Lantronix SCS Reference Manual

SCS Reference Manual
For the Lantronix Family of Secure Console Servers
Part Number 900-235
Revision D December 2003
The information in this guide may change without notice. The manufacturer assumes no responsibility for any errors which may appear in this guide.
Copyright 2003, Lantronix. All rights reserved. No part of the contents of this book may be transmitted or reproduced in any form or by any means without the written permission of Lantronix. Printed in the United States of America.
The revision date for this manual is December 2003.
Part Number: 900-235
Revision D
WARNING
This equipment has been tested and found to comply with the limits for a Class A digital device pursuant to Part 15 of FCC Rules. These limits are designed to provide reasonable protection against such interference when operating in a commercial environment. This equipment generates, uses, and can radiate radio frequency energy, and if not installed and used in accordance with this guide, may cause harmful interference to radio communications.
Operation of this equipment in a residential area is likely to cause interference in which case the user, at his or her own expense, will be required to take whatever measures may be required to correct the interference.
Changes or modifications to this device not explicitly approved by Lantronix will void the user's authority to operate this device.
Contents
1: Introduction .............................................................................................................1-1
1.1 What Is New................................................................................................................1-1
1.2 How To Use This Manual............................................................................................1-1
2: Gettin g S tar t e d........................................................................................................ 2-1
2.1 Configuration Methods..... ................. ................ ................. ................. ................. ....... 2-1
2.1.1 EZWebCon................................................................................................................................2-1
2.1.2 Web Bro w ser In ter f ace............... .... ............... ............................................................................2-1
2.1.3 Command Line ..........................................................................................................................2-2
2.2 Rebooting........ ................. ................. ................ ................. ................. ................. ....... 2-5
2.2.1 Sending a Broadcast Message .................................................................................................2-5
2.2.2 Restoring Factory Defaults........................................................................................................2-5
2.2.3 Reloading Operational Software ...............................................................................................2-6
2.2.4 Editing Boot Parameters ...........................................................................................................2-6
2.3 System Passwords............................................................. ................. ................. ....... 2-7
2.3.1 Login Password.........................................................................................................................2-7
2.3.2 Privileged Password..................................................................................................................2-8
2.4 Basic Configuration........................... ................ ................. ................. ................. ....... 2-9
2.4.1 Changing the Server Name.......................................................................................................2-9
2.4.2 Changing the Local Prompt.......................................................................................................2-9
2.4.3 Changin g th e Logi n Prom p ts.. ... ......................................... ....................................................2-10
2.4.4 Setting the Date and Time.......................................................................................................2-10
2.4.5 802.11 Configuration...............................................................................................................2-11
2.5 Configuration Files............................................................. ................. ................. ..... 2-16
2.5.1 Creating a Configuration File...................................................................................................2-16
2.5.2 Using a Configuration File.......................................................................................................2-17
2.6 Disk Management.............................................................. ................. ................. ..... 2-18
2.6.1 Flash Disk................................................................................................................................2-18
2.6.2 ATA Cards...............................................................................................................................2-18
3: Console Se r v e r Fea t u r e s .... .. ................................................................................. 3-1
3.1 Overview of Console Servers......................................................................................3-1
3.2 Event Port Logging ..................................................................................................... 3-2
3.2.1 Enabling Port Logging...............................................................................................................3-2
3.2.2 Viewin g th e Po r t Log ... ... ................ ...........................................................................................3-2
3.3 Email Alerts for Serial Events......................................................................................3-3
3.4 Configuring Menu Mode..............................................................................................3-4
3.4.1 Menu Configuration at the Command Line................................................................................3-4
3.4.2 Menu Configuration Files ..........................................................................................................3-5
3.4.3 Nested Menus ...........................................................................................................................3-7
3.5 Login Banner Pages ............................................................................................ ....... 3-8
3.6 Managing the Attached Devices ....... ................ ................. ................. ................. ....... 3-8
3.6.1 In-Band Management................................................................................................................3-8
3.6.2 Out of Band Management .........................................................................................................3-9
3.6.3 Conne cti n g from th e Loca l > Pro m pt.. ... ... .............................................................................. ....3-9
3.6.4 Serial Break Handling................................................................................................................3-9
3.7 Serial Port Configurations .........................................................................................3-14
3.7.1 Enabling the Incoming Password............................................................................................3-14
3.7.2 Setting the Port Access Mode.................................................................................................3-14
3.7.3 Displaying Port Status .............................................................................................................3-14
i
4: Basic Remote Networking ..................................................................................... 4-1
4.1 Remote Connection Types..........................................................................................4-1
4.1.1 Remote Dial-in ..........................................................................................................................4-1
4.1.2 LAN to LAN ...............................................................................................................................4-2
4.2 Managing Connections With Sites..............................................................................4-2
4.2.1 Creating a New Site ..................................................................................................................4-3
4.2.2 Displaying Existing Sites ...........................................................................................................4-4
4.2.3 Editing Sites ..............................................................................................................................4-4
4.2.4 Testing Sites..............................................................................................................................4-5
4.2.5 Deleting Sites............................................................................................................................4-5
4.2.6 Using Sites for Incoming Connections ......................................................................................4-5
4.2.7 Using Sites for Outgoing Connections ......................................................................................4-6
4.2.8 ISP Site Connections with NAT.................................................................................................4-6
4.3 IP Address Negotiation .... ................. ................ ................. ................. ................. ....... 4-7
4.4 IP Routing ....... ................. ................. ................ ................. ................. ................. .......4-8
4.4.1 Routes for Outgoing LAN to LAN .............................................................................................4-8
4.4.2 Routes for Incoming LAN to LAN ..............................................................................................4-9
4.4.3 Routes for Remote User Dial-ins...............................................................................................4-9
4.4.4 Configuring RIP for Sites.........................................................................................................4-10
4.5 Incoming Connections ....................................................... ................. ................. .....4-11
4.5.1 Star ting PPP /S li p for In com in g C onn ections.......................... .................................................4- 11
4.5.2 Incoming Connection Sequence ............................................................................................4-13
4.5.3 Configuring Incoming Connections .........................................................................................4-14
4.6 Outgoing Connections ....................................................... ................. ................. .....4-16
4.6.1 Ports for Outgoing Connections .............................................................................................. 4-17
4.6.2 Telephone Numbers................................................................................................................4-17
4.6.3 Authentication..........................................................................................................................4-17
4.6.4 Configuring Outgoing Connections .........................................................................................4-18
4.7 Monitoring Networking Activity..................................................................................4-20
4.8 Examples ....... ................. ................. ................ ................. ................. ................. .....4-21
4.8.1 LAN to LAN—Calling One Direction Only................................................................................4-21
4.8.2 LAN to LAN—Bidirectional (Symmetric) Callin g......................................................................4-22
4.8.3 Remot e Di al- i n User Exa mpl e .......................................................... ....................................... 4-24
5: Additional Remote Ne t w o rk ing ... .. .................................... ... ................................. 5-1
5.1 Basic Security .................................. ................ ................. ................. ................. ....... 5-1
5.1.1 Port Authentication....................................................................................................................5-1
5.1.2 Filter Lists ..................................................................................................................................5-2
5.2 Chat Scripts .... ................. ................. ................ ................. ................. ................. .......5-3
5.2.1 Creating a Chat Script...............................................................................................................5-3
5.2.2 Editing and Adding Entries........................................................................................................5-3
5.2.3 Configuring Timeouts ................................................................................................................5-4
5.2.4 Setting Markers .........................................................................................................................5-4
5.3 Bandwidth On Demand...............................................................................................5-4
5.3.1 How Bandwidth is Controlled ....................................................................................................5-5
5.3.2 Disadvantages of Additional Bandwidth....................................................................................5-5
5.3.3 Configuring Bandwidth Allocated to Sites .................................................................................5-6
5.3.4 Displaying Current Bandwidth Settings.....................................................................................5-8
5.3.5 Restoring Default Bandwidth Settings....................................................................................... 5-8
5.3.6 Monitoring Bandwidth Utilization...............................................................................................5-8
5.4 Increasing Performance... ................. ................ ................. ................. ................. ....... 5-8
5.4.1 Filtering Unwanted Data............................................................................................................5-8
5.4.2 Compr e ssi n g Dat a and C orr e cti ng Er ror s .. ............................ ...................................................5 -9
5.4.3 Adding Bandwidth .....................................................................................................................5-9
5.4.4 IP Header Compression ............................................................................................................5-9
5.5 Reducing Cost ................. ................. ................ ................. ................. ................. ..... 5-10
ii
5.5.1 Inactivity Logouts.....................................................................................................................5-10
5.5.2 Restricting Packets with Startup Filters...................................................................................5-10
5.5.3 Reduci n g th e Numb e r of Ports U sed.... ... ............................ ....................................................5-10
5.5.4 Using Higher Speed Modems .................................................................................................5-10
5.5.5 Restricting Connections to Particular Times............................................................................5-11
5.5.6 Increasing Requirements for Adding Additional Bandwidth.....................................................5-12
5.5.7 Controlling Frequency of Calls................................................................................................5-12
5.6 Using the SCS Without Dialup Modems ................................................................... 5-13
5.6.1 Situations Where Dialup Modems Are Not Used.....................................................................5-13
5.6.2 Configuring the Unit for Modemless Connections ...................................................................5-14
5.7 Character Mode Sites ...............................................................................................5-15
5.8 Examples ........ ................. ................. ................ ................. ................. ................. ..... 5-16
5.8.1 Creating a Chat Script.............................................................................................................5-16
5.8.2 Creating a Simple Firewall ......................................................................................................5-16
5.8.3 Controlling Access During Weekend Hours............................................................................5-16
6: IP .... .................................................................................... ...................................... 6-1
6.1 IP Addresses... ................. ................. ................ ................. ................. ................. .......6-1
6.1.1 IP Addresses for Incoming Connections ...................................................................................6-2
6.1.2 IP Addresses For Outgoing Connections..................................................................................6-4
6.2 Subnet Masks . ................. ................. ................ ................. ................. ................. ....... 6-5
6.2.1 Length of Subnet Masks............................................................................................................6-6
6.3 Name Resolving............... ................. ................ ................. ................. ................. ....... 6-6
6.3.1 Configuring the Domain Name Service (DNS) ..........................................................................6-7
6.3.2 Specifying a Default Domain Name ..........................................................................................6-7
6.3.3 Adding Hosts to the Host Table.................................................................................................6-7
6.4 Header Compression........................................ ................. ................. ................. ....... 6-8
6.5 Establishing Sessions....................................... ................. ................. ................. ....... 6-8
6.5.1 Telnet and Rlogin Sessions.......................................................................................................6-9
6.5.2 SSH Sessions .........................................................................................................................6-10
6.5.3 Restricting Connections to SSH..............................................................................................6-17
6.5.4 Disabling HTTP and FTP ........................................................................................................6-17
6.6 IP Security....... ................. ................. ................ ................. ................. ................. .....6-17
6.6.1 Configuring the Security Table................................................................................................6-18
6.6.2 Cleari n g Tab le En tr ie s.............................................................................................................6-18
6.7 IP Routing ....... ................. ................. ................ ................. ................. ................. .....6-19
6.7.1 How Packets are Routed.........................................................................................................6-19
6.7.2 Routing Tables........................................................................................................................6-19
6.7.3 Using RIP ................................................................................................................................6-22
6.7.4 Proxy ARP...............................................................................................................................6-22
6.7.5 Using the NetBIOS Nameserver (NBNS)................................................................................6-22
6.7.6 Routing and Subnetworks.......................................................................................................6-23
6.8 Displaying the IP Configuration......................... ................. ................. ................. ..... 6-23
6.9 Examples ........ ................. ................. ................ ................. ................. ................. ..... 6-25
6.9.1 IP Address Assignment for Remote Networking .....................................................................6-25
6.9.2 General IP Setup ....................................................................................................................6-26
6.9.3 Addin g Sta tic Rou te s... .............................................................................. ..............................6-26
6.9.4 Default Routes to a Site ..........................................................................................................6-26
7: PPP. .. .................................................................. ...................................................... 7-1
7.1 LCP................................................................... ................. ................. ................. ....... 7-1
7.1.1 Packet Sizes..............................................................................................................................7-1
7.1.2 Header Compression ................................................................................................................7-1
7.1.3 Character Escaping...................................................................................................................7-1
7.1.4 PPP Authentication ...................................................................................................................7-2
7.1.5 CBCP ........................................................................................................................................7-3
iii
7.2 NCP ................ ................. ................. ................ ................. ................. ................. ....... 7-3
7.3 Starting PPP ... ................. ................. ................ ................. ................. ................. .......7-3
7.3.1 User-Initiated PPP.....................................................................................................................7-4
7.3.2 Automatic Detection of PPP......................................................................................................7-4
7.3.3 Dedicated PPP ..........................................................................................................................7-4
7.4 Multilink PPP.................... ................. ................ ................. ................. ................. .......7-4
7.4.1 Configuring the Calling SCS......................................................................................................7-4
7.4.2 Configuring the Receiving SCS.................................................................................................7-6
7.5 Restoring Default PPP Settings..................................................................................7-7
7.6 Pocket PC PPP Support .............................................................................................7-7
7.7 Character Mode Sites .................................................................................................7-7
7.8 Troubleshooting ................................................ ................. ................. ................. ....... 7-8
8: Ports . .................................................................. ...................................................... 8-1
8.1 Using Port Commands................................................................................................8-1
8.2 Setting Port Access..................................................................................................... 8-1
8.3 Starting a Port.............................................................................................................8-1
8.3.1 Waiting for Character Input .......................................................................................................8-2
8.3.2 Starting Automatically................................................................................................................8-2
8.4 Port Modes...... ................. ................. ................ ................. ................. ................. .......8-3
8.4.1 Character Mode.........................................................................................................................8-3
8.4.2 PPP Mode .................................................................................................................................8-3
8.4.3 SLIP Mode.................................................................................................................................8-3
8.5 Automatic Protocol Detection...................................................................................... 8-4
8.6 Port-Specific Session Configuration............................................................................8-4
8.6.1 Multiple Sessions ......................................................................................................................8-4
8.6.2 Switching Between Sessions ....................................................................................................8-5
8.6.3 Exiting Sessions........................................................................................................................8-5
8.6.4 Monitoring Session Activity .......................................................................................................8-7
8.6.5 Setti n g Ses sio n C har act er is tic s......... ... .....................................................................................8-7
8.7 Preferred/Dedicated Protocols & Hosts ...................................................................... 8-8
8.7.1 Dedicated Protocols ..................................................................................................................8-8
8.7.2 Preferred/Dedicated Hosts ........................................................................................................8-9
8.7.3 Saving Autostart Characters .....................................................................................................8-9
8.8 Port Restrictions............... ................. ................ ................. ................. ................. ....... 8-9
8.8.1 Locking a Port ...........................................................................................................................8-9
8.8.2 Enabling Signal Check ............................................................................................................8-10
8.8.3 Username/Password Protection..............................................................................................8-10
8.8.4 Automatic Logouts...................................................................................................................8-11
8.8.5 Restricting Commands............................................................................................................8-12
8.8.6 Receipt of Broadcast Messages..............................................................................................8-12
8.8.7 Dialback...................................................................................................................................8-12
8.8.8 Enabling Menu Mode ..............................................................................................................8-12
8.9 Serial Port Configuration...........................................................................................8-13
8.9.1 Naming a Port .........................................................................................................................8-13
8.9.2 Specifying a Username ...........................................................................................................8-13
8.9.3 Notification of Character Loss .................................................................................................8-13
8.9.4 Padding Return Characters.....................................................................................................8-14
8.9.5 Setting the Device Type ..........................................................................................................8-14
8.9.6 Specifying a Terminal Type.....................................................................................................8-14
8.9.7 Transmitting Serial Data..........................................................................................................8-14
8.9.8 Restoring Default Port Settings...............................................................................................8-15
8.10 RS-485 Configuration ...................................................... ................. ................. .....8-15
8.10.1 Two-wire Mode......................................................................................................................8-16
8.10.2 Four-wire Mode .....................................................................................................................8-17
8.10.3 Termination ...........................................................................................................................8-18
iv
8.10.4 RS-422 Networking ...............................................................................................................8-18
8.11 Flow Control................... ................. ................ ................. ................. ................. .....8-18
8.11.1 Hardware Flow Control..........................................................................................................8-18
8.11.2 Software Flow Control...........................................................................................................8-19
8.11.3 Setting Up Flow Control ........................................................................................................8-19
8.12 Serial Signals................................................................... ................. ................. ..... 8-20
8.12.1 DSR (Data Set Ready) ..........................................................................................................8-21
8.12.2 DCD (Data Carrier Detect)....................................................................................................8-21
8.12.3 DTR (Data Terminal Ready)..................................................................................................8-22
8.13 Virtual Ports .. ................. ................. ................ ................. ................. ................. .....8-22
8.14 Modem Emulation............................................................ ................. ................. ..... 8-23
9: Modems ....... ............................. ............................................................................... 9-1
9.1 Setup and Wiring ........................................................................................................ 9-1
9.2 Modem Speeds................................. ................ ................. ................. ................. ....... 9-2
9.2.1 Serial Speed..............................................................................................................................9-2
9.2.2 Line Speed ................................................................................................................................9-2
9.3 Modem Profiles.................................................................. ................. ................. ....... 9-2
9.3.1 Using a Profile...........................................................................................................................9-3
9.3.2 Editing a Profile .........................................................................................................................9-3
9.3.3 Profile Settings..........................................................................................................................9-5
9.3.4 Profiles for Modems with External Switches..............................................................................9-8
9.4 Modem and SCS Interaction....................................................................................... 9-8
9.4.1 Initialization................................................................................................................................9-8
9.4.2 Outgoing Calls...........................................................................................................................9-8
9.4.3 Incoming Calls...........................................................................................................................9-9
9.4.4 When a Port is Logged Out.......................................................................................................9-9
9.4.5 Compression .............................................................................................................................9-9
9.4.6 Error Correction.......................................................................................................................9-10
9.4.7 Modem Security ......................................................................................................................9-11
9.4.8 Autostart..................................................................................................................................9-11
9.4.9 Dialback...................................................................................................................................9-11
9.5 Terminal Adapters............ ................. ................ ................. ................. ................. ..... 9-12
9.6 Caller-ID........................... ................. ................ ................. ................. ................. .....9-12
9.7 Examples ........ ................. ................. ................ ................. ................. ................. ..... 9-13
9.7.1 Typical Modem Configuration..................................................................................................9-13
9.7.2 Modem Configuration Using Generic Profile...........................................................................9-13
9.7.3 Editing Modem Strings ............................................................................................................9-15
9.8 Troubleshooting ................................................ ................. ................. ................. ..... 9-16
10: Modem Sh a rin g............................................................................. ...................... 10-1
10.1 Services ........ ................. ................. ................ ................. ................. ................. .....10-1
10.1.1 Creatin g a Se rv ice........... ................ ......................................................................................10-1
10.1.2 Assoc iati n g Ports w it h a Ser vi ce ...........................................................................................10-1
10.1.3 Display in g Cur r ent Se r vi ces ..... ............................. ................................................................10-2
10.2 Sharing Modems............................. ................ ................. ................. ................. ..... 10-3
10.2.1 Configu rin g an IP Mod em Po o l Se rv ic e ... ......................................... ....................................1 0 -3
10.2.2 Using the COM Port Redirector............................................................................................. 10-3
10.2.3 Connec ti ng to a TC P Listener Service ........ ... ... ....................................................................10-3
10.2.4 Connec ti ng to a Se ria l Por t ......................................... ..........................................................10-4
10.2.5 Connec ti ng to a Se rv ic e or Po rt ... ... ..................................................... ................................. 10-4
10.3 Examples ........................................ ................ ................. ................. ................. .....10-4
10.3.1 Configuring the Redirector ....................................................................................................10-5
10.3.2 Configu rin g the PC C omm u nic a tio ns Soft w are . .... ................................................................1 0 -5
v
11: Securit y...... .. .................................................................................... .................... 11 -1
11.1 Incoming Authentication . ................. ................ ................. ................. ................. .....11-1
11.1.1 Character Mode Logins.........................................................................................................11-1
11.1.2 PPP Logins............................................................................................................................11-3
11.1.3 SLIP Logins...........................................................................................................................11-4
11.2 Outgoing Authentication . ................. ................ ................. ................. ................. .....11-4
11.2.1 Outgoing Character Mode Connections ................................................................................11-5
11.2.2 Outgoing PPP Connections...................................................................................................11-5
11.2.3 Outgoing SLIP Connections..................................................................................................11-5
11.3 Dialback ........ ................. ................. ................ ................. ................. ................. .....11-5
11.3.1 The Dialback Process ...........................................................................................................11-6
11.3.2 Dialback from Character Mode.............................................................................................. 11-6
11.3.3 Dialback from SLIP/PPP Mode .............................................................................................11-7
11.3.4 Dialback Using CBCP ...........................................................................................................11-7
11.3.5 Potential Dialback Drawbacks...............................................................................................11-8
11.3.6 Port User Restrictions ...........................................................................................................11-8
11.4 Database Configuration .................................. ................. ................. ................. .....11-9
11.4.1 Local (NVR) Database ..........................................................................................................11-9
11.4.2 Kerberos..............................................................................................................................11-11
11.4.3 RADIUS...............................................................................................................................11-14
11.4.4 SecurID ...............................................................................................................................11-17
11.4.5 UNIX Password File ............................................................................................................11-19
11.5 User Restrictions............ ................. ................ ................. ................. ................. ... 11-19
11.5.1 Privileged Commands .........................................................................................................11-19
11.5.2 IP Address Restriction.........................................................................................................11-20
11.5.3 Controlling Use of Set PPP/SLIP Commands.....................................................................11-20
11.5.4 Securing a Port....................................................................................................................11-20
11.5.5 Locking a Port .....................................................................................................................11-21
11.5.6 Forcing Execution of Commands ........................................................................................11-21
11.5.7 Restri cti n g Multi p l e Auth en tic a te d Logi ns ............................ ...............................................11-21
11.6 Network Restrictions....................................... ................. ................. ................. ...11-22
11.6.1 Incoming Telnet/Rlogin Connections...................................................................................11-22
11.6.2 Outgoing Rlogin Connections..............................................................................................11-22
11.6.3 Limiting Port Access............................................................................................................11-22
11.6.4 Disabling the FTP and HTTP Servers .................................................................................11-23
11.6.5 Packet F ilt ers an d Fir ewa ll s .. ... .................................................................. .........................11-23
11.7 Event Logging.................................................................. ................. ................. ... 11-25
11.7.1 Setting the Destination ........................................................................................................11-25
11.7.2 Logging Levels ....................................................................................................................11-26
11.8 Examples ..... ................. ................. ................ ................. ................. ................. ...11-28
11.8.1 Database Search Order ......................................................................................................11-28
11.8.2 Terminal User Forced to Execute Command......................................................................11-28
11.8.3 Multiple-User Authentication ...............................................................................................11-29
11.8.4 Outgoing LAN to LAN Connection.......................................................................................11-30
11.8.5 Creatin g a Fire wa ll ................................................ ..................................................... .........11-30
11.8.6 Dialback...............................................................................................................................11-33
11.9 Troubleshooting .............................................. ................. ................. ................. ... 11-33
12: Comma n d Re f ere n c e.......................................................................................... 12- 1
12.1 Command Descriptions .. ................. ................ ................. ................. ................. .....12-1
12.2 About Strings ................. ................. ................ ................. ................. ................. ..... 12-2
12.3 Conventions Used in This Chapter .........................................................................12-2
12.4 Modem Commands........ ................. ................ ................. ................. ................. ..... 12-3
12.4.1 Define Ports Modem Answer.................................................................................................12-3
12.4.2 Define Ports Modem Attention ..............................................................................................12-4
12.4.3 Define Ports Modem Busy.....................................................................................................12-4
vi
12.4.4 Define Ports Modem CallerID................................................................................................12-5
12.4.5 Define Ports Modem Carrierwait ...........................................................................................12-5
12.4.6 Define Ports Modem Commandprefix ...................................................................................12-6
12.4.7 Define Ports Modem Compression .......................................................................................12-6
12.4.8 Define Ports Modem Connected ...........................................................................................12-7
12.4.9 Define Ports Modem Control .................................................................................................12-8
12.4.10 Define Ports Modem Dial ....................................................................................................12-8
12.4.11 Define Ports Modem Error...................................................................................................12-9
12.4.12 Define Ports Modem Errorcorrection.................................................................................12-10
12.4.13 Define Ports Modem Getsetup..........................................................................................12-10
12.4.14 Define Ports Modem Init....................................................................................................12-11
12.4.15 Define Ports Modem Nocarrier..........................................................................................12-12
12.4.16 Define Ports Modem Nodialtone .......................................................................................12-12
12.4.17 Define Ports Modem OK ...................................................................................................12-13
12.4.18 Define Ports Modem Reset ...............................................................................................12-13
12.4.19 Define Ports Modem Ring .................................................................................................12-14
12.4.20 Define Ports Modem Save ................................................................................................12-14
12.4.21 Define Ports Modem Speaker ...........................................................................................12-15
12.4.22 Define Ports Modem Statistics ..........................................................................................12-15
12.4.23 Define Ports Modem Type.................................................................................................12-16
12.4.24 Show/Monitor/List Modem.................................................................................................12-16
12.5 IP/Network Commands................................... ................. ................. ................. ...12-18
12.5.1 Clear/Purge Hosts ...............................................................................................................12-18
12.5.2 Clear/Purge IP Factory........................................................................................................12-18
12.5.3 Clear/Purge IP NAT Table...................................................................................................12-18
12.5.4 Clear/Purge IP Route ..........................................................................................................12-19
12.5.5 Clear/Purge IP Security.......................................................................................................12-19
12.5.6 Clear/Purge IP Trusted........................................................................................................12-20
12.5.7 Connect...............................................................................................................................12-20
12.5.8 Disconnect...........................................................................................................................12-22
12.5.9 Purge IP Ethernet................................................................................................................12-22
12.5.10 Rlogin ................................................................................................................................12-22
12.5.11 Send..................................................................................................................................12-23
12.5.12 Set/Define 80211...............................................................................................................12-24
12.5.13 Set/Define Hosts ...............................................................................................................12-34
12.5.14 Set/Define IP All/Ethernet..................................................................................................12-35
12.5.15 Set/Define IP Create .........................................................................................................12-37
12.5.16 Set/Define IP Domain........................................................................................................12-38
12.5.17 Set/Define IP Ethernet.......................................................................................................12-38
12.5.18 Set/Define IP Host Limit ....................................................................................................12-38
12.5.19 Set/Define IP IPaddress ....................................................................................................12-39
12.5.20 Set/Define IP Loadhost .....................................................................................................12-39
12.5.21 Set/Define IP Nameserver.................................................................................................12-39
12.5.22 Set/Define IP NAT.............................................................................................................12-40
12.5.23 Set/Define IP NAT Table ...................................................................................................12-41
12.5.24 Set/Define IP NBNS ..........................................................................................................12-41
12.5.25 Set/Define IP Route...........................................................................................................12-42
12.5.26 Set/Define IP Routing........................................................................................................12-43
12.5.27 Set/Define IP Security .......................................................................................................12-43
12.5.28 Set/Define IP Subnet.........................................................................................................12-45
12.5.29 Set/Define IP TCP Keepalive ............................................................................................12-45
12.5.30 Set/Define IP Timeserver ..................................................................................................12-46
12.5.31 Set/Define IP Trusted ........................................................................................................12-47
12.5.32 Set/Define IP Trusted ........................................................................................................12-47
12.5.33 Show IP Counters .............................................................................................................12-48
12.5.34 Show/Monitor/List Hosts....................................................................................................12-48
12.5.35 Show/Monitor/List IP .........................................................................................................12-49
12.5.36 SSH...................................................................................................................................12-51
12.5.37 Telnet ................................................................................................................................12-51
vii
12.6 Port Commands............................................................... ................. ................. ... 12-52
12.6.1 List Email.............................................................................................................................12-52
12.6.2 Lock.....................................................................................................................................12-52
12.6.3 Logout Port..........................................................................................................................12-53
12.6.4 Purge Port ...........................................................................................................................12-53
12.6.5 Purge Email.........................................................................................................................12-54
12.6.6 Resume...............................................................................................................................12-54
12.6.7 Set Noprivileged ..................................................................................................................12-54
12.6.8 Snoop Port ..........................................................................................................................12-55
12.6.9 Define Email .......................................................................................................................12-55
12.6.10 Set/De fi n e Por ts Ac ce ss....................................................................................................12-57
12.6.11 Set/De fi n e Por ts Au th en ti ca te ...........................................................................................12-58
12.6.12 Set/De fi n e Por ts Au to ba u d............... ... ..............................................................................12-58
12.6.13 Set/De fi n e Por ts Au to c o nnect .......... .................................................................................12-59
12.6.14 Set/De fi n e Por ts Au to s ta r t................ ... ... ...........................................................................12-60
12.6.15 Set/De fi n e Por ts Ba c kw a rd Sw itch............ ........................................................................12-61
12.6.16 Set/De fi n e Por ts Br e ak............... .......................................................................................12-62
12.6.17 Define Ports Backspace ....................................................................................................12-63
12.6.18 Set/De fi n e Por ts Br o ad ca st ...............................................................................................12-64
12.6.19 Set/De fi n e Por ts C ha racter Size ...... ... ... ... ........................................................................12-64
12.6.20 Set/De fi n e Por ts C omm a nd Com ple ti o n ... ..................................................... ...................12-65
12.6.21 Set/De fi n e Por ts D at ase n d............... ... ... ......................................... ..................................12-66
12.6.22 Define Ports Dedicated .....................................................................................................12-68
12.6.23 Define Ports Dialback........................................................................................................12-70
12.6.24 Set/De fi n e Por ts D SRL og o ut...... ... ........................................ ............................................12-70
12.6.25 Set/De fi n e Por ts D TR Wa it...... ...........................................................................................12-71
12.6.26 Define Ports Event Email Serialdata ................................................................................12-71
12.6.27 Set/De fi n e Por ts F low Con tr ol ....... ... .............................................................................. ...12-72
12.6.28 Set/De fi n e Por ts F orw a rd Sw itc h ........ ... ... ... .....................................................................12-73
12.6.29 Set/De fi n e Por ts In activity Logout ....... ................ ..............................................................12-74
12.6.30 Set/De fi n e Por ts Lo ca l Swi t ch ....... ... .................................................................................12-74
12.6.31 Set/De fi n e Por ts Lo ss Noti f ic at ion.......... ... ... ..................................................... ................12-75
12.6.32 Set/De fi n e Por ts Me n u ........... ...........................................................................................12-76
12.6.33 Set/De fi n e Por ts Mo d em Em u l at ion ..................................................................................12 - 76
12.6.34 Set/De fi n e Por ts N ame..... .................................................................. ...............................12-77
12.6.35 Set/De fi n e Por ts Pa r it y ........ ... ...........................................................................................12-77
12.6.36 Set/De fi n e Por ts Pa s sw o rd ........... ....................................................................................12-78
12.6.37 Set/De fi n e Por ts Po c ke tP C ................................. ..............................................................12-79
12.6.38 Set/De fi n e Por ts Pr e fer re d ......... ... ... .............................................................................. ...12-79
12.6.39 Define Ports PPP ..............................................................................................................12-81
12.6.40 Define Ports PPPdetect.....................................................................................................12-84
12.6.41 Set/De fi n e Por ts Pr i nt er.....................................................................................................12-84
12.6.42 Set/De fi n e Por ts Se c u rity .... ... .... .......................................................................................12-85
12.6.43 Set/De fi n e Por ts Se r ia l Log ............................................................................................ ...12-85
12.6.44 Set/De fi n e Por ts Se s si o n Limi t............... ... ........................................................................12-86
12.6.45 Set/De fi n e Por ts Si g na l Ch eck ...... ... .................................................................................12-86
12.6.46 Define Ports SLIP..............................................................................................................12-87
12.6.47 Set/De fi n e Por ts SL IPdetect.......... ... ............................ .....................................................12-88
12.6.48 Set/De fi n e Por ts Sp ee d.......... .... ........................................ ...............................................12-88
12.6.49 Set/De fi n e Por ts Sto p.......... ... ...........................................................................................12-89
12.6.50 Set/De fi n e Por ts T eln et Pad..............................................................................................12-89
12.6.51 Set/De fi n e Por ts T erm Ty p e........... ... ... ... ...........................................................................12-90
12.6.52 Set/De fi n e Por ts T ype ...................... .................................................................................12-90
12.6.53 Set/De fi n e Por ts U ser n ame. ... ............................................................................... ...........
12.6.54 Set/De fi n e Por ts Ve r if ic at ion .......................................................................................... ...12-92
12.6.55 Set Privileged/Noprivileged ...............................................................................................12-92
12.6.56 Define Protocols RS485 ....................................................................................................12-93
12.6.57 Set Session .......................................................................................................................12-94
12.6.58 Set PPP.............................................................................................................................12-95
.12-91
viii
12.6.59 Set SLIP ............................................................................................................................12-96
12.6.60 Show/Monitor/List Ports ....................................................................................................12-96
12.6.61 Show RS485 .....................................................................................................................12-98
12.6.62 Show/Monitor Sessions.....................................................................................................12-98
12.6.63 Test Port............................................................................................................................12-99
12.6.64 Unlock Port......................................................................................................................12-100
12.7 Service Commands........ ................. ................ ................. ................. ................. . 12-101
12.7.1 Clear/Purge Service ..........................................................................................................12-101
12.7.2 Remove Queue .................................................................................................................12-101
12.7.3 Set/Define Service.............................................................................................................12-102
12.7.4 Set/Define Service Banner ................................................................................................12-103
12.7.5 Set/Define Service Binary ................................................................................................. 12-103
12.7.6 Set/Define Service EOJ.....................................................................................................12-103
12.7.7 Set/Define Service Formfeed ............................................................................................12-104
12.7.8 Set/Define Service Identification .......................................................................................12-104
12.7.9 Set/Define Service Password............................................................................................12-105
12.7.10 Set/Define Service Ports .................................................................................................12-105
12.7.11 Set/Define Service Postscript..........................................................................................12-106
12.7.12 Set/Define Service PSConvert ........................................................................................12-106
12.7.13 Set/Define Service RTEL ................................................................................................12-106
12.7.14 Set/Define Service SOJ...................................................................................................12-107
12.7.15 Set/Define Service TCPport ............................................................................................12-107
12.7.16 Set/Define Service Telnetport .........................................................................................12-108
12.7.17 Show/Monitor/List Services.............................................................................................12-108
12.8 Server Commands........................................................... ................. ................. . 12-111
12.8.1 Clear/Purge Menu .............................................................................................................12-111
12.8.2 Initialize Server..................................................................................................................12-111
12.8.3 Set/Define Menu................................................................................................................12-112
12.8.4 Set/Define Protocol FTP....................................................................................................12-114
12.8.5 Set/Define Protocol HTTP .................................................................................................12-114
12.8.6 Set/Define Protocol SSH Mode.........................................................................................12-114
12.8.7 Set/Define Server Altprompt .............................................................................................12-115
12.8.8 Set/Define Server BOOTP ................................................................................................12-115
12.8.9 Set/Define Server BOOTGATEWAY.................................................................................12-116
12.8.10 Set/De fi n e Ser ve r Br o adc a st............... ... .........................................................................12-116
12.8.11 Set/De fi n e Ser ve r Bu ffe r ing. ... .... .....................................................................................12-116
12.8.12 Set/De fi n e Ser ve r Clo ck ...... .............................................................................. ..............12-117
12.8.13 Set/Define Server DHCP.................................................................................................12-117
12.8.14 Set/De fi n e Ser ve r Host Limit...........................................................................................12-118
12.8.15 Set/De fi n e Ser ve r In act i vi ty .... .... ............... ......................................................................12-118
12.8.16 Set/De fi n e Ser ve r In com in g ............................................................................................12-119
12.8.17 Set/De fi n e Ser ve r Loa dh os t .......... ... ............................................................................... 1 2-120
12.8.18 Set/De fi n e Ser ve r Loc k .......... ......................................................................................... 12-120
12.8.19 Set/De fi n e Ser ve r Log in Pa ssw ord ........... ... ...................................................................12-121
12.8.20 Set/De fi n e Ser ve r Nam e ............... ..................................................................................12-121
12.8.21 Set/De fi n e Ser ve r Nam e se rv er ........ ... ... ... ......................................................................12-122
12.8.22 Set/De fi n e Ser ve r Pa ss wo r d Lim it.... ...............................................................................1 2- 122
12.8.23 Set/De fi n e Ser ve r Pr iv il ege d Pa ss wo rd ....... ... .... ............................................................12-123
12.8.24 Set/De fi n e Ser ve r Pr o mpt ............. ..................................................................................12-123
12.8.25 Set/De fi n e Ser ve r RAR P ..... ... .... .............................................................................. .......12-125
12.8.26 Set/De fi n e Ser ve r Ret ra n sm it Li mit ..... ... ... ......................................................................12-125
12.8.27 Set/De fi n e Ser ve r Rlo g in............... ... ................................................................. ..............12-125
12.8.28 Set/De fi n e Ser ve r Se ss io n Lim it......................................................................................12-126
12.8.29 Set/De fi n e Ser ve r Sil e ntb o ot ...........................................................................................12-126
12.8.30 Set/De fi n e Ser ve r So ftwa r e........... ... ...............................................................................12-126
12.8.31 Set/De fi n e Ser ve r St ar tu p fil e............... ... ... ......................................................................12-127
12.8.32 Set/De fi n e Ser ve r Ti mez o n e .................................................... .......................................1 2-128
12.8.33 Show/Monitor/List Menu..................................................................................................12-129
12.8.34 Show/Monitor/List Server ................................................................................................12-129
ix
12.8.35 Show/Monitor/List Timezone...........................................................................................12-131
12.8.36 Show/Monitor Users........................................................................................................12-131
12.8.37 Source.............................................................................................................................12-131
12.9 Site Commands ............. ................. ................ ................. ................. ................. . 12-132
12.9.1 Define Site.........................................................................................................................12-132
12.9.2 Define Site Authentication .................................................................................................12-132
12.9.3 Define Site Bandwidth.......................................................................................................12-134
12.9.4 Define Site Chat ................................................................................................................12-136
12.9.5 Define Site Dial on Hangup ...............................................................................................12-138
12.9.6 Define Site Filter................................................................................................................12-138
12.9.7 Define Site Idle..................................................................................................................12-139
12.9.8 Define Site IP ....................................................................................................................12-140
12.9.9 Define Site MTU ................................................................................................................12-142
12.9.10 Define Site Permanent .................................................................................................... 12-143
12.9.11 Define Site Port ...............................................................................................................12-143
12.9.12 Define Site Protocol.........................................................................................................12-145
12.9.13 Define Site Telephone.....................................................................................................12-145
12.9.14 Define Site Time..............................................................................................................12-146
12.9.15 Logout Site ......................................................................................................................12-148
12.9.16 Purge Site........................................................................................................................12-148
12.9.17 Show/Monitor/List Sites...................................................................................................12-149
12.9.18 Test Site ..........................................................................................................................12-150
12.10 Security Commands ..... ................. ................ ................. ................. ................. .12-151
12.10.1 Clear/Purge Authentication .............................................................................................12-151
12.10.2 Clear/Purge Dialback ......................................................................................................12-152
12.10.3 Clear/Purge Filter ............................................................................................................12-152
12.10.4 Clear/Purge SNMP..........................................................................................................12-153
12.10.5 Set/Define Authentication................................................................................................ 12-153
12.10.6 Set/Define Authentication Kerberos ................................................................................12-154
12.10.7 Set/Define Authentication Local ......................................................................................12-156
12.10.8 Set/Define Authentication RADIUS .................................................................................12-157
12.10.9 Set/Define Authentication SecurID..................................................................................12-159
12.10.10 Set/Define Authentication Strictfail................................................................................12-161
12.10.11 Set/Define Authentication TFTP ....................................................................................12-162
12.10.12 Set/Define Authentication Unique .................................................................................12-163
12.10.13 Set/Define Authentication User .....................................................................................12-163
12.10.14 Set/Define Dialback.......................................................................................................12-165
12.10.15 Set/Define Filter.............................................................................................................12-166
12.10.16 Set/Define Filter Any .....................................................................................................12-167
12.10.17 Set/Define Filter Generic...............................................................................................12-168
12.10.18 Set/Define Filter IP ........................................................................................................12-169
12.10.19 Set/Define FTP..............................................................................................................12-172
12.10.20 Set/Define HTTP ...........................................................................................................12-172
12.10.21 Set/Define Logging........................................................................................................12-172
12.10.22 Set/Define Password..................................................................................................... 12-176
12.10.23 Set/Define Server Incoming Secure..............................................................................12-176
12.10.24 Set/Define SNMP ..........................................................................................................12-177
12.10.25 Show/Monitor/List Authentication..................................................................................12-177
12.10.26 Show/Monitor/List Dialback...........................................................................................12-178
12.10.27 Show/Monitor/List Filter.................................................................................................12-178
12.10.28 Show/Monitor/List Logging............................................................................................12-179
12.10.29 Show/Monitor/List SNMP ..............................................................................................12-179
12.10.30 PC Card Commands .....................................................................................................12-179
12.10.31 Show PCCard................................................................................................................12-179
12.11 Navigation/Help Commands ........ ................ ................. ................. ................. . 12-180
12.11.1 Apropos...........................................................................................................................12-180
12.11.2 Backwards.......................................................................................................................12-180
12.11.3 Broadcast ........................................................................................................................12-180
12.11.4 Cls ...................................................................................................................................12-181
x
12.11.5 Disk ................................................................................................................................12-182
12.11.6 Finger ..............................................................................................................................12-186
12.11.7 Forwards .........................................................................................................................12-186
12.11.8 Help.................................................................................................................................12-187
12.11.9 Monitor ............................................................................................................................12-187
12.11.10 Netstat...........................................................................................................................12-187
12.11.11 Ping ...............................................................................................................................12-188
12.11.12 Resolve .........................................................................................................................12-188
12.11.13 Save ..............................................................................................................................12-189
12.11.14 Show/Monitor Queue.....................................................................................................12-190
12.11.15 Show Version ................................................................................................................12-191
12.11.16 Zero Counters ...............................................................................................................12-192
A: Enviro nme n t St r in gs........... ...................................... .............................................A- 1
A.1 Usage ............. ................. ................. ................ ................. ................. ................. .......A-1
A.1.1 Multiple Strings ............................................................................................A-1
A.2 Available Strings............................... ................ ................. ................. ................. .......A-1
A.2.1 Usage Examples..........................................................................................A-1
B: Show 802. 1 1 Errors................................................................................................B- 1
B.1 Introduction..... ................. ................. ................ ................. ................. ................. .......B-1
B.2 Error Bits.......................... ................. ................ ................. ................. ................. .......B-1
B.2.1 Leftmost Number .........................................................................................B-1
B.2.2 Rightmost Number.......................................................................................B-3
C: SNMP Supp o rt..... ............................................... ....................................................C-1
C.1 Support............................ ................. ................ ................. ................. ................. .......C-1
C.2 Security .......... ................. ................. ................ ................. ................. ................. .......C-1
D: Supported RADIUS Attributes .......................... ................ ......... ................ ......... ..D-1
D.1 Authentication Attributes ................................................... ................. ................. .......D-1
D.1.1 Access-Request...........................................................................................D-1
D.1.2 Access-Accept.............................................................................................D-2
D.2 Accounting Attributes ........................................................ ................. ................. .......D-4
D.3 Examples........ ................. ................. ................ ................. ................. ................. .......D-5
D.3.1 Configuring Authenticated PPP Connections..............................................D-5
D.3.2 Forcing a Telnet Connection to Preferred Host...........................................D-6
D.3.3 Forcing a Telnet Connection to a Specific Port ...........................................D-6
D.3.4 Preventing RADIUS Authentication .............................................................D-6
Index
xi
xii
1: Introduction
The Lantronix SCS family of Secure Console Servers provides secure communication for remote users to access local network resources. Our Servers enable IT professionals to configure and administer servers, routers, switches, telephone equipment, or any device with a serial port.
In addition to remote networking capabilities, the SCS includes traditional terminal server functionality such as security features and modem control. The security features include dialback, passwords, database authentication, and menu mode. The SCS also allows automatic modem configuration and control.
This reference manual provides instructions for advanced configuration as well as the complete command set for all products in the SCS family. Many of these features can also be setup using EZWebCon and the web browser interface, and are noted as such.
Before reading this manual, follow the installation procedure described in your Installation Guide. Basic configuration for your SCS is also described in your Installation Guide.
1.1 What Is New
This manual now includes instructions for the SCS100 and SCS400, the newest members of the Lantronix family of Secure Console Servers, in addition to instructions for the SCS200, SCS1600, and SCS3200.
1.2 How To Use This Manual
The rest of this reference manual is divided as follows:
Chapter 2, Getting Started, provides information on system passwords, rebooting, and basic time and
date setup.
Chapter 3, Console Server Features, discusses the console server features of the SCS.Chapter 4, Basic Remote Networking, contains instructions on configuring LAN to LAN and remote
node networking.
Chapter 5, Additional Remote Networking, describes how to optimize your remote networking
connection and introduces basic security concepts.
Chapter 6, IP, configures the Internet Protocol (IP) for your SCS.Chapter 7, PPP, contains conceptual information about the Point-to-Point Protocol (PPP).Chapter 8, Ports, describes how to configure the SCS’s serial ports.Chapter 9, Modems, explains how to configure modems that are attached to the serial ports or, for
certain SCS models, installed in the PC card slot.
Chapter 10, Modem Sharing, describes how to configure the attached modems if they are to be shared.
1-1
Introduction How To Use This Manual
Chapter 11, Security, offers a comprehensive description of all security features.Chapter 12, Command Reference, is divided into sections for Navigation/Help, IP/Network, Port,
Modem, Service, Server, Site, and Security commands.
Appendix A, Environment Strings, discusses the environment strings that can be used with several of
the commands described in Chapter 12.
Appendix B, Show 802.11 Errors, defines the error bits that appear in the Show 80211 screen.Appendix C, covers the SNMP features supported by the SCS.Appendix D, Sup ported RADIUS Attributes, lists and explains the RADIUS attributes currently
supported by the SCS.
1-2
2: Getting Started
This chapter covers basic configuration that should get you started using the SCS. Topics include methods for setting up the SCS and ongoing maintenance issues such as restoring factory default settings. You can perform almost all of these configurations using EZWebCon (the recommended method for initial configuration), the web browser interface (recommended for further configurations), or by issuing commands at the command line (Local> prompt).
This chapter assumes that you have completed the following steps, which are described in your Installation Guide:
The SCS is running operational code (i.e. the unit has successfully booted).The SCS is connected to an Ethernet.The SCS has been assigned an IP address.
2.1 Configuration Methods
EZWebCon is the recommended method for initial configuration. However, the web browser interface and the command line offer options for advanced configuration.
2.1.1 EZWebCon
The EZWebCon utility is the easiest way to initially configure the unit. EZWebCon guides you through configuration using a graphical interface.
Figure 2-1: The EZWebCon Utility
EZWebCon is included on the CD-ROM that is shipped with each SCS unit. Instructions are listed in the Read Me file, also located on the CD-ROM. For assistance once EZWebCon is running, refer to the EZWebCon online help.
2.1.2 Web Browser Interface
The web browser interface allows you to log into and configure your SCS using a standard web browser. To connect to your SCS using the web browser interface, do one of the following:
2-1
Getting Started Configuration Methods
From EZWebCon, select your device and choose Manage from the Actions menu.
OR
Type your SCS’s IP address or resolvable text name into your web browser’s URL/Location field.
Figure 2-2: The Web Browser Interface
Once you have connected and entered the login password (see Login Password on page 2-7), you can configure important settings, view statistics, and update other Server information. Many of the configurations discussed in this manual can be set using these web pages.
The on-board web browser can be disabled. See Set/Define Protocol HTTP on page 12-114 for more information.
2.1.3 Command Line
To configure the SCS without EZWebCon or the web browser interface, you must enter configuration commands at the command line. These commands should be entered when a port is in character mode, which is when the Local> prompt is displayed.
To display the Local> prompt, do one of the following:
Connect a terminal to the serial console port and press the Return key until the prompt is displayed.
Note: The default serial port parameters are 9600 baud, 8 data bits, 1 stop bit, no
parity, and XON/XOFF flow control.
Establish a Telnet, SSH, or Rlogin connection to the SCS from a TCP/IP host. See Establishing
Sessions on page 6-8 for more information.
In EZWebCon, select Telnet To Device from the Actions menu.
2-2
Getting Started Configuration Methods
2.1.3.1 Entering Commands
In examples throughout the manual, SCS commands and keywords are displayed in upper case for clarity. They may be entered in upper, lower, or mixed case. When entering a string, such as a username or
filename, enclose the string in quotes; this will retain the case entered. If a string is not enclosed in quotes, it will be changed automatically to all uppercase characters.
The Command Reference chapter (Chapter 12) displays the syntax of each command, including any restrictions, known errors, and references to related commands. Optional parameters are enclosed in brackets []. Required parameters are enclosed in curly braces {}; one and only one of those parameters must be used. User-supplied parameters, such as a particular port number or host name, are shown in italics.
The SCS command completion feature will complete partially-typed commands for you. This feature can save time and reduce errors if you’re entering a number of commands. To use command completion, type part of a command, then press the space bar. The SCS will automatically “type” the remainder of the command. If the partially-entered command is ambiguous (or if you are entering an optional string), the SCS will be unable to finish the command and the terminal will beep.
Note: Command completion is disabled by default. To enable command completion,
refer to Set/Define Ports Command Completion on page 12-65.
All keys used for entering and editing commands are listed in Table 2-1.
Table 2-1: Command Editing Keys
Key Purpose
Return Executes the current command line Delete Deletes the current character before the cursor Ctrl-A Toggles insert mode (insert or overstrike).
Overstri ke is on by default. Ctrl-D Logs out of the server Ctrl-E Moves the cu rsor to the end of the line Ctrl-H or Bac kspace Moves the cu rsor to the beginning of the line Ctrl-R Redisplays the current command Ctrl-U Deletes the entire current line Ctrl-Z Logs out of the server Left Arrow Moves the cursor left Right Arrow Moves the cursor right Up Arrow or Ctrl-P Recalls the previous command Down Arrow or Ctrl-N Recalls the next command !text Recalls the last command starting with text !! Recalls the last command
2.1.3.2 Command Types
The following types of commands appear frequently throughout this manual. There are subtle differences between each group of commands.
2-3
Getting Started Configuration Methods
The Set and Define commands make configuration changes to your SCS.
Set Makes an immediate (but not permanent) change; the change will be lost when
the SCS is rebooted. To make the change permanent, you must also enter the
Save command (discussed on page 12-189).
Define Makes a permanent change, but the change doesn’t take effect until the SCS is
rebooted. Define Port and Define SLIP settings take effect after the current user logs out.
Define Site takes effect when a site is started. Define Server, Define Telnet Host, and Define Service settings take effect when the SCS is rebooted.
The Show, Monitor, and List commands display information about the SCS.
Show Displays the current settings. Current settings include those made using the Set
command but not yet defined or saved as permanent changes.
Monitor Displays current operating characteristics, which are updated every three
seconds until a key is pressed. Monitor commands may only be used by the privileged user.
List Displays settings that will take effect the next time the SCS is rebooted.
Clear and Purge alter previously configured SCS settings.
Clear Removes a configured setting immediately, but does not make a permanent
change.
Purge Removes a configured setting permanently, but does not take effect until the
unit is rebooted.
Note: Purge Port will take effect as soon as the port is logged out, and Purge Site will
take effect when a site starts.
2.1.3.3 Restricted Commands
Some commands require privileged (superuser) status. To obtain privileged status, you must enter the privileged password. See Privileged Password on page 2-8 for instructions on entering and editing the privileged password.
By default, the SCS prompt changes from Local> to Local>> to reflect privileged user status.
2.1.3.4 Abbreviating Commands
When configuring the Server via the command line, you only need to enter as many characters as are needed to distinguish the keywords from one another. For example, the following two commands are equivalent:
Local>> DEFINE PORT 2 BROADCAST ENABLED AUTOCONNECT ENABLED PARITY EVEN SPEED 4800 Local>> DEF PO 2 BRO EN AUTOC EN PAR E SP 4800
Figure 2-3: Abbreviating a Command
2-4
Getting Started Rebooting
An abbreviation must be unique to the desired command. For example, if autoconnect was abbreviated as auto, that auto could denote autobaud, autostart, or autoconnect. Be sure that any abbreviations are unambiguous, such as autoc in the example above.
2.2 Rebooting
There are four ways to reboot the SCS:
From within EZWebCon, select Reboot from the Actions menu.From the Server section of the web browser interface, check the Reboot Server checkbox. Then, click
the Update Server Settings button at the bottom of the page.
At the Local> prompt, issue the Initialize Server command.Cycle power to the unit.
When the SCS is rebooted, any changes made using Set commands will be lost. To ensure that the changes will be saved, use Define commands, or use the Save command after the Set command.
Before rebooting the SCS, log out any current user sessions (if possible). Disconnecting sessions may prevent connection problems after the SCS is rebooted. If possible, warn users that the SCS will be going offline by sending a Broadcast message.
2.2.1 Sending a Broadcast Message
Broadcast messages are sent to local users, but not remote networking users. Broadcasts can be sent to all Server ports with the following command.
Figure 2-4: Broadcast Command
Local>> BROADCAST ALL "Server shutdown in 5 minutes."
2.2.2 Restoring Factory Defaults
Restoring factory default settings will erase all changes made since the SCS was shipped; the unit will function as if it just came out of the box. To restore factory defaults, enter the Initialize Server Factory command at the Local> prompt.
To perform a TFTP boot after restoring the factory defaults, you must enter the SCS IP and loadhost information. (If a BOOTP server will provide this information, this step is not required.) Refer to your User Guide for instructions.
2-5
Getting Started Rebooting
When initialized, the SCS sets local authentication in the first precedence slot. For more information on authentication and precedence, see Database Configuration on page 11-9.
2.2.3 Reloading Operational Software
The SCS stores its software in Flash ROM. The software controls the initialization process, the operation of the SCS, and the processing of commands. The contents of Flash ROM can be updated by downloading a new version of the operational software.
For instructions on reloading Flash ROM, refer to your Installation Guide.
2.2.4 Editing Boot Parameters
If the information that the SCS uses at boot time changes, you will need to change the SCS boot parameters. Boot parameters include the following:
Loadhost (TCP/IP). The loadhost is the host from which the SCS operational software is downloaded
at boot time.
Backup loadhost (optional). Software is downloaded from a backup loadhost when the primary
loadhost is unavailable.
Software filenameRARP (may be enabled or disabled)BOOTP (may be enabled or disabled)
Boot parameters are edited using Set/Define Server commands such as Set/Define Server Loadhost. All available server commands are listed in Server Commands on page 12-111. Use the Define commands if you want any changes to be saved after reboot.
Figure 2-5: Ed i ting the Loadhos t Address
Local>> DEFINE SERVER LOADHOST 192.0.1.8
2-6
Getting Started System Passwords
2.3 System Passwords
The SCS has both a login password and a privileged password. These passwords have default settings which should be changed as soon as possible. The following sections discuss each password in more detail.
2.3.1 Login Password
When you open the web browser interface for an SCS, you are prompted for the login username and password. To control this setting, use the Server Login Password Required checkbox on the Server page.
Figure 2-6: Web Browser Au t h entication
When a serial port has the login password enabled, users must enter the correct password to access that port’s Local> prompt. The default login username is login, and the default login password is access.
To change the login password, use the Set /Define Server Login Password command.
Figure 2-7: Defining the Login Password
Local>> DEFINE SERVER LOGIN PASSWORD badger
Note: The login password is case-insensitive, so it does not need to be enclosed in
quotes.
To enable the use of the login password on a particular port, use the following command:
Figure 2-8: Enabling the Login Pas s word
Local>> DEFINE PORT 3 PASSWORD ENABLED
Note: To enable the password on virtual ports, which are used for incoming
connections, use the Set/Define Server Incoming command.
Login passwords are also discussed in Character Mode Logins on page 11-1.
2-7
Getting Started System Passwords
2.3.2 Privileged Password
Changing any server, site, or port setting requires privileged user status. Use the default username, root, and the default privileged password, system.
When you click on a link in the left navigation column of the SCS web browser interface, you are prompted for the privileged username and password. Once you enter the password, you can access all of the configuration pages.
Figure 2-9: Root-Level Authentication
If you are at the command line, become the privileged user by entering the following command.
Figure 2-10: Set Privileged Command
Local> SET PRIVILEGED Password> system (not echoed) Local>>
Note: The complete command syntax for Set Privileged is available on page 12-92.
2-8
Getting Started Basic Configuration
To change the privileged password, use the Set/Define Server Privileged Password command ( dis c us s ed on page 12-123). Figure 2-11 displays an example of this command.
Figure 2-11 : Changing the Privileged Password
Local> SET PRIVILEGED Password> system (not echoed) Local>> DEFINE SERVER PRIVILEGED PASSWORD hippo
Note: The privileged password is case-insensitive, so it does not need to be enclosed in
quotes.
2.4 Basic Configuration
The following sections discuss features that will identify and personalize each SCS.
2.4.1 Changing the Server Name
Each SCS is initially configured with a server name in the form of SCS_xxxxxx, where xxxxxx represents the last three segments of its hardware address. However, you can give the Server a custom name of up to 16 alphanumeric characters using the following command.
Figure 2-12 : Changing the Server Name
Local>> DEFINE SERVER NAME "CommServer"
Note: The server name must be enclosed in quotes to preserve case.
2.4.2 Changing the Local Prompt
The prompt each user receives (usually a Local_xx> prompt, where xx is the port number) is configurable in a variety of ways. For a basic prompt, enter a string similar to the following.
Figure 2-13: Configuring the Server P rompt
Local> SET SERVER PROMPT "Server> " Server>
For a customized prompt, optional key combinations can be added to the prompt string. See Set/Define Server Prompt on page 12-123 for more information. Placing a space after the end of the prompt is recommended to improve readability.
Figure 2-14 displays a few examples of commands used to change prompts. In the examples, the first command line results in the prompt used in the second command line, and so on.
Figure 2-14: Prompt Exampl es
Local> SET SERVER PROMPT "Port %n: " Port 5: SET SERVER PROMPT "%D:%s: " SCS:LabServ: SET SERVER PROMPT "%p%s_%n%P%% " Port_5[NoSession]_5>%
2-9
Getting Started Basic Configuration
2.4.3 Changing the Login Prompts
When a user logs into the SCS, he is prompted for a username, and sometimes a login password. By default, the prompts are Username> and Password>. The prompts can be changed to be more like UNIX prompts (login: and Password:) with the following command.
Figure 2-15: Enabling th e Alternate Lo gi n P rompt
Local> SET SERVER ALTPROMPT ENABLED
2.4.4 Setting the Date and Time
The SCS can calculate and save the local time, coordinated Universal Time (UTC, also known as Greenwich Mean Time or GMT), standard and Daylight Savings timezones, and the corresponding number of hours difference between UTC and the set timezone.
2.4.4.1 Setting the Clock
Use the Set/Define Server Clock command at the Local> prompt. Time should be entered in hh:mm:ss “military format” as shown in the example below.
Figure 2-16: Setting the Cl ock
Local>> SET SERVER CLOCK 14:15:00 12/01/2000
2.4.4.2 Setting the Timezone
The SCS is configured to recognize a number of timezones. To display these timezones, use the Show Timezone command at the Local> prompt. Set the timezone by using the Set/Define Server Timezone
command at the Local> prompt.
Figure 2-17: Setting the Timezon e
Local> DEFINE SERVER TIMEZONE AMERICA/PACIFIC
2-10
Getting Started Basic Configuration
If your timezone is not listed, you will need to set it manually. Use the following information to set the timezone:
A three-letter timezone abbreviation; for example, PSTThe number of hours offset from UTC (Greenwich Mean Time); for example, -9:00The time, day, and amount of any time changes (for example, daylight savings time information)
Note: Specifying time change information is optional.
Figure 2-18 shows an example of how to set the timezone.
Figure 2-18: Manual Ti m ezone Config uration
Local>> DEFINE SERVER TIMEZONE EST -3:00 EST 1 Mar Sun>=1 3:00 Oct lastSun 2:00
The first EST specifies that Eastern Standard Time will be used as the reference point. The second value of
-3:00 indicates that this timezone is 3 hours behind Eastern Standard Time. The third and fourth values, EST and 1, specify that when a time change occurs the time will move forward one hour. The time change will occur in March, denoted by Mar. The date that the time change will occur will be the Sunday (Sun) greater than or equal to 1 (>=1), in other words, the first Sunday in the month. The 3:00 specifies that the time change will occur at 3 o’clock.
The final three values of the command string represent the day and time when the time will revert to the original time, in other words, when the time change will be reversed. The Oct and lastSun indicate that the time will revert on the last Sunday in October. The time change will occur at 2:00.
2.4.4.3 Designating a Timeserver
The SCS regularly verifies and updates its setting with the designated timeserver. A timeserver is a host which provides time of day information for nodes on a network. The SCS can communicate with either Daytime or Network Timeserver Protocol (NTP) servers. For NTP, the SCS can periodically broadcast a message asking for time information and wait for an NTP timeserver to reply (the Broadcast parameter), periodically query a specific NTP timeserver (the IP ipaddress parameter), or just listen for NTP broadcasts on the network (the Passive parameter).
To specify a timeserver, use the Set/Define IP Timeserver command.
Figure 2- 19: Defining Timeservers
Local>> DEFINE IP TIMESERVER DAYTIME 193.0.1.50 Local>> DEFINE IP TIMESERVER NTP PASSIVE
2.4.5 802.11 Configuration
This section applies only to the SCS200. Topics discussed in this section assume that you understand IEEE
802.11 wireless Ethernet concepts and architectures. If you do not, please refer to the IEEE 802.11 standard or the documentation that came with your PC card or Access Point (AP).
Note: The SCS does not support PC card hot-swapping. Any time you insert a PC card
into an SCS PC card slot, you must reboot the SCS.
2-11
Getting Started Basic Configuration
The following parameters should be configured only if you are using the SCS for 802.11 wireless Ethernet networking and plan to use a wireless LAN PC card in one of the PC card slots. Users in countries other than the United States must set the Region appropriately before using 802.11.
Not all configuration options will be available on all 802.11 cards. If you try to enter an option that is not supported by your card, you will receive an Error message.
Any time you enable or disable 802.11 networking, you must reboot the SCS before the change takes effect. Any other changes you request with the Set/Define 80211 commands will not take place until you have entered the Set 80211 Reset command. You can enter the Show IP Counters command to see the current
802.11 settings. To use the web browser interface to configure 802.11 settings, select the 802.11 link under the Advanced
Settings section.
2.4.5.1 802.11 Terms
The following acronyms are used in this section:
AP Access Point, a device that relays communications between one or more
wireless devices and possibly other devices on a network. APs are usually connected to a physical network.
Note: If you are using an AP and WEP is not enabled, set the AP to accept Open System
Authentication. If WEP is enabled, set the AP to Shared Key Authentication. For more information about WEP, see the definition below.
2-12
Getting Started Basic Configuration
BSS Basic Service Set (or Cell), a group of wireless devices that speak directly with
each other. A BSS may consist of at most one AP.
Figure 2-20: Simple Wireless Network BSS
AP
BSS
ESS Extended Service Set, a network consisting of one or more BSSs that share the
same ESSID. An ESS can contain multiple APs.
IBSS Independent Basic Service Set, a BSS with no APs. Devices work in an ad-hoc
networking mode.
WEP Wireless Equivalent Privacy, a form of encryption for wireless
communication.
2.4.5.2 Enabling 802.11 Networking
The SCS has 802.11 networking enabled by default. This allows the SCS to check for a compatible wireless networking card at startup. If a compatible card is present, the SCS will use the wireless network and ignore any wired Ethernet settings. If no compatible PC card is present, the SCS will use the 10/100BASE-T Ethernet interface.
If you want the SCS to only look for a wired Ethernet connection, you must disable 802.11.
Figure 2-21: Disablin g 802.11
Local>> DEFINE 80211 DISABLED
Note: You must reboot the SCS after enabling or disabling 802.11 networking.
2.4.5.3 802.11 Region
When using 802.11 networking, you must make sure the SCS is configured for the correct regulatory region. Configuring this option incorrectly may cause the SCS to broadcast on frequencies that are illegal in your area. The factory default setting is correct for the United States; users in other countries should change it to a value appropriate for their area before attempting 802.11 operation.
2-13
Getting Started Basic Configuration
Other region settings are listed in Set/Define 80211 Region on page 12-30. In the following example, IC sets the region to Canada.
Figure 2-22: Setting the 802.11 Region
Local>> DEFINE 80211 REGION IC Local>> SET 80211 RESET
2.4.5.4 MAC Address
A MAC address is a unique identifier that distinguishes different devices on the 802.11 network. It is the same as the unit’s hardware address. The SCS can be configured to use either the PC card’s MAC address or its own internal MAC address (the default) with the Set/Define 80211 MAC Address command. For seamless operation when switching between wired and wireless networking, use the SCS’s MAC address.
Figure 2-23: Configurin g the MAC Addre ss
Local>> DEFINE 80211 MACADDRESS CARD Local>> SET 80211 RESET or Local>> DEFINE 80211 MACADDRESS SCS Local>> SET 80211 RESET
2.4.5.5 Extended Service Set ID (ESSID)
Whenever there is more than one ESS in a wireless LAN architecture, each device needs to be told which ESS it belongs to. The ESSID ensures that devices communicate with the right AP.
To tell the SCS which ESS it belongs to, enter the Set/Define 80211 ESSID command. The exact string you enter will be determined by the settings of the AP with which you want the SCS to communicate.
Figure 2- 24: Configuring the ESS ID
Local>> SET 80211 ESSID “floor3” Local>> SET 80211 RESET
Setting the ESSID to none (Set/Define 80211 ESSID None) allows the SCS to associate with any AP within range.
2.4.5.6 Network Mode
There are two types of 802.11 networks: ad-hoc and infrastructure. In an ad-hoc network, devices communicate directly with one another on a peer-to-peer basis. In an infrastructure network (the default), several devices communicate with one or more APs. The APs may or may not be connected to a physical Ethernet network. You must tell your SCS which type of network is present with the Set/Define 80211 Network Mode command.
Figure 2-25: Configuring the Network M ode
Local>> DEFINE 80211 NETWORKMODE ADHOC Local>> SET 80211 RESET or Local>> DEFINE 80211 NETWORKMODE INFRASTRUCTURE Local>> SET 80211 RESET
The network mode setting relates to the channel setting, explained next.
2-14
Loading...
+ 394 hidden pages