manuals Search And Download.
Hardware Configuration
The terminal server is pre-configured for use with the Central Web
Console. Many of the features and functions included with the terminal
server are not supported for use with this environment. Use of the
terminal server beyond the scope of this manual and the HP Central
Web Console Administrator Guide is not recommended.
The hardware configuration consists of the following:
•
•
Two expansion boards providing 28 host-console ports.
Two Auxiliary (AUX) ports for initialization and direct communication
with the terminal server.
•
•
•
One PCMCIA modem.
48V-battery sensor (not used in this environment).
50-pin connector reserved for future use.
Software Configuration – VER Command
The VER command can be issued to display configuration information.
Issue the VER command at the system prompt. An example of the type
of information displayed by the VER command is shown below.
2
Download from Www.Somanuals.com. All Manuals Search And Download.
Displaying Menus and Issuing Commands
Commands are organized into command group menus. Each menu lists
the commands and the corresponding command mnemonics. If you
already know the command you wish to use, you may enter the
command mnemonic at the system prompt. If you are uncertain of the
command, you may display the menu by entering the letter assigned to
that menu. If only [Enter] is pressed, the current menu is re-displayed.
To go from one menu to another, enter the command letter assigned to
that group at the system prompt. The menu mnemonics, names, and
descriptions are listed below:
Command Menu
Description
U
S
User Maintenance
Functions
Displays list of commands to
modify the user database.
System Functions
Displays list of commands to
specify site and scheduling
3
Download from Www.Somanuals.com. All Manuals Search And Download.
Command Menu
Description
information.
A
Action and Alarm
Functions
Displays list of commands to
view and modify the Action
Table.
L
F
Log Functions
File Maintenance
Displays list of commands to
view and modify logs.
Displays list of commands to
configure file buffering and
management.
P
X
Port and Session
Control Functions
Displays list of commands to
view port status, port signals,
host sessions, and to display
and modify network
parameters.
User Commands
Displays list of custom
commands added as part of
the device configuration. If X
returns one of the menus listed
above, the terminal server
does not contain custom
commands.
NOTE: All commands may be entered at the system prompt. The
menu does not have to be displayed first. The access class of each
user determines the commands displayed.
4
Download from Www.Somanuals.com. All Manuals Search And Download.
Entering/Selecting Parameters
Parameters are entered or changed by either typing them in or by
selecting them from a list of options. The method depends on the
command.
For example, at the system prompt type DH (Display Host) and press
ENTER. The unit will respond with a message of ‘--- Display Host Port
Params ---‘ and then a list of host ports to select. Type in the number of
the Host port whose parameters you wish to view, press ENTER. The
user may view these parameters in one step by typing DH x (where x is
the Host Port number) and pressing return. The parameters for the
selected Host Port will be displayed.
In some cases, the terminal server system provides you with several
options. If the option displayed is not appropriate, scroll through the list
by pressing the space bar. When the selection you want appears in the
field, press the Enter key to select that item.
In the Set Date and Time (SDT) command, there are 10 different date
codes available. Type SDT at the system prompt and the current date
format will be displayed. Press the space bar and another format will be
displayed, there are ten date format options. Once the desired format is
displayed, press ENTER to accept the format. The display is now
today’s date shown in the format just entered. Press the ENTER again
to display the current time. Pressing ENTER again returns the system
prompt (>).
Some commands require that certain parameters be specified. For
example, when you type SSP the Set System Parameters screen is
displayed. The example below shows the parameters for Site
Information (Option 1).
5
Download from Www.Somanuals.com. All Manuals Search And Download.
Some commands allow you to include additional modifiers that make the
command specific. For example, to list only action items beginning with
the character .H, type:
LA .H (or la .h)
and press the Enter key. The List Action Items screen will be displayed,
but only the action items starting with .H are included.
Editing Modes
The terminal server supports editing in TTY and VT-100 modes. VT-100
mode displays all required information and then allows you to move up,
down and across the screen to edit lines. In TTY mode, the lines are
displayed one line at a time and must be edited left to right. TTY mode
is the default mode for all access ports on the terminal server.
Use the SYSOP command VT ON to select VT-100 as the terminal
mode during the current SYSOP sessions, regardless of the connection
(AUX, Telnet or Modem). Typing VT OFF during the current SYSOP will
turn the session back to TTY.
6
Download from Www.Somanuals.com. All Manuals Search And Download.
The user may change the default port editing setting (TTY) for access
ports on the terminal server. To change the parameters for the AUX
port, Telnet port(s), or Modem port(s), issue the SA, ST, or SM
commands for each port respectively, and change the “Terminal
Emulation” parameter by toggling from TTY to VT-100.
NOTE: Your terminal must support VT-100 mode. If you issue the
VT ON command, and your terminal does not support this mode,
unpredictable results, such as the appearance of extraneous
characters, may occur. If you have a VT-100 terminal (or your
computer is emulating a VT-100 terminal) but you have the
parameter VT100 On/Off set to Off, TTY mode is used and the
configuration screens are displayed one line at a time.
TTY Mode
Information is displayed one line at a time for editing. After the Enter key
is pressed the next line is displayed for editing. In this mode it is
impossible to return to "entered" lines to modify them.
VT-100 Mode
If you have a VT-100 terminal (or your computer is emulating a VT-100
terminal) you can execute SYSOP commands in VT-100 mode. In this
mode all of the prompts will be displayed on the screen at once along
with the data to be edited. The cursor will initially appear at the
beginning of the first field.
At this point the arrow keys can be used to move from line to line
performing edits in any order. Pressing the Enter key with the cursor on
the last line of the display completes the function.
7
Download from Www.Somanuals.com. All Manuals Search And Download.
Using the Editing Keys
Most SYSOP commands display a series of prompts to allow entry of
parameters specific to that command. Default or previously entered
information is displayed and can be edited using the techniques
described here.
If your terminal emulation program has an option to set Destructive
Backspace or Non-Destructive Backspace, choose the latter.
The following editing keys can be used whenever a field is presented for
modification.
Editing Function
Keys
Move cursor to the right
[CTRL] R
Move Cursor to the Left
[CTRL] L
Delete the character at the cursor
[CTRL] D
Toggle overstrike on or off (default is off)
Delete text to the End of Line (EOL)
[CTRL] O
[CTRL] X
Move the cursor to the beginning of the line
Move the cursor to the end of the line
Backspace and delete
[CTRL] B
[CTRL] E
[← ] (Backspace key)
[CTRL] Z
Restart field (clears all new data and returns previous data)
Abort (ends edit and does not change any pre-existing data)
Complete a line and go to next line
[CTRL] A
[↵ ] (Enter key)
Space bar
Toggle choices (an example of a toggle choice is Yes or No)
Functionality Overview
The terminal server provides several basic functions: security, site
connectivity, alarm processing, and data buffering.
8
Download from Www.Somanuals.com. All Manuals Search And Download.
Function
Security
Description
The terminal server, as a front end, provides
secured access to host devices. , All users
connecting to the terminal server through the
network, modem, or the AUX Port need to
authenticate before being passed through to
a host device or permitted to administer the
terminal server. The terminal server also
provides a logical switching function that
allows an authorized user to connect to any
host device listed in the user’s profile.
Site Connectivity
Alarm Processing
The terminal server acts as a central point for
connection to all hosts and other serial
devices at a site. It enables connections
through a local terminal, dial-up modem, and
Ethernet. A dial-up modem also provides a
PPP connection, allowing remote access to
networked devices.
When attached to a maintenance port, the
terminal server can process alarm messages
and other ASCII based data streams. Alarm
messages can be delivered via a modem or
network connection. Using either PPP or
network connectivity, the terminal server can
deliver SNMP traps to network managers.
The terminal server can convert ASCII-based
alarms received on its host ports to standard
SNMP traps. Acting as a SNMP trap proxy
agent, the terminal server allows legacy
equipment to be managed and provides
alarm-reporting functions.
Data Buffering
The terminal server can buffer all data
transmitted to a host port by the attached
9
Download from Www.Somanuals.com. All Manuals Search And Download.
Function
Description
device. Data is collected on a RAMdisk as
either buffered data or files. Error messages,
buffered console output, traffic data and other
information can be subsequently delivered to
a central location through a dial-up or network
connection.
Security Management
The terminal server maintains a database of authorized users. Only
users listed in the database who successfully authenticate are allowed
access. Supported authentication methods include the following
password-oriented methods: Password, Callback and Variable Callback.
The terminal server is configured for use with the following token
methods, but the current version of the Central Web Console does not
support their use: PassKey, and Pager.
The terminal server supports five access classes. Only a system
administrator, logged into a SYSOP session as Master, can modify user
profiles or the user database. The access class determines which ports
can be addressed and what information can be viewed or modified
within the terminal server.
Network Capabilities
The terminal server has both an Ethernet and a PPP TCP/IP network
connection. Network connections support Telnet—to the terminal server
and to attached hosts, FTP—for buffer and file delivery, and SNMP—for
TRAP delivery to network management stations. In addition, the terminal
server routes traffic between its network interfaces, allowing it to act as
a secure, remote-access server for maintenance applications.
10
Download from Www.Somanuals.com. All Manuals Search And Download.
Alarm Management
Alarms and events originate from a number of sources: data received on
a serial port, Timer events, as well as other activities internal to the
terminal server.
When the terminal server processes an alarm or event, it checks the
Action Table to determine if it is listed. If the alarm matches one listed in
the Action Table, the event is placed in the Event Table for processing
and listed in the System Log for reference. To process the event, the
terminal server performs the associated Action Routine, which performs
a task associated with the alarm.
Usually the event is processed right away, and the appropriate action is
taken (for example, delivering the alarm through a dial-up connection). If
the event can not be acted upon immediately, it remains in the Event
Table until the required time has elapsed, or the necessary resources
become available (for example, the modem becomes free).
Action Routines are scripted functions that can perform a wide range of
tasks associated with particular or general alarms. Certain Action
Routines are included with the system, while others can be created and
loaded into the terminal server in order to customize the alarm
processing mechanisms and interface. Action Routines can be used to
deliver alarms, take action on a host port, provide additional alarm
filtering, or collect information on which subsequent alarms will be
based. Action Routines can also create new alarms (called Pseudo
Alarms) which allow the process to feed back on it.
11
Download from Www.Somanuals.com. All Manuals Search And Download.
Event Generators
Pseudo Event
Internal Event
Host Port
Action Table "LA" to view
ERR000
ERR001 PAGE
555-1212
.DAILY DOLIST
.MIDNITE PHSYSOP
.MIDNITE
Environmental
Manager
.MIDNITE.1 SCHEDULE AM PHONHOME
. . .
. . .
Event Table
"LE" to view
System Log
"LH" to view
ERR001 000 111 222 333 System
PHONHOME (ASAP)
03/01/1994 12:00:10 DOLIST:
03/01/1994 02:10:33 Call
03/01/1994 06:22:21 Event:
. . .
. . .
.DAILY
PHONHOME
. . .
Logs
The terminal server maintains logs containing details of alarms,
accesses, host port activity, and system information. These logs are
useful for site management, security management, and troubleshooting.
The terminal server maintains all logs even without system power. A
description of each log type follows:
Access History - The terminal server records each successful access.
The time, date, user ID, duration of session and type of session are
included in each record.
Failure History - The Failure History Log records failed access
attempts. The log includes the date, time, user ID, the port accessed
and the reason for failure.
12
Download from Www.Somanuals.com. All Manuals Search And Download.
Log History - This log records the activity of the terminal server and the
devices to which it is connected. Activities include modem connections,
received calls, SYSOP sessions, and detected alarms and events.
Error Log - The Error Log contains information regarding errors in
System or User written routines.
Data Buffering
Each host port of the terminal server receives data from the resource to
which it is connected. This data may be buffered, or collected in a file,
which is temporarily stored on the terminal server RAMdisk. The
RAMdisk reserves up to 1MB per port. The file may be sent to the
administration PC for later review or importation into another software
package.
The terminal server offers the option of automatic or manual data
buffering from a host port. If automatic buffering is enabled, the system
will switch buffer files according to preset parameters. If automatic
buffering is not enabled, the administrator must open and switch buffer
files manually. Buffer files are stored on the RAMdisk in the
subdirectory of the particular host port. The buffer files can be managed
using commands that are similar to DOS commands. These commands
are listed in the File Management Menu.
13
Download from Www.Somanuals.com. All Manuals Search And Download.
14
Download from Www.Somanuals.com. All Manuals Search And Download.
2. THE USER DATABASE
What This Chapter Contains
The system administrator must create the user database once the
terminal server is installed and all required ports initialized. The Central
Web Console application requires a minimum of three user-access
records: a Master user, a buffer manager, and a joint session manager.
This chapter explains how to create and manage the user database.
The terminal server maintains a database of authorized users . Each
user who accesses the terminal server or a host(s) through a secured
web connection, a dial-up port or network connection must have a user
record in the database. By limiting access through each of the ports,
the terminal server provides access security to both the terminal server
and protected host devices.
The user database resides on the RAMdisk and contains detailed
information about each user: such as user name, access class, and
authentication method. The user database can hold information for 90-
plus users.
•
•
User Maintenance Functions Menu
How to Add, Delete and Change Information in the User
Database
•
Description of Access Level and Authentication Methods
15
Download from Www.Somanuals.com. All Manuals Search And Download.
Overview
This chapter covers functions related to adding, modifying and deleting
users from the database.
The database will be destroyed if the terminal server encounters a
failure. Save the latest version of the database to an FTP directory; this
helps you recreate a current database in the case of a failure.
Each record in the database contains the following information about the
user:
User Name (ID)
Access Class
Whether user access is blocked
User Access Expiration Date
Number of sessions allowed
Primary and Secondary Authentication Methods
Auto Execute Command
Comments
Access Classes
Each user is assigned an access class that determines his/her access
and administrative privileges. Users assigned the access class “Host”
can only access host ports and have no administrative privileges on the
terminal server. Sysop and Master users can administer the terminal
server in addition to accessing the host ports.
NOTE: Only a user with Master access privileges can add, delete or
modify user profiles in the database.
Master – Master access permits the user to change all information in
the terminal server. The Master user controls when and how alarms are
reported, add and delete users from the user database, change user
16
Download from Www.Somanuals.com. All Manuals Search And Download.
profiles, modify Action and Event tables, manage data buffering and
access all hosts. The Master class is the highest level of access.
Sysop 3 – A Sysop 3 user can perform all functions listed above with
the exception of modifying the user database. A Sysop 3 user can
access all host ports and has access to the file commands used to
manage data buffering, can make changes in how the terminal server
responds to alarms, and change the port configuration of the unit.
Sysop 2 – A Sysop 2 user can view all alarm and event information, and
manipulate pending alarms. The Sysop 2 user cannot change the way
the terminal server responds to alarms. The Sysop 2 user can access all
host ports.
Sysop 1 – A Sysop 1 user can view pending alarms, but cannot create
or save changes. Data buffering commands are not available to the
Sysop 1 user. The Sysop 1 user can access all host ports.
Host 1 to Host n – The host user only has access to a single host
device. The host user cannot access any of the terminal server
functions.
Displaying the User Maintenance Functions Menu
The User Maintenance Functions Menu displays all commands
associated with adding, deleting and changing information in the user
database.
To display the User Maintenance Functions Menu, type U at the system
prompt and press Enter. All commands associated with maintaining the
user database are shown on this menu.
17
Download from Www.Somanuals.com. All Manuals Search And Download.
Command Summary
This database contains the records for authorized users of the terminal
server system.
The following table lists commands to administer the user database. The
table includes a brief description of each command and lists the access
level that a user must have to successfully issue the command.
Function
Description
Access Class
Required
AU – Add User
Adds a user profile to the database.
Master
Master
CU – Change User
Changes the information associated with a
user who has already been entered into the
system using the Add User command.
DU – Display User
Record
Displays entire record for the user selected. Sysop 2, Sysop
3, Master
LU – List Users
Displays list of all users in the database.
Sysop 2, Sysop
3, Master
18
Download from Www.Somanuals.com. All Manuals Search And Download.
Function
Description
Access Class
Required
XU – Delete User
Deletes a user and removes all records
associated with that user from the terminal
server database.
Master
Adding a User – AU Command
The AU command allows you to add a user to the terminal server
system. To access the system, a password is required. The first user
entered into the database should have an access level of master. A
master level user can access all the features of the terminal server and
can add and delete users from the user database.
To add a user, type AU at the system prompt and press Enter. The Add
User information screen is displayed. You may also type the user name
as part of the command.
For example:
AU Carol
or AU
then Carol at the User Name prompt
19
Download from Www.Somanuals.com. All Manuals Search And Download.
Field
Function
Enter a user name. User names may be up to 15
alphanumeric characters in length, including
spaces.
User Name
NOTE: The terminal server converts
alphabetical characters to upper case.
To select the Access Class, press the space bar
Access Class
until the desired choice is displayed.
NOTE: The first user entered should be a
master level user. A master user should be
maintained in all systems at all times.
Block Access
Initially No (the default) appears on the screen.
Press the space bar to toggle to Yes. No enables
access to the terminal server. Yes blocks access to
the terminal server.
Sessions Allowed
Press the Enter key to allow unlimited sessions.
Enter a number from 1 to 999 and press Enter to
limit the number of successful sessions allowed for
that user.
User Expiration
Date
Enter the date in month/day/year to set the end of
the user's access period. No date signifies the user
has an unlimited access period.
Primary
Authentication
Method
Press the space bar until Password/Callback
displayed.
NOTE: The Pager and PassKey options are not
supported with this version of the Central Web
Console.
20
Download from Www.Somanuals.com. All Manuals Search And Download.
Field
Function
Secondary
Authentication
Method
(Optional) Select a second means of authentication
for a user. Press the space bar until the desired
choice is displayed.
Auto Execute
Command
(Optional) Enter a command that's executed
automatically after user authentication.
For example, if you enter LH - the log history will be
displayed in reverse order after the user
authenticates.
This option is available only to users who sign on as
a Sysop 1 level or higher.
Comments
Enter up to 40 alphanumeric characters on the
Comments line. After you have entered comments
in the Comments field, press Enter.
After pressing Enter, you will be prompted for more information about
the authentication method that you selected.
21
Download from Www.Somanuals.com. All Manuals Search And Download.
Password/Callback Authentication Method
If Password/Callback was selected as the primary authentication
method, the terminal server will display the following information.
Field
Function
Enter a password
The password may be up to 15 alphanumeric
characters. Asterisks appear on the screen as
you type to prevent your password being
displayed on the screen. Press Enter.
NOTE:Passwords are case sensitive.
Verify password
Access Options
Retype the password exactly as you entered it the
first time, and then press Enter.
Press the space bar until the desired choice is
displayed. Three options are available: Regular
Callback, Passthru and Variable Callback. Each
option is discussed in subsequent paragraphs.
Access Option: Regular Callback
Regular Callback requires the user to have a specific phone number
listed in the terminal server user database, in addition to the password.
The user calls the terminal server and enters their user name and
password. After receiving the information the terminal server terminates
the call and dials the caller back using the number in its database for
that user. The user is requested to re-enter their password. After the
password is authenticated, the user is allowed access.
22
Download from Www.Somanuals.com. All Manuals Search And Download.
If Regular Callback is selected, you are prompted to enter a phone
number.
NOTE: Enter the phone number as the system needs to dial it.
For example, if you have to dial 9 to get an outside line, or if the
number is in a different area code and you need to dial a 1 first,
enter those numbers as well. Dialing instructions common to all
users (such as dialing 9 to get an outside line) should be changed
in the modem dial string using the Set Modem (SM) command.
Access Option: Passthru
Passthru only requires the user to enter a user name and the correct
password.
Access Option: Variable Callback
Variable Callback requires a user name and corresponding password.
After dialing in to the terminal server and entering the correct user name
and password, the user enters a phone number for the terminal server
to call back. The terminal server disconnects and the user hangs up.
The terminal server then calls the user back at the phone number
provided.
When the access option you desire appears on the screen, press the
Enter key to make your selection.
Listing Users – LU Command
Type LU at the system prompt, and press the Enter Key to display the
list of users authorized to initiate a Sysop or Host session with the
terminal server. The following information is displayed for each user:
User name
Access class [Acc. Class]
Whether user access is specifically blocked [Blk?]
23
Download from Www.Somanuals.com. All Manuals Search And Download.
Expiration date [Exp. Date]
Number of sessions allowed [# Ses. Exp? ]
Primary authentication method [Auth. Mode(s)]
Secondary authentication method [Auth. Mode(s)]
You cannot change information by using the LU command. To change
information, use Change User command.
Field
Function
User Name
List of all users authorized to access the terminal
server, or other device connected to the terminal
server.
Acc. Class
Blk?
The Access Class defined for that user. For a
description of the access classes, see "Adding a
User."
This column shows whether a user’s access is
24
Download from Www.Somanuals.com. All Manuals Search And Download.
Field
Function
blocked. “No” means that access is permitted.
“Yes” means that access for that user is blocked.
Exp Date
If a date appears in this field, the user will not be
allowed access to the terminal server after this date.
# Ses. Exp?
If a number appears in this field, the user will not be
allowed access to the terminal server system after he
or she has successfully accessed the system the
number of times displayed.
This field is blank if the user’s expiration date or
number of sessions allowed has not been exceeded.
A Yes appears in this field if the expiration date has
past or the number of successful sessions has been
exceeded.
The primary and secondary (if used) methods of
authentication for the user are displayed in this
column. Password/Callback is the only authentication
method supported for this version of the Central Web
Console
Auth. Mode(s)
For a description of the authentication methods, see
"Adding a User" at the beginning of this chapter.
Deleting a User Profile – XU Command
The Delete User command deletes all records associated with that user
from the terminal server database. After a user profile has been
deleted, the user cannot access the terminal server. To reinstate
access privileges, a user profile must be added to the database, see
"Adding a User."
Type XU at the system prompt and press the Enter key to display the
Delete User information screen.
25
Download from Www.Somanuals.com. All Manuals Search And Download.
Type in the user name as it appears in the List User display and press
the Enter key. You may also type the user name as part of the
command.
For example:
>XU or
>XU Carol
In either case the Delete User information screen will appear after you
enter a user name and press the Enter key.
The prompt Delete Record? appears at the bottom of the screen
requiring you to confirm that you want to delete that user. Initially No
appears on the screen. To delete the user, toggle the field to Yes by
pressing the space bar and then press the Enter key.
NOTE: To temporarily remove a user from the database, use the
block access option in the user profiles. The user will not be
allowed access, but all his/her access information will be
maintained.
26
Download from Www.Somanuals.com. All Manuals Search And Download.
Displaying a User Record – DU Command
The Display User Record command displays the entire record for the
user selected. The Display User Record command accepts the user
name as a parameter on the command line. If the command is entered
without a user name, the system will prompt you to enter one.
Type DU at the system prompt and press the Enter key to display the
Display User Record information screen.
Field
Function
User Name
Enter the user name as it appears in the List
User display, and then press the Enter key.
You may also type the user name as part of
the command.
For example:
>DU or
>DU CHRIS
27
Download from Www.Somanuals.com. All Manuals Search And Download.
The User Record information screen for that
user will be displayed.
The Acc: field displays the number of times the user has accessed the
system. The Fail: field displays the number of failed access attempts.
Dur: and Type: displays the length of time of the last session and the
session type, respectively.
For a description of the fields in the Display User Record Screen, refer
to "Adding a User".
Changing User Information – CU Command
The Change User command allows you to change the information of an
authorized user in the user database.
Type the user name and press the Enter key to display the current
information for that user, line-by-line. At each line, you may change the
parameter. In some cases, options are displayed by using the space bar
and then selected by pressing the Enter key. In other cases, you must
enter an appropriate value. To advance to the next line without changing
the parameter, press the Enter key.
Each time you change the primary or secondary authentication method,
you will need to enter required information for the selected method. For
complete information on each parameter, refer to "Adding a User."
NOTE: If you abort the Change User process, the user profile will
be deleted.
28
Download from Www.Somanuals.com. All Manuals Search And Download.
Field
Function
User Name
Enter the user name as it appears in the List User
display. You may also type the user name as part of
the command.
For example:
>CU or
>CU TOM
Access Class
To change the Access Class, press the space bar
until the desired choice is displayed.
29
Download from Www.Somanuals.com. All Manuals Search And Download.
Field
Function
When the appropriate selection is displayed, press
the Enter key. If you do not wish to change this
parameter, press the Enter key to move the cursor
to the next field.
Block Access
Initially No (the default) appears on the screen.
Press the space bar to toggle to Yes. No enables
access to the terminal server. Yes blocks access to
the terminal server.
Sessions Allowed
Press the Enter key to allow unlimited sessions.
Enter a number from 1 to 999 and press Enter to
limit the number of successful sessions allowed for
that user.
User Expiration
Date
Enter the date in month/day/year to set the end of
the user's access period. No date signifies the user
has an unlimited access period.
Primary
Authentication
Method
Press the space bar until Password/Callback is
displayed.
NOTE:
The Pager and PassKey options are not
supported with this version of the Central Web
Console.
Secondary
Authentication
Method
(Optional) Select a second means of authentication
for a user. Press the space bar until the desired
choice is displayed.
Auto Execute
Command
(Optional) Enter a command that's executed
automatically after user authentication.
30
Download from Www.Somanuals.com. All Manuals Search And Download.
Field
Function
For example, if you enter LH - the log history will be
displayed in reverse order after the user
authenticates.
This option is available only to users who sign on as
a Sysop 1 level or higher.
Comments
Enter up to 40 alphanumeric characters on the
Comments line. After you have entered comments
in the Comments field, press Enter.
After pressing Enter, you will be prompted for more information about
the authentication method that you selected. For complete information
on each of the authentication methods, refer to "Adding a User."
NOTE: If you do not wish to change this parameter, press the Enter
key to move the cursor to the next field.
31
Download from Www.Somanuals.com. All Manuals Search And Download.
32
Download from Www.Somanuals.com. All Manuals Search And Download.
3. SYSTEM PARAMETERS
What This Chapter Contains
The terminal server menus provide commands for setting and displaying
system parameters. The System Parameters are used primarily for
information purposes. For example, the site name, IP address, and the
phone number of the unit are specified by these parameters. The FTP
and network parameters must also be set before the Central Web
Console can communicate with all system components.
•
•
•
•
•
Overview
Site Information Parameters
Software Upgrade Information
Network Parameters
FTP Parameters
33
Download from Www.Somanuals.com. All Manuals Search And Download.
Systems Functions Menu
Type S at the system prompt and press the Enter key to display the
System Functions Menu.
The System Parameters Functions menu has three functional groups:
System Parameters Functions, Environmental Control Functions and
Upgrade Central Web Console software.
System Parameters Functions
The commands in this functional group enable you to set and
display system parameters including the host processing flag and
the date and time of the terminal server.
Environmental Control Functions
These functions are not supported in this version of the Central
Web Console.
34
Download from Www.Somanuals.com. All Manuals Search And Download.
Upgrade Terminal Server Software
The terminal server software, CCL interpreter and the flash
memory of the terminal server may be upgraded.
Set System Parameters – SSP Command
The Set System Parameters command enables you to set site
information, scheduling parameters and default telephone numbers.
Type SSP to select which parameter group you want to be displayed.
The following screen appears. This chapter only covers the Site
Information parameters.
Site information
Type 1 to set Site Information. Site information includes site name,
terminal server phone number and the host password. The system
prompt displays the site name.
35
Download from Www.Somanuals.com. All Manuals Search And Download.
When the terminal server pages or phones in response to a particular
alarm or event, it sends its site name and unit phone number along with
the error message and other information that enables the receiver to
contact the correct terminal server.
Field
Function
Site Name
Descriptive name of the terminal server
(USN = Unit Ser. Number) location. When information is sent to
another device, the site name is included
automatically. The site name is displayed at
the prompt. The site name may have a
maximum of 30 alphanumeric characters.
Only the first 15 characters appear at the
prompt. The default site name is the unit’s
serial number. If you have more than one
terminal server at a site, using the serial
number as the site name is useful.
If a site name is not entered, only the
command prompt is displayed.
Unit Phone Number
Enter the phone number of the terminal
36
Download from Www.Somanuals.com. All Manuals Search And Download.
server. This number is sent by the
PHONHOME Action Routine.
Host Password for login
routine
Enter the password for the host system for
automatic login. The password may have a
maximum of 16 alphanumeric characters.
Number of Expansion Ports The terminal server has been configured to
Reassigned to Modems
use all expansion ports as host console
ports.
Upgrading the Software
Your Hewlett-Packard service representative notifies you when an
internal software upgrade is necessary. Installation instructions are
dependent on the type of upgrade required.
Specify Network Parameters
Communication with the terminal server occurs across a TCP/IP
network through either an Ethernet connection or a PPP link.
An Ethernet connection physically connects the terminal server to the
network. PPP (point-to-point protocol) allows a network connection to a
remote device via a modem connection. After a PPP link has been
established you can perform network functions, such as Telnet or FTP,
to the terminal server or to specific serial devices on the network. To
establish a PPP link or to initiate a Telnet session, you must have the
appropriate commercial software package installed and setup on the
remote PC. Connection to the network provides for the following
services:
• Ping
• Telnet communication
37
Download from Www.Somanuals.com. All Manuals Search And Download.
•
•
•
Network access to the terminal server for unit
administration
Network access to the devices connected to the host
ports
Network access to other devices on the network,
using the terminal server as a RAS
• SNMP trap delivery
•
Delivery of SNMP traps for errors detected in the
terminal server
•
Delivery of SNMP traps for alarms conditions
detected in the devices connected to the host ports
• FTP file delivery (Client)
•
Delivery of buffer files from the terminal server to a
network file server
Setting Network Parameters – SNP Command
If the terminal server is part of a network, it is necessary to set the
Network Initialization Parameters prior to starting the network module of
the terminal server. Changes made to the Network Initialization
Parameters will only take effect if the network has not yet been started,
or by restarting the terminal server. You can restart the terminal server
by either using the key switch on the front panel to power-cycle the unit
(off then back on – a ‘hard’ boot) or by issuing the BOOT command from
the command prompt to perform a ‘soft’ boot.
Each device on a network must have a unique Ethernet and IP address.
The Ethernet address of each terminal server is calculated by using a
registered OUI and the terminal server’s serial number. This ensures
that all terminal servers on the same network will have different Ethernet
addresses.
Before connecting the terminal server to your network, contact your
network administrator and obtain the following information:
38
Download from Www.Somanuals.com. All Manuals Search And Download.
• IP address to be assigned to the terminal server
• IP address to be used for PPP connections
• Subnet mask for the network segment to which the terminal
server will be connected
• IP address of the default gateway to be used by the terminal
server
The terminal server allows a user to establish a PPP connection to the
internal modem. This connection allows a Telnet session to either the
terminal server or another device on the network attached to the
terminal server. In the latter case the terminal server acts as a dial-up
security server.
When a remote user attempts to access other network devices via a
PPP session, those devices must know how to direct their responses
back to the user. The simplest way to accomplish this is with a router
that supports RIP, the standard Router Information Protocol. The
strategy is to make the devices on the network direct their responses to
the router, and then have the router forward the data to the terminal
server. To do this, ensure that a RIP-enabled router is on the network,
and configure the other devices to use it as their default gateway. The
terminal server will automatically use RIP to tell the router how to
forward data addressed to the remote user when a PPP link is
established.
NOTE: The network number (the first set of numbers) for the PPP
connection in the terminal server should be different than the
network number used for the network IP address. If the network
address of the terminal server is 193.1.1.1 then the PPP address
should not begin with 193.
To set network parameters, type SNP at the system prompt and press
the Enter key. Each prompt is explained in subsequent paragraphs.
39
Download from Www.Somanuals.com. All Manuals Search And Download.
Network Initialization Parameters
The Network Initialization Parameters are set using the SNP 1
command:
40
Download from Www.Somanuals.com. All Manuals Search And Download.
Field
Function
Restore Factory Defaults?
Initially No appears on the screen. Press
the space bar to toggle to Yes. Select Yes
to reload the values set at the factory.
--Network Initialization
Parameters--Start Network
on Power-up?
Initially No appears on the screen. Press
the space bar to toggle to Yes. Yes will
start the network module on unit power-up
using the parameters defined with the SNP
command.
IP Address
(nnn.nnn.nnn.nnn)
Enter the IP address of the terminal
server. Each device on the network must
have its own unique IP address. The IP
address assigned to the terminal server at
the factory may not be appropriate for your
network.
The IP address must be set before the
network module of the terminal server is
started. Once the network has been
started, changes to this parameter will take
effect only after the terminal server is
power-cycled (rebooted).
PPP Address
(nnn.nnn.nnn.nnn)
Enter the PPP address of the terminal
server. This is the IP address that is used
to identify the terminal server over a PPP
link. The network portion of the PPP
address must be different from the IP
address used above.
Subnet Mask
(nnn.nnn.nnn.nnn)
The subnet mask determines which part of
the terminal server's IP address represents
its network number and which part
represents its node number. Obtain an
appropriate value from your network
administrator.
41
Download from Www.Somanuals.com. All Manuals Search And Download.
Field
Function
Default Gateway
(nnn.nnn.nnn.nnn)
The default gateway is the IP address of
the router or other equipment on the local
network segment that is used to direct
traffic to and from the segment. Obtain an
appropriate value from your network
administrator.
Enable RIP?
Initially Yes appears on the screen. Press
the space bar to toggle to No. Yes allows
the terminal server to direct routers on the
local network segment to use it as the
gateway to devices connected to the
terminal server via PPP.
Network-Loss Alarm Delay
Time
Enter a time in seconds, from 0 to 255. If
no network activity is detected for longer
than the specified amount of time, the
terminal server will generate a .NETDOWN
alarm.
Overview of SNMP Support by Terminal Servers
SNMP (Simple Network Management Protocol) is a TCP/IP protocol for
network management. It allows compliant devices to be configured
and/or to send error messages to Network Management software
packages.
The terminal server can send SNMP traps based on alarm conditions
detected in host devices or in the terminal server itself. Any alarm
condition that can be listed in the Action Table can be sent to a
management system via an SNMP Trap. Thus, the terminal server acts
as an SNMP trap proxy agent for devices that deliver alarms via
asynchronous RS-232 communication, via contact closures, or other
non-network mechanisms.
42
Download from Www.Somanuals.com. All Manuals Search And Download.
MIBs
SNMP uses a data structure known as Management Information Base,
or MIB, to store information. Each piece of information, or object, in the
MIB has a unique Object Identifier. Object identifiers are indices based
on a tree structure. The information is held in a “node” at the end of a
“branch” in the tree. The Object Identifier shows the path by listing each
branch needed to reach the node.
The identifier serves to name or reference the object. MIBs for specific
companies are allocated to the MIB branch known as enterprise. Thus,
each company branches from the general branch known as enterprise.
From that point on in the MIB, the company developing the MIB controls
the information and Object Identifier used to reference the data. This
information is required to coordinate the sending and receiving of data
between an SNMP-compliant device and an SNMP-based network
management system.
When both the SNMP Agent and SNMP Management system have the
same MIB structure, data can be easily transferred and used. SNMP
data packets, each containing an object identifier and information
associated with that object, are passed between the device and
management system to populate the appropriate fields in the receiver’s
MIB. Both the Agent and Management System can then reference the
object and process the data as needed.
The terminal server has a general MIB as well as proprietary MIBs for
companies that use the terminal server as an SNMP trap proxy.
The following table shows the basic set-up of a MIB and provides
information about:
•
•
Object Identifiers – The index used to identify the information in the
MIB.
Object Data – The information contained in the referenced data
node.
43
Download from Www.Somanuals.com. All Manuals Search And Download.
•
Object Source – The field in the terminal server where the
information is located.
Object Identifier
Object Data
Object Source
1.3.6.4.1.1476.1.1.1 trapId
Alarm Severity. Placed in the
Action Table Parameter Field.
The value can be from 1 to 10.
1.3.6.4.1.1476.1.1.2 trapSiteDesc
1.3.6.4.1.1476.1.1.3 trapSource
1.3.6.4.1.1476.1.1.4 trapDesc
Site name in System Parameter.
SNMP Agent.
Alarm or error code. This is the
alarm as delivered by the host
device or terminal server
system. It includes all
parameters.
1.3.6.4.1.1476.1.1.5 trapComment
1.3.6.4.1.1476.1.1.6 trapExtraInfo
Comment Field in Action Table.
The date and time of alarm are
also included in this field.
Extra information associated
with this message. Assigned by
custom Action Routine.
1.3.6.4.1.1476.1.1.7 trapExpertData May contain up to 161
characters, and provides
additional data to the technician
that helps in the isolation or
correction of the problem.
An SNMP Management System can be configured to receive and use
SNMP traps sent by the terminal server by using the above information.
44
Download from Www.Somanuals.com. All Manuals Search And Download.
NOTE: Configuration of the SNMP Management System may
require the assistance of your LAN Administrator. Please contact
him/her to determine how to compile the appropriate MIB for your
particular system.
Delivering SNMP Traps
The terminal server can send SNMP traps using one of the following
methods:
•
If the Network Manager is on the same LAN or WAN as the terminal
server, the trap can be sent with the SNMPTRAP Action Routine
using the Ethernet connection.
•
If the Network Manager is not on the same LAN or WAN, the
terminal server can establish a PPP link through a modem and
deliver the SNMP Trap.
SNMP Traps via Ethernet (Network)
Set all required network information using the SNP command. In the
Action Table, place an entry similar to the following:
Alarm
Action Routine
Parameter
Comments
ERR123
SNMPTRAP
1
This is a major alarm
When the ERR123 alarm is detected, an SNMP trap is sent to the
management system(s) identified in the network parameters. All
information contained in the MIB is sent automatically. The parameter
for the SNMPTRAP routines sets the trap level (1-10). This parameter is
the enterprise specific trap ID and depends on the trap format (Nortel or
standard).
SNMP Traps via PPP
To denote that an SNMP trap is to be delivered via a PPP link, set the
appropriate field in the SNP command. When an SNMP trap is to be
45
Download from Www.Somanuals.com. All Manuals Search And Download.
delivered via a dial-up PPP link, the terminal server generates a
.PPPREQ event. Include entries similar to the following in your Action
table:
Alarm
ERR001
.PPPREQ
Action Routine
SNMPTRAP
PHPPP
Parameter
2
5551212
Comments
This is a minor alarm.
Create the PPP link.
The telephone number can be specified directly, or any of the default
telephone numbers specified in the system parameters can be
referenced. PHPPP is not compatible with firewalls or any security
measures on the remote access device.
Setting Terminal Server Parameters for SNMP Traps
The terminal server responds to “alarms” (such as an error condition on
a host) by performing an appropriate user-defined action. A typical
action might be connecting to a remote computer over a modem link
and sending error information from the host to that computer. SNMP
provides a standard way for the terminal server to report alarms to one
or more computers that are connected via network.
SNMP Manager Parameters
You can configure the terminal server to send a message, or “SNMP
trap,” to one or more supervisor computers, which are called SNMP
managers, in response to alarm conditions. These parameters are set
using the SNP 2 command:
46
Download from Www.Somanuals.com. All Manuals Search And Download.
Field
Function
Restore Factory Defaults?
Initially No appears on the screen.
Press the space bar to toggle to Yes.
Select Yes to reload the values set at
the factory.
--SNMP Manager Parameters-- If the terminal server is not connected
PPP link needed for trap?
to the same network as its SNMP
Manager, it can reach the manager
over a modem link by using the
“Point-to-Point Protocol” (PPP).
Initially No appears on the screen.
Press the space bar to toggle to Yes.
Set this option to Yes to establish a
modem link to only one SNMP
manager. Additional steps may be
necessary to configure the dial-out
process. Select No if the trap will be
sent via the network connection.
47
Download from Www.Somanuals.com. All Manuals Search And Download.
Field
Function
Trap format
This option selects one of the active
MIBs to format the SNMP Trap. Two
formats are available: Standard and
Nortel. Press the space bar until the
desired choice is displayed.
SNMP Community Name
Enter the SNMP community name (up
to 20 characters can be used as a
name).
--IP Addresses for SNMP
Managers-
A maximum of five IP addresses can
be entered as SNMP Managers to
accept SNMP traps. If the IP address
is not on the terminal server’s network
segment, make sure the default
gateway is set and all routers have
been programmed with the proper
routes.
Manager 1
Manager 2
Manager 3
Manager 4
Manager 5
Setting FTP Parameters
The terminal server supports FTP Client Send commands. Files can be
sent from the terminal server to an FTP server using FTP (File Transfer
Protocol) protocol. To do this, you must set parameters in the Set
Network Parameters screen. After the parameters have been specified,
you may issue the SEBUF or SEND command with the appropriate
parameters.
To specify the FTP parameters, type SNP 3 to display the Network
Parameters menu, FTP Parameters option.
48
Download from Www.Somanuals.com. All Manuals Search And Download.
NOTE: In setting the user name and password, remember that they
are case-sensitive.
Field
Function
Restore Factory Defaults
Press the space bar until the desired
choice is displayed. Select “Yes” to
restore original factory settings.
Select ‘No’ to keep the current
values.
PPP link needed for ftp?
Select this option if the terminal
server needs to dial out with a PPP
session to send files via FTP. (See
49
Download from Www.Somanuals.com. All Manuals Search And Download.
Field
Function
the PPPREQ alarm and PHPPP
Action Routine in Chapter 8.)
FTP service type
Select the type of FTP service (None
or Client Only). Press the space bar
until the desired choice is displayed.
Server 1 (default) –
IP address (nnn.nnn.nnn.nnn)
Enter the IP address of the server.
The files transmitted by FTP are sent
to this address automatically unless
specified otherwise.
User name
Password
Enter the name used to log onto the
server. This entry is case-sensitive
Enter the password for the user
named above. This entry is case
sensitive.
Upload directory
-- Server 2 --
Enter the name of the directory that
should receive the file. A period
denotes the root directory.
IP address (nnn.nnn.nnn.nnn) Enter the IP address of the server.
User name
The files transmitted by FTP are sent
to this address automatically when
server 2 is specified.
Enter the name used to logon onto
the server. This entry is case-
sensitive
Password
Enter the password for the user
named above. This entry is case
sensitive.
50
Download from Www.Somanuals.com. All Manuals Search And Download.
Field
Function
Upload directory
Enter the name of the directory that
should receive the file. A period
denotes the root directory.
-- Client 1 --
User name
Enter the name of the first user who
will log in as an ftp client. This entry
is case-sensitive
Password
Enter the password for the user
named above. This entry is case
sensitive.
-- Client 2 --
User name
Enter the name of the second user
who will login as an ftp client. This
entry is case-sensitive
Password
Enter the password for the user
named above. This entry is case
sensitive.
-- Client 3 --
User name
Enter the name of the third user who
will login as an ftp client. This entry
is case-sensitive
Password
Enter the password for the user
named above. This entry is case
sensitive.
The Terminal Sever can establish a PPP link after establishing a
SYSOP through a dialup (modem) connection. Set the parameters for
your terminal dial-up package according to the manufacturer’s
instructions and authenticate into the terminal server. At the system
51
Download from Www.Somanuals.com. All Manuals Search And Download.
prompt, type the command PPP and press enter. Send the terminal
server a “BREAK” from your terminal communication package and await
notification that a PPP link has been established. When conformation
has been received, you may open up a telnet window and establish a
PPP link directly to the terminal server.
When connecting to a remote host via PPP, the are two standard
options of authentication: PAP (Password Authentication Protocol) and
CHAP (Challenge-Handshake Authentication Protocol). In the PAP
authentication process, the terminal server sends the username and the
password to the remote host. The remote host then determines whether
or not the user is allowed to establish the PPP link.
The CHAP option of authentication offers a higher-level of security since
the authentication process is encrypted. In this process, the terminal
server and the remote host have a shared secret key. The terminal
server transmits the local host name and the remote host responds with
a “challenge” number (random number). The “challenge” number is
then encrypted with a response back to the remote host, which encrypts
the challenge using the same secret key. If the responses match, the
PPP session is established.
Type SNP 4 to display the Network Parameters menu, PPP Parameters
option.
52
Download from Www.Somanuals.com. All Manuals Search And Download.
These parameters are set using the SNP 4 command:
Field
Function
Restore Factory
Defaults
Press the space bar until the desired choice
is displayed. Select “Yes” to restore original
factory settings. Select ‘No’ to keep the
current values.
Local Host Name
Enter the host name to be used with the
CHAP authentication option.
Remote PPP Site 1
Peer Host Name
Enter the name of the remote host which to
establish a PPP link.
53
Download from Www.Somanuals.com. All Manuals Search And Download.
Field
Function
Peer Phone Number
Enter the telephone number of the host to
which a PPP link will be established.
Authentication Mode
Press the spacebar to select the
authentication method to be used (PAP,
CHAP or None).
Username for PAP
Enter the username for PAP authentication.
Password/Secret Key
Enter the password, if PAP option has been
selected for authentication. Enter the secret
key, if CHAP has been selected for
authentication.
Type SNP 5 to display the Network Parameters menu, Telnet
Parameters option.
These parameters are set using the SNP 4 command:
Field
Function
Restore Factory
Defaults
Press the space bar until the desired choice
is displayed. Select “Yes” to restore original
factory settings. Select ‘No’ to keep the
current values.
54
Download from Www.Somanuals.com. All Manuals Search And Download.
Field
Function
Telnet service type?
Press the space bar until the desired choice
is displayed (None, Both, Client Only, Server
Only)
55
Download from Www.Somanuals.com. All Manuals Search And Download.
56
Download from Www.Somanuals.com. All Manuals Search And Download.
4. FILE BUFFERING
What This Chapter Contains
The File Management Menu is organized into two sections: Disk/File
Maintenance Functions and Buffer Functions. The Disk/File Maintenance
Functions section lists the commands by which the user may edit or
manipulate files from the terminal server RAMdisk. The Buffer Functions
section lists commands for collecting data into files and for sending files
to the administration PC.
•
•
•
•
•
•
•
Overview
RAMdisk organization
File naming conventions
RAMdisk protection parameters
Saving and transferring data received by a host port
Setting up automatic and manual buffering
List of RAMdisk events
57
Download from Www.Somanuals.com. All Manuals Search And Download.
File Management Menu
To view the File Management Menu, type F at the system prompt and
press the Enter key.
File Command Summary
Command Function
DIR
Displays the files in the current directory. Directories are
indicated by <DIR> adjacent to the name, along with their
creation date and time.
MD
Makes a new directory under the current directory.
MD <newdirectoryname>
Example: MD newdir
Creates a new directory named newdir under the current
directory.
58
Download from Www.Somanuals.com. All Manuals Search And Download.
Command Function
CD
Changes the current directory to a directory specified by
the user. Note that a space MUST follow this command.
Example: CD \
to return to the root directory.
to go up one level.
CD ..
RD
Removes the specified directory. An error is displayed if
the specified directory is not empty.
RD <directoryname>
Example: RD NEWDIR
COPY
Copies the specified file to a specified location. The
destination directory must exist before the file can be
copied.
COPY <source directory>\<filename> <destination
directory>\<filename>
Examples:
COPY \sentfiles\H4961212.2A \newdir\H4961212.2A
To copy a file from the current directory to a new
directory
COPY H4961212.2A \newdir\H4961212.2A
DEL
Deletes a file from the RAMdisk.
DEL <source directory>\<filename>
It is not necessary to specify the directory if the file to be
deleted is in the current directory.
Example:
DEL \sentfiles\H4961212.2A
59
Download from Www.Somanuals.com. All Manuals Search And Download.
Command Function
MOVE
Copies a file to a new directory and then deletes it from
the source directory after the file has been copied.
MOVE <source directory>\<filename> <destination
directory>\<filename>
Examples:
MOVE \sentfiles\H4961212.2A \newdir\H4961212.2A
To move a file from the current directory to a new
directory
MOVE H4961212.2A \newdir\H4961212.2A
RCV
REN
Command to receive files from the active port into the
current directory on the terminal server using XMODEM
or ASCII transfer. If FTP capability is available and the
FTP parameters have been set properly, RCV can also
be used to receive a file via FTP.
Renames the specified file
REN <filename> <new filename>
Example:
REN H4961212.2A DAYONE
The file H4961212.2A is renamed as DAYONE.
SEND
VIEW
Sends the specified file using either XMODEM or ASCII
transfer protocol. If FTP capability is available and the
FTP parameters have been set properly, SEND can also
be used to transmit a file via FTP.
Displays the contents of the specified file, one page at a
time. Scroll through the file by pressing <ENTER> to
view the next page. <CTRL-A> will return you to the
prompt.
60
Download from Www.Somanuals.com. All Manuals Search And Download.
RAMdisk Organization
There are 32 Mbytes available on the RAMdisk. You may create and
remove subdirectories, and copy, move, rename and delete files.
The directories listed below are automatically created by the system:
•
A subdirectory is created for each host port that has buffering
enabled, 1MB maximum per port. The data collected from the
host port is stored in this subdirectory. The subdirectory is given
the same name as the host port by default. To view the host port
directory, type OPBUFh# (Where h# is the desired host port
number) at the system prompt.
•
•
The \SENTFILES directory stores a copy of each file sent to the
administration PC. These files can be deleted automatically after
a preset number of days or when space available on RAMdisk
reaches a critical level.
The \LOGFILES directory contains files that are generated each
day by the terminal server to maintain a record of that day’s
activities. These files are of two types: Event files, which list the
alarms that were processed during one day, and Log files, which
contain a copy of one day’s log history.
Host Port Buffer Naming
The user may change the default directory name for each host port. For
example, if Host port 1 is being used to monitor a Meridian switch, then
directory name may be changed to Meridian. See "Automatic Buffering"
for more information on changing the directory name.
Buffer File Naming Conventions
Filenames consist of capital letters and numbers and can have a
maximum of 12 characters. A period followed by a three-character
extension may be used provided the total number of characters does not
exceed 12.
61
Download from Www.Somanuals.com. All Manuals Search And Download.
Examples: 101296AM.100
REPORT.01
IMPORTANTLOG
Note that in the screen above the default filename is CURRENT.0. The
current buffer file for a host port is always named either CURRENT.0 or
CURRENT.1. When the buffer is switched, the buffer file is renamed to
indicate the host port number from which the data was collected and the
date and time the buffer was opened.
Files collected via host port data by the terminal server are stored in the
directory of that host port and are assigned sequential names in order to
provide the user a means of identifying when and where the data in the
file was gathered. The terminal server uses following naming convention:
Hnyymmdd.hhq
Where: H = the letter H
n = host port number [1-9, A-T represents ports 10-
28]
yy = year
mm = month
dd = day
hh = hour
q = a letter (starting with ‘A’) used to differentiate
multiple files opened during the same hour.
Example 1:
H2981218.14A
In this example, data is collected from host port 2 on the 18th day
of December (12) in 1998 (98) at 2-p.m. (14). The ‘A’ indicates
that this is the first file collected in that hour.
Example 2:
HG980709.08D
In this example, data is collected from host port 16 (H), on the 9th
day of July (07) in 1998 (98) at 8-a.m. (08). The ‘D’ indicates that
this is the fourth file collected in that hour.
62
Download from Www.Somanuals.com. All Manuals Search And Download.
When a buffer is closed, the CURRENT.x file is renamed using the
convention described above, and left in the appropriate host port
subdirectory.
The Event and Log files that are generated by the terminal server have
names of the form listed below:
EVyymmdd.LOG
LGyymmdd.LOG
(for Event files)
(for Log files)
Where:EV = the letters EV
LG = the letters LG
yy = the last 2 digits of the year
mm = the month
dd = the day
.LOG = the letters .LOG
Setting the RAMdisk Protection Parameters
You should verify that the RAMdisk protection parameters are appropriate
for your application. The RAMdisk protection feature prevents the disk
from running out of room, which could result in the loss of data.
Monitoring of available space on the disk by the terminal server is done
continuously. You can configure the terminal server to delete files
automatically after a specified number of days or when the amount of
data on the RAMdisk reaches a preset critical level.
Files are not deleted automatically. If you do not specify a critical
percentage and the directories from which files are to be deleted, you will
have to monitor the disk and delete files when necessary. The terminal
server has default values, which may or may not fit your application.
Failure to raise the free space above the critical level causes a
“.DISKCRIT” event to be generated. The event .DISKCRIT can be
included in your Action Table along with the specified action to be taken.
63
Download from Www.Somanuals.com. All Manuals Search And Download.
The RAMdisk protection parameters can be viewed by using the DDP
(Display Disk Parameters) command or modified by using the SDP (Set
Disk Parameters) command.
Field
Function
Keep SENT Files for how many
days?
Enter the number of days that files
in the /SENTFILES directory should
be kept. Files that have been sent
to the administration PC are
automatically moved to this
directory. Files that have been
closed for the specified number of
days old will be deleted at midnight.
The date of a file (date that the file
was closed) is the starting point.
Keep LOG Files for how many
days?
Enter the number of days that files
in the /LOGFILES directory should
be kept. System Log and Event
files are automatically placed in this
directory. Files that are the
specified number of days old will be
deleted at midnight. The date of a
file (date that the file was closed) is
the starting point.
64
Download from Www.Somanuals.com. All Manuals Search And Download.
Field
Function
Disk Critical Percent Free:
Enter the percentage of disk space
that must be free. When this
percentage is reached, files will be
deleted in the order specified by the
entry for the Directories to Purge
prompt.
Directory Purge sequence While Enter the names of the directories
Disk is Critical:
that will be purged in sequence.
When disk space is critical, files will
be deleted from the first directory,
oldest files first, followed by the
second directory, etc. until disk
space is no longer critical.
-
SENTFILES
-
-
LOGFILES
sh
4
5
6
Purge Host When Critical
Initially No appears on the screen.
Press the space bar to toggle to
Yes.
RAMdisk Events
The terminal server, in response to certain RAMdisk conditions, will
generate events that are part of the standard software/firmware. These
standard events are as follows:
.BUFREADY A buffer file has been closed and is ready to be sent.
.DISKCRIT
.DISKFULL
The RAMdisk has reached the critical level assigned in
the Set Disk Parameters screen.
The RAMdisk is full and all further writes to the disk are
suspended.
65
Download from Www.Somanuals.com. All Manuals Search And Download.
Buffering Data Received by a Host Port
The terminal server provides both automatic and manual control of data
buffering from the host ports. If automatic buffering is selected, a buffer
file for the specified port will be opened and data collected until either a
specified time or file size is reached. The current buffer file is then closed
and renamed using the format described in "Buffer File Naming
Conventions". A new buffer file is opened immediately.
Buffer switching occurs seamlessly, so that no data is lost during the
transition between files.
Automatic Buffering
When automatic buffering is enabled for a particular port, data is collected
in a buffer file for a preset length of time or until the file reaches a
specified size. To enable automatic buffering, enter the SH (Set Host)
command. ..
NOTE: To disable automatic buffering, use the CLBUF (close buffer)
command.
66
Download from Www.Somanuals.com. All Manuals Search And Download.
Field
Function
Enable Automatic Buffering
Initially No appears on the screen.
Press the space bar to toggle to
Yes. Select Yes for automatic
buffering. Select No to disable it.
Compress closed buffer files?
Initially No appears on the screen.
Press the space bar to toggle to
Yes. Select Yes to compress buffer
files automatically when they are
closed.
The compression ratio is typically
4:1, but the ratio may vary because
67
Download from Www.Somanuals.com. All Manuals Search And Download.
Field
Function
it is dependent on the data.
Auto Switch (enter 0 to disable)
When CURRENT File exceeds
‘n’ KB
Enter the file size (in KB) at which
the buffer should be switched. Note
that the CURRENT.x file is renamed
using the convention described in
this section.
Enter 0 to disable this feature.
Every n hours
Enter the number of hours between
the switching of buffers.
Synchronize at what hour
(0-23)
Indicate the hour at which the buffer
should be switched. If the value is
set to 2 and the previous value is set
to 8, the buffer will switch at 200,
1000, and 1200 hours.
NOTE: If both the Current File exceeds ‘n’ KB and the Every n hours
parameters are set, the buffer is switched when the first condition is
met.
Manual Buffering
Buffers can be opened, closed and switched manually by the
Administrator. To do this, use the buffer commands listed in the File
Management Menu.
Command
OPBUF
Function
Open buffer
Opens a buffer for a port. You will be prompted
for the port number.
CLBUF
Close buffer
Closes the buffer file for a particular port. You will
be prompted for the port number.
68
Download from Www.Somanuals.com. All Manuals Search And Download.
Command
SWBUF
Function
Switch buffer
Closes the buffer for the specified port and opens
a new one. You will be prompted for the port
number.
BST
Buffer status
Displays the status of all open and closed buffer
files for a specific host port.
OBST
Status of open buffers for each host port.
Displays the status of all open buffer files. Status
includes creation time, file size, and the time and
size at which the buffers will be switched (if
automatic buffering is enabled).
Using FTP to Send Files to an FTP Server
The terminal server supports FTP Client Send commands. Before you
can send a file via FTP, the following must have been done.
•
•
A PPP link or Ethernet connection must be established.
Parameters must be set in the Set Network Parameters
screen.
After specifying the parameters, you may issue the SEBUF or SEND
command with the appropriate parameters.
Files may be sent using FTP from the terminal server to another device
by issuing the SEND or SEBUF command. However, you must set the
FTP parameters prior to using these commands.
SEND transmits one file; SEBUF is used to send all buffer files from the
specified host port.
Notation used: As in ASCII and XMODEM protocols, the required
parameters are enclosed within angle brackets <>; optional
parameters are enclosed within square brackets [ ].
69
Download from Www.Somanuals.com. All Manuals Search And Download.
Command:
Syntax:
SEND
SEND <filename>,F,<server #>
(Uses the IP address, user name and
password for the specified server (1 or 2).
These parameters have been stored in the
FTP parameters screen.)
Files are sent from the current directory.
Examples:
To send the file NEW.CFG to server #1 (the default
server entered using the SNP 3 command) from the
directory TEST while in the current directory, the
command format is:
SEND \TEST\NEW.CFG,F,1
Where:
<TEST>
= name of the Host port Directory
<NEW.CFG>
F
= name of file to send
= use ftp protocol.
<server#>
= Number of the server that will
receive the file, as listed in the
Network Parameters table.
To send a file from the current directory, you need not
enter a directory name:
SEND NEW.CFG,F,1
Files can also be sent to a server whose profile was not
entered into the terminal server with the SNP 3
command. To do this enter the following information:
70
Download from Www.Somanuals.com. All Manuals Search And Download.
SEND
<filename>,F,<IPaddr>,<user>,<password>,[directory]
Where:
<filename>
F
= name of file to send.
= use ftp protocol.
<IP addr>
= IP address of the server that will
receive the file.
<user>
= login name of the ftp user on the
server.
<password>
[directory]
= password of the ftp user on the
server.
= directory on the server into which
the file will be transferred. Enter the
directory or specify “.” to use the
current ftp directory.
Command:
SEBUF
Description: This command is used to send all closed buffer files in a
specific host port buffer directory to either server entered
with the SNP 3 command:
Syntax:
SEBUF <host#>,F,<server#>
Where:
<host#>
= is the number of the host port on the
terminal server
F
= use ftp protocol.
<server#>
= Number of the server that will receive the
file, as listed in the Network Parameters
table.
71
Download from Www.Somanuals.com. All Manuals Search And Download.
SEBUF
<host#>,F,<IPaddr>,<user>,<password>,[directory]
Where:
<host#>
= is the number of the host port on the
terminal server
F
= use ftp protocol.
<IP addr>
= IP address of the server that will receive
the file.
<user>
= login name of the ftp user on the server.
<password> = password of the ftp user on the server.
[directory]
= directory on the server into which the file
will be transferred. Enter the directory or
specify “.” to use the default ftp directory.
Examples:
To send all buffer files from Host port 1 using server
profile 2 and the FTP protocol, enter:
SEBUF 1,F,2
To send all buffer files from Host port 3 to a server at
address 193.1.1.241 with the username and password
of ftpuser, to the directory recdir enter:
SEBUF 3,F,193.1.1.241,ftpuser,ftpuser,\recdir
NOTE: Parameters are case-sensitive.
Using FTP to Receive Files from Another Device
The terminal server supports FTP Client Receive commands. Files can
be sent from the FTP server to a terminal server using FTP (File Transfer
Protocol) protocol. To do this, you must set parameters in the Set
72
Download from Www.Somanuals.com. All Manuals Search And Download.
Network Parameters screen. After the parameters have been specified,
you may issue the RCV command with the appropriate parameters.
73
Download from Www.Somanuals.com. All Manuals Search And Download.
74
Download from Www.Somanuals.com. All Manuals Search And Download.
5. MODEM PORT SETUP
What This Chapter Contains
The parameters of the modem port specify the configuration of the port.
Modem port parameters must be set correctly in order for you to
successfully dial into the terminal server from a remote location and for
the terminal server to dial out.
Each unit is shipped with factory defaults for the modem(s) installed in the
terminal server. If you add or replace a modem with one of a different
make or model, you must check the modem port parameters to be sure
that they are set correctly for the installed modem. In particular, pay
special attention to the modem initialization string. An incorrect modem
initialization string can result in many problems. Consult the manual
supplied with the modem for detailed information.
•
•
•
Overview
How to Display and Set Modem Parameters
Explanation of Each Parameter
75
Download from Www.Somanuals.com. All Manuals Search And Download.
Modem Port Parameters
Display Modem Port Parameters – DM Command
The DM (Display Modem port parameters) command enables you to view
the parameters of the specified modem port.
Type DM at the system prompt to display the modem port parameters.
You will be prompted to enter the number of the modem port whose
parameters you wish to view. The display will look similar to the one in the
SM parameters section. Each parameter is explained in the SM section.
76
Download from Www.Somanuals.com. All Manuals Search And Download.
Set Modem Port Parameters – SM Command
The SM command enables you to display and change the parameters for
each modem port. Parameters include baud rate settings, parity, and
terminal emulation.
Type SM at the system prompt to display modem port parameters.
Field
Function
Modem Number
Select the modem whose settings you wish
to change.
Restore Factory Defaults? Initially No appears on the screen. Press the
space bar to toggle to Yes. Select Yes to
restore the factory settings. Select No to
keep the current settings. The factory default
settings are listed in the appendix.
Baud Rate Settings:
Modem Control Strings
The speed at which the terminal server
transmits data to the modem (internal or
77
Download from Www.Somanuals.com. All Manuals Search And Download.
Field
Function
external). An AT modem will not usually
establish a session with a remote modem at
a speed greater than the speed at which it
was set up. The actual speed of the user
session is a function of the type of
connection that is made between the remote
modem and the terminal server modem.
Press the space bar until the desired choice
is displayed. When the speed you want
appears in the field, press Enter key to select
that speed and advance to the next
parameter.
Available baud rates are 300,1200, 2500,
4800, 9600, 19200, 38400 and 57600.
User Session
The speed at which the terminal server
communicates with its modem.
When a connection is made to a remote
modem, the modems negotiate the
appropriate speed for the link. After the
speed has been determined, a message is
sent to the terminal server modem such as
"CONNECT 2400" or "CONNECT 9600".
Normally, the modem switches to the speed
in the message. Some modems, however,
(and most modems at some connect speeds)
do not indicate the speed with a CONNECT
message. In these instances, the speed
must be derived some other way.
Usually an Auto Baud routine is used to
sense the speed of the incoming data.
Sometimes it is preferable to force the
incoming session at a particular speed.
CONNECT n sets the speed of the session
to the speed in the CONNECT message. If
78
Download from Www.Somanuals.com. All Manuals Search And Download.
Field
Function
CONNECT n is chosen, and no CONNECT
message is sent to the terminal server
modem, it reverts to Auto Baud.
Press the space bar until the desired choice
is displayed. When the speed you want
appears in the field, press the Enter key to
select that speed. Speeds available are
CONNECT n, 57600, 38400, 19200, 9600,
4800, 2400, 1200, 300 and Auto.
Char. Length/Parity
Terminal Emulation
Use the space bar to select the character
length and parity characteristics of the
Modem Port. Available entries are 7 or 8
data bits, with Even, Odd, Mark, Space or no
parity.
The Auto entry initiates an auto-parity routine
with the user.
Specify the type of terminal that your
computer is emulating when your computer
is connected to the Modem Port via a remote
modem.
Press the space bar to toggle between TTY
and VT100.
If your computer is emulating a DEC VT-100
terminal, select VT100. If your computer is
not emulating a DEC VT-100 terminal, select
TTY. After you make your selection, press
the Enter key.
NOTE: Only Sysop sessions are affected.
Sysop Idle Timer
The Sysop idle timer defines the maximum
duration of inactivity time during a Sysop
session before the call is terminated and the
modem is reset.
79
Download from Www.Somanuals.com. All Manuals Search And Download.
Field
Function
Press the space bar until the desired choice
is displayed. When your choice appears in
the field, press Enter key to make your
selection.
Available selections are 1 min, 5 min, 10
min, 20 min and none.
Host Session Idle Timer
The Host Session idle timer defines the
maximum duration of inactivity time during a
Host session before the call is terminated
and the modem is reset.
Press the space bar until the desired choice
is displayed. When your choice appears in
the field, press the Enter key to make your
selection and advance to the next parameter.
Available selections are 1 min, 5 min, 10
min, 20 min, none.
Host Session Disconnect
on Ctrl + A
Initially Yes appears on the screen. Press
the space bar to toggle to No.
Setup
Defines the AT command string used to set
up the modem. You may edit this field,
depending on your modem requirements.
NOTE: The factory defaults shown on
page 5-2 are specific for the installed
modem. If the terminal server includes a
modem of a different make or model, a
different command string is required.
Consult the modem manual to determine
the appropriate command string.
Answer
80
Defines the AT Command string used to
answer calls. This should be either ATA
Download from Www.Somanuals.com. All Manuals Search And Download.
Field
Function
(answer immediately) or left blank. ATS0=n
(answer on the nth ring) can be included in
the setup initialization, however, the default
ATA is recommended.
Hangup
Defines the sequence for hanging up the line
~+++~AT|~ATS0=0 H0|
where
~+++~ escape sequence
ATS0=0 disables auto answer
ATH forces modem on-hook hang up
Dial Strings
Modem
The command string used to initiate a dial-
out sequence with the modem. This is
typically used as part of a Callback
authentication process or to deliver an alarm.
Example:
ATDT ### |
The default phone number will be substituted
for the ### characters.
Dial Strings
Pager
This command string specifies the dial string
used by the modem to deliver a message to
the pager.
Example:
ATDT ### @ MSG ; |
The default pager number from the System
Parameter table will be substituted for the
### characters and the default pager
message will be substituted for MSG. Press
Enter key to confirm your entry.
81
Download from Www.Somanuals.com. All Manuals Search And Download.
NOTE: The | character represents a carriage return, and allows more
than one command to be entered on a single line as though it were
being entered on multiple lines. The ~ character forces a one
second delay. After editing the field, press Enter.
Verifying the Settings
To ensure that the settings are correct, do the following:
•
•
Dial into the terminal server to verify that you can access it. Log on as
a Master user. If you cannot dial in, check the modem port settings.
Check that the terminal server can dial out. Add an Action Item
PHONHOME that is issued when a particular event is generated.
Generate the event by using the GE command. (See Chapter 1 for
more information on Action Tables and Action Items.) Have the
terminal server dial a PC running a terminal emulation program. If the
connection is successful, the date, time, site name, alarm and event
comment is displayed on the screen.
82
Download from Www.Somanuals.com. All Manuals Search And Download.
6. TROUBLESHOOTING
What this Chapter Contains
•
•
•
•
•
•
•
•
Checking the Status of the LEDs
Determining Network Status
Querying Remote Devices
Reboot the Terminal Server
Reinitializing the Terminal Server
Working with Configuration Files
CONFIG Command Instructions
DUMPF Command Instructions
83
Download from Www.Somanuals.com. All Manuals Search And Download.
Checking the Status of the LEDs
The following figure shows the status LEDs, all are visible from the front
of the terminal server.
The following table lists the terminal server LEDs and explains the state
or condition of the terminal server or its components when the LED is on
or off. In addition to the conditions listed in the OFF column, all of the
LEDs will be off when power to the terminal server is turned off.
LED
Term. Server condition,
LED is on
Term. Server condition,
LED is off
AC (green)
16V DC supply unit is
operating.
Main power has failed;
internal battery is supplying
power to the unit. PWR FAIL
LED is on.
48VDC
Not in use with this version
of the Central Web Console.
BATTERY
(green)
Internal battery is charging.
Internal battery is charged.
PWR FAIL
(red)
Main power has failed;
internal battery is supplying
power to the unit.
Main power supply unit is
operating.
84
Download from Www.Somanuals.com. All Manuals Search And Download.
LED
Term. Server condition,
LED is on
Term. Server condition,
LED is off
PULSE
(green)
Flashes to indicate unit is
operating correctly.
Unit is running internal
diagnostics (if AC or PWR
FAIL LED is on)
ALARM
EVENT
FILE
PEND
(red)
Unit is processing an
alarm.
Normal condition.
CLR
(green)
Normal operation.
Unit is running internal
diagnostics
PEND
(red)
Unit queuing events
(alarms) for processing.
Normal condition.
CLR
(green)
Normal operation.
Unit is running internal
diagnostics
PEND
(red)
Data stored on RAMdisk
has reached the critical
level.
Normal condition.
CLR
Normal operation.
(green)
AUX
RX/TX
(amber)
Unit receiving or
transmitting data.
Idle.
DTR
(amber)
Serial device is connected
to AUX port and DTR is
asserted.
Port is not active or no serial
device connected.
HOST n
RX/TX
(amber)
Unit receiving or
transmitting data.
Idle.
DTR
(amber)
Serial device is connected
to Host port.
Host port is not connected to
a serial device.
MODEM 1
RX/TX
(amber)
Unit receiving or
transmitting data.
Idle.
Idle.
CD
(amber)
Unit is connected to a
remote system.
85
Download from Www.Somanuals.com. All Manuals Search And Download.
LED
Term. Server condition,
LED is on
Term. Server condition,
LED is off
ETHERNET
RX
(amber)
Unit receiving data.
Idle.
Idle.
TX
(amber)
Unit transmitting data.
Determining Network Status
The DNS command displays the status of the network. If the network is
running, the following message appears:
The terminal server determines network status by detecting traffic on the
Ethernet link. The user sets the time interval for non-activity, which can
range from 1 to 255 seconds. Two alarms indicate network status: if
active the .NETUP alarm is issued, if inactive the .NETDOWN alarm is
issued.
An attempt at a Telnet connection into the terminal server results in no
response if the terminal server or network connection is down. A Sysop
session through the AUX port is the only way to restart or communicate
with the terminal server at this point.
NOTE: An Alarm/Event action routine must be created for these
alarms. Otherwise the unit will receive the alarm but will not know
what action to take.
To enter the time interval, type SNP 1 at the prompt. At the Network-Loss
Alarm Delay Time, enter the time interval for non-activity on the network.
86
Download from Www.Somanuals.com. All Manuals Search And Download.
An inactivity period longer than the Network-Loss Alarm Delay Time will
trigger the alarm .NETDOWN.
Querying Remote Nodes
The Port and Session Control Functions menu includes the PING
command. The PING command is issued to query another device (IP
address) on a network.
Syntax:
PING <Ipaddr>.
Where <Ipaddr> is the IP address of the device
If successful, the reply shows the length of time it took to reach the
device. If the ping is unsuccessful, the message is “Device not
Reachable.”
Rebooting the Terminal Server
You can restart the terminal server by either using the key switch on the
front panel to power-cycle the unit (turn the key to Off then to On – "hard"
boot) or by issuing the BOOT command from the command prompt –
"soft" boot.
87
Download from Www.Somanuals.com. All Manuals Search And Download.
Reinitializing the Terminal Server
Use a PC or terminal connected to the AUX port to re-initialize the
terminal server. The AUX port must be set at 9600 baud.
Note: This procedure requires that you re-establish your network
parameters and rebuild your user database.
1. Reboot the unit.
2. Watch the LEDs carefully. When the Pulse LED lights, wait
approximately one-half second and press Enter. The following System
LEDs will light: Alarm, Event, and File.
3. Type INIT, do not press Enter! You will be asked to confirm system re-
initialization, type YES. Begin this step within 10 seconds of
completing step 2.
4. Re-establish your networking parameters (IP and Ethernet, and FTP
addresses).
5. Download the HP.CFG and appropriate configuration files.
6. Configure the terminal server with the HP.CFG file and the
appropriate configuration file. See the next section for further
information about configuration files.
Working with Configuration Files
Each terminal server has a configuration file that specifies the parameters
of the terminal server and determines how the unit operates. This file
includes the Action Table, user Action Routines, System Parameters, and
Parameters of the AUX, Modem, Host Ports and Text Pager Messages.
Configuration files are created online or offline and are saved in ASCII file
format with the extension *.cfg. One file can be used to replicate
parameters across multiple terminal servers. Configuration files can be
saved to a storage device, saved to the RAMdisk, or printed to a screen.
88
Download from Www.Somanuals.com. All Manuals Search And Download.
Note: Issuing the Upgrade command or re-initializing the terminal
server destroys all data stored to the RAMdisk.
Creating a Configuration File
Use an editing program such as Notepad or WordPad to edit or create
configuration files; these programs can read and write simple ASCII
formatted files. Word-processing programs such as Microsoft Word are
not suitable for this function; they add formatting characters that destroy
the structure of a configuration file.
Importing/Exporting a Configuration File
The File menu contains commands for transferring files between the
terminal server and a storage or editing device. In addition, the terminal
server supports two other commands: the DUMP command uploads a file
to the screen or a storage device, DUMPF downloads a file to the
RAMdisk.
CONFIG Command Instructions
Overview
A configuration file may be sent to the terminal server from a PC or to a
PC from the terminal server. The CONFIG command imports a
configuration file, and the DUMP command exports configuration data to
a file. The CONFIG command allows a user to import a configuration into
an terminal server with a direct connect via the AUX port, over phone
lines, or via the network port.
1. Log onto the terminal server as a Master User.
2. Download the configuration file to the RAMdisk using XModem
transfer.
89
Download from Www.Somanuals.com. All Manuals Search And Download.
3. To configure the terminal server, type CONFIG filename at the
system prompt and press Enter.
This section describes the different ways in which a terminal server’s
configuration can be “dumped” into a text file. The DUMP command
allows the user to view or backup the configuration of an terminal server
with a direct connection via the AUX port, over phone lines or via the
network port.
Procedure for Viewing Configuration Data at the Terminal Screen
1. Log onto the terminal server as a Master User.
2. Type DUMP and press the ENTER key.
The banner Dump Configuration Detailsappears, and a list of
system tables and system parameters displays. View one or more of
90
Download from Www.Somanuals.com. All Manuals Search And Download.
the tables and parameters, press Crtl+x to clear the line and enter the
characters for the parameters of choice and press ‘ENTER’.
3. The banner “Press ENTER when ready to receive Configuration
Dump (CTRL+A to Abort)” will appear. Pressing ENTER “DUMPs”
the selected configuration to the screen for viewing.
Procedure for Saving the Configuration Data on the PC
1. Log onto the terminal server as a Master User.
2. Type DUMP and press the ENTER key.
The banner Dump Configuration Detailsappears, and a list of
system tables and system parameters displays. View one or more of
the tables and parameters, press Crtl+x to clear the line and enter the
characters for the parameters of choice and press ‘ENTER’.
3. The banner “Press ENTER when ready to receive Configuration
Dump (CTRL+A to Abort)” will appear. DO NOT PRESS THE
ENTER KEY. Instead, use the communications program
XModem transfer process to receive the configuration file from
the terminal server. The ‘ENTER’ will be sent by the
communication package and the CONFIG will be saved on the PC
as the filename selected and in the specified directory.
4. To verify that the file was saved correctly, open the file with a text
editor such as “Notepad” or “Wordpad”. The file should appear to
have appropriate programming structure (Look for extraneous
characters) and be terminated with the word “END”.
91
Download from Www.Somanuals.com. All Manuals Search And Download.
DUMPF Command Instructions
Overview
The DUMPF command is identical to the DUMP command except
DUMPF copies the configuration to the RAMdisk of a terminal server.
1. Log onto the terminal server as a Master User.
2. Type in the command DUMPF and press the ENTER key.
At this point the banner Dump Configuration Details to File
and the prompt File namewill appear.
3. Enter a file name at the File Nameprompt and press the ENTER
key to see a list of the system tables and system parameters. Select
all or part of the configuration and press ENTER key to save the file to
the RAMdisk.
4. The transfer will take only a few seconds. To verify the transfer was
successful, type ‘VIEW filename’ at the system prompt.
5. To ensure the file was saved correctly on the “RAMdisk,” enter the
command DIR to display the directory and press the ENTER key.
Now it is possible to XMODEM or FTP the information to your PC by
using the SEND command to transfer the configuration file.
92
Download from Www.Somanuals.com. All Manuals Search And Download.
Default Port Parameters
AUX Port Parameters
Baud Rate
9600
Char. Length / Parity
Terminal Emulation
Default Access Class
Output While Port Idle
Sysop Idle Timer
8 / None
TTY
Master
Log Data
None
Host Session Idle Timer
Host Session Disconnect on Ctrl+A
None
Yes
Modem Port Parameters
Modem Number
1
Baud Rate Settings:
Modem Control Strings
User Session
Char. Length / Parity
Terminal Emulation
Sysop Idle Timer
19200
CONNECT n
8 / None
TTY
None
Host Session Idle Timer
Host Session Disconnect on Ctrl+A
None
Yes
Modem Control Strings
Setup
( Use '|' for ENTER; '~' for 1 second delay )
|~AT &F E0 &C1 &D2 S0=0|
Setup (continued)
Answer
ATA|
Hang Up
~+++~AT|~ATS0=0 H0|
Dial Strings ( Use '###' for Phone No., 'MSG' for Pager Message)
Modem
Pager
ATDT ###|
ATDT ### @ MSG ;|
93
Download from Www.Somanuals.com. All Manuals Search And Download.
Host Port Parameters
Host Port Number
Restore Factory Defaults?
-- Host 1:
1
No
Host Name
HOST1
9600
8 / None
None
Baud Rate Setting
Character Length / Parity
Alarm Filter
Force CD/DSR High
Flow Control
Yes
None
-- Automatic Buffering --
Enable Automatic Buffering?
Compress closed buffer files?
Auto Switch: (Enter 0 to disable)
When CURRENT File exceeds 'n' KB
Every 'n' Hours
No
No
50
24
0
Synchronize at what hour (0-23)
94
Download from Www.Somanuals.com. All Manuals Search And Download.
7. ACTION AND EVENT
TABLES
What this Chapter Contains
The terminal server can monitor and report alarm conditions sent by a HP
server or other device connected to a host port of the terminal server.
Alarm conditions monitored by the terminal server and the actions to be
taken are listed in a database called the Action Table. When the terminal
server receives the alarm condition, or event, it compares the alarm with
the alarms listed in the Action Table. If a match is found, the associated
actions are automatically executed.
Actions taken can include paging, delivery to an alarm catcher and
canceling alarms. If the requested action cannot be taken at that time or
is scheduled for another time, the event and requested action are listed in
the Event Table. The Event Table lists all pending actions. When the
action is processed, it is removed from the Event Table.
•
•
•
•
•
Definition and Purpose of an Action Table
Definition of Alarms and Events
How to Create an Action Table
Action Table Worksheet
List of Internal Events and Action Routines
95
Download from Www.Somanuals.com. All Manuals Search And Download.
Working with Action Tables
To send messages based on alarms generated by a HP Server or other
serial device, an Action Table must be created in the terminal server. The
terminal server compares all alarm messages against the alarm list in the
Action Table. If a match is found, the associated action is taken.
When building an Action Table, you should first consider the following
things:
1. The alarms to be monitored.
2. The actions to be taken when an alarm is received.
Structure of an Action Table
The Action Table consists of a list of alarms, the requested action (Action
Routine), parameters associated with the action, and comments.
A typical Action Table is shown below.
96
Download from Www.Somanuals.com. All Manuals Search And Download.
The Action Table has four components: Alarm, Routine, Parameters, and
Comments. Each component is described in the following paragraphs.
Alarm
There are three types of alarms/events.
1. Alarms produced by a host (HP Server, etc.) can be listed in the
Action Table along with a specified action.
2. The terminal server can generate alarms (or events), by a host
user or by a Sysop. Events generated by the terminal server are
called internal events. All internal events start with a period (.).
Internal events are listed in Chapter 8.
3. Events generated by user Action Routines. They are especially
useful for further processing of alarms.
97
Download from Www.Somanuals.com. All Manuals Search And Download.
Action Routine
After the terminal server has determined that a match exists between the
detected alarm and an entry in the Action Table, it executes the Action
Routine listed. The Action Routine specifies what action should be taken
when a particular event occurs. Each terminal server includes standard
Action Routines (see Chapter 8).
Parameters
Action routines typically have parameters associated with them. A
parameter may be a phone number, a pager number, or other information
used by the Action Routine.
Comments
The comment may give more information about the alarm. With some
Action Routines, when the terminal server processes an alarm, the
comment is sent along with it.
Alarm Matching Criteria
When the terminal server receives an alarm, it follows a specific
procedure when it searches the Action Table for a match to an alarm
(event). Three passes are made.
1. In the first pass, the terminal server attempts to match the alarm
from the first character to the first space. That is, if it received an
alarm ERR000 Reset, it would try to find ERR000 in the Action Table
and then take whatever action is specified.
2. If the first search fails to turn up a match, it searches for a record
describing a range of alarms that includes the alarm it received.
Such ranges can be entered into the Action Table to cover a
multiple of alarm types.
98
Download from Www.Somanuals.com. All Manuals Search And Download.
3. Finally, if there is no match using the first two criteria, it searches
for a match to the mnemonic up to the first digit. That is, it drops
the digits and just tries to match the mnemonic by itself. For
example, if it received the alarm ERR006, but only ERR000,
ERR010 - 020, and ERR appear in the Action Table, it matches the
ERR in ERR006 to ERR in the Action Table.
Example:
Three pass lookup on Action Table:
Pass 1 - Exact Match (up to first space)
Pass 2 - Range Match
Pass 3 - Exact Match (up to first non-alpha)
Sample Action Table:
Alarm
Action Routine
PHONHOME
PHONHOME
PAGE
Parameters
Comments
1.) ERR005
2.) ERR000-030
3.) ERR
2
4.) .AUTHFAIL
5.) .AUTHFAIL.1
PAGE
PAGE
Event:
ERR000
ERR005
ERR040
.AUTHFAIL
.AUTHFAIL.1
matches (2)
matches (1)
matches (3)
matches (4)
matches (5)
Multiple Actions on a Single Alarm
In some instances you may want more than one action to occur when a
single alarm is detected. For instance, a hacking attempt may be
reported to two different people. In that case, the DOLIST command is
used. The first line gives the general form of the alarm to be used as the
trigger. The following lines have the same mnemonic but with an
extension which denotes an order of action. In the example given below,
99
Download from Www.Somanuals.com. All Manuals Search And Download.
.1 and .2 are added to show two subsequent actions to be taken. When
the .AUTHFAIL alarm is detected, the terminal server “phones home” and
pages, sending the alarm and the comments.
NOTE: DOLIST cannot be nested (a DOLIST inside another DOLIST).
ALARM
ACTION
PARAMETER
COMMENTS
.AUTHFAIL
.AUTHFAIL.1
DOLIST
PHONHOME
HACKER ALERT
.AUTHFAIL.2
PAGE
NOTE: The actions in a DOLIST are dispatched in the order shown in
the Action Table, but they are not necessarily executed in that order.
For example, the PHONHOME action may be rescheduled if the
modem is already in use. In that case, the system will begin to
execute the PAGE action without waiting for PHONHOME to
complete.
Planning the Action Table
Before you start to build your Action Table, you should determine which
alarm conditions to monitor and decide what action should be taken for
each alarm condition.
A worksheet is provided to assist you in planning alarm/status messages
monitored by the terminal server, and actions taken by the terminal server
when they are received. To help guide you, we have also provided an
example of a filled in worksheet at the end of this section.
NOTE: You must have at least Sysop 3 level access to add, delete
or change Action Table items.
1. Determine which alarm conditions to monitor.
Examine the types of alarms to which you or your staff respond on a
regular basis and then define them in the worksheet.
100
Download from Www.Somanuals.com. All Manuals Search And Download.
In the example worksheet, note that the "SYS000" (System Reload)
and "INI000" (System Reload Result) are among the types of
messages that are being monitored. Other messages are BSD090
(Power Failure), the Digital Trunking Alarms (DTA and DTI), and the
ERR series of alarms.
2. Decide what action is to be taken when a particular alarm
condition is received.
Based on the action, you should then "match" this action to the alarm
you select.
In the worksheet example, the alarm "SYS000" has been "matched"
with the Action Routine "SCHEDULE" (which schedules a future
action). The SCHEDULE routine requires that you define the action to
be taken as well as the time at which that will occur. In the example,
the SCHEDULE routine has the parameter “15 PHONHOME". That
means that the terminal server will schedule a PHONHOME action 15
minutes after the alarm occurs.
The reasoning behind this example is that a maintenance center, for
instance, will probably want to be alerted to an unsuccessful system
reload to check its status. By scheduling the report (PHONHOME) to
take place 15 minutes after the event, an unsuccessful reload will be
reported because a SYS0000 occurs. A successful reload will not be
reported because an INI000 occurs when the SYSLOAD is
successful.
Also in the example, the routine "DOLIST" (which causes several
actions to be performed) is assigned to the alarm "INI000". One of
the actions to be performed by DOLIST is CANCEL, which has been
given the parameter SYS000. When a successful system reload
occurs, the terminal server will CANCEL the alert to the maintenance
center. The terminal server will, however, create a log entry stating
that the "INI000" event occurred.
101
Download from Www.Somanuals.com. All Manuals Search And Download.
3. Test the Action Routine.
Use the GE command to generate the event. Check to see if the
desired action occurs.
Example: Type GE SYS000 and see if the requested action occurs.
102
Download from Www.Somanuals.com. All Manuals Search And Download.
Sample: ACTION TABLE WORKSHEET
Alarm, Message, or
Internal Event
Action Routine
Routine Parameters
.BATLOW
DOLIST
.BATLOW-1
.BATLOW-2
.DAILY
PHONHOME
PAGE
2
5551212,1234
DOLIST
.DAILY-1
.DAILY-2
.DTRLOW
.HOURLY
BSD090
CLKCHECK
SETHP
3
PHONHOME
LOGCHECK
PHONHOME
DOLIST
50
INI000
INI000-1
INI000-2
SYS000
CANCEL
SYS000
CLKSET
SCHEDULE
PHONHOME
15 PHONHOME
.DTRLOW
103
Download from Www.Somanuals.com. All Manuals Search And Download.
ACTION TABLE WORKSHEET
Alarm, Message, or
Internal Event
Action Routine
Routine Parameters
104
Download from Www.Somanuals.com. All Manuals Search And Download.
Action Table Commands
The Action and Alarm Functions Menu contains commands for
maintaining the Action Table as well as the Event Table.
Type A at the system prompt and press the Enter key to display the
Action and Alarm Functions Menu. All commands associated with action
and alarm functions are shown on this menu.
By entering the command mnemonic at the system prompt and pressing
the Enter key, the information screen for that command is displayed.
Adding an item to the Action Table – AA Command
The Add Action Item command is used to add an Action Item to the
Action Table.
Type AA at the system prompt and press the Enter key to display the
Add Action Items screen.
105
Download from Www.Somanuals.com. All Manuals Search And Download.
Field
Function
Alarm
Enter the alarm issued by the protected device
or a terminal server internal event (internal
events are listed at the end of this chapter) and
press the Enter key.
Routine Parameters
Enter parameters associated with the Action
Routine. Enter values for parameters
associated with the specified Action Routine.
Commas must separate parameters. A comma
is not needed at the end of the field. If you
want to skip a parameter, place a comma for
the parameter and a second one to separate it
from the next parameter. For example, to enter
the first and third parameters (skip the second
parameter), enter two commas in the middle:
1,,3.
Comments
Type any comments you want attached to the
event. Then press the Enter key.
The system confirms that you have added an action item by displaying a
confirming a log entry and displaying the system prompt.
List Action Items – LA Command
The List Action Items command displays the Action Table, which contains
the following information:
•
•
•
•
Alarms - Trigger (alarm or event) for the Action Routine.
Routines - Action taken when the alarm is received.
Parameters - Parameters associated with the Action Routine.
Comments - Description or explanation of the routine or other
information.
106
Download from Www.Somanuals.com. All Manuals Search And Download.
The Action Table is updated when changes are made to it using other
commands, such as Change Action Item, or Add Action Item, but cannot
be changed directly by using the LA command.
Type LA at the system prompt and press the Enter key to display the List
Action Items screen. To display only part of the Action Table, enter a
modifier for example, LA BSD will display all alarms starting with the
letters ‘BSD”.
To display the complete list, enter LA is entered with no modifiers.
107
Download from Www.Somanuals.com. All Manuals Search And Download.
You can also specify a search string by adding one or more characters
after the LA command, separated by a space. For example, to display the
action items starting with .H, type:
>LA .H
and press the Enter key. Only those action items starting with .H are then
displayed.
Change Action Item Command – CA Command
The Change Action Item command allows you to modify an existing
action item. Type CA at the system prompt and press the Enter key to
display the Change Action Item screen.
When CA is issued with no modifiers, the complete list is displayed. To
specify a search string, add one or more characters, separated by a
space, after the CA command. For example, to change action items
starting with .D, type:
>CA .D
108
Download from Www.Somanuals.com. All Manuals Search And Download.
and press the Enter key. The system will only display those action items
beginning with .D. If the list contains more than 18 action items, you are
prompted to press the Enter key to view additional action items. If the
action item you wish to change is not displayed, then press the Enter key
to see more action items.
You are prompted to enter the number corresponding to the action item
you wish to change. After you type in a number and press the Enter key,
the system will display that Action Routine and it’s associated
parameters. The Action Table is updated immediately as changes are
made to it.
Schedule Action Item – SAI Command
The Schedule Action Item command schedules the occurrence of an
Action Item. This command is usually used for remote installation and
testing of new Action Routines. It lets you execute an Action Routine
when there is no event associated with that action.
To display the Schedule Action Item screen, type SAI at the system
prompt and press the Enter key. Initially the Action Routine field is blank.
Use the Space bar to scroll through the list of Action Routines. Select an
Action Routine by pressing the Enter key when the Action Routine you
want appears in the field. The cursor will then advance to the Parameters
field.
Continue through the fields by typing in your data and pressing the Enter
key. Pressing the Enter key when the cursor is in the Comment field
completes the process.
Field
Function
Parameters
Type the parameter, or parameters, that you want
to associate with this Action Routine. Press the
Enter key to advance the cursor to the next field.
Schedule Date
The day on which you want the Action Routine to
activate, where:
109
Download from Www.Somanuals.com. All Manuals Search And Download.
today = The Action Routine is scheduled to
occur today at the time specified (pressing the
Enter key selects this date).
mm/dd/yy = Type the month, day, and year that
you want the Action Routine to occur and then
press the Enter key.
nn = Type the number of days from today that
you want the Action Routine run and then
press the Enter key.
Schedule Time
The time of day (using the 24-hour clock format)
at which you want the Action Routine to activate,
where:
now = The Action Routine will occur
immediately (ASAP). Pressing the Enter key
selects this time.
hh:mm = Type the time of day, in 24-hour clock
format (for example,, 2:00 PM is given as
14:00) at which you want the routine run and
then press the Enter key.
nn = Type the number of minutes from now
that you want the routine run and then press
the Enter key.
Event
If you are simulating a particular Event for testing,
type the event here as it would have been
received to trigger this action. For example, if you
test PHONHOME, this field could be used to
signify it is a test. The system defaults to "Sysop
Generated".
Comment
Type any comments that you want attached to the
Event.
110
Download from Www.Somanuals.com. All Manuals Search And Download.
Delete Action Item – XA Command
The Delete Action Item command allows you to remove an action item
from the Action Table. Type XA at the system prompt and press the
Enter key to display the Delete Action Item screen.
Depending on the number of action items in the table, you may be
prompted to press the Enter key to view additional action items. If the
number corresponding to the action item you wish to delete is higher than
18, press the Enter key to display the next screen of action items.
The Action Table is updated immediately as changes are made to it. To
delete an entry from the table, enter the number corresponding to that
entry following the Select # - prompt, then press the Enter key. The
system then displays the line for that action item and asks if you want to
delete that record. Initially, a No appears in the field. Press the space
bar to toggle the field to Yes and then press Enter. The system confirms
that you have deleted that record.
111
Download from Www.Somanuals.com. All Manuals Search And Download.
When XA is entered without modifiers, the complete list is displayed. To
specify a search string, enter the XA command, followed by a space, and
then one or more characters. For example, if you only want to delete
action items starting with .H, type: XA .H and press the Enter key. Only
action items beginning with .H will be displayed.
Alarm/Event Functions Commands
The Alarm/Event Functions allow you to change or delete pending alarms
and events. After an alarm is issued, it is placed in the event table for
processing. You can list the pending actions contained in the Event
Table. In addition, you can generate an alarm or event as if the data had
been received on a host port or an internal event had occurred. This is
especially useful for testing and demonstration purposes.
List Alarms/Events – LE Command
The List Alarms/Events command allows you to list all pending actions
contained in the Event Table (the “event queue”).
Type LE at the system prompt and press the Enter key displays the List
Alarms/Events screen.
The complete list is displayed when only LE is entered with no modifiers.
Adding one or more characters after the LE command, separated by a
space can specify a search string.
For example, if you only want to display .HOURLY events, type:
>LE .H
and then press the Enter key.
112
Download from Www.Somanuals.com. All Manuals Search And Download.
If the list contains more than nine alarms/events, press the Enter key to
view the next nine alarms/events.
Generate Alarm/Event – GE Command
Testing the Action Routine or an alarm is an important part of the
process. The SAI command can be used to test an Action Routine. The
Generate Alarm/Event command allows you to test any alarm defined in
the Action Table. This command generates the Alarm or Event as if the
data had been received on the host port or an internal Event had
occurred. This command is useful for debugging or modifying Action
Tables.
Type GE followed by the event that you want the Terminal server to
generate. For example, type GE .AUTHFAIL. to generate the event
.AUTHFAIL. You can also generate a “long” event-for example,, GE
DTA005 1 0020 0031 7.
Alternatively, type GE and then enter the alarm/event to be generated at
the prompt. Note that “Enter alarm/event” limits the number of characters.
If you want to generate a “long” event, use the method described above.
Type the mnemonic for the alarm or event you want to have performed
and press the Enter key. The system will confirm that the alarm/event
was generated.
113
Download from Www.Somanuals.com. All Manuals Search And Download.
Delete Alarm/Event – XE Command
The Delete Alarm/Event command allows you to remove a pending action
from the Event Table. An access class of Sysop 2 or higher is required.
Type XE at the system prompt and press the Enter key to display the
Delete Alarm/Event screen. The system will then display the parameters
for that alarm/event, with the cursor appearing at the first parameter.
The Event Table is updated immediately as changes are made to it. To
delete an entry in the table, enter the number corresponding to that entry
at the Select # - prompt, then press the Enter key.
NOTE: The entire Event Table may be cleared by typing an asterisk
(*) instead of a number.
The system then displays the line for that action item and asks if you want
to delete that record. Initially, a No appears in the field. Press the space
bar to toggle the field to Yes and then press the Enter key. The system
confirms that you have deleted the record.
114
Download from Www.Somanuals.com. All Manuals Search And Download.
Internal Alarms and Events
In addition to the alarms generated by the Host or HP server system, the
Terminal server supports several internal events. Chapter 8 contains a
complete description of each internal event and standard Action Routines
and required parameters.
Event
Description
.AUTHFAIL
Event occurs upon receipt of a failed authentication
attempt.
.BAT48HIGH
.BAT48LOW
Event occurs when battery voltage crosses over
from an OK condition to a high voltage condition.
Use the SSA command to specify the upper limit.
Event occurs when battery voltage crosses over
from an OK condition to a low voltage condition.
Use the SSA command to specify the upper and
lower limits.
.BAT48OK
Event occurs when battery changes from a high or
low condition to an OK condition. Use the SSA
command to specify the upper and lower limits.
.BUFREADY
Event occurs when a buffer file has been closed
and is ready to be sent.
.CLKCHANGE Event indicating that the internal clock of the
Terminal server has changed.
.DISKCRIT
Event occurs when the RAMdisk reaches the
critical level assigned by the Set Disk Parameters
command.
115
Download from Www.Somanuals.com. All Manuals Search And Download.
Event
Description
.DISKFULL
Event occurs when the RAMdisk is full. All further
attempts to write to the disk will be unsuccessful.
.DTRHIGH.n
.DTRLOW.n
Event occurs when the host or HP server asserts
DTR (or host cable is connected); for example,
DTRHIGH1(indicates the host or HP server on
host port number 1 has asserted DTR or the host
cable is connected (# indicates host port number).
Event occurs when the host or HP server stops
asserting DTR or the physical connection is lost
between Terminal server and the host or HP server
(# indicates the host port number).
.HOURLY
Event occurs at the top of each hour.
.INTBATLOW
Event occurs when the internal battery status has
been changed from OK to Low. A “low” battery
status indicates that the voltage is less than 11
volts.
.INTBATOK
Event occurs when the internal battery status has
been changed from Low to OK. For the
.INTBATOK event to be generated, the voltage
must go from <11 volts to above 11.5 volts.
.LOGFULL
Created by LOGCHECK. Event occurs
automatically when the internal Log Buffer is full.
.MAXRETRY
Generated by PHONHOME, PHIRIS, PHSYSOP,
or PAGE according to Max.Retries system
parameter.
.MDMINITERR Event indicating a modem initialization error.
116
Download from Www.Somanuals.com. All Manuals Search And Download.
Event
Description
.MEMLOW
Event occurs on the hour if less than 4 KB are
available in the Terminal server variable area.
.MONTHLY
.NETDOWN
Event occurs once a month.
Event occurs after a preset length of time during
which no network activity is detected.
.NETUP
Event occurs when network activity is detected
following a period of inactivity.
.POWERUP
.PPPREQ
Event occurs when the system is powered up.
Event to trigger the dial-on-demand PPP link.
.POWERLOW Event indicating that the external power supply has
changed from OK to low.
.POWEROK
.RTSHIGH.n
Event indicating that the external power supply has
changed from low to OK.
Event indicating that the RS-232 signal RTS has
changed from Low to High. (# indicates host port
number)
.RTSLOW.n
Event indicating that the RS-232 signal RTS has
changed from High to Low. (# indicates host port
number).
.S#HIGH
.S#LOW
Event indicating that the 5 volt sensor has been
changed from OK to High.
Event indicating that the 5 volt sensor has been
changed from OK to Low.
117
Download from Www.Somanuals.com. All Manuals Search And Download.
Event
Description
.S#OK
Event indicating that the 5 volt sensor has been
changed from Low or High to OK.
.WEEKLY
Event occurs once a week, each Sunday at
midnight.
118
Download from Www.Somanuals.com. All Manuals Search And Download.
Action Routines
The Terminal server is pre-programmed with a number of Action Routines
that can be used when alarms or internal events occur.
Action Routine
AUXCC
Description
Not supported in this version of software.
Cancels a pending action.
CANCEL
*
Advances (or sets back) the time setting in
Terminal server by 1 hour and schedules
CLKSET for immediate execution.
CLKAHEAD\CLKBACK
CLKCHECK
Checks if current date is the first Sunday in
April or last Sunday in October. If it is,
schedules either a CLKAHEAD or
CLKBACK to occur at 2:00 am.
DOLIST
LOG
Causes a list of Action Routines to be
performed.
Creates a log entry that describes the
event.
LOGCHECK
Checks to see if the Log buffer has
reached a specified threshold. If Log has
exceeded the threshold, a .LOGFULL
event is generated.
NOACTION
PAGE
Creates "Event: " Log entry.
Calls a pager number and delivers a
message.
PHIRIS
Delivers an alarm message to IRISSM. Not
supported in this version of software.
119
Download from Www.Somanuals.com. All Manuals Search And Download.
Action Routine
PHONHOME
Description
Places a call to the maintenance-reporting
center.
PHM2000
PHPPP
Not supported in this version of software.
Initiates a demand-dial PPP link
PHSYSOP
Places a call to the maintenance center
and starts a Sysop session.
REMINIT
Performs the Remote Initialization function.
Not supported in this version of software.
Schedules an action for a later time.
RUNM2000
SCHEDULE
SETHP
Changes the setting of the Host
Processing Flag. (see SHP system
function command).
SNMPTRAP
Sends an SNMP trap to remote managers
through the Ethernet or PPP link.
* Hidden routines (These routines are not offered by pressing the space
bar, but is valid if entered manually)
120
Download from Www.Somanuals.com. All Manuals Search And Download.
8. ACTION AND EVENT
ROUTINES
What This Chapter Contains
The Terminal server can be programmed to respond to a particular
event or trigger. There are two types of events: Internal and External.
An internal event is generated by the Terminal server automatically in
response to a particular condition, such as a failed authentication
attempt or a low battery. An external event is an alarm received from a
device connected to the Terminal server. Internal events are listed in
this chapter. The user defines all external events and the format must
be as for internal events.
The action that the Terminal server initiates in response to an event is
specified by the Action Routine associated with that event in the Action
Table. A set of Action Routines is included with the Terminal server. A
description and an example of each Action Routine are included in this
chapter.
•
•
Description of Events
Description of Action Routines
NOTE: To see alarms whenever they occur (even if there is not match in
the Action Table), type LOGE ON to select LOG Events ON. To revert
to normal operation in which alarms are not logged unless they match
an entry in the Action Table, type LOGE OFF.
121
Download from Www.Somanuals.com. All Manuals Search And Download.
Internal Events
.AUTHFAIL Internal
Event
The .AUTHFAIL internal event occurs each time there is a failed attempt
at authentication during a user logon. The format of this internal event
is:
.AUTHFAIL Parameter 1 Parameter 2 Parameter 3
Where:
Parameter 1 - authentication failure code (typically used as a
parameter associated with the PAGE Action Routine.)
The codes for this parameter are listed in Table 10-1.
Parameter 2 - User ID
Parameter 3 - text description of the reason for the authentication
failure.
Note: PassKey is not supported with this version of the Central
Web Console.
Code Description
Code Description
0010
0011
0012
0032
Invalid User ID
Blocked user
Wrong time
Invalid PassKey response
0050
0053
0054
Invalid password #1
Call Back unsuccessful
Invalid password #2
122
Download from Www.Somanuals.com. All Manuals Search And Download.
.BUFREADY
This alarm is sent when a buffer file is closed and is ready to be sent.
Alarm/Event
Action Routine
Parameters
Comments
.BUFREADY
PAGE
5551212,1234
File ready
.CCLERROR
The .CCLERROR event occurs automatically if the Terminal server
detects an error in its internal program, or in a user-written Action
Routine. Upon generation of a .CCLERROR event, an entry is made in
the Error Log. This can be extracted later using the Display Error Log
(DER) command.
Although this event is not expected to occur regularly (especially if
Action Routines are properly tested), the occurrence of the .CCLERROR
event might indicate that the Terminal server is not performing properly
and should, therefore, be investigated. To insure proper processing of
this event, associate it with a well-tested Action Routine.
Example:
Alarm/Event
Action Routine
Parameters
Comments
.CCLERROR
PHONHOME
This example uses the default phone number to call the maintenance-
reporting center.
123
Download from Www.Somanuals.com. All Manuals Search And Download.
.CLKCHANGE
The .CLKCHANGE alarm is generated when the internal clock of the
Terminal server has been changed. This alarm could be the result of
changing the clock for Daylight Saving Time using the Set Date and
Time (SDT) command.
Alarm/Event
Action Routine
Parameters
Comments
.CLKCHANGE
SNMPTRAP
1
Clock Reset
.DAILY
This event occurs automatically each day at midnight. This event can
also be used to schedule an action for some point later in the day.
Alarm/Event Action Routine Parameters
Comments
.DAILY
DOLIST
.DAILY-1
.DAILY-2
SCHEDULE
CLKCHECK
08:00 PHONHOME
In this example, the routine associated with .DAILY-1 performs a daily
"check-in" with the maintenance center at 8 AM. Units that do not
"check-in" may have a problem that affects their ability to report alarms.
Additionally, the CLKCHECK routine associated with .DAILY-2 checks
for a change from standard to daylight savings time at midnight, or vice-
versa.
124
Download from Www.Somanuals.com. All Manuals Search And Download.
.DISKCRIT
The RAMDISK has reached a critical level assigned in the Set Disk
Parameters (SDP) menu.
Alarm/Event
.DISKCRIT
Action Routine
DOLIST
Parameters
Comments
.DISKCRIT-1
.DISKCRIT-2
PHONHOME
SCHEDULE
30 PHONHOME
In the example above, the .DISKCRIT alarm results in the a call to the
default phone number specified in the system parameters. If the alarm is
not canceled, the phone number will be called again in 30 minutes.
.DISKFULL
This alarm is generated when the RAMdisk is full. No additional
information can be stored on the disk. If this occurs, data from host ports
stored in buffer files will be lost.
Alarm/Event
.DISKFULL
Action Routine
DOLIST
Parameters
Comments
.DISKFULL-1
.DISKFULL-2
PHONHOME
SCHEDULE
30 PAGE
In this example, the .DISKFULL alarm results in a call to the phone
number set in the System Parameters (SSP) menu. If the alarm is not
canceled with 30 minutes, a page is sent to the default pager number.
125
Download from Www.Somanuals.com. All Manuals Search And Download.
.DTRHIGH and
.DTRLOW
or
.DTRHIGH.n and .DTRLOW.n
internal events
where n = host port number
The .DTRLOW event occurs automatically on the high to low transition
of the DTR signal on a Host port. The .n indicates the port number. This
may be caused by a cable being removed from a port or by the attached
equipment being switched off.
The .DTRHIGH event occurs automatically on the low to high transition
of this same signal. This can be caused by attaching a cable to a port.
These events can be used to detect if the HP server or host has lost
power, or if the Terminal server has been disconnected from the
maintenance port.
Alarm/Event
.DTRLOW
.DTRHIGH
Action Routine
SCHEDULE
CANCEL
Parameters
2 PHONHOME
.DTRLOW
Comments
This example schedules a PHONHOME to report the alarm two minutes
after DTR is lost (transitions from high to low). If DTR is re-established
(DTR goes high), the .DTRHIGH alarm occurs and cancels the action
PHONHOME Action Routine. Since no port number is specified, this
event will occur when DTR is lost on any port.
126
Download from Www.Somanuals.com. All Manuals Search And Download.
Alarm/Event
Action Routine
Parameters
Comments
.DTRLOW.1
PHONHOME
This example initiates a PHONHOME if the Data Terminal Ready (DTR)
signal is lost only on host port 1.
.HOURLY
This event occurs automatically at the beginning of each hour (for
example, 1:00, 2:00, 3:00, etc.). Actions assigned to this event are
performed every hour on the hour.
Alarm/Event
Action Routine
Parameters
Comments
.HOURLY
LOGCHECK
This example checks if the log buffer is approaching its limit. If that is
the case, the internal event .LOGFULL is generated.
.INTBATLOW
The status of the internal battery has changed from OK to low.
Alarm/Event
Action Routine
Parameters
Comments
.INTBATLOW
PHONHOME
In this example, the PHONHOME Action Routine is initiated when the
internal battery is low. After the alarm is received, a technician may be
sent to the site.
127
Download from Www.Somanuals.com. All Manuals Search And Download.
.INTBATOK
The .INTBATOK alarm is generated when the status of the internal
battery changes from low to OK. This indicates that the internal battery
has been recharged or replaced.
Alarm/Event
Action Routine
Parameters
Comments
.INTBATOK
CANCEL
.INTBATLOW
In the above example, the status of the internal battery has changed
from low to OK, resulting in the canceling of the phone call to the
maintenance center for the battery low alarm.
.LOGFULL
This event is a result of the LOGCHECK Action Routine when it detects
that the LOG has passed a specified capacity threshold. In order for the
.LOGFULL event to occur, the LOGCHECK routine must be associated
with some regularly occurring event (such as .DAILY or .HOURLY).
Example:
Alarm/Event
Action Routine
Parameters
Comments
.LOGFULL
PHSYSOP
555-4321,3
This example initiates a call to 555-4321 and then establishes an
access class 3 Sysop session. The computer at 555-4321 could be
programmed to receive the Site ID, extract the LOG from the Terminal
server, and then issue the Clear Log History (CLH) command.
128
Download from Www.Somanuals.com. All Manuals Search And Download.
.MAXRETRY
This event is generated by PHONHOME, PHSYSOP, or PAGE. It will
occur after the value entered for the Max. Retries system parameter is
surpassed.
Example:
Alarm/Event
Action Routine
Parameters
Comments
.MAXRETRY
PHONHOME
2
This example initiates a PHONHOME to Home Phone Number 2, as
defined in the System Parameter table, when the maximum retry
counter has been exceeded.
.MDMINITERR
This alarm is generated when a modem initialization error occurs.
Alarm/Event
Action Routine
Parameters
Comments
.MDMINITERR
SNMPTRAP
1
Modem error
.MEMLOW
The alarm .MEMLOW is generated on the hour if fewer than 4KB (4096
bytes) are available on the Terminal server variable area.
Example:
Alarm/Event
Action Routine
Parameters
Comments
.MEMLOW
PHONHOME
Memory low
129
Download from Www.Somanuals.com. All Manuals Search And Download.
In this example, the Terminal server will call the default number
specified in the System Parameters screen when the remaining space
on the Terminal server variable area is 4 KB or less.
NOTE: .MEMLOW does not detect low memory on the RAMDISK.
.MONTHLY
This event occurs automatically every month at the designated time.
Example:
Alarm/Event
Action Routine
Parameters
Comments
.MONTHLY
PHSYSOP
555-1234 1
In the example the Terminal server will, once a month, phone the
number specified in the parameters field and initiate an access class 1
Sysop session. The computer at 555-1234 could be programmed to
receive the Site ID, request a host session and download the current
configuration of the HP server to ensure that maintenance records are
up to date.
.NETDOWN and
.NETUP
The .NETDOWN alarm is issued after a preset length of time during
which no network activity is detected. When network activity is detected,
the .NETUP alarm is issued. The determination of network up and down
is based on detected traffic on the Ethernet. The time interval for non-
activity ranges from 1 to 255 seconds, and can be selected by the user.
To do this, enter the SNP command and select option. At the Network
Loss Alarm Delay Time, enter the length of time during which no
network activity is detected.
130
Download from Www.Somanuals.com. All Manuals Search And Download.
Alarm/Event
.NETDOWN
.NETUP
Action Routine
SCHEDULE
CANCEL
Parameters
5 PHONHOME
.NETDOWN
Comments
In this example, the alarm .NETDOWN is generated, the default
number specified by the PHONHOME parameter will be called 15
minutes after the .NETDOWN alarm is received. If a .NETUP alarm
occurs, the .NETDOWN alarm will be canceled.
.POWERLOW
The .POWERLOW event is generated when the extern power
connection has changed from OK to low. In the example below, the
.POWERLOW event results in a call to the maintenance center.
Alarm/Event
.POWERLOW
Action Routine
PHONHOME
Parameters
2
Comments
.POWEROK
The .POWEROK event is generated when the external power
connection of the Terminal server has changed from low to OK. This
event can be generated when the power cable to the Terminal server
has been reconnected.
Alarm/Event
.POWERLOW
.POWEROK-1
Action Routine
PHONHOME
CANCEL
Parameters
2
.POWERLOW
Comments
In the example above, the .POWEROK event results in the canceling
the call to the maintenance center.
131
Download from Www.Somanuals.com. All Manuals Search And Download.
.POWERUP
The .POWERUP event occurs automatically whenever the Terminal
server is powered up. This might indicate a new installation, recovery
from a power loss, or that the unit was moved to a new location.
Example:
Alarm/Event
Action Routine
Parameters
Comments
.POWERUP
PHONHOME
This example causes the Terminal server to report to the maintenance
center that the unit has been reset. If desired, someone can then
investigate the reason for the .POWERUP event.
.PPPREQ
This event is triggered when a PPP link is needed to send an SNMP
trap or to send a file via FTP. It is usually associated with the phone
PPP (PHPPP) Action Routine.
Alarm/Event Action Routine Parameters Comments
.PPPREQ
PHPPP
5551212
Create the PPP
link.
The telephone number can be specified directly, or any of the default
telephone numbers specified in the system parameters can be
referenced. PHPPP assumes that there is no firewall or security on the
remote access device. If this is not the case, contact your Hewlett-
Packard Service Representative.
132
Download from Www.Somanuals.com. All Manuals Search And Download.
.RTSLOW.n
.RTSHIGH.n
The .RTSHIGH event is generated when the RS-232 RTS signal has
changed from low to high. The .RTSLOW event occurs from the RS-232
RTS signal has changed from high to low. The .n indicates the port
number.
Alarm/Event
.RTSLOW
.RTSHIGH
Action Routine
SCHEDULE
CANCEL
Parameters
2 PHONHOME
.RTSLOW
Comments
This example schedules a PHONHOME to report the alarm two minutes
after RTS is lost (transitions from high to low). If RTS is re-established
(RTS goes high), the .RTSHIGH alarm occurs and cancels the action
PHONHOME Action Routine. Since no port number is specified, this
event will occur when RTS is lost on any port.
Alarm/Event
Action Routine
Parameters
Comments
.RTSLOW.2
PHONHOME
This example initiates a PHONHOME if the Ready to Transmit signal
(RTS) is lost only on host port 2.
.WEEKLY
This event occurs automatically every week on Sunday evening at
midnight.
133
Download from Www.Somanuals.com. All Manuals Search And Download.
Examples:
Alarm/Event Action
Parameters
Comments
Routine
.WEEKLY
DOLIST
.WEEKLY.2
SCHEDULE
1 08:00
PHONHOME
.WEEKLY.3
SCHEDULE
5 08:00
PHONHOME
This example schedules a "check-in" with the maintenance center on
Monday, and Friday of each week at 8:00 AM.
134
Download from Www.Somanuals.com. All Manuals Search And Download.
Action Routines
CANCEL
This Action Routine cancels a scheduled action corresponding to a
particular event containing particular parameters. When multiple
pending events can be canceled, the one first into the queue is
canceled.
Format:
CANCEL
Resource Required: None
st
Parameters:
ASSOCIATED EVENT, 1 Match
nd
th
Parameter, 2 Match Parameter,⋅⋅⋅N
Match parameter
Associated Event: Event mnemonic of the event to be
canceled.
Parameters to be matched against Event: As many
parameters as necessary may be specified. The position of a
parameter represents the position in the event to be matched.
Blank parameters are "wild cards ". Parameters are separated
by commas.
Examples:
Alarm/Event
.DTRLOW
Action Routine
CANCEL
Parameters
.DTRHIGH
Comments
This example will cancel the action associated with the event .DTRLOW.
135
Download from Www.Somanuals.com. All Manuals Search And Download.
Alarm/Event
Action Routine
Parameters
Comments
DTA007
CANCEL
DTA005, , ^2
This example will cancel the action associated with event DTA005 if the
second parameter in the DTA007 message is equal to the second
parameter in the message associated with this action.
Alarm/Event
Action Routine
Parameters
Comments
DTA007
CANCEL
DTA005, , ,87
This example will cancel the action associated with event "DTA007" if
the third parameter in the DTA007 message equals 87.
CLKAHEAD and
CLKBACK Action
Routines
The CLKAHEAD Action Routine advances the Terminal server time by
one hour.
The CLKBACK Action Routine sets the Terminal server time back by
one hour.
CLKCHECK Action
Routine
The CLKCHECK Action Routine checks to see if the current date is
equal to the first Sunday in April or the last Sunday in October. If it is
case, the Terminal server will schedule a CLKAHEAD or CLKBACK
routine for 2 am.
136
Download from Www.Somanuals.com. All Manuals Search And Download.
Attaching this Action Routine to the event .DAILY will take care of
standard-to-daylight and daylight-to-standard conversion.
Format:
CLKCHECK
None
Resource Required:
Parameters:
Example:
None
Alarm/Event
.DAILY
Action Routine
CLKCHECK
Parameters
Comments
DOLIST Action Routine
The DOLIST Action Routine causes a list of actions to be performed.
The Terminal server scans the Action Table looking for event
mnemonics that match or partially match parameter one.
Format:
DOLIST Name of list
name of list
Parameters:
The parameter is an alarm match string that is used as a criterion to
search the action table for actions to be performed. If it is omitted, then
the instigating event, itself, is used as the match criterion.
137
Download from Www.Somanuals.com. All Manuals Search And Download.
Examples:
Alarm/Event
.WEEKLY
Action Routine
DOLIST
Parameters
.OOPS
Comments
This example, on a weekly basis, performs all actions relating to events
that begin with the event .OOPS.
Alarm/Event
Action Routine
Parameters
Comments
.DAILY
DOLIST
This example performs all actions whose events match the instigating
event. In the example, if the Action Table contains entries for .DAILY-1
⋅⋅ .DAILY-XX, then the actions associated with those events will be
performed.
LOG Action Routine
The LOG Action Routine creates a log entry describing the event. The
Terminal server takes no further action.
Format:
LOG
None
None
Resource Required:
Parameters:
Example:
Alarm/Event
.CDR.AREA1
Action Routine
LOG
Parameters
Comments
138
Download from Www.Somanuals.com. All Manuals Search And Download.
This example logs the event .CDR.AREA1 into the terminal server log-
history file.
LOGCHECK Action
Routine
The LOGCHECK Action Routine checks to see if the log buffer has
reached a specified threshold. If the log has exceeded this threshold
then the event .LOGFULL is generated.
Format:
LOGCHECK
Parameters:
Examples:
Percent full threshold (Default is 80)
Alarm/Event
.DAILY
Action Routine
LOGCHECK
Parameters
Comments
In this example, the log buffer is checked to see if its threshold of
80% has been exceeded.
Alarm/Event
Action Routine
Parameters
Comments
.DAILY
LOGCHECK
50
This example checks if the log buffer has exceeded a threshold
of 50%.
NOTE: The event itself (.DAILY in this example) will generate log
data, thereby tending to fill the log.
139
Download from Www.Somanuals.com. All Manuals Search And Download.
NOACTION Action
Routine
The NOACTION Action Routine creates an "Event: " log entry, but
otherwise does nothing.
Example:
Alarm/Event
Action Routine
Parameters
Comments
.LOGI
NOACTION
PAGE Action Routine
The PAGE Action Routine calls a numeric pager (beeper) and delivers a
numeric message.
Format:
PAGE PAGER PHONE NUMBER,
Message
Resource Required:
Parameters:
Modem
phone number, message
• Pager Phone Number - Phone number of pager (optional)
• Message - Message to be delivered (optional)
If either parameter is omitted, the default value (system parameter) will
be used. Pager dialing and message delivery are controlled via the
Pager Dial String (modem parameter). Refer to the Set Modem Port
Parameters (SM) Command ("Modem Port Parameters" in Chapter 5).
NOTE: "@" waits for 5 seconds of silence before transmitting. If
your pager system will not support this, modify the string to use
140
Download from Www.Somanuals.com. All Manuals Search And Download.
commas (fixed delay period) instead. When setting up for the
"PAGE" action routine or setting up a user for pager
authentication, the Terminal server uses the modem pager
template in the modem parameters section. Issue a "SM
command" and change the Pager command. The correct settings
depend on the pager type and the delays from that particular site.
Some specific examples:
Straight numeric pager
ATDT ### @ MSG ;|
or
ATDT ###,,,,, MSG ;|
Skytel pager with direct 1800 number access:
ATDT ### ,,,,,1#,MSG##;|
Skytel digital pager without direct 1800 access:
ATDT 18007597243,,,,,###,#MSG## ;|
Skytel text pager with direct 1800 access, but need a 9 to get an outside
line:
ATDT 9,###,,,,,1#,MSG## ;|
The way to determine the correct number of commas needed is
to dial the number manually. Count how many seconds it takes
for the pager service to answer, and how many seconds until the
pager system drops the call if nothing is entered. Split the
difference and figure the correct number of commas when the
comma is set to 2-second intervals. For example, if the counts
are 7 seconds, and 12 seconds respectively, set the commas for
9.5 seconds, round up to 10 seconds, and divide by 2
seconds/comma = 5 (five commas).
141
Download from Www.Somanuals.com. All Manuals Search And Download.
Examples:
Alarm/Event
.AUTHFAIL
Action Routine
PAGE
Parameters
Comments
This example calls a pager at the default number, when an authorization
failure occurs, and delivers the default message to the pager.
Alarm/Event Action Routine Parameters
.BAT48LOW PAGE 5551324,9990001
Comments
This example calls a pager at the number 555-1324 and delivers the
message "9990001" when the battery voltage falls below the set limit.
PHONHOME Action
Routine
The PHONHOME Action Routine places a call to a specified number
and delivers a Terminal server alarm message when the call is
complete.
Format:
PHONHOME
Modem
Resource Required:
Parameters:
phone number
1 to 3 - For home phone number 1, 2, or 3 (from system
parameters)
or
Phone Number to call - Phone number to call. If omitted, Home
Phone Number 1 is used.
Examples:
Alarm/Event
.HOURLY-2
Action Routine
PHONHOME
Parameters
Comments
142
Download from Www.Somanuals.com. All Manuals Search And Download.
This example calls Home Phone Number 1 (default) when the
.HOURLY-2 internal event occurs.
Alarm/Event
Action Routine
Parameters
Comments
DTI030
PHONHOME
7324944440
TRUNK DOWN
This example places a call to phone number (732) 494-4440
when the external event DTI030 occurs.
PHPPP Action Routine
The PHPPP Action Routine initiates a demand-dial PPP link.
Format:
PHPPP
Resource required:
Parameters:
Modem
phone number
1 - Phone number to dial (1, 2, or 3 are home numbers).
Example:
Alarm/Event
.PPPREQ
Action Routine
PHPPP
Parameters
5551212
Comments
The PHPPP establishes a PPP link to a remote network. The TCP/IP
applications can then be executed.
PHSYSOP Action
Routine
The PHSYSOP Action Routine is the same as PHONHOME except at
the end of the report, the remote terminal is placed in a Sysop session
as user MDM_Default.
143
Download from Www.Somanuals.com. All Manuals Search And Download.
Format:
PHYSOP PHONE NUMBER TO CALL
Modem
Resource Required:
Parameters:
phone number, access class
1 to 3 - For home phone number 1, 2, or 3 (from system
parameters)
or
Phone Number to call - Phone number to call. If omitted, Home
Phone Number 1 is used.
Access class of Sysop session - Defaults to 3 (Sysop3). May
be specified as 1 (Sysop 1), 2 (Sysop 2), 3 (Sysop 3), or 4
(Master).
Examples:
Alarm/Event
.MAXRETRY
Action Routine
PHSYSOP
Parameters
5551212, 2
Comments
This example telephones the Sysop at 555-1212 and places the
terminal in a Level 2 Sysop session when the .MAXRETRY
internal event occurs.
Alarm/Event
Action Routine
Parameters
Comments
DTI030
PHSYSOP
3,1
This example phones the Sysop at Phone Home Number 3 and
places the terminal in a Level 1 Sysop session when the DTI030
external event occurs.
144
Download from Www.Somanuals.com. All Manuals Search And Download.
SCHEDULE Action
Routine
The SCHEDULE Action Routine schedules another Action Routine to be
performed now, or at some later date or time.
Format:
SCHEDULE
None
Resource Required:
Parameters:
Date or Time:
• Date or "AM" (optional) - Either a date in the format
mm/dd/yy, or a number of days from today. If specified as
a number of days, the Time parameter must also be
included.
If "AM" is specified, and the current time is greater than the
"Start of Overnight Period" in the system parameters, the
call is scheduled for the "AM Report Time." If the current
time is between the AM Report Time and the Start of
Overnight Period, then the action is scheduled for now.
If "AM" is specified, omit the Time parameter.
If Date is omitted, action is scheduled for this day.
• Time (optional)
Either a time in the format hh:mm, or a number of minutes
from the current time.
Event associated with action to be scheduled: - Name of
Action Routine to be scheduled.
Action Routine Parameters: - Parameters to be passed to
scheduled Action Routine.
145
Download from Www.Somanuals.com. All Manuals Search And Download.
Examples:
Alarm/Event
CED063
Action Routine
SCHEDULE
Parameters
AM PHONHOME
Comments
This example schedules a PHONHOME for now or the next AM
report when the external event CED063 occurs.
Alarm/Event Action Routine Parameters
Comments
CED063
SCHEDULE
15 PHONHOME
5551212
This example schedules a PHONHOME to telephone number
555-1212 for 15 minutes from now.
Alarm/Event Action Routine Parameters
CED063 SCHEDULE 23:00 SETHP 3
Comments
This example sets the Host Processing Flag to 3 at 11 PM
tonight.
Alarm/Event Action Routine Parameters
CED063 SCHEDULE 2 0 PHYSYSOP 2,3
Comments
This example schedules a PHONHOME for this time two days
from now using Phone Home Number 2, and then establishes a
Level 3 Sysop session.
Alarm/Event Action Routine Parameters
Comments
CED063
SCHEDULE
07/01/96 12:00
PHONHOME
This example schedules a PHONHOME for 12:00 on July 1,
1996.
146
Download from Www.Somanuals.com. All Manuals Search And Download.
Alarm/Event Action Routine Parameters
Comments
CED063
SCHEDULE
1 18:00
DOLIST.SPECIAL
This example schedules a DOLIST for 6 PM tomorrow.
SETHP Action Routine
The SETHP Action Routine changes the setting of the Host Processing
Flag.
Format:
SETHP PROCESSING FLAG VALUE
None
Resource Required:
Parameters:
Host Processing Flag Value - 1, 2, 3, or
5
Example:
Alarm/Event Action Routine Parameters
.CCLERROR SETHP
Comments
3
This example disables all Action Routines, including those of the
Terminal server.
SNMPTRAP
Sends an SNMP trap to remote managers through the Ethernet or PPP
link.
Parameters
1 - Sets trap level (1-10) This parameter is the enterprise specific
trap ID and depends on the trap format (Nortel or Standard).
147
Download from Www.Somanuals.com. All Manuals Search And Download.
Example:
Alarm/Event
ERRORA21
Action Routine Parameters
SNMPTRAP
Comments
3
148
Download from Www.Somanuals.com. All Manuals Search And Download.
GLOSSARY OF COMMAND
REFERENCES
Action And Alarm Functions
COMMAND
DESCRIPTION
ACCESS LEVELS
AA
CA
GE
LA
Add action item
Change action item
Generate event
List action items
List events
Master, Sysop 3
Master, Sysop3
Master, Sysop 3
All Sysop levels
LE
All Sysop levels
SAI
XA
XE
Schedule action item
Delete action item
Delete event
Master, Sysop 3, Sysop 2
Master, Sysop 3
Master, Sysop 3, Sysop 2
System Functions
COMMAND
DESCRIPTION
ACCESS LEVELS
DCC
Display contact inputs
All Sysop levels
Master, Sysop 3
DCCA/DCCB/ Display contact inputs for
DCCC
DSA
DSI
extended banks
Display sensor alarms
Display sensor inputs
All Sysop levels
All Sysop levels
DSP
RRLY
SDT
Display system parameters All Sysop levels
Reset relays
Master, Sysop 3
Master, Sysop 3
Set date and time
149
Download from Www.Somanuals.com. All Manuals Search And Download.
SHP
SRLY
SSA
SSP
Set host processing flag
Set relays
Set sensor alarms
Set system parameters
Master, Sysop 3
Master, Sysop 3
All Sysop levels
Master, Sysop 3
User Functions
COMMAND
DESCRIPTION
ACCESS LEVELS
AU
CU
DU
LU
XU
Add users
Master
Change users
Display users
List users
Master, Sysop 3, Sysop 2
Master, Sysop 3, Sysop 2
Master, Sysop 3, Sysop 2
Master
Delete users
Log Functions
COMMAND
DESCRIPTION
ACCESS LEVELS
AH
Access history
Clear error log
Clear log history
Display error log
Display failure history
Display log history
All Sysop levels
Master
Master
All Sysop levels
All Sysop levels
All Sysop levels
CER
CLH
DER
FH
LH
150
Download from Www.Somanuals.com. All Manuals Search And Download.
File Functions
COMMAND
DESCRIPTION
ACCESS LEVELS
CD
Change directory
Compress a file
Copy a file
Display disk parameters
Delete a file
Master, Sysop 3
Master
Master
Master, Sysop 3
Master
COMP
COPY
DDP
DEL
DIR
MD
List files in directory
Make a directory
Move a file
Receive a file
Remove a directory
Rename a file
Set disk parameters
Sends a file to another
device
Master
Master
Master
Master
Master, Sysop 3
Master
Master
MOVE
RCV
RD
REN
SDP
SEND
Master
UCOMP
VIEW
Uncompress a file
View a file
Master
Master
Buffer Functions
COMMAND
DESCRIPTION
ACCESS LEVELS
BST
Display host buffer details Master, Sysop 3
CLBUF
OBST
OPBUF
SEBUF
Close buffer file
Master
Master
Master
Master
Open buffer status
Open host buffer file
Send all buffer files to
another device
SWBUF
Switch buffer files
Master
151
Download from Www.Somanuals.com. All Manuals Search And Download.
Session Control Functions
COMMAND
DESCRIPTION
ACCESS LEVELS
CON
DIS
JS
VS
VT
Connect to port
All Sysop levels
All Sysop levels
All Sysop levels
All Sysop levels
All Sysop levels
Disconnect from S2K
Join host session
View host session
VT100 on and off`
Port Control Functions
COMMAND
DESCRIPTION
ACCESS LEVELS
DA/DM/DH/DT Display
AUX/Modem/Host/Telnet
port parameters
Display network
parameters
DNP
All Sysop levels
DNS
DPS
PING
PPP
PST
RES
Display network status
Display port signals
Query remote device
Start PPP session
Port status
All Sysop levels
All Sysop levels
Master
All Sysop levels
All Sysop levels
All Sysop levels
Reset port
SA/SM/SH/ST Set
AUX/Modem/Host/Telnet
port parameters
SNP
STARTNET
Set network parameters
Start up the network
Master
Master
152
Download from Www.Somanuals.com. All Manuals Search And Download.
INDEX
A
C
AA - Add Action Item command, 105
access class, 17, 20
Action and Alarm Functions Menu, 105
action routines
CA - Change Action Item command, 108
CCL - Communications Control
Language, 35, 37
CD command, 59
commands
CANCEL, 135
CLKAHEAD and CLKBACK, 136
CLKCHECK, 136
DOLIST, 137
AA - Add Action Item, 105
AU - Add User, 19
CA - Change Action Item, 108
CD, 59
LOG, 138
LOGCHECK, 139
NOACTION, 140
PAGE, 140
PHONHOME, 142
PHPPP, 143
COPY, 59
CU - Change User, 28
DDP - Display Disk Parameters, 64
DEL, 59
DIR, 58
PHSYSOP, 143
SCHEDULE, 145
DM - Display Modem Port
Parameters, 76
SETHP, 147
DNS, 86
SNMPTRAP, 147
action table, 95
DU - Display a User Record, 27
GE - Generate Event, 102, 113
LA - List Action Items, 106
LE - List Alarms/Events, 113
LU - List Users, 23
MD, 58
MOVE, 60
PING, 87
RCV, 60
RD, 59
alarms/events, 97
matching alarms, 98
planning, 100
testing routines, 102
alarm management, 11
alarm processing, 9
alarm worksheet, 100
Alarm/Event Functions commands,
113
REN, 60
AU - Add User command, 19
authorized users, 15
SAI - Schedule Action Item, 109
SDP - Set Disk Parameters, 64
SEBUF, 71
SEND, 60
SH, 66
B
SM - Set Modem Port Parameters, 77
SSP, 35
VER, 2
VIEW, 60
XA - Delete Action Item, 111
XE - Delete Alarm/Event, 114
buffer files, 66
naming convention, 61
buffering data
automatically, 66
manually, 68
153
Download from Www.Somanuals.com. All Manuals Search And Download.
XU - Delete User, 25
.CCLERROR, 123
.CLKCHANGE, 124
.DAILY, 124
.DISKCRIT, 63, 125
.DISKFULL, 125
Comments (action routine), 106
Comments (user maintenance), 21, 31
configuration files, 88
COPY command, 59
CU - Change User command, 28
.DTRHIGH and .DTRLOW, 126
.DTRHIGH.n and .DTRLOW.n, 126
.HOURLY, 127
.INTBATLOW, 127
.INTBATOK, 128
D
data buffering
.LOGFULL, 128
overview, 9
DDP - Display Disk Parameters
command, 64
.MAXRETRY, 129
.MDMINITERR, 129
.MEMLOW, 129
default settings, 93
.MONTHLY, 130
AUX port parameters, 93
host port parameters, 94
modem port parameters, 93
DEL command, 59
.NETDOWN and .NETUP, 130
.POWERLOW, 131
.POWEROK, 131
.POWERUP, 132
.PPPREQ, 132
.RTSHIGH.n, 133
.RTSLOW.n, 133
DIR command, 58
Displaying configuration information, 2
DM - Display Modem Port Parameters
command, 76
.WEEKLY, 133
DNS command, 86
DU - Display a User Record command,
27
L
LA - List Action Items command, 106
LE - List Alarms/Events command,
113
log functions, 12
LU - List Users command, 23
E
editing modes. See modes
entering parameters, 5
F
M
file command summary, 58
FTP
MD command, 58
menu descriptions, 3
modem port parameters
DM - Display Modem Port
Parameters, 76
overview, 75
SM - Set Modem Port Parameters, 77
modes
using FTP to send files, 48, 69
G
GE - Generate Event command, 102,
113
setting in system parameters, 7
TTY mode, 7
VT-100 mode, 7
I
internal alarms and events
.AUTHFAIL, 122
MOVE command, 60
.BUFREADY, 123
154
Download from Www.Somanuals.com. All Manuals Search And Download.
SDP - Set Disk Parameters command,
64
N
SEBUF command, 71
security
network capabilities, 10
Network Loss Alarm Delay Time, 130
network parameters, 38
default gateway address, 42
IP address, 41
access classes, 17
authentication, 20
block access, 20
limiting the number of sessions, 20
PPP address, 41
overview, 9
network status, 86
password, 22
alarms, 86
user, 20
querying remote nodes, 87
SEND command, 60
SH command, 66
site name, 36
P
SM - Set Modem Port Parameters
command, 77
baud rate settings, 77
SNMP
Pager Dial String, 140
password/callback, 23
password/callback authentication
method, 22
delivering traps, 45
MIBs, 43
object identifier, 43
overview, 42
Passthru, 23
regular callback, 22
PING command, 87
PPP link, 37
setting SNMP parameters, 46
Terminal Server as a proxy agent, 42
trap delivery, 38
SNMP trap delivery, 45
R
trap format, 45, 48
software upgrade, 37
SSP command, 35
System Functions menu, 34
RAMdisk
/LOGFILES, 64
/SENTFILES, 64
organization, 61
setting protection parameters, 63
RCV command, 60
RD command, 59
REN command, 60
resetting the Terminal Server, 38
RIP protocol, 39
U
User Maintenance Functions
commands, 18
User Maintenance Functions Menu, 17
routine parameters, 106
V
VER command, 2
VIEW command, 60
S
SAI - Schedule Action Item command,
109
event, 110
X
XA - Delete Action Item command, 111
XE - Delete Alarm/Event command, 114
XU - Delete User command, 25
parameters, 109
schedule time, 110
155
Download from Www.Somanuals.com. All Manuals Search And Download.
156
Download from Www.Somanuals.com. All Manuals Search And Download.
|