HP A5799A User Manual

Hewlett-Packard A5799A
Terminal Server Reference
Edition 1
HyperPlex
Datacenter Solutions
Manufacturing Part Number: A5547-90003
E0499
United States
Legal Notices
The information in this document is subject to change without notice.
Hewlett-Packard makes no warranty of any kind with regard to this manual, including, but not limited to, the impli ed war rant ies of mercha nta bi lity and fitness for a particular purpose.
errors contained herein or direct, indirect, special, incidental or consequential damages in connection with the furnishing, performance, or use of this material.
Hewlett-Packard shall not be hel d lia ble f or
Warranty.
Packard product and replacement parts can be obtained from your local Sales and Service Office.
Restricted Rights Legend.
Government is subject to restrictions as set forth in subparagraph (c) (1) (ii) of the Rights in Technical Data and Computer Software clause at DFARS
252.227-7013 for DOD agencies, and subparagraphs (c) (1) and (c) (2) of the Commercial Computer Software Restricted Rights clause at FAR 52.227-19 for other agencies.
HEWLETT-PACKARD COMPANY 3000 Hanover Street Palo Alto, California 94304 U.S.A.
Use of this manual and flexible disk(s) or tape cartridge(s) supplied for this pack is restricted to this product only. Additional copies of the programs may be made for security and back-up purposes only. Resale of the programs in their present form or with alterations, is expressly prohibited.
Copyright Notices.
reserved. Reproduction, adaptation, or translation of this document without prior written
permission is prohibited, except as allowed under the copyright laws. ©copyright 1998 ION Networks, Inc. All rights reserved.
A copy of the specific warranty terms applicable to your Hewlett-
Use, duplication or disclosure by the U.S.
©copyright 1983-99 Hewlett-Packard Company, all rights
Trademark Notices.
Microsoft Corporation. X Window System is a trademark of the Massachusetts Institute of Technology.
ii
NT and Microsoft are U.S. registered trademarks of
7(5
7(50
0,1
,1$
$/ 6(59(5 5
/ 6(59(5 5(
()(5
)(5(
(1&(
1&(
Table of Contents
PREFACE ....................................................................................VII
Overview...............................................................................................vii
In This Book ..........................................................................................ix
1. OVERVIEW OF FEATURES.....................................................1
What This Chapter Contains .................................................................1
Hardware Configuration ........................................................................2
Software Configuration – VER Command............................................2
Displaying Menus and Issuing Commands..........................................3
Editing Modes.........................................................................................6
Using the Editing Keys ..........................................................................8
Functionality Overview..........................................................................8
Security Management..........................................................................10
Network Capabilities............................................................................10
Alarm Management..............................................................................11
Data Buffering ......................................................................................13
2. THE USER DATABASE.......................................................... 15
What This Chapter Contains ...............................................................15
Overview...............................................................................................16
Displaying the User Maintenance Functions Menu ...........................17
Adding a User – AU Command............................................................19
Listing Users – LU Command .............................................................23
iii
&217
&217(
(176
176
Deleting a User Profile – XU Command..............................................25
Displaying a User Record – DU Command.........................................27
Changing User Information – CU Command......................................28
3. SYSTEM PARAMETERS........................................................33
What This Chapter Contains ...............................................................33
Systems Functions Menu....................................................................34
Set System Parameters – SSP Command..........................................35
Upgrading th e Software.......................................................................37
Specify Network Parameters...............................................................37
Setting Network Parameters – SNP Command..................................38
Network Initialization Parameters.......................................................40
Overview of SNMP Support by Terminal Servers..............................42
Delivering SNMP Traps........................................................................45
SNMP Manager Parameters.................................................................46
Setting FTP Parameters.......................................................................48
4. FILE BUFFERING...................................................................57
What This Chapter Contains ...............................................................57
File Management Menu........................................................................58
RAMdisk Organization.........................................................................61
Setting the RAMdisk Protection Parameters......................................63
RAMdisk Events...................................................................................65
Buffering Data Received by a Host Port.............................................66
Using FTP to Send Files to an FTP Server .........................................69
Using FTP to Receive Files from Another Device..............................72
iv
7(5
7(50
0,1
,1$
$/ 6(59(5 5
/ 6(59(5 5(
()(5
)(5(
(1&(
1&(
5. MODEM PORT SETUP...........................................................75
What This Chapter Contains ...............................................................75
Modem Port Parameters......................................................................76
Verifying the Settings..........................................................................82
6. TROUBLESHOOTING ............................................................83
What this Chapter Contains ................................................................83
Checking the Status of the LEDs........................................................84
Determining Network Status ...............................................................86
Querying Remote Nodes .....................................................................87
Rebooting the Terminal Serv er...........................................................87
Reinitializing the Terminal Server.......................................................88
Working with Configuration Files.......................................................88
CONFIG Command Instructions.......................................................... 89
DUMPF Command Instructions...........................................................92
Default Port Parameters ......................................................................93
7. ACTION AND EVENT TABLES...........................................95
What this Chapter Contains ................................................................95
Working with Ac tion Ta bles................................................................96
Structure of an Action Table ...............................................................96
Planning the Action Table.................................................................100
Action Table Commands...................................................................105
Internal Alarms and Events...............................................................115
Action Routines..................................................................................119
8. ACTION AND EVENT ROUTINES.....................................121
v
&217
&217(
(176
176
What This Chapter Contains .............................................................121
Internal Events ...................................................................................122
Action Routines..................................................................................135
GLOSSARY OF COMMAND REFERENCES.............................149
GLOSSARY OF COMMAND REFERENCES.............................149
INDEX..........................................................................................153
vi
7(5
7(50
0,1
,1$
$/ 6(59(5 5
/ 6(59(5 5(
()(5
)(5(
(1&(
1&(
PREFACE
Overview
The Hewlett-Packard Terminal Server is a muliplexer device that enables console access to multiple datacenter servers through a single web browser interface. It is one of the components of the Central Web Console (CWC) Kit. The Central Web Console is a systems management tool for the HP 9000 family of Enterprise Servers. The Terminal server allows Telnet communication to 28-host console ports through RS-232 connections. The Terminal server connects to a Windows NT Server through an Ethernet link.
The
Hewlett-Packard Terminal Server Reference
of the and provides a reference of user commands for system administrators. The terminal server is pre-configured for use with the Central Web Console. This manual introduces many of its features and functions; use of this component beyond the scope of this manual and the
HP Central Web Console Administrator’s Guide
recommended
.
describes the features
is not
This manual should be used in conjunction with the
Console Administrator Guide Installation Gu ide
A glossary of common terms can be found in the
.
Console Administrator’s Guide
and the
.
HP Central Web Console
HP Central Web
HP Central Web
Audience
The HP Terminal Server Reference is designed as an aid during setup, troubleshooting, and terminal server maintenance for site system
vii
35()$&(
35()$&(
administrators.
Conventions
You will find the following terms and notation used throughout this manual.
Terms
Authentication method
– A security function that verifies the user, attempting to access the terminal server, is authorized. The terminal server uses a Password/Callback authentication method. An internal database stores information about each authorized user. See Chapter 2 for further information about adding, deleting, or modifying user information.
Master user
– Identifies a user with highest level of privileges. A master user may add and delete other users, including other users with master level privileges.
System prompt
– The system prompt includes the site name followed by the “greater than” symbol ( > ). Terminal server commands are typed at this p rompt.
SYSOP session
– Identifies a communication session between a terminal server and the CWC server through either a Telnet, dial-up, or an AUX port connection.
Direct connection
– Identifies a communication session between a terminal server and a Telnet capable device, a dial-up connection, or an AUX port connection.
Notation Used in this Manual
Prompts appearing on the screen are typed in prompts are typed in
bold
.
italics.
Data entered at
viii
7(5
7(50
0,1
In This Book
This book consists of the following chapters:
Introduction
,1$
$/ 6(59(5 5
/ 6(59(5 5(
()(5
)(5(
(1&(
1&(
Chapter 1,
Overvi ew of Fe atures -
An overview of the terminal server
features and operation. Chapter 2,
The User Database -
Explains how to add, delete and
change information in the user database. Chapter 3.
System Parameters -
Includes instructions on how to set up
the network parameters, such as the IP and Ethernet addresses. Chapter 4,
File Buffering -
Describes how the terminal server stores data from host ports and how to manage and retrieve data buffers and files.
Chapter 5,
Modem Port Setup -
Explains how to configure a terminal server modem port. All parameters to set up modem ports are described.
Chapter 6,
Troubleshooting -
Explains how to reset all unit parameters to factory defaults and manually configure the system using a saved configuration file.
Chapter 7,
Action and Event Tables -
Explains how the terminal server manages alarms. This chapter also explains how to create, modify, and test Action Tables.
Chapter 8,
Action and Event Routines -
Describes each internal event
and standard action routine. Examples are also included.
ix
35()$&(
35()$&(
x
7(5
7(50
0,1
,1$
$/ 6(59(5 5
/ 6(59(5 5(
()(5
)(5(
(1&(
1&(
1. OVERVIEW OF FEATURES
What This Chapter Contains
This chapter provides an overview of the features and functions of the terminal server.
Hardware Configuration
Sof t ware Configuration
How to Display Menus and Issue Commands
Editing Modes
Functionality Overview
1
&+$37(5 
&+$37(5  29(59
29(59,
,(:
(: 2
2) )($78
) )($785
5(6
(6
Hardware Configuration
The terminal server is pre-configured for use with the Central Web Console. Many of the features and functions included with the terminal server are not supported for use with this environment. Use of the terminal server beyond the scope of this manual and the
Web Console Administrator Guide
is not recommended.
The hardware configuration consists of the following:
Two expansion boards providing 28 host-console ports.
Two Auxiliary (AUX) ports for initialization and direct communication
with the terminal server.
O ne PCMCIA modem.
48V- bat tery sensor (not used in this environment).
50-pin connector r eserved for future use.
HP Central
Software Configuration – VER Command
The VER command can be issued to display configuration information. Issue the VER command at the system prompt. An example of the type of information displayed by the VER command is shown below.
2
7(5
7(50
0,1
,1$
$/ 6(59(5 5
/ 6(59(5 5(
()(5
)(5(
(1&(
1&(
Displaying Menus and Issuing Commands
Commands are organized into command group menus. Each menu lists the commands and the corresponding command mnemonics. If you already know the command you wish to use, you may enter the command mnemonic at the system prompt. If you are uncertain of the command, you may display the menu by entering the letter assigned to that menu. If only [Enter] is pressed, the current menu is re-displayed.
To go from one menu to another, enter the command letter assigned to that group at the system prompt. The menu mnemonics, names, and descriptions are listed below:
Command Menu Description
U User Maintenance
Functions
S System Functions
Displays list of commands to modify the user database.
Displays list of commands to specify site and scheduling
3
&+$37(5 
&+$37(5  29(59
29(59,
,(:
(: 2
2) )($78
) )($785
5(6
(6
Command Menu Description
information.
A Action and Alarm
Functions
Displays list of commands to view and modify the Action Table.
L Log Functi ons Displays list of commands to
view and modify logs.
F Fi l e Maintenance Displays list of commands to
configure file buffering and management.
P Port and Session
Control Functions
Displays list of commands to view port status, port signals, host sessions, and to display and modify network parameters.
X User Commands Displays list of custom
commands added as part of the device configuration. If X returns one of the menus listed above, the terminal server does not contain custom commands.
NOTE: All commands may be entered at the system prompt. The menu does not have to be displayed first. The access class of each user determines the commands displayed.
4
7(5
7(50
0,1
,1$
$/ 6(59(5 5
/ 6(59(5 5(
()(5
)(5(
Entering/Selecting Parameters
Parameters are entered or changed by either typing them in or by selecting them from a list of options. The method depends on the command.
(1&(
1&(
For example, at the system prompt type
DH (D
isplay Host) and press ENTER. The unit will respond with a message of ‘--- Display Host Port Params ---‘ and then a list of host ports to select. Type in the number of the Host port whose parameters you wish to view, press ENTER. The user may view these parameters in one step by typing
DH x
(where x is the Host Port number) and pressing return. The parameters for the selected Host Port will be displayed.
In some cases, the terminal server system provides you with several options. If the option displayed is not appropriate, scroll through the list by pressing the space bar. When the selection you want appears in the field, press the Enter key to select that item.
In the Set Date and Time ( codes available. Type
SDT
) command, there are 10 different date
SDT
at the system prompt and the current date format will be displayed. Press the space bar and another format will be displayed, there are ten date format options. Once the desired format is displayed, press ENTER to accept the format. The display is now today’s date shown in the format just entered. Press the ENTER again to display the current time. Pressing ENTER again returns the system prompt (>).
Some commands require that certain parameters be specified. For example, when you type
the Set System Parameters screen is
SSP
displayed. The example below shows the parameters for Site Information (Option 1).
5
&+$37(5 
&+$37(5  29(59
29(59,
,(:
(: 2
2) )($78
) )($785
5(6
(6
Some commands allow you to include additional modifiers that make the command specific. For example, to list only action items beginning with the character .H, type:
LA .H (or la .h)
and press the Enter key. The List Action Items screen will be displayed, but only the action items starting with .H are included.
Editing Modes
The terminal server supports editing in TTY and VT-100 modes. VT-100 mode displays all required information and then allows you to move up, down and across the screen to edit lines. In TTY mode, the lines are displayed one line at a time and must be edited left to right. TTY mode is the default mode for all access ports on the terminal server.
Use the SYSOP command
VT ON
mode during the current SYSOP sessions, regardless of the connection (AUX, Telnet or Modem). Typing turn the session back to TTY.
6
to select VT-100 as the terminal
VT OFF
during the current SYSOP will
7(5
7(50
0,1
,1$
$/ 6(59(5 5
/ 6(59(5 5(
()(5
)(5(
(1&(
1&(
The user may change the default port editing setting (TTY) for access ports on the terminal server. To change the parameters for the AUX port, Telnet port(s), or Modem port(s), issue the
SA, ST, or SM
commands for each port respectively, and change the “Terminal Emulation” parameter by toggling from TTY to VT-100.
NOTE: Your terminal must support VT-100 mode. If you issue the VT ON command, and your terminal does not support this mode, unpredictable results, such as the appearance of extraneous characters, may occur. If you have a VT-100 terminal (or your computer is emulating a VT-100 terminal) but you have the parameter VT100 On/Off set to Off, TTY mode is used and the configuration screens are displayed one line at a time.
TTY Mode
Information is displayed one line at a time for editing. After the Enter key is pressed the next line is displayed for editing. In this mode it is impossible to return to "entered" lines to modify them.
VT-100 Mode
If you have a VT-100 terminal (or your computer is emulating a VT-100 terminal) you can execute SYSOP commands in VT-100 mode. In this mode all of the prompts will be displayed on the screen at once along with the data to be edited. The cursor will initially appear at the beginning of the first field.
At this point the arrow keys can be used to move from line to line performing edits in any order. Pressing the Enter key with the cursor on the last line of the display completes the function.
7
&+$37(5 
&+$37(5  29(59
29(59,
,(:
(: 2
2) )($78
) )($785
5(6
(6
Using the Editing Keys
Most SYSOP commands display a series of prompts to allow entry of parameters specific to that command. Default or previously entered information is displayed and can be edited using the techniques described here.
If your terminal emulation program has an option to set Destructive Backspace or Non-Destructive Backspace, choose the latter.
The following editing keys can be used whenever a field is presented for modification.
Editing Function Keys
Move cursor to the right [CTRL] R Move Cursor to the Left [CTRL] L Delete the character at the cursor [CTRL] D Toggle overstrike on or off (default is off) [CTRL] O Delete text to the End of Line (EOL) [CTRL] X Move the cursor to the beginning of the line [CTRL] B Move the cursor to the end of the line [CTRL] E Backspace and delete Restart field (clears all new data and returns previous data) [CTRL] Z Abort (ends edit and does not change any pre-existing data) [CTRL] A Complete a line and go to next line Toggle choices (an example of a toggle choice is Yes or No) Space bar
[← ] (Backspace key)
[↵ ] (Enter key)
Functionality Overview
The terminal server provides several basic functions: security, site connectivity, alarm processing, and data buffering.
8
7(5
7(50
0,1
,1$
$/ 6(59(5 5
/ 6(59(5 5(
()(5
)(5(
(1&(
1&(
Function Description Security The terminal server, as a front end, provides
secured access to host devices. , All users connecting to the terminal server through the network, modem, or the AUX Port need to authenticate before being passed through to a host device or permitted to administer the terminal server. The terminal server also provides a logical switching function that allows an authorized user to connect to any host device listed in the user’s profile.
Site Connectivity The terminal server acts as a central point for
connection to all hosts and other serial devices at a site. It enables connections through a local terminal, dial-up modem, and Ethernet. A dial-up modem also provides a PPP connection, allowing remote access to networked devices.
Alarm Processing When attached to a maintenance port, the
terminal server can process alarm messages and other ASCII based data streams. Alarm messages can be delivered via a modem or network connection. Using either PPP or network connectivity, the terminal server can deliver SNMP traps to network managers. The terminal server can convert ASCII-based alarms received on its host ports to standard SNMP traps. Acting as a SNMP trap proxy agent, the terminal server allows legacy equipment to be managed and provides alarm-reporting functions.
Data Buffering The terminal server can buffer all data
transmitted to a host port by the attached
9
&+$37(5 
&+$37(5  29(59
29(59,
,(:
(: 2
2) )($78
) )($785
5(6
(6
Function Description
device. Data is collected on a RAMdisk as either buffered data or files. Error messages, buffered console output, traffic data and other information can be subsequently delivered to a central location through a dial-up or network connection.
Security Management
The terminal server maintains a database of authorized users. Only users listed in the database who successfully authenticate are allowed access. Supported authentication methods include the following password-oriented methods: Password, Callback and Variable Callback. The terminal server is configured for use with the following token methods, but the current version of the Central Web Console does not support their use: PassKey, and Pager.
The terminal server supports five access classes. Only a system administrator, logged into a SYSOP session as Master, can modify user profiles or the user database. The access class determines which ports can be addressed and what information can be viewed or modified within the terminal server.
Network Capabilities
The terminal server has both an Ethernet and a PPP TCP/IP network connection. Network connections support Telnet—to the terminal server and to attached hosts, FTP—for buffer and file delivery, and SNMP—for TRAP delivery to network management stations. In addition, the terminal server routes traffic between its network interfaces, allowing it to act as a secure, remote-access server for maintenance applications.
10
7(5
7(50
0,1
,1$
$/ 6(59(5 5
/ 6(59(5 5(
()(5
)(5(
(1&(
1&(
Alarm Management
Alarms and events originate from a number of sources: data received on a serial port, Timer events, as well as other activities internal to the terminal server.
When the terminal server processes an alarm or event, it checks the Action Table to determine if it is listed. If the alarm matches one listed in the Action Table, the event is placed in the Event Table for processing and listed in the System Log for reference. To process the event, the terminal server performs the associated Action Routine, which performs a task associated with the alarm.
Usually the event is processed right away, and the appropriate action is taken (for example, delivering the alarm through a dial-up connection). If the event can not be acted upon immediately, it remains in the Event Table until the required time has elapsed, or the necessary resources become available (for example, the modem becomes free).
Action Routines are scripted functions that can perform a wide range of tasks associated with particular or general alarms. Certain Action Routines are included with the system, while others can be created and loaded into the terminal server in order to customize the alarm processing mechanisms and interface. Action Routines can be used to deliver alarms, take action on a host port, provide additional alarm filtering, or collect information on which subsequent alarms will be based. Action Routines can also create new alarms (called Pseudo Alarms) which allow the process to feed back on it.
11
&+$37(5 
g
&+$37(5  29(59
29(59,
,(:
(: 2
2) )($78
) )($785
5(6
(6
Ev ent G en erators
Pseudo Event
Intern a l E v e nt
Host Port
Environmental
er
Mana
System Log
03/01/1994 12:00:10 DO L IST: 03/01/1994 02:10:33 Call 03/01/1994 06:22:21 Event: . . . . . .
Logs
The terminal server maintains logs containing details of alarms, accesses, host port activity, and system information. These logs are useful for site management, security management, and troubleshooting. The terminal server maintains all logs even without system power. A description of each log type follows:
"LH " to view
Action Table "LA" to view
ERR000 ERR0 01 P AG E 555-121 2 .D AILY D OLIST .MID NITE .MIDNITE PHS YSOP .MIDNITE.1 SCHEDULE AM PHONHOME . . . . . .
Event Table
ERR 001 000 111 222 333 System PHONHOME (ASAP)
.DAILY PHONHOME
. . .
"LE" to view
Access History
- The terminal server records each successful access. The time, date, user ID, duration of session and type of session are included in each record.
Failure History
- The Failure History Log records failed access attempts. The log includes the date, time, user ID, the port accessed and the reason for failure.
12
7(5
7(50
0,1
,1$
$/ 6(59(5 5
/ 6(59(5 5(
()(5
)(5(
(1&(
1&(
Log History
- This log records the activity of the terminal server and the devices to which it is connected. Activities include modem connections, received calls, SYSOP sessions, and detected alarms and events.
Error Log
- The Error Log contains information regarding errors in
System or User written routines.
Data Buffering
Each host port of the terminal server receives data from the resource to which it is connected. This data may be
buffered
which is temporarily stored on the terminal server RAMdisk. The RAMdisk reserves up to 1MB per port. The file may be sent to the administration PC for later review or importation into another software package.
The terminal server offers the option of automatic or manual data buffering from a host port. If automatic buffering is enabled, the system will switch buffer files according to preset parameters. If automatic buffering is not enabled, the administrator must open and switch buffer files manually. Buffer files are stored on the RAMdisk in the subdirectory of the particular host port. The buffer files can be managed using commands that are similar to DOS commands. These commands are listed in the File Management Menu.
, or collected in a file,
13
&+$37(5 
&+$37(5  29(59
29(59,
,(:
(: 2
2) )($78
) )($785
5(6
(6
14
7(5
7(50
0,1
,1$
$/ 6(59(5 5
/ 6(59(5 5(
()(5
)(5(
(1&(
1&(
2. THE USER DATABASE
What This Chapter Contains
The system administrator must create the user database once the terminal server is installed and all required ports initialized. The Central Web Console application requires a minimum of three user-access records: a Master user, a buffer manager, and a joint session manager. This chapter explains how to create and manage the user database.
The terminal server maintains a database of authorized users . Each user who accesses the terminal server or a host(s) through a secured web connection, a dial-up port or network connection must have a user record in the database. By limiting access through each of the ports, the terminal server provides access security to both the terminal server and protected host devices.
The user database resides on the RAMdisk and contains detailed information about each user: such as user name, access class, and authentication method. The user database can hold information for 90­plus users.
User Maintenance Functions Menu
How to Add, Delete and Change Inform ation in the User
Database
Description of Access Level and Authentication Methods
15
&+$37(5 
&+$37(5  7+(
7+( 86(5
86(5 '$7$%$6(
'$7$%$6(
Overview
This chapter covers functions related to adding, modifying and deleting users from the database.
The database will be destroyed if the terminal server encounters a failure. Save the latest version of the database to an FTP directory; this helps you recreate a current database in the case of a failure.
Each record in the database contains the following information about the user:
User Name (ID) Access Class Whether user access is blocked User Access Expiration Date Number of sessions allowed Primary and Secondary Authentication Methods Auto Execute Command Comments
Access Classes
Each user is assigned an access class that determines his/her access and administrative privileges. Users assigned the access class “Host” can only access host ports and have no administrative privileges on the terminal server. Sysop and Master users can administer the terminal server in addition to accessing the host ports.
NOTE: Only a user with Master access privileges can add, delete or modify user profiles in the database.
Master
– Master access permits the user to change all information in the terminal server. The Master user controls when and how alarms are reported, add and delete users from the user database, change user
16
7(5
7(50
0,1
,1$
$/ 6(59(5 5
/ 6(59(5 5(
()(5
)(5(
profiles, modify Action and Event tables, manage data buffering and access all hosts. The Master class is the highest level of access.
(1&(
1&(
Sysop 3
– A Sysop 3 user can perform all functions listed above with the exception of modifying the user database. A Sysop 3 user can access all host ports and has access to the file commands used to manage data buffering, can make changes in how the terminal server responds to alarms, and change the port configuration of the unit.
Sysop 2
– A Sysop 2 user can view all alarm and event information, and manipulate pending alarms. The Sysop 2 user cannot change the way the terminal server responds to alarms. The Sysop 2 user can access all host ports.
Sysop 1
– A Sysop 1 user can view pending alarms, but cannot create or save changes. Data buffering commands are not available to the Sysop 1 user. The Sysop 1 user can access all host ports.
Host 1 to Host n
– The host user only has access to a single host device. The host user cannot access any of the terminal server functions.
Displaying the User Maintenance Functions Menu
The User Maintenance Functions Menu displays all commands associated with adding, deleting and changing information in the user database.
To display the User Maintenance Functions Menu, type U at the system prompt and press Enter. All commands associated with maintaining the user database are shown on this menu.
17
&+$37(5 
&+$37(5  7+(
7+( 86(5
86(5 '$7$%$6(
'$7$%$6(
Command Summary
This database contains the records for authorized users of the terminal server system.
The following table lists commands to administer the user database. The table includes a brief description of each command and lists the access level that a user must have to successfully issue the command.
Function Description Access Class
Required
AU – Add User Adds a user profile to the database. Master CU – Change User Changes the information associated with a
user who has already been entered into the system using the Add User command.
DU – Display User Record
LU – List Users Displays list of all users in the database. Sysop 2, Sysop
Displays entire record for the user selected. Sysop 2, Sysop
18
Master
3, Master
3, Master
7(5
7(50
0,1
,1$
$/ 6(59(5 5
/ 6(59(5 5(
Function Description Access Class
()(5
)(5(
(1&(
Required
1&(
XU – Delete User Deletes a user and removes all records
associated with that user from the terminal server database.
Master
Adding a User – AU Command
The AU command allows you to add a user to the terminal server system. To access the system, a password is required. The first user entered into the database should have an access level of master. A master level user can access all the features of the terminal server and can add and delete users from the user database.
To add a user, type AU at the system prompt and press Enter. The Add User information screen is displayed. You may also type the user name as part of the command.
For example:
AU Carol
or
AU
then
Carol
at the User Name prompt
19
&+$37(5 
&+$37(5  7+(
7+( 86(5
86(5 '$7$%$6(
'$7$%$6(
Field Function
Enter a user name. User names may be up to 15
User Name
alphanumeric characters in length, including spaces.
NOTE: The terminal server converts alphabetical characters to upper case.
Access Class
Block Access
Sessions Allowed
User Expiration Date
Primary Authentication Method
To select the Access Class, press the
space bar
until the desired choice is displayed.
NOTE:
The first user entered should be a
master level user. A master user should be maintained in all systems at all times
.
Initially No (the default) appears on the screen. Press the space bar to toggle to Yes. No enables access to the terminal server. Yes blocks access to the terminal server.
Press the Enter key to allow unlimited sessions. Enter a
number from 1 to 999 and press Enter to limit the number of successful sessions allowed for that user.
Enter the date in month/day/year to set the end of the user's access period. No date signifies the user has an unlimited access period.
Press the space bar until Password/Callback displayed.
NOTE: The Pager and PassKey options are not supported with this version of the Central Web Console.
20
Loading...
+ 136 hidden pages