Using Technician InterfaceSoftware Router Software Version 10.0Site Manager Software Version 4.0Software Version BNX 6.0Site Manager Software Versio
xManaging Secure Mode ...8-49Setting the Router to Oper
Using Technician Interface Software4-12Transferring a FileDepending on conditions existing within your network, you can transfer files between Bay Netw
Managing a NonVolatile File System4-13In-Band File TransfersThe tftp command invokes the Trivial File Transfer Protocol (TFTP) software to transfer a
Using Technician Interface Software4-14If the destination system has a memory card to which you are transferring a file, we recommend that you compact
Managing a NonVolatile File System4-15Examples:After transferring the file, you can copy it at the source to its original name. If the new file at the d
Using Technician Interface Software4-16Out-of-Band File TransfersAppendix B in this guide describes how to transfer files out-of-band (via the dial te
Managing a NonVolatile File System4-17Deleting a FileUse the delete command to delete files that you specify. You can use the wildcard characters * and
Using Technician Interface Software4-18Compacting File SpaceWhen you delete a file from a memory card, the file and its data become inaccessible and eve
Managing a NonVolatile File System4-19Formatting a Memory CardUse the format command to erase all files on a memory card and format it, where <vol&g
Using Technician Interface Software4-20Enter the following commands to partition the memory card or SIMM or delete a memory partition:partition create
5-1Chapter 5Managing a DOS File SystemYou can use the Technician Interface to manage DOS files on a Bay Networks router. This chapter is intended only
xi Appendix A Using the Bay Networks Router MIB Overview ...
Using Technician Interface Software5-2OverviewThe DOS file system on the router reads and writes to the diskette. The diskette gives the system access
Managing a DOS File System5-3The sections that follow describe the commands in detail. They also show how to use the wildcards.Naming Files and Direct
Using Technician Interface Software5-4• You can specify a directory or filename in upper- or lowercase letters; however, in directory listings and othe
Managing a DOS File System5-5Figure 5-1. Mounting a VolumeThe File System Check Report indicates the number of errors on a diskette. All values should
Using Technician Interface Software5-6The File System Check Report entries are as follows:•Allocated but unused clusters shows the number of reserved
Managing a DOS File System5-7To unmount the currently active volume, make sure the diskette drive LED is off, and enter the command as follows:unmount
Using Technician Interface Software5-8Examples:Displaying a DirectoryUse the dir command to display a list of the files in a directory. You can enter t
Managing a DOS File System5-9Figure 5-2. Sample DOS Directory ListingExamples:If you enter: The system:dirDisplays the list of files in the present wor
Using Technician Interface Software5-10The factory-default filenames are as follows:ace.out The router software image for the FN, LN, CN, and ALN. The
Managing a DOS File System5-11Table 5-2 identifies the DOS file attributes that can appear in a DOS directory display, and their meanings. Refer to “Cha
xiiUsing Wfterm Telephone Call Functions ... B-22Dialing a Remote Router ...
Using Technician Interface Software5-12The name you enter may be from one to 11 characters. You can use letters, numbers, symbols, or spaces. But you
Managing a DOS File System5-13Examples:Renaming a File or DirectoryUse the rename command to change a filename or directory name.If you specify a path
Using Technician Interface Software5-14Copying a FileUse the copy command to make a copy of a file. You can use the wildcard characters * and ? when is
Managing a DOS File System5-15Copying Files from DOS to NVFSWhen copying files from DOS diskettes to NVFS memory cards, you must specify the destinatio
Using Technician Interface Software5-16You can transfer a file in-band whenever• You can dial in to the Technician Interface port of a router you choos
Managing a DOS File System5-17We recommend that you first rename or copy the file at the source to a new, temporary filename if the name is the same as a
Using Technician Interface Software5-18Examples:After transferring the file, you can rename or copy it at the source to its original name. If the new fi
Managing a DOS File System5-19Changing File AttributesThe attr command changes the DOS file attributes. These attributes are displayed when you enter t
Using Technician Interface Software5-20To assign multiple attributes to a file, add the hex values associated with the attributes you want and enter th
Managing a DOS File System5-21The file is displayed in the same format in which it is stored (provided that you do not enter the -x argument): binary
xiiiTask 7: Adding More Hosts or Entity Filters ...C-22Task 8: Saving Your Syslog Configuratio
Using Technician Interface Software5-22Examples:If you enter: The system:delete alt.cfgDeletes the alt.cfg file in the present working directory.delete
6-1Chapter 6Managing EventsYou can use the Technician Interface to• Specify events you want to include in, or exclude from, the events log• Specify ev
Using Technician Interface Software6-2OverviewThe operating software in each processor module logs (stores) events in a first-in, first-out (FIFO) memor
Managing Events6-3• To enable the router to read only certain messages from the events log to the console display, add read filter arguments to the log
Using Technician Interface Software6-4After log -i or log -x, enter: Followed by: To specify:-e<entity_name> The name of the software service f
Managing Events6-5Examples:Displaying Active Write FiltersDisplay a list of all write (log input) filters currently in effect across the router, as fol
Using Technician Interface Software6-6Applying Read (Display) Filters to the Events LogEnter the following command to display the events stored in all
Managing Events6-7<rate> is an option that enables continuous polling of the system’s events log and display of new event messages. -p uses a de
Using Technician Interface Software6-8Example (log -w)#1: 08/13/95 16:32:20.011 INFO SLOT 2 GAME Code:11 Starting image int/9.00/52 Mon Jul 31
Managing Events6-9Examples:Displaying an Events Log File Previously SavedYou can use the log command to display a log file you previously saved. Enter
Using Technician Interface Software6-10You can use the same optional arguments when displaying a log file as you can to display or save the current log
Managing Events6-11The system automatically clears all events from the buffer associated with the slot or slots you indicated. Examples:If you enter:
7-1Chapter 7Accessing the MIBYou can use the Technician Interface to access and manage the Bay Networks Management Information Base (MIB). This chapte
Using Technician Interface Software7-2Listing MIB ObjectsYou can display MIB object names and their associated identifiers using the list command. When
Accessing the MIB7-3Examples:If you enter: The console displays:listAll object names and their associated object identifiers:wfCSMACDEntry = 1.3.6.1.4.
Using Technician Interface Software7-4Getting MIB ValuesThe get command displays the value of a MIB object. You can also insert a wildcard character (
Accessing the MIB7-5The following examples demonstrate ways to display the value of an attribute. The attribute in these examples is named wfSnmpDisab
Using Technician Interface Software7-6Setting MIB ValuesThe set command modifies the value of an instance. You set an instance by specifying its objec
Accessing the MIB7-7Also, make sure the values you set are legal. Illegal or incompatible MIB values can disrupt software or network services after yo
xv Figures Figure 1-1. Secure ID Login Procedure and Interface Dialog ...1-8Figure 1-2. Secure ID PIN Assignment Pr
Using Technician Interface Software7-8Committing MIB SetsThe commit command causes all previously entered set commands to take effect. When you enter
Accessing the MIB7-9Using the MIB-II CounterYou can use the MIB-II counter feature with Version 8.10 and later router software. The feature enables yo
8-1Chapter 8System AdministrationYou can use the Technician Interface to perform the following system administration tasks:• Configure the Access Node
Using Technician Interface Software8-2• Configure search depth for hardware compression• Display a greeting or message before the login prompt• Customi
System Administration8-3Configuring the Boot SourceTo use directed netboot, you must use the bconfig command to specify the following:• The IP address o
Using Technician Interface Software8-4<TFTP_host>Specifies the IP address of the host where the image or configuration file resides. If both the so
System Administration8-5Configuring Initial Interfaces and Netboot OperationYou can use the ifconfig command to do the following:• Configure the router’s
Using Technician Interface Software8-6Table 8-2. ifconfig Command Settings Setting DescriptionSlot setting:-s<slot_no.>Specifies the slot contain
System Administration8-7Configuring an Ethernet Interface for Network BootingTo configure an Ethernet interface for network booting of a router, use the
Using Technician Interface Software8-8Enabling and Disabling Interfaces with ifconfigTo enable an AN or ANH interface for the network boot process or t
System Administration8-9Booting the RouterThe Technician Interface provides the following commands for booting:• The boot command warm-starts the enti
Using Technician Interface Software8-10A warm start occurs when you hot-swap a module, press the Reset button, or issue the boot or reset command. The
System Administration8-11You can also boot the entire system by naming a specific image or configuration file. With this “named boot” operation, the syst
Using Technician Interface Software8-12Examples:Using the PCMCIA/Floppy SwitchThe PCMCIA/Floppy switch on the Flash System Controller board of an FN,
System Administration8-13If the PCMCIA/Floppy switch is in the PCMCIA setting, and you boot the router, the following occurs:1. The router boots from
Using Technician Interface Software8-142.Define a slot mask for delayed boot services on the router.Before creating the delayed boot service on the rou
System Administration8-15Note that the instance ID <wfRuiBootDateAndTime>• Specifies when the delayed boot event will occur• Comprises 11 octets,
Using Technician Interface Software8-16The following table specifies acceptable values for each octet of <wfRuiBootDateAndTime>:Example:Schedule
System Administration8-173. Specify a boot image name.Specify a router software image name for that entry, as follows:BN [3]: set wfRuiBootTable.wfRui
xvii Tables Table 4-1. NVFS Commands ...4-3Table 4-2. Router Softwar
Using Technician Interface Software8-184.Specify a configuration file name, as follows:BN [3]: set wfRuiBootTable.wfRuiBootConfigName.<wfRuiBootDateA
System Administration8-19Managing Delayed Boot ServicesThis section describes how to• Disable or re-enable delayed boot services on the router.• Disab
Using Technician Interface Software8-20Modifying Attributes for Scheduled Delayed Boot Events You can modify• The name of the router software image fil
System Administration8-21Restarting a SlotThe restart command allows you to restart the GAME image currently in use on a specified slot or slots. Resta
Using Technician Interface Software8-22Resetting a SlotThe reset command allows you to reboot one or more slots with a new router software image. You
System Administration8-235. The resetting processor module loads the configuration image and initiates the services provided by the slot; connectivity
Using Technician Interface Software8-24Based on these variables, the router system or slot performs a restart, a warm-boot, or cold-boot operation. Th
System Administration8-25ALNCNFNLN(multislot routers)Warm-boot all slots:• No diagnostics• Load new image• Initialize new image• Retain log info on al
Using Technician Interface Software8-26Running DiagnosticsThe diags command cold-starts one or more specified slots or the entire system. The cold star
System Administration8-27We recommend that you issue the diags command to the associated slot immediately after you hot-swap a board. Otherwise, the D
Using Technician Interface Software8-28You issued a diag command from a Technician Interface session (console or Telnet) on one slot, and the target
System Administration8-29When you issue the Technician Interface diags command to test and reboot a specific module, the test and reboot process may ta
Using Technician Interface Software8-30Halting Packet Transfer between SlotsWhen you reset a slot containing a processor (FRE or ACE) module, the rout
System Administration8-31The executable software consists of the following binary files:• frediag.exe is the diagnostics image file. To upgrade with a n
Using Technician Interface Software8-32Validating an Executable FileYou validate executable files before upgrading by using the readexe command. This c
System Administration8-33Figure 8-1. Sample Response to readexe CommandThe system response to the readexe command contains the following information:•
Using Technician Interface Software8-34• Program execution address space provides information about where the file is located in memory.—Load Address
System Administration8-35Examples:Upgrading and Verifying a PROMYou use the prom command to upgrade or verify the software on the diagnostics PROM or
Using Technician Interface Software8-36During an update, the system erases the image stored in the target PROM and writes the new image into the PROM.
System Administration8-37Determining the Version of the Current Boot PROM ImageTo determine the version number of Boot PROM images residing in a route
xix About This Guide Use this guide if you are responsible for maintaining a Bay Networks router or BNX platform using Bay Networks Technician Inte
Using Technician Interface Software8-38Using the prom CommandTo upgrade the PROMs:1. Insert a Flash card with sufficient contiguous free space to accom
System Administration8-394. If you are updating a Boot PROM, enterprom -w <vol> : <Boot_PROM_file> <slot_ID >For example:prom -w
Using Technician Interface Software8-408.After upgrading all slots, reboot with the latest router software image (for example, bn.exe) using the follo
System Administration8-41loadmap [<slot_no.>] [<filename>]loadmap [<slot_no.>-<slot_no.>] [<filename>]loadmap [<slot_no
Using Technician Interface Software8-42No dynamically loadable modules on SLOT 4----------------------Loadmap from SLOT 2:------------------------>
System Administration8-43Setting the ACE Backplane TypeThe backplane command allows you to set or display the ACE backplane type in nonvolatile RAM. Y
Using Technician Interface Software8-44The date, time, and GMT offset are displayed in mm/dd/yy hh:mm:ss +|- hh:mm format. For example:Jan 16, 1995 15
System Administration8-45Assigning PasswordsThis section describes how to assign or reassign the Manager and User access passwords. The Technician Int
Using Technician Interface Software8-462.Proceed to Step 3 if you are logged in as Manager and you are changing the User password. Otherwise, enter th
System Administration8-47Enabling and Disabling Secure ID AuthenticationThis section describes how to enable or disable SecureID services from a Techn
4401 Great America Parkway 8 Federal StreetSanta Clara, CA 95054 Billerica, MA 01821 Copyright © 1988–1996 Bay Networks, Inc. All rights reserved. Pr
Using Technician Interface Softwarexx Software Suites Routing and Switching software is available in the following suites:• The System Suite includ
Using Technician Interface Software8-48If you entered a different port number, the following message appears on your console or Telnet display:The por
System Administration8-49Disabling SecureID AuthenticationOnce the Technician Interface login prompt appears ($, or whatever your network administrato
Using Technician Interface Software8-50When the agent on the router receives the set request, it compares the decrypted value with the value of its ow
System Administration8-51Setting the Encryption KeyUse the wfsnmpkey command to specify the key that the encryption algorithm uses when it encrypts th
Using Technician Interface Software8-52Example:Customizing Hardware Compression Search DepthIf you have model BLN, BLN-2, and BCN routers configured to
System Administration8-53Testing Compression and ThroughputPerform the following tests before and after making any change to the set values of the lin
Using Technician Interface Software8-54WCP Search Depth AttributesThe modifiable search depth attributes for the WCP entity have the following characte
System Administration8-55 Parameter: WCP Circuit Search Depth Attribute Name: wfWcpCircuitSearchDepth Attribute Number: 7 Default: 256 Options: 0 (no
Using Technician Interface Software8-56Displaying a Greeting or Notice Before the Login PromptYou can create a greeting, notice, caution, or warning m
System Administration8-57To replace or customize the Welcome message on a particular router:1. Back up or copy ti_msg.txt to another filename (such as
About This Guidexxi Before You Begin Before using this guide to run Technician Interface commands on a router or BNX platform, you must• Install the
Using Technician Interface Software8-58[-pause] immediately places the system in pause mode. Use this option with the -fileonly option.<vol> is t
System Administration8-59The default value, 2, enables external clocking. The new value, 1, enables internal clocking. Enter the following to display
Using Technician Interface Software8-60When you set the wfCSMACDAlignmentMode attribute to 2 (ALIGN_OVER_128_BYTES), the router realigns the nonoptima
System Administration8-61<flags> = [<IP_address> | <IP_address/prefix> | -a<area_address> | -A | -c<circuit_no.> | -i <
Using Technician Interface Software8-62Example (ip routes)Enter the following command to display the table of IP “best” (used or active) routes:-N Ret
System Administration8-63ip routesNetwork/Mask Proto Age Slot Cost NextHop Address / AS------------------ ------ --------- ---- --
Using Technician Interface Software8-64Example (IP routes)Enter the following command to display the entire table of routes, including inactive/unused
System Administration8-65Example (bgp routes)Enter the following command to display the entire BGP table of routes:ip bgp_routesNetwork/Mask Peer Re
Using Technician Interface Software8-66Example (bgp routes)Enter the following command to display routes announced to the peer with a local address of
System Administration8-67Example (bgp routes)Enter the following command to display routes announced to BGP peers known to the local router:ip bgp_rou
Using Technician Interface Softwarexxii Bay Networks Customer Support Bay Networks provides live telephone technical support to our distributors, re
Using Technician Interface Software8-68The column headings in screens invoked by the ip command have the following meanings:* (asterisk) Indicates rou
System Administration8-69Routing TablesEach slot on the router maintains an independent routing table (or “routing pool”). The table is the default (b
Using Technician Interface Software8-70Unlike the show ip script command, which retrieves from the router’s active MIB an aggregated view of data from
System Administration8-71• ARP processing — The packet has been held and an ARP request packet has been sent to the LAN for that host. When the addres
Using Technician Interface Software8-72Slot/Internal CacheThe router operating system maintains an “internal” cache storage space on (and for) each sl
System Administration8-73OSPF Link State DatabaseWith the ip command, you can examine• The entire contents of the router’s OSPF Link State Data Base (
Using Technician Interface Software8-74You can determine the circuit number from the router’s active MIB by using the Technician Interface get command
System Administration8-75Example:The following command retrieves the circuit number (attribute 2) for every entry in the Circuit Name table:$ g wfCir
Using Technician Interface Software8-76Table 8-4. Technician Interface Access Levels Command User Manager!✔✔alias✔✔arrayenv✔✔attr (DOS only)✔✔backpla
System Administration8-77export✔✔format (NVFS only)✔get✔✔getenv✔✔gosub✔✔goto✔✔help✔✔history✔✔if✔✔ifconfig✔instenv✔✔ip✔✔label (DOS only)✔let✔✔list✔✔load
About This Guidexxiii • In Germany, call 0130-37-32. • In Europe (except for the United Kingdom and Germany), call (44) 272-760681.• Outside the U.S.
Using Technician Interface Software8-78password Manager✔password User✔✔pause✔✔ping✔✔pktdump (refer to the Troubleshooting Routers guide)✔printf✔✔prom✔
System Administration8-79stamp✔✔stop (LN and CN only)✔string✔system✔✔telnet✔✔tftp✔type✔✔unalias✔✔unmount (DOS only)✔✔unsetenv✔✔verbose✔✔wfsnmpkey✔wfsn
9-1Chapter 9Managing AliasesAn alias is a command you create to take the place of long or multiple commands. After creating the alias, you enter the a
Using Technician Interface Software9-2Creating and Displaying an AliasYou can use the alias command either to create an alias or to display the comman
Managing Aliases9-3Examples:Inserting Parameters in an AliasYou can insert one or more parameters in an <alias_value> when creating an alias. Yo
Using Technician Interface Software9-4The parameter number indicates the position of the value in the user entry. This feature allows you to use the s
Managing Aliases9-5Inserting Character Strings in an AliasThe echo command prints one or more strings of characters to the Technician Interface consol
Using Technician Interface Software9-6You can also embed parameter references within an echo command. Refer to the first example to see how this is don
Managing Aliases9-7Debugging AliasesThe verbose command allows you to display the commands within an <alias_value> as an alias executes. This co
Using Technician Interface Softwarexxiv Conventions This section describes the conventions used in this guide.angle brackets (< >) Indicate tha
Using Technician Interface Software9-8Examples:Saving Aliases to a FileYou can copy all aliases residing in RAM to a file on a volume for later retriev
Managing Aliases9-9Enter the following to load aliases:source aliases <vol>:<filename><vol> is the volume storing the alias file.<fi
Using Technician Interface Software9-10You can display the commands associated with an alias loaded in memory in two ways:• You can use the alias comm
Managing Aliases9-11bgppeerstate Displays the administrative state of all configured BGP connections. Valid values are1 = Up2 = Down3 = Init4 = Invalid
Using Technician Interface Software9-12decadjs Displays all DECnet adjacent nodes and their respective adjacency table indexes. The following example
Managing Aliases9-13fddiot <circuit_no.>Displays the number of FDDI octets transmitted for the specified circuit.fddift <circuit_no.>Displa
Using Technician Interface Software9-14ipfwdage Displays the age of each entry in the IP forwarding table.ipfwdas Displays the next hop AS of each ent
Managing Aliases9-15ipx_it Displays the IPX interface table, including the state of the interfaces. The states are1 = Up2 = Downipx_rt Displays the me
Using Technician Interface Software9-16lbstats Displays bridge receive, transmit, and dropped packet statistics.mem_info <slot_no.>Displays the
Managing Aliases9-17ospf_nbrs Reports the state of every OSPF neighbor that the router knows about. The states are1 = Down2 = Attempt3 = Init4 = Two w
About This Guidexxv Ordering Bay Networks Publications To purchase additional copies of this document or other Bay Networks publications, order by pa
Using Technician Interface Software9-18ststate Displays the current state of each link running the Spanning Tree protocol in the node. The states are1
A-1Appendix AUsing the Bay Networks Router MIBThis appendix describes how to use the Bay Networks router Management Information Base (MIB). The Bay Ne
Using Technician Interface SoftwareA-2OverviewThis section examines the structure of the Bay Networks router MIB. The object tree assigned to the Bay
Using the Bay Networks Router MIBA-3Figure A-1. Sample Top-Level Hierarchy of Bay Networks Router MIB Objectswellfleet (enterprises.18) wfSwSeries
Using Technician Interface SoftwareA-4Figure A-1. Sample Top-Level Hierarchy of Bay Networks Router MIB Objects (continued) wfLine (continued)
Using the Bay Networks Router MIBA-5Figure A-1. Sample Top-Level Hierarchy of Bay Networks Router MIB Objects (continued)Bay Networks Router MIB Files
Using Technician Interface SoftwareA-6Site Manager installs these files at \wf\mibs on PCs, and at /usr/wf/mibs on UNIX workstations. For example, the
Using the Bay Networks Router MIBA-7Implementation NotesThe following notes list the assumptions made about MIB-II object definitions, supported traps,
Using Technician Interface SoftwareA-8Supported TrapsThe following generic traps are supported by the software:ipAddrEntry In certain circumstances, t
Using the Bay Networks Router MIBA-9Unsupported OperationsThe SNMP set operation is not supported for MIB-II objects. All set operations must be perfo
Using Technician Interface Softwarexxvi DOS Disk Operating SystemDRAM Dynamic RAMDSAP Destination Service Access PointEOF End of FileFAT File Allocat
Using Technician Interface SoftwareA-10 0 0000000 00||||||resv chan type slot mod connField Purposeresv. (0-1) Reserved for future expansion, with a
Using the Bay Networks Router MIBA-11Example:Line number = 102101• chan = 1• type = 0• slot = 2• mod = 1• conn = 01This is the only line on the first
B-1Appendix BUsing Out-of-Band Access to Transfer FilesThis appendix describes how to use the xmodem command to perform out-of-band file transfers. The
Using Technician Interface SoftwareB-2This section describes• The asynchronous terminal program available on UNIX and 386/486 DOS remote workstations•
Using Out-of-Band Access to Transfer FilesB-3In support of Bay Networks router file management tasks, the YMODEM batch protocol has the following capab
Using Technician Interface SoftwareB-4The xmodem CommandThe following represents the syntax of the xmodem command:For out-of-band file transfer operati
Using Out-of-Band Access to Transfer FilesB-5Command ParametersWhen you enter an xmodem command at the Technician Interface command line prompt, follo
Using Technician Interface SoftwareB-6Table B-1. Xmodem Option FlagsOption FlagMeaning or Actiony Selects the YMODEM batch protocol for sending files.
Using Out-of-Band Access to Transfer FilesB-7FilenamesThe conventions for the treatment of filenames by the YMODEM protocol are• The source router or t
About This Guidexxvii OSI Open Systems InterconnectionPCMCIA Personal Computer Memory Card International AssociationPPP Point-to-Point ProtocolPPX Pa
Using Technician Interface SoftwareB-8File HandlingThe following information applies to configuration files you transfer between a remote workstation an
Using Out-of-Band Access to Transfer FilesB-9Viewing xmodem Log EventsTo view the log information for xmodem (YMODEM) file transfers, enter the followi
Using Technician Interface SoftwareB-10Out-of-Band File Transfers from a UNIX WorkstationThis section provides the procedures you need to• Open a dial
Using Out-of-Band Access to Transfer FilesB-113. Press return to invoke the Technician Interface login prompt from the target router. The system displ
Using Technician Interface SoftwareB-128.Enter the xmodem send binary command, as follows:xmodem sby <source_vol>: <filename> . . . <file
Using Out-of-Band Access to Transfer FilesB-13Workstation and router response: (typical)-----------------XMODEM File Receive FunctionCRC mode requeste
Using Technician Interface SoftwareB-145.Press return to invoke the Technician Interface login prompt from the target router. The system displays the
Using Out-of-Band Access to Transfer FilesB-1510. Enter an xmodem send binary command with the print (display) transfer events and information option
Using Technician Interface SoftwareB-16Workstation and router response: (typical)-----------------XMODEM Send FunctionFile Name: atl.cfgFile Size: 7k,
Using Out-of-Band Access to Transfer FilesB-17Out-of-Band File Transfers from a Windows WorkstationThis section describes the Bay Networks Communicati
Using Technician Interface SoftwareB-18Opening WftermYou can open Wfterm by double-clicking on its icon in the Site Manager icon group, as shown in Fi
Using Out-of-Band Access to Transfer FilesB-19From this window, you can• Check current settings or enter new settings for the interface to the modem l
Using Technician Interface SoftwareB-20Figure B-4. Accessing the Modem Settings WindowFigure B-5. Verifying or Modifying Modem Interface Settings
Using Out-of-Band Access to Transfer FilesB-21You access this window by means of the Modem/Settings pull-down menu in the Wfterm base program window.
Using Technician Interface SoftwareB-22ATS0 = 0OKWith the local modem online and initialized, you can access and use the telephone call functions supp
Using Out-of-Band Access to Transfer FilesB-23Figure B-8. The Wfterm Dial Command WIndowEnter in the Dial Command window the telephone number of a rou
Using Technician Interface SoftwareB-24Once Wfterm connects to the Technician Interface port of a router, you must log in to that Technician Interface
Using Out-of-Band Access to Transfer FilesB-25Figure B-9. The Wfterm File Transfer Operation Selection WindowTransferring Files from Router to DOS Wor
Using Technician Interface SoftwareB-26Proceed as follows to transfer one or more files from router to workstation:1. Enter a cd command to designate t
Using Out-of-Band Access to Transfer FilesB-275. To set the receiving Wfterm utility into receive mode, select the YMODEM-Receive option from the File
1-1 Chapter 1Introducing the Technician Interface The Technician Interface provides management access to a Bay Networks router by means of• Telnet (i
Using Technician Interface SoftwareB-288.You verify that the file transfer was successful when you see the File Transfer Completed message in the Wfter
Using Out-of-Band Access to Transfer FilesB-292. At the Technician Interface command line prompt, enter the xmodem receive binary command, as follows:
Using Technician Interface SoftwareB-30Closing the ConnectionYou can “gracefully” close the connection between your workstation and a target router af
Using Out-of-Band Access to Transfer FilesB-31Quitting WftermYou can quit the Wfterm utility after you• Finish transferring files• Log out of the Techn
C-1Appendix CUsing Syslog Messaging toMonitor Router EventsThis appendix provides• An overview of Syslog services on a Bay Networks router and counter
Using Technician Interface SoftwareC-2Syslogd is a UNIX daemon software component that receives and locally logs, displays, prints, and/or forwards me
Using Syslog Messaging to Monitor Router EventsC-3Figure C-1. Syslog and Syslogd OperationSyslog software:• Polls slot logs• Retrieves ev
Using Technician Interface SoftwareC-4Remote Hosts and FiltersYou use a management workstation to monitor event messages generated by specific software
Using Syslog Messaging to Monitor Router EventsC-5Figure C-2. Router Event Message Filtering for One HostPolling the Events LogSyslog polls the events
Bay Networks, Inc. 4401 Great America Parkway, Santa Clara, CA 950548 Federal Street, Billerica, MA 01821 Bay Networks Software License This Software
Using Technician Interface Software1-2 Differences from Site Manager The Technician Interface and Site Manager are both used for maintaining router s
Using Technician Interface SoftwareC-6When you want Syslog to select and forward from all entities event messages that satisfy severity and slot crite
Using Syslog Messaging to Monitor Router EventsC-7If you configure an event number range of 0 to 255, Syslog ignores the range as a filtering parameter
Using Technician Interface SoftwareC-8You define a range of slot numbers for an entity filter by specifying• An upper boundary number (MIB object wfSysl
Using Syslog Messaging to Monitor Router EventsC-9Syslog retrieves the variables shown in brackets ([ ]) from the router’s system log message or from
Using Technician Interface SoftwareC-10UDP HeaderSyslog adds to any event message that passes all filtering criteria the destination UDP port number on
Using Syslog Messaging to Monitor Router EventsC-11The error level code identifies the severity level (level of urgency) of a received message for UNIX
Using Technician Interface SoftwareC-12You determine how Bay Networks router event message severity levels map to error levels on your UNIX workstatio
Using Syslog Messaging to Monitor Router EventsC-13Refer to “Configuring Syslog on the Router” for instructions on how to enable the Syslog time sequen
Using Technician Interface SoftwareC-14Example:In this example, the path specified next to each “local” facility indicator in the file shows a unique d
Using Syslog Messaging to Monitor Router EventsC-154. Save the changes you made to syslog.conf.5. Enter the UNIX ps command to obtain the process id f
Introducing the Technician Interface1-3 Running the Technician Interface The Technician Interface software entity normally runs on one slot only, exc
Using Technician Interface SoftwareC-16Following the configuration procedure, this appendix provides an example of Syslog configuration, plus definitions
Using Syslog Messaging to Monitor Router EventsC-171. Configure the maximum number of active hosts served by Syslog on the router:$: set wfSyslog.wfSy
Using Technician Interface SoftwareC-182.To define the UNIX system facility you want to receive Syslog messages from the router, enter the following:$:
Using Syslog Messaging to Monitor Router EventsC-191. Create a new filter for the desired entity and remote host pair by first creating an entry in the
Using Technician Interface SoftwareC-20To define by severity levels the event messages you want Syslog to select and forward to a specific remote host,
Using Syslog Messaging to Monitor Router EventsC-21b. Change router WARNING message mapping, as follows:$: set wfSyslogEntFltrEntry.wfSyslogEntFltrWa
Using Technician Interface SoftwareC-22Task 7: Adding More Hosts or Entity FiltersYou can add more hosts or entity filters to your Syslog configuration,
Using Syslog Messaging to Monitor Router EventsC-23Managing Syslog on a RouterOnce you finish configuring Syslog on a router, you may occasionally need
Using Technician Interface SoftwareC-24Disabling or Re-enabling Syslog Hosts or FiltersYou can disable or re-enable host or filter entries already defin
Using Syslog Messaging to Monitor Router EventsC-25b. Re-enable an entity filter by entering the following command line:$: set wfSyslogEntFltrEntry.wf
Using Technician Interface Software1-4 The User login entry allows you to enter read-only commands. These only read information from the router. Th
Using Technician Interface SoftwareC-26Example Syslog ConfigurationThe following is an example of a Syslog configuration procedure when• Your management
Using Syslog Messaging to Monitor Router EventsC-274. Create a wildcard filter to forward events of type fault, warning, and debug, and on Slots 2,3,4,
Using Technician Interface SoftwareC-28Syslog Parameter DescriptionsSyslog objects and key parameters (attributes) that you can set on the router or g
Using Syslog Messaging to Monitor Router EventsC-29wfSyslogEntityFilterTable (table of entity filters for one host):wfSyslogEntFltrEntry (individual en
Using Technician Interface SoftwareC-30Global/Group ParametersThis section describes the Syslog group/global parameters. Parameter: Syslog Delete Attr
Using Syslog Messaging to Monitor Router EventsC-31 Parameter: Syslog Operational State Attribute Name: wfSyslogOperState Attribute Number: 3 Default:
Using Technician Interface SoftwareC-32 Parameter: Maximum Hosts Attribute Name: wfSyslogMaxHosts Attribute Number: 4 Default: 5 Range: 1 to 10 Functi
Using Syslog Messaging to Monitor Router EventsC-33Host ParametersThis section describes parameters you can configure for each host you add to the Sysl
Using Technician Interface SoftwareC-34 Parameter: Host UDP Port Attribute Name: wfSyslogHostUDPPort Attribute Number: 4 Default: 514 Range: 514 to 53
Using Syslog Messaging to Monitor Router EventsC-35 Parameter: Host Time Seq Enable Attribute Name: wfSyslogLogTimeSeqEnable Attribute Number: 6 Defau
Introducing the Technician Interface1-5If you enable this feature on a router, you enter in addition to a login entry a Secure ID passcode after the P
Using Technician Interface SoftwareC-36 Parameter: Host Operational State Attribute Name: wfSyslogHostOperState Attribute Number: 7 Default: 2 (inacti
Using Syslog Messaging to Monitor Router EventsC-37Entity Filter ParametersThis section describes the parameters you can configure for each filter (entr
Using Technician Interface SoftwareC-38 Parameter: Filter Operational State Attribute Name: wfSyslogEntFltrOperState Attribute Number: 6 Default: 2 (i
Using Syslog Messaging to Monitor Router EventsC-39 Parameter: Log Evt Lower Bound Attribute Name: wfSyslogEntFltrLogEvtLowBnd Attribute Number: 7 Def
Using Technician Interface SoftwareC-40 Parameter: Log Evt Upper Bound Attribute Name: wfSyslogEntFltrLogEvtUppBnd Attribute Number: 8 Default: 255 Ra
Using Syslog Messaging to Monitor Router EventsC-41 Parameter: Severity Mask Attribute Name: wfSyslogEntFltrSevMask Attribute Number: 9 Default: None
Using Technician Interface SoftwareC-42 Parameter: Slot Lower Bound Attribute Name: wfSyslogEntFltrSlotLowBnd Attribute Number: 10 Default: 0 Range: 0
Using Syslog Messaging to Monitor Router EventsC-43 Parameter: Slot Upper Bound Attribute Name: wfSyslogEntFltrSlotUppBnd Attribute Number: 11 Default
Using Technician Interface SoftwareC-44 Parameter: Fault Map Attribute Name: wfSyslogEntFltrFaultMap Attribute Number: 12 Default: 3 (CRIT) Options: 1
Using Syslog Messaging to Monitor Router EventsC-45 Parameter: Warning Map Attribute Name: wfSyslogEntFltrWarningMap Attribute Number: 13 Default: 5 (
Using Technician Interface Software1-6Newly installed routers initially do not require Secure ID authentication for Technician Interface login privile
Using Technician Interface SoftwareC-46 Parameter: Trace Map Attribute Name: wfSyslogEntFltrTraceMap Attribute Number: 15 Default: 8 (DEBUG) Options:
Using Syslog Messaging to Monitor Router EventsC-47For More InformationRefer to the instructions provided in the UNIX man(ual) pages on your workstati
Index-1Symbols! command, 3-3* wildcard, 5-2? wildcard, 5-2Aaborting a command, 3-3accesslevelsmanager, 8-75 to 8-79user, 8-75 to 8-79password protecti
Index-2autoscriptsat manager login, 2-19at user login, 2-19automgr.bat, 2-18 to 2-19autouser.bat, 2-18 to 2-19customizing, 2-20samples, 2-19Bbackplane
Index-3Technician Interface operatingbackplane, 8-43boot, 8-9clearlog, 6-10date, 8-43diags, 8-26exec, 3-7help, 3-2history, 3-4ifconfig, 8-5loadmap, 8-4
Index-4default filenames, 4-8default settings, IP interface, 8-7delayed boot, 8-13delete command, 4-17, 5-21deleting a console port instance, 2-5diagno
Index-5displaying the contents of, 4-16, 5-20freboot.exe, 4-9install.bat, 4-9names, 4-4renaming, 5-13syslog.conf, C-47ti.cfg, 4-9transferring, 4-12, 5
Index-6logcommand, 6-6, 6-9input filters, 6-3displaying list of, 6-5ouput filters, 6-6loginlevels, 1-3Manager’s Script, 2-15procedure, 1-3retries, 2-14s
Index-7out-of-band file transfersfrom a UNIX workstation, B-10 to B-16from a Windows workstation, B-17 to B-31hardware configuration, B-9overview of, B-
Introducing the Technician Interface1-7Figure 1-1 shows the complete authentication procedure and interface dialog you may encounter when attempting a
Index-8processor modules, 4-4promcommand, 8-30, 8-35verifying and upgrading software on, 8-35protected accessvia password, 1-3via SecureID, 1-3QQENET
Index-9parametersDebug Map, C-46Delete, C-30Enable, C-30Entity Filter Delete, C-37Entity Filter Enable, C-37Fault Map, C-44Filter Operational State, C
Index-10WWelcome screen, customizing the, 1-10wfsnmpkey command, 8-51wfsnmpmode command, 8-50wfsnmpseed command, 8-51Wftermaccessing from Site Manager
Using Technician Interface Software1-8Figure 1-1. Secure ID Login Procedure and Interface DialogBSee AFigure 1-2Access denied,cardcode bad.Enter n
Introducing the Technician Interface1-9Figure 1-2. Secure ID PIN Assignment Procedure and Interface DialogAGo to BFigure 1-1Was your newPIN accepte
Using Technician Interface Software1-10Technician Interface Welcome ScreenWhen you initially boot a router (during installation) using the configuratio
Introducing the Technician Interface1-11Your network administrator can change the Technician Interface prompt you receive on a local or remote ASCII c
Bay Networks, Inc. 4401 Great America Parkway, Santa Clara, CA 950548 Federal Street, Billerica, MA 01821 Bay Networks Software License (continued)
Using Technician Interface Software1-12Login ConfigurationFor instructions on changing the default values associated with the console port, see “Configu
Introducing the Technician Interface1-13Starting a Manager Session from within a User SessionYou can initiate a Manager session within a User session
2-1Chapter 2Configuring the Console PortTo configure a router’s console port parameters using the Technician Interface, you have to change the default p
Using Technician Interface Software2-2OverviewYou access the Technician Interface software through a console or modem attached to a router serial port
Configuring the Console Port2-3Using the set CommandEnter one of the following Technician Interface commands to configure a console port parameter:set
Using Technician Interface Software2-4Using the commit CommandEnter the following command after issuing one or more set commands:commitThe commit comm
Configuring the Console Port2-5 Parameter: Port Delete Attribute Name: wfSerialPortDelete Attribute Number: 1 Default: 1 (Create) Options: 1 (Create)
Using Technician Interface Software2-6 Parameter: Port State Attribute Name: wfSerialPortState Attribute Number: 3 Default: 4 (Not present) Options: 1
Configuring the Console Port2-7 Parameter: Port Name Attribute Name: wfSerialPortName Attribute Number: 5 Default: None Options: Set by the system. Fu
114088 Rev. A v Contents About This Guide Audience ...
Using Technician Interface Software2-8 Parameter: Port Type Attribute Name: wfSerialPortType Attribute Number: 7 Default: 1 (Technician Interface) Opt
Configuring the Console Port2-9 Parameter: Data Bits Attribute Name: wfSerialPortDataBits Attribute Number: 9 Default: 8 Options: 7 | 8 Function: Spec
Using Technician Interface Software2-10 Parameter: Stop Bits Attribute Name: wfSerialPortStopBits Attribute Number: 11 Default: 1 (1) Options: 1 (1) |
Configuring the Console Port2-11 Parameter: Lines Per Screen Attribute Name: wfSerialPortLinesPerScreen Attribute Number: 13 Default: 24 lines Range:
Using Technician Interface Software2-12 Parameter: Prompt Attribute Name: wfSerialPortPrompt Attribute Number: 15 Default: $ Options: Any string of up
Configuring the Console Port2-13 Parameter: Login Timeout Attribute Name: wfSerialPortLoginTimeOut Attribute Number: 16 Default: 1 min Range: 1 to 99
Using Technician Interface Software2-14 Parameter: Command Timeout Attribute Name: wfSerialPortCommandTimeOut Attribute Number: 18 Default: 15 min Ran
Configuring the Console Port2-15 Parameter: Login Script Search Path Attribute Name: wfSerialPortInitialSearchPath Attribute Number: 28 Default: 2: Ra
Using Technician Interface Software2-16 Parameter: User’s Login Script Attribute Name: wfSerialPortUserAutoScript Attribute Number: 30 Default: None O
Configuring the Console Port2-17 Parameter: Force User Logout Attribute Name: wfSerialPortUserAbortLogoutDisable Attribute Number: 31 Default: 2 (Disa
vi Chapter 2 Configuring the Console Port Overview ...
Using Technician Interface Software2-18Using Autoscript FilesYou can configure the Technician Interface to use the autoscript files automgr.bat and auto
Configuring the Console Port2-19Sample Autoscript FilesThe following autoscript files for the Manager login and the User login are configured using the
Using Technician Interface Software2-20Customizing Autoscript FilesYou can customize the automgr.bat or autouser.bat scripts by entering the appropria
3-1Chapter 3Using Operating CommandsThe basic Technician Interface operating commands allow you to • Display online help• Pause and scroll text on a s
Using Technician Interface Software3-2Displaying Online HelpUse the help command to display online help text for any Technician Interface command, as
Using Operating Commands3-3Enter the following command to set or display the more mode:more [-s] [on | off] <#_of_lines>Examples:Halting a Comma
Using Technician Interface Software3-4! [<repeat_count>]Examples:Repeating a Command Recently EnteredUse the history command to• View a list of
Using Operating Commands3-5Example:$> dinfo (Command 1)VOL STATE TOTAL SIZE FREE SPACE CONTIG FREE SPACE-----------------------------
Using Technician Interface Software3-6$> stamp (Command 3)Image: beta/9.00/1Created: Tue Jun 6 13:08:17 EDT 1995(continued)$> history (Dis
Using Operating Commands3-7Loading a Command into MemoryUse the exec command to load or unload dynamically loadable Technician Interface commands to a
vii Chapter 4 Managing a NonVolatile File System Overview ...
Using Technician Interface Software3-8IP PingWhen you issue the ping command for IP, the ping program sends an Internet Control Message Protocol (ICMP
Using Operating Commands3-9The console displays one of the following messages when you issue a ping command (if you enter a value in the <repeat_co
Using Technician Interface Software3-10Examples:If you enter (on one line): The system:ping -ip 192.32.1.151Pings the device at the IP address 192.32.
Using Operating Commands3-11ping 192.32.1.151 -t3 -r8 -s62Pings the device at the IP address 192.32.1.151 eight successive times, sends 62 bytes of da
Using Technician Interface Software3-12IPX PingWhen you issue the ping command for IPX, the router sends an IPX configuration request packet to the rem
Using Operating Commands3-13An IPX address in decimal notation consists of a 4-byte network address and a 6-byte host address, where each byte is a nu
Using Technician Interface Software3-14• An invalid parameter specified message: This message appears if the network or host address is all 0s, all Fs
Using Operating Commands3-15OSI PingWhen you issue the ping command for OSI, the router sends a Connectionless Network Protocol (CLNP) echo request to
Using Technician Interface Software3-16•A <target address> is unreachable message: This message appears if the local Bay Networks router cannot
Using Operating Commands3-17Examples:If you enter (on one line): The system:ping -osi 49000400000a12121200Pings the device at the NSAP address 4900040
viiiTransferring a File ...5-15In-Band File Tr
Using Technician Interface Software3-18VINES PingWhen you issue the ping command for VINES to a remote VINES device, it responds if it can be reached,
Using Operating Commands3-19The console displays one of the following messages when you issue a ping command (if you enter a value in the <repeat_c
Using Technician Interface Software3-20Examples:If you enter: The system:ping -vines 2705682.8003Pings the device at the VINES address 2705682.8003 an
Using Operating Commands3-21AppleTalk PingWhen you issue the ping command for AppleTalk to a remote AppleTalk device, it responds if it can be reached
Using Technician Interface Software3-22• An alive message: This message appears if the system receives a response from the target device within the &l
Using Operating Commands3-23Examples:If you enter: The system:ping -at 100.5Pings the device at the AppleTalk address 100.5 and waits up to 5 seconds
Using Technician Interface Software3-24APPN PingWhen you issue the ping command for APPN to a remote APPN device, it responds if it can be reached, an
Using Operating Commands3-25The console displays one of the following messages when you issue a ping command:• An alive message: This message appears
Using Technician Interface Software3-26Examples:If you enter (on one line): The system:ping -appn raleighPings the device at the APPN address raleigh
4-1Chapter 4Managing a NonVolatile File SystemYou can use the Technician Interface to manage nonvolatile file system (NVFS) files on a Bay Networks rout
ixBooting the Router ...8-9How the Router Boot
Using Technician Interface Software4-2OverviewThe NVFS file system on the router reads and writes to one or more memory cards. Memory cards exist in 2-
Managing a NonVolatile File System4-3Using Multiple Memory CardsThis section describes how to manage multiple memory cards on the router. You may want
Using Technician Interface Software4-4The system boots from the default router software image (Table 4-2) and configuration file (config) if you do not s
Managing a NonVolatile File System4-5We also recommend the following conventions when naming files so that you can easily distinguish files by type:• Us
Using Technician Interface Software4-6The dinfo command displays the following data:Vol: Slot number where the memory card is currently installed. (V
Managing a NonVolatile File System4-7Figure 4-2. Sample NVFS Directory ListingExamples:If you enter: The console:dirDisplays the list of files on the a
Using Technician Interface Software4-8The factory-default filenames are as follows:ace.out The router software image for the FN, LN, CN, and ALN. The s
Managing a NonVolatile File System4-9The Total size, Available free space, and Contiguous free space fields that appear below the dir display show the
Using Technician Interface Software4-10Changing the Active VolumeUse the cd command to change the active volume, as follows:cd <vol>:<vol>
Managing a NonVolatile File System4-11Copying Files from NVFS to DOSWhen copying files from NVFS to DOS on FN, LN, or CN routers equipped with Flash Sy
Komentáře k této Příručce