Black Box LE2104A-AUI-R2, LE2101AE-BT-R2, LE2104A-BNC-R2, LE2204A-AUI-R2, LE2104A-TP-R2 User Manual

...
CUSTOMER
SUPPORT
INFORMATION
Order toll-free in the U.S. 24 hours, 7 A.M. Monday to midnight Friday: 877-877-BBOX FREE technical support, 24 hours a day, 7 days a week: Call 724-746-5500 or fax 724-746-0746 Mail order: Black Box Corporation, 1000 Park Drive, Lawrence, PA 15055-1018 Web site: www.blackbox.com • E-mail: info@blackbox.com
Terminal Servers
P
O
W
E
R
L
A
N
1
2
3
4
5
6
7
8
R
E
S
E
T
P
O
R
T
E
R
R
L
A
N
P
W
R
IN
P
U
T
1
2
V
-
D
C
Serial
UTP
S
in
g
le
P
o
rt
T
e
rm
in
a
l S
e
rv
e
r
3
TERMINAL SERVERS
FEDERAL COMMUNICATIONS COMMISSION
AND
INDUSTRY CANADA
RADIO FREQUENCY INTERFERENCE STATEMENTS
This equipment generates, uses, and can radiate radio frequency energy and if not installed and used properly, that is, in strict accordance with the manufacturer’s instructions, may cause interference to radio communication. It has been tested and found to comply with the limits for a Class A computing device in accordance with the specifications in Subpart J of Part 15 of FCC rules, which are designed to provide reasonable protection against such interference when the equipment is operated in a commercial environment. Operation of this equipment in a residential area is likely to cause interference, in which case the user at his own expense will be required to take whatever measures may be necessary to correct the interference.
Changes or modifications not expressly approved by the party responsible for compliance could void the user’s authority to operate the equipment.
This digital apparatus does not exceed the Class A limits for radio noise emission from digital apparatus set out in the Radio Interference Regulation of Industry Canada.
Le présent appareil numérique n’émet pas de bruits radioélectriques dépassant les limites applicables aux appareils numériques de classe A prescrites dans le Règlement sur le brouillage radioélectrique publié par Industrie Canada.
4
TERMINAL SERVERS
NORMAS OFICIALES MEXICANAS (NOM)
ELECTRICAL SAFETY STATEMENT
INSTRUCCIONES DE SEGURIDAD
1. Todas las instrucciones de seguridad y operación deberán ser leídas antes de que el aparato eléctrico sea operado.
2. Las instrucciones de seguridad y operación deberán ser guardadas para referencia futura.
3. Todas las advertencias en el aparato eléctrico y en sus instrucciones de operación deben ser respetadas.
4. Todas las instrucciones de operación y uso deben ser seguidas.
5. El aparato eléctrico no deberá ser usado cerca del agua—por ejemplo, cerca de la tina de baño, lavabo, sótano mojado o cerca de una alberca, etc..
6. El aparato eléctrico debe ser usado únicamente con carritos o pedestales que sean recomendados por el fabricante.
7. El parato eléctrico debe ser montado a la pared o al techo sólo como sea recomendado por el fabricante.
8. Servicio—El usuario no debe intentar dar servicio al equipo eléctrico más allá a lo descrito en las instrucciones de operación. Todo otro servicio deberá ser referido a personal de servicio calificado.
9. El aparato eléctrico debe ser situado de tal manera que su posición no interfiera su uso. La colocación del aparato eléctrico sobre una cama, sofá, alfombra o superficie similar puede bloquea la ventilación, no se debe colocar en libreros o gabinetes que impidan el flujo de aire por los orificios de ventilación.
5
TERMINAL SERVERS
10. El equipo eléctrico deber ser situado fuera del alcance de fuentes de calor como radiadores, registros de calor, estufas u otros aparatos (incluyendo amplificadores) que producen calor.
11. El aparato eléctrico deberá ser connectado a una fuente de poder sólo del tipo descrito en el instructivo de operación, o como se indique en el aparato.
12. Precaución debe ser tomada de tal manera que la tierra fisica y la polarización del equipo no sea eliminada.
13. Los cables de la fuente de poder deben ser guiados de tal manera que no sean pisados ni pellizcados por objetos colocados sobre o contra ellos, poniendo particular atención a los contactos y receptáculos donde salen del aparato.
14. El equio eléctrico debe ser limpiado únicamente de acuerdo a las recomendaciones del fabricante.
15. En caso de existir, una antena externa deberá ser localizada lejos de las lineas de energia.
16. El cable de corriente deberá ser desconectado del cuando el equipo no sea usado por un largo periodo de tiempo.
17. Cuidado debe ser tomado de tal manera que objectos liquidos no sean derramados sobre la cubierta u orificios de ventilación.
18. Servicio por personal calificado deberá ser provisto cuando:
A: El cable de poder o el contacto ha sido dañado; u
B: Objectos han caído o líquido ha sido derramado dentro del
aparato; o
C: El aparato ha sido expuesto a la lluvia; o
D: El aparato parece no operar normalmente o muestra un cambio en su
desempeño; o
E: El aparato ha sido tirado o su cubierta ha sido dañada.
6
TERMINAL SERVERS
CONTENTS
1. Specifications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
2. Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
2.1 Terminal Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
2.2 Remote Access Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
2.3 Available Models . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
2.4 Terms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
2.5 Features of the Terminal Server . . . . . . . . . . . . . . . . . . . . . . 17
3. Installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
3.1 Indicators of the Terminal Server . . . . . . . . . . . . . . . . . . . . 20
3.2 The Installation Process . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
3.2.1 Unpacking the Terminal Server . . . . . . . . . . . . . . . . . 24
3.2.2 Selecting a Location . . . . . . . . . . . . . . . . . . . . . . . . . . 24
3.3.3 Connecting the Terminal Server to the LAN
Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
3.3.4 Connecting Serial Devices to the Terminal
Server. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
3.3 Power On Procedure and Diagnostics . . . . . . . . . . . . . . . . . 29
3.3.1 Single-Port Terminal Server . . . . . . . . . . . . . . . . . . . . 29
3.3.2 4- and 8-Port Terminal Servers . . . . . . . . . . . . . . . . . . 29
3.4 Restoring Factory Defaults . . . . . . . . . . . . . . . . . . . . . . . . . . 30
3.4.1 Single-Port Terminal Server . . . . . . . . . . . . . . . . . . . . 30
3.4.2 4- and 8-Port Terminal Servers . . . . . . . . . . . . . . . . . . 31
4. Configuration Guide . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
4.1 Introduction. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
4.2 Access to Management Commands . . . . . . . . . . . . . . . . . . . 34
4.2.1 Using Privileged Mode . . . . . . . . . . . . . . . . . . . . . . . . 34
4.2.2 Using the Online Help . . . . . . . . . . . . . . . . . . . . . . . . 35
4.2.3 Command Line Editing/Special Keys . . . . . . . . . . . . 39
4.2.4 Naming Conventions for the Terminal Server
and for LAT Services . . . . . . . . . . . . . . . . . . . . . . . . . 40
4.2.5 Command Requirements and Restrictions . . . . . . . . 40
4.2.6 Management Command Language . . . . . . . . . . . . . . 41
4.3 Configuring Terminal Server Parameters . . . . . . . . . . . . . . 43
4.3.1 Basic IP Setup. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
4.3.2 Domain Name System (DNS) Server Setup . . . . . . . . 45
4.3.3 Using the BOOTP Protocol . . . . . . . . . . . . . . . . . . . . 46
4.4 Configuring Serial Ports . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47
4.4.1 Port Naming Convention . . . . . . . . . . . . . . . . . . . . . . 49
4.4.2 Specifying a Port List . . . . . . . . . . . . . . . . . . . . . . . . . . 49
4.5 Configuring Terminal Ports . . . . . . . . . . . . . . . . . . . . . . . . . 50
7
TERMINAL SERVERS
4.5.1 Physical Characteristics—Directly Attached
Terminals . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50
4.5.2 Physical Characteristics—Modem Attached
Terminals . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52
4.5.3 Operational Characteristics. . . . . . . . . . . . . . . . . . . . . 53
4.5.4 Using Special Characters. . . . . . . . . . . . . . . . . . . . . . . 56
4.5.5 Logical Characteristics—LAT . . . . . . . . . . . . . . . . . . . 58
4.6 Accessing the Terminal Server from Remote/Network
(Reverse Telnet) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59
4.7 Configure LAT Services (Reverse LAT). . . . . . . . . . . . . . . . 62
4.7.1 Define LAT Service for an Access Port. . . . . . . . . . . . 64
4.7.2 Define LAT Service for a Serial Port . . . . . . . . . . . . . 64
4.8 Configuring Printer Ports . . . . . . . . . . . . . . . . . . . . . . . . . . . 64
4.8.1 Adding TCP/IP Printers . . . . . . . . . . . . . . . . . . . . . . . 64
4.8.2 LAT Printers. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69
4.9 Advanced LAT Definitions . . . . . . . . . . . . . . . . . . . . . . . . . . 70
4.10 Advanced Telnet Definitions . . . . . . . . . . . . . . . . . . . . . . . 70
4.11 Configuring SLIP Ports . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71
4.12 Configuring PPP Ports. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74
4.12.1 Using Advanced PPP Parameters . . . . . . . . . . . . . . . 76
4.12.2 Verifying PPP Port Configuration and Status . . . . . 78
4.13 Configuring Security Options. . . . . . . . . . . . . . . . . . . . . . . 81
4.13.1 User Security Levels. . . . . . . . . . . . . . . . . . . . . . . . . . 81
4.13.2 Conventions for Specifying Passwords . . . . . . . . . . . 82
4.13.3 Using a General Password . . . . . . . . . . . . . . . . . . . . . 84
4.14 Authentication—Using RADIUS . . . . . . . . . . . . . . . . . . . . 84
4.14.1 Implementing RADIUS Authentication. . . . . . . . . . 87
4.14.2 Using PAP and CHAP . . . . . . . . . . . . . . . . . . . . . . . . 88
4.15 Accounting Using RADIUS. . . . . . . . . . . . . . . . . . . . . . . . . 90
4.16 Configuring the SNMP Agent. . . . . . . . . . . . . . . . . . . . . . . 92
5. User Commands and Applications . . . . . . . . . . . . . . . . . . . . . . . . 94
5.1 Terminal Sessions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94
5.2 Examples of Common Applications . . . . . . . . . . . . . . . . . . . 96
6. Command Descriptions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 101
BACKWARDS (secure) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 101
BROADCAST (nonprivileged) . . . . . . . . . . . . . . . . . . . . . . . . . . 101
CLOSE PORT (secure) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 102
CONNECT (secure) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 103
CONNECT LAT (secure, 4- and 8-port models only) . . . . . . . . 103
CONNECT ANY (secure) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 104
CONNECT PPP (secure) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 105
CONNECT SLIP (secure) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 105
CONNECT TELNET/OPEN/TELNET (secure) . . . . . . . . . . . 106
8
TERMINAL SERVERS
DISCONNECT/CLOSE (secure) . . . . . . . . . . . . . . . . . . . . . . . . 108
DISCONNECT/CLOSE PORT (privileged) . . . . . . . . . . . . . . . 108
FORWARDS (secure) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 109
HELP (secure) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 109
INITIALIZE (privileged). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 110
INITIALIZE CANCEL (privileged) . . . . . . . . . . . . . . . . . . . . . . 111
LOCK (secure). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 112
LOGOUT (secure) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 113
OPEN/TELNET (secure) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 114
PING/TEST INTERNET (nonprivileged). . . . . . . . . . . . . . . . . 114
REMOVE QUEUE (privileged, 4- and 8-Port models) . . . . . . . 115
RESTORE DEFAULTS (privileged) . . . . . . . . . . . . . . . . . . . . . . 116
RESUME (secure) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 116
SEND TELNET (secure). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 117
TEST INTERNET . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 118
TEST LOOP (privileged) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 118
TEST PORT (secure) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 119
TEST SERVICE (privileged, 4- and 8-Port models only) . . . . . 120
ZERO COUNTERS (privileged). . . . . . . . . . . . . . . . . . . . . . . . . 121
7. SET/DEFINE/CHANGE Commands . . . . . . . . . . . . . . . . . . . . . . 123
ACCOUNTING (privileged). . . . . . . . . . . . . . . . . . . . . . . . . . . . 123
ACCOUNTING ADDRESS (privileged). . . . . . . . . . . . . . . . . . . 124
ACCOUNTING RETRIES (privileged) . . . . . . . . . . . . . . . . . . . 125
ACCOUNTING SECRET . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 125
ACCOUNTING TIMEOUT (privileged) . . . . . . . . . . . . . . . . . . 126
AUTHENTICATION. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 126
AUTHENTICATION ADDRESS. . . . . . . . . . . . . . . . . . . . . . . . . 127
AUTHENTICATION RETRIES . . . . . . . . . . . . . . . . . . . . . . . . . 128
AUTHENTICATION SECRET (privileged) . . . . . . . . . . . . . . . 128
AUTHENTICATION TIMEOUT (privileged) . . . . . . . . . . . . . 129
BOOTP (privileged) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 130
BOOTP VENDOR (privileged) . . . . . . . . . . . . . . . . . . . . . . . . . 131
INTERNET (privileged) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 131
INTERNET GATEWAY (privileged) . . . . . . . . . . . . . . . . . . . . . 133
INTERNET HOST (privileged) . . . . . . . . . . . . . . . . . . . . . . . . . 135
INTERNET NAME RESOLUTION (privileged) . . . . . . . . . . . . 136
INTERNET NAMEserver (privileged) . . . . . . . . . . . . . . . . . . . . 137
PORT (secure). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 138
PORT ACCESS (privileged) . . . . . . . . . . . . . . . . . . . . . . . . . . . . 139
PORT AUTHENTICATION (privileged) . . . . . . . . . . . . . . . . . 140
PORT AUTHORIZED GROUPS
(privileged, 4- and 8-Port models only). . . . . . . . . . . . . . . . 141
PORT AUTOBAUD (privileged) . . . . . . . . . . . . . . . . . . . . . . . . 142
PORT AUTOCONNECT (nonprivileged). . . . . . . . . . . . . . . . . 142
9
TERMINAL SERVERS
PORT BACKWARDS SWITCH (secure) . . . . . . . . . . . . . . . . . . 143
PORT BREAK (secure) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 143
PORT BROADCAST (nonprivileged) . . . . . . . . . . . . . . . . . . . . 144
PORT CHARACTER SIZE (nonprivileged). . . . . . . . . . . . . . . . 144
PORT DEDICATED (privileged) . . . . . . . . . . . . . . . . . . . . . . . . 144
PORT DEFAULT PROTOCOL (privileged) . . . . . . . . . . . . . . . 146
PORT DSRLOGOUT (privileged) . . . . . . . . . . . . . . . . . . . . . . . 147
PORT DTRWAIT (privileged) . . . . . . . . . . . . . . . . . . . . . . . . . . 148
PORT FAILOVER (nonprivileged, 4- and 8-Port). . . . . . . . . . . 149
PORT FLOW CONTROL (nonprivileged) . . . . . . . . . . . . . . . . 149
PORT FORWARD SWITCH (secure) . . . . . . . . . . . . . . . . . . . . 150
PORT GROUPS (nonprivileged, 4- and 8-Port models). . . . . . 150
PORT INACTIVITY LOGOUT (privileged) . . . . . . . . . . . . . . . 151
PORT INTERRUPTS (privileged) . . . . . . . . . . . . . . . . . . . . . . . 151
PORT LIMITED VIEW (privileged). . . . . . . . . . . . . . . . . . . . . . 152
PORT LOCAL SWITCH (secure). . . . . . . . . . . . . . . . . . . . . . . . 152
PORT LOCK (privileged) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 153
PORT LOSS NOTIFICATION (nonprivileged) . . . . . . . . . . . . 153
PORT NAME (privileged). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 153
PORT PARITY (nonprivileged) . . . . . . . . . . . . . . . . . . . . . . . . . 154
PORT PARITY CHECK (nonprivileged) . . . . . . . . . . . . . . . . . . 154
PORT PASSWORD (privileged) . . . . . . . . . . . . . . . . . . . . . . . . . 155
PORT PPP (privileged) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 155
PORT PPP IPCP. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 156
PORT PPP IPCP ADDRESS. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 156
PORT PPP IPCP COMPRESSION . . . . . . . . . . . . . . . . . . . . . . . 157
PORT PPP IPCP COMPRESSION STATES . . . . . . . . . . . . . . . . 158
PORT PPP IPCP HOST ADDRESS (nonprivileged). . . . . . . . . 158
PORT PPP LCP ACFC . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 159
PORT PPP LCP AUTHENTICATION (privileged) . . . . . . . . . 160
PORT PPP LCP MAP. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 160
PORT PPP LCP MRU . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 161
PORT PPP LCP PASSIVE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 161
PORT PPP LCP PFC . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 162
PORT PPP LCP/IPCP MAXCONFIGURE. . . . . . . . . . . . . . . . . 162
PORT PPP LCP/IPCP MAXFAILURE . . . . . . . . . . . . . . . . . . . . 163
PORT PPP LCP/IPCP MAXTERMINATE. . . . . . . . . . . . . . . . . 163
PORT PPP LCP/IPCP RESTART . . . . . . . . . . . . . . . . . . . . . . . . 164
PORT PREFERRED (nonprivileged) . . . . . . . . . . . . . . . . . . . . . 164
PORT QUEUING (nonprivileged, 4- and 8-Port only). . . . . . . 165
PORT REMOTE MODIFICATION
(nonprivileged, 4- and 8-Port models only) . . . . . . . . . . . . 166
PORT SECURITY (privileged) . . . . . . . . . . . . . . . . . . . . . . . . . . 166
PORT SESSION LIMIT (privileged) . . . . . . . . . . . . . . . . . . . . . 166
PORT SIGNAL CHECK (privileged) . . . . . . . . . . . . . . . . . . . . . 167
10
TERMINAL SERVERS
PORT SIGNAL CONTROL (privileged) . . . . . . . . . . . . . . . . . . 167
PORT SLIP (nonprivileged) . . . . . . . . . . . . . . . . . . . . . . . . . . . . 168
PORT SLIP COMPRESSION (nonprivileged) . . . . . . . . . . . . . 168
PORT SLIP COMPRESSION STATES (privileged) . . . . . . . . . 169
PORT SLIP HOST ADDRESS (nonprivileged) . . . . . . . . . . . . . 170
PORT SLIP MTU (nonprivileged) . . . . . . . . . . . . . . . . . . . . . . . 170
PORT SPEED (INPUT/OUTPUT) (nonprivileged) . . . . . . . . 171
PORT STOP BITS (nonprivileged) . . . . . . . . . . . . . . . . . . . . . . 171
PORT TELNET CLIENT (secure) . . . . . . . . . . . . . . . . . . . . . . . 171
PORT TELNET CLIENT TERMTYPE . . . . . . . . . . . . . . . . . . . . 172
PORT TELNET SERVER (privileged) . . . . . . . . . . . . . . . . . . . . 173
PORT TELNET SERVER AYT INDICATION
(privileged) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 173
PORT TELNET SERVER BREAK (BRK)
INDICATION (privileged). . . . . . . . . . . . . . . . . . . . . . . . . . 173
PORT TELNET SERVER CHARACTER SIZE
(privileged) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 174
PORT TELNET SERVER IP INDICATION
(privileged) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 174
PORT TELNET SERVER NEWLINE FROM
TERMINAL (privileged) . . . . . . . . . . . . . . . . . . . . . . . . . . . 174
PORT TELNET SERVER NEWLINE TO
TERMINAL (privileged) . . . . . . . . . . . . . . . . . . . . . . . . . . . 174
PORT TERMINATION . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 175
PORT USERNAME (nonprivileged) . . . . . . . . . . . . . . . . . . . . . 175
PORT VERIFICATION (secure) . . . . . . . . . . . . . . . . . . . . . . . . 175
PRIVILEGED/NONPRIVILEGED (secure) . . . . . . . . . . . . . . . 176
SERVER (privileged) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 177
SERVER ACCESS PASSWORD (privileged) . . . . . . . . . . . . . . . 177
SERVER ANNOUNCEMENTS
(privileged, 4- and 8-Port models only). . . . . . . . . . . . . . . . 178
SERVER BROADCAST (privileged). . . . . . . . . . . . . . . . . . . . . . 178
SERVER CIRCUIT TIMER (privileged). . . . . . . . . . . . . . . . . . . 178
SERVER IDENTIFICATION (privileged) . . . . . . . . . . . . . . . . . 179
SERVER INACTIVITY TIMER (privileged) . . . . . . . . . . . . . . . . 179
SERVER KEEPALIVE TIMER
(privileged, 4- and 8-Port models only). . . . . . . . . . . . . . . . 180
SERVER LOCK (privileged) . . . . . . . . . . . . . . . . . . . . . . . . . . . . 180
SERVER LOGIN PASSWORD (privileged) . . . . . . . . . . . . . . . . 180
SERVER MULTICAST TIMER
(privileged, 4- and 8-Port models only). . . . . . . . . . . . . . . . 181
SERVER NAME (privileged). . . . . . . . . . . . . . . . . . . . . . . . . . . . 181
SERVER NODE LIMIT (privileged, 4- and
8-Port only) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 181
SERVER NUMBER (privileged) . . . . . . . . . . . . . . . . . . . . . . . . . 182
11
TERMINAL SERVERS
SERVER PASSWORD LIMIT (privileged) . . . . . . . . . . . . . . . . . 182
SERVER PRIVILEGED PASSWORD (privileged) . . . . . . . . . . . 182
SERVER PROMPT (privileged) . . . . . . . . . . . . . . . . . . . . . . . . . 183
SERVER QUEUE LIMIT (privileged, 4- and 8-Port). . . . . . . . . 183
SERVER RESPONDER (privileged, 4- and 8-Port) . . . . . . . . . . 183
SERVER RETRANSMIT LIMIT
(privileged, 4- and 8-Port models only). . . . . . . . . . . . . . . . 184
SERVER SERVICE GROUPS
(privileged, 4- and 8-Port models only). . . . . . . . . . . . . . . . 185
SERVER SESSION LIMIT (privileged) . . . . . . . . . . . . . . . . . . . 185
SERVER TCP RETRANSMIT (privileged). . . . . . . . . . . . . . . . . 185
SERVICE (privileged, 4- and 8-Port models only). . . . . . . . . . . 186
SERVICE CONNECTIONS (privileged, 4- and 8-Port). . . . . . . 187
SERVICE IDENTIFICATION
(privileged, 4- and 8-Port models only). . . . . . . . . . . . . . . . 187
SERVICE PASSWORD (privileged, 4- and 8-Port only) . . . . . . 187
ERVICE PORTS (privileged, 4- and 8-Port models) . . . . . . . . . 188
SERVICE QUEUE (privileged, 4- and 8-Port models) . . . . . . . 188
SESSION LAT (secure, 4- and 8-Port models only) . . . . . . . . . 189
SESSION TELNET (secure) . . . . . . . . . . . . . . . . . . . . . . . . . . . . 189
SESSION TELNET AO REQUEST (secure) . . . . . . . . . . . . . . . 190
SESSION TELNET AYT REQUEST (secure) . . . . . . . . . . . . . . 190
SESSION TELNET BINARY (secure) . . . . . . . . . . . . . . . . . . . . 190
SESSION TELNET BREAK (BRK) REQUEST (secure). . . . . . 191
SESSION TELNET CHARACTER SIZE (secure) . . . . . . . . . . . 191
SESSION TELNET ECHO (secure). . . . . . . . . . . . . . . . . . . . . . 191
SESSION TELNET IP REQUEST (secure) . . . . . . . . . . . . . . . . 192
SESSION TELNET NEWLINE FROM TERMINAL
(secure) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 192
SESSION TELNET NEWLINE TO TERMINAL
(secure) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 192
SESSION TELNET PROFILE (secure) . . . . . . . . . . . . . . . . . . . 193
SESSION TELNET QUOTE (secure) . . . . . . . . . . . . . . . . . . . . 193
SESSION TELNET SWITCH CHARACTER (secure). . . . . . . . 193
SESSION TELNET SYNCH REQUEST (secure). . . . . . . . . . . . 194
SESSION TELNET TOGGLE ECHO (secure) . . . . . . . . . . . . . 194
SNMP STATE (privileged) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 194
SNMP COMMUNITY ADDRESS (privileged) . . . . . . . . . . . . . . 195
TELNET LISTENER (privileged). . . . . . . . . . . . . . . . . . . . . . . . 198
8. SHOW/LIST Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 201
ACCOUNTING (privileged). . . . . . . . . . . . . . . . . . . . . . . . . . . . 201
AUTHENTICATION (privileged) . . . . . . . . . . . . . . . . . . . . . . . 201
BOOTP (secure) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 202
INTERNET (secure) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 202
12
TERMINAL SERVERS
INTERNET ARP ENTRY (secure) . . . . . . . . . . . . . . . . . . . . . . . 203
INTERNET GATEWAY (secure) . . . . . . . . . . . . . . . . . . . . . . . . 203
INTERNET HOST (secure) . . . . . . . . . . . . . . . . . . . . . . . . . . . . 204
INTERNET NAME RESOLUTION (secure). . . . . . . . . . . . . . . 205
MEMORY (secure) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 206
NODES (secure, 4- and 8-Port models) . . . . . . . . . . . . . . . . . . . 207
PORTS (secure). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 208
PORT PPP LCP/IPCP (secure) . . . . . . . . . . . . . . . . . . . . . . . . . 210
PORT SESSION (secure) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 211
PORT SLIP (privileged) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 213
PORT Telnet (secure). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 214
QUEUE (nonprivileged, 4- and 8-Port models) . . . . . . . . . . . . 215
SERVER (nonprivileged) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 216
SERVICES (secure, 4- and 8-Port models) . . . . . . . . . . . . . . . . . 217
SESSIONS (secure) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 218
SNMP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 219
SYSTEM CHARACTERISTICS (secure). . . . . . . . . . . . . . . . . . . 220
Telnet LISTENER (secure). . . . . . . . . . . . . . . . . . . . . . . . . . . . . 221
USERS (nonprivileged). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 221
9. CLEAR/PURGE Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . 222
INTERNET GATEWAY (privileged) . . . . . . . . . . . . . . . . . . . . . 222
INTERNET HOST (privileged) . . . . . . . . . . . . . . . . . . . . . . . . . 224
INTERNET NAMEserver (privileged) . . . . . . . . . . . . . . . . . . . . 225
PORT PPP HOST ADDRESS (privileged) . . . . . . . . . . . . . . . . . 226
SERVICES (privileged, 4- and 8-Port models only). . . . . . . . . . 226
SNMP COMMUNITY (privileged) . . . . . . . . . . . . . . . . . . . . . . . 227
Telnet LISTENER (privileged). . . . . . . . . . . . . . . . . . . . . . . . . . 228
Appendix A: Upgrading to New Software . . . . . . . . . . . . . . . . . . . . 230
Appendix B: EPROMS. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 234
13
TERMINAL SERVERS
1. Specifications
Protocol — LE2101A-R2, LE2101AE-R2: LAN: TCP/IP; LE2104A-R2,
LE2204A-R2, LE2508A-R2, LE2608A-R2: LAN: TCP/IP, LAT;
Serial ports: None, PPP, SLIP
Indicators LE2101A-R2, LE2101AE-R2: (1) Power LED, (1) LAN,
(1) Port, (1) ERR (Error); LE2104A-R2, LE2204A-R2, LE2508A-R2, LE2608A-R2: (1) Power LED, For each port: (1) LAN and (1) Activity
Connectors — LE2101A-T-R2, LE2101AE-T-R2: (1) DB25, (1) RJ-45,
LE2101A-BT-R2, LE2101AE-BT-R2: (1) DB25, (1) RJ-45, (1) BNC);
All multiport models: (1) IEC 320, (1) DB25 female (parallel); AUI multiport models: (1) DB15 female and (4) or (8) RJ-45; BNC multiport models: (1) BNC and (4) or (8) RJ-45; TP multiport models: (1) RJ-45 10BASE-T and (4) or (8) RJ-45 serial
Speed — Ethernet: 10 Mbps; Serial: up to 115 Kbps
Operating Temperature — 32° to 122°F (0° to 50°C)
Humidity — 0% to 90% noncondensing
Power LE2101A-R2: Input: 120 VAC/60 Hz, Output: 12 VDC, 800 mA,
9.6 VA, LE2101AE-R2: Input: 220 VAC/50 Hz, Output: 12 VDC, 800 mA, 9.6 VA; LE2104A-R2, LE2204A-R2, LE2508A-R2, LE2608A-R2: 100-230 VAC, autosensing
Size — LE2101A-R2, LE2101AE-R2: 1.5"H x 4.5"W x 7.5"D (3.8 x 11.4 x 19 cm); LE2104A-R2, LE2204A-R2, LE2508A-R2, LE2608A-R2: 1.7"H x 8.5"W x 11.7"D
(4.3 x 21.6 x 29.7 cm)
Weight — LE2101A-R2, LE2101AE-R2: 1 lb. (0.5 kg);
LE2104A-R2, LE2204A-R2, LE2508A-R2, LE2608A-R2: 4.7 lb. (2.1 kg)
14
TERMINAL SERVERS
2. Overview
The Terminal Servers make possible Ethernet connections to computer equipment that was not designed to be networked. Serial devices such as personal computers, printers, terminals, and modems are supported by the Terminal Servers and the Ethernet concurrently. The Terminal Servers can be configured to provide services from network nodes as well as to access services from the network’s nodes.
2.1 Terminal Server
The TCP/IP standard network protocol is supported by the single-port Terminal Servers (LE2101A-R2). The Telnet™and LAT™standard network protocols are supported by the multiport Terminal Servers (LE2104A-R2, LE2204A-R2, LE2508A-R2, LE2608A-R2). The Telnet protocol, provided on most UNIX®systems, allows initiation of a session to create a terminal connection to a network host supported by the Telnet.
Domain Name Servers can be used on the Terminal Servers to enable a network name Terminal Server to convert text node names into numeric IP addresses. A local host table displays IP address resolution, which permits the use of a host name instead of an IP address, thereby simplifying the use of the Telnet protocol.
Digital Equipment Corporation™LAT (Local Area Transport) protocol is supported on almost all DEC™ operating systems for terminal connections on local networks.
Multiple sessions, including LAT and TCP/IP combinations, can be executed by any port on the multiport Terminal Servers to connect with any host. Turning on a device may immediately establish communication between the user and a host. The user can alternate between displays to view sessions running simultaneously.
In addition, the Terminal Server can be accessed from the LAN side and will provide an outgoing connection to serial devices (dial out). This facility, known as Reverse LAT, Telnet Server/Telnet Listener, or Reverse Telnet, allows the host system connected to the LAN to access the Terminal Server, and furthermore, any device connected to one of its serial or parallel ports (such as a printer).
15
TERMINAL SERVERS
2.2 Remote Access Server
The Remote Access facility of the Terminal Server allows remote TCP/IP stations connected via modems to the PSTN (Public Switched Telephone Network) to access a LAN-based TCP/IP network. This dialup method of connection uses either SLIP (Serial Line IP) or PPP (Point-to-Point Protocol) to allow the remote station (for example, a PC or a UNIX workstation) to become a native member of the central network to which the Terminal Server is connected.
In order to protect the central network from unauthorized access, the RADIUS (Remote Authentication Dial-In User Service) protocol is imple­mented by the Terminal Server. RADIUS provides central user-authentication and accounting services and supports the PAP (Password Authentication Protocol) and CHAP (Challenge-Handshake Authentication Protocol) sub-protocols of PPP.
2.3 Available Models
The following models are available:
• Single-Port Terminal Server (10BASE-T) (part number LE2101A-T-R2)
• Single-Port Terminal Server (10BASE-T/BNC) (part number LE2101A-BT-R2)
• Terminal Server/4 TCP/IP (AUI) (part number LE2104A-AUI-R2)
• Terminal Server/4 TCP/IP (BNC) (part number LE2104A-BNC-R2)
• Terminal Server/4 TCP/IP (TP) (part number LE2104A-TP-R2)
• Terminal Server/4 TCP/LAT (AUI) (part number LE2204A-AUI-R2)
• Terminal Server/4 TCP/LAT (BNC) (part number LE2204A-BNC-R2)
• Terminal Server/4 TCP/LAT (TP) (part number LE2204A-TP-R2)
• Terminal Server/8 TCP/IP (AUI) (part number LE2508A-AUI-R2)
• Terminal Server/8 TCP/IP (BNC) (part number LE2508A-BNC-R2)
• Terminal Server/8 TCP/IP (TP) (part number LE2508A-TP-R2)
• Terminal Server/8 TCP/LAT (AUI) (part number LE2608A-AUI-R2)
• Terminal Server/8 TCP/LAT (BNC) (part number LE2608A-BNC-R2)
• Terminal Server/8 TCP/LAT (TP) (part number LE2608A-TP-R2)
16
TERMINAL SERVERS
2.4 Terms
The following are brief descriptions of the network components occurring in this manual.
A session is a logical connection to a service, such as a terminal connected to a host through the Terminal Server.
A service is a device that can establish a network connection, such as a host that terminals can connect to. The Terminal Servers also offer services of attached printers and modems.
A node is an intelligent device (e.g., a host, an Ethernet workstation, or a Terminal Server) with a direct connection to the Ethernet network and an Ethernet address. Devices connected to a Terminal Server serial port are excluded by this category.
A host is a computer attached to the network. A “host” is generally an interactive computer that enables users to log in.
Local Mode is when the user issues commands directly to the Terminal Server. In local mode, all of the commands in the Command Reference of this User’s Manual are available.
Service Mode is where the user interacts with connected services and/or hosts. All the user input in service mode goes to the connected services and/or hosts, and not the Terminal Server.
17
TERMINAL SERVERS
2.5 Features of the Terminal Servers
• Easy To Use—Command-line editing, recall and completion are all supported by the Terminal Server’s local mode.
• Easy Configuration—The Terminal Server’s powerful command interface is easy for users as well as system managers to operate. Software upgrades are simple, since the Terminal Server’s operating code is immediately downloaded upon power on.
• Small Size—The small case of the Terminal Server is conveniently sized for the office environment. The Terminal Server runs without a fan and does not make any noise.
• Multiple Session Support—Multiple LAT and Telnet sessions can run simultaneously, with each session connected to any host and using any supported protocol. The user can alternate between displays of up to eight multiple sessions supported on each connected terminal.
• Connectivity—Terminals are directly connected to the network by the Terminal Server. Direct connectivity simplifies terminal cabling, saves physical ports on the host, and enables the terminal to be available for multiple hosts.
• Load Balancing—The load-balancing feature enables a Terminal Server to connect to the most unoccupied node when a LAT service is provided by more than one node. CPU utilization is thereby balanced and improves response times to the user.
• UNIX Compatibility—Telnet is supported by almost all UNIX systems. The Terminal Servers offer support for Domain Name Servers and a local host table that contains IP addresses of frequently used hosts.
• DEC Compatibility—The Terminal Servers are fully compatible with most DEC operating systems since it supports LAT and NCP™.
• Telnet to LAT Gateway—A user in a Telnet session is able to communicate with LAT services. A user in a LAT session is able to communicate with Telnet services.
• Host-Initiated Transfers—Hosts can share modems and printers when a Terminal Server is configured to provide its attached devices as services to other nodes. Jobs can be queued concurrently to Terminal Servers services by TCP/IP and LAT hosts.
18
TERMINAL SERVERS
• Remote Console Support—DEC NCP and TSM facilities can be used to configure Terminal Servers from a remote location. Simple configuration of the Terminal Servers by UNIX managers is provided by the Telnet Terminal Server features of the IP network.
• SNMP—The Simple Network Management Protocol is supported by the Terminal Servers to enable network managers to have an overall view of the network load, error conditions, and problematic sites.
• Security—The Terminal Servers can be set up to limit user access to services by using group codes. The Terminal Server can be configured for automatic logout of a session when a device is turned off or upon port disconnection. Ports can be restricted to give a limited view of the network and be prevented from issuing privileged commands. Password protection is available for privileges, ports, services, and remote access. Ports may be locked by users and unlocked with pre-designated passwords.
• Diagnostics—During power-on, diagnostics are executed and can run interactively to troubleshoot difficulties with network and serial lines.
• SLIP and PPP—SLIP or PPP can be used to access the TCP/IP Internet LAN by IP hosts connected to the Terminal Server’s serial ports.
19
TERMINAL SERVERS
3. Installation
This chapter explains how to install the Terminal Server. With correct planning and a suitable choice of interfaces and cabling, installation will be relatively simple and trouble-free.
Figure 3-1. A Typical Terminal Server Layout.
The typical configuration shown in Figure 3-1 shows the Terminal Server functioning as a primary interface between the local user (at a terminal, for example) and the network. Even if the installation is far more complex, the principles of initial hardware server and individual port configuration remain the same.
Take care when connecting Terminal Servers to the Ethernet network. You may need certain adapters and/or cables to connect all the individual components of the Terminal Server subsystem (such as terminals, printers, and modems). All the relevant information is provided in this manual.
Follow these three steps to setup the Terminal Server:
1. Physically setup the Terminal Server.
2. Configure the Terminal Server for first-time use.
3. Define individual ports.
Host
Ethernet backbone
Printer
Terminal
Server
TerminalTerminal
20
TERMINAL SERVERS
3.1 Indicators of the Terminal Server
Table 3-1 describes the front and back panels, switches/buttons, and LED indicators for each Terminal Server model.
Table 3-1. Terminal Server Indicators.
Model Buttons/Switches Power LEDs
2
LE2101A-R2 Power jack External 115-VAC PWR, LAN,
power supply
1
PORT, and ERROR
LE2101AE-R2 Power jack External 230-VAC PWR, LAN,
power supply PORT, and
ERROR
LE2104A-R2, Power socket and 110-220 VAC, PWR, LAN, and
LE2204A-R2 Switch, Reset Button 50-60 Hz 4x port
LE2508A-R2, Power socket and 110-220 VAC, PWR, LAN, and
LE2608A-R2 Switch, Reset Button 50-60 Hz 8x port
NOTES
1
AC/DC, unregulated adapter with TUV, UL, or CSA approval. Input: 220 VAC/50 Hz or 120 VAC/60 Hz Output: 12 VDC, 800 mA, 9.6 VA Cord: 5.5*2.1mm barrel, center negative
2
PWR—indicates that the unit is receiving power. LAN—indicates network (LAN) activity. PORT—indicates that the indicated port is already in use. ERR—indicates that the power-on diagnostics check has detected an error.
21
TERMINAL SERVERS
Table 3-2. Power-On Diagnostic Indication.
Code Description
9 Base RAM test
8 N/A
7 N/A
6 N/A
5 N/A
4 TIMER test
3 LAN (Ethernet) test
2 NVRAM test
0 Power-On test completed. (If this flashes more
than twice, NVRAM has been restored to default.)
22
TERMINAL SERVERS
Table 3-3. Loader Indication.
Code Description
L The base unit has entered the software-
download state. A loader prompt is displayed on the terminal where the INIT UPDATE command was executed.
L (flashing) A new software module is currently being
downloaded into the base unit.
P Final phase of software downloading—updating
the FLASH memory.
FLASH EPROM clearing (one segment moving
every few seconds).
23
TERMINAL SERVERS
Table 3-4. Hardware Fault Indication.
Code Description
H The base unit Front End Processor (FEP) is not
responding.
d Inconsistency in DPRAM protocol version. Turns
to L and prompts the LOADER.
r Rebooting the Terminal Server (warm boot).
h High-rise FEP not responding.
j Jumper is set to Restore Factory defaults.
b Hardware problem in base FEP.
F Software error caused a processor fault.
24
TERMINAL SERVERS
3.2 The Installation Process
3.2.1 U
NPACKING THE
T
ERMINALSERVER
Your package should contain the following items:
• Terminal Server
• This user manual
If anything is missing or damaged, contact Black Box at 724-746-5500.
3.2.2 S
ELECTING ALOCATION
Before installing the Terminal Server, verify that the chosen site meets the following requirements:
• Select a clean location that is away from a heat source, such as direct sunlight. Make sure the location is not near equipment that emits electromagnetic interference (EMI) such as electric motors.
• Make sure that proper power outlets and network points are accessible.
• Allow for at least 4 inches (10 cm) clearance above and to all sides of the unit for cable connections. Place the Terminal Server on a secure flat surface.
• The ambient operating temperature for the Terminal Server is 32 to 122 °F (0 to 50 °C), at a relative humidity of up to 90%, noncondensing.
3.3.3 C
ONNECTING THETERMINALSERVER TO THE
LAN N
ETWORK
Connect the Terminal Server to the Ethernet network using the appropriate networking procedures and cables for your configuration of the Terminal Server port (RJ-45/UTP, BNC, or AUI) and site network (hub, transceiver).
NOTE
The LE2101A-BT-R2 and LE2101AE-BT-R2 automatically sense the network topology (UTP or BNC). For this to function correctly, connect to the network by plugging in the power before switching on the Terminal Server.
25
TERMINAL SERVERS
3.3.4 C
ONNECTINGSERIALDEVICES TO THETERMINALSERVER
You may connect any RS-232/RS-423 device to any of the serial ports of the Terminal Server. This section describes the following procedures: connecting DCE and DTE devices, pin layouts of the RJ-45 connector, and RJ-45 to DB25 or DB9 conversions.
Connecting DCE and DTE Devices
Two types of RS-232 devices can be connected to the Terminal Server serial ports:
• DTE (Data Terminal Equipment) Devices—These are directly-attached devices, such as terminals and computers, that provide data in the form of digital signals at its output.
• DCE (Data Circuit Terminating Equipment) Devices—These are devices that provide the functions required to establish, maintain, and terminate connections and also provide the signal conversions required for communication between a data terminal equipment and the telephone line or data circuit. Modems connected to the serial port of the Terminal Server in order to overcome the RS-232 50-ft distance limit are considered to be DCE devices.
The Terminal Server serial ports act as individual DTEs. A simple and direct pin-to-pin cable is required if such a serial port is to be connected to a modem (similarly for any other DTE-to-DCE connection).
However, if terminals are connected directly to one another (in a DTE-to­DTE configuration, since both the terminal device and the Terminal Server port are DTEs), a special cable must be used. This cable, known as a “cross cable” or “null modem cable,” includes crossed-connections between specific RS-232 pins so that each DTE will recognize the other as a DCE.
26
TERMINAL SERVERS
The RJ-45 Serial Port
All the Terminal Servers have RJ-45 connectors, which operate as RS-232 (or RS-423) interfaces. Figure 3-2 describes the pin layout used in the RJ-45 ports.
1 2 3 4 5 6 7 8
1: Clear To Send (CTS) - input 2: Data Terminal Ready (DTR) - output 3: Transmit (TX+) 4: Transmit Return (TX-) 5: Receive Return (RX-) 6: Receive (RX+) 7: Data Set Ready (DSR) - input 8: Request To Send (RTS) - output
Figure 3-2. RJ-45 Serial Port Pinout.
27
TERMINAL SERVERS
RJ-45 to DB25/DB9 (DTE) Conversion
Table 3-5 describes the cable wiring required for connecting a DTE device (such as a terminal) with a RS-232 (DB9/25) port, to the Terminal Server’s RJ-45 serial port.
Table 3-5. RJ-45 to DB25 (DTE) Conversion.
RJ-45 Pin RJ-45 Signal Name DB25 pin RS-232 DB9 pin
1* Clear to Send (CTS) 4 RTS 7
2* Data Terminal Ready (DTR) 6 DSR 6
3 Transmit (TX+) 3 RCV 2
4 Transmit Return (TX-) 7 GND 5
5 Receive Return (RX-) 7 GND 5
6 Receive (RX+) 2 XMT 3
7* Data Set Ready (DSR) 20 DTR 4
8* Request to Send (RTS) 5 CTS 8
28
TERMINAL SERVERS
RJ-45 to DB25/DB9 (DCE) Conversion
The following table describes the cable wiring required for connecting a DCE device with an RS-232, DB25 port (such as a modem) to a Terminal Server’s RJ-45 serial port.
Table 3-6. RJ-45 to DB25/DB9 (DCE) Conversion.
RJ-45 Pin RJ-45 Signal Name DB25 pin RS-232 DB9 pin
1* Clear to Send (CTS) 5 CTS 8
2* Data Terminal Ready (DTR) 20 DTR 4
3 Transmit (TX+) 2 XMT 3
4 Transmit Return (TX-) 7 GND 5
5 Receive Return (RX-) 7 GND 5
6 Receive (RX+) 3 RCV 2
7* Data Set Ready (DSR) 6 DSR 6
8* Request to Send (RTS) 4 RTS 7
The pins marked with an asterisk (*) are required only for modem-control or for flow-control, so you may ignore these pins when connecting a terminal.
For applications requiring DTR handshaking or for printers that use pin 11 for Printer Busy Signals, connect RJ-45 pin 1 (CTS) to DB25 pin 20 (for DTR) or pin 11 (Printer Busy), respectively.
29
TERMINAL SERVERS
The RJ-45 adapter does not support chassis ground but does supply signal ground to both pin 4 and pin 5. The reason for this is that on many DB25 devices, pin 1 is left unconnected. In other cases, signal ground and chassis ground are not electrically equivalent and connecting one to the other with a cross-cable can potentially damage both devices. The Transmit Return (pin 4) and Receive Return (pin 5) pins must be connected to signal ground (pin 7 on the DB25) when connecting an RJ-45 connector to an RS-232 connector.
The RS-232 and RS-423 standards specify a maximum length of cable that may be used to connect devices. For example, the RS-232 specification for 9600 baud connections limits the cable length to 50 feet. In practice, the 50-foot limit is often exceeded and this may cause noise that may also lead to interference and unpredictable results. When cabling directly from a Terminal Server to an RS-423 terminal, use twisted pair cabling for maxi­mum noise immunity. Using long flat cables may result in noise problems.
3.3 Power On Procedure and Diagnostics
3.3.1 S
INGLE-PORTTERMINALSERVER
Once the unit is powered, the power LED turns ON and the device goes through initial “Power On” diagnostic tests. During these tests, which last for approximately three seconds, all the unit LEDs should alternate ON and then OFF. If a hardware failure is detected during any test, one or more of the LEDs will flash at a constant rate. If this happens, call for technical support. The PWR LED always remains ON when connected to power.
3.3.2 4-
AND
8-P
ORTTERMINALSERVERS
Immediately after the Terminal Server is powered on, it executes a “Power On” diagnostic procedure and all of the LEDs on the front panel will flash. All the LEDs light sequentially from left to right for approximately five seconds. After the last LED has gone out, only the Power LED should remain on. The entire diagnostic procedure lasts for approximately ten seconds. Normal operation of the Terminal Server can commence once these diagnostics complete successfully.\
If a diagnostic test reveals a fatal error, then all of the LEDs will light for a few seconds. An error code will be indicated by leaving some of the port LEDs ON. The display will then alternate between having all the LEDs on and the error-code display. In the unlikely event of failure, contact technical support for further assistance. If the diagnostic test reveals a non-fatal error (such as the failure of a particular port), the Terminal Server will continue to operate.
30
TERMINAL SERVERS
3.4 Restoring Factory Defaults
In rare cases where access to the Terminal Server is not possible and the suspected cause may be incorrect configuration settings, or when you forget the privileged password, you need to be able to restore the device to factory defaults. A direct consequence of this step is that all configuration changes made to the Terminal Server in the past will be lost (including the Internet address which will default to 0.0.0.0) and the privileged password will be restored to system.
The following sections describe the procedure to restore factory defaults in all the different Terminal Server models.
3.4.1 S
INGLE-PORTTERMINALSERVER
1. Turn the power OFF by unplugging the terminal server power cable.
2. Remove the lid of the unit by pressing the four tabs.
3. Place the factory default jumper (JP2), located in the corner nearest the PWR LED, on pins 1 and 2.
4. Plug in the power cord.
5. Wait until all the PORT and LAN LEDs flash (for a few seconds) and unplug the power cord.
6. Return the factory defaults jumper (JP2) to pins 2 and 3.
7. Replace the lid and plug in the power cable. Factory defaults have now been restored.
Loading...
+ 206 hidden pages