SCS RM
SCS RM
Copyright 2003, Lantronix. All rights reserved. No part of the contents of this book may be transmitted or
reproduced in any form or by any means without the written permission of Lantronix. Printed in the United
States of America.
Revision D
WARNING
This equipment has been tested and found to comply with the limits for a Class A digital device pursuant to
Part 15 of FCC Rules. These limits are designed to provide reasonable protection against such interference
when operating in a commercial environment. This equipment generates, uses, and can radiate radio
frequency energy, and if not installed and used in accordance with this guide, may cause harmful
interference to radio communications.
Operation of this equipment in a residential area is likely to cause interference in which case the user, at his
or her own expense, will be required to take whatever measures may be required to correct the interference.
Changes or modifications to this device not explicitly approved by Lantronix will void the user's authority
to operate this device.
Contents
1: Introduction............................................................................................................. 1-1
1.1 What Is New................................................................................................................ 1-1
1.2 How To Use This Manual............................................................................................ 1-1
i
4: Basic Remote Networking ..................................................................................... 4-1
4.1 Remote Connection Types.......................................................................................... 4-1
4.1.1 Remote Dial-in ..........................................................................................................................4-1
4.1.2 LAN to LAN ...............................................................................................................................4-2
4.2 Managing Connections With Sites .............................................................................. 4-2
4.2.1 Creating a New Site ..................................................................................................................4-3
4.2.2 Displaying Existing Sites ...........................................................................................................4-4
4.2.3 Editing Sites ..............................................................................................................................4-4
4.2.4 Testing Sites..............................................................................................................................4-5
4.2.5 Deleting Sites ............................................................................................................................4-5
4.2.6 Using Sites for Incoming Connections ......................................................................................4-5
4.2.7 Using Sites for Outgoing Connections ......................................................................................4-6
4.2.8 ISP Site Connections with NAT.................................................................................................4-6
4.3 IP Address Negotiation ............................................................................................... 4-7
4.4 IP Routing ................................................................................................................... 4-8
4.4.1 Routes for Outgoing LAN to LAN .............................................................................................4-8
4.4.2 Routes for Incoming LAN to LAN ..............................................................................................4-9
4.4.3 Routes for Remote User Dial-ins...............................................................................................4-9
4.4.4 Configuring RIP for Sites......................................................................................................... 4-10
4.5 Incoming Connections .............................................................................................. 4-11
4.5.1 Starting PPP/Slip for Incoming Connections ...........................................................................4-11
4.5.2 Incoming Connection Sequence ............................................................................................4-13
4.5.3 Configuring Incoming Connections .........................................................................................4-14
4.6 Outgoing Connections .............................................................................................. 4-16
4.6.1 Ports for Outgoing Connections ..............................................................................................4-17
4.6.2 Telephone Numbers................................................................................................................4-17
4.6.3 Authentication..........................................................................................................................4-17
4.6.4 Configuring Outgoing Connections .........................................................................................4-18
4.7 Monitoring Networking Activity.................................................................................. 4-20
4.8 Examples ................................................................................................................. 4-21
4.8.1 LAN to LAN—Calling One Direction Only................................................................................ 4-21
4.8.2 LAN to LAN—Bidirectional (Symmetric) Calling ...................................................................... 4-22
4.8.3 Remote Dial-in User Example .................................................................................................4-24
ii
5.5.1 Inactivity Logouts..................................................................................................................... 5-10
5.5.2 Restricting Packets with Startup Filters................................................................................... 5-10
5.5.3 Reducing the Number of Ports Used.......................................................................................5-10
5.5.4 Using Higher Speed Modems .................................................................................................5-10
5.5.5 Restricting Connections to Particular Times............................................................................ 5-11
5.5.6 Increasing Requirements for Adding Additional Bandwidth.....................................................5-12
5.5.7 Controlling Frequency of Calls ................................................................................................ 5-12
5.6 Using the SCS Without Dialup Modems ................................................................... 5-13
5.6.1 Situations Where Dialup Modems Are Not Used.....................................................................5-13
5.6.2 Configuring the Unit for Modemless Connections ................................................................... 5-14
5.7 Character Mode Sites ............................................................................................... 5-15
5.8 Examples .................................................................................................................. 5-16
5.8.1 Creating a Chat Script .............................................................................................................5-16
5.8.2 Creating a Simple Firewall ...................................................................................................... 5-16
5.8.3 Controlling Access During Weekend Hours ............................................................................ 5-16
6: IP .............................................................................................................................. 6-1
6.1 IP Addresses............................................................................................................... 6-1
6.1.1 IP Addresses for Incoming Connections ...................................................................................6-2
6.1.2 IP Addresses For Outgoing Connections ..................................................................................6-4
6.2 Subnet Masks ............................................................................................................. 6-5
6.2.1 Length of Subnet Masks............................................................................................................6-6
6.3 Name Resolving.......................................................................................................... 6-6
6.3.1 Configuring the Domain Name Service (DNS) ..........................................................................6-7
6.3.2 Specifying a Default Domain Name ..........................................................................................6-7
6.3.3 Adding Hosts to the Host Table.................................................................................................6-7
6.4 Header Compression .................................................................................................. 6-8
6.5 Establishing Sessions ................................................................................................. 6-8
6.5.1 Telnet and Rlogin Sessions.......................................................................................................6-9
6.5.2 SSH Sessions ......................................................................................................................... 6-10
6.5.3 Restricting Connections to SSH ..............................................................................................6-17
6.5.4 Disabling HTTP and FTP ........................................................................................................ 6-17
6.6 IP Security................................................................................................................. 6-17
6.6.1 Configuring the Security Table ................................................................................................ 6-18
6.6.2 Clearing Table Entries.............................................................................................................6-18
6.7 IP Routing ................................................................................................................. 6-19
6.7.1 How Packets are Routed......................................................................................................... 6-19
6.7.2 Routing Tables ........................................................................................................................ 6-19
6.7.3 Using RIP ................................................................................................................................6-22
6.7.4 Proxy ARP ............................................................................................................................... 6-22
6.7.5 Using the NetBIOS Nameserver (NBNS) ................................................................................ 6-22
6.7.6 Routing and Subnetworks .......................................................................................................6-23
6.8 Displaying the IP Configuration................................................................................. 6-23
6.9 Examples .................................................................................................................. 6-25
6.9.1 IP Address Assignment for Remote Networking .....................................................................6-25
6.9.2 General IP Setup ....................................................................................................................6-26
6.9.3 Adding Static Routes............................................................................................................... 6-26
6.9.4 Default Routes to a Site ..........................................................................................................6-26
7: PPP........................................................................................................................... 7-1
7.1 LCP ............................................................................................................................. 7-1
7.1.1 Packet Sizes..............................................................................................................................7-1
7.1.2 Header Compression ................................................................................................................7-1
7.1.3 Character Escaping ...................................................................................................................7-1
7.1.4 PPP Authentication ...................................................................................................................7-2
7.1.5 CBCP ........................................................................................................................................7-3
iii
7.2 NCP ............................................................................................................................ 7-3
7.3 Starting PPP ............................................................................................................... 7-3
7.3.1 User-Initiated PPP .....................................................................................................................7-4
7.3.2 Automatic Detection of PPP ......................................................................................................7-4
7.3.3 Dedicated PPP ..........................................................................................................................7-4
7.4 Multilink PPP ............................................................................................................... 7-4
7.4.1 Configuring the Calling SCS......................................................................................................7-4
7.4.2 Configuring the Receiving SCS.................................................................................................7-6
7.5 Restoring Default PPP Settings .................................................................................. 7-7
7.6 Pocket PC PPP Support ............................................................................................. 7-7
7.7 Character Mode Sites ................................................................................................. 7-7
7.8 Troubleshooting .......................................................................................................... 7-8
8: Ports......................................................................................................................... 8-1
8.1 Using Port Commands ................................................................................................ 8-1
8.2 Setting Port Access..................................................................................................... 8-1
8.3 Starting a Port ............................................................................................................. 8-1
8.3.1 Waiting for Character Input .......................................................................................................8-2
8.3.2 Starting Automatically................................................................................................................8-2
8.4 Port Modes.................................................................................................................. 8-3
8.4.1 Character Mode.........................................................................................................................8-3
8.4.2 PPP Mode .................................................................................................................................8-3
8.4.3 SLIP Mode.................................................................................................................................8-3
8.5 Automatic Protocol Detection...................................................................................... 8-4
8.6 Port-Specific Session Configuration............................................................................ 8-4
8.6.1 Multiple Sessions ......................................................................................................................8-4
8.6.2 Switching Between Sessions ....................................................................................................8-5
8.6.3 Exiting Sessions ........................................................................................................................8-5
8.6.4 Monitoring Session Activity .......................................................................................................8-7
8.6.5 Setting Session Characteristics.................................................................................................8-7
8.7 Preferred/Dedicated Protocols & Hosts ...................................................................... 8-8
8.7.1 Dedicated Protocols ..................................................................................................................8-8
8.7.2 Preferred/Dedicated Hosts ........................................................................................................8-9
8.7.3 Saving Autostart Characters .....................................................................................................8-9
8.8 Port Restrictions.......................................................................................................... 8-9
8.8.1 Locking a Port ...........................................................................................................................8-9
8.8.2 Enabling Signal Check ............................................................................................................ 8-10
8.8.3 Username/Password Protection ..............................................................................................8-10
8.8.4 Automatic Logouts...................................................................................................................8-11
8.8.5 Restricting Commands ............................................................................................................ 8-12
8.8.6 Receipt of Broadcast Messages..............................................................................................8-12
8.8.7 Dialback...................................................................................................................................8-12
8.8.8 Enabling Menu Mode .............................................................................................................. 8-12
8.9 Serial Port Configuration ........................................................................................... 8-13
8.9.1 Naming a Port ......................................................................................................................... 8-13
8.9.2 Specifying a Username ........................................................................................................... 8-13
8.9.3 Notification of Character Loss .................................................................................................8-13
8.9.4 Padding Return Characters..................................................................................................... 8-14
8.9.5 Setting the Device Type ..........................................................................................................8-14
8.9.6 Specifying a Terminal Type..................................................................................................... 8-14
8.9.7 Transmitting Serial Data ..........................................................................................................8-14
8.9.8 Restoring Default Port Settings ............................................................................................... 8-15
8.10 RS-485 Configuration ............................................................................................. 8-15
8.10.1 Two-wire Mode ...................................................................................................................... 8-16
8.10.2 Four-wire Mode ..................................................................................................................... 8-17
8.10.3 Termination ........................................................................................................................... 8-18
iv
8.10.4 RS-422 Networking ............................................................................................................... 8-18
8.11 Flow Control ............................................................................................................ 8-18
8.11.1 Hardware Flow Control..........................................................................................................8-18
8.11.2 Software Flow Control ........................................................................................................... 8-19
8.11.3 Setting Up Flow Control ........................................................................................................ 8-19
8.12 Serial Signals .......................................................................................................... 8-20
8.12.1 DSR (Data Set Ready) ..........................................................................................................8-21
8.12.2 DCD (Data Carrier Detect) ....................................................................................................8-21
8.12.3 DTR (Data Terminal Ready).................................................................................................. 8-22
8.13 Virtual Ports ............................................................................................................ 8-22
8.14 Modem Emulation ................................................................................................... 8-23
v
11: Security................................................................................................................ 11-1
11.1 Incoming Authentication.......................................................................................... 11-1
11.1.1 Character Mode Logins ......................................................................................................... 11-1
11.1.2 PPP Logins............................................................................................................................ 11-3
11.1.3 SLIP Logins ........................................................................................................................... 11-4
11.2 Outgoing Authentication.......................................................................................... 11-4
11.2.1 Outgoing Character Mode Connections ................................................................................ 11-5
11.2.2 Outgoing PPP Connections................................................................................................... 11-5
11.2.3 Outgoing SLIP Connections .................................................................................................. 11-5
11.3 Dialback .................................................................................................................. 11-5
11.3.1 The Dialback Process ........................................................................................................... 11-6
11.3.2 Dialback from Character Mode..............................................................................................11-6
11.3.3 Dialback from SLIP/PPP Mode .............................................................................................11-7
11.3.4 Dialback Using CBCP ........................................................................................................... 11-7
11.3.5 Potential Dialback Drawbacks ............................................................................................... 11-8
11.3.6 Port User Restrictions ........................................................................................................... 11-8
11.4 Database Configuration .......................................................................................... 11-9
11.4.1 Local (NVR) Database ..........................................................................................................11-9
11.4.2 Kerberos ..............................................................................................................................11-11
11.4.3 RADIUS ............................................................................................................................... 11-14
11.4.4 SecurID ............................................................................................................................... 11-17
11.4.5 UNIX Password File ............................................................................................................ 11-19
11.5 User Restrictions................................................................................................... 11-19
11.5.1 Privileged Commands ......................................................................................................... 11-19
11.5.2 IP Address Restriction ......................................................................................................... 11-20
11.5.3 Controlling Use of Set PPP/SLIP Commands ..................................................................... 11-20
11.5.4 Securing a Port.................................................................................................................... 11-20
11.5.5 Locking a Port .....................................................................................................................11-21
11.5.6 Forcing Execution of Commands ........................................................................................11-21
11.5.7 Restricting Multiple Authenticated Logins ........................................................................... 11-21
11.6 Network Restrictions ............................................................................................. 11-22
11.6.1 Incoming Telnet/Rlogin Connections................................................................................... 11-22
11.6.2 Outgoing Rlogin Connections.............................................................................................. 11-22
11.6.3 Limiting Port Access ............................................................................................................ 11-22
11.6.4 Disabling the FTP and HTTP Servers ................................................................................. 11-23
11.6.5 Packet Filters and Firewalls ................................................................................................ 11-23
11.7 Event Logging ....................................................................................................... 11-25
11.7.1 Setting the Destination ........................................................................................................11-25
11.7.2 Logging Levels .................................................................................................................... 11-26
11.8 Examples ............................................................................................................. 11-28
11.8.1 Database Search Order ...................................................................................................... 11-28
11.8.2 Terminal User Forced to Execute Command ......................................................................11-28
11.8.3 Multiple-User Authentication ...............................................................................................11-29
11.8.4 Outgoing LAN to LAN Connection....................................................................................... 11-30
11.8.5 Creating a Firewall ..............................................................................................................11-30
11.8.6 Dialback............................................................................................................................... 11-33
11.9 Troubleshooting .................................................................................................... 11-33
vi
12.4.4 Define Ports Modem CallerID................................................................................................ 12-5
12.4.5 Define Ports Modem Carrierwait ...........................................................................................12-5
12.4.6 Define Ports Modem Commandprefix ................................................................................... 12-6
12.4.7 Define Ports Modem Compression .......................................................................................12-6
12.4.8 Define Ports Modem Connected ...........................................................................................12-7
12.4.9 Define Ports Modem Control .................................................................................................12-8
12.4.10 Define Ports Modem Dial ....................................................................................................12-8
12.4.11 Define Ports Modem Error................................................................................................... 12-9
12.4.12 Define Ports Modem Errorcorrection ................................................................................. 12-10
12.4.13 Define Ports Modem Getsetup .......................................................................................... 12-10
12.4.14 Define Ports Modem Init .................................................................................................... 12-11
12.4.15 Define Ports Modem Nocarrier .......................................................................................... 12-12
12.4.16 Define Ports Modem Nodialtone ....................................................................................... 12-12
12.4.17 Define Ports Modem OK ................................................................................................... 12-13
12.4.18 Define Ports Modem Reset ...............................................................................................12-13
12.4.19 Define Ports Modem Ring ................................................................................................. 12-14
12.4.20 Define Ports Modem Save ................................................................................................12-14
12.4.21 Define Ports Modem Speaker ........................................................................................... 12-15
12.4.22 Define Ports Modem Statistics ..........................................................................................12-15
12.4.23 Define Ports Modem Type................................................................................................. 12-16
12.4.24 Show/Monitor/List Modem ................................................................................................. 12-16
12.5 IP/Network Commands ......................................................................................... 12-18
12.5.1 Clear/Purge Hosts ...............................................................................................................12-18
12.5.2 Clear/Purge IP Factory ........................................................................................................12-18
12.5.3 Clear/Purge IP NAT Table................................................................................................... 12-18
12.5.4 Clear/Purge IP Route .......................................................................................................... 12-19
12.5.5 Clear/Purge IP Security ....................................................................................................... 12-19
12.5.6 Clear/Purge IP Trusted........................................................................................................12-20
12.5.7 Connect ............................................................................................................................... 12-20
12.5.8 Disconnect...........................................................................................................................12-22
12.5.9 Purge IP Ethernet ................................................................................................................ 12-22
12.5.10 Rlogin ................................................................................................................................ 12-22
12.5.11 Send .................................................................................................................................. 12-23
12.5.12 Set/Define 80211...............................................................................................................12-24
12.5.13 Set/Define Hosts ...............................................................................................................12-34
12.5.14 Set/Define IP All/Ethernet..................................................................................................12-35
12.5.15 Set/Define IP Create ......................................................................................................... 12-37
12.5.16 Set/Define IP Domain ........................................................................................................12-38
12.5.17 Set/Define IP Ethernet....................................................................................................... 12-38
12.5.18 Set/Define IP Host Limit .................................................................................................... 12-38
12.5.19 Set/Define IP IPaddress .................................................................................................... 12-39
12.5.20 Set/Define IP Loadhost .....................................................................................................12-39
12.5.21 Set/Define IP Nameserver................................................................................................. 12-39
12.5.22 Set/Define IP NAT ............................................................................................................. 12-40
12.5.23 Set/Define IP NAT Table ................................................................................................... 12-41
12.5.24 Set/Define IP NBNS .......................................................................................................... 12-41
12.5.25 Set/Define IP Route...........................................................................................................12-42
12.5.26 Set/Define IP Routing ........................................................................................................12-43
12.5.27 Set/Define IP Security ....................................................................................................... 12-43
12.5.28 Set/Define IP Subnet ......................................................................................................... 12-45
12.5.29 Set/Define IP TCP Keepalive ............................................................................................12-45
12.5.30 Set/Define IP Timeserver ..................................................................................................12-46
12.5.31 Set/Define IP Trusted ........................................................................................................12-47
12.5.32 Set/Define IP Trusted ........................................................................................................12-47
12.5.33 Show IP Counters ............................................................................................................. 12-48
12.5.34 Show/Monitor/List Hosts.................................................................................................... 12-48
12.5.35 Show/Monitor/List IP ......................................................................................................... 12-49
12.5.36 SSH ................................................................................................................................... 12-51
12.5.37 Telnet ................................................................................................................................ 12-51
vii
12.6 Port Commands .................................................................................................... 12-52
12.6.1 List Email ............................................................................................................................. 12-52
12.6.2 Lock ..................................................................................................................................... 12-52
12.6.3 Logout Port .......................................................................................................................... 12-53
12.6.4 Purge Port ...........................................................................................................................12-53
12.6.5 Purge Email ......................................................................................................................... 12-54
12.6.6 Resume ............................................................................................................................... 12-54
12.6.7 Set Noprivileged ..................................................................................................................12-54
12.6.8 Snoop Port .......................................................................................................................... 12-55
12.6.9 Define Email ....................................................................................................................... 12-55
12.6.10 Set/Define Ports Access.................................................................................................... 12-57
12.6.11 Set/Define Ports Authenticate ........................................................................................... 12-58
12.6.12 Set/Define Ports Autobaud ................................................................................................ 12-58
12.6.13 Set/Define Ports Autoconnect ........................................................................................... 12-59
12.6.14 Set/Define Ports Autostart ................................................................................................. 12-60
12.6.15 Set/Define Ports Backward Switch .................................................................................... 12-61
12.6.16 Set/Define Ports Break ...................................................................................................... 12-62
12.6.17 Define Ports Backspace .................................................................................................... 12-63
12.6.18 Set/Define Ports Broadcast ...............................................................................................12-64
12.6.19 Set/Define Ports Character Size ....................................................................................... 12-64
12.6.20 Set/Define Ports Command Completion ........................................................................... 12-65
12.6.21 Set/Define Ports Datasend ................................................................................................ 12-66
12.6.22 Define Ports Dedicated .....................................................................................................12-68
12.6.23 Define Ports Dialback ........................................................................................................12-70
12.6.24 Set/Define Ports DSRLogout.............................................................................................12-70
12.6.25 Set/Define Ports DTRWait................................................................................................. 12-71
12.6.26 Define Ports Event Email Serialdata ................................................................................ 12-71
12.6.27 Set/Define Ports Flow Control ........................................................................................... 12-72
12.6.28 Set/Define Ports Forward Switch ......................................................................................12-73
12.6.29 Set/Define Ports Inactivity Logout .....................................................................................12-74
12.6.30 Set/Define Ports Local Switch ........................................................................................... 12-74
12.6.31 Set/Define Ports Loss Notification .....................................................................................12-75
12.6.32 Set/Define Ports Menu ...................................................................................................... 12-76
12.6.33 Set/Define Ports Modem Emulation ..................................................................................12-76
12.6.34 Set/Define Ports Name...................................................................................................... 12-77
12.6.35 Set/Define Ports Parity ...................................................................................................... 12-77
12.6.36 Set/Define Ports Password ...............................................................................................12-78
12.6.37 Set/Define Ports PocketPC ...............................................................................................12-79
12.6.38 Set/Define Ports Preferred ................................................................................................ 12-79
12.6.39 Define Ports PPP ..............................................................................................................12-81
12.6.40 Define Ports PPPdetect.....................................................................................................12-84
12.6.41 Set/Define Ports Printer.....................................................................................................12-84
12.6.42 Set/Define Ports Security ..................................................................................................12-85
12.6.43 Set/Define Ports Serial Log ...............................................................................................12-85
12.6.44 Set/Define Ports Session Limit .......................................................................................... 12-86
12.6.45 Set/Define Ports Signal Check .......................................................................................... 12-86
12.6.46 Define Ports SLIP ..............................................................................................................12-87
12.6.47 Set/Define Ports SLIPdetect.............................................................................................. 12-88
12.6.48 Set/Define Ports Speed .....................................................................................................12-88
12.6.49 Set/Define Ports Stop ........................................................................................................12-89
12.6.50 Set/Define Ports Telnet Pad .............................................................................................. 12-89
12.6.51 Set/Define Ports TermType ...............................................................................................12-90
12.6.52 Set/Define Ports Type ....................................................................................................... 12-90
12.6.53 Set/Define Ports Username...............................................................................................12-91
12.6.54 Set/Define Ports Verification ............................................................................................. 12-92
12.6.55 Set Privileged/Noprivileged ...............................................................................................12-92
12.6.56 Define Protocols RS485 .................................................................................................... 12-93
12.6.57 Set Session ....................................................................................................................... 12-94
12.6.58 Set PPP ............................................................................................................................. 12-95
viii
12.6.59 Set SLIP ............................................................................................................................ 12-96
12.6.60 Show/Monitor/List Ports .................................................................................................... 12-96
12.6.61 Show RS485 .....................................................................................................................12-98
12.6.62 Show/Monitor Sessions .....................................................................................................12-98
12.6.63 Test Port ............................................................................................................................ 12-99
12.6.64 Unlock Port ......................................................................................................................12-100
12.7 Service Commands............................................................................................. 12-101
12.7.1 Clear/Purge Service ..........................................................................................................12-101
12.7.2 Remove Queue .................................................................................................................12-101
12.7.3 Set/Define Service.............................................................................................................12-102
12.7.4 Set/Define Service Banner ................................................................................................12-103
12.7.5 Set/Define Service Binary .................................................................................................12-103
12.7.6 Set/Define Service EOJ.....................................................................................................12-103
12.7.7 Set/Define Service Formfeed ............................................................................................12-104
12.7.8 Set/Define Service Identification .......................................................................................12-104
12.7.9 Set/Define Service Password ............................................................................................12-105
12.7.10 Set/Define Service Ports .................................................................................................12-105
12.7.11 Set/Define Service Postscript ..........................................................................................12-106
12.7.12 Set/Define Service PSConvert ........................................................................................12-106
12.7.13 Set/Define Service RTEL ................................................................................................12-106
12.7.14 Set/Define Service SOJ...................................................................................................12-107
12.7.15 Set/Define Service TCPport ............................................................................................12-107
12.7.16 Set/Define Service Telnetport .........................................................................................12-108
12.7.17 Show/Monitor/List Services .............................................................................................12-108
12.8 Server Commands .............................................................................................. 12-111
12.8.1 Clear/Purge Menu .............................................................................................................12-111
12.8.2 Initialize Server ..................................................................................................................12-111
12.8.3 Set/Define Menu................................................................................................................12-112
12.8.4 Set/Define Protocol FTP....................................................................................................12-114
12.8.5 Set/Define Protocol HTTP .................................................................................................12-114
12.8.6 Set/Define Protocol SSH Mode .........................................................................................12-114
12.8.7 Set/Define Server Altprompt .............................................................................................12-115
12.8.8 Set/Define Server BOOTP ................................................................................................12-115
12.8.9 Set/Define Server BOOTGATEWAY .................................................................................12-116
12.8.10 Set/Define Server Broadcast ...........................................................................................12-116
12.8.11 Set/Define Server Buffering.............................................................................................12-116
12.8.12 Set/Define Server Clock ..................................................................................................12-117
12.8.13 Set/Define Server DHCP .................................................................................................12-117
12.8.14 Set/Define Server Host Limit ...........................................................................................12-118
12.8.15 Set/Define Server Inactivity .............................................................................................12-118
12.8.16 Set/Define Server Incoming ............................................................................................12-119
12.8.17 Set/Define Server Loadhost ............................................................................................12-120
12.8.18 Set/Define Server Lock ...................................................................................................12-120
12.8.19 Set/Define Server Login Password .................................................................................12-121
12.8.20 Set/Define Server Name .................................................................................................12-121
12.8.21 Set/Define Server Nameserver .......................................................................................12-122
12.8.22 Set/Define Server Password Limit...................................................................................12-122
12.8.23 Set/Define Server Privileged Password ..........................................................................12-123
12.8.24 Set/Define Server Prompt ...............................................................................................12-123
12.8.25 Set/Define Server RARP .................................................................................................12-125
12.8.26 Set/Define Server Retransmit Limit .................................................................................12-125
12.8.27 Set/Define Server Rlogin .................................................................................................12-125
12.8.28 Set/Define Server Session Limit......................................................................................12-126
12.8.29 Set/Define Server Silentboot ...........................................................................................12-126
12.8.30 Set/Define Server Software .............................................................................................12-126
12.8.31 Set/Define Server Startupfile ...........................................................................................12-127
12.8.32 Set/Define Server Timezone ...........................................................................................12-128
12.8.33 Show/Monitor/List Menu ..................................................................................................12-129
12.8.34 Show/Monitor/List Server ................................................................................................12-129
ix
12.8.35 Show/Monitor/List Timezone ...........................................................................................12-131
12.8.36 Show/Monitor Users ........................................................................................................12-131
12.8.37 Source .............................................................................................................................12-131
12.9 Site Commands .................................................................................................. 12-132
12.9.1 Define Site .........................................................................................................................12-132
12.9.2 Define Site Authentication .................................................................................................12-132
12.9.3 Define Site Bandwidth .......................................................................................................12-134
12.9.4 Define Site Chat ................................................................................................................12-136
12.9.5 Define Site Dial on Hangup ...............................................................................................12-138
12.9.6 Define Site Filter ................................................................................................................12-138
12.9.7 Define Site Idle ..................................................................................................................12-139
12.9.8 Define Site IP ....................................................................................................................12-140
12.9.9 Define Site MTU ................................................................................................................12-142
12.9.10 Define Site Permanent ....................................................................................................12-143
12.9.11 Define Site Port ...............................................................................................................12-143
12.9.12 Define Site Protocol.........................................................................................................12-145
12.9.13 Define Site Telephone .....................................................................................................12-145
12.9.14 Define Site Time ..............................................................................................................12-146
12.9.15 Logout Site ......................................................................................................................12-148
12.9.16 Purge Site........................................................................................................................12-148
12.9.17 Show/Monitor/List Sites ...................................................................................................12-149
12.9.18 Test Site ..........................................................................................................................12-150
12.10 Security Commands.......................................................................................... 12-151
12.10.1 Clear/Purge Authentication .............................................................................................12-151
12.10.2 Clear/Purge Dialback ......................................................................................................12-152
12.10.3 Clear/Purge Filter ............................................................................................................12-152
12.10.4 Clear/Purge SNMP ..........................................................................................................12-153
12.10.5 Set/Define Authentication ................................................................................................12-153
12.10.6 Set/Define Authentication Kerberos ................................................................................12-154
12.10.7 Set/Define Authentication Local ......................................................................................12-156
12.10.8 Set/Define Authentication RADIUS .................................................................................12-157
12.10.9 Set/Define Authentication SecurID ..................................................................................12-159
12.10.10 Set/Define Authentication Strictfail ................................................................................12-161
12.10.11 Set/Define Authentication TFTP ....................................................................................12-162
12.10.12 Set/Define Authentication Unique .................................................................................12-163
12.10.13 Set/Define Authentication User .....................................................................................12-163
12.10.14 Set/Define Dialback.......................................................................................................12-165
12.10.15 Set/Define Filter.............................................................................................................12-166
12.10.16 Set/Define Filter Any .....................................................................................................12-167
12.10.17 Set/Define Filter Generic ...............................................................................................12-168
12.10.18 Set/Define Filter IP ........................................................................................................12-169
12.10.19 Set/Define FTP..............................................................................................................12-172
12.10.20 Set/Define HTTP ...........................................................................................................12-172
12.10.21 Set/Define Logging ........................................................................................................12-172
12.10.22 Set/Define Password .....................................................................................................12-176
12.10.23 Set/Define Server Incoming Secure ..............................................................................12-176
12.10.24 Set/Define SNMP ..........................................................................................................12-177
12.10.25 Show/Monitor/List Authentication ..................................................................................12-177
12.10.26 Show/Monitor/List Dialback ...........................................................................................12-178
12.10.27 Show/Monitor/List Filter.................................................................................................12-178
12.10.28 Show/Monitor/List Logging ............................................................................................12-179
12.10.29 Show/Monitor/List SNMP ..............................................................................................12-179
12.10.30 PC Card Commands .....................................................................................................12-179
12.10.31 Show PCCard................................................................................................................12-179
12.11 Navigation/Help Commands ............................................................................ 12-180
12.11.1 Apropos ...........................................................................................................................12-180
12.11.2 Backwards .......................................................................................................................12-180
12.11.3 Broadcast ........................................................................................................................12-180
12.11.4 Cls ...................................................................................................................................12-181
x
12.11.5 Disk ................................................................................................................................12-182
12.11.6 Finger ..............................................................................................................................12-186
12.11.7 Forwards .........................................................................................................................12-186
12.11.8 Help .................................................................................................................................12-187
12.11.9 Monitor ............................................................................................................................12-187
12.11.10 Netstat ...........................................................................................................................12-187
12.11.11 Ping ...............................................................................................................................12-188
12.11.12 Resolve .........................................................................................................................12-188
12.11.13 Save ..............................................................................................................................12-189
12.11.14 Show/Monitor Queue.....................................................................................................12-190
12.11.15 Show Version ................................................................................................................12-191
12.11.16 Zero Counters ...............................................................................................................12-192
A: Environment Strings..............................................................................................A-1
A.1 Usage .........................................................................................................................A-1
A.1.1 Multiple Strings ............................................................................................A-1
A.2 Available Strings.........................................................................................................A-1
A.2.1 Usage Examples..........................................................................................A-1
Index
xi
xii
1: Introduction
The Lantronix SCS family of Secure Console Servers provides secure communication for remote users to
access local network resources. Our Servers enable IT professionals to configure and administer servers,
routers, switches, telephone equipment, or any device with a serial port.
In addition to remote networking capabilities, the SCS includes traditional terminal server functionality
such as security features and modem control. The security features include dialback, passwords, database
authentication, and menu mode. The SCS also allows automatic modem configuration and control.
This reference manual provides instructions for advanced configuration as well as the complete command
set for all products in the SCS family. Many of these features can also be setup using EZWebCon and the
web browser interface, and are noted as such.
Before reading this manual, follow the installation procedure described in your Installation Guide. Basic
configuration for your SCS is also described in your Installation Guide.
Chapter 2, Getting Started, provides information on system passwords, rebooting, and basic time and
date setup.
Chapter 3, Console Server Features, discusses the console server features of the SCS.
Chapter 4, Basic Remote Networking, contains instructions on configuring LAN to LAN and remote
node networking.
Chapter 5, Additional Remote Networking, describes how to optimize your remote networking
connection and introduces basic security concepts.
Chapter 6, IP, configures the Internet Protocol (IP) for your SCS.
Chapter 7, PPP, contains conceptual information about the Point-to-Point Protocol (PPP).
Chapter 9, Modems, explains how to configure modems that are attached to the serial ports or, for
certain SCS models, installed in the PC card slot.
Chapter 10, Modem Sharing, describes how to configure the attached modems if they are to be shared.
1-1
Introduction How To Use This Manual
Chapter 12, Command Reference, is divided into sections for Navigation/Help, IP/Network, Port,
Modem, Service, Server, Site, and Security commands.
Appendix A, Environment Strings, discusses the environment strings that can be used with several of
the commands described in Chapter 12.
Appendix B, Show 802.11 Errors, defines the error bits that appear in the Show 80211 screen.
Appendix D, Supported RADIUS Attributes, lists and explains the RADIUS attributes currently
supported by the SCS.
1-2
2: Getting Started
This chapter covers basic configuration that should get you started using the SCS. Topics include methods
for setting up the SCS and ongoing maintenance issues such as restoring factory default settings. You can
perform almost all of these configurations using EZWebCon (the recommended method for initial
configuration), the web browser interface (recommended for further configurations), or by issuing
commands at the command line (Local> prompt).
This chapter assumes that you have completed the following steps, which are described in your Installation
Guide:
The SCS is running operational code (i.e. the unit has successfully booted).
2.1.1 EZWebCon
The EZWebCon utility is the easiest way to initially configure the unit. EZWebCon guides you through
configuration using a graphical interface.
EZWebCon is included on the CD-ROM that is shipped with each SCS unit. Instructions are listed in the
Read Me file, also located on the CD-ROM. For assistance once EZWebCon is running, refer to the
EZWebCon online help.
2-1
Getting Started Configuration Methods
From EZWebCon, select your device and choose Manage from the Actions menu.
OR
Type your SCS’s IP address or resolvable text name into your web browser’s URL/Location field.
Once you have connected and entered the login password (see Login Password on page 2-7), you can
configure important settings, view statistics, and update other Server information. Many of the
configurations discussed in this manual can be set using these web pages.
The on-board web browser can be disabled. See Set/Define Protocol HTTP on page 12-114 for more
information.
Connect a terminal to the serial console port and press the Return key until the prompt is displayed.
Note: The default serial port parameters are 9600 baud, 8 data bits, 1 stop bit, no
parity, and XON/XOFF flow control.
Establish a Telnet, SSH, or Rlogin connection to the SCS from a TCP/IP host. See Establishing
Sessions on page 6-8 for more information.
2-2
Getting Started Configuration Methods
The Command Reference chapter (Chapter 12) displays the syntax of each command, including any
restrictions, known errors, and references to related commands. Optional parameters are enclosed in
brackets []. Required parameters are enclosed in curly braces {}; one and only one of those parameters must
be used. User-supplied parameters, such as a particular port number or host name, are shown in italics.
The SCS command completion feature will complete partially-typed commands for you. This feature can
save time and reduce errors if you’re entering a number of commands. To use command completion, type
part of a command, then press the space bar. The SCS will automatically “type” the remainder of the
command. If the partially-entered command is ambiguous (or if you are entering an optional string), the SCS
will be unable to finish the command and the terminal will beep.
All keys used for entering and editing commands are listed in Table 2-1.
Key Purpose
Return Executes the current command line
Delete Deletes the current character before the cursor
Ctrl-A Toggles insert mode (insert or overstrike).
Overstrike is on by default.
Ctrl-D Logs out of the server
Ctrl-E Moves the cursor to the end of the line
Ctrl-H or Backspace Moves the cursor to the beginning of the line
Ctrl-R Redisplays the current command
Ctrl-U Deletes the entire current line
Ctrl-Z Logs out of the server
Left Arrow Moves the cursor left
Right Arrow Moves the cursor right
Up Arrow or Ctrl-P Recalls the previous command
Down Arrow or Ctrl-N Recalls the next command
!text Recalls the last command starting with text
!! Recalls the last command
2-3
Getting Started Configuration Methods
The Set and Define commands make configuration changes to your SCS.
Set Makes an immediate (but not permanent) change; the change will be lost when
the SCS is rebooted. To make the change permanent, you must also enter the
Save command (discussed on page 12-189).
Define Makes a permanent change, but the change doesn’t take effect until the SCS is
rebooted.
Define Port and Define SLIP settings take effect after the current user logs out.
Define Site takes effect when a site is started. Define Server, Define Telnet
Host, and Define Service settings take effect when the SCS is rebooted.
The Show, Monitor, and List commands display information about the SCS.
Show Displays the current settings. Current settings include those made using the Set
command but not yet defined or saved as permanent changes.
Monitor Displays current operating characteristics, which are updated every three
seconds until a key is pressed. Monitor commands may only be used by the
privileged user.
List Displays settings that will take effect the next time the SCS is rebooted.
Clear Removes a configured setting immediately, but does not make a permanent
change.
Purge Removes a configured setting permanently, but does not take effect until the
unit is rebooted.
Note: Purge Port will take effect as soon as the port is logged out, and Purge Site will
take effect when a site starts.
By default, the SCS prompt changes from Local> to Local>> to reflect privileged user status.
Local>> DEFINE PORT 2 BROADCAST ENABLED AUTOCONNECT ENABLED PARITY EVEN SPEED 4800
Local>> DEF PO 2 BRO EN AUTOC EN PAR E SP 4800
2-4
Getting Started Rebooting
An abbreviation must be unique to the desired command. For example, if autoconnect was abbreviated as
auto, that auto could denote autobaud, autostart, or autoconnect. Be sure that any abbreviations are
unambiguous, such as autoc in the example above.
2.2 Rebooting
There are four ways to reboot the SCS:
From the Server section of the web browser interface, check the Reboot Server checkbox. Then, click
the Update Server Settings button at the bottom of the page.
When the SCS is rebooted, any changes made using Set commands will be lost. To ensure that the changes
will be saved, use Define commands, or use the Save command after the Set command.
Before rebooting the SCS, log out any current user sessions (if possible). Disconnecting sessions may
prevent connection problems after the SCS is rebooted. If possible, warn users that the SCS will be going
offline by sending a Broadcast message.
To perform a TFTP boot after restoring the factory defaults, you must enter the SCS IP and loadhost
information. (If a BOOTP server will provide this information, this step is not required.) Refer to your User
Guide for instructions.
2-5
Getting Started Rebooting
When initialized, the SCS sets local authentication in the first precedence slot. For more information on
authentication and precedence, see Database Configuration on page 11-9.
Loadhost (TCP/IP). The loadhost is the host from which the SCS operational software is downloaded
at boot time.
Backup loadhost (optional). Software is downloaded from a backup loadhost when the primary
loadhost is unavailable.
Software filename
Boot parameters are edited using Set/Define Server commands such as Set/Define Server Loadhost. All
available server commands are listed in Server Commands on page 12-111. Use the Define commands if
you want any changes to be saved after reboot.
2-6
Getting Started System Passwords
When a serial port has the login password enabled, users must enter the correct password to access that
port’s Local> prompt. The default login username is login, and the default login password is access.
To change the login password, use the Set/Define Server Login Password command.
Note: To enable the password on virtual ports, which are used for incoming
connections, use the Set/Define Server Incoming command.
Login passwords are also discussed in Character Mode Logins on page 11-1.
2-7
Getting Started System Passwords
When you click on a link in the left navigation column of the SCS web browser interface, you are prompted
for the privileged username and password. Once you enter the password, you can access all of the
configuration pages.
If you are at the command line, become the privileged user by entering the following command.
Note: The complete command syntax for Set Privileged is available on page 12-92.
2-8
Getting Started Basic Configuration
To change the privileged password, use the Set/Define Server Privileged Password command (discussed
on page 12-123). Figure 2-11 displays an example of this command.
For a customized prompt, optional key combinations can be added to the prompt string. See Set/Define
Server Prompt on page 12-123 for more information. Placing a space after the end of the prompt is
recommended to improve readability.
Figure 2-14 displays a few examples of commands used to change prompts. In the examples, the first
command line results in the prompt used in the second command line, and so on.
2-9
Getting Started Basic Configuration
2-10
Getting Started Basic Configuration
If your timezone is not listed, you will need to set it manually. Use the following information to set the
timezone:
The number of hours offset from UTC (Greenwich Mean Time); for example, -9:00
The time, day, and amount of any time changes (for example, daylight savings time information)
Local>> DEFINE SERVER TIMEZONE EST -3:00 EST 1 Mar Sun>=1 3:00 Oct lastSun 2:00
The first EST specifies that Eastern Standard Time will be used as the reference point. The second value of
-3:00 indicates that this timezone is 3 hours behind Eastern Standard Time. The third and fourth values, EST
and 1, specify that when a time change occurs the time will move forward one hour. The time change will
occur in March, denoted by Mar. The date that the time change will occur will be the Sunday (Sun) greater
than or equal to 1 (>=1), in other words, the first Sunday in the month. The 3:00 specifies that the time
change will occur at 3 o’clock.
The final three values of the command string represent the day and time when the time will revert to the
original time, in other words, when the time change will be reversed. The Oct and lastSun indicate that the
time will revert on the last Sunday in October. The time change will occur at 2:00.
Note: The SCS does not support PC card hot-swapping. Any time you insert a PC card
into an SCS PC card slot, you must reboot the SCS.
2-11
Getting Started Basic Configuration
The following parameters should be configured only if you are using the SCS for 802.11 wireless Ethernet
networking and plan to use a wireless LAN PC card in one of the PC card slots. Users in countries other
than the United States must set the Region appropriately before using 802.11.
Not all configuration options will be available on all 802.11 cards. If you try to enter an option that is not
supported by your card, you will receive an Error message.
Any time you enable or disable 802.11 networking, you must reboot the SCS before the change takes effect.
Any other changes you request with the Set/Define 80211 commands will not take place until you have
entered the Set 80211 Reset command. You can enter the Show IP Counters command to see the current
802.11 settings.
To use the web browser interface to configure 802.11 settings, select the 802.11 link under the Advanced
Settings section.
Note: If you are using an AP and WEP is not enabled, set the AP to accept Open System
Authentication. If WEP is enabled, set the AP to Shared Key Authentication. For
more information about WEP, see the definition below.
2-12
Getting Started Basic Configuration
BSS Basic Service Set (or Cell), a group of wireless devices that speak directly with
each other. A BSS may consist of at most one AP.
AP
BSS
ESS Extended Service Set, a network consisting of one or more BSSs that share the
same ESSID. An ESS can contain multiple APs.
IBSS Independent Basic Service Set, a BSS with no APs. Devices work in an ad-hoc
networking mode.
If you want the SCS to only look for a wired Ethernet connection, you must disable 802.11.
Note: You must reboot the SCS after enabling or disabling 802.11 networking.
2-13
Getting Started Basic Configuration
Other region settings are listed in Set/Define 80211 Region on page 12-30. In the following example, IC
sets the region to Canada.
To tell the SCS which ESS it belongs to, enter the Set/Define 80211 ESSID command. The exact string you
enter will be determined by the settings of the AP with which you want the SCS to communicate.
Setting the ESSID to none (Set/Define 80211 ESSID None) allows the SCS to associate with any AP within
range.
The network mode setting relates to the channel setting, explained next.
2-14
Getting Started Basic Configuration
2.4.5.7 Channel
The frequency band allocated to 802.11 wireless communications is subdivided into different channels to
allow subnetworking. Your SCS needs to know which channel it should use for communications—the
channel will be the same as the one being used by the local AP. The default setting, Any, causes the SCS to
use the same channel used by the strongest AP with the same ESSID.
For infrastructure network mode, you should set the channel to Any so that the SCS can synchronize with
an AP. For Ad-Hoc network mode, you should set a specific channel number so that the SCS can start a new
IBSS if needed. When the channel is set to Any, the SCS can only join an existing IBSS.
2.4.5.8 WEP
Some 802.11 cards can be set with a WEP key, which will encrypt any data you transmit through wireless
communication. To enable WEP, enter the following command:
When WEP is enabled and a WEP key is set, the SCS will only connect to an AP (in infrastructure mode)
or communicate with other ad-hoc peers (in ad-hoc mode) that have been programmed with the same WEP
key as the SCS. For a key to match, both the key data and the index number must be identical.
Enter a WEP key if you have not previously done so. The key can be either 40-bits or 128-bits. Each key is
also assigned an index number, which is an integer between 1 and 4.
The SCS will receive both encrypted and unencrypted traffic. You can disable the reception of unencrypted
traffic and accept only frames encrypted with its WEP key by entering the following command:
2-15
Getting Started Configuration Files
EZWebCon can automatically translate your current SCS configuration into a configuration file, which can
then be downloaded through EZWebCon to other devices. Refer to EZWebCon’s online help for more
information.
The rest of this section describes how to create and use configuration files at the command line.
1 On your host, enter a series of SCS commands in a text file, one command per line. Privileged
commands may be included; when the file is downloaded, the commands will be executed as if a
privileged user was logged into the SCS.
If Define Server commands are included in the file, they will not take effect until the SCS is rebooted.
Define Port commands will not take effect until the specified ports are logged out. Define Site
commands will take effect when the specified site is started.
The configuration file must not contain any initialization commands (such as Initialize Server).
Because the file is read when the SCS boots, a “reboot” command in the file would cause the SCS to
boot perpetually. You would then have to flush the NVR to correct the error.
2 Test the configuration file. To test the file, use the Source command, discussed on page 12-131.
2-16
Getting Started Configuration Files
To download a configuration file to the SCS using TFTP, use the Source command.
If the configuration file must be downloaded each time the SCS boots, specify the filename using the Set/
Define Server Startupfile command. A TCP/IP filename must be specified in host:filename format, where
host is an IP address.
For example, to download the file config.sys from TCP/IP host 192.0.1.110, use the following command:
If the SCS has a nameserver defined, a text name may be specified as a TCP/IP host name. The SCS will
attempt to resolve the name at boot time; if it cannot resolve the name, the download will fail. To designate
a nameserver, see Set/Define IP Nameserver on page 12-39.
During its boot sequence, the SCS will load its operational code first, then attempt to download the
configuration file. If the attempt to download the configuration file is unsuccessful, the SCS may re-attempt
the download. By default, the SCS will make a total of six attempts to download the file (one initial attempt
and five re-attempts). To change this setting, use the Set/Define Server Startupfile Retry command.
If Retry is set to zero, the SCS can no longer be used; it will wait indefinitely for the configuration file to
download.
2-17
Getting Started Disk Management
/flash Flash is rewriteable memory that allows you to customize your SCS. Any data
that you want the SCS to save after it is rebooted should be stored on the Flash
disk.
/ram The RAM disk stores temporary information. The SCS will hold information
stored on this disk until it is powered off or rebooted. At startup, the RAM disk
will be empty. FTP connections to the SCS automatically use the RAM disk as
the default working directory. The RAM disk size is 512 Kbytes.
In addition to the onboard Flash disk, the PC card slots on the SCS200 and SCS400 can be used with ATA
flash cards and hard-drive PC cards for portable storage of local files.
In some instances, you may need to edit a file on another machine and then FTP it to the SCS. Use your FTP
client software to form a connection to the SCS (using the SCS’s resolvable name or IP address). You can
then transfer files to (put) and from (get) the /flash, /pccard, and /ram disks.
The Disk commands can be used to manage files on the Flash disk. For example, the following command
creates a new directory on the Flash disk that could be used for custom application files:
To view all of the files and directories currently on the Flash disk, enter Disk ls with or without flags. The
following example will display all the files as well as the modification date, size, owner, and permissions:
Note: The SCS does not support PC card hot-swapping. Any time you insert a PC card
into an SCS PC card slot, you must reboot the SCS.
2-18
Getting Started Disk Management
The Disk commands described above and on page 12-182 can also be used for file management on the flash
card. For example, to back up a Flash disk file (data.txt) to an ATA card, use the following commands to
create a backups folder on the card and to copy the desired file into that folder:
The maximum number of files and directories (total sum) that can fit on the card is a function of the size of
the card: divide the size of the card by 5k (5120 bytes). This assumes that the average size of all the files
that will fill up the card will be smaller than 5k.
Data can be corrupted if power is lost in the middle of a write (for example, if the cord is pulled). If the Disk
Sync command is issued and power is removed after the command is completed, data will be stored
correctly on the card. Likewise, there should be no problems with data integrity if the Initialize Server
Delay 0 command is used to reboot the unit.
2-19
3: Console Server Features
This chapter describes how to configure your SCS to serve as a console server. The SCS features both in-
band management for access to connected devices over IP (e.g. through Telnet and SSH connections
directly to the SCS), and out-of-band management for access through a connected modem.
Overview of Console Servers on page 3-1 introduces the functions of a console server.
Event Port Logging on page 3-2 describes how to save idle serial data in an easily accessible log file
Email Alerts for Serial Events on page 3-3 shows how to send the serial log via email.
Configuring Menu Mode on page 3-4 discusses the options for configuring SCS menus.
Login Banner Pages on page 3-8 covers in-band and out-of-band management options.
Serial Port Configurations on page 3-14 describes optimal serial port settings.
Most of these features are discussed in more detail in the IP, Ports, and Security chapters.
Lantronix
Conventional Console Management
Phone
Phone Console
Line
Lines Server
receive
ETS16PR
Network
Switch Switch
Router Router
UPS UPS
3-1
Console Server Features Event Port Logging
If email notification (discussed in Email Alerts for Serial Events on page 3-3) is enabled, the serial log can
be sent via email to the system administrator.
The log file is stored on the SCS /ram disk in the form /ram/Port_xx.log where xx is the port number. When
the file reaches its specified limit, it is truncated to half its current size and begins logging again. The oldest
data is discarded.
When the SCS is rebooted, the data stored in the log file is lost.
1 At a Local_n >prompt, type disk ls to see the files. The file is Port_nn by default, where nn is the
port number.
Note: You can use other Unix commands, such as tail and top.
1 Open the web browser interface and http to the IP address or hostname of the SCS. The SCS Home
page displays. If logging is enabled, the port name is a link.
2 Click the link to open the file in the default text viewer.
3.2.2.3 FTP
To retrieve the port log using an FTP session:
3-2
Console Server Features Email Alerts for Serial Events
3 “Get” or “mget” a copy of the log file (for example., # mget Port_1.log).
The port buffers incoming data for up to 25 seconds or until the log file reaches1500 bytes before sending
the email, which contains the current contents of the log file. Any data that comes in after that 25 seconds
will be saved in the file, but not included in that email. Email can not be sent from the same port more than
once every 10 minutes.
The email sent by the SCS also includes a URL that refers to the serial log file directly, so you can open it
in an email client or web browser. You will need to enter the system login password to access the file.
Note: If the HTTP server has been disabled with the Set/Define Protocol HTTP
command, you will not be able to use the URL to access the log file.
Each port’s email settings can be separately configured, or a default configuration can be created that will
be used for all email notifications. An emailsite stores the information necessary for email notification. The
only possible names for emailsites are portxx, where xx is a serial port number, or default. Settings for the
default emailsite will be used for any that are missing in the port-specific files.
Use the Define Email commands to configure each emailsite with features such as an email address for the
email to be sent to, a from line, a subject line, an SMTP mailhost, and a reply-to address.
The following example configures an emailsite for the second serial port.
Dynamic print variables can be used with all of these command strings. For a complete list of available
variables, see Define Email on page 12-55.
To enable email notification for a port, use the Define Ports Event Email Serialdata command. This
command also sets the port’s access to Access Remote.
Note: Email notification only works on ports that have port buffering enabled.
Figure 3-4: Enabling Email Notification
3-3
Console Server Features Configuring Menu Mode
The List Email command can be used to show the emailsite configurations for one or more emailsites.
If network logging is enabled (Set/Define Logging Network Enabled), any errors that occur during email
notification are stored in the system log. System logging is discussed in Chapter 11, Security.
Enter Selection:
Menus can be configured one of two ways: by entering title and item entries individually with the web
browser interface or at the command line, or by creating a menu configuration file.
To enable menu mode on a particular port, use the Set/Define Ports Menu command.
To display the current menu, use the Show/Monitor/List Menu command. If you are using a menu
configuration file, this command will not work—you must view that file to see the menus.
It is a good idea to add a command to the menu that allows the user to log out of the server. The Exit
command only works in menu mode. It allows users to return to the Local> prompt on the SCS on which
the menu was configured. It is helpful to include this command in your menus until you have fully tested
them—otherwise there is no way for users on menu mode ports to return to the Local> prompt.
3-4
Console Server Features Configuring Menu Mode
Each menu in a configuration file is associated with a group. Each group consists of one or more users. One
group can include a user default, meaning that menu will be used for any users not explicitly in an other
group. Only one group can include the default user.
1 Start a new text file on a host other than the SCS. Once the file is complete, you will FTP it to the
SCS’s /flash disk. The /flash disk and the Disk commands are discussed in detail on page 2-18.
2 Define up to 10 groups of users. Each group, listed on separate lines, will later be assigned a specific
menu. Do not leave any whitespace between each name—the names should be separated by commas.
Note: A space must be included on both sides of the = when defining the groups, as
shown in the example above. Also, remove any extra spaces from the end of each
line, as they will cause the menu parsing to fail.
If desired, you can use wildcards in usernames. To match a single character, use
a question mark (?), and to match any number of characters, use an asterisk (*).
MENU austin
Then, assign the menu a title (up to five lines). This string will appear at the top of the menu. You can
use dynamic print variables in the title, which will appear appropriately when the menu is viewed.
You can include up to 5 lines of title information per menu.
Note: For a list of dynamic print variables, see Set/Define Menu on page 12-112.
4 Define the items that will appear in the menu. The items will be numbered in the order entered. Up to
36 items can be defined in one menu.
3-5
Console Server Features Configuring Menu Mode
5 After ENDMENU, you can go on to define more menus for other groups of users.
MENU admin
TITLE “Lantronix Console Server”
ITEM “Cisco Router” “telnet 192.0.1.250"
ITEM “Exit” “Logout”
ENDMENU
Figure 3-9 shows what the above entries would look like in the completed menu configuration file:
MENU austin
TITLE “Lantronix Console Server”
ITEM "Cisco Router" "telnet 192.0.1.250"
ITEM "Sun Server" "telnet 192.0.1.251"
ITEM “Linux Server” “connect local port_4”
ITEM “Exit” “Logout”
ENDMENU
MENU admin
TITLE “Lantronix Console Server”
ITEM “Cisco Router” “telnet 192.0.1.250"
ITEM “Exit” “Logout”
ENDMENU
Using Set with the above command will automatically parse the file for correctness. You can then
permanently set the file with the Define Menu File command. For more information on this command, see
Set/Define Menu on page 12-112.
Once the file is set and stored on the /flash disk, a user logging into the SCS will be presented with the
appropriate menu. The menu configured above, for one of the defined users (sandy, dave bob, kathy,
default), would look like the one shown below:
Enter Selection:
3-6
Console Server Features Configuring Menu Mode
To use submenus, specify SUBMENU instead of MENU for the start of a new menu block. Then from a
different menu, include an action of GOTOMENU to jump to the submenu. One or more of the submenu
items can include an action of RETURNMENU to return to the top-level menu for the current user. After
Selecting an Action from the submenu, the user is returned to the top-level menu.
SUBMENU consoles
TITLE “This is the console submenu”
ITEM ...
ITEM “Return to Main Menu” “RETURNMENU”
ENDMENU
MENU main
TITLE “Welcome to Menuing”
ITEM ...
ITEM “Select a console connection” “GOTOMENU consoles”
ENDMENU
3-7
Console Server Features Login Banner Pages
1 Create text files with the desired text name prelogin.txt and/or postlogin.txt.
3 Log in with the username root and enter the privileged password (system by default.)
Subsequent users logging in or out of the SCS see the text in the prelogin.txt and postlogin.txt files,
respectively. The standard company/product/version banner displays if either of these two files is not
present in the SCS.
To connect to a specific SCS port using SSH, use socket number 22xx, where xx is the port number. The
syntax for an SSH connection depends on your client software. SSH is discussed in SSH Sessions on page
6-10.
3-8
Console Server Features Managing the Attached Devices
2 Dial the phone number for the modem attached to the SCS.
For instructions on dialing in with PPP, read Chapter 4, Basic Remote Networking. Instructions on attaching
modems are included in Chapter 9, Modems.
Then, use the Set/Define Ports Break command to instruct the break key to bring you back to Local>
prompt when pressed during a session.
To connect to a serial port from the SCS Local> prompt, use the Connect Local command.
Once within the session, you can exit by pressing the break key. This returns you to the Local> prompt. For
more information on available session options, see Port-Specific Session Configuration on page 8-4.
3-9
Console Server Features Managing the Attached Devices
To define where the break condition will be processed, use the Set/Define Ports Break [ local | Remote ]
command for each serial port and port 0.
The default break sequence for port 0 is <Ctrl+Y>. There is no default break sequence for the serial ports.
3-10
Console Server Features Managing the Attached Devices
The table below shows some examples to help you understand how the SCS handles breaks.
If And Then
The serial port has The AltBreak sequence returns
Break = Local the user to a local (SCS)
The user Telnets to a remote network host command prompt.
from a local (SCS) serial port The serial port has The AltBreak sequence causes
Break = Remote the SCS to transmit a Telnet
Break IAC sequence to the
remote host.
The user’s serial The AltBreak sequence returns
port has Break = the user to a local (SCS)
Local command prompt.
The user issues a Connect Local command
to another serial port from a local (SCS) The user’s serial The AltBreak sequence generates
serial port port has Break = a break condition to the target
Remote port. (The target port’s break
settings do not apply or affect this
situation.)
Template port has The AltBreak sequence returns
Break = Remote the user to a local (SCS)
The user Telnets to the SCS Local> prompt command prompt.
and Template port 0 has The AltBreak sequence generates
issues a Connect Local command to a Break = Local a break condition to the target
serial port port. (The target port’s break
settings do not apply or affect this
situation.)
The serial port has The AltBreak sequence returns
Break = Local the user to a local (SCS)
The user on an SCS serial port makes an command prompt.
SSH connection to a network host The serial port has Nothing happens as there is no
Break = Remote way to propagate a break across
an SSH connection.
At the Local> prompt, the user Telnets to Template port 0 has
the SCS Break = Local The AltBreak sequence does
and nothing because breaks are
receives the default AltBreak character Template port 0 has ignored at the Local> prompt.
from template port 0 Break = Remote
3-11
Console Server Features Managing the Attached Devices
If And Then
The user forms a Telnet or SSH connection The template port The AltBreak sequence returns
to the SCS (port 0) has Break the user to a local (SCS)
and = Local command prompt.
Issues a Connect Local command to
The template port A break condition is generated on
connect to port 7
has Break = port 7.
(Note that port 7’s break settings are not
applicable.) Remote
and
receives a default AltBreak character from
port 0
The user forms a Telnet connection from a Port 7 has Break = A serial break condition is
host to port 7 on the SCS using socket 2007 Remote generated on the port.
and
Port 7 has Break= Nothing happens.
the AltBreak character has been defined on
Local
port 7
and
the AltBreak character is detected in the
data stream from the host
(Note that the 20xx range of sockets
performs Telnet IAC interpretation.)
The user forms a Telnet connection from a Port 7 has Break = A Telnet Break IAC is sent on the
host to port 7 on the SCS using socket 2007 Remote network connection.
and
the AltBreak character has been defined on Port 7 has Break = Nothing happens.
port 7 Local
and
the a break condition is detected on the
serial port
(Note that the 20xx range of sockets
performs Telnet IAC interpretation.)
3-12
Console Server Features Managing the Attached Devices
If And Then
The user forms a TCP connection from a Port 7 has Break = A serial break condition is
host to port 7 on the SCS using socket 3007 Remote generated on the port.
and
Port 7 is set to Nothing happens.
The AltBreak character has been defined on
Break = Local
port 7
and
The AltBreak character is detected in the
datastream from the host
(Note that the 30xx range of sockets is 8-bit
clean.)
The user forms a TCP connection from a Port 7 has Break = Nothing happens because there is
host to port 7 on the SCS using socket 3007 Remote or no way to propogate a break
and Port 7 has Break = across an 8-bit clean connection.
The AltBreak character has been defined on Local
port 7
and
A break condition is detected on the serial
port
(Note that the 30xx range of sockets is 8-bit
clean.)
3-13
Console Server Features Serial Port Configurations
When using the SCS as a console server, you will want to set most ports to Remote access so any serial data
from the attached device will not accidentally cause the SCS to create a local connection and make that port
unavailable.
Note: When port buffering is enabled, the port access is automatically changed to
Remote access.
3-14
4: Basic Remote Networking
The SCS allows remote users to securely connect to local network resources, or two Local Area Networks
(LANs) to connect to each other. This chapter describes how to initialize, maintain, and disconnect
individual remote user dial-ins and LAN to LAN remote connections.
After completing this chapter, you should be able to configure the SCS to support the following types of
connections:
The functionality described in this chapter may not meet all of your performance or network security needs.
If your network requires more complex configuration, or if you are not using modems, refer to Chapter 5,
Additional Remote Networking, for additional configuration instructions.
Remote receive
ETS16PR
PC
transmit
SCS
Modem
Phone
Line LAN
Remote
PC Sun
4-1
Basic Remote Networking Managing Connections With Sites
The SCS cannot initiate connections to remote nodes. Remote nodes must call the SCS when they wish to
communicate with the network.
PC
ETS16PR
SCS
receive
SCS
ETS16PR
activity ok 100 link power
transmit
Modem
Phone
Line LAN
Modem LAN
Remote
PC Sun
LAN to LAN connections are often used to connect two locations that do not always need to be connected.
For example, a small remote office with only a few nodes and a central office might need to be connected
occasionally, however, the amount of traffic wouldn’t warrant using a leased line for the connection. Using
an SCS and dialup modems, the connection would come up and go down when required, simulating a
permanent connection between the two locations.
Note: Using sites for connections enables each connection to have different
characteristics; connections aren’t limited solely to the characteristics of the
ports used.
1 To configure the SCS and the remote router appropriately for a connection. For example, particular
SCS ports may be assigned for use with the connection.
2 To enforce specific network requirements. For example, compression may be required for all
connections.
4-2
Basic Remote Networking Managing Connections With Sites
3 To manage a connection once it is in place. For example, it may be desirable to control the amount of
bandwidth used for a connection.
4 To enable a system administrator to monitor a single connection. For example, a system administrator
may wish to restrict remote node users to a particular range of IP addresses.
The type of authentication used determines which sites will be used. For more information, see Incoming
Connections on page 4-11 and Outgoing Connections on page 4-16.
The Define Site commands are used to create new sites and edit existing sites. The Show/Monitor/List
Sites commands are used to get information about existing sites. These commands require privileged access,
which is denoted in the following examples with the Local>> prompt. For information on obtaining
privileged access, see Privileged Password on page 2-8.
The site you just created will use the default site configuration (see Table 4-1 on page 4-3). Those settings
can be changed to meet your needs.
4-3
Basic Remote Networking Managing Connections With Sites
To display specific information about sites, the following parameters may be used in conjunction with Show
Site and List Site: IP, Ports, Counters, and Status. For example, to display the IP configuration of site irvine,
use the following command:
Note: The List Site command is used in Figure 4-5 because site irvine isn’t currently
running.
Currently active sites can be edited, but changes will not take effect until the site is logged out.
4-4
Basic Remote Networking Managing Connections With Sites
The terminal will display a message that the specified site has started. To stop the test, enter the Logout Site
command followed by the site name.
In the event that there is a problem with the site, or if the Test Site command does not work, use the SCS
site logging feature to troubleshoot the problem. See Set/Define Logging Site on page 12-172 and Show/
Monitor/List Logging Site on page 12-179 for more information.
When the Purge command is used with the default site, the site’s default configuration will be restored. Any
editing changes you’ve made to the default site will be removed.
Custom sites allow the most flexibility in the control and configuration of incoming connections. They are
used when a specific configuration is required for the incoming router or remote node, and should be named
for the location or user that is calling the SCS. Custom sites are required for Dialback and are recommended
for incoming LAN to LAN connections.
If a group of incoming connections can use the same configuration, they can be allocated temporary sites
used only for that session to save time and system resources. Each temporary site takes its configuration
from the SCS default site. The default site may be customized in the same manner as custom (named) sites;
this customized configuration can then be shared with many remote routers and remote nodes.
Note: The default site configuration is listed in Table 4-1 on page 4-3.
When an incoming caller is allocated a temporary site, the name of the site is based on the port receiving
the call. For example, an incoming call to port 3 may be allocated a temporary site named Port3.
4-5
Basic Remote Networking Managing Connections With Sites
A site must be configured for each outgoing LAN to LAN connection. This site controls when and how the
SCS will call the remote location, what protocols to use, and when to terminate the connection.
Outgoing sites are typically named for the remote router that the SCS will call; for example, if a site is used
for outgoing connections to a remote router in Dallas, the site used for the connection might be named
dallas. This site could also be used for incoming calls; if the router in Dallas needed to call the first SCS, it
could use dallas to make the connection.
To set up NAT, the systems administrator must select a private network range for the local devices and
assign a single valid non-private IP address for the SCS. Valid private IP address ranges are:
2 Create the site that will dial up the ISP. Your ISP will provide most of the information:
Command Description
DEFINE PORT n MODEM TYPE y n = port or ports; y = modem type #
(Use command SHOW MODEM to see list of
modem types.)
DEFINE SITE OUTGOING PORT n n = port(s) with modem attached
DEFINE SITE OUTGOING AUTH USER n n = username provided by the ISP
4-6
Basic Remote Networking IP Address Negotiation
Command Description
DEFINE SITE OUTGOING AUTH REMOTE n n = password from ISP (place in quotes if lower
case)
DEFINE SITE OUTGOING TELEPHONE n n = ISP dial-up POP phone number
DEFINE SITE OUTGOING AUTH PAP ENABLE Support for PAP authentication
DEFINE SITE OUTGOING AUTH CHAP ENABLE Support for CHAP authentication
DEFINE IP NAMESERVER n n = DNS provided by ISP
DEFINE IP SEC NAMESERVER n n = back-up DNS provided by ISP
DEFINE IP ROUTE DEFAULT SITE OUTGOING Routes non-private traffic to Internet
3 Set the IP address of the site to the single non-private (Internet) address for your network.
If your ISP provides a static IP address, the command would look like this:
Note: This command will turn the site interface into a numbered interface.
4 Enable NAT on the SCS, using the DEFINE IP NAT ENABLED command.
5 Configure the NAT parameters if needed.The default parameters are sufficient for most situations.To
view the settings, use the LIST IP NAT command.
6 Configure the SCS as the gateway on the machines on the private network (e.g., 192.168.13.2,.3, etc.).
Where possible, set the default route and gateways for machines in the private network to the SCS’s
IP address.
4-7
Basic Remote Networking IP Routing
When the SCS receives an incoming connection request (remote node or LAN to LAN), an IP address is
negotiated for the caller. The address agreed upon depends on the caller’s requirements; some don’t have a
specific address requirement, while others must use the same IP address each time they log into the SCS.
The SCS can also be used to connect to a dialup network such as Earthlink, where the network will then
assign you a nameserver and an IP address. For this functionality, the nameserver of the SCS should be set
to 0.0.0.0 (with the Set/Define IP Nameserver command) and the SCS should be set to accept dynamic IP
addresses (with the Define Site IP Address Dynamic command).
For a complete discussion of IP address assignment (including configuration instructions), see IP Addresses
on page 6-1.
4.4 IP Routing
The following sections discuss IP routing issues as they pertain to remote networking. For a complete
discussion of IP routing, refer to Chapter 6, IP.
When a packet is received from or generated for a remote network, the SCS will check its routing table to
determine the most efficient route to the destination. If the SCS does not have a route to a remote network,
it cannot send the packet to the destination.
Local routes The network that is directly attached. This route is automatically determined
from the SCS IP address and network mask, and is never deleted.
Static routes Routes that were manually entered in the routing table by a system
administrator. These routes are used when the dynamic routes cannot be.
Dynamic routes Routes learned through the receipt of RIP (Routing Information Protocol)
packets. RIP is discussed in more detail on page 4-10.
Each routing entry can point to another router on the Ethernet or to a site configured for LAN to LAN
connections.
4-8
Basic Remote Networking IP Routing
While the SCS is connected to the remote router, it may learn additional dynamic routes from that remote
router. Once these additional routes are entered into the routing table, packets may be routed to these new
networks as well. Once the connection is dropped, the SCS can be configured to maintain these routes.
Subsequent traffic to these dynamically learned networks or to the pre-existing static route networks will
cause the site to form a new connection.
If the SCS is a stub router (or you’re using the SCS to connect to the Internet), default routes can be used
to reduce configuration time. A stub router connects a LAN without any routers to a larger LAN. For
example, in a remote office with no other outside connections, an SCS that connects to exactly one other
(larger) location is a stub router. All traffic generated on the remote office’s LAN that is destined for the
remote location must pass through the SCS. A default route pointing to the larger site may be entered on the
SCS.
Note: Default routes should be used with caution. See Chapter 6, IP for complete
details.
If RIP is not being used, the SCS must have a specific site configured for this incoming connection. The
remote router must use this site when it connects to the SCS. The site may be started in one of two ways:
through the authentication sequence (which requires that authentication be appropriately configured), or
with the Set PPP sitename command. Static routes pointing to the site must be configured for each of the
incoming caller’s IP networks.
If the remote node receives a dynamic address from the SCS’s IP address pool, a host route is entered for
that address. If proxy ARPing is enabled (see Proxy ARP on page 6-22), the SCS will proxy-ARP for the
address. See Types of Routes on page 6-19 for more information.
If a remote node uses an IP address that is not on the Ethernet’s IP network, then the SCS will enter a
network route for that node. For example, if the SCS’s Ethernet IP address is 192.0.1.4, and a node selects
the address 192.0.2.6, the SCS will enter a route to 192.0.2.0 in its routing table.
4-9
Basic Remote Networking IP Routing
Remote nodes do not have to make routing decisions, as they can only send network packets to the SCS.
Therefore, most remote nodes do not need to receive RIP packets. Sites that only support remote nodes may
turn off RIP to reduce traffic on the connection.
Note: For more information about disabling RIP, see Define Site IP on page 12-140.
If you want the SCS to either listen for or send RIP packets, but not both, you can selectively disable one or
the other. The following example turns off listening for RIP packets.
To configure the update interval, use the Define Site IP RIP Update command. The interval must be
specified in seconds; intervals between 10 and 255 seconds are permitted.
When a router determines a route to a particular destination, a route with a lower cost is more likely to be
included in the route. Configuring a higher RIP cost on a particular site makes the interface a less desirable
route to other destinations.
4-10
Basic Remote Networking Incoming Connections
To set a site’s IP RIP metric, use the Define Site IP RIP Metric command.
In the example above, all routes learned through site irvine will be associated with cost 4. The higher the
cost number, the less desirable the route.
Note: If IP RIP sending is disabled on a site, the Update and Metric values will be
ignored.
The SCS supports the use of PPP and SLIP to send network packets.
PPP The Point to Point protocol (PPP) is recommended whenever possible. PPP
enables devices to simultaneously transport IP packets, negotiate certain
options, authenticate users, and use checksums with virtually no performance
loss.
SLIP The Serial Line Internet Protocol (SLIP) is supported primarily for backwards
compatibility with equipment that does not support PPP. SLIP can only
transport IP packets—it does not support negotiation of IP address or other
options, nor does it provide any diagnostic facilities.
PPP is enabled by default, while SLIP is disabled by default. To change these settings, use the Define Ports
PPP and Define Ports SLIP commands. For more information on these commands, see Port Modes on page
8-3.
The caller may be presented with a Local> prompt (the port will be in character mode), requiring him
to enter commands in order to run PPP or SLIP.
Note: For a description of the port modes, see Port Modes on page 8-3.
4-11
Basic Remote Networking Incoming Connections
The port may detect when a PPP or SLIP packet is received and automatically run the appropriate
protocol.
The port may be dedicated to PPP or SLIP; the protocol will automatically run when any character is
received.
A port may be configured to offer a combination of these methods, giving the incoming remote node or
router flexibility in how the connection is started.
To configure the SCS for incoming LAN to LAN and remote node connections, see Configuring Incoming
Connections on page 4-14.
Note: For a complete description of authentication, refer to Chapter 11, Security. For
information on chat scripts, see Chat Scripts on page 5-3.
If no site name is given in the Set PPP or Set SLIP command, a temporary copy of the default site will be
started. If a custom site is to be started, it can be specified as a string: Set PPP sitename.
Note: To prevent users from starting inappropriate sites, users can be prompted for the
site’s local password.
To use the Set PPP and Set SLIP commands, enable PPP and/or SLIP on the port used for the connection.
See Incoming Connections on page 4-11.
Enable the PPP autodetection feature with the Define Ports PPPdetect command. This starts PPP with a
temporary copy of the default site. To enable SLIP autodetection, use Set/Define Ports SLIPdetect.
To run a custom site, enable PPP authentication on the port (see Chapter 11, Security, for more information
on PPP authentication). If the remote device sends a valid username and password, and the username
matches a site name, that site will start running on the port. All further configuration of the connection will
be from this new site.
Be aware that in some cases automatic protocol detection should be disabled for security purposes. For more
information, see Automatic Protocol Detection on page 8-4.
4-12
Basic Remote Networking Incoming Connections
Once PPP or SLIP is running, the behavior of a dedicated port is the same as a port with automatic protocol
detection enabled. A dedicated port also has the same security issues as a port with automatic protocol
detection enabled, so you should setup some form of PPP authentication if you wish to avoid potential
abuses. Dedicated ports only provide access to the temporary site; if you wish to use a custom site, you
should instead enter the Set PPP/Set SLIP commands at the Local> prompt.
When a port is dedicated, the local prompt cannot be accessed, therefore, commands can’t be entered to
disable the Dedicated characteristic. Take caution when dedicating ports; if you’re going to dedicate all SCS
ports, be sure that you have another way to log into the server (such as a Telnet login).
Note: If you cannot log into the SCS, you’ll need to restore the server to its factory
default settings. See Initialize Server on page 12-111.
1 If automatic protocol detection (for PPP, SLIP, or both) is enabled, the link layer starts up when a PPP
or SLIP character is received from the incoming call.
If the port is dedicated, the link layer starts upon the receipt of any character.
2 The caller is attached to a temporary site. The name of this site is based on the port number used. For
example, an incoming call to port number 6 will generate a temporary site named Port6.
3 If using SLIP, callers continue to use the temporary site for the remainder of the connection.
A If the SCS port receiving the call has been configured to authenticate remote hosts using CHAP
or PAP, CHAP/PAP requests a username and password from the remote host.
If the remote host has been configured to send a username and password, it sends the pair to the
SCS.
4-13
Basic Remote Networking Incoming Connections
B The username and password are compared to existing site names. One of the following occurs:
1 If the username matches the name of a site, the site will be checked to see if it has a local
password. If it does, this will be compared to the password entered by the caller. If the
passwords match, the user will begin using the custom site; the temporary site will stop
running.
2 If a site isn’t configured with a password, or the password entered by the caller doesn’t match
the site password, the username/password pair are compared to any authentication databases.
2 If the port is configured to prompt for a login password, the caller must enter the correct login
password to continue.
If the port is configured to prompt for a username, the caller must enter a username.
If the port is configured for authentication, the caller must enter a valid password for the username.
3 To start the link layer, the caller has to enter commands to start PPP or SLIP (Set PPP or Set SLIP).
A If the caller specifies a site to be started when PPP or SLIP is started, the user is attached to that
site. If the site is configured to prompt for its local password, the user must enter the site’s local
password.
B If a site isn’t specified, the user is attached to a temporary site. The name of this site is based on
the port number used. For example, an incoming call to port number 6 generates a temporary site
named Port6. This site is then used for the remainder of the call.
Note: Incoming LAN to LAN connections use chat scripts to enter any necessary
commands. See Chat Scripts on page 5-3.
4-14
Basic Remote Networking Incoming Connections
To properly configure the serial ports, decide whether PPP or SLIP will be used, whether the ports
will be dedicated to PPP or SLIP, whether autodetection of PPP or SLIP will be used, and, if a modem
is attached it any of the ports, how it will be configured.
To configure a port’s use of PPP or SLIP, see Chapter 8. To configure modems, see Chapter 9.
3 Configure Authentication
Two types of authentication can be configured: use of the server login password and username
password pairs for individual users.
Login Password
In order to use a login password, a port must be in character mode. See Chapter 8, Ports, to
configure a port’s use of modes.
Set the login password using the Set/Define Server Login Password command. Then, enable the
use of the login password on the appropriate port(s) using the Set/Define Ports Password
command.
By default, incoming Telnet and Rlogin connections are not required to enter the login password.
To require the login password, use the Set/Define Server Incoming command, described on page
12-119.
Username/Password Authentication
If authentication should be performed before PPP or SLIP is running (while the port is still in
character mode), ensure that autodetection of PPP and SLIP is disabled (see Figure 4-23). If the
port automatically detects and runs PPP or SLIP, there will be no way to authenticate the user
because the local prompt cannot be accessed.
4-15
Basic Remote Networking Outgoing Connections
Keep in mind that PPPdetect and SLIPdetect will only need to be disabled on ports that have PPP
and/or SLIP enabled.
In order for SLIP users to perform authentication, SLIPdetect must be disabled. SLIP users will
only be able to authenticate incoming connections while the port is in character mode; once the
port is running SLIP (for example, if the port is dedicated to SLIP using the Define Ports SLIP
Dedicated command), authentication cannot be performed.
If the port is configured to automatically run PPP and you’d like to use CHAP or PAP to obtain
a username and password from the incoming caller, enable remote CHAP and/or PAP
authentication on the desired port.
Note: CHAP and PAP may both be enabled on the same port.
If incoming connections will be entering usernames to start a custom site, ensure that the site has
a local password. Callers will be required to enter this password in order to start the site.
Configure any databases that will be used for authentication and add the appropriate usernames
and passwords. See Chapter 11, Security, for configuration instructions.
When the SCS receives a packet, it consults its routing table to determine the best route to the packet’s
destination. If the specified route points to a site, a connection to the site may be initiated. The connection
will be subject to any restrictions defined for the site, such as a startup filter or time of day restrictions.
When a connection to the remote router is initiated, a limited number of packets will be buffered until the
connection is formed. When the connection is successful, the packets will be sent.
The SCS can form outgoing connections where it accepts an IP address and a nameserver from the remote
PPP site. Enable this feature with the Set/Define IP IPaddress Dynamic command. Connections which
require these settings include sites which dial up an ISP, where the ISP then assigns the SCS a nameserver
and IP address. For more information, see Dialing Out to an ISP on page 6-5.
To configure the SCS for outgoing connections, you must set up sites. The following sections describe how
the SCS handles these connections.
4-16
Basic Remote Networking Outgoing Connections
When the SCS attempts to make a connection to a site, it attempts to use one of the specified ports. If the
port is busy (in use with another connection), it attempts a connection using another specified port. The SCS
uses the port priority setting to determine which ports to try and in what order. In the following example,
site dallas will try port 2 first, then port 3.
If all ports are busy, the SCS will time out the site for a few minutes and then try again. The connection
timeout between call attempts is user configurable. See Define Site Time Failure on page 12-146.
More than one site may specify a particular port. For example, site dallas and site seattle may specify that
port 3 may be used for connections. If site dallas is using port 3 at a certain time and site seattle is started,
seattle will attempt a connection using another specified port. If no other port is specified for site seattle, it
will wait until port 3 becomes available.
Note: To learn how incoming calls use ports and sites, see Starting PPP/Slip for
Incoming Connections on page 4-11.
Port-specific telephone numbers are used when a particular SCS port should call a specific number at the
remote site. These numbers will override a port-independent telephone number. For example, in order to get
the most efficient use out of connected modems, a site might specify that when port 2 (connected to a high
speed modem) is used, another high speed modem should be dialed. When port 3 (connected to a slow speed
modem) is used, the SCS should dial another slow speed modem.
If a site does not have a telephone number defined, the SCS assumes that either there’s a direct connection
between the SCS and the remote host, or that a chat script (see Chapter 5, Additional Remote Networking)
will be used to communicate with the remote host.
4.6.3 Authentication
The remote site may require that the SCS authenticate itself by sending a username and password. The
username that the SCS sends is (by default) the site name. To send a different username, use the Define Site
Authentication Username command, described on page 12-132.
4-17
Basic Remote Networking Outgoing Connections
The password sent is a site-specific password called the remote password. The remote password is used
only for outgoing connections, and must be sent via PPP. See Configure Authentication on page 4-19 for
configuration instructions.
SLIP does not support authentication. To perform authentication, SLIP users must use chat scripts. See
Chat Scripts on page 5-3 for more information.
Note: A modem profile automatically sets up a port for a specific type of modem. Define
Ports Modem Type is listed on page 12-16. Modem profiles and complete modem
configuration instructions are discussed in Chapter 9, Modems.
4-18
Basic Remote Networking Outgoing Connections
List Site can be used with a number of parameters, which display different aspects of a site’s configuration.
For example, List Site Ports will display all ports associated with the site.
To assign a telephone number to the site that may be used with any port, use the Define Site Telephone
command.
A port-specific telephone number will override a site telephone number. For example, site irvine may be
configured to use the number 635-9202 on any port it’s using, but only the number 845-7000 when it’s using
port 3.
The remote router uses CHAP or PAP to prompt the SCS to authenticate itself
This scenario is the most common; the configuration instructions in this section assume that CHAP
or PAP will be used.
In this case, the SCS will need to use a chat script to communicate the password to the remote router.
See Chapter 5, Additional Remote Networking, for instructions.
4-19
Basic Remote Networking Monitoring Networking Activity
The instructions in this section will not be necessary. Continue to Configure Routing on page 4-20.
Before configuring authentication, ensure that you have the username and password required to log into the
remote router. In addition, determine whether the remote router will use PAP or CHAP to transmit the
username and password.
If CHAP will be used, enable CHAP on the site. To use PAP to transmit the username and password, enable
PAP on the site.
Commands Description
Show/Monitor Sites Lists currently running sites.
Show/Monitor Site <sitename> Displays the site’s configuration.
Show/Monitor Site <sitename> Counters Displays the site’s current performance.
Show/Monitor Site <sitename> Status Shows all sites that have attempted or
completed connections.
Show/Monitor Site <sitename> All Shows cumulative statistics for this site.
Statistics are reset upon boot.
4-20
Basic Remote Networking Examples
During active connections, Show/Monitor Site commands will display the current state of the site or of its
assigned ports. The state of the port or site depends on the activity taking place. For example, a port may be
in an idle state, then transition to an on-line state when it begins transferring packets. The possible site states
are listed in Table 4-5.
The possible port states of ports assigned to the sites are listed in Table 4-6
4.8 Examples
4.8.1 LAN to LAN—Calling One Direction Only
An SCS in a remote office in Dallas must call an SCS at the company headquarters in Seattle. This LAN to
LAN connection must meet the following criteria:
4-21
Basic Remote Networking Examples
IP users in a remote office in Dallas must connect to IP network 192.0.1.0, which is located at the
company headquarters in Seattle.
The SCS in Seattle must support character mode users as well as the SCS in Dallas.
After 60 seconds of idle time, the connection between Dallas and Seattle should be timed out.
The SCS in Dallas must be configured for outgoing LAN to LAN connections.
The Initialize Server Delay 0 command will reboot the SCS; when the unit has rebooted, changes made
with the Define commands will be in effect.
The SCS in Seattle must then be configured using the following commands:
4-22
Basic Remote Networking Examples
IP users in Dallas must connect to IP network 192.0.1.0 in Seattle. IP users in Seattle must connect to
IP network 192.0.2.0 in Dallas.
Both servers are to be dedicated to this purpose. No other applications are supported.
After 60 seconds of idle time, the connection between Dallas and Seattle should be timed out.
The SCS in Seattle expects the username dallas and the password xyz. The SCS in Dallas expects the
username seattle and the password abc.
This SCS must be configured for incoming and outgoing LAN to LAN connections:
The Initialize Server Delay 0 command will reboot the SCS; when the unit has rebooted, changes made
with the Define commands will be in effect.
4-23
Basic Remote Networking Examples
The Seattle SCS will have different authentication, telephone, site and router information than the SCS in
Dallas. In all other respects, it is configured identically to the Dallas SCS.
IP users will be forced to use either IP address 192.0.1.7 or 192.0.1.8. One IP user wwwserver, must have
the same address (192.0.2.6) each time it logs in.
Because both ports are attached to modems, you must enable modem control for each port. The SCS will
interact with the modem by sending commands to and expecting responses from the modem. To properly
communicate with the modem, the SCS uses a modem profile, which is configured for particular modem
types.
4-24
Basic Remote Networking Examples
To display a list of modem profiles, enter the List Modem command. Once you identify the appropriate
profile for the attached modems, assign it to the port using the Define Port Modem Type command.
4-25
5: Additional Remote Networking
This chapter discusses how to “fine-tune” remote networking and related features on your SCS.
Performance and cost issues are covered, as well as how to manage bandwidth on demand, use direct
connections and leased lines, and restrict access to the SCS.
Basic Security, page 5-1, describes how to set up basic authentication and filter lists.
Bandwidth On Demand, page 5-4, explains bandwidth management for LAN to LAN connections.
Increasing Performance, page 5-8, and Reducing Cost, page 5-10, describe how to maximize your
SCS while minimizing your related costs.
Using the SCS Without Dialup Modems, page 5-13, illustrates alternate configuration methods.
Examples, page 5-16, show the features described in this chapter put to the test in real-life situations.
To execute commands when a user logs into the SCS, complete the following steps:
1 Ensure that the authentication databases have been configured using the Set/Define Authentication
commands.
2 Associate commands with a username by entering the Set/Define Authentication User command.
When the user is successfully authenticated, these associated commands will be executed.
In the example above, when user bob logs into the SCS, he will automatically run site dialin_users.
5-1
Additional Remote Networking Basic Security
3 Enable authentication on each port that will be used for incoming logins.
Filters are organized into ordered filter lists, referenced by name. For example, a filter named firewall may
permit forwarding of packets that match a particular IP rule, but deny passage to packets that match a
generic rule.
Filter lists are associated with sites. Table 5-1 describes the available filter lists and how they are used.
When a site with an associated filter list receives a packet, the SCS compares the packet against each filter
starting with the first filter on the list. If the packet matches any of the filters, the packet is forwarded or
discarded according to the filter’s specification. If the packet does not match any of the filters in the list, that
packet is not forwarded.
The order filters appear in a list is very important. For example, consider the following filter list.
When this filter list is associated with a site, all packets are forwarded. Packets are compared to filters in the
order in which the filters appear in the list. Because all packets match the specification of “any packets,” all
packets are forwarded without being compared to the second filter.
Switching the order of the filters has a significant effect. Examine the filter list below, where the order of
the above two filters is reversed.
5-2
Additional Remote Networking Chat Scripts
When this filter list is used, all IP traffic matching the specified rule is discarded. Therefore, some IP packets
are discarded without being compared to the second filter.
To prevent all packet traffic from the IP protocol, use the Define Site IP Disabled command instead of a
filter list.
Configuring filter lists involves two primary steps: creating the filter list and associating the list with a
particular site. See Setting Up a Filter List on page 11-24 for complete configuration instructions.
For example, the SCS might log into a remote site that has a login program. Using a chat script defined for
the site, the SCS could send carriage returns until the login prompt is returned, send a username, wait for
the password prompt, and send a password.
For example, to configure the script to send or expect strings, use the following command.
5-3
Additional Remote Networking Bandwidth On Demand
To determine the number of a particular line, display the script using the List Site Chat command. All chat
script entries for that site will be displayed.
The first command in Figure 5-6 will cause the SCS to wait two seconds for a response from the remote host
after sending an Expect command. If no response is received after two seconds, the chat script will fail or
return to the previous fail marker. The second command will send the “hello?” string after a 4-second delay.
The default Send timeout (delay before a Send command is executed) is 0; in other words, strings will be
sent right away. The default timeout for Expect commands is 30 seconds.
The script in Figure 5-7 will send a carriage return, then wait for two seconds while a “login:” string is
expected. If the “login:” string is not received within two seconds, the chat script will loop back to the Fail
command and continue running from that point. Each time the Expect command fails (i.e. the “login:” string
is not received within two seconds), the Fail counter is decremented one value. When the Expect command
has failed four times (i.e. the “login:” string is never received), the looping will stop and the chat script will
exit.
5-4
Additional Remote Networking Bandwidth On Demand
By default, sites will only attempt to bring up one port to a remote site in a LAN to LAN connection. If the
amount of incoming data on the Ethernet exceeds the current bandwidth of the serial port (and the SCS is
configured not to dial up additional bandwidth), congestion occurs and the extra data is discarded.
To avoid congestion, the SCS enables you to customize a site’s use of bandwidth. As it is needed, additional
bandwidth will be added. The SCS will assign more ports to the site until it has enough bandwidth or reaches
a certain threshold. When it is no longer needed, the extra bandwidth will be removed.
The initial and maximum bandwidth allotted to the site. These are static values.
The threshold at which additional bandwidth should be added. This threshold is a percentage of the
currently-dialed bandwidth.
The threshold at which unnecessary (unused) bandwidth should be removed. This threshold is a
percentage of the currently-dialed bandwidth.
The period of time during which the current bandwidth usage is measured.
By default, additional bandwidth will not be added to a connection. In order for a connection to have flexible
bandwidth (bandwidth that is added and removed as necessary), the site’s maximum bandwidth must be
configured, as well as the thresholds at which bandwidth is added and removed.
Note: The initial bandwidth allotted to the site may also be configured. This is optional.
The threshold at which bandwidth is added and removed should have some room between them to regulate
how often bandwidth is added and removed. The “add bandwidth” threshold should be set to a percentage
between 80 and 100 percent; the “remove bandwidth” threshold should generally be set to less than 50%. If
the threshold values are set too close to one another, the connections will thrash; in other words, bandwidth
will be continuously added and dropped.
The order in which ports are selected to be added and removed is controlled by a priority setting; when SCS
bandwidth needs change, ports with the highest priority are the first to be added and the last to be removed.
Bandwidth is controlled by the host that initiates the call. If the SCS initiates a call, it controls the bandwidth
for each site. If the SCS receives an incoming call, the bandwidth is controlled by the remote host.
The SCS will always use at least one port for a connection, even if the traffic is below the “remove
bandwidth” threshold. If this is not desired behavior, the last connection can be controlled by the idle timer.
Note: To configure the idle timer, see Set/Define Server Inactivity on page 12-118.
5-5
Additional Remote Networking Bandwidth On Demand
The SCS will truncate the bandwidth setting to the nearest 100 bytes per second. For example, a setting of
5790 will be truncated to 5700.
Consider the following example. Site irvine may use SCS port 2 and port 3 (if needed) for connections. A
V.34 modem with a baud rate of 28800 bits per second is attached to each port. The remote modems are also
V.34 modems with the same baud rate. Compression is enabled and a 2:1 compression rate is expected,
which will increase the data transfer between the modems to 57600 bits per second.
Note: If you are using 8 bits, no parity, and 1 stop bit, the modem will actually transmit
ten bits for each byte.
If the modems attached to a series of SCS ports are going to be calling similar remote modems, these ports
should be set to the same bandwidth estimates. In addition, if several ports have compression enabled, you
should assume that the compression rate on each port will be the same (for example, a 2:1 compression rate).
Avoid using small variations in bandwidth estimates.
It is important to correctly estimate bandwidth. The SCS will attempt to reduce the total number of ports in
use by using higher bandwidth ports (of the same priority) first until the bandwidth goal is met.
5-6
Additional Remote Networking Bandwidth On Demand
The holddown timer helps to limit the "thrashing" caused by rapid adjustments in bandwidth. When the
holddown timer is used in conjunction with a short bandwidth measurement period, the site will respond
quickly to initial changes in packet traffic without thrashing.
In the example above, the holddown timer is set to 30 seconds. When bandwidth is added to site irvine,
additional bandwidth cannot be added until 30 seconds have passed. Bandwidth changes in the opposite
direction (addition or subtraction) require a delay of double the holddown timer; for example, when
bandwidth is removed from irvine, it cannot be added for 60 seconds.
5-7
Additional Remote Networking Increasing Performance
To display how the SCS is currently managing a particular site’s use of bandwidth, use the Show Site
Bandwidth command.
Note: For information on port and site states, see Table 4-5 on page 4-21.
5-8
Additional Remote Networking Increasing Performance
The disadvantage of compression is increased latency, the time required to transfer data from one place to
another. Compression increases latency due to the time required to compress the data before it is sent. Error
correction can also increase latency, as the data must be checked for integrity after it is received.
In situations where the delay is undesirable (for example, during interactive use over a long distance line),
compression and error correction should not be used. These options are enabled by default on the SCS; to
disable them, use the following commands:
Note: For a complete discussion of compression and error correction, see Chapter 9,
Modems.
How "aggressively" a site will add bandwidth can be controlled with two factors: the period during which
the use of bandwidth is measured, and the percentage at which bandwidth is added.
For example, to increase bandwidth for small or periodic increases in traffic, reduce the measurement time
period. A similar effect could be obtained by reducing the percentage utilization at which bandwidth is
increased. To require a sustained increase in traffic to increase bandwidth, the measurement time period and
the utilization percentage should be increased. See Bandwidth On Demand on page 5-4 for more
information.
Header compression is most useful for interactive traffic such as Telnet sessions. Compressing the header
information for interactive traffic decreases the delay before data is transferred. In other words, if a key is
pressed during a Telnet session, the time required to echo that character back to the user’s terminal will be
reduced.
For more information on IP header compression, see Header Compression on page 6-8.
5-9
Additional Remote Networking Reducing Cost
The site may then be associated with an idle time filter list. When a site receives packets, it compares them
to this list. Packets that "pass" the filter list will reset the idle timer to zero. If no packets pass the list or
traffic is not received within the idle time, the site will be timed out. If an idle time filter is not used, any
packet traffic sent by the site will reset the idle timer.
Note: Incoming packet traffic does not reset the idle timer if there is no idle time filter.
Idle time filter lists enable the SCS to keep a site active for specific types of traffic, disconnecting the site
if this traffic isn’t sent. For example, imagine that a particular site was intended for interactive traffic. Using
an idle filter list, the site could ensure that other traffic (such as email) wouldn’t keep the connection active.
Note: To configure an idle time filter, see Filter Lists on page 5-2.
Startup filter lists are only intended to prevent unwanted connections. If a connection is already in place, the
list is ignored. To configure a startup filter, see Filter Lists on page 5-2.
5-10
Additional Remote Networking Reducing Cost
Next, specify whether connections will be permitted or prevented during these times using the Define Site
Time Default command. Enabled permits outgoing connections, except during the time ranges stated.
Disabled prevents outgoing connections, except during the time ranges stated.
Configurable time ranges are based on a Sunday-to-Saturday week. To configure access that spans weekend
hours, see Controlling Access During Weekend Hours on page 5-16.
To configure an IP timeserver, see Set/Define IP Timeserver on page 12-46. To set the SCS internal clock,
see Set/Define Server Clock on page 12-117. To configure the SCS timezone, see Set/Define Server
Timezone on page 12-128.
5-11
Additional Remote Networking Reducing Cost
To display the site restrictions you’ve configured, use the List Site Time command.
Another way to reduce cost is to increase the percentage utilization required to add additional connections.
If a site is permitted to use up to 80% of the total currently-dialed bandwidth on a particular port (rather than,
for example, 25%), the site will be less likely to require additional connections to increase bandwidth.
Define Site Time Success sets the time lapse between attempts to connect to a remote site after a
successful connection has been made.
Define Site Time Failure sets the time lapse between attempts to connect to a remote site when a
connection attempt fails.
If the last connection attempt succeeded and the success timer is set to a high value (for example, 20
minutes), the SCS will wait for a longer period of time before attempting a new connection. If the SCS was
not able to connect for some reason, setting the failure timer to a low value (for example, 5 seconds) will
cause the SCS to retry the connection at short intervals until it succeeds.
In Figure 5-20, the SCS is configured to allow a new connection attempt almost immediately upon
completion of a successful connection. If the last attempt to connect to the site failed, the SCS will wait 30
seconds before attempting another connection. It will continue to retry the connection every 30 seconds until
it succeeds.
5-12
Additional Remote Networking Using the SCS Without Dialup Modems
Direct connections Two SCS units are linked with a serial cable.
Statistical multiplexors Multiplexors (stat-mux) allow multiple serial lines to run over a single
leased line. The stat-mux must support asynchronous serial
communication.
Synchronous leased line Lines are leased from the telephone company and dedicated to
synchronous serial communication between two fixed locations.
Analog leased lines Analog lines are ordinary telephone lines leased from the telephone
company and used in conjunction with standard modems. The modems
must have leased line capabilities.
The SCS assumes an 8-bit data path. If you are using SLIP, all characters must be sent and received
unchanged by the intervening communications equipment. PPP has a feature called ACCM which causes
the SCS to avoid sending user-specified control characters. If the equipment connecting the SCS cannot
send certain control characters, configure PPP and ACCM on the SCS port.
Note: See your modem’s documentation to configure the modem for leased line mode.
5-13
Additional Remote Networking Using the SCS Without Dialup Modems
RTS/CTS flow control is used between the SCS and the communications equipment.
If RTS/CTS flow control is not supported, XON/XOFF flow control may be used in conjunction with
PPP. If flow control cannot be used, use PPP and monitor the port for checksum errors which may be
the result of disabled flow control.
In the following examples (both SLIP and PPP), the SCS has an IP address of 192.0.1.1, and must connect
to another router with IP address 192.99.99.99.
5.6.2.1 PPP
Figure 5-21 displays the command required if PPP is used. Both sides of the leased line should be configured
using these commands.
If static routing is to be used on the line, routes pointing to the site port2 will be required.
5-14
Additional Remote Networking Character Mode Sites
5.6.2.2 SLIP
Figure 5-23 displays the commands required if SLIP is used. Both sides of the leased line should be
configured using these commands.
If static routing is to be used on the line, routes pointing to the site port2 will be required.
To create a character mode site, use the Set/Define Site <sitename> Protocol None and Set/Define Site
<sitename> IP Remoteaddr <ip_address> commands. Then create a host route that points to it with the
Set/Define IP Route <ip_address> Site <sitename> command. This is only necessary if the IP address is
going to be on a different IP subnet. To make a text mode connection to the serial port, Telnet to
<ip_address>. To keep the site up all the time, first issue the command Define Site <sitename> Idle 0, and
then use the Define Site <sitename> Permanent Enable command.
Character mode sites still obey time-of-day restrictions and idle time-outs. All site authentication options
for the site are ignored, as are settings for MTO, bandwidth, and packet filters. Sites without protocols
cannot be started by users logging in serially.
5-15
Additional Remote Networking Examples
5.8 Examples
5.8.1 Creating a Chat Script
Figure 5-25 displays a sample chat script. This script will send a series of text strings to the remote host, and
will expect particular strings in return. If an expected string is not received from the remote host, the script
will loop up to four times before the entire script fails.
In this example, a network policy prevents all IP traffic, permitting only ICMP ping packets and email.
Telnet connections are permitted to only one secure host (192.0.1.4) on the local network. The SCS is
calling site memphis.
First, create a filter list for IP traffic. This list is called mem.
Finally, the mem filter list must be associated with site memphis as an incoming filter list.
Note: For a more complex firewall example, see Creating a Firewall on page 11-30.
5-16
Additional Remote Networking Examples
The following example restricts access during the weekend hours between 5:00 p.m. on Friday and 6:00
a.m. on Monday. Two commands are used to configure the necessary blocks of time: one that spans Friday
evening to Saturday just before midnight, and one that spans midnight on Sunday to Monday morning.
Note: In the above example, it is assumed that the access default is “Enabled,” in
which case connections are restricted during the specified time periods.
The following example achieves the same result by first adding a time range from Monday morning to
Friday evening. The access default is then set to Disabled, which allows connections only during the
specified time period.
5-17
6: IP
This chapter explains some important concepts about IP addressing, configuration, and routing.
To configure IP for remote networking, see Chapter 4, Basic Remote Networking, and Chapter 5, Additional
Remote Networking. For specific IP commands, see IP/Network Commands on page 12-18.
IP Addresses, page 6-1, describes how the SCS handles IP address assignment.
Subnet Masks, page 6-5, explains how the SCS works with subnetworks.
Header Compression, page 6-8, covers how to enable and disable IP header compression.
Establishing Sessions, page 6-8, describes SSH, Telnet, and Rlogin sessions.
Displaying the IP Configuration, page 6-23, explains the parameters of the Show IP command.
Examples, page 6-25, shows examples of the SCS in various real-life situations.
6.1 IP Addresses
Each TCP/IP node on a network has a unique IP address. The IP address provides the information needed
to forward packets on the local network and across multiple networks if necessary. IP addresses are
specified as n.n.n.n, where each n is a number from 0 to 254; for example, 192.0.1.99.
You must assign the SCS a unique IP address. This IP address will also be used for each individual serial
port on the SCS.
IP addresses contain three pieces of information: the network, the subnet, and the host. The network
portion of the IP address is determined by the network type: Class A, B, or C.
6-1
IP IP Addresses
In most network examples, the host portion of the address is set to zero.
Consider the IP address 36.1.3.4. This address is a class A address, therefore, the network portion of the
address is 36.0.0.0 and the host portion is 1.3.4.
The subnet portion of the IP address represents which subnetwork the address is from. Subnetworks are
formed when an IP network is broken down into smaller networks using a subnet mask.
A router is required between all networks and subnetworks. Generally, hosts can send packets directly only
to hosts on their own subnetwork. All packets destined for other subnets are sent to a router on the local
network. The host portion of the IP address is a unique number assigned to identify the host.
For instructions on setting the IP address for your SCS, see your Installation Guide.
If an incoming caller does not require the same address for each login, a dynamic address can be assigned
from an address pool. See Defining an IP Address Pool on page 6-3 for configuration instructions.
Some remote nodes or remote routers cannot be dynamically assigned an IP address. For example, a remote
node may offer a service to other hosts on its network. If the other hosts are statically configured to use that
IP address to contact the remote node, the node’s IP address must not change. In this situation, two courses
of action may be taken: the caller may be permitted to choose any address, or may be restricted to a specific
address or range of addresses.
Permitting the caller to choose an address presents a number of risks. If the caller chooses an unacceptable
IP address (for example, the address of a server), it could affect the accuracy of routing tables elsewhere on
the network. In addition, the caller could choose an IP address intended for another host, compromising
network security.
6-2
IP IP Addresses
To avoid routing and security problems, the SCS should restrict incoming callers to a particular address or
range of addresses. This restriction may be defined in each site to force each caller to use a unique IP
address; see Specifying a Site’s IP Address Range on page 6-3 for configuration instructions.
To define an address pool, use the Set/Define IP Ethernet Pool command. You must specify both the
beginning and end of the address range.
Note: Set/Define IP All Pool is not a valid command. The Ethernet parameter must be
used.
Ensure that the address pool is at least as large as the number of serial ports that can accept incoming
connections. If all addresses in the pool are in use, incoming callers will not be assigned an IP address.
The SCS will automatically add host routes to the routing table for all addresses in the pool. When an
address from the pool is assigned to an incoming caller, the route to the address will be announced in RIP
broadcasts.
Addresses in the pool are automatically added to the SCS ARP table. If proxy ARPing is enabled (see Proxy
ARP on page 6-22), the SCS will respond to ARP requests for these addresses, even when they aren’t
currently assigned. This enables the SCS to defend the addresses in the pool; other hosts will not be able to
use them.
To specify the beginning and end of the range, use the Define Site IP Remoteaddress command. Two
addresses must be specified: the beginning of the range and the end of the range.
Callers will not be permitted to use IP addresses with the host part of the address set to zero or -1. These
addresses are reserved to identify broadcast packets. If the range that you specify includes such an address
(for example, 192.5.6.0 or 192.4.2.255) and a caller requests this address, the connection will not be
permitted.
RADIUS can also be used to set the IP address range for a site. See Framed-IP-Address on page D-3 for
more information.
6-3
IP IP Addresses
When an incoming caller requests an IP address, the requested address is compared to this address. If they
match, the caller will use the address. If the addresses do not match, the SCS terminates the call.
Remote hosts may require that the SCS have a certain IP address on that interface. For example, a remote
host may require that RIP updates be received from a particular IP address, or an address within a certain
range. In these cases, a site-specific IP address may be configured for a particular interface. For example,
site irvine may configure the SCS IP address on its interface as 193.20.339.2, and site dallas may configure
the SCS address on its interface as 192.20.338.0.
To change the IP address for a particular site’s interface, use the Define Site IP Address command.
6.1.2.1 SLIP
SLIP does not support negotiation of IP addresses. If a SLIP user requires the same IP address for each login,
the user may enter the address using the Set SLIP command.
If the port receiving the incoming call is dedicated to SLIP, a specific IP address may be assigned via a
custom site. To define the address for the site, use the Define Site IP Remoteaddress command.
If the user does not require the same address for each login, an address may be dynamically assigned from
the address pool. To configure the range of addresses in the pool, use the Set/Define IP Ethernet Pool
command. You must specify both the beginning and end of the address range.
6-4
IP Subnet Masks
All incoming SLIP users that do not use a custom site will use the default site for the connection. To require
that default site users use an IP address from the pool, use the Define Site Default IP Remoteaddress
command.
Figure 6-8: Using the Address Pool for the Default Site
These settings allow site irvine to accept an IP address and a nameserver setting from the ISP.
For example, IP address 128.1.150.35 is on a class B network. The network portion of this address is 128.1.
This large network can be broken down into 254 networks using a subnet mask of 255.255.255.0, which
makes the network portion 128.1.150.
It is not always necessary to divide a network into subnetworks. To determine whether subnetting is
required, a number of factors should be considered, including the network size and whether or not network
traffic needs to be isolated in a particular area.
When you configure the IP address for the first time, a default subnet mask will be configured automatically.
This default subnet mask should work for most networks. If your network is divided into subnetworks, you
will need to create a custom subnet mask. To override the default subnet masks, use the Set/Define IP
Subnet Mask command.
It is also possible to learn a subnet mask from BOOTP, though not all BOOTP server implementations
support sending subnet masks. Check your BOOTP server’s documentation.
6-5
IP Name Resolving
The SCS will not change the subnet mask once it is set. If the SCS IP address is changed to a different class,
for example, from a class B to a class C address, the subnet mask will remain a class B address.
The SCS supports CIDR (classless routing). CIDR allows Internet Service Providers (ISPs) to group blocks
of class C networks into larger networks. Your ISP will provide you with the appropriate subnet mask. If
you enter a CIDR subnet mask with the Set/Define IP Subnet command, the SCS will display a reminder
that classless routing is being used.
For the SCS to function properly, all subnetworks within a particular network must use the same subnet
masks even if each network has a subnet mask of a different length.
Network hosts do not understand alphanumeric (text) host names. When a text name is used, the SCS must
translate it into its corresponding IP address. The translation process is called name resolution.
To resolve a name, the SCS can use one of two resources: its local name table or the Domain Name Service
(DNS). For example, suppose user Bob wishes to telnet to athena.com. The SCS first consults its local host
table; if the name doesn’t exist, the SCS attempts to resolve the name using the DNS. If the name cannot be
resolved, Bob must enter the IP address in order to access the host.
Some host names and IP addresses are added to the local host table by rwho packets, periodically
broadcasted by UNIX hosts that support the rwho protocol. If addresses are not learned from rwho packets
and DNS is not available, hosts may be manually added to the table. See Adding Hosts to the Host Table on
page 6-7 for instructions.
To use the DNS, the SCS must know the IP address of the DNS server.
6-6
IP Name Resolving
To specify a backup nameserver, use the Set/Define IP Secondary Nameserver command. If the first
nameserver isn’t available, the request will be sent to the secondary server.
In the example above, the default domain name is ctcorp.com. If user Bob typed telnet athena, the SCS
would automatically append the domain suffix and attempt to resolve athena.ctcorp.com.
If a hostname is entered that ends with a period (“.”), the SCS will not add the domain suffix to the hostname
for resolution.
To display the current entries in the host table, use the Show Hosts command.
To remove an entry from the host table, use the Clear/Purge Hosts command.
6-7
IP Header Compression
When IP headers are compressed, the SCS replaces the packet’s header with a slot number. This number
is assigned dynamically, and denotes that the packet originated from a particular connection (for example,
a Telnet session). When the destination receives the packet, it will decompress the header, replacing the
representative slot number with the complete header information.
To use header compression, configure the number of slots (connections) supported on the site. This number
should be slightly higher than the anticipated number of connections; in the event that more connections are
made than expected, additional slots will be available for those connections.
Note: The SCS uses Van Jacobson TCP compression, discussed in RFC 1144.
Note:
Note: The word “sessions” in this manual is used to describe interactive connections;
PPP or SLIP connections are not referred to as sessions.
The following section explains how to establish sessions and set up connection characteristics. Specific port
configuration and other session characteristics are discussed in Port-Specific Session Configuration on page
8-4.
To display the current sessions, use the Show Sessions command. The port number and username will be
displayed, along with the connection type and current number of sessions.
6-8
IP Establishing Sessions
ETS16PR
activity ok 100 link power
transmit
SCS
Terminal
Host "athena"
Terminal
Rlogin connections are similar to Telnet connections, however, Rlogin enables trusted users to log into a
host without password verification.
Note: For information on resolving host names, see Name Resolving on page 6-6.
By default, Telnet and Rlogin connections will be made to a preset port number. To connect to a different
port number, use the Telnet/Rlogin commands in conjunction with a port number (prefaced by a colon).
6-9
IP Establishing Sessions
If the SCS port has been configured with a terminal type (such as VT100), this information will be sent to
the remote host during the session. To configure the terminal type, use the Set/Define Ports TermType
command.
Rlogin can be a security problem. When the SCS attempts an outgoing Rlogin connection, the SCS will send
the username specified when the user logs into the SCS. If a user is not authenticated during the SCS login
process, an unauthorized username may be used to Rlogin to remote hosts. The easiest way to avoid this
problem is to disable outgoing Rlogin connections.
Another way to secure your network is to ensure that the SCS is not a trusted host on any UNIX hosts on
the network. This solution is not foolproof, however, as a user could still add the SCS to a UNIX host’s
.rhost file.
To disable incoming Telnet/Rlogin connections, use the Set/Define Server Incoming command.
To require the login password for incoming Telnet/Rlogin connections, use the Password parameter:
To restrict incoming Telnet and Rlogin connections using the IP security table, see IP Security on page 6-
17. To restrict incoming connections to SSH, see Disabling HTTP and FTP, page 6-17.
To use SSH with the SCS, you must have SSH client software installed on the host that you are connecting
from. Incoming SSH sessions will obey applicable virtual port settings (port 0), which are discussed on page
8-22.
6-10
IP Establishing Sessions
When the SCS first powers on, it generates an ephemeral host key that is regenerated every hour. Incoming
SSH connections are not permitted until this key generation is complete. Outgoing SSH is not affected.
The SCS may take a few minutes to generate new server host keys if they are ever deleted. Clients
connecting to an SCS with new host keys may display appropriate warning or error messages.
In conjunction with the Set/Define /SSH Mode command, you can use the following parameters:
If a compatible protocol version is not agreed upon (one node wants SSH v1 and the other wants SSH v2),
the connection does not occur.
The AUTHORIZED_KEYS file consists of each user’s public keys. For example, on a UNIX host, your
public key is stored in a file called .ssh/identity.pub. The SSH client’s key generation software creates both
an unreadable private key file (often called identity) and human readable public key file (identity.pub).
Note: Not all clients come with this program. If yours does not, you may need to use
the Username/Password Authentication method described below.
6-11
IP Establishing Sessions
Copy the contents of the public key file to a text file, and save the file with the name
AUTHORIZED_KEYS. (AUTHORIZED_KEYS is case sensitive).
Note: Make sure there is no file extension. In Windows, you may need to save the file
as a .txt file and then rename the file to remove the extension.
Following is an example of how public/private key authentication works on the SCS. In this example, RSA
user authentication is used. DSA authentication is similar.
1 The SSH client on the user’s computer sends the public half of its identity key to the SCS.
2 The SCS checks to see if this user’s identity key is listed in the AUTHORIZED_KEYS (or
AUTHORIZED_KEYS2) file on the SCS.
If the user identity key is not listed in the AUTHORIZED_KEYS file on the SCS, then the
authentication attempt fails. If the identity key is listed, the process continues.
3 The SSH client then sends the private half of its identity key to the SCS.
4 The SSH compares the private half of the user’s identity key to the key stored in the host_rsa_key
(or host_dsa_key) file on the SCS.
5 If the private keys match, the user’s identity is confirmed and an SSH connection forms.
If RSA or DSA user authentication fails, the SCS prompts for a username and password (or just a password,
if the SSH client forwarded the username). The user’s name and password are then checked against the
Radius, Secure ID, or local user databases, in order of their precedence settings. See Changing the
Precedence on page 12-10.
Create a file including the complete text of your identity.pub file, plus the public keys of any other users
you want to authenticate for connections to the SCS. Save it in the SCS’s /flash/ssh/ directory as follows:
2 Log in with the usernname of root and enter the privileged password (system by default).
6-12
IP Establishing Sessions
Username>
Username>
Username/Password Authentication Setup
New authentication keys are generated within a few minutes based on the list of authorized user public keys.
A file called host_rsa_key contains the authorized users’ private identity keys. A file called
host_rsa_key.pub contains the authorized users’ public identity keys.
Note: Key generation, especially of host keys, can take a significant amount of time.
When the SCS boots for the first time or is factory defaulted, it must generate all
the keys. Depending on your SCS model, key generation could take between one
and five minutes.
As you add individual users, add their public keys to the AUTHORIZED_KEYS file on your workstation
and FTP the updated file to the SCS.
If this file is located at SSH connection time, and the public key of the user is valid, the user will
automatically be logged into the Local> prompt or, if user authentication is configured on that port, the user
may be prompted for his username and password. See Database Configuration on page 11-9 for information
on configuring user authentication.
If the file is not located at connection time, the SCS proceeds to password authentication.
Create a file including the complete text of your identity.pub file, plus the public keys of any other users
you want to authenticate for connections to the SCS. Save it in the SCS’s /flash/ssh/ directory as follows:
2 Log in with the usernname of root and enter the privileged password (system by default).
6-13
IP Establishing Sessions
New authentication keys are generated within a few minutes based on the list of authorized user public keys.
A file called host_dsa_key contains the authorized users’ private identity keys. A file called
host_dsa_key.pub contains the authorized users’ public identity keys.
Note: Key generation, especially of host keys, can take a significant amount of time.
When the SCS boots for the first time or is factory defaulted, it must generate all
the keys. Depending on your SCS model, key generation could take between one
and five minutes.
As you add individual users, add their public key to the AUTHORIZED_KEYS2 file on your workstation
and FTP the updated file to the SCS.
If this file is located at SSH connection time, and the public key of the user is valid, the user will
automatically be logged into the Local> prompt or, if user authentication is configured on that port, the user
may be prompted for his username and password. See Database Configuration on page 11-9 for information
on configuring user authentication.
If this file is not located at connection time, the SCS proceeds to password authentication.
% ssh scs2
paul@scs2's password:
Note: Expired local passwords cannot be updated and login scripts will not be run at
this point of the SSH process.
Once the username and password are verified, SSH authentication is complete. The user will be moved on
to any previously configured user authentication (as enabled with the Set/Define Ports Authenticate
command) that would normally apply to a login on that port. At this point, all authentication methods,
including RADIUS and SecurID, will be available, and expired local passwords will be prompted for
updates.
6-14
IP Establishing Sessions
For example, if authentication is enabled on virtual ports (port 0), the user in Figure 6-30 will be prompted
again for the username and password.
% ssh scs2
paul@scs2's password:(not echoed)
Username> paul
Password> (not echoed)
To form an SSH connection from a Unix platform to an SCS, your computer must have an SSH client
installed (OpenSSH, for example).
1 At the command prompt, enter ssh followed by the SCS host name or IP Address. You may also
specify a username by adding a −l(username) or (username)@hostname.
3 If you are not using an RSA or DSA key, specify the username and password that the SCS will use to
authenticate you.
4 If connecting directly to a serial port on the SCS, specify the port number as 22xx, where xx is the
port number. For the appropriate SSH options for your system, enter man ssh or view your client
software’s help files for a full listing of instructions and syntax requirements.
2 Enter the SCS host name or IP Address and specify the public key file to use.
4 If connecting directly to a serial port on the SCS, specify the port number as 22xx, where xx is the
port number. In the example below, an SSH connection is formed to port 2 of scs2. For the appropriate
SSH options for your system, enter man ssh or view your client software’s help files for a full listing
of instructions and syntax requirements.
6-15
IP Establishing Sessions
6 If you are not using an RSA or DSA key, specify the username and password that the SCS will use to
authenticate you.
The first time you SSH to a remote host from the SCS, the SCS notes that the host is not recognized, but
permits the connection. If you are not the privileged user, you will be allowed to use the host’s key for the
current session, but the key will not be permanently saved in the list of known hosts.
If you are the privileged user, the host’s key is permanently added to the table of known hosts (stored in
/flash/ssh/known_hosts).
For each following connection between the SCS and that host, the host’s key will be compared to that stored
in the known host table. If the key is authentic, the connection will automatically proceed to user
authentication.
If the key has changed, you will receive a warning and a brief list of possible explanations including a
possible man-in-the-middle attack. To successfully connect, erase that host’s public key from the
known_hosts file on the SCS, then attempt the connection again. The SCS will note that the host is not
recognized.
6-16
IP IP Security
The ssh command can be followed by an optional command that will be executed on the remote machine,
and then the session will end. Place the command in quotes to maintain capitalization. The following
command will log user mary into host athena, provide a complete list of files including modification dates
and ownership, and then log mary out of the host.
Outgoing SSH connections may be set as the preferred or dedicated service for a port. For more information,
see Preferred/Dedicated Protocols & Hosts on page 8-8.
To re-enable Telnet, use the Set/Define Server Incoming Telnet command. SSH is always enabled.
6.6 IP Security
The SCS’s IP security features allow an administrator to restrict incoming and outgoing TCP/IP sessions,
access to ports, and print jobs. Connections are allowed or denied based upon the source IP address for
incoming connections and print jobs and the destination IP address for outgoing connections.
IP security for connections can be set to Incoming Enabled/Disabled, Outgoing Enabled/Disabled, or Both.
Incoming refers to users on other hosts attempting to log into the SCS. Outgoing refers to local users
connecting to other TCP/IP hosts. The Both parameter enables or disables both Incoming and Outgoing
connections. IP security for printing can be set to Enabled or Disabled. The printing setting affects both LPR
and RTEL print jobs from the specified hosts.
6-17
IP IP Security
The first command prevents port 3 from beginning sessions with hosts whose addresses range from
192.0.1.1 through 192.0.1.254. A 255 in any segment applies to all numbers in that range—192.0.1.255
includes 192.0.1.1, 192.0.1.2, and so on. The second command prevents nodes with IP addresses from
192.0.5.1 through 192.0.5.254 from sending print jobs to the server.
A more specific rule takes precedence over a less specific one. For example, if connections to 192.0.1.255
are disabled but connections to 192.0.1.78 are enabled, a connection to 192.0.1.78 will succeed. If no entries
are defined in the table, all connection attempts will succeed. To ensure that all connections will fail unless
directly specified in another entry, enter the following command:
Note: If the user making the connection is the privileged user (see the Set Privileged/
Noprivileged command), the connection will be allowed regardless of the entries
in the table.
A trailing zero in any address segment is shorthand for “all addresses in this range, both incoming and
outgoing disabled, for all ports.” For example, the following two commands are equal.
Finally, port zero corresponds to the virtual ports (that is, users who log into the server from the network).
If no ports are specified on the command line, the command will affect all local and virtual ports.
Note: For a description of virtual ports, see Virtual Ports on page 8-22.
6-18
IP IP Routing
The entire security table can be cleared with the following command.
6.7 IP Routing
TCP/IP internets are usually broken down into networks. Each host on a particular network can only see
hosts on its network; to transfer network traffic to other networks, routers (also called gateways) are
required. Routers are typically connected to two or more networks.
The SCS serves as a router for the networks that it is directly connected to. To determine the path to other
routers on the network, the SCS will listen to network broadcast packets (for example, RIP packets); routers
will advertise themselves in these packets.
The SCS must be positioned between two networks in order for routing to work correctly. If two or more
SCSs are used, the units cannot be on the same network (as in Figure 6-44).
192.1.1.1 192.1.1.5
receive receive
ETS16PR
ETS16PR
When the SCS receives the packet, it examines the packet’s destination address, determines the most
efficient route to this address, and forwards the packet to this location. The “most efficient route” is
determined using two factors: the network that the address is part of and the SCS routing table, which is
discussed in the following section.
6-19
IP IP Routing
Host Routes A Host Route is a route to a single host. Generally, a host route is entered for
each Remote Node that logs into the SCS.
Network Routes A network route is a route to another network. A network route is used if a host
route to the destination doesn’t exist.
Default Routes A default route is used if a more specific host or network route isn’t available.
It is used to cut down on the size of routing tables and dynamic routing protocol
updates. If, for example, the SCS is the only path for network packets to reach
a much larger group of networks, the SCS can be configured to advertise itself
as the default route.
Note: See Set/Define IP Route Default on page 12-42 and Define Site IP Default on
page 12-140.
An SCS in a small sales office might have a default route that points to the corporate headquarters. The SCS
doesn’t need to know about all of the routes on the headquarters network. It only knows to send all otherwise
unspecified traffic to the central location, where it will be routed to the final destination.
Locally When a route is added locally, it is automatically determined from the SCS IP
address and network mask. The SCS always keeps a local route to the Ethernet
that is attached to; this route is never deleted.
6-20
IP IP Routing
Statically Statically-entered routes are entered and removed by the administrator. These
routes are used when dynamic routes are unavailable.
To add a static route to the routing table, use the Set/Define IP Route
command. A destination and a path to that destination must be specified. The
destination may be an IP network, subnetwork, or host.
The path may be another router on the Ethernet or a site. To specify that the
route is another router, use the Nextrouter parameter. To specify that the route
is to a site, use the Site parameter. The Site parameter indicates that a particular
site should be started to forward the packet. The site will handle any remote
connections necessary to forward the packet (for example, dialing another
LAN).
A metric will be associated with the route to indicate its “cost.” The SCS will
use the route to determine the most efficient route; routes with a lower cost will
be chosen over routes with a higher cost. If a metric is not specified, the SCS
will assign a metric of 1 to the route.
In Figure 6-45, the first command specifies that the route to network 192.5.4.0
is through another router, 192.0.1.1. The route was assigned a metric of 4.
The second command specifies that the route to network 192.5.3.0 is through
site dallas. As a metric is not specified, the SCS will assign this route a metric
of 1. When the SCS receives traffic destined for network 192.5.3.0, if this route
is determined to be the most efficient route, site dallas will be started and will
forward the packet.
To enter a static default route, use the Set/Define IP Route Default command.
Dynamically These routes are automatically learned from other routers on the network and
are managed by a dynamic routing protocol. The SCS currently supports one
dynamic routing protocol, RIP. Routes are automatically entered when new
networks come online, and automatically removed if the networks are no
longer reachable.
Dynamic routes learned via sites are the exception; they are never timed out.
The SCS assumes that these networks are reachable by bringing up a link. This
allows the SCS to learn about extended networks at the remote site without the
administrator’s intervention.
6-21
IP IP Routing
The SCS can be configured to listen only to RIP updates from a list of trusted IP addresses. See Set/Define
IP Trusted on page 12-47 for details. This is not entirely foolproof however, as a sophisticated attacker
could still send RIP updates as one of the trusted addresses and potentially defeat the system.
Proxy ARPing allows remote nodes to appear as if they were on the same Ethernet segment as the SCS. This
feature is particularly useful for ethernet hosts that do not support RIP; those hosts will not need to learn
host-route information to forward traffic destined for the remote node devices.
The SCS will not respond to ARP requests for routes learned from the Ethernet, or for routes that aren’t
explicitly listed in the SCS routing table.
To specify a NetBIOS nameserver, use the following command. A secondary NetBIOS nameserver can be
configured if desired.
6-22
IP Displaying the IP Configuration
NBNS will allow Windows clients to use the Network Neighborhood browser without any additional
configuration on the Windows host.
192.0.2.0 192.0.4.0
receive receive
ETS16PR
ETS16PR
activity ok 100 link power activity ok 100 link power
transmit transmit
192.0.5.0
192.1.2.0 192.0.3.0
Local>> SHOW IP
SCS Version B1.1/102int(951128)Name:DOC_SERVER
Hardware Addr: 00-80-a3-0b-00-5b Uptime: 3 Days 02:07
6-23
IP Displaying the IP Configuration
The Show IP Interface command displays a one-line summary for each of the router’s interfaces. There
will always be an interface for the Ethernet, as displayed in Figure 6-51. When sites are active, interfaces to
these sites will be displayed.
The Uptime field displays how long (in days:hours:minutes format) each interface has been active. The
Lastin field displays the duration since the last packet arrived on a particular interface. The Lastout field
displays the duration since the interface sent outgoing traffic.
When used in conjunction with a particular site’s name, the Show IP Interface command displays
information about the site’s interface, including its IP address, subnet mask, IP address of the remote host,
and RIP statistics.
The Show IP Route command displays the routes currently in the SCS routing table.
6-24
IP Examples
The Source field indicates how the route was added to the table; statistically, locally, or from RIP.
The Timer field displays how long (in minutes:seconds format) the SCS will continue to use this route. For
static and local routes, this field will display a series of dashes (----); these routes are never timed out.
If a "T" is displayed on the right of the Timer value, the value represents the route’s time-to-live. If a RIP
update for the route is not received within this time period, the route will be marked as unreachable, and the
T will be changed to a "D" to denote that the route is invalid, but isn’t ready to be deleted yet. If "Exp" is
displayed, the route is about to be deleted from the table.
The Interface field displays the interface used to forward packet traffic.
6.9 Examples
6.9.1 IP Address Assignment for Remote Networking
An SCS handles incoming calls from a series of remote node users. Two of these users, Bob and Frank, have
special IP address requirements.
Dynamically assign IP addresses to the remaining remote node users from an IP address pool. Only
five SCS ports have been configured to accept incoming calls, therefore, only five IP addresses must
be included in the pool.
Bob will use site bob when he logs into the SCS. At authentication time, he will be prompted for the site’s
local password, badger. He will be assigned IP address 192.0.1.108.
When Frank logs into the SCS, he will use site frank, which requires that he enter the password wallaby.
No remote IP address is defined for this site, therefore, Frank may use any IP address he wishes.
6-25
IP Examples
All incoming callers that do not specify a particular site (such as bob or frank) will use the default site for
the connection. To require that default site users use an IP address from the pool, use the Define Site Default
IP Remoteaddress command.
Figure 6-57: Using the Address Pool for the Default Site
Another router, 192.0.1.99, provides access to the network 192.1.1.0. This route must also be assigned a
metric of 2.
A default route to internet must be configured on the SCS. The route must be included in RIP updates to
other routers; it must have a metric of two.
6-26
7: PPP
The SCS can use PPP, the Point-to-Point Protocol, to transmit high layer protocols over a serial link, ISDN
connection, or other point-to-point based connection. Unlike SLIP (the Serial Line Internet Protocol), which
can also be used with the SCS, PPP supports authentication, escape sequences for flow control characters,
loopback detection, and per-packet checksums.
The final section discusses Starting PPP on page 7-3. PPP is also discussed in Chapter 4, Basic Remote
Networking, and PPP authentication (PAP and CHAP) are described in PPP Logins on page 11-3.
7.1 LCP
The Link Control Protocol (LCP) is used by PPP to negotiate basic characteristics of the connection. These
characteristics include packet size, header compression, control character escaping, and authentication
mechanisms.
To configure the maximum packet size that can be received from a remote node, set the Maximum
Transmission Unit (MTU), or maximum packet size, with the Define Site MTU command.
7-1
PPP LCP
Escaping characters is often used with XON/XOFF flow control. This method of flow control, used with
many modems, involves treating two characters (hex 0x11 and hex 0x13) in a special manner.
Applications that use these characters (such as certain text editors) may incorrectly trigger XON/XOFF flow
control. If a user enters Ctrl-S (hex 0x13) or Ctrl-Q (hex 0x11), these characters won’t be transmitted; they’ll
be interpreted as flow control characters and removed from the data stream.
PPP can escape values between 0x00 and 0x1f, inclusive. To do this, PPP uses a 32-bit Asynchronous
Character Control Map (ACCM). For each character to be escaped, that corresponding bit is set in a
hexadecimal format in the ACCM. For XON/XOFF flow control, the ACCM would be 0x000A0000.
To escape a particular character, use the Define Ports PPP ACCM command. To automatically escape the
XON/XOFF flow control characters, use the XONXOFF parameter. To escape all control characters, enter
0xffffffff as the ACCM value. These options are all shown in Figure 7-2.
If the port is set for XON/XOFF flow control, the XON/XOFF characters are automatically added to any
configured ACCM.
CHAP authentication begins with a challenge message from the unit to verify its peer. The peer
receives the challenge, uses its password to encrypt the challenge, and responds. The authenticating
unit then checks the response against what is expected, and either accepts or rejects the authentication
attempt. At no time is the password transmitted over the link.
PAP, a simpler protocol, involves transmitting the username and password over the link in plain text.
If the unit is authenticating to an unauthorized peer, the password could be compromised.
PAP and CHAP may be enabled on each port and each site. If both CHAP and PAP are configured for
authentication, CHAP authentication will be attempted first. If the peer does not support CHAP, PAP will
be attempted instead.
7-2
PPP NCP
On incoming connections, the port’s CHAP or PAP configuration will be used to determine the
authentication required for the connection. For example, if a remote node was logged into port 2 on the SCS
and port 2 was configured to use PAP to authenticate remote hosts, the remote node would be prompted to
authenticate itself.
Outgoing connections use the site’s CHAP or PAP configuration. For example, if site irvine, which has
CHAP enabled, initiated an outgoing connection to a remote router, and the remote site required the SCS to
authenticate itself using CHAP, the SCS would offer its username and password to the remote site.
Use caution with CHAP/PAP authentication because configuring both a local and a remote password on the
same site could compromise security. If a site with both local and remote passwords defined receives an
incoming call, during the LCP negotiation process the site will say that it is willing to transmit both
passwords. The passwords will not be automatically transmitted, but the site will let the user know that it is
willing to do so if required. If the user requires the SCS to authenticate itself, the SCS will transmit the
remote password over the link, thereby give the user a password to access the server.
7.1.5 CBCP
The SCS supports the Microsoft Callback Control Protocol (CBCP) for dial-in PPP clients that request it.
In conjunction with the CBCP, you can configure the SCS to allow the PPP client to choose a dialback
telephone number to reverse phone charges.
7.2 NCP
Network Control Protocols (NCPs) govern use of a specific network protocol over the PPP link. On the SCS,
PPP uses the IP protocol. PPP uses the IP Control Protocol (IPCP) to negotiate the use of IP over a link.
IPCP allows for dynamic address assignment and Van Jacobson TCP header compression.
Note: IP over PPP is described in RFC 1332. Van Jacobson TCP compression is
covered in RFC 1144.
If, during the negotiation process, the SCS receives a request for more IP compression slots than are
configured on the site (using the Define Site IP Slots command), the SCS will NAK (negative
acknowledge), and request the number of slots configured on the site.
7-3
PPP Multilink PPP
To enable this PPP autodetection feature, use the Define Ports PPPdetect command.
If you enable PPP protocol detection, you should also configure PPP authentication (CHAP or PAP)
wherever possible. If PPP authentication is not possible, enable user authentication and the Set PPP
command to authenticate incoming calls instead.
Two Servers are needed for multilink PPP connections, one to initiate the call and one to receive it. All
multilink packets for a given connection must originate from the SCS that brought up the link and be
received by another single SCS. The following sections explain how to configure a calling SCS and a
receiving SCS for a one-way multilink connection.
When a port that is enabled for multilink PPP receives a multilink call and more bandwidth is needed for
the connection, the SCS will add other ports, if available, to reach the necessary bandwidth. For more
information, see Bandwidth On Demand on page 5-4.
7-4
PPP Multilink PPP
Note: Ensure that other port parameters (such as speed, parity, and flow control) are
properly configured for the connection.
Note: All other desired site parameters should be set up, and a static route should be
defined for the site, before the site is used for connections.
A Associate the site with two or more ports, giving each port a priority. Higher priority ports will
be used first.
The estimate should be based on the fastest data transfer that the attached modem can support,
adjusted for expected compression.
The following example assumes a 28.8 kbps modem attached to port 2 with about a 2:1
compression rate (28800 x 2 = 57600 bps = 5760 bytes per second, rounded to 5800 bytes per
second).
See Estimate Each Port’s Bandwidth on page 5-6 for in-depth instructions on calculating
bandwidth amounts.
When the site is brought up, the SCS will attempt a connection by dialing the telephone number
associated with the highest priority port (in this case, 555-1001).
Note: The SCS will only modify bandwidth if it initiated the connection.
7-5
PPP Multilink PPP
The maximum bandwidth should not exceed the sum of the bandwidths for all of the ports.
For more information about site bandwidth settings and how to fine-tune them, see Configuring
Bandwidth Allocated to Sites on page 5-6.
In the following example, the bandwidth should remain between 40% and 90% of the maximum
value, 11500 bytes per second. The bandwidth will be measured every 60 seconds and compared
to the add and remove values to see if an adjustment is necessary.
All of the ports raised for a multilink connection should be added to the connection and authenticated
together. A username and remote authentication password will be needed, and CHAP and/or PAP
authentication should be enabled.
B Ensure that the telephone numbers of the modems attached to the receiving ports match those
configured in the calling site.
7-6
PPP Restoring Default PPP Settings
The site’s name must match that of the incoming multilink user (see Figure 7-11).
A local authentication password will be needed (it should match the incoming site’s remote password,
see Figure 7-11), and CHAP and/or PAP authentication should be enabled.
Note: Use the same authentication protocol on the receiving SCS as on the calling SCS.
To create a character mode site, use the Set/Define Site <sitename> Protocol None and Set/Define Site
<sitename> IP Remoteaddr <ip_address> commands and then create a host route that points to it with the
Set/Define IP Route <ip_address> Site <sitename> command. The <ip_address> must be on the same IP
subnet as the SCS itself. To make a text mode connection to the serial port, Telnet to <ip_address.
7-7
PPP Troubleshooting
Character mode sites still obey time-of-day restrictions and idle time-outs. All Site Authentication options
for the site are ignored, as are settings for MTO, bandwidth, and packet filters. Sites without protocols
cannot be started by users logging in serially. Such sites can only be started by network traffic or with the
Test Site command.
7.8 Troubleshooting
The SCS event logging feature enables you to monitor network and user activity and troubleshoot problems.
Configure a destination for logging information using the Set/Define Logging command, described on page
12-172.
To view PPP LCP and NCP negotiations with the remote host, use logging level 4 or 6. Level 4 logs PPP
negotiation activity, and is adequate for most PPP troubleshooting. Level 6 logs all PPP events; this is
generally only required to troubleshoot faulty PPP implementations.
Once a connection is made, problems may be monitored using the Show/Monitor/List Ports command.
The following table explains the counters useful for PPP troubleshooting.
7-8
8: Ports
Each SCS port can be configured in a number of ways. Configuration options include a port’s start method,
available sessions, access, serial parameters, and flow control.
Many port commands require that the Define commands be used instead of the Set commands. Set
commands take effect immediately for the current session. Define commands do not take effect until the
port is logged out (with the Logout Port command) or the Server is rebooted.
Note: For a more detailed explanation of the difference between Set and Define
commands, see Command Types on page 2-3.
A number of Define Port commands are designed to control modems (for example, Define Port Modem
Answer). These commands are covered in Chapter 9, Modems, and in Modem Commands on page 12-3.
If a user wants to Telnet to an SCS port and dial out using an attached modem, the port must have dynamic
or remote access. If the user wants to log into a port locally and Telnet to a remote host, the port must have
local or dynamic access.
A port’s start-up procedure may involve a combination of factors. For example, if modem control is enabled,
the port will wait until the modem asserts the DSR signal, then it could either automatically start, or wait for
character input before starting (depending on the port configuration).
8-1
Ports Starting a Port
Once Autostart is enabled, the port start ups without waiting for character input. The port then performs any
operations that it’s configured to run at start-up. For example, the port may connect to a particular host, run
an authentication sequence, or run a particular protocol.
If PPP is enabled on the port, the port starts when a PPP packet is received. See PPP Mode on page 8-3 for
details. If both Autostart and modem control are enabled, the port starts as soon as the DCD signal is raised.
The following example configures “A” as the Autostart character for the first serial port.
To specify a control character, using escaped hex. For example, Ctrl-B (ASCII character 0x02) is “\02” in
escaped hex.
8-2
Ports Port Modes
Note: Enabling PPP or SLIP on the serial console port is not recommended.
Note: If the Altprompt characteristic is enabled, users will see a Login: prompt instead
of the Username> prompt. See Set/Define Server Altprompt on page 12-115 for
more details.
Both PPP and PPPDetect are enabled for all serial ports by default. PPP will automatically run once a port’s
has started up and a PPP packet is received. Because running PPP in this manner bypasses a port’s usual
authentication (using a login password or username/password combination), you should configure CHAP
or PAP authentication.
To enable a port to run PPP, use the Define Ports PPP command.
Running SLIP in this manner bypasses a port’s usual authentication process (login password, etc.). As SLIP
doesn’t support authentication, no authentication will occur in this situation. To use authentication with
SLIP, see Chapter 11, Security.
8-3
Ports Automatic Protocol Detection
In some situations, autodetection should be disabled. For example, SLIP doesn’t support authentication. To
authenticate users, autodetection of SLIP could be disabled; incoming callers would be presented with the
Local> prompt and could be forced to enter the login password. Once authenticated, they could manually
start SLIP by entering the Set SLIP command.
Because PPP protocol detection is enabled by default, you should also configure PPP authentication (CHAP
or PAP) wherever possible. CHAP and PAP are enabled by default for all serial ports. If PPP authentication
is not possible, enable user authentication and the Set PPP command to authenticate incoming calls.
If a port is dedicated to PPP or SLIP (see Dedicated Protocols on page 8-8), the protocol will run
automatically when the port is started. Any authentication settings will be ignored.
Session configuration may apply only to the current session, or to all sessions run on a particular port.
Session-specific configuration meets needs that apply only to an active session; for example, if binary files
are being transferred, you could disable interpretation of the switch characters and XON/XOFF flow control
characters.
Port-specific session configuration includes the number of sessions permitted on a port, the keys used to
switch between sessions, and the key used to exit from a session to character mode. The commands used to
configure these options are discussed in the following sections.
8-4
Ports Port-Specific Session Configuration
To change the session limit, use the Set/Define Ports Session Limit command.
The command used to switch to the previous session is Backwards. Its keyboard equivalent is called the
backward switch. To define a backward switch, use the following command:
To specify a control character to use as a switch, use escaped hex (\xx). For example, Ctrl-B (ASCII
character 0x02) would be specified as \02.
The Forwards command is used to switch to the next session. Its keyboard equivalent, the forward switch,
as specified as follows:
The characters you define for the backward switch and forward switch should not conflict with each other
or with characters used for editing commands (see Command Line on page 2-2). In addition, the characters
should not conflict with characters used on the host.
To configure the processing of the Break key, use the Set/Define Ports Break command. Break can be set
to one of the following: Local, Remote, or None.
8-5
Ports Port-Specific Session Configuration
If your keyboard doesn’t have a Break key, an equivalent can be specified with the Set/Define Ports Local
Switch command, or with the Set/Define Ports Break Character command.
There are several examples of how the Port Break command and the alternate Break character work
together. The effect of the Break character depends on the type of connection and how Break processing is
configured. The examples assume that an alternate Break character has been defined for the user’s port.
An SCS serial port user Telnets to a network host and types the alternate Break character.
Remote Break: A Telnet Break IAC sequence will be sent to the host.
An SCS serial port user makes an SSH connection to a network host and types the alternate Break
character.
Remote Break: Nothing happens, because there is no way to generate a Break across an SSH
connection.
An SCS user on serial port 2 issues a command to port 3 and types the alternate Break character.
A user Telnets into the SCS, has a default alternate Break character from template port 0, and types
the alternate Break character at the Local> prompt.
Local or Remote Break: Nothing happens, because the user is already at the Local> prompt.
A user forms a TCP connection from a network host to port 7 on the SCS (for which an alternate Break
character has been defined) using socket 2007, then types the alternate Break character.
Remote Break: If the alternate Break character is detected in the datastream, a serial Break condition
is generated on the port. If a Break condition is detected on the serial port, a Telnet Break IAC
condition will be sent on the network connection.
A user forms a TCP connection from a network host to port 7 on the SCS (for which an alternate Break
character has been defined) using socket 3007, then types the alternate Break character.
8-6
Ports Port-Specific Session Configuration
Note: The 30xx range of sockets is 8-bit clean. If a Break condition is detected on the
serial port, nothing happens, because there is no way to propagate a Break
condition across an 8-bit clean connection.
Local Break: If the alternate Break character is detected in the datastream, nothing happens.
Remote Break: If the alternate Break character is detected in the datastream, a serial Break condition
will be generated on the port.
Local>> DISCONNECT
Local>> DISCONNECT SESSION 2
Local>> DISCONNECT ALL
To use an environment string with the Connect command, specify the host, TCP port, or service to connect
to, then specify the environment string prefaced by a colon. For example, to Telnet to host athena in
Backspace and Passall mode, use the following command:
8-7
Ports Preferred/Dedicated Protocols & Hosts
To set an environment string to use with a preferred or dedicated host/service, use the following syntax:
Note: For more information on preferred and dedicated hosts/services, see Dedicated
Protocols on page 8-8.
Local echoing
The character sent to the remote device when the Return key is pressed
When a port is dedicated, the local prompt cannot be accessed, therefore, commands can’t be entered to
disable the Dedicated characteristic. Take caution when dedicating ports; if you’re going to dedicate all SCS
ports, be sure that you have another way to log into the server (such as a Telnet login).
Note: If you cannot log into the SCS, you’ll need to restore the server to its factory
default settings. See Initialize Server on page 12-111.
8-8
Ports Port Restrictions
For SSH connections, the port name will be used as the username for the remote host.
See Environment Strings on page A-1 for more information on available strings.
If you have a two-character autostart trigger, you can instruct the SCS to pass along both, one, or none of
the characters as part of this command.
Local> LOCK
Password> donut (not echoed)
Verification> donut (not echoed)
Unlock password> donut (not echoed)
Local>
8-9
Ports Port Restrictions
Note: Secure ports (set using the Set/Define Ports Security command) cannot be
locked.
To unlock a port without the Lock password, a privileged user must use the Unlock Port command or log
out the port using the Logout Port command. Logout will disconnect all sessions.
Note: Unlock Port is discussed on page 12-100. Logout Port is discussed on page 12-
53.
The Set/Define Server Lock command, which is discussed on page 12-120, controls whether or not local
users are permitted to lock ports.
The Set/Define Ports Password command controls whether or not the login password is required to log into
the specified port. To require the password, use the following command:
By default, incoming connections are not required to enter a login password. To require the login password
for those connections, use the Set/Define Server Incoming command (discussed on page 12-119).
8-10
Ports Port Restrictions
The SCS will only perform an inactivity logout when the port is in character mode (not running PPP or
SLIP). To configure idle time logouts for PPP and SLIP connections, you must configure an idle time for
the site; after the site is idle for the specified time, the link will be shut down. Use the Define Site Idle
command and specify the length of the idle time limit in seconds.
8-11
Ports Port Restrictions
To enable Security on a particular port, use the Set/Define Ports Security command.
Broadcast messages are also discussed in Sending a Broadcast Message on page 2-5.
8.8.7 Dialback
The Dialback feature allows a system manager to set up a dialback list of authorized users for incoming
modem connections. When a username matching one in the list is entered, the port is logged out and the
phone number will be sent out the serial port using the port’s modem profile.
When Menu mode is enabled, the Local> prompt cannot be accessed. Be sure that you have another way to
log into the SCS before enabling Menu mode on all ports.
Note: For a complete discussion of menu mode, see Configuring Menu Mode on page
3-4.
8-12
Ports Serial Port Configuration
The Autobaud characteristic enables a port to detect an incoming baud rate, character size, and parity and
configure its characteristics to match. This characteristic cannot be enabled if the port’s Access is set to
Remote or Dynamic (see Setting Port Access on page 8-1) or if the specified port offers a service. To enable
Autobaud, use the Set/Define Ports Autobaud command, discussed on page 12-58.
The default name for each port is Port_n, where n denotes the port number (for example, Port_2).
8-13
Ports Serial Port Configuration
Note: For more information about Type options, refer to Set/Define Ports Type on page
12-90
Termtype information is used for outbound sessions; the SCS doesn’t use this information. For example, a
remote host might use the terminal type to configure your terminal to run a particular application.
Once a connection has been started, several different triggers can be used to transmit all accumulated serial
data to the host. These options are controlled with the Set/Define Ports Datasend command. The datasend
process used by the SCS balances network traffic with latency concerns.
One kind of trigger can be set by specifying a “timeout” condition of either the time since the last character
was received or the time since the current character burst was started. For example, to trigger data
transmission 150 milliseconds after the current character burst began, enter the following command:
8-14
Ports RS-485 Configuration
Another option is to set a one- or two-character trigger that will cause the SCS to transmit the data. You can
also specify whether the trigger characters will be sent to the host as part of the serial data or whether they
should be discarded (the default). For example, the following commands will cause the accumulated serial
data to transmit as soon as the “Z” character is detected in the data stream and to send the matched character
(“Z”) to the host as part of that data.
If the Purge Port command cannot be used (for example, if authentication has been defined on all ports), the
settings can only be restored by using the Boot Configuration Program. See your User Guide for details.
While the SCS serial ports are is initially configured for RS-232 networking, they can also be configured
for RS-485 networking. The RS-485 standard allows a serial connection to be shared like a “party line.” As
many as 32 devices can share the multidrop network. Typically, one device is the master and the other
devices are slaves. There are a few important things to note about RS-485 networking with the SCS.
The SCS can be used in either two-wire or four-wire mode. Refer to the following sections to
determine which mode to use.
The maximum RS-485 network cabling length (without repeaters) is 4,000 feet. Lantronix
recommends the use of shielded twisted-pair cabling.
8-15
Ports RS-485 Configuration
A large number and varieties of protocols run over RS-485. However, the SCS does not convert or
interpret serial data. It only moves data between serial and Ethernet. Any RS-485 protocol will have
to be implemented by host software.
To enable RS-485 mode on the SCS, enter the Define Protocols RS485 command. RS-232 mode is enabled
by default.
Shield Shield
Shield ¥
- -
TX- ¥
TX +
¥ + RX
TX+
+ +
RX - - TX
Shield Shield
Master Sh Sh Sh Slave
- - -
(SCS) TX + TX + TX +
+ + +
RX - RX - RX -
Sh Sh Sh
In a two-wire RS-485 network, the SCS must turn its transmitter on when it is ready to send data and then
off for a certain period of time after the data has been sent so that the line is available to receive again. At
most baud rate settings, the timing delay is typically one character length with a maximum of 1.5 character
lengths.
Note: For two-wire mode, the TXDrive setting must be set to Automatic (see TXDrive
on page 8-17). If you enable two-wire mode and TXDrive is set for Always, the
SCS returns an error.
8-16
Ports RS-485 Configuration
RX+ TX+
RX RX- TX
TX-
Shield Shield
Master Slave
(SCS) Sh Sh Sh
- - -
TX + TX + TX +
+ + +
RX - RX - RX -
Sh Sh Sh
It is important to connect the transmitter of the master device to the wire that is connected to the receive
terminals on the slave devices, and connect the receiver of the master device to the wire that is connected to
the transmit terminals on the slave devices. In essence, the master device will be connected to the slave
devices with a swapped cable.
8.10.2.1 TXDrive
The SCS can be configured to either always drive the TX (transmit) signal or to let the attached device
control the TX signal (tristate) when not actively transmitting. The Define Protocols RS485 TXDrive
command takes one of two parameters. The Always parameter sets the SCS for continuous TXDrive, so TX
will never be tristated. The Auto parameter sets the SCS for TXDrive when transmitting and tristate while
idle.
Note: You can only set TXDrive for Always when using four-wire mode. The Always
parameter returns an error in two-wire mode.
8-17
Ports Flow Control
8.10.3 Termination
RS-485 connections must be terminated properly in order to work. Termination is necessary when using
long cable runs, although only end nodes should be terminated. The termination option is disabled by
default.
Shield Shield
TX- RX-
TX TX+ RX+ RX
RX+ TX+
RX RX- TX
TX-
Shield Shield
Master Slave
(SCS)
An SCS port is connected to a modem. The SCS port transfers data to the modem at 115,200 bits per second,
but the modem can only send data over the phone line at 15,000-30,000 bits per second. In a short period of
time, the modem’s buffer fills with data. The modem sends a signal to the SCS to stop sending data, and the
SCS does not send data until it receives a signal from the modem that it can receive data again.
The SCS supports hardware and software flow control. The hardware flow control option is RTS/CTS and
the option for software flow control is XON/XOFF. Both flow control methods are described below.
Note: When the SCS is communicating with a device, the SCS and the device must
agree on the type of flow control used.
8-18
Ports Flow Control
For example, the SCS will assert RTS when it is ready to accept data. When it can no longer accept data (its
buffers are full) it will deassert this signal. A connected modem will monitor the assertion and deassertion
of this signal; it will only send data when RTS is asserted.
A modem will assert CTS when it is ready to accept data. When its buffers are full, it will deassert CTS to
indicate to the SCS that it should stop sending data. The SCS will only send data when CTS is asserted.
RTS/CTS is the most reliable method of flow control and is the recommended method for the SCS. In the
event that RTS/CTS flow control cannot be used, XON/XOFF flow control is recommended.
Applications that use the Ctrl-Q and Ctrl-S characters (such as certain text editors) will conflict with XON/
XOFF flow control. If a user enters a Ctrl-Q or Ctrl-S, these characters won’t be transmitted; they’ll be
interpreted as flow control characters and removed from the data stream.
Protocols that require an 8-bit clean data path cannot use XON/XOFF flow control. Data passes through an
8-bit clean data path unchanged. SLIP requires an 8-bit clean data path; PPP may have the same
requirements if the Asynchronous Character Control Map (ACCM) isn’t set properly. To configure the
ACCM, see Chapter 7, PPP.
Consider the line speed and the serial speed of the modem; if data is being compressed, the serial
speed should be higher than the line speed. If you’re connecting a terminal to the port, ensure that the
speed of the terminal matches the port speed.
Note: See Chapter 9, Modems, for a discussion of line speeds, serial speeds, and data
compression. See your modem’s documentation for information on configuring
the modem’s line and serial speeds.
2 Disable Autobaud
In order to ensure that the set speeds are always used, disable any automatic speed selection or
autobaud options on your modem.
In addition, disable autobaud on the SCS port you’re configuring. To do this, use the Set/Define Ports
Autobaud command. This command requires that you be a privileged user.
Note: If you aren’t currently a privileged user, use the Set Privileged command.
3 Determine the Appropriate Flow Control Method
8-19
Ports Serial Signals
Refer to Flow Control on page 8-18 for a description of the different methods. Choose the method
that’s most compatible with the modem and applications you’ll be using.
To configure your modem, refer to the modem’s documentation. To configure flow control on the
SCS, use the Set/Define Ports Flow Control command. Figure 8-49 displays an example.
Note: For this command’s complete syntax, see Set/Define Ports Flow Control on page
12-72.
All of the SCS’s DB25 and RJ45 signals are displayed in the following figures.
Tx (Transmit)
Rx (Receive)
RTS (output)
CTS (input)
Ground
DCD (input)
DTR (output)
8-20
Ports Serial Signals
RTS (output)
DTR (output)
Tx (Transmit Ground)
CTS (input)
Signal check is generally enabled for use with printers; if the printer doesn’t assert the DSR signal, it’s
assumed to be disconnected or powered off. In this case, the remote login isn’t permitted, and print jobs are
not sent from the SCS to the printer.
8-21
Ports Virtual Ports
RJ45 ports have one pin that can be used for either DSR or DCD. If you are using modems, this pin must
be wired to the modem’s DCD pin. If you are using another type of device (such as a terminal or printer),
this pin should be wired to the device’s DSR pin. Refer to the Pinouts appendix of your User Guide for
instructions.
SCS ports can be configured to assert DTR only when a user logs into the port by enabling the DTRWait
characteristic. See Set/Define Ports DTRWait on page 12-71 for details.
Note: An incoming login password can be configured with the Set/Define Server
Incoming command, which is discussed on page 12-119.
Each virtual port is created with a default set of characteristics. The default settings for port 0 connections
are remote processing of the Break key, local switch set to ASCII 12 (Ctrl-L), forward switch set to ASCII
6 (Ctrl-F), and backward switch set to ASCII 2 (Ctrl-B). The Set Port commands can be used to customize
a virtual port during the session, but these customizations cannot be saved.
To make configurations that apply to all virtual ports (all future SSH/Telnet/Rlogin connections), use
Define Port commands, specifying port 0 as the port number. When the command in Figure 8-54 is used,
all future network logins will be required to enter a username and password.
Note: Port 0 can only be configured using Define, not Set, commands.
To display the characteristics used for virtual ports, enter the following command:
8-22
Ports Modem Emulation
When the port is in modem mode, the following modem commands are available:
Command Function
ATC Provides passthru to the normal CLI
ATDT ipaddress Forms a TCP connection
ATEx Enables or disables echo command:
0 = echo off
1 = echo on (default)
ATH Hangs up (disconnects) network session
ATI Displays software version information
ATQx Enables or disables result codes:
0 = result codes on (default)
1 = result codes off
ATS[xx=yy] Sets/shows register
0: 0 means ATA answers; otherwise SCS autoanswers
All other registers are unimplemented
ATSxx? Shows register value
ATVx Bit 0 sets response type:
0 = numeric responses
1 = text responses (default)
Bit 1 sets response to unknown AT commands:
0 = do not accept unknown AT commands
1 = accept unknown AT commands (default)
ATX[y] Accepted and ignored
ATZ Restores settings from NVR
AT&F Restores modem NVR to factory settings
AT&V Views current and NVR settings
AT&W Writes settings to NVR
AT&Z Restores settings from NVR
Note: When a port is configured in modem emulation mode, a comma in the dial string
is interpreted as a colon. The ability to use a comma allows you to specify socket
numbers as nnn-nnnn,3001 for modem software that does not work well with
colons.
8-23
9: Modems
This chapter discusses how to configure your modem and the SCS to work together.
If you have an SCS200, you can configure a supported modem card to form PPP dialup connections.An
installed modem card on the SCS200 can be accessed using port number 3. Because the SCS does not
support PC card hot swapping, you must reboot the SCS anytime you remove a modem card.
Note: For a current list of supported modem cards, see the Lantronix web site,
www.lantronix.com.
Setup and Wiring, page 9-1, describes any necessary physical connections.
Modem Speeds, page 9-2, covers both a modem’s serial speed and line speed.
Modem Profiles, page 9-2, shows how the SCS can use a modem profile to interact properly with a
modem.
Modem and SCS Interaction, page 9-8, describes the interaction between an SCS and modem during
incoming and outgoing calls.
Terminal Adapters, page 9-12, discusses the additional configurations necessary when using an ISDN
Terminal adapter instead of a modem.
Caller-ID, page 9-12, shows the commands that will provide the SCS with Caller-ID functionality.
Examples, page 9-13, gives examples of how to configure the modem profiles.
Troubleshooting, page 9-16, suggests solutions for any difficulty you may encounter with your
modem configuration.
Some devices that the SCS will connect to (such as printers) are DTE devices. Transmitting data between
two DTE devices requires the use of a null modem cable to swap the signals; for complete wiring
instructions, refer to the Pinouts appendix of your User Guide.
The SCS must be wired to the DCD pin on your modem. See the Pinouts appendix of your User Guide for
complete wiring information.
9-1
Modems Modem Speeds
Commonly used serial speeds include 300, 600, 1200, 2400, 4800, 9600, 19200, 38400, 57600, 115200, and
230,400 bps. The SCS’s default serial speed is 9600 bps, but can be changed with the Set/Define Ports
Speed command. When a modem profile is defined, the SCS will automatically select the highest possible
serial speed.
Note: See your modem’s documentation for more information about supported serial
speeds and configuration options.
Notice that the faster line speeds do not have corresponding serial speeds. If there is not matching serial
speed, the next highest serial speed should be used because faster serial speeds make the most efficient use
of the given line speed. For example, a v.32bis modem (14400 bps) should use at least a 19200 bps serial
speed.
To configure the proper serial and line speeds for a connection, see the Examples section on page 9-13.
Note: Flow control must be used when the line speed and serial speed do not match.
For more information on flow control setup, see Flow Control on page 8-18.
In order to communicate properly with a particular modem (this varies from modem to modem), the SCS
consults a list of appropriate commands and responses for that modem. This compilation is called a modem
profile.
9-2
Modems Modem Profiles
All configurations in the modem profile will be applied to the specified port. The above command enables
modem control for that port, changes the port’s flow control to RTS/CTS, disables Autobaud if it’s currently
enabled, and changes the port’s serial rate to the highest rate the modem can support.
If your modem isn’t in the list of profiles, use a modem profile for a modem that is similar to your modem
type (for example, a modem from the same manufacturer). If there isn’t a similar modem listed, use the
Generic profile.
Note: Be sure to verify the provisions mentioned in Modem Security on page 9-11.
New modem profiles will be added to the lists as they become available from users and our engineering
staff. If your modem isn’t included in the list of profiles, contact Lantronix to see if it will be added in a later
version of the software.
Note: If you configure a modem profile that is not available on the list, please email it
to [email protected].
To view the modem profile, or verify that changes have been successfully made to the profile, use the List
Port Modem command.
Note: Very few modems can use all commands in the generic modem profile. The
generic profile is only meant as a starting point.
Profiles can also be edited to "fine-tune" your modem’s performance. For example, dialing performance can
be increased by adjusting the DMTF (touch tone) duration and spacing. To edit a modem profile, complete
the following steps.
9-3
Modems Modem Profiles
A series of settings will be displayed. For example, the Attention string may be currently set to at, and Error
Correction may be enabled. Read through the configuration options discussed in Typical Modem
Configuration on page 9-13 and determine which options you’ll need to enable or disable to meet your
needs. Consult your modem’s documentation for the appropriate strings.
Note: The example strings given in Table 9-1 are not for all modems: consult your
documentation for appropriate commands.
If the Init string in your profile needs to be edited, use the Define Ports Modem Init command. The
following example uses the example strings from Table 9-1.
Often, initialization commands are sent individually, prefaced by the modem’s Command Prefix string
(commonly “at”). In order for the SCS to correctly send the information to your modem, all commands must
be sent in one string. Do not include the Command Prefix string in the init string.
9-4
Modems Modem Profiles
Answer Enabled/Disabled
This setting configures whether or not the modem will automatically answer
the telephone line.
This string causes the modem to answer upon ring or to never answer. It is
directly preceded by the Commandprefix string and is commonly set to "A."
Attention string The attention string is sent to the modem each time the port is logged out or
when the server first boots. The modem must return the OK string. Otherwise,
it is assumed that the modem is disconnected or unavailable. The string is
commonly set to "at."
Busy string The modem should respond with this string if the remote telephone line is
busy. It is commonly set to "BUSY."
Carrier wait string This setting determines the amount of time (in seconds) that the modem will
wait for a carrier. If a carrier isn’t received within this period of time, the call
will fail. By default, Carrierwait is set to 60 seconds.
9-5
Modems Modem Profiles
Commandprefix string
This string is placed before all commands sent to the modem except for the
Attention string. In the unlikely event that your modem doesn’t use a common
command prefix for all commands, this string should be left blank; include the
appropriate command prefix in every string sent to the modem. It is commonly
set to "at."
Compression Enabled/Disabled
These strings cause the modem to compress data or to let data pass
uncompressed. Note that compression often causes higher latency on a line in
return for higher throughput.
Connected string The modem must respond with this string after it connects with a remote
modem. The modem may respond with other strings as well, but they will be
ignored. It is commonly set to "CONNECT."
Dial string This string is sent after the Command Prefix but before the telephone number
to be dialed. Commonly, touch tone dialing is activated with "dt" and pulse
dialing is activated with "dp."
Error string The modem should respond with this string when it detects an error. It is
commonly set to "ERROR."
Errorcorrection Enabled/Disabled
This setting enables or disables the modem’s error detection and error
correction.
These strings cause the modem to use error correction or to let data pass
uncorrected. Note that correction often causes higher latency on a line in return
for data integrity.
9-6
Modems Modem Profiles
Getsetup string This string displays the modem’s current configuration. The SCS uses this
information to determine if the modem’s configuration has changed. It is
commonly set to “&v.”
When most modems receive the Get Setup string, they’ll return one page that
lists their configuration. The SCS will not function properly if more than one
page of configuration information is sent (prompting the user to press a key to
continue to the next page); if your modem is configured in this manner, the Get
Setup string will need to be set to “”. When Get Setup is set to “”, the modem
will not be queried for its configuration; instead, the SCS will write the
modem’s NVR each time the SCS is booted.
Note: The AT&T Paradyne Comsphere and AT&T Dataport pose this problem.
Use caution when configuring Get Setup in this manner. A modem’s NVR can
only be written a particular number of times; if the SCS is rebooted too often,
setting Get Setup to “” could wear out the modem’s NVR.
Init string The initialization (Init) string must be configured in a specific manner in order
for your modem to work with the SCS. See Editing a Profile on page 9-3 for
instructions.
Nocarrier string The modem should respond with this string if the remote modem doesn’t
present a carrier. It is commonly set to "NO CARRIER."
Nodialtone string The modem should respond with this string if no dial tone is present and the
modem cannot dial. It is commonly set to "NO DIAL."
OK string The modem must respond with this string after receiving the Attention string.
It is commonly set to "OK."
Reset string This string resets the modem and reloads its setup from nonvolatile memory
(NVR). It is commonly set to "Z."
Ring string The SCS will expect this string when the modem is ringing. If set to “”, any
characters from an idle modem will be interpreted as a ring. It is commonly set
to “RING.”
Save string When the modem receives the Save string, it will save its configuration to
nonvolatile memory (NVR). It is commonly set to "&w."
Speaker Enabled/Disabled
These strings turn the modem’s speaker on or off. The speaker on switch may
also set the speaker volume. It is commonly set to "m11 1" and "m0."
Statistics string This string is sent to the modem after each call to gather statistics on that call.
The resulting information from the modem is sent to the server’s logging
system for later analysis.
9-7
Modems Modem and SCS Interaction
Sometimes the switch settings can be overridden by command strings, but sometimes they cannot. If your
modem has switches, the SCS will tell you how to set the switches when you define the modem profile, as
seen in Figure 9-8.
In the example, “U” stands for up and “D” stands for down. Duplicate these settings on your modem, then
power cycle the modem before logging out of the port or rebooting the SCS.
The modem will then be asked for its current configuration. The Init string will be sent followed by a request
for the modem’s configuration. If the current modem profile on that port does not match the configuration
sent from the modem, it will be assumed that the modem’s setup has changed. The Save string will be sent,
and the setup contained in the profile will be saved in the modem’s permanent memory (NVR).
Note: The NVR on some modems will wear out with repeated use. This limitation is
avoided by only writing the setup to the modem if it has changed.
The SCS will raise DTR so that the modem will answer incoming calls. The port then waits to start an
outgoing call and waits to receive the Ring string from the modem to start an incoming call.
Note: To set the telephone number, refer to Assign a Telephone Number to the Port or
Site on page 4-19.
9-8
Modems Modem and SCS Interaction
If the modem responds with the Connect String, the call will succeed. If the modem responds with the No
Carrier, Error, No Dial Tone, or Busy strings, or if no response is received in 60 seconds, the call will fail
and the modem will be reset (60 seconds is the default wait period; this can be configured using the Define
Ports Modem Carrierwait command).
When a modem asserts the DCD signal, the incoming call will be permitted. If more than 60 seconds pass
between ring signals or before the assertion of DCD, the SCS will assume that the caller hung up or that the
connection attempt failed. Sixty seconds is the default wait period; this can be configured using the Define
Ports Modem Carrierwait command. The port will then be available for outgoing calls.
When the modem receives the Reset string, it will read its configuration from NVR. Any temporary
configuration, such as changes made by an outbound modem user, will be cleared at this point. If a user
made changes during an outbound call and saved them to the modem’s NVR, the modem will be returned
to that changed state.
9.4.5 Compression
The compression setting in a modem profile enables or disables data compression in the modem. Data
compression enables a modem to transfer a larger amount of data in the same amount of time. When
compression is used, uncompressed data arrives on the modem’s serial port and the modem compresses the
data before sending it over the phone line.
The advantage of compression is increased throughput. For example, a modem might compress data to 1/2
its original size, doubling the modem’s throughput; twice the data could be sent in the same amount of time
required to send uncompressed data.
The disadvantage of compression is increased latency. Latency is the delay before data transfer occurs,
caused by the additional time the modem requires to compress the data before it is sent. In situations where
the delay is undesirable (for example, during interactive use over a long distance line), compression should
not be used.
The "compressability" of data depends on what is being compressed. Some data can be compressed to less
than half its original size, while other data cannot be compressed at all. As the type of data to be sent
changes, the modem’s throughput will change.
9-9
Modems Modem and SCS Interaction
Before compression can be enabled, flow control must be enabled (see Flow Control on page 8-18). In
addition, the modem’s serial speed must be set higher than the line speed. This enables the SCS to keep the
modem’s internal data buffer filled with data to compress. As lower compression ratios decrease the
effective line speed, the modem will flow control the SCS more often. When compression ratios and the
effective line speed rise, the modem will flow control the SCS less often.
Note: On many modems, error correction must be enabled for data compression to
work properly. Error Correction is discussed on page 9-10.
To enable modem compression, use the following command:
Note: For this command’s complete syntax, see Define Ports Modem Compression on
page 12-6.
When modem compression is enabled on a port, the SCS will send a string to the modem to instruct it to
enable modem compression. When compression should be disabled, a disable string may be sent. The
default enable and disable strings vary, depending upon the modem profile used. To display the default
strings for a particular modem profile, use the List Modem command.
To modify these strings, use the Define Ports Modem Compression command. The first string specified
is the disable string; the second is the enable string.
The compression mode used varies from modem to modem, however, the most common mode is V.42bis.
This is the recommended method of data compression.
V.42bis encoding offers an automatic 20% savings on all data send, regardless of how compressible it is.
Some text files can be compressed down to 1/4 or less of their original size. In addition, V.42bis will enable
or disable compression according to whether or not it’s required.
Other compression modes, such as MNP, may not give the same results as V.42bis. To obtain the best
results, experiment with different modes of compression.
When errors are not detected, data flows through the modem at a normal rate. When an error occurs, the
sending modem must retransmit the data and not send any new data. The sending modem must be able to
flow control the SCS during the retransmission. Ensure that flow control is enabled on the SCS before
enabling error correction.
9-10
Modems Modem and SCS Interaction
Note: For this command’s complete syntax, see Define Ports Modem Errorcorrection
on page 12-10.
When error correction is enabled on a port, the SCS will send a string to the modem to instruct it to enable
error correction. When error correction should be disabled, a disable string may be sent. The default enable
and disable strings vary, dependent upon the modem profile used. To display the default strings for a
particular modem profile, use the List Modem command.
To modify these strings, use the Define Ports Modem Errorcorrection command. The first string
specified is the disable string; the second is the enable string.
If a remote user hangs up without logging out, the modem will sense the loss of carrier, and deassert
the DCD signal. The server will then log the port out.
If the remote user logs out, the server will force the modem to hang up immediately and reset.
These items should be carefully verified for each port that a modem is attached to, even if a preconfigured
modem profile is used.
Dialback security, discussed on page 9-11, can be used in conjunction with these techniques on modem
ports for an additional layer of security.
The Ports and Security chapters cover security features in detail. The best tools for securing modem ports
are username and password pairs, server passwords, and idle timeouts.
9.4.8 Autostart
A port with Autostart and modem control enabled will not run the specified mode (for example, PPP) until
the modem asserts the DCD signal. This prevents the port from sending data to the local modem before a
remote modem is connected.
Note: For information on Autostart or the DCD signal, see Chapter 8, Ports.
9.4.9 Dialback
Dialback allows a system manager to set up a dialback of authorized users for incoming modem
connections. When a username matching one in the list is entered, the port will be logged out and the user
will be called back at the predefined number.
9-11
Modems Terminal Adapters
For the most part, the SCS interacts with a TA in the same way that it interacts with a modem. However,
two things must be taken into account when using a TA with the SCS:
Although some TAs can autodetect certain settings, it is not always possible to auto-configure
information needed for the connection, such as the caller’s own phone number. Therefore, no TA
profiles are preconfigured for the SCS itself. TA users must edit the generic modem profile so that it
can be used with their specific TAs and ISDN service providers.
Note: Lantronix provides Tech Tips that outline the configuration needed for certain
specific terminal adapters. To find out if your TA’s configuration is included in
a Tech Tip, contact your dealer or Lantronix technical support.
B-channel ISDN connections are much faster than modem connections. Those who wish to use the
SCS bandwidth-on-demand functionality should take this speed increase into consideration when
configuring bandwidth settings.
9.6 Caller-ID
Three commands provide the SCS with basic Caller-ID functionality, provided that Caller-ID is available
and the SCS is attached to a modem capable of decoding Caller-ID signals.
Define Ports Modem CallerID Enabled allows the SCS to parse Caller-ID information that it receives
from the attached modem.
Note: The modem should be configured for either Single or Multiple Message Format;
the SCS cannot parse information in raw data format (ASCII coded
hexadecimal). See your modem’s documentation for configuration.
Define Ports Modem Answer Rings configures the number of rings, either 1 or 3, that the SCS will wait
for before answering the line. The telephone company sends Caller-ID information between the first and
second rings, so the SCS must be set to wait for 3 rings before answering in order for Caller-ID functionality
to work.
9-12
Modems Examples
Note: The modem init string must be modified to tell the modem to pass Caller-ID
information to the SCS. See Editing a Profile on page 9-3 for more information.
Finally, Show/Monitor/List Modem Status displays status information about modems connected to SCS
ports, including the most recently collected Caller-ID information. A sample modem status display is shown
in Figure 9-15.
Caller-ID information is also recorded by modem logging level 2 (see Set/Define Logging on page 12-172)
and sent to RADIUS servers (see Appendix D, Supported RADIUS Attributes).
9.7 Examples
9.7.1 Typical Modem Configuration
Figure 8-16 lists the commands required for a typical modem setup. In this example, an SCS modem profile
exists for this brand of modem. All modem strings in this profile are acceptable; no special configuration is
required.
9-13
Modems Examples
Port 2’s speed must be set properly for the modem. To determine the appropriate port speed, examine the
following table:
To determine the maximum baud rate supported by the modem, the port speed must be set and tested.
Modem handling must be disabled on the port; if it is enabled, the SCS will attempt to initialize the modem
when the port is logged out.
The port speed is tested by logging into the port and sending an attention (“at”) command. The modem
should respond with “OK”. If it does not send “OK”, the port speed should be set to a lower baud rate (see
Table 9-2).
Local>>
After the appropriate port speed is determined, the port must be configured using the generic modem profile.
In addition, modem operation must be enabled.
To determine which profile number is the generic profile (the number will change as new profiles are
added), enter the List Modem command:
9-14
Modems Examples
The generic modem profile made a series of configurations to port 2. To determine the current configuration
of port 2, use the List Port or List Port Modem command.
The speed for port 2 is now 57600. This speed must be set to the appropriate speed (determined earlier by
setting and testing the speed), 115200.
Port 2 will be used for incoming and outgoing connections, therefore, access must be set to Dynamic.
After entering this command, log out the port to ensure that the changes will be in effect when the next user
logs into port 2.
Note: To see what the above modem initialization string is configured to do, refer to
Table 9-1 on page 9-4.
Consult your modem’s documentation for the exact items to include in the modem init string.
9-15
Modems Troubleshooting
9.8 Troubleshooting
To help diagnose any difficulty with your modem setup, it is a good idea to do the following:
Install a breakout box between the modem and the SCS. Set all modem switches to the “normal”
position, and remove all jumpers. When the modem and SCS are powered on, the box’s LEDs will
display the state of the signals, enabling you to more easily diagnose the problem.
Enable event logging for modems. Event Logging is discussed on page 11-25.
Use the List Port command to ensure that modem control is enabled on the port. Many of the port’s
characteristics will be displayed; modem control is the third item listed in the left column.
Ensure that all modems have been reset by rebooting the SCS.
The following table lists some common problems that occur with modem configuration and proposes
solutions for them.
9-16
Modems Troubleshooting
9-17
10: Modem Sharing
Modem sharing provides users with individual modem/phone line functionality at a reduced cost. When
modems are shared, a group of IP users may use a modem pool to dial out of a LAN and connect to a remote
host; for example, to connect to a bulletin board service (BBS). This eliminates the need for phone lines for
each user’s computer.
10.1 Services
A service represents a resource accessible to network users, such as a modem or a pool of modems attached
to the SCS.
Services provide links for TCP connections to SCS serial ports. They are employed in modem sharing to
establish connections to the SCS modems.
Service names are not case-sensitive, may be up to 16 alphanumeric characters long, and cannot include
spaces.
To use a service for modem sharing, the service should be associated with multiple ports; this permits
multiple connections to the service. Connections will be made to the first available port.
10-1
Modem Sharing Services
Ports associated with a service used for modem sharing must support outgoing connections. To support
outgoing connections, the port access must be set to Dynamic or Remote.
A port associated with a service used for modem sharing must also be configured to operate the modem
attached to it. To configure modem operation on a port, use the following commands:
To display a particular modem type’s settings, use the Define Ports Modem Type command, discussed in
detail on page 12-16.
Note: For more information on modem configuration, see Chapter 9, Modems. For
more information on port configuration, see Chapter 8, Ports.
To display specific information about a service, the following parameters may be used with the Show/
Monitor/List Services command: Characteristics, Summary, and Status. For example, to display a
service’s characteristics (including the ports associated with it), use the following command:
The command above shows the ports associated with the service fastmodems, the characteristics enabled
for the service, and the service rating.
Generally, a service rating of 255 means that the service is available, and a rating of zero means that it is
busy or otherwise unavailable. A rating between 255 and zero indicates that the service is partially available.
For example, fastmodems may be a modem pool containing three high-speed modems, one of which is
available. In this case, the service rating for fastmodems would be 85.
10-2
Modem Sharing Sharing Modems
Note: The complete syntax of Set/Define Service Ports is described on page 12-105.
To associate a service with TCP listener socket, use the Set/Define Service TCPport command. Socket
numbers must be between 4000 and 4999.
Note: The complete syntax of Set/Define Service TCPport is listed on page 12-107.
If the socket should perform Telnet IAC character-escaping negotiations on the data stream, use the Set/
Define Service Telnetport command.
10-3
Modem Sharing Examples
Connecting to a TCP listener service is recommended if more than one modem is being used. The SCS will
automatically connect the user to the next available modem, avoiding the trail and error process of finding
an available port (see Connecting to a Serial Port on page 10-4).
If you’re using Telnet to connect to the SCS, connect to port 20nn. The 2000 port is intended for Telnet
connections; it performs Telnet IAC character-escaping negotiations on the data stream. In the example
below, the Telnet command is used to connect to the SCS serial port 3.
If you’re connecting via a host application, connect to port 30nn, where nn is the port number. This port
provides an 8-bit clean connection, required by most host applications.
If a service name is specified, a connection is made to the first available port associated with the service. If
a port name is specified, the connection is made to the port unless the port is in use.
Once the connection is established, commands may be issued to the modem attached to the serial port.
10.3 Examples
Users on an IP network need to connect to both a BBS and a commercial online service. The following
modems are available:
Two 28,800 bps modems, reserved for connections to the online service
10-4
Modem Sharing Examples
Three services will be created for the modems: fastmodems, slowmodems, and slowestmodem. These will
be used for the 28,800, 14,400, and 9,600 modems, respectively.
When all of the configurations have been entered, log the ports out and initialize the server.
10-5
Modem Sharing Examples
10-6
11: Security
The SCS enables you to secure your network in a number of ways. Supported security features include:
The connection type affects the authentication sequence and how the authentication information is
transferred.
A username/password pair
This section describes the login password and the username/password pair. Dialback will be discussed in
the following section.
Note: To configure a port to support character mode, see Port Modes on page 8-3.
Note: The login password can be up to 16 characters long. The default password is
“access.”
11-1
Security Incoming Authentication
To require that users enter the login password when logging into a particular port from another serial port,
use the Set/Define Ports Password Enabled command.
By default, incoming Telnet and Rlogin connections are not required to enter the login password. To require
the login password for virtual port connections, use the Set/Define Server Incoming Password command:
To require username/password authentication for virtual port logins, use the Set/Define Ports Authenticate
command, specifying port 0 as the port number. This command prompts the incoming user for a username
and password to be checked against the authentication database.
To configure a site’s local password, use the Define Site Authentication Local command.
To prompt the user for the local password when attempting to start the site, use the Define Site
Authentication Prompt command.
11-2
Security Incoming Authentication
To use CHAP or PAP to authenticate incoming callers, CHAP Remote or PAP Remote must be enabled on
the port accepting the call. One or both may be enabled, however, CHAP is recommended.
If both CHAP and PAP are configured for authentication, CHAP authentication will be attempted first. If
the remote host does not understand CHAP, PAP will be attempted instead. If neither CHAP nor PAP
successfully authenticates the caller, the connection is terminated.
If the password entered matches the site’s local password, the site will be started. If it does not match the
local password, or if the site does not have a local password defined, the SCS will check the next database
(according to the order of database precedence). See Database Configuration on page 11-9 for details.
Note: Some databases are case-sensitive, so the login information must be entered in
the proper case in order for authentication to succeed. See the Database
Configuration section for more information.
A custom site will only be started if the username matches a site name and any password in an authentication
database. If the username doesn’t match a site name, but matches a username/password pair in an
authentication database, a temporary site will be used for the connection.
If a matching username/password pair is not found in any authentication database, the connection attempt
will fail.
11-3
Security Outgoing Authentication
During CHAP/PAP negotiation, the SCS will send the site’s username and remote password to the incoming
caller. To set a site’s username and remote password, use the Define Site Authentication command:
Use caution when configuring a site to offer and accept authentication information (when the site has both
a local and remote password). PAP does not offer complete security in this situation; if the site has PAP
authentication enabled for incoming and outgoing connections, both passwords may be compromised
during the LCP negotiation process.
When the SCS receives an incoming call, a site configured with a local and remote password may let the
incoming caller know that it is willing to transmit these passwords. If the remote caller has PAP
authentication enabled, it may persuade the SCS to transmit its passwords to the remote caller as part of the
PAP authentication negotiation. At that point, the remote caller can hang up in possession of the SCS
passwords. The caller may be able to use the SCS remote password to log into other networks, or to call the
SCS and connect as an authorized user.
Ensure that the port will start in character mode by disabling SLIP autodetection and SLIP dedicated modes.
SLIP Autodetection and dedicated SLIP are disabled by default.
11-4
Security Dialback
To enable CHAP and PAP authentication on outgoing connections, use the Define Site Authentication
CHAP and Define Site Authentication PAP commands. One or both may be enabled, however, CHAP is
recommended.
If both CHAP and PAP are configured for authentication, CHAP authentication will be attempted first. If
the remote host does not understand CHAP, PAP will be attempted instead. If both PAP and CHAP fail, the
connection will be terminated.
To define the username that the SCS sends to the remote host, use the Define Site Authentication
Username command:
The password sent to the remote host is called the remote password. Configure this password with the
Define Site Authentication Remote command.
11.3 Dialback
When dialback is used, the SCS verifies the identity of incoming users by logging the port out and dialing
the user back at a specified number. Dialback may be configured to do any combination of the following:
11-5
Security Dialback
Note: The port must be configured to use modems; for additional information, see
Chapter 9, Modems.
If the SCS must dial the user back, it hangs up the modem by cycling DTR.
2 The SCS sends a command to the applicable serial port. The command contains the modem command
prefix, the dial string, and the configured telephone number from its dialback database.
3 The dial string should perform any special configuration required for the call, then dial the remote
modem number (in the example below, 555-1235). It is not necessary to precede the telephone
number by strings such as "atdt."
4 The SCS waits the length of the Carrier Wait setting for the DCD signal to go high, indicating that the
modem has reconnected successfully. Otherwise, DTR is dropped for 3 seconds and the port is reset.
5 The SCS waits 30 seconds for the user to enter a username when in Dialback mode. After 30 seconds,
the port is logged out to keep unauthorized users from denying other users access to that port.
Note: Dialback only applies to incoming port logins. Dialback ports can be used
normally for outgoing connections.
1 Enable modem control using the Define Ports Modem Control Enabled command.
2 Assign a modem type to the port using the Define Ports Modem Type command.
4 Configure how Dialback treats users who are not in the dialback database.
The Dialback Bypass setting controls what happens when a user that is not in the dialback database
attempts to connect to the SCS. If Bypass is enabled, these users will be allowed to connect without
dialback occurring. If Bypass is disabled, these users will not be able to connect.
11-6
Security Dialback
To add a user to the dialback database, use the Set/Define Dialback command and specify a username
and a telephone number. If the user must bypass dialback (regardless of whether Dialback Bypass is
enabled or disabled), specify the Bypass parameter.
In the example in Figure 11-15, user frank will bypass dialback. When user bob attempts to connect,
the SCS will call him back at 555-1235. Any other user attempting to connect will be subject to
dialback; if he or she is not in the dialback database, the attempt will fail.
Note: You must be the privileged user to view the Dialback database.
Ensure that the correct ports and telephone numbers are defined; the site will use the defined site-specific
or port-specific telephone number to dial the incoming caller. See Telephone Numbers on page 4-17 for
more information.
Note: Insecure dialback may post a security risk. Use it with caution.
After the CBCP-aware client has connected to the SCS and has passed PPP authentication, and is optionally
switched to a custom site, the SCS will negotiate CBCP (this happens regardless of site dialback settings).
Three callback options are available:
11-7
Security Dialback
If dialback is disabled for the site, the connection will proceed without the dialback step.
If normal dialback authentication is enabled for the site, the SCS will offer to call the PPP client back
at the site-specific telephone number listed in the dialback database. If the client refuses, the
connection will be terminated.
If insecure dialback is enabled for the site, the PPP client can choose to use the site-specific telephone
number or specify a different telephone number to use for the return call. If the client refuses to use
the site’s telephone number and does not enter a valid alternate telephone number, the connection will
be terminated.
Note: The caller should have the alternate telephone number handy when connecting
to the SCS to ensure that the connection does not time out before the number can
be entered.
To configure a site to allow insecure dialback, enter the following command on the SCS.
Note: Insecure dialback is only offered under CBCP for PPP clients. It does not apply
to SLIP or Local mode dialback situations.
If a second call arrives in the few moments after the server hangs up the modem but before the server issues
the dial command, security may be breached. Until the modem goes "off hook," it may answer another
incoming call and remain on-line, granting access to a possibly unauthorized user. This is highly unlikely
and the chances of unauthorized access can be reduced further by configuring the modem to answer only
after the second or third ring. Also, the modem must not answer the phone unless DTR is asserted. If
possible, the modem should be configured to only dial after detecting a dial tone, and hang up otherwise.
To show the user’s current port restrictions, use the Show/Monitor/List Authentication <username>
command. To reset the permissions back to the default, use the Set/Define Authentication User
<username> Port Factory command.
11-8
Security Database Configuration
Kerberos V4 server
RADIUS server
SecurID ACE/Server
You must assign a precedence number to each database method you wish to use. Precedence specifies the
search order in which the configured databases will be checked. The database location with the most
username/password pairs is usually given the highest precedence (1), setting it as the primary database. By
default, the local authentication database has a precedence of 1.
Note: See Database Search Order on page 11-28 for an example of database
precedence configuration.
Configure your precedence settings carefully. If a database is configured for a precedence slot that has
already been filled by another database, it will take over the precedence setting and return all of the previous
database type’s settings to their factory defaults.
As you configure the authentication settings, keep in mind that all configured authentication methods will
be tried until one method succeeds or all methods have failed. If six databases are configured and the
database with the first precedence denies the user access, there are still five possible chances for the user to
pass authentication. Remember that when it comes to configuring multiple authentication methods, your
security is only as strong as the weakest method configured.
If you want the SCS to abort the authentication process at any “invalid user” or “invalid password” error,
enable Strict fail mode. Strict fail mode is disabled by default, but can be enabled with the Set/Define
Authentication Strictfail command. By default, authentication attempts continue until either the user is
successfully authenticated or all methods fail. Enabling Strictfail causes the SCS to abort the login attempt
on the first failure in the authentication method list. This option is SCS-wide, not per port or per user.
Unless Strict fail mode is enabled, the SCS does not examine the reasons for authentication failures. It
simply notes the failure.
11-9
Security Database Configuration
Disadvantages include:
Note: All passwords are case sensitive. All usernames are case insensitive.
Commands must be enclosed in quotes. If a series of commands is specified, they must be separated by
semicolons.
11-10
Security Database Configuration
11.4.2 Kerberos
The Kerberos Authentication Service is a network-based authentication service. Passwords are always
transmitted in encrypted form. The SCS supports Kerberos version 4.
Kerberos is available as public-domain software and from commercial vendors. Please refer to your
Kerberos server documentation for detailed information about setting up a Kerberos server, registering
Kerberos clients, and administering a Kerberos network.
Passwords are always encrypted; it is not possible to obtain a user’s password by eavesdropping on
a connection attempt.
Disadvantages include:
If the caller attempts to use CHAP for authentication, Kerberos cannot be used.
11-11
Security Database Configuration
1 Ensure that the SCS clock is synchronized with the clock on the Kerberos server. The Kerberos
authentication model attaches timestamps to the packets sent between the SCS and Kerberos server
to prevent replay attacks. The SCS timestamp is only allowed to deviate 5 minutes from the Kerberos
server clock before the packet is considered invalid, which would result in a failed authentication
attempt.
To synchronize the SCS and the Kerberos clock, use the Set/Define IP Timeserver command:
4 Configure the realm. The realm is the name of the Kerberos administrative region that defines the
scope of client authentication data maintained by a Kerberos server. Most installations choose realm
names that mirror their Internet domain name system. To specify the realm, use the Set/Define
Authentication Kerberos Realm command.
Note: The value for realm is case-sensitive. Enclose this string in quotes to retain case.
5 Configure the principle, instance, and authenticator that enable the Kerberos server to identify the
SCS. Principle, instance, and authenticator entries must be configured on the SCS to match the
corresponding entries on the Kerberos server.
The default setting for the SCS principle is rcmd; for the SCS instance, the default setting is scs.
The authenticator is the password for the principle/instance pair. It must be defined on the SCS and
the Kerberos server. A text string or an eight-byte hexadecimal value may be specified.
11-12
Security Database Configuration
To specify the SCS principle, instance, and authenticator, use the Set/Define Authentication Kerberos
command:
Note: The values for principle, instance, and authenticator are case-sensitive. Enclose
these strings in quotes to retain case.
6 Configure the Key Version Number (KVNO). The key version number ensures that the SCS and
Kerberos server are using the correct authenticator for the defined principle/instance pair. A KVNO
must be configured on the SCS to match the KVNO on the Kerberos server.
To configure the SCS KVNO, use the Set/Define Authentication Kerberos KVNO command.
For additional Kerberos configuration instructions, see Set/Define Authentication on page 12-153.
11-13
Security Database Configuration
11.4.3 RADIUS
The SCS supports the Remote Authentication for Dial-In User Services (RADIUS) protocol. RADIUS is a
centrally-located client-server security system.
Note: The SCS supports RADIUS as described in RFC 2138 and is intended to support
future versions when they become available.
RADIUS is geared towards large networks that have many communications servers, or many users for
which explicit security measures must be enforced. Its advantages are:
Authentication information for multiple users, in multiple forms, can be stored in a single RADIUS
server.
Disadvantages include:
Keeping authentication information on one server can be dangerous; the server should be backed up
regularly.
Those wishing to use RADIUS must use one of the database types that RADIUS supports (currently
local RADIUS databases, UNIX password files, NIS files, Kerberos databases, and TACACS).
RADIUS servers are subject to security attacks from users already on the network. More information
can be found in the RFC 2058 and in your RADIUS server’s documentation.
RADIUS consists of two parts: authentication and accounting. Authentication is handled by the RADIUS
authentication server, which stores authentication information configured by the network administrator.
Accounting is handled by the RADIUS accounting server, which stores statistical information about
authenticated connections. RADIUS accounting and authentication can be implemented independently of
one another.
1 A user connects to the SCS. The SCS prompt the user for a username and password, or CHAP/PAP
authentication information if CHAP or PAP is configured.
2 The SCS creates an Access-Request packet that includes the username/password pair, an
identification string for the SCS, the port being used for the modem connection, the port type, and
other information as needed (see Authentication Attributes in Appendix D for more information). The
SCS then encrypts the password and sends the packet to the RADIUS authentication server.
Note: CHAP responses sent from the user’s PPP software to the SCS are not encrypted
beyond what is inherent to the operation of CHAP.
11-14
Security Database Configuration
3 The RADIUS authentication server decrypts the Access-Request packet and routes it to the
appropriate security checking mechanism, such as a UNIX password file or Kerberos database. Based
on the information returned from the security check, one of the following occurs:
Note: See Appendix D, Supported RADIUS Attributes, for more information about
using filters with RADIUS.
B If authentication fails, the server sends an Access-Reject packet to the SCS. The SCS will move
on to the authentication method at the next precedence level, or terminate the connection if all
methods have been tried.
C The server may be configured to send a challenge to the user after attempting to log in. If this is
the case, the SCS will print the server’s challenge and prompt the user to enter a response. The
user must respond to the challenge, at which time step 3 is repeated using the response in place
of the password in the Access-Request Packet.
Note: In order to respond to the challenge, the user must be in character mode which
precludes the use of PAP or CHAP for authenticating the user. See RADIUS and
Sites on page 11-16.
To configure the SCS for RADIUS authentication, use the Set/Define Authentication RADIUS
commands.
In the example above, the third command tells the SCS to use port 1620 on the secondary RADIUS
authentication server rather than the default RADIUS authentication port (port 1812).
Note: See Set/Define Authentication RADIUS on page 12-157 for complete syntax and
information.
The secret string configured for the SCS must match that of the RADIUS server being used for
authentication.
For security reasons, it is recommended that you choose a secret string of at least 16 characters containing
no obvious or easily-guessable items (such as names, phone numbers, or words that can be found in a
dictionary).
11-15
Security Database Configuration
Login The SCS allows the user to log into the SCS, but immediately connects the user
(via Telnet or Rlogin) to a remote host. To specify the remote host, see Login-
IP-Host on page D-3. If no host is found, the user receives an error message
and is logged out.
Callback-Login The SCS disconnects the user, then attempts to dialback to the user. If dialback
succeeds, the user will be connected to a remote host as in the normal “Login”
described above.
Prompt The SCS assumes that the user is an administrative user, and presents the user
with a Local> prompt. The user will not be forced to a remote host.
Different RADIUS software packages may have different names for these Login types. In particular, the
“Prompt” type may be referred to as “Administrative User” or “Admin.” It will be distinct from the basic
“Login” type. Consult your RADIUS server’s documentation for specifics.
Note: Unless RADIUS specifically overrules a setting, the site’s settings apply.
If a user logs in using local mode but the RADIUS server indicates that the user should be using PPP or
SLIP, the Set Site sitename Logout command will be executed where sitename is the name of the RADIUS
site created for this user.
Note: Setting up sites for specific users should be done sparingly, and only when a user
has special connection requirements that can’t be met otherwise.
If, on the other hand, the RADIUS server detects that a user logging in via PPP should actually be a local
mode user, the connection will be denied. The reason for this is two-fold: the user would not be able to return
to the local prompt once in PPP mode, and allowing the connection may create a security hole.
Accounting-On Sent each time accounting is enabled or re-enabled on the SCS, and when the
SCS boots with accounting enabled.
11-16
Security Database Configuration
Accounting-Start Send when a user logs into the SCS. This type of packet includes the user’s
name, port number, and current configuration.
Accounting-Stop Send when a connection is logged out or otherwise terminated. This type of
packet includes the user’s name, reason for logout, length of connection, and
the counts of bytes and packets sent and received.
Accounting-Off Sent when accounting is disabled on the SCS, and when the SCS is about to
shut down or reboot.
Accounting-Start and Accounting-Stop packets contain session IDs that are used to match them together. In
order to generate the proper session IDs, the SCS must know the current time. It can be told the correct time
by a timeserver (configured with Set/Define IP Timeserver) or by its internal clock (configured with Set/
Define Server Clock). If the current time is not set properly, accounting packets may carry non-unique
session IDs and cause problems in the accounting log.
Note: See Supported RADIUS Attributes, Appendix D, for more information on the
types of information that are included in accounting packets.
To configure the SCS to send accounting information to the RADIUS accounting server, enter the Set/
Define Authentication RADIUS Accounting command.
The default RADIUS Accounting port is port 1646. A different port can be specified by adding the Port
parameter to the command as shown in the third line of Figure 11-30.
11.4.4 SecurID
The SCS supports the ACE/Server security system manufactured by Security Dynamics Technologies Inc.
ACE/Server is a system of UNIX-based client-server software and accompanying token cards.
Three items are required for authentication: the token card, PIN, and user ID.
The card’s cardcode is constantly changing, thus changing the passcode that the user enters.
11-17
Security Database Configuration
If someone eavesdrops on a connection attempt and obtains a passcode, the passcode will not be
useful; a new passcode will be required in a few minutes. This enhances the security of Telnet
connections.
Disadvantages include:
If the caller attempts to use CHAP for authentication, SecurID cannot be used.
SecurID cannot be used for LAN to LAN connections, as the SCS has no way to generate passcodes.
PAP does not allow for these types of messages or additional user input. Therefore, it is strongly
recommended that SecurID be run from character mode only. It is possible to use SecurID with PAP,
provided that situations like those mentioned above are either prevented or handled in text mode on the next
call.
To specify the SecurID ACE/Server for authentication of username/passcodes, use the Set/Define
Authentication SecurID command:
After SecurID is configured on the SCS, the SCS will receive further configuration information from the
ACE/Server. However, this only happens the first time that the SCS and ACE/Server communicate. If you
purge the authentication information on the SCS or change the precedence of SecurID, this learned
information will be lost. You will need to have your ACE/Server administrator reinitialize the SCS with
ACE/Server for SecurID to function properly again.
If SecurID receives repeated authentication requests for an invalid username/password pair, it assumes that
a login attack is taking place. SecurID will react by continually slowing its responses to the SCS. This
problem can be avoided by ensuring that SecurID has the highest precedence number. For example, if
you’re using SecurID, Kerberos, and a UNIX password file, set SecurID’s precedence to 3.
For additional SecurID configuration instructions, see Set/Define Authentication SecurID on page 12-
159.
11-18
Security User Restrictions
Note: The TFTP file is stored in UNIX /etc/passwd format. It must be in a location
reachable via TFTP.
UNIX password files are advantageous because existing UNIX password files can be used. Their main
disadvantage is that TFTP poses a security risk. If the SCS can retrieve the file, chances are that other hosts
on the network can retrieve the file and potentially crack the passwords. If your network is not trusted, you
may not want to use TFTP authentication.
Specify the full pathname of the password file using the Set/Define Authentication TFTP Filename
command:
Note: To change the privileged password, use the Set/Define Server Privileged
Password command, described on page 12-123.
Only one user may have privileged status at any time. If another user currently has privileged status, the Set
Privileged Override command may be used to forcibly become the privileged user. To stop being the
privileged user, use the Set Noprivileged command.
11-19
Security User Restrictions
Each site may specify a particular range of acceptable IP addresses. When an incoming caller requests to
use a specific address, it will be compared to this range. If the address falls within the range, the connection
will be permitted, if not, the connection attempt will fail.
To specify the beginning and end of the range, use the Define Site IP Remoteaddress command. Two
addresses must be specified: the beginning of the range and the end of the range.
Callers will not be permitted to use IP addresses with the host part of the address set to all zeroes or all ones.
These addresses are reserved to identify broadcast packets. If the range that you specify includes such an
address (for example, 192.4.5.0 or 192.4.5.255) and a caller requests this address, the connection will not
be permitted.
To enable or disable PPP or SLIP on a port, use the Define Ports PPP/Define Ports SLIP commands:
Note: The complete syntax of Set/Define Ports Security is discussed on page 12-85.
11-20
Security User Restrictions
Local> LOCK
Password> donut (not echoed)
Verification> donut (not echoed)
Unlock password> donut (not echoed)
Local>
Note: Secure ports (set using the Set/Define Ports Security command) cannot be
locked.
To unlock a port without the Lock password, a privileged user must use the Unlock Port command
(discussed on page 12-100) or log out the port using the Logout Port command (discussed on page 12-53).
Logout will disconnect all sessions.
To execute commands when the user logs into the SCS, first ensure that authentication databases have been
configured; see Database Configuration on page 11-9 for instructions. Then associate commands with the
username using the Set/Define Authentication User Command command. The commands you specify
will be executed when the user is successfully authenticated.
Local>> DEFINE AUTHENTICATION USER bob COMMAND "SET PPP dialin_users; logout"
In the previous example, when user bob logs into the SCS, he will automatically start PPP and run the site
dialin_users.
To ensure that the user is not left at the Local> prompt after the forced command finishes executing, the
string “;logout” may be added.
For example, imagine that ports 1 through 8 have authentication enabled, but ports 9 through 16 do not. If
user george connects to port 2 and enters the correct password, he will be permitted to login. If, while george
is connected to port2, another user tries to log into port3 using george as his username, he will be rejected.
11-21
Security Network Restrictions
Unique authentication applies only to ports that have authentication enabled. If user george connects to
port2 and then attempts a second connection to port9, the second login will be allowed because port9 does
not have authentication enabled. Similarly, if george attempts an authenticated login to port 2 after another
user has logged into port9 with username george, he will succeed (provided that he enters the correct
password) because he is the first user to log in as george on an authenticated port.
Note: The complete syntax of the Set/Define Server Incoming command is discussed on
page 12-119.
In Figure 11-43, the first command prevents all incoming Telnet and Rlogin connections. The second
command permits the connections, but requires that the login password be entered before the connection is
permitted. The third command disables incoming Telnet and Rlogin (along with 200x and 300x ports). See
Set/Define Server Incoming on page 12-119 for more information.
When Incoming None is specified, incoming SSH connections are also denied. The other parameters do not
affect incoming SSH connections.
11-22
Security Network Restrictions
To configure a port’s access setting, use the Set/Define Ports Access command.
Note: For more information about configuring a port’s access, refer to Setting Port
Access on page 8-1.
If you choose to disable the HTTP server, you will not be able to use the web browser interface for
configuration. You will also not be able to use the URL to find the log file when you receive email
notifications of serial events (see Email Alerts for Serial Events on page 3-3).
Filters are organized into ordered filter lists, which are referenced by name. For example, a filter named
firewall may permit forwarding of packets that match a particular IP rule, but deny passage to packets that
match a generic rule.
Note: For a complete explanation of filter rules, see Set/Define Filter on page 12-166.
Filter lists are associated with sites. Sites use filter lists for the following purposes:
11-23
Security Network Restrictions
When a site with an associated filter list receives a packet, the SCS will compare the packet against each
filter starting with the first filter on the list. If the packet matches any of the filters, the packet will be
forwarded or discarded to the filter’s specification. If the packet does not match any of the filters in the list,
it will not be forwarded.
When this filter list is associated with a site, all packets will be forwarded. Packets will be compared to the
first filter in the list, and all packets will match specification “any packets.” Therefore, all packets will be
forwarded without being compared to the second filter.
Switching the order of the two filters will have very different effects. Examine the filter list below, where
the order of the two filters is reversed.
When this filter list is used, any IP traffic matching the specified rule will be discarded. Therefore, some IP
packets will be discarded without being compared to the second filter.
11-24
Security Event Logging
1 When a filter list is created, it must be assigned a name of no more than 12 characters. The remainder
of the configuration consists of a series of rules that will filter packet traffic in a particular way.
Each rule is assigned a particular position in the filter list, denoted by a number. In Figure 11-48, the
rule Deny IP will be added to the firewall filter in the first position of the list. If a position number
isn’t specified with the Set/Define Filter command, the rule will be added to the end of the filter list.
Note: Set/Define Filter has many parameters, which are described in detail on page
12-166.
2 A single filter list can be associated with many sites. Each site may use a filter list as an incoming,
outgoing, startup, or idle filter.
Note: Filter list types are described in Table 11-1 on page 11-23.
To associate a filter list with a site, use the Define Site Filter command.
In Figure 11-49, filter firewall will be used as an idle filter for site irvine, and as an incoming filter
for site dallas. An example firewall is described in Creating a Firewall on page 11-30
Note: Filters can also be used with RADIUS. See Filter-ID on page D-3 for more
information.
SCS memory
A file stored locally on the SCS. The default disk location is /ram.
11-25
Security Event Logging
To specify the logging destination, use the Set/Define LoggingDestination command. A colon must be
appended to the IP address or IP host name.
11-26
Security Event Logging
For example, to record all logins and send the information to the console port, use the following command:
11-27
Security Examples
Each logging level logs all events associated with higher logging levels. For example, if logging level 6 is
specified, the events associated with levels 1-5 will also be logged.
11.8 Examples
11.8.1 Database Search Order
The SCS must be configured for authentication using a UNIX password file. The configuration must meet
the following criteria:
A large group of users is listed in a RADIUS authentication database. The RADIUS server’s IP
address is 192.0.1.55, and port 1640 is used rather than the default RADIUS authentication port.
Two other groups of users are listed in UNIX password files; the files are on hosts 192.0.1.87 and
192.0.1.99.
A RADIUS accounting server has been set up at host 192.0.1.176 to log accounting information.
11-28
Security Examples
When jerry connects to the SCS, he is prompted for a login password, then his own username and password.
When authenticated, he is automatically telnetted to host venus and logged out of the SCS.
50 users have their usernames and passwords stored in a UNIX password file.
Another 20 users are PPP users that share site pppUsers for their connections. This site’s password
is special.
There is one SLIP user that will use site SlipMan. This site has password exception; once the
password is entered, the site must automatically enter SLIP mode.
Port 2 must be configured to automatically detect PPP so that it can begin running PPP and CHAP when
necessary. The port must not be dedicated to PPP, however, because other connections will be using the
same port.
In order to authenticate the SLIP user, SLIPdetect must be disabled. Figure 11-57 displays the commands
necessary for this configuration:
11-29
Security Examples
The SCS in Dallas must have a site for the connection to the Seattle SCS. The site’s name is seattle.
To authenticate itself, the SCS in Dallas must send username dallas and password texas.
A local network consists of addresses 192.0.1.0 through 192.0.1.24. Site irvine is used to manage
connections to this network. Irvine requires a firewall that does the following:
Prevents IP spoofing
Permits SMTP (Simple Mail Transfer Protocol) traffic to the local SMTP server, 192.0.1.102. The
backup SMTP server is 192.0.1.103
Permits NNTP (Network News Transfer Protocol) traffic between the local NNTP server,
192.0.1.104, and the remote NNTP server, 192.0.2.100
11-30
Security Examples
Denies X-Windows traffic, but permits incoming TCP/IP traffic to ports 1023 and higher.
The firewall will be named fw_i. Packets that do not specifically match the filters in fw_i will be denied
passage through the SCS.
Note: Due to the length of the commands in the following examples, the keywords
Define and Filter are shortened to Def and Filt.
The Set/Define Filter Create command is used to create the firewall.
To prevent IP spoofing, the Define Filter Add Deny IP SRC command is used. This filter will block any
packets from an outside network that claim to have originated from the local network. This filter is placed
at the beginning of the filter list; if it were not, spoofed IP packets could be permitted passage by filters
positioned before this rule.
Local>> DEF FILT fw_i ADD ALLOW IP TCP SPORT EQ TELNET DPORT GT 1023 ACK
To permit SMTP traffic between the SCS and the local and backup SMTP servers, the following commands
are required:
Local>> DEF FILT fw_i ADD ALLOW IP TCP DPORT EQ SMTP SPORT GT 1023 DST 255.255.255.255 192.0.1.102
Local>> DEF FILT fw_i ADD ALLOW IP TCP SPORT EQ SMTP DPORT GT 1023 ACK DST 255.255.255.255. 192.0.1.102
Local>> DEF FILT fw_i ADD ALLOW IP TCP DPORT EQ SMTP SPORT GT 1023 DST 255.255.255.255 192.0.1.103
Local>> DEF FILT fw_i ADD ALLOW IP TCP SPORT EQ SMTP DPORT GT 1023 ACK DST 255.255.255.255 192.0.1.103
11-31
Security Examples
To permit NNTP traffic between the local and remote NNTP servers, the following commands are required:
Local>> DEF FILT fw_i ADD ALLOW IP TCP DPORT EQ NNTP SPORT GT 1023 DST 255.255.255.255 192.0.1.104 SRC
255.255.255.255 192.0.2.100
Local>> DEF FILT fw_i ADD ALLOW IP TCP SPORT EQ NNTP DPORT GT 1023 ACK DST 255.255.255.255 192.0.1.104
SRC 255.255.255.255 192.0.2.100
Local>> DEF FILT fw_i ADD ALLOW IP TCP SPORT EQ FTP DPORT GT 1023 ACK
Local>> DEF FILT fw_i ADD ALLOW IP TCP SPORT EQ FTPDATA DPORT GT 1023
The following three commands deny incoming X-Windows traffic to well-known ports 6000-6023, but
permit incoming TCP/IP connections to ports greater than 1023. This configuration also allows PASV-
mode FTP data.
Local>> DEF FILT fw_i ADD ALLOW IP TCP SPORT GT 1023 DPORT GT 6024 ACK
Local>> DEF FILT fw_i ADD DENY IP TCP SPORT GT 1023 DPORT GE 6000 ACK
Local>> DEF FILT fw_i ADD ALLOW IP TCP SPORT GT 1023 DPORT GT 1023 ACK
The three commands below permit UDP- and TCP-based queries and answers to the local Domain Name
Server:
Local>> DEF FILT fw_i ADD ALLOW IP UDP DPORT EQ DNS DST 255.255.255.255 192.0.1.101
Local>> DEF FILT fw_i ADD ALLOW IP TCP DPORT EQ DNS SPORT GT 1023 DST 255.255.255.255 192.0.1.101
Local>> DEF FILT fw_i ADD ALLOW IP TCP SPORT EQ DNS DPORT GT 1023 ACK DST 255.255.255.255
192.0.1.101
To permit ICMP messages (except for redirect messages), a generic IP rule is defined:
Local>> DEF FILT fw_i ADD ALLOW IP ICMP IPGENERIC OFFSET 0 MASK 0xf0000000 NE 0x50000000
Outgoing finger requests are permitted and incoming requests are prevented using this command:
Local>> DEF FILT fw_i ADD ALLOW IP TCP SPORT EQ FINGER DPORT GT 1023 ACK
To use firewall fw_i as an incoming filter list for site irvine, the Define Site Filter Incoming command is
used:
11-32
Security Troubleshooting
11.8.6 Dialback
An SCS must be configured to prevent all users from connecting with the exception of two users, sam and
paul. When sam and paul attempt to connect to the SCS, the modem must dial them back to verify their
identities.
The modem is connected to SCS port 2, and there isn’t a corresponding modem profile. The generic modem
profile must be used. The following example assumes that modem profile type 3 is the generic modem
profile (Use the List Modem command to view available modem profiles).
11.9 Troubleshooting
To troubleshoot authentication problems, use event logging. To configure event logging, use the Set/Define
Logging command, discussed on page 12-172.
The following example assumes the terminal is connected to the console port (port 1).
11-33
12: Command Reference
This chapter describes all commands that can be used with the SCS. To recap the types of commands (Set/
Define, Show/Monitor/List, Clear/Purge), see Chapter 2, Getting Started.
Most Define commands are documented with their corresponding Set commands, but some are listed
separately under the Define keyword. Monitor and List commands are documented with their corresponding
Show commands. Most Purge commands are documented with their corresponding Clear commands, but
some are listed separately under the Purge keyword.
Navigation/Help Commands, page 12-180, covers commands that provide basic navigation, help, and
global status information.
IP/Network Commands, page 12-18, includes commands for forming and configuring connections
that use the IP protocol. This section also covers 802.11 networking, which is applicable only to the
SCS200
Port Commands, page 12-52, contains commands for serial and virtual port configuration.
Modem Commands, page 12-3, describes the commands necessary for configuring the SCS to use an
attached modem.
Service Commands, page 12-101, covers commands that setup various services.
Server Commands, page 12-111, includes commands that affect the whole SCS.
Site Commands, page 12-132, describes the commands necessary to set up sites.
Security Commands, page 12-151, includes the necessary instructions for enabling the SCS’s security
features.
Any restrictions on the command, such as whether you must be the privileged user to use it
Note: For information on becoming the privileged user, see Set Privileged/
Noprivileged on page 12-92.
Descriptions of each associated parameter. Multiple optional parameters can be entered on the same
command line, subject to the maximum command line length of 312 characters.
12-1
Command Reference About Strings
First, any user-entered strings should be enclosed in quotes to retain the case entered. If a string is not
enclosed in quotes, it will be changed to all uppercase characters, and any spaces will cause the SCS to
interpret the different parts of the string as different command parameters.
In addition, string lengths are generally limited to thirty-one alphanumeric characters for pathnames and file
server names, fifteen alphanumeric characters for filenames, and six alphabetic characters for the privileged
and login passwords. When a string limit differs from the norm, its limitations are noted.
Optional parameters are enclosed in brackets []; one or more of these parameters may be used, or the
command can be used without adding any of these parameters.
Required parameters are enclosed in curly braces {}; one and only one of these parameters must be
used.
User-supplied parameters, such as a particular port number or host name, are shown in italics.
12-2
Command Reference Modem Commands
⎧ COMMAND string ⎫
⎪ ⎪
⎪ DisableString EnableString ⎪
⎪ ⎪
⎪ ENABLED ⎪
DEFINE PORTS PortList MODEM ANSWER ⎨ DISABLED ⎬
ALL ⎪ ⎪
⎪ ⎧ ⎫ ⎪
⎪ RINGS ⎨ 1 ⎬ ⎪
⎪ ⎩ 3 ⎭ ⎪
⎩ ⎭
Permits or prevents a modem from automatically answering the line, optionally after a specified number of
rings.
Parameters PortList/All
Specifies a particular port or group of ports, or all ports. Port numbers should
be separated with commas (for lists) or dashes (for ranges).
Note: In the absence of a PortList or the All parameter, the configuration will affect the
current port only.
Command
Changes the answer command that is actually sent to the modem to make it
answer the line. Commonly set to “A” or “ATA.”
DisableString
A string of up to 12 characters. When the modem receives this string,
automatic answering will be disabled. Commonly set to “s0=0.”
EnableString
A string of up to 12 characters. When the modem receives this string,
automatic answering will be enabled. Commonly set to “s0=1.”
Rings
Either enter 1 or 3 to tell the SCS how many rings to wait before answering the
line. When Caller-ID is enabled, the ring value should be set to 3 to give the
SCS time to gather Caller-ID information.
See Also Define Ports Modem CallerID, page 12-5; Profile Settings, page 9-5; Caller-
ID, page 9-12
12-3
Command Reference Modem Commands
Parameters PortList/All
Specifies a particular port or group of ports, or all ports. Port numbers should
be separated with commas (for lists) or dashes (for ranges).
Note: In the absence of a PortList or the All parameter, the configuration will affect the
current port only.
Defaults Depends on modem and modem profile.
Defines a string that the SCS will expect from the modem on outbound calls to signal that the remote number
is busy or otherwise unavailable.
Parameters PortList/All
Specifies a particular port or group of ports, or all ports. Port numbers should
be separated with commas (for lists) or dashes (for ranges).
Note: In the absence of a PortList or the All parameter, the configuration will affect the
current port only.
string
A string of up to 12 characters. Commonly set to “BUSY.”
12-4
Command Reference Modem Commands
⎧ ⎫
DEFINE PORTS PortList MODEM CALLERID ⎨ ENABLED ⎬
ALL ⎩ DISABLED ⎭
Configures whether the SCS will look for and attempt to decode Caller-ID information for incoming calls.
The SCS should be set to wait for three rings before answering the line so that it has enough time to gather
the Caller-ID information. The ring setting can be configured with the Rings command.
Parameters PortList/All
Specifies a particular port or group of ports, or all ports. Port numbers should
be separated with commas (for lists) or dashes (for ranges).
Note: In the absence of a PortList or the All parameter, the configuration will affect the
current port only.
Defaults Disabled
See Also Define Ports Modem Answer, page 12-3; Caller-ID, page 9-12
Defines the length of time that a server will wait for a carrier on incoming and autodialed calls. If a carrier
is not received in that length of time, the SCS assumes that it will not be received. The call will fail and the
modem will be reset.
Parameters PortList/All
Specifies a particular port or group of ports, or all ports. Port numbers should
be separated with commas (for lists) or dashes (for ranges).
Note: In the absence of a PortList or the All parameter, the configuration will affect the
current port only.
seconds
A time value between 1 and 250 seconds.
Defaults 60 seconds
12-5
Command Reference Modem Commands
Defines a string to send before the “Init” and other configuration strings.
Parameters PortList/All
Specifies a particular port or group of ports, or all ports. Port numbers should
be separated with commas (for lists) or dashes (for ranges).
Note: In the absence of a PortList or the All parameter, the configuration will affect the
current port only.
string
A string of up to 12 characters. Commonly set to “at.”
⎧ ENABLED ⎫
⎪ ⎪
DEFINE PORTS PortList MODEM COMPRESSION ⎨ DISABLED ⎬
ALL ⎪ ⎪
⎩ DisableString EnableString ⎭
Parameters PortList/All
Specifies a particular port or group of ports, or all ports. Port numbers should
be separated with commas (for lists) or dashes (for ranges).
Note: In the absence of a PortList or the All parameter, the configuration will affect the
current port only.
12-6
Command Reference Modem Commands
DisableString
A string of up to 12 characters. When this string is received by the modem, data
compression will be disabled
EnableString
A string up to 12 characters. When this string is received by the modem, data
compression will be enabled.
Defines a string to expect on outbound calls when the modem is connected to the remote location.
Parameters PortList/All
Specifies a particular port or group of ports, or all ports. Port numbers should
be separated with commas (for lists) or dashes (for ranges).
Note: In the absence of a PortList or the All parameter, the configuration will affect the
current port only.
ConnectString
A string of up to 12 characters. Commonly set to “CONNECT.”
12-7
Command Reference Modem Commands
⎧ ⎫
DEFINE PORTS PortList MODEM CONTROL ⎨ ENABLED ⎬
ALL ⎩ DISABLED ⎭
Enables or disables modem handling on the specified port(s). When modem handling is enabled, the
assertion and deassertion of modem signals (DSR, DTR, and DCD) control the port’s interaction with the
modem, including initializing the modem upon booting and resetting the modem between uses. The SCS
monitors DCD to determine if a connection exists. If DCD drops, the SCS will log the port out and drop
DTR.
Note: Modem control is automatically enabled on ports that have modems attached
(i.e. when you set the modem type with Define Ports Modem Type).
Parameters PortList/All
Specifies a particular port or group of ports, or all ports. Port numbers should
be separated with commas (for lists) or dashes (for ranges).
Note: In the absence of a PortList or the All parameter, the configuration will affect the
current port only.
Defaults Disabled
See Also Set/Define Ports DSRLogout, page 12-70; Show/Monitor/List Ports Modem,
page 12-96; Chapter 9, Modems
Defines a string to send to the modem to cause it to dial. This string is preceded by the Commandprefix
string.
Parameters PortList/All
Specifies a particular port or group of ports, or all ports. Port numbers should
be separated with commas (for lists) or dashes (for ranges).
Note: In the absence of a PortList or the All parameter, the configuration will affect the
current port only.
12-8
Command Reference Modem Commands
DialString
A string of up to 12 characters. Often touch tone dialing is activated with “dt”
and pulse dialing is activated with “dp.”
See Also Define Ports Modem Commandprefix, page 12-6; Profile Settings, page 9-5
Defines a string to expect on outbound calls when the modem encounters an error.
Parameters PortList/All
Specifies a particular port or group of ports, or all ports. Port numbers should
be separated with commas (for lists) or dashes (for ranges).
Note: In the absence of a PortList or the All parameter, the configuration will affect the
current port only.
string
A string of up to 12 characters set to “ERROR” by default.
See Also Profile Settings, page 9-5; Define Ports Modem Errorcorrection, page 12-10
12-9
Command Reference Modem Commands
⎧ ENABLED ⎫
⎪ ⎪
DEFINE PORTS PortList MODEM ERRORCORRECTION ⎨ DISABLED ⎬
ALL ⎪ ⎪
⎩ DisableString EnableString ⎭
Parameters PortList/All
Specifies a particular port or group of ports, or all ports. Port numbers should
be separated with commas (for lists) or dashes (for ranges).
Note: In the absence of a PortList or the All parameter, the configuration will affect the
current port only.
DisableString
A string of up to 12 characters. When the modem receives this string,
automatic answering will be disabled.
EnableString
A string of up to 12 characters. When this string is received by the modem,
error correction will be enabled.
See Also Profile Settings, page 9-5; Define Ports Modem Error, page 12-9
Defines a string to send to the modem to cause it to return its setup. This string is preceded by the
Commandprefix string. If the string is set to “”, the SCS will not attempt to get the modem’s setup. The SCS
will always send the Save string after configuration. Modems that do not return their configuration in a
single screen should do this.
12-10
Command Reference Modem Commands
Parameters PortList/All
Specifies a particular port or group of ports, or all ports. Port numbers should
be separated with commas (for lists) or dashes (for ranges).
Note: In the absence of a PortList or the All parameter, the configuration will affect the
current port only.
string
A string of up to 12 characters. Commonly set to “&v.”
See Also Define Ports Modem Commandprefix, page 12-6; Profile Settings, page 9-5
Defines an initialization string to send to the modem. The string is preceded by the Commandprefix string.
Parameters PortList/All
Specifies a particular port or group of ports, or all ports. Port numbers should
be separated with commas (for lists) or dashes (for ranges).
Note: In the absence of a PortList or the All parameter, the configuration will affect the
current port only.
string
A string of up to 64 characters.
See Also Define Ports Modem Commandprefix, page 12-6; Profile Settings, page 9-5
12-11
Command Reference Modem Commands
Defines a string to expect on outbound calls when the modem can dial but doesn’t connect.
Parameters PortList/All
Specifies a particular port or group of ports, or all ports. Port numbers should
be separated with commas (for lists) or dashes (for ranges).
Note: In the absence of a PortList or the All parameter, the configuration will affect the
current port only.
string
A string of up to 12 characters. Commonly set to “NO CARRIER”
Defines a string to expect on outbound calls when the modem can’t detect a dial tone.
Parameters PortList/All
Specifies a particular port or group of ports, or all ports. Port numbers should
be separated with commas (for lists) or dashes (for ranges).
Note: In the absence of a PortList or the All parameter, the configuration will affect the
current port only.
string
A string of up to 12 characters. Commonly set to “NO DIAL.”
12-12
Command Reference Modem Commands
Defines a string to expect after the Attention string is sent to the modem.
Parameters PortList/All
Specifies a particular port or group of ports, or all ports. Port numbers should
be separated with commas (for lists) or dashes (for ranges).
Note: In the absence of a PortList or the All parameter, the configuration will affect the
current port only.
string
A string of up to 12 characters. Commonly set to “OK.”
See Also Define Ports Modem Attention, page 12-4; Profile Settings, page 9-5
Defines a string that will cause the modem to reset and reload its configuration from NVR.
Parameters PortList/All
Specifies a particular port or group of ports, or all ports. Port numbers should
be separated with commas (for lists) or dashes (for ranges).
Note: In the absence of a PortList or the All parameter, the configuration will affect the
current port only.
string
A string of up to 12 characters. Commonly set to “Z.”
12-13
Command Reference Modem Commands
Parameters PortList/All
Specifies a particular port or group of ports, or all ports. Port numbers should
be separated with commas (for lists) or dashes (for ranges).
Note: In the absence of a PortList or the All parameter, the configuration will affect the
current port only.
string
A string of up to 12 characters. Commonly set to “RING.”
Defines a string that forces the modem to save its configuration to NVR.
Parameters PortList/All
Specifies a particular port or group of ports, or all ports. Port numbers should
be separated with commas (for lists) or dashes (for ranges).
Note: In the absence of a PortList or the All parameter, the configuration will affect the
current port only.
string
A string of up to 12 characters. Commonly set to “&w.”
12-14
Command Reference Modem Commands
⎧ ENABLED ⎫
PortList ⎪ ⎪
DEFINE PORTS MODEM SPEAKER ⎨ DISABLED ⎬
ALL ⎪ ⎪
⎩ EnableString DisableString ⎭
Enables or disables the modem’s speaker. The speaker allows the user to hear the modem’s dialup and
connect sequences for debugging purposes.
Parameters PortList/All
Specifies a particular port or group of ports, or all ports. Port numbers should
be separated with commas (for lists) or dashes (for ranges).
Note: In the absence of a PortList or the All parameter, the configuration will affect the
current port only.
EnableString
A string of up to 12 characters. Commonly set to “m1/1.” When this string is
received by the modem, the modem’s speaker will be enabled.
DisableString
A string of up to 12 characters. Commonly set to “m0.” When this string is
received by the modem, the modem’s speaker will be disabled.
Defines a string to send to the modem to collect connection statistics after each call. This string is preceded
by the Commandprefix string.
Parameters PortList/All
Specifies a particular port or group of ports, or all ports. Port numbers should
be separated with commas (for lists) or dashes (for ranges).
12-15
Command Reference Modem Commands
Note: In the absence of a PortList or the All parameter, the configuration will affect the
current port only.
string
A string of up to 12 characters.
See Also Define Ports Modem Commandprefix, page 12-6; Set/Define Logging, page
12-172
Specifies a predefined modem profile. Use the Show Modem command to see a list of available profiles.
This command automatically enables modem control for the specified port, if not enabled already.
Parameters PortList/All
Specifies a particular port or group of ports, or all ports. Port numbers should
be separated with commas (for lists) or dashes (for ranges).
Note: In the absence of a PortList or the All parameter, the configuration will affect the
current port only.
TypeNum
A predefined modem profile number.
See Also Show/Monitor/List Modem, page 12-16; Modem Profiles, page 9-2
⎧ SHOW ⎫
⎪ ⎪
⎨ MONITOR ⎬ MODEM num
⎪ ⎪
⎩ LIST ⎭
12-16
Command Reference Modem Commands
Restrictions You must be the privileged user to use the Monitor command.
Parameters num
A particular modem profile type to display.
12-17
Command Reference IP/Network Commands
⎧ CLEAR ⎫ ⎧ ALL ⎫
⎨ ⎬ TELNET HOSTS ⎨ ⎬
⎩ PURGE ⎭ ⎩ username ⎭
Removes a TCP/IP host entry from the SCS table of known hosts. If Clear is used and the host was seen
through the rwho facility, it will reappear as soon as that machine broadcasts again. A host will also
reappear if a user Connects to it.
Errors Clear Telnet Hosts will fail if there are any active Telnet connections on the
server.
Parameters All
Removes the names of all known hosts.
HostName
The name of a Telnet host to be removed.
See Also Set/Define Hosts, page 12-34; Show/Monitor/List Hosts, page 12-48
⎧ CLEAR ⎫
⎨ ⎬ IP FACTORY
⎩ PURGE ⎭
⎧ CLEAR ⎫
⎨ ⎬ IP NAT Table
⎩ PURGE ⎭
12-18
Command Reference IP/Network Commands
⎧ DEFAULT ⎫
⎧ CLEAR ⎫ ⎪ ⎪
⎨ ⎬ IP ROUTE ⎨ address ⎬
⎩ PURGE ⎭ ⎪ ⎪
⎩ ALL ⎭
Parameters Default
Clears or purges default IP routes.
address
An IP address in standard numeric format (for example, 193.53.2.2).
All
Clears or purges static IP routes.
See Also Set/Define IP Route, page 12-42; Show/Monitor/List IP Routes, page 12-49;
IP Routing, page 6-19
⎧ CLEAR ⎫ ⎧ ⎫
⎨ ⎬IP SECURITY ⎨ address ⎬
⎩ PURGE ⎭ ⎩ ALL ⎭
Parameters address
An IP address in standard numeric format (for example, 193.53.2.2).
All
Clears or purges the entire security table.
See Also Set/Define IP Security, page 12-43; Show/Monitor/List IP, page 12-49; IP
Address Restriction, page 11-20
12-19
Command Reference IP/Network Commands
⎧ CLEAR ⎫ ⎧ ⎫
⎨ ⎬ IPTRUSTED ⎨ address ⎬
⎩ PURGE ⎭ ⎩ ALL ⎭
Parameters address
An IP address in standard numeric format (for example, 193.53.2.2).
All
Clears or purges the entire security table.
See Also Set/Define IP Trusted, page 12-47; Show/Monitor/List IP Trusted, page 12-49;
Routing Tables, page 6-19
12.5.7 Connect
⎧ ⎫
⎪ ⎪
⎪ SSH ⎪
⎪ host :port :envstring username command ⎪
⎪ ⎪
⎪ ⎪
⎪ ⎧ TELNET ⎫ ⎪
⎪ ⎨ ⎬ host :port :envstring ⎪
CONNECT ⎨ ⎩ TCP ⎭ ⎬
⎪ ⎪
⎪ ⎪
⎪ RLOGIN host :port :envstring username ⎪
⎪ ⎪
⎪ ⎪
⎪ LOCAL target :envstring ⎪
⎪ ⎪
⎩ ⎭
Establishes a connection with a TCP/IP host. If no hostname is specified, a connection to any preferred host
is attempted.
Note: The keyword “Connect” is not needed for Telnet or Rlogin connections, but must
be included in the command for TCP or Local connections.
Outgoing SSH connections can specify a host, optional port, optional username, and optional command to
be executed on the remote machine. After the command is executed, the SSH connection will end.
A colon and session environment string can be added to the connect request (see Setting Session
Characteristics on page 8-7). A colon and a port number can be added to the hostname for TCP/Telnet/
Rlogin sessions; in this case, the specified port number will be used for the connection. There should be no
spaces between the hostname, colon, and port number or environment string.
12-20
Command Reference IP/Network Commands
Parameters SSH
Establishes an SSH connection to the specified host or, if no hostname is
entered, to the preferred host.
host
Enter a text host name or an IP address in a standard numeric format (for
example, 192.0.1.183).
username
Enter a user name that will be passed to the remote host.
command
Enter a command that will be executed on the SSH host. Put the command in
quotes to retain any capitalization.
Telnet
The port is dedicated to the specified Telnet host or, if no hostname is entered,
to the preferred host.
TCP
Establishes a raw TCP connection to the host/port number specified. This is
useful for non-standard applications that do not desire any interpretation of the
data stream.
Rlogin
Forces an Rlogin connection to the remote host or, if no hostname is entered,
to the preferred host. May also take a username after the host parameter, in
which case a username is sent to the remote Rlogin host.
host
Enter a text host name or an IP address in a standard numeric format (for
example, 192.0.1.183).
envstring
Sets up the connection environment before the session is started. The string is
constructed with a sequence of key letters, some of which are prefaced by
either the “+” or “-.” For the available key letters and usage instructions, see
Appendix A, Environment Strings.
Local
Establishes a connection to a local service or port specified with the target
parameter.
target
A local service or port name.
12-21
Command Reference IP/Network Commands
See Also Set/Define Ports Password, page 12-78; Disconnect, page 12-22; Preferred/
Dedicated Protocols & Hosts, page 8-8
12.5.8 Disconnect
Terminates the current session (if no session is specified), the specified session, or all sessions.
See Also Connect, page 12-20; Show/Monitor Sessions, page 12-98; Exiting Sessions,
page 8-5
Removes the specified secondary Ethernet from the SCS permanent memory.
Parameters num
An integer specifying a secondary Ethernet. Numbering begins at 1.
12.5.10 Rlogin
Requests an Rlogin connection to a specified host, or the preferred TCP host if no host is specified.
12-22
Command Reference IP/Network Commands
Parameters hostname
A text hostname or an IP address in standard numeric format (for example,
192.0.1.183).
username
A username to use as the login name.
See Also Connect, page 12-20; Set/Define Ports Password, page 12-78; Telnet and
Rlogin Sessions, page 6-9
12.5.11 Send
⎧ AO ⎫
⎪ ⎪
⎪ AYT ⎪
⎪ ⎪
⎪ BRK ⎪
⎪ ⎪
⎪ EC ⎪
SEND ⎨ EL ⎬
⎪ ⎪
⎪ GA ⎪
⎪ IP ⎪
⎪ ⎪
⎪ NOP ⎪
⎪ ⎪
⎩ SYNCH ⎭
Parameters AO
Abort Output.
AYT
Are You There
BRK
Break
EC
Erase Character
EL
Erase Line
GA
Go Ahead
IP
Interrupt Process
NOP
No Operation
12-23
Command Reference IP/Network Commands
SYNCH
Synchronize
When 802.11 is enabled, the SCS checks for a compatible 802.11 wireless Ethernet PC card at startup and,
if one is present, uses the card instead of a wired Ethernet port. If no valid PC card is detected at startup, the
SCS uses the 10/100BASE-T network connection.
When 802.11 is disabled, the SCS will ignore an installed 802.11 card and will only look for a compatible
wired Ethernet connection.
You must reboot the SCS before those changes will take place.
Parameters Enabled
Prompts the SCS to check for a compatible 802.11 wireless Ethernet
networking PC card at startup. If one is present, wireless networking will be
used instead of the wired Ethernet connection. You must reboot the SCS after
entering this command.
Disabled
Prompts the SCS to only look for a compatible 10/100BASE-T wired Ethernet
connection at startup. You must reboot the SCS after entering this command.
Defaults Enabled
See Also Show 80211, page 12-48; 802.11 Configuration, page 2-11
12-24
Command Reference IP/Network Commands
Controls the antenna(s), if any, on the installed wireless card. Not all antennas can be used for both receive
and transmit, so be sure to read your card documentation completely. The default settings should work in
most applications.
Any configuration changes you make with the above commands will not take place until you reboot the SCS
or issue the Set 80211 Reset command.
Errors If you enter a command that is not applicable to the 802.11 card currently in
use, you will receive an Error message.
Parameters RX
Specifies the antennas used to receive
TX
Specifies the antennas used to transmit.
list
Enter an integer or group of integers separated by commas (e.g. 1,2,3) to
specify the affected antenna(s). Antennas are numbered consecutively starting
with antenna number one. See the documentation that came with your card for
antenna numbering information.
Default
Sets the antennas to their default transmit and receive values.
See Also Show 80211, page 12-48; 802.11 Configuration, page 2-11
⎧ SET ⎫ OPENSYSTEM
⎨ ⎬ 80211 AUTHENTICATION
⎩ DEFINE ⎭ SHAREDKEY
On products that support an 802.11 PC card, the wireless configuration alows either open or shared mode
authentication styles. Use this command to change the authentication mode.
Errors If you enter a command that is not applicable to the 802.11 card currently in
use, you will receive an Error message.
12-25
Command Reference IP/Network Commands
Parameters OPENSYSTEM
Access point will provide the WEP key to the SCS.
SHAREDKEY
Static WEP key is configured on the SCS.
Defaults Opensystem
See Also Show 80211, page 12-48; 802.11 Configuration, page 2-11
Sets the SCS operating frequency within the 2.4 GHz band allotted to wireless networking. A direct-
sequence 802.11 network on one channel will affect reception on channels up to two numbers away. For
best performance on collocated wireless networks, you should select channels that are at least five channels
apart from each other. For example, three networks could be put on channels 1, 6, and 11 (depending on
your regulatory region). See your PC card documentation for specific information about which channels are
available in your area.
Any configuration changes you make with the above commands will not take place until you reboot the SCS
or issue the Set 80211 Reset command.
Errors If you enter a command that is not applicable to the 802.11 card currently in
use, you will receive an Error message.
Parameters num
Enter a valid channel for your regulatory region. This number should be an
integer between 1 and 14. Recommended for ad-hoc network mode.
Any
Tells the SCS to set itself for the channel used by the strongest AP with the
same ESSID. Recommended for infrastructure network mode.
Defaults Any
See Also Show 80211, page 12-48; 802.11 Configuration, page 2-11
12-26
Command Reference IP/Network Commands
Configures the ESSID, which tells the SCS the name of the Extended Service Set (ESS) to which it belongs.
Setting an ESSID ensures that the SCS will stay on the desired network subsegment.
Any configuration changes you make with the above commands will not take place until you reboot the SCS
or issue the Set 80211 Reset command
Errors If you enter a command that is not applicable to the 802.11 card currently in
use, you will receive an Error message.
Parameters name
Enter a string of up to 32 characters. If the string contains lowercase letters or
non-alphanumerics, it may need to be enclosed in quotes to be processed
properly.
None
If no ESSID string is set, the SCS will communicate with whichever Access
Point (AP) gives the strongest signal, regardless of ESS association. Setting the
ESSID to none allows the SCS to associate with any AP within range.
Defaults ESSID=None
See Also Show 80211, page 12-48; 802.11 Configuration, page 2-11
12-27
Command Reference IP/Network Commands
Any configuration changes you make with the above commands will not take place until you reboot the SCS
or issue the Set 80211 Reset command.
Errors If you enter a command that is not applicable to the 802.11 card currently in
use, you will receive an Error message.
Parameters num
Enter an integer between 256 and 2346 to change the fragmentation threshold.
Defaults 2346
See Also Show 80211, page 12-48; 802.11 Configuration, page 2-11
Configures which of the two available MAC addresses the SCS will use on the network—its own or that of
the attached 802.11 wireless networking PC card. The SCS MAC address, which is the same as its hardware
address, is printed on bottom label of the SCS.
Any configuration changes you make with the above commands will not take place until you reboot the SCS
or issue the Set 80211 Reset command.
Errors If you enter a command that is not applicable to the 802.11 card currently in
use, you will receive an Error message.
Parameters Card
Instructs the SCS to use the MAC address of the wireless PC card that is
inserted into one of its PC card slots.
12-28
Command Reference IP/Network Commands
SCS
Instructs the SCS to use its own internal MAC address.
Defaults SCS
See Also Show 80211, page 12-48; 802.11 Configuration, page 2-11
Denotes whether the SCS operates in a peer-to-peer (AdHoc) or managed (Infrastructure) network
environment.
Any configuration changes you make with the above commands will not take place until you reboot the SCS
or issue the Set 80211 Reset command.
Errors If you enter a command that is not applicable to the 802.11 card currently in
use, you will receive an Error message.
Parameters AdHoc
Specifies that the SCS is communicating with other wireless devices in a peer-
to-peer capacity.
Infrastructure
Specifies that the SCS is communicating with an Access Point (AP).
Defaults Infrastructure
See Also Show 80211, page 12-48; 802.11 Configuration, page 2-11
12-29
Command Reference IP/Network Commands
Controls the card’s transmit power settings. The numeric power setting specified must exactly match a value
supported by the card.
Any configuration changes you make with the above commands will not take place until you reboot the SCS
or issue the Set 80211 Reset command.
Errors If you enter a command that is not applicable to the 802.11 card currently in
use, you will receive an Error message.
Parameters Default
Sets the card to its default transmit power setting.
num
Enter a specific milliWatt power setting.
See Also Show 80211, page 12-48; 802.11 Configuration, page 2-11
⎧ ⎫
⎪ FCC ⎪
⎪ ⎪
⎪ IC ⎪
⎧ SET ⎫ 80211 REGION ⎪ ETSI ⎪
⎨ ⎬ ⎨ ⎬
⎩ DEFINE ⎭ ⎪ SPAIN ⎪
⎪ FRANCE ⎪
⎪ ⎪
⎪ MKK ⎪
⎩ ⎭
Sets the regulatory region under which you will operate the SCS. Users in the United States can leave this
at the default setting (FCC). Other users should set it to correspond with their region.
Any configuration changes you make with the above commands will not take place until you reboot the SCS
or issue the Set 80211 Reset command.
12-30
Command Reference IP/Network Commands
Errors If you enter a region that will not work with your 802.11 card, an error bit will
be displayed when you enter the Show 80211 command.
Parameters Regions
IC: Canada
ETSI: Europe, most countries (verify with your local regulatory body)
SPAIN: Spain
FRANCE: France
MKK: Japan
Defaults FCC
See Also Show 80211, page 12-48; 802.11 Configuration, page 2-11
Resets the SCS so any configuration changes will take effect immediately.
Parameters Reset
Resets the SCS to make all 802.11 changes take effect immediately. This
command should be entered anytime you make an 802.11 configuration
change. It also clears out any previous errors and starts over with the current
802.11 parameters.
See Also Show 80211, page 12-48; 802.11 Configuration, page 2-11
12-31
Command Reference IP/Network Commands
Any configuration changes you make with the above commands will not take place until you reboot the SCS
or issue the Set 80211 Reset command.
Errors If you enter a command that is not applicable to the 802.11 card currently in
use, you will receive an Error message.
Parameters num
Enter a value between 0 and 3000.
Defaults 3000
See Also Show 80211, page 12-48; 802.11 Configuration, page 2-11
⎧ ⎫
⎪ ⎪
⎪ ENABLED ⎪
⎪ DISABLED ⎪
⎪ ⎪
⎧ SET ⎫ 80211 WEP ⎪ INDEX num ⎪
⎨ ⎬ ⎨ ⎬
⎩ DEFINE ⎭ ⎪ KEY keydata ⎪
⎪ ⎪
⎪ ⎧ ALL ⎫ ⎪
⎪ RECEIVE ⎨ ⎬ ⎪
⎪ ⎩ ENCRYPTED ⎭ ⎪
⎩ ⎭
Enabling WEP (Wireless Equivalent Privacy) means the SCS will only connect to an AP (in infrastructure
mode) or communicate with other ad-hoc peers (in ad-hoc mode) that have been programmed with the same
WEP key as the SCS. All wireless network traffic the SCS sends will be encrypted with its WEP key and
any encrypted wireless network traffic the SCS receives will be decrypted with its WEP key. Disabling
WEP causes the SCS to ignore its WEP key and only receive and transmit unencrypted network traffic.
Any configuration changes you make with the above commands will not take place until you reboot the SCS
or issue the Set 80211 Reset command.
12-32
Command Reference IP/Network Commands
Errors If you enter a command that is not applicable to the 802.11 card currently in
use, you will receive an Error message.
Parameters Enabled
Enables WEP.
Disabled
Disables WEP.
Index
Assigns the index number that should be used with the WEP key.
num
Enter an integer between 1 and 4. For two keys to match, both their key data
and their index number must be identical.
Key
Sets the WEP key. The SCS allows both 40-bit and 128-bit keys, and will
determine which key length is being set by the length of the key data.
keydata
Enter the WEP key. The key format should be entered as “xx-xx-xx-xx...”
where each x is a hexadecimal digit (0 through 9 and A through F). Each pair
of hex digits (xx) defines a byte of key data, and each byte is separated from
the next by a dash. For a 40-bit key, 5 bytes of key data must be given. For a
128-bit key, 13 bytes of data must be given.
Receive
Determines whether the SCS will receive unencrypted data while WEP is
enabled.
All
Allows reception of encrypted traffic while WEP is enabled. The SCS will
accept unencrypted wireless network frames, as well as frames encrypted with
its WEP key. This is the default setting once WEP has been enabled.
Encrypted
Refuses to accept unencrypted data while WEP is enabled. The SCS will
discard and ignore unencrypted wireless network frames, accepting only
frames encrypted with its WEP key.
See Also Show 80211, page 12-48; 802.11 Configuration, page 2-11
12-33
Command Reference IP/Network Commands
⎧ SET ⎫
⎨ ⎬ TELNET HOSTS hostname IPaddress
⎩ DEFINE ⎭
Associates a TCP/IP hostname with an IP address in the local host table, allowing you to use the text name
for Telnet connections even if there is no name server to resolve it. If the given host name has already been
configured, the new IP address will replace the previous value.
Errors You will receive an error if you enter an IP address in a questionable format.
Parameters hostname
The hostname string you wish to define, limited to 64 alphanumeric characters
with only 16 characters between any period delimiters.
IPaddress
Standard, numeric IP address of the machine referred to by the hostname.
See Also Clear/Purge Hosts, page 12-18; Show/Monitor/List Hosts, page 12-48
12-34
Command Reference IP/Network Commands
⎧ TTL TTLnum ⎫
⎪ ⎪
⎪ ⎪
⎪ ⎧ ⎫ ⎪
DEFAULT ⎨ ENABLED ⎬
⎪ ⎪
⎪ ⎩ DISABLED ⎭ ⎪
⎪ MTU bytes ⎪
⎪ ⎪
⎪ ⎪
⎪ PROXYY – ARP ⎧ ENABLED ⎫ ⎪
⎧ ⎫ ⎪ ⎨ ⎬ ⎪
⎧ ⎩ DISABLED ⎭
SET ⎫ ⎪ ALL ⎪ ⎪ ⎪
⎨ ⎬ PROTOCOLS IP ⎨ ⎬ ⎨ ⎬
⎩ DEFINE ⎭ ⎪ ETHERNET Ethernum ⎪ ⎪ ⎧ ⎫ ⎪
⎩ ⎭ ⎪ ⎪ ⎧ ⎫⎪ ⎪
⎪ ⎪ LISTEN ⎨ ENABLED ⎬ ⎪ ⎪
⎪ RIP ⎨ SEND ⎩ DISABLED ⎭ ⎬ ⎪
⎪ ⎪ ⎪ ⎪
⎪ ⎪ METRIC num ⎪ ⎪
⎪ ⎩ ⎭ ⎪
⎪ ⎪
⎪ ⎧ ⎫ ⎪
⎪ TRUSTED ⎨ ENABLED ⎬ ⎪
⎪ ⎩ DISABLED ⎭ ⎪
⎩ ⎭
⎧ ⎫
⎧ SET ⎫ ⎪ ALL ⎪ ⎧ First Last ⎫
⎨ ⎬ PROTOCOLS IP ⎨ ⎬ POOL ⎨ ⎬
⎩ DEFINE ⎭ ⎪ ETHERNET Ethernum ⎪ ⎩ NONE ⎭
⎩ ⎭
Parameters All
Configures all IP interfaces.
Ethernet
Configures an Ethernet interface. To specify the number of the Ethernet, the
Ethernum parameter must be used. If no number is entered, the configuration
will affect the primary interface.
Note: Servers with one Ethernet port do not need the optional Ethernum parameter;
when omitted, it defaults to zero.
Ethernum
Enter the number of a specific secondary Ethernet interface. If a zero is
entered, the configuration will affect the primary interface.
TTL
Sets the amount of time that the IP Time-To-Live value should be decremented
by when routed through this interface. The specific amount must be set using
the TTLnum parameter.
TTLnum
An integer between 1 and 127, inclusive.
12-35
Command Reference IP/Network Commands
Default
If enabled, IP routing updates will advertise this router as the “default” route.
Default is commonly used to avoid large routing tables when there is only one
possible path to a large number of networks.
MTU
Sets the maximum Transmission Unit, or “packet size” for this interface.
Packets larger than this value will be IP fragmented when transmitted. Must be
used in conjunction with the bytes parameter, discussed below.
bytes
An integer between 40 and 1500, inclusive.
Proxy-ARP
If enabled, an ARP response will be sent in reply to ARP requests for non-local
networks to which the SCS knows a valid path. Commonly used to allow end
hosts that don’t understand routing or subnet masks to find a router.
Pool
Allocates a pool of IP addresses to dialin users. When Proxy-ARP is enabled,
the SCS will respond to ARP requests to all addresses in the pool. Must be used
with the First and Last parameters, or with the None parameter.
Note: The pool can be set to any size, but it makes sense to restrict it to the number of
available serial ports.
First
Specifies the start of the range of IP addresses to be used.
Last
Specifies the end of the range of IP addresses to be used.
None
Disables use of the IP address pool.
RIP
Configures the IP Routing Information Protocol (RIP) for this interface. Must
be used in conjunction with the Listen, Send, or Metric parameter.
Listen
Enables or disables RIP listening.
Send
Enables or disables RIP sending.
Metric
Configures the cost or “hop-count” of this interface. routes learned through this
interface will have the value added to their metric. The value to be added must
be specified using the num parameter.
num
An integer between 1 and 16, inclusive. Commonly used to make a given
interface less desirable for backup routing situations.
12-36
Command Reference IP/Network Commands
Trusted
When enabled, this interface will only listen to routing updates from routers
specified by the Set/Define IP Trusted command. Otherwise, this interface
will listen to all routing updates.
See Also Clear/Purge IP Trusted, page 12-20; Show/Monitor/List Hosts, page 12-48;
Defining an IP Address Pool, page 6-3
⎧ SET ⎫
⎨ ⎬ PROTOCOLS IP CREATE ETHERNET 0 IPaddress Netmask
⎩ DEFINE ⎭
Creates a secondary interface—an interface that shares a physical device, such as an Ethernet port, but has
a different IP address. The secondary interface is commonly used to allow more than one IP network on a
given Ethernet.
Parameters 0
The number zero represents the primary Ethernet interface for which the
secondary interfaces are created. The number zero must be included in the
command.
IPaddress
An IP address in standard numeric format (for example, 193.0.1.50).
Netmask
A subnet mask; for example, 255.255.255.0.
12-37
Command Reference IP/Network Commands
⎧ SET ⎫ ⎧ DomainName ⎫
⎨ ⎬ PROTOCOLS IP DOMAIN ⎨ ⎬
⎩ DEFINE ⎭ ⎩ NONE ⎭
Sets the default domain suffix. This suffix is appended to host names during IP name resolution.
Parameters DomainName
A string of up to 64 characters.
None
Clears an existing domain suffix.
See Also Show/Monitor/List IP, page 12-49; Specifying a Default Domain Name, page
6-7
⎧ SET ⎫ ⎧ num ⎫
⎨ ⎬ PROTOCOLS IP HOST LIMIT ⎨ ⎬
⎩ DEFINE ⎭ ⎩ NONE ⎭
Sets the maximum number of TCP/IP hosts that the SCS will add to its host table as a result of Rwho and
DNS lookups. Hosts from the preset host table are exempt from this limit.
Parameters num
An integer between 0 and 200.
None
Clears any current host limit.
See Also Show/Monitor/List IP, page 12-49; Adding Hosts to the Host Table, page 6-7
12-38
Command Reference IP/Network Commands
⎧ SET ⎫
⎨ ⎬ PROTOCOLS IP IPADDRESS address
⎩ DEFINE ⎭
Errors An error is returned if there are active connections to the SCS. An error is
returned if the address is in use by another node.
Parameters address
An IP address in standard numeric format (for example, 193.0.1.50).
⎧ SET ⎫
⎨ ⎬ PROTOCOLS IP SECONDARY LOADHOST address
⎩ DEFINE ⎭
Parameters address
An IP address in standard numeric format (for example, 193.0.1.5).
⎧ SET ⎫
⎨ ⎬ PROTOCOLS IP SECONDARY NAMESERVER address
⎩ DEFINE ⎭
Specifies the IP address of the local nameserving host for use on IP connections and NetBIOS connections
that use IP. The host’s address must be specified using the address parameter, described below.
Parameters address
An IP address in standard numeric format (for example, 193.0.1.5).
12-39
Command Reference IP/Network Commands
See Also Configuring the Domain Name Service (DNS), page 6-7
⎧ ENABLED ⎫
⎨ ⎬
⎩ DISABLED ⎭
⎧ ⎫
⎧ SET ⎫PROTOCOL IP NAT EXPIRE ⎨ TCP string
⎬
⎨ ⎬ ⎩ NONTCP string ⎭
⎩ DEFINE ⎭
⎧ ⎫
ADV –PRIVATE ⎨ ENABLED ⎬
⎩ DISABLED ⎭
SOCKET beginning socket END end socket
Parameters EXPIRE
Time, in minutes, before a NAT entry is removed from the mapping table.
TCP string
Time, in minutes, to expire TCP NAT mappings.
NONTCP string
Time, in minutes, to expire non-TCP NAT mappings.
ADV-PRIVATE
Specifies whether to advertise private networks.
SOCKET
Specifies beginning of socket range used by NAT.
beginning socket
First socket number or IP port number
END
Specifies last of socket range used by NAT.
end socket
Last socket number or IP port number.
See Also Set/Define IP NAT Table, page 12-41;Show/Monitor/List IP, page 12-49;
ISP Site Connections with NAT on page 4-6
12-40
Command Reference IP/Network Commands
⎧ ⎫
PROTOCOL ⎨ TCP ⎬
⎩ UDP ⎭
⎧ SET ⎫ IP NAT TABLE public_port
⎨ ⎬ PRIVIP private_ip
⎩ DEFINE ⎭
PRIVSOCK portnum
NONE
Specifies the IP address of the local nameserving host for use on IP connections and NetBIOS connections
that use IP. The SCS also allows connections from public IP networks to specific IP address/port
combinations on the private IP interface. The NAT table can contain 10 mappings. The host’s address must
be specified using the address parameter described below.
Parameters public_port
A socket number or IP port number on public network (Internet).
PRIVIP
An IP address in standard numeric format (for example, 193.0.1.50).
PRIVSOCK
A socket number or IP port number at the PRIVIP address.
NONE
Clears an entry in the NAT table.
See Also Show/Monitor/List IP, page 12-49, ISP Site Connections with NAT
on page 4-6
⎧ SET ⎫
⎨ ⎬ PROTOCOLS IP SECONDARY NBNS address
⎩ DEFINE ⎭
Specifies the address of the NetBIOS Name Server (NBNS) used for NetBIOS over an IP network. NBNS
addresses are passed via PPP to remote users who want to locate the name server dynamically. The SCS
does not use this information itself.
NetBIOS over IP can also use DNS; the nameserver address set with the Set/Define IP Nameserver
command will also be passed on to remote node users who ask for them.
12-41
Command Reference IP/Network Commands
Parameters address
An IP address in standard numeric format (for example, 193.0.1.50).
See Also Set/Define IP Nameserver, page 12-39; Configuring the Domain Name Service
(DNS), page 6-7
Configures a static route. Static routes are used to tell the IP router the path toward other IP networks that
cannot be learned by a dynamic routing protocol such as RIP. Static routes commonly point to sites (see the
Define Site commands), which represent the best path to the destination. The destination can be an IP
network, a subnetwork, or a host.
Parameters Default
Configures a default route. If an explicit route to a destination network doesn’t
exist, the packet will be routed according to the default route.
Static default routes are used when another router is the designated default
route. If this router is to advertise itself as the default router, see Set/Define IP
All/Ethernet Default, page 12-35.
destination
An IP address in standard numeric form.
Nextrouter
Sets the router that packets to the destination will be sent to.
router
A router name or IP address.
Site
Specifies the site that packets to the destination will be sent to. When a packet
arrives for the destination, a connection will be formed to the specified site, if
one does not currently exist.
The site must be defined before a route can be created that points to the site. To
configure a site, use the Define Site commands.
SiteName
A site name of up to 12 characters.
Note: If the next “hop” is a router available on the LAN, use the Nextrouter parameter.
12-42
Command Reference IP/Network Commands
num
An integer from 1 through 16 representing the metric for this route.
See Also Clear/Purge IP Route, page 12-19; Show/Monitor/List IP Route, page 12-49;
IP Routing, page 6-19
⎧ SET ⎫ ⎧ ENABLED ⎫
⎨ ⎬ PROTOCOLS IP ROUTING ⎨ ⎬
⎩ DEFINE ⎭ ⎩ DISABLED ⎭
Configures the routing of IP packets. If routing is disabled, any packets requiring routing on the SCS will
be rejected. The router will still learn routes via RIP (if enabled) for its own use.
Defaults Enabled
⎧ ⎫
⎪ ⎧ ⎫ ⎪
⎪ ⎪ BOTH ⎪⎧ ENABLED ⎫ ⎪
⎪ ⎨ INCOMING ⎬⎨ ⎬ ⎪
⎪ ⎪ ⎪⎩ DISABLED ⎭ ⎪
⎧ SET ⎫ ⎪ ⎩ OUTGOING ⎭ ⎪
⎨ ⎬ PROTOCOLS IP SECURITY ADDRESS address ⎨ ⎬
⎩ DEFINE ⎭ ⎪ PORTS PortList ⎪
⎪ ⎪
⎪ ⎧ ENABLED ⎫ ⎪
⎪ PRINTER ⎨ ⎬ ⎪
⎪ ⎩ DISABLED ⎭ ⎪
⎩ ⎭
12-43
Command Reference IP/Network Commands
Parameters address
The IP address to be restricted. The address can be a full IP address, such as
192.0.180, to restrict one address; it can also be expressed as a partial address,
such as 192.0.1.255, to restrict whole subnetworks.
An address with a 255 in any segment means the restriction applies to all the
addresses in that range. Any address with a 0 in any segment implies Incoming
and Outgoing Disabled for all ports.
Both
Restricts both logins from the network to the server and Telnet sessions to the
network from the server.
Incoming
Restricts logins from the network into the server.
Outgoing
Restricts Telnet sessions from the network into the server.
Ports
A list of ports for which the restriction applies. To specify a port or list of ports,
use the PortList parameter. If PortList is not specified, all physical and virtual
ports apply. A port number of 0 i used to apply to the virtual (incoming login)
ports.
PortList
A port or series of ports to be restricted. Multiple ports must be specified with
a comma; ranges of ports must be specified with a dash (-).
Printer
Enables or disables LPR and RTEL printing from the specified host(s).
See Also Clear/Purge IP Security, page 12-19; Show/Monitor/List IP Security, page 12-
49; IP Security, page 6-17
12-44
Command Reference IP/Network Commands
⎧ SET ⎫
⎨ ⎬ PROTOCOLS IP SUBNET MASK address
⎩ DEFINE ⎭
Specifies a subnet mask as an IP address. The mask must be specified using the address parameter.
Parameters Mask
Specifies a subnet mask. Must be used in conjunction with the address
parameter. If a subnet mask isn’t specified, a default subnet mask will be
inferred from the server’s current IP address.
address
An IP address in standard numeric format (for example, 255.255.192.0).
⎧ SET ⎫ ⎧ ENABLED ⎫
⎨ ⎬ PROTOCOLS IP TCPKEEPALIVE ⎨ ⎬
⎩ DEFINE ⎭ ⎩ DISABLED ⎭
Enables or disables TCP keepalive packets. By default, TCP keepalive packets are enabled and are
transmitted every minute.
Parameters Enabled
Transmits keepalives.
Disabled
Does not transmit keepalives.
Defaults Enabled
12-45
Command Reference IP/Network Commands
DAYTIME address
⎧ BROADCAST ⎫
⎧ SET ⎫ ⎪ ⎪
⎨ ⎬ PROTOCOLS IP TIMESERVER NTP ⎨ IP ipaddress ⎬
⎩ DEFINE ⎭ ⎪ ⎪
⎩ PASSIVE ⎭
NONE
Configures a timeserver for the SCS to use to update its internal clock. The SCS can communicate with
either Daytime or Network Timeserver Protocol (NTP) servers. For NTP, the SCS can periodically
broadcast a message asking for time information and wait for an NTP timeserver to reply, periodically query
a specific NTP timeserver, or just listen for NTP broadcasts on the network.
Parameters Daytime
Specifies a daytime server. The SCS will listen for a possible daytime server,
then send packets querying that server for time information.
address
An IP address in standard numeric format (for example, 193.0.1.50).
None
Clears a previous timeserver setting.
NTP
Specifies an NTP server. There are three types of NTP.
Broadcast
The SCS periodically broadcasts a message that asks for time information, and
waits for an NTP timeserver to reply.
IP
Use this method if you have a single NTP timeserver on your network. You
must enter an IP address in standard numeric format.
Passive
The SCS will listen for NTP timeserver announcements on the network.
12-46
Command Reference IP/Network Commands
⎧ SET ⎫ ⎧ ⎫
⎨ ⎬ PROTOCOLS IP TRUSTED address RIP ⎨ ENABLED ⎬
⎩ DEFINE ⎭ ⎩ DISABLED ⎭
Configures a list of trusted routers. When Set/Define IP All/Ethernet Trusted is enabled, the SCS will only
listen to RIP updates from routers in this list.
Parameters address
An IP address in standard numeric format (for example, 193.0.1.50).
RIP
When enabled, sets the specified IP address as a trusted routers. By default,
routers are not trusted.
⎧ SET ⎫ ⎧ ⎫
⎨ ⎬ PROTOCOLS IP TRUSTED address RIP ⎨ ENABLED ⎬
⎩ DEFINE ⎭ ⎩ DISABLED ⎭
Configures a list of trusted routers. When Set/Define IP All/Ethernet Trusted is enabled, the SCS will only
listen to RIP updates from routers in this list.
Parameters address
An IP address in standard numeric format (for example, 193.0.1.50).
RIP
When enabled, sets the specified IP address as a trusted routers. By default,
routers are not trusted.
12-47
Command Reference IP/Network Commands
SHOW IP COUNTERS
⎧ SHOW ⎫ hostname
⎪ ⎪
⎨ MONITOR ⎬ TELNET HOSTS ALL
⎪ ⎪
⎩ LIST ⎭ LOCAL
Displays either the currently available TCP/IP (Telnet/Rlogin) hosts (Show) or the ones that have been
Defined locally in the host table (List). Hosts will be shown with the method of discovery (rwho,
connection, host table, etc.) and will also be marked if they are the current nameserver and/or gateway.
Specifying a particular host name will show only that host’s information. Wildcards for the hostnames are
allowed. The All option is the default, and it displays all known TCP/IP hosts.
Restrictions You must be the privileged user to use the Monitor command.
Parameters hostname
Specifies a particular TCP/IP host.
All
Displays all the TCP/IP nodes that this server currently knows about. These
include hosts from the local host table, as well as hosts seen by Rwho
broadcasts and those resolved after a Connect/Telnet request.
Local
Displays local TCP/IP nodes.
See Also Set/Define Hosts, page 12-34; Adding Hosts to the Host Table, page 6-7
12-48
Command Reference IP/Network Commands
12.5.35 Show/Monitor/List IP
ALL
ARP
COUNTERS
HASHTABLE
⎧ SHOW ⎫
⎪ ⎪
⎨ MONITOR ⎬ PROTOCOLS IP INTERFACES ETHERNET num CACHE
⎪ ⎪
⎩ LIST ⎭ SiteName
NAT
ROUTES
SECURITY
TRUSTED
Displays the current operating characteristics of the targets. Use the List command to see the permanent
attributes that will take effect upon reboot/login.
Restrictions You must be the privileged user to use the Monitor command.
The Reasons fields show counters in hexadecimal with the rightmost bit being
0. For example, a Connect Failure Reason of 0040 represents 0000 0000 0100
0000 in binary, which means that bit 6 is set. The meaning of each bit is
explained in Table 12-1.
12-49
Command Reference IP/Network Commands
6 Remote host did not answer Unused, should be 0 Port unreachable; usually due
to failed name service
All
Displays all defined IP information.
ARP
Displays the current state of the ARP table.
Counters
Displays the IP-related counters.
Hashtable
Displays the routing table's hash table statistics.
Interfaces
Displays IP router interfaces. To display IP router information about a specific
interface, Interfaces may be used in conjunction with one of the following
parameters: Ethernet, Cache, or SiteName.
Ethernet
Displays information about a particular Ethernet interface. To specify the
interface, use the num parameter.
num
An integer specifying a particular Ethernet interface.
SiteName
A particular site whose IP information will be displayed.
Cache
Displays cache statistics.
NAT
Displays the settings related to NAT support.
Routes
Displays the IP routing table.
Security
Displays the active (Show, Monitor) or permanent (List) IP security entries.
12-50
Command Reference IP/Network Commands
Trusted
Displays trusted IP routers.
Timeserver
Displays the timeserver.
See Also Netstat, page 12-187; IP/Network Commands, page 12-18; Chapter 6, IP
12.5.36 SSH
SSH is a shorthand for the Connect SSH command. For a description of the command, see Connect, page
12-20.
12.5.37 Telnet
Telnet is a shorthand for the Connect Telnet command. For a description of the command, see Connect,
page 12-20.
12-51
Command Reference Port Commands
When entered without any parameters, displays all emailsite configurations that will take place the next time
that emailsite is used. Using the emailsite parameter will show the configurations for that specific site, while
the All parameter will show a detailed listing of all emailsites.
Parameters emailsite
Enter the name of an emailsite.
See Also Purge Email, page 12-54; Define Email, page 12-55; Define Ports Event Email
Serialdata, page 12-71; Event Port Logging, page 3-2
12.6.2 Lock
LOCK
Locks a port without disconnecting sessions. When you enter this command, you will be queried for a
password (6 alphanumeric characters maximum) and asked to verify it. The port is then locked until that
password is used to unlock it. If a user forgets the password, the privileged user must either logout the port
using the Logout command (disconnecting all sessions) or use the Unlock Port command.
Note: The password and verification are not displayed as the user types them.
See Also Set/Define Server Lock, page 12-120; Unlock Port, page 12-100; Logout Port,
page 12-53; Set/Define Ports Security, page 12-85; Locking a Port, page 8-9
12-52
Command Reference Port Commands
LOGOUT PORTPortlist
Logs out a port. Active sessions are disconnected, and all site circuits are closed.
Restrictions Only privileged users can log out a port or site other than their own.
Parameters Port
Logs out the list of ports specified with the PortList parameter.
PortList
Specifies a port or series of ports to be logged out. Multiple ports must be
separated by commas (for lists) or dashes (for ranges).
Note: If the PortList parameter isn’t specified, the current port will be logged out.
Resets a port to the factory default PPP or Modem settings, but without affecting any other port settings.
When used without the PPP or Modem parameters, both PPP and Modem settings are purged.
Parameters PPP
Resets all Link Control Protocol parameters on the specified port.
Modem
Clears the specified port’s modem init information.
PortNum
Specifies a particular SCS port.
See Also Show/Monitor/List Ports, page 12-96; Port Commands, page 12-52
12-53
Command Reference Port Commands
Removes an emailsite.
Parameters emailsite
Enter the name of an emailsite.
See Also Define Email, page 12-55; Define Ports Event Email Serialdata, page 12-71;
Event Port Logging, page 3-2
12.6.6 Resume
Leaves character (Local>) mode and resumes the current (active) session. To resume a session other than
the current one, specify a session number with the number parameter.
Parameters number
A session number, which can range from one to the total number of sessions
that you currently have open.
12-54
Command Reference Port Commands
IN
SNOOP PORT PortNum OUT
BOTH
Parameters PortNum
Specifies a particular SCS port to watch.
In
Displays only data coming into the serial port from an attached device.
Out
Displays only data going from the SCS serial port to the attached serial device.
Both
Displays both incoming and outgoing data to and from the serial port.
Incoming data is displayed in inverse video.
Note: All data may not display if you are monitoring a high speed serial port on a
slower speed connection.
⎧ ⎫
⎪ TO address ⎪
⎪ FROM string ⎪
⎪ ⎪
DEFINE EMAIL emailsite ⎨ SUBJECT subject ⎬
⎪ ⎪
⎪ MAILHOST mailhost ⎪
⎪ REPLYTO address ⎪
⎩ ⎭
Configures email notification in a format known as an emailsite, which contains all of the information
needed when email notification for port buffering is enabled. Emailsites can be named default or portxx,
where xx is the port number. The portxx sites will be used for email notification on that port, e.g. the port12
emailsite will be used for port buffering on port 12.
The default emailsite configurations will be used to fill in any blanks for the port-specific emailsites.
All of the above strings can use dynamic print variables. Available dynamic print variables are shown in the
following table.
12-55
Command Reference Port Commands
Note: Dynamic print variables are case-sensitive. You must use all capital letters in the
variables to avoid problems.
Parameters emailsite
Enter the emailsite name. The only valid names are “default” and “portxx,”
where xx is the port number.
To
Sets the recipient(s) of the email.
address
Enter an email address, or a series of email addresses separated by commas.
Enclose the address in quotes to preserve case and spaces. The max number
of characters for this field is 64 characters. Most SMTP mail servers require a
domain name on the To/From names, e.g. [email protected] instead of just
admin.
From
Sets the text that will be displayed in the From: field of the email message. The
maximum number of characters for this field is 32.
Subject
Sets the subject line that will be displayed in the email message. Enter a
character string with a maximum length of 48 characters. Enclose the string
in quotes to preserve case and spaces.
12-56
Command Reference Port Commands
string
Enter a character string with a maximum length of 32 characters. Enclose the
string in quotes to preserve case and spaces.
Mailhost
Sets the SMTP mailhost. Enter a string with maximum length of 24 characters.
Enclose the string in quotes to preserve case and spaces.
Replyto
Sets the email address that any response to the email notification will be sent
to. Enclose the address in quotes to preserve case and spaces. The max
number of characters for this field is 32.
See Also Set/Define Ports Serial Log, page 12-85; Define Ports Event Email Serialdata,
page 12-71; Event Port Logging, page 3-2
⎧ ⎫
⎪ DYNAMIC ⎪
⎧ SET ⎫PORTS PortList ACCESS ⎪ LOCAL ⎪
⎨ ⎬ ⎨ ⎬
⎩ DEFINE ⎭ ALL ⎪ NONE ⎪
⎪ REMOTE ⎪
⎩ ⎭
Sets the type of incoming connections allowed through the physical port.
Parameters PortList/All
Specifies a particular port or group of ports, or all ports. Port numbers should
be separated with commas (for lists) or dashes (for ranges).
Note: In the absence of a PortList or the All parameter, the configuration will affect the
current port only.
Dynamic
The ports can receive connection requests from local and remote users.
Local
The ports can only accept connection requests from local users (those
connected to the serial ports). No remote logins are permitted.
None
The specified ports are unusable.
12-57
Command Reference Port Commands
Remote
The specified ports accept only network connection requests. No local logins
are permitted.
Defaults Dynamic
See Also Setting Port Access, page 8-1; Limiting Port Access, page 11-22
When enabled, prompts incoming user for a username and password to be checked against the
authentication database(s) set up with the Set/Define Authentication commands.
Parameters PortList/All
Specifies a particular port or group of ports, or all ports. Port numbers should
be separated with commas (for lists) or dashes (for ranges).
Note: In the absence of a PortList or the All parameter, the configuration will affect the
current port only.
Defaults Disabled
See Also Clear/Purge Authentication, page 12-151; Set/Define Authentication, page 12-
153; Show/Monitor/List Authentication, page 12-177; Ports Not Using
Automatic Protocol Detection, page 4-14; Port Restrictions, page 8-9
Enables a port to detect the incoming baud rate and change its own to match at login time. Autobaud must
be disabled for Remote and Dynamic port access and for any port offering a service.
Note: When Autobaud is enabled, you may have to press Return twice or more to allow
the port to determine the baud rate.
12-58
Command Reference Port Commands
Errors Autobaud and Autostart cannot be used together. If you try to configure both
options, you will get a message saying that the previously configured option
was disabled.
Parameters PortList/All
Specifies a particular port or group of ports, or all ports. Port numbers should
be separated with commas (for lists) or dashes (for ranges).
Note: In the absence of a PortList or the All parameter, the configuration will affect the
current port only.
Autobaud works for most baud rates when both ends of the line are the same
parity, or when the port is set to 8 bits with no parity and the incoming
connection is 7 bits with even parity. Baud rates must be within 3 “steps” of
each other, 9600 to 38400 will work, but 9600 to 115200 will not.
Defaults Disabled
See Also Configure Modems, page 4-18; Modem Speeds, page 9-2
If enabled, the port connects automatically to the preferred service upon login. To exit to character (Local>
) mode, the Break command can be used. To attach other services, the Connect command can be used.
Restrictions Requires privileged user status to use this command on ports other than your
own. Secure users may not use this command.
Parameters PortList/All
Specifies a particular port or group of ports, or all ports. Port numbers should
be separated with commas (for lists) or dashes (for ranges).
Note: In the absence of a PortList or the All parameter, the configuration will affect the
current port only.
Defaults Disabled
12-59
Command Reference Port Commands
⎧ ⎫
⎪ ENABLED ⎪
⎪ DISABLED ⎪
⎪ ⎪
⎪ ⎪
⎪ ⎧ ⎫ ⎪
⎪ ⎪ x ⎪ y ⎪
⎧ SET ⎫ PortList ⎪ CHARACTER ⎨ ANY ⎬ ⎪
⎨ ⎬PORTS AUTOSTART ⎨ ⎪ ⎪ ANY ⎬
⎩ DEFINE ⎭ ALL ⎪ ⎩ NONE ⎭ ⎪
⎪ ⎪
⎪ ⎪
⎪ 1 ⎪
⎪ SAVE 2 ⎪
⎪ ⎪
⎪ NONE ⎪
⎩ ⎭
Determines whether the specified port will wait for a carriage return or pre-set character(s) before starting
a connection. Enabling Autostart causes the port to start connections automatically. Autostart can also be
configured to allow a user-defined sequence of one or two characters to initiate sessions.
If the port is in Dedicated mode, the autostart characters can be sent to the host as the first bytes of data. In
all other modes, autostart characters are discarded.
Errors Autostart and Autobaud are incompatible. If the port is set for Autobaud,
enabling Autostart will disable Autobaud and produce an error message.
The Save parameter is only applicable when the port is configured with a
dedicated host.
If Modem Control is enabled, a port enabled for autostart will not be idle unless
DSR is held low, and therefore will not be available for connections from the
network.
Parameters PortList/All
Specifies a particular port or group of ports, or all ports. Port numbers should
be separated with commas (for lists) or dashes (for ranges).
Note: In the absence of a PortList or the All parameter, the configuration will affect the
current port only.
Character
Sets a character that will cause a login event. Users will get the benefit of
Autostart without having to hit Return or enable Autostart for extended periods
of time.
12-60
Command Reference Port Commands
x
Enter the desired alphanumeric character. To specify a control character, use
escaped hex (\xx). For example, Ctrl-B (ASCII character 0x02) would be
specified as \02.
y
Enter the optional second alphanumeric character. To specify a control
character, use escaped hex (\xx). For example, Ctrl-B (ASCII character 0x02)
would be specified as \02.
Any
Sets a wildcard character.
Note: If you are using command abbreviation, you must enter Any. Just entering “char
a” will be interpreted as setting the character “a” as the autostart trigger.
None
Clears the autostart character.
Save
Specifies what happens to the characters that start the connection. Either the
first and/or second autostart characters will be passed to the host as the first
bytes of data, or the characters will be discarded.
None
Discards the autostart characters.
Defaults Disabled
Defines a “backward” key. From character (Local>) mode, typing this key functions as if the Backward
command was entered; the user may switch to the previous session without entering character mode.
Any key can be specified unless it conflicts with SCS line editing or the Break or Forward keys. The key
you specify will be stripped from the data stream, so while it won’t interfere with remote operating systems,
you will lose any functionality that key would have on local programs.
12-61
Command Reference Port Commands
Restrictions Requires privileged user status if you want to use this command on ports other
than your own.
Parameters PortList/All
Specifies a particular port or group of ports, or all ports. Port numbers should
be separated with commas (for lists) or dashes (for ranges).
Note: In the absence of a PortList or the All parameter, the configuration will affect the
current port only.
Switch
Defines the control character. Must be used in conjunction with the character
parameter.
character
The character to be used as the backward switch. To specify a control
character, use escaped hex (\xx). For example, Ctrl-B (ASCII character 0x02)
would be specified as \02.
None
Clears the current switch character.
Defaults None configured for serial connections; \02 (Ctrl-B) for virtual port logins
See Also Backwards, page 12-180; Set/Define Ports Forward Switch, page 12-73; Set/
Define Ports Local Switch, page 12-74; Switching Between Sessions, page 8-5
⎧ ⎫
⎪ CHARACTER char ⎪
⎪ ⎪
⎧ SET ⎫PORTS PortList BREAK ⎪
NONE ⎪
⎨ ⎬ ⎨ LOCAL ⎬
⎩ DEFINE ⎭ ALL ⎪ ⎪
⎪ REMOTE ⎪
⎪ ⎪
⎩ NONE ⎭
Allows users to set an alternate Break character, and determines where the Break condition is processed.
Examples of using the Break key/character with the Local and Remote settings can be found on page 8-5.
Restrictions Requires privileged user status if you want to use this command on ports other
than your own. Secure users may not use this command.
Parameters PortList/All
Specifies a particular port or group of ports, or all ports. Port numbers should
be separated with commas (for lists) or dashes (for ranges).
12-62
Command Reference Port Commands
Note: In the absence of a PortList or the All parameter, the configuration will affect the
current port only.
Character
Specifies an alternate Break character. This is useful for terminals that cannot
generate a Break condition, Telnet clients that cannot generate a break IAC
sequence, and SSH connections.
char
Specify a single character enclosed in quotes. Non-printable characters can
be specified using the hexadecimal notation \xx.
Local
Pressing the Break key will return to character (Local>) mode.
Remote
The Break key is ignored by the SCS and passed through to the remote service.
None
Removes the alternate Break character (when used with the Character
keyword) or disables Break key processing. Pressing the Break key does
nothing.
Defaults Local for serial users, Remote for virtual port connections
See Also Set/Define Ports Backward Switch, page 12-61: Set/Define Ports Forward
Switch, page 12-73: Set/Define Ports Local Switch, page 12-74: Breaking from
a Session, page 8-5: Serial Break Handling, page 3-9.
⎧ ⎫
DEFINE PORTS PortList BACKSPACE ⎨ ENABLED ⎬
ALL ⎩ DISABLED ⎭
Specifies behavior of the Backspace key. If disabled, the Backspace key deletes the character to the left of
the cursor. If enabled, Backspace returns the cursor to the beginning of the command line.
Restrictions Requires privileged user status if you want to use this command on ports other
than your own. Secure users may not use this command.
Parameters PortList/All
Specifies a particular port or group of ports, or all ports. Port numbers should
be separated with commas (for lists) or dashes (for ranges).
Note: In the absence of a PortList or the All parameter, the configuration will affect the
current port only.
Defaults Disabled
12-63
Command Reference Port Commands
Enables or disables other users’ broadcasts to this port. Broadcasts are typically disabled when extra
messages are not desired on the port’s output device.
Restrictions Requires privileged user status if you want to use this command on ports other
than your own. Secure users may not use this command.
Parameters PortList/All
Specifies a particular port or group of ports, or all ports. Port numbers should
be separated with commas (for lists) or dashes (for ranges).
Note: In the absence of a PortList or the All parameter, the configuration will affect the
current port only.
Defaults Enabled
See Also Broadcast, page 12-180; Set/Define Server Broadcast, page 12-116
Sets the number of bits per character for the serial port.
12-64
Command Reference Port Commands
Restrictions Requires privileged user status if you want to use this command on ports other
than your own. Secure users may not use this command.
Errors Autobaud only works for 8 bits, or for 7 bits with even parity.
Parameters PortList/All
Specifies a particular port or group of ports, or all ports. Port numbers should
be separated with commas (for lists) or dashes (for ranges).
Note: In the absence of a PortList or the All parameter, the configuration will affect the
current port only.
7 or 8
Character size must be either 7 or 8 bits.
Defaults 8 bits
See Also Set/Define Ports Autobaud, page 12-58; Set/Define Ports Parity, page 12-77;
Chapter 9, Modems
Enables or disables the command completion feature. If enabled, the SCS will attempt to complete partially-
typed command words when the user presses the Space or Tab keys.
Restrictions Requires privileged user status if you want to use this command on ports other
than your own.
Errors If the partially-entered command is ambiguous (or if you are typing an optional
string), the SCS sends a beep to the terminal.
Parameters PortList/All
Specifies a particular port or group of ports, or all ports. Port numbers should
be separated with commas (for lists) or dashes (for ranges).
Note: In the absence of a PortList or the All parameter, the configuration will affect the
current port only.
Defaults Disabled
12-65
Command Reference Port Commands
⎧ ⎫
⎪ ⎧ IDLE num ⎫ ⎪
⎪ ⎪ ⎪ ⎪
⎪ TIMEOUT ⎨ FRAME num ⎬ ⎪
⎪ ⎪ ⎪ ⎪
⎪ ⎩ NONE ⎭ ⎪
⎪ ⎪
⎪ ⎧ ⎫ ⎪
⎧ SET ⎫PORTS PortList DATASEND ⎪ ⎪ x ⎪ ⎪
⎨ ⎬ ⎨ CHARACTER ⎨ ANY ⎬ y ⎬
⎩ DEFINE ⎭ ALL ⎪ ⎪ ⎪ ANY ⎪
⎪ ⎩ NONE ⎭ ⎪
⎪ ⎪
⎪ ⎪
⎪ ⎧ 1 ⎫ ⎪
⎪ ⎪ ⎪ ⎪
SAVE ⎨ ⎬
⎪ 2 ⎪
⎪ ⎪ ⎪ ⎪
⎩ ⎩ NONE ⎭ ⎭
Changes the amount of time the SCS will allow serial characters to accumulate before sending them to the
host. Several different triggers can be used to notify the SCS when to send the accumulated data. You can
specify a “timeout” condition of either the time since the last character was received (the Timeout Idle
parameter) or the time since the current “character burst” was started (the Timeout Frame parameters). The
timer resolution on the SCS is approximately 20 milliseconds. Any timeout values lower than 30
milliseconds will be approximated as well as possible.
Another option is to set a one- or two-character trigger, specified through the Character parameter, that will
cause the SCS to transmit the data. You can also specify whether the trigger characters will be sent to the
host as part of the serial data or whether they should be discarded through the Save parameter.
Packets created by the serial handling rules will be queued to the ethernet driver as a single operation, but
there is no guarantee that they will be received at the host in a single network read. If the serial input buffer
is filled, the accumulated data will be queued to the ethernet driver regardless of the serial handling rules.
The serial input buffer size is 1024 bytes.
Parameters PortList/All
Specifies a particular port or group of ports, or all ports. Port numbers should
be separated with commas (for lists) or dashes (for ranges).
Note: In the absence of a PortList or the All parameter, the configuration will affect the
current port only.
Timeout
Sets the trigger that allows serial data to be accumulated until a “timeout”
condition has been detected.
Idle
Defines the timeout as a period of time since the last character was received.
num
Sets the timeout in milliseconds.
12-66
Command Reference Port Commands
Frame
Defines the timeout as the time since the current “character burst” was started.
None
Clears previous timeout settings, so the transmission takes place whenever the
SCS decides to send the data.
Character
Sets a trigger that transmits any accumulated data as soon as the specified one
or two byte character sequence is detected in the data stream.
x
Enter the desired alphanumeric character. To specify a control character, use
escaped hex (\xx). For example, Ctrl-B (ASCII character 0x02) would be
specified as \02.
Any
Sets any character as the trigger.
None
Clears any previous trigger characters.
y
Enter the optional second alphanumeric character. To specify a control
character, use escaped hex (\xx). For example, Ctrl-B (ASCII character 0x02)
would be specified as \02.
Save
Specifies what happens to the matched trigger characters. Either the first
character or both characters will be passed to the host as the first bytes of data,
or the characters will be discarded.
Defaults 30 (msec)
See Also Set/Define Ports Autostart, page 12-60; Transmitting Serial Data, page 12-14
12-67
Command Reference Port Commands
⎧ ⎫
⎪ NONE ⎪
⎪ ⎪
PortList ⎪ ⎧ RLOGIN ⎫ ⎪
DEFINE PORTS DEDICATED ⎨ ⎪ ⎪ ⎬
ALL ⎪ ⎨ SSH ⎬host :EnvString ⎪
⎪ ⎪ ⎪ ⎪
⎪ ⎩ TCP ⎭ ⎪
⎩ ⎭
Sets up a dedicated Rlogin, SSH, or Telnet host or service that the specified port will connect to whenever
it is logged in. The type of dedicated connection is specified with the environment string. If no environment
string is specified, the connection will be Telnet by default.
If you are logged in to a dedicated port, you will be logged off the server when the remote service is logged
out.
There should be no spaces between the hostname, colon, and environment string.
Note: Dedicating all SCS ports is dangerous, as it leaves no easy way to log into the
server. (In other words, users can no longer quickly access the Local> prompt.)
If all ports are dedicated, users must connect via the console ports, or the SCS
must have incoming logins enabled.
Parameters PortList/All
Specifies a particular port or group of ports, or all ports. Port numbers should
be separated with commas (for lists) or dashes (for ranges).
Note: In the absence of a PortList or the All parameter, the configuration will affect the
current port only.
None
Clears any existing Dedicated service.
Rlogin
Dedicates the port to the specified Rlogin host. Must be used in conjunction
with the host parameter.
SSH
Dedicates the port to the specified SSH host. Must be used in conjunction with
the host parameter.
TCP
Dedicates the port. Must be used in conjunction with the host parameter.
host
A text host name or an IP address in standard numeric format (for example,
192.0.1.183).
12-68
Command Reference Port Commands
envstring
Sets up the connection environment before the session is started. For a
description of all available environment strings, see Appendix A, Environment
Strings. If no environment string is specified with the TCP parameter, the
connection will default to a Telnet connection.
See Also Connect, page 12-20; Set/Define Ports Preferred, page 12-79; Define Ports
PPPdetect, page 12-84; Set/Define Ports SLIPdetect, page 12-88; Show/
Monitor/List Ports, page 12-96; Setting Session Characteristics, page 8-7
12-69
Command Reference Port Commands
⎧ ⎫
DEFINE PORTS PortList DIALBACK ⎨ ENABLED ⎬
ALL ⎩ DISABLED ⎭
Turning on Dialback causes the SCS to check the dialback table (see Set/Define Dialback) each time a user
logs in. If the entered username is not in the table, the port is logged out. If the username is in the table, the
port is logged out and the SCS sends the dialback string to the port and awaits a second login. Typically, the
dialback string will cause the modem attached to the port to call the user back at a certain telephone number
for security reasons. Ports with dialback enabled have a 30-second time limit for entering the username
when logging in.
In order to use Dialback functionality, modem control must be enabled, and a modem profile must be
associated with the port. When Dialback is enabled, Modem Control is enabled by default. However,
disabling Dialback does not disable Modem Control; Modem Control must explicitly be disabled if so
desired.
Parameters PortList/All
Specifies a particular port or group of ports, or all ports. Port numbers should
be separated with commas (for lists) or dashes (for ranges).
Note: In the absence of a PortList or the All parameter, the configuration will affect the
current port only.
Examples Local>> DEFINE PORT 3 DIALBACK ENABLED
See Also Set/Define Dialback, page 12-165; Show/Monitor/List Dialback, page 12-178;
Define Ports Modem Control, page 12-8; Define Ports Modem Type, page 12-
16; Show/Monitor/List Ports, page 12-96; Dialback, page 8-12; Dialback,
page 11-5
When enabled, the port will be logged out when the port’s DSR signal is dropped. This usually only occurs
when the attached terminal device is powered off or disconnected; it is intended to keep users from
switching terminal lines to access other sessions. Any open connections will be closed before logging out.
12-70
Command Reference Port Commands
Parameters PortList/All
Specifies a particular port or group of ports, or all ports. Port numbers should
be separated with commas (for lists) or dashes (for ranges).
Note: In the absence of a PortList or the All parameter, the configuration will affect the
current port only.
Defaults Disabled
See Also DSR Logouts, page 8-11; Serial Signals, page 8-20
If enabled, the SCS will not assert the DTR signal on the serial port until a user logs into the port, connects
to the port via a service, or connects to the port via a Telnet connect. When the port is idle, DTR will not be
asserted.
Parameters PortList/All
Specifies a particular port or group of ports, or all ports. Port numbers should
be separated with commas (for lists) or dashes (for ranges).
Note: In the absence of a PortList or the All parameter, the configuration will affect the
current port only.
Defaults Disabled
See Also Define Ports Modem Control, page 12-8; Set/Define Ports Flow Control, page
12-72; DTR (Data Terminal Ready), page 8-22
⎧ ⎫
DEFINE PORTS PortList EVENT EMAIL SERIALDATA ⎨ ENABLED ⎬
ALL ⎩ DISABLED ⎭
Enables email notification for the serial buffering feature. This command automatically changes the
specified port’s access to Remote if not already set.
12-71
Command Reference Port Commands
When email notification is enabled, an email is triggered when the specified serial port receives a burst of
20 or more characters in its serial log. The port will buffer the incoming data for up to 25 seconds or until
the log file reaches 1500 bytes before sending the email, which contains the current contents of the log file.
Any data that comes in after that 25 seconds will be discarded. Email can not be sent from the same port
more than once every 10 minutes.
Port buffering must be enabled (Set/Define Ports Serial Log) for email
notification to work.
Parameters PortList/All
Specifies a particular port or group of ports, or all ports. Port numbers should
be separated with commas (for lists) or dashes (for ranges).
Note: In the absence of a PortList or the All parameter, the configuration will affect the
current port only.
See Also Set/Define Ports Serial Log, page 12-85; Define Email, page 12-55; Event Port
Logging, page 3-2; Email Alerts for Serial Events, page 3-3
⎧ NONE ⎫
⎧ SET ⎫ PORTS PortList FLOW ⎪ ⎪
⎨ ⎬ CONTROL ⎨ CTSRTS ⎬
⎩ DEFINE ⎭ ALL ⎪ ⎪
⎩ XONXOFF ⎭
Restrictions Requires privileged user status if you want to use this command on ports other
than your own. Secure users may not use this command.
Parameters PortList/All
Specifies a particular port or group of ports, or all ports. Port numbers should
be separated with commas (for lists) or dashes (for ranges).
Note: In the absence of a PortList or the All parameter, the configuration will affect the
current port only.
None
No flow control will be performed.
CTSRTS
Sets the flow control type to RTS/CTS.
XONXOFF
Sets the flow control type to XON/XOFF.
12-72
Command Reference Port Commands
Defaults XON
See Also Set/Define Ports DTRWait, page 12-71; Flow Control, page 8-18
Defines a “forward” key. From character (Local>) mode, typing this key functions as if the Forward
command was entered; the user may switch to the previous session without entering character mode.
Any key can be specified unless it conflicts with SCS line editing or the Break or Backward keys. The key
you specify will be stripped from the data stream, so while it won’t interfere with remote operating systems,
you will lose any functionality that key would have on local programs.
Restrictions Requires privileged user status if you want to use this command on ports other
than your own.
Parameters PortList/All
Specifies a particular port or group of ports, or all ports. Port numbers should
be separated with commas (for lists) or dashes (for ranges).
Note: In the absence of a PortList or the All parameter, the configuration will affect the
current port only.
Switch
Defines the control character. Must be used in conjunction with the character
parameter.
character
The character to be used as the forward switch. To specify a control character,
use escaped hex (\xx). For example, Ctrl-B (ASCII character 0x02) would be
specified as \02.
None
Clears the current switch character.
Defaults None configured for serial connections; \06 (Ctrl-F) for virtual port logins
See Also Forwards, page 12-186; Set/Define Ports Backward Switch, page 12-61; Set/
Define Ports Local Switch, page 12-74; Switching Between Sessions, page 8-5
12-73
Command Reference Port Commands
Enables automatic logout of the port if it has been “inactive” for a set period of time. Inactive is defined as
having no keyboard or network activity on the port. The port’s open connections (if any) will be closed
before logging out.
Note: The inactive period is configured using the Set/Define Server Inactivity
command.
This command is ignored for remote networking connections. See the Define Site Idle command.
Parameters PortList/All
Specifies a particular port or group of ports, or all ports. Port numbers should
be separated with commas (for lists) or dashes (for ranges).
Note: In the absence of a PortList or the All parameter, the configuration will affect the
current port only.
Defaults Disabled
See Also Define Site Idle, page 12-139; Set/Define Server Inactivity, page 12-118
Defines a “local switch” key. From character (Local>) mode, typing this key functions as if the Forward
command was entered; the user may switch to the previous session without entering character mode.
Any key can be specified unless it conflicts with SCS line editing or the Break or Forward/Backward keys.
The key you specify will be stripped from the data stream, so while it won’t interfere with remote operating
systems, you will lose any functionality that key would have on local programs.
Restrictions Requires privileged user status if you want to use this command on ports other
than your own.
12-74
Command Reference Port Commands
Parameters PortList/All
Specifies a particular port or group of ports, or all ports. Port numbers should
be separated with commas (for lists) or dashes (for ranges).
Note: In the absence of a PortList or the All parameter, the configuration will affect the
current port only.
Switch
Defines the control character. Must be used in conjunction with the character
parameter.
character
The character to be used as the local switch. To specify a control character, use
escaped hex (\xx). For example, Ctrl-B (ASCII character 0x02) would be
specified as \02.
None
Clears the current switch character.
Defaults None configured for serial connections; \0c (Ctrl-L) for virtual port logins
See Also Set/Define Ports Break, page 12-62; Set/Define Ports Backward Switch, page
12-61; Set/Define Ports Forward Switch, page 12-73; Port-Specific Session
Configuration, page 8-4
Sends the terminal device a Ctrl-G (Bell) when a typed character is lost due to a data error or an overrun on
the SCS.
Restrictions Requires privileged user status if you want to use this command on a port other
than your own. Secure users may not use this command.
Parameters PortList/All
Specifies a particular port or group of ports, or all ports. Port numbers should
be separated with commas (for lists) or dashes (for ranges).
Note: In the absence of a PortList or the All parameter, the configuration will affect the
current port only.
Defaults Enabled
Defaults Enabled
12-75
Command Reference Port Commands
Specifies whether or not the port will be placed in menu mode at login. If it is disabled, the Local> prompt
will appear at login. If it is enabled, a menu screen will be displayed; the Local> prompt is not accessible.
Restrictions Requires privileged user status if you want to use this command on ports other
than your own.
Parameters PortList/All
Specifies a particular port or group of ports, or all ports. Port numbers should
be separated with commas (for lists) or dashes (for ranges).
Note: In the absence of a PortList or the All parameter, the configuration will affect the
current port only.
Defaults Disabled
See Also Clear/Purge Menu, page 12-111; Set/Define Menu, page 12-112; Show/
Monitor/List Menu, page 12-129; Enabling Menu Mode, page 8-12;
Configuring Menu Mode, page 3-4
Specifies whether or not to enable the SCS to emulate a modem for performing network connections. If it
is disabled, the Local> prompt will appear at login. If it is enabled, the SCS will respond to “AT” commands.
Restrictions Requires privileged user status if you want to use this command on ports other
than your own.
Parameters PortList/All
Specifies a particular port or group of ports, or all ports. Port numbers should
be separated with commas (for lists) or dashes (for ranges).
Note: In the absence of a PortList or the All parameter, the configuration will affect the
current port only.
12-76
Command Reference Port Commands
Defaults Disabled
Sets a unique name for each port, or a common name for a group of ports. Giving the same name to several
ports may be desirable, for example, when you want to label them as modem connection ports or dedicated
SLIP/PPP ports.
Parameters PortList/All
Specifies a particular port or group of ports, or all ports. Port numbers should
be separated with commas (for lists) or dashes (for ranges).
Note: In the absence of a PortList or the All parameter, the configuration will affect the
current port only.
portname
A name of up to 16 characters composed of alphanumerics or the underscore
(“_”) character. If the name is not enclosed in quotation marks, it will be
converted to uppercase.
⎧ ODD ⎫
⎧ SET ⎫ PORTS PortList PARITY ⎪ ⎪
⎨ ⎬ ⎨ EVEN ⎬
⎩ DEFINE ⎭ ALL ⎪ ⎪
⎩ NONE ⎭
Sets the serial port’s parity to Odd, Even, or None (no parity). Note that changing the parity may affect the
configured character size.
Restrictions Requires privileged user status if you want to use this command on ports other
than your own. Secure users may not use this command.
Errors Autobaud will not work unless the port is using 8 bit characters, or 7 bit
characters with even parity.
12-77
Command Reference Port Commands
Parameters PortList/All
Specifies a particular port or group of ports, or all ports. Port numbers should
be separated with commas (for lists) or dashes (for ranges).
Note: In the absence of a PortList or the All parameter, the configuration will affect the
current port only.
Defaults None (no parity)
See Also Set/Define Ports Autobaud, page 12-58; Set/Define Ports Character Size, page
12-64; Serial Port Configuration, page 8-13
⎧ ENABLED ⎫
⎪ ⎪
⎪ DISABLED ⎪
⎧ SET ⎫ PORTS PortList PASSWORD ⎪ ⎪
⎨ ⎬ ⎨ ⎧ ⎫ ⎬
⎩ DEFINE ⎭ ALL ⎪ ⎪ ENABLED ⎪ ⎪
⎪ INCOMING ⎨ ⎬ ⎪
⎪ ⎪ DISABLED ⎪ ⎪
⎩ ⎩ ⎭ ⎭
Controls whether or not the login password is required to log in to an SCS port. The Set/Define Server
Login Password command is used to set the password.
Errors The virtual port (port 0) password must be enabled or disabled with the Define
command.
Parameters PortList/All
Specifies a particular port or group of ports, or all ports. Port numbers should
be separated with commas (for lists) or dashes (for ranges).
Note: In the absence of a PortList or the All parameter, the configuration will affect the
current port only.
Incoming
When enabled, users who Telnet or SSH directly to the target serial port are
forced to provide the login password.
Defaults Disabled
See Also Set/Define Server Login Password, page 12-121; Login Password, page 8-10
12-78
Command Reference Port Commands
Allows the SCS to work with PocketPC type devices. Enables and disables client/server negotiation when
starting a PPP connection.
Parameters PortList/All
Specifies a particular port or group of ports, or all ports. Port numbers should
be separated with commas (for lists) or dashes (for ranges).
Note: In the absence of a PortList or the All parameter, the configuration will affect the
current port only.
⎧ ⎫
⎪ ⎧ ⎫ ⎪
⎧ SET ⎫ PORTS PortList PREFERRED ⎪ RLOGIN ⎪ host :EnvString ⎪ ⎪
⎨ ⎬ ⎨ SSH ⎨ ⎬ ⎬
⎩ DEFINE ⎭ ALL ⎪ ⎪ ⎪ ⎪
⎪ NONE
TCP ⎩ ⎭ ⎪
⎩ ⎭
Specifies a default service for this port. The SCS will attempt to use the preferred service for
Autoconnecting, as well as when no service name is specified in a Connect, Telnet, SSH, or Rlogin
command.
Restrictions Requires privileged user status if you want to use this command on ports other
than your own.
Parameters PortList/All
Specifies a particular port or group of ports, or all ports. Port numbers should
be separated with commas (for lists) or dashes (for ranges).
Note: In the absence of a PortList or the All parameter, the configuration will affect the
current port only.
12-79
Command Reference Port Commands
Rlogin
Specifies that the service is a default Rlogin connection. Must be used in
conjunction with the hostname parameter.
SSH
Specifies that the service is a default SSH connection. Must be used in
conjunction with the hostname parameter.
TCP
Specifies that the service is a default TCP connection. If there is no local
nameserver defined, the host must be specified with a numeric hostname. Must
be used in conjunction with the hostname parameter.
hostname
TCP host name of 40 characters or less, or an IP address in standard numeric
format (for example, 192.0.1.3).
envstring
Sets up the connection environment before the session is started. The string is
constructed with a sequence of key letters, some of which are prefaced by
either the “+” or “-.” For the available key letters and usage instructions, see
Appendix A, Environment Strings. If no environment string is specified with
the TCP parameter, the connection will default to a Telnet connection.
Defaults None
See Also Connect, page 12-20; Rlogin, page 12-22; Set/Define Ports Autoconnect, page
12-59; Define Ports Dedicated, page 12-68; Setting Session Characteristics,
page 8-7
12-80
Command Reference Port Commands
Enables PPP to run on the specified port and configures PPP-related settings. This command does not start
PPP. You can use this command to specify a per port username and password to authenticate information
outbound from the SCS, for example, CHAP Secrets. If you do not specify the per port fields, the username
and password from the appropriate site is used for the connection.
Parameters PortList/All
Specifies a particular port or group of ports, or all ports. Port numbers should
be separated with commas (for lists) or dashes (for ranges).
Note: In the absence of a PortList or the All parameter, the configuration will affect the
current port only.
Enabled/Disabled
Enables or disables PPP on a specified port, but does not start PPP.
Dedicated
Configures a port to always be in PPP mode. The port will automatically run
PPP when it is started. No other protocol can be run on the port; it will continue
to run until it is logged out.
12-81
Command Reference Port Commands
ACCM
Enters an asynchronous control map in hexadecimal. Bits turned on represent
ASCII characters that will be escaped in the PPP data stream. See Character
Escaping on page 7-1 for more information.
map
A hexadecimal value between 0x00000000 and 0xffffffff.
XONXOFF
A default map that escapes the XON and XOFF software flow control
characters.
CHAP
Configures the Challenge Handshake Authentication Protocol (CHAP). See
PPP Authentication on page 7-2
PAP
Configures the Password Authentication Protocol (PAP). See PPP
Authentication on page 7-2 for more information.
Both
Enables authentication for both this node and the remote node.
Disabled
Turns off CHAP/PAP authentication.
Local
The SCS will authenticate itself to the SCS.
Remote
The remote node will authenticate itself to the SCS.
Counter
Specifies the number of configuration retries for the Link protocol and all
Network Control protocols.
Configure
Specifies the number of Configure-Requests to send before giving up
negotiation.
Failure
Specifies the number of Configure-Naks to send before giving up negotiation.
Terminate
Specifies the number of Terminate-Requests to send before disconnecting.
num
An integer between 1 and 255.
HeaderCompression
Enables or disables compression of PPP headers. See Header Compression on
page 7-1 for more information.
MagicNumber
Controls PPP magic numbers.
12-82
Command Reference Port Commands
ProtocolCompression
Configures the compression of protocol information in PPP.
Timeout
Sets the timeout value, in tenths of seconds, for the Link Control Protocol and
all Network Control protocols.
time
An integer between 1 and 255, representing a length of time in tenths of
seconds. For example, a setting of 25 equals 2.5 seconds.
Multilink
Allows the SCS to add the specified port to a PPP connection to increase
bandwidth on demand.
Username
A specific per-port username for authenticating data outbound from the SCS,
for example, CHAP Secrets.
Password
A specific per-port password for authenticating data outbound from the SCS,
for example, CHAP Secrets.
12-83
Command Reference Port Commands
See Also Define Ports PPPdetect, page 12-84; Purge Port PPP, page 12-53; Show/
Monitor/List Logging PPP, page 12-179; Set PPP, page 12-95; Show/Monitor/
List Ports PPP, page 12-96; Chapter 7, PPP
⎧ ⎫
DEFINE PORTS PortList PPPDETECT ⎨ ENABLED ⎬
ALL ⎩ DISABLED ⎭
Parameters PortList/All
Specifies a particular port or group of ports, or all ports. Port numbers should
be separated with commas (for lists) or dashes (for ranges).
Note: In the absence of a PortList or the All parameter, the configuration will affect the
current port only.
Defaults Enabled
See Also Define Ports PPP, page 12-81; Purge Port PPP, page 12-53; Set/Define
Logging PPP, page 12-172; Set PPP, page 12-95; Show/Monitor/List Ports
PPP, page 12-96; Chapter 7, PPP
If enabled, the server will verify that the port is online before sending data to it.
Parameters PortList/All
Specifies a particular port or group of ports, or all ports. Port numbers should
be separated with commas (for lists) or dashes (for ranges).
Note: In the absence of a PortList or the All parameter, the configuration will affect the
current port only.
Defaults Disabled
12-84
Command Reference Port Commands
Setting a port to Secure status restricts its access to SCS commands and the ability to get information about
other ports using Show/List commands. Privileged commands are not available to secure users. Certain
other commands cannot be entered for a port other than the secure user’s own port.
Parameters PortList/All
Specifies a particular port or group of ports, or all ports. Port numbers should
be separated with commas (for lists) or dashes (for ranges).
Note: In the absence of a PortList or the All parameter, the configuration will affect the
current port only.
Defaults Disabled
See Also Preferred/Dedicated Protocols & Hosts, page 8-8; Chapter 11, Security
Spools idle serial data to the RAM disk, where it is logged into a file that can be accessed later. The file will
be saved in the form “/ram/Port_xx.log” where xx is the port number. This command also indicates the
maximum size of the log file and changes the specified port to Access Remote.
If the file size reaches the limit set by this command, the file will be truncated to half its current size, and
will start logging again. The oldest data will be discarded.
Parameters PortList/All
Specifies a particular port or group of ports, or all ports. Port numbers should
be separated with commas (for lists) or dashes (for ranges).
Note: In the absence of a PortList or the All parameter, the configuration will affect the
current port only.
12-85
Command Reference Port Commands
number
The maximum size, in KB, of the log file. Enter an integer between 0 and 250.
A value of 0 turns logging off.
Defaults No logging
See Also Set/Define Ports Access, page 12-57; Define Email, page 12-55; Define Ports
Event Email Serialdata, page 12-71; Event Port Logging, page 12-2
Limits the number of active sessions on a port. The maximum number of session configured for a port
cannot exceed the server session limit.
Parameters PortList/All
Specifies a particular port or group of ports, or all ports. Port numbers should
be separated with commas (for lists) or dashes (for ranges).
Note: In the absence of a PortList or the All parameter, the configuration will affect the
current port only.
limit
An integer between 0 and 8.
None
Allows the maximum number of sessions.
See Also Set/Define Server Session Limit, page 12-126; Port-Specific Session
Configuration, page 8-4
Determines whether or not the DSR signal will be checked for when remote connections to the port are
made. If enabled, remote connections to the port will not be permitted unless the DSR signal is asserted.
12-86
Command Reference Port Commands
Parameters PortList/All
Specifies a particular port or group of ports, or all ports. Port numbers should
be separated with commas (for lists) or dashes (for ranges).
Note: In the absence of a PortList or the All parameter, the configuration will affect the
current port only.
Defaults Disabled
⎧ ENABLED ⎫
PortList ⎪ ⎪
DEFINE PORTS SLIP ⎨ DISABLED ⎬
ALL ⎪ ⎪
⎩ DEDICATED ⎭
The Enabled and Disabled parameters determine whether or not SLIP can be run on the specified port. The
Dedicated parameter devotes that port to SLIP mode.
Parameters PortList/All
Specifies a particular port or group of ports, or all ports. Port numbers should
be separated with commas (for lists) or dashes (for ranges).
Note: In the absence of a PortList or the All parameter, the configuration will affect the
current port only.
Dedicated
The specified port will automatically run SLIP when it is started. No other
protocol can be run on the port; it will continue to run SLIP until it is logged
out.
Defaults Disabled
See Also Set/Define Ports SLIPdetect, page 12-88; Set SLIP, page 12-96; Show/
Monitor/List Ports SLIP, page 12-96; Starting PPP/Slip for Incoming
Connections, page 4-11
12-87
Command Reference Port Commands
Automatically detects and starts running SLIP. Be aware that automatically running SLIP is a potential
security hazard.
Parameters PortList/All
Specifies a particular port or group of ports, or all ports. Port numbers should
be separated with commas (for lists) or dashes (for ranges).
Note: In the absence of a PortList or the All parameter, the configuration will affect the
current port only.
Defaults Disabled
See Also Starting PPP or SLIP Using Automatic Protocol Detection, page 4-12
Restrictions Requires privileged user status if you want to use this command on ports other
than your own. Secure users may not use this command.
Parameters PortList/All
Specifies a particular port or group of ports, or all ports. Port numbers should
be separated with commas (for lists) or dashes (for ranges).
Note: In the absence of a PortList or the All parameter, the configuration will affect the
current port only.
speed
One of the following baud rates: 300, 600, 1200, 2400, 4800, 9600, 19200,
38400, 57600, 115200, and 230400.
12-88
Command Reference Port Commands
See Also Set/Define Ports Autobaud, page 12-58; Modem Speeds, page 9-2
Specifies the stop bit count for the port. The default is to use one stop bit.
Restrictions Requires privileged user status if you want to use this command on ports other
than your own. Secure users may not use this command.
Parameters PortList/All
Specifies a particular port or group of ports, or all ports. Port numbers should
be separated with commas (for lists) or dashes (for ranges).
Note: In the absence of a PortList or the All parameter, the configuration will affect the
current port only.
Defaults 1 stop bit
If Telnet Pad is enabled (the default), the server automatically pads carriage returns with null characters for
Telnet sessions.
Restrictions Requires privileged user status if you want to use this command on ports other
than your own.
12-89
Command Reference Port Commands
Parameters PortList/All
Specifies a particular port or group of ports, or all ports. Port numbers should
be separated with commas (for lists) or dashes (for ranges).
Note: In the absence of a PortList or the All parameter, the configuration will affect the
current port only.
Defaults Enabled
Specifies a terminal type for the port. The terminal type is reported to the destination node in Telnet and
Rlogin sessions. Example terminal types might be VT100 or IBM1000.
Restrictions Requires privileged user status if you want to use this command on ports other
than your own.
Parameters PortList/All
Specifies a particular port or group of ports, or all ports. Port numbers should
be separated with commas (for lists) or dashes (for ranges).
Note: In the absence of a PortList or the All parameter, the configuration will affect the
current port only.
TermString
Enter a string of up to 8 characters in length.
None
Clears the field. There is no terminal type configured by default.
⎧ ANSI ⎫
⎧ SET ⎫ PORTS PortList TYPE ⎪ ⎪
⎨ ⎬ ⎨ SOFTCOPY ⎬
⎩ DEFINE ⎭ ALL ⎪ ⎪
⎩ HARDCOPY ⎭
12-90
Command Reference Port Commands
Restrictions Requires privileged user status to use this command on ports other than your
own.
Parameters PortList/All
Specifies a particular port or group of ports, or all ports. Port numbers should
be separated with commas (for lists) or dashes (for ranges).
Note: In the absence of a PortList or the All parameter, the configuration will affect the
current port only.
ANSI
VT100 compatible devices.
Softcopy
VT100 without clear screen or cursor controls.
Hardcopy
Deleted characters are echoed between backslashes; there is no cursor
movement.
Defaults Softcopy
Used to specify a username for the port. When the username is defined, you will not be asked for one when
logging in to the port.
Restrictions Requires privileged user status to use this command on ports other than your
own. Secure users may not use this command.
Parameters PortList/All
Specifies a particular port or group of ports, or all ports. Port numbers should
be separated with commas (for lists) or dashes (for ranges).
Note: In the absence of a PortList or the All parameter, the configuration will affect the
current port only.
username
A name of up to 16 characters in length, converted to all uppercase unless
enclosed in quotes.
None
Clears a current username.
12-91
Command Reference Port Commands
Defaults None
When enabled, the server will issue informational messages whenever a session is connected, disconnected,
or switched.
Restrictions Requires privileged user status if you wish to use this command on ports other
than your own.
Parameters PortList/All
Specifies a particular port or group of ports, or all ports. Port numbers should
be separated with commas (for lists) or dashes (for ranges).
Note: In the absence of a PortList or the All parameter, the configuration will affect the
current port only.
Defaults Enabled
⎧ ⎫
⎪ ⎪
SET ⎨ PRIVILEGED OVERRIDE ⎬
⎪ NOPRIVILEGED ⎪
⎩ ⎭
Changes the current port’s privilege status. Only one port on the server can be privileged at any time. The
Override parameter is provided to force your current port to become the privileged port (and the previously
privileged port loses the privilege).
When changing your port to privileged status, you will be queried for the privileged password. The factory
default privileged password is system; this password can be changed with the Set Server Privileged
Password command. If the password is forgotten, the server can be reset to factory defaults using the
Initialize commands.
Restrictions To use the Privileged parameter, you must know the privileged password.
Secure users cannot become privileged.
12-92
Command Reference Port Commands
See Also Set/Define Ports Security, page 12-85; Privileged Password, page 2-8
⎧ ⎫
⎪ ⎧ DISABLED ⎫ ⎪
⎪ ⎨ ⎬ ⎪
⎪ ⎩ ENABLED ⎭ ⎪
⎪ ⎪
⎪ ⎪
⎪ ⎧ 2WIRE ⎫ ⎪
⎪ MODE ⎨ ⎬ ⎪
⎪ ⎩ 4WIRE ⎭ ⎪
⎪ ⎪
DEFINE PROTOCOLS RS485 ⎨ ⎬
⎪ ⎪
⎪ TERMINATION ⎧ ENABLED ⎫ ⎪
⎪ ⎨ ⎬ ⎪
⎪ ⎩ DISABLED ⎭ ⎪
⎪ ⎪
⎪ ⎪
⎪ ⎧ ALWAYS ⎫ ⎪
⎪ TXDRIVE ⎨ ⎬ ⎪
⎪ ⎩ AUTO ⎭ ⎪
⎩ ⎭
Enables RS-485 networking and configures the necessary RS-485 parameters on the SCS200.
Parameters Enabled/Disabled
Enables or Disables RS-485 mode. By default, the SCS is configured for RS-
232 networking.
Mode
When RS-485 Mode is enabled, you must choose either two-wire or four-wire
mode. If you do not explicitly set a mode with this command, the SCS will
default to four-wire mode.
2Wire
Sets the SCS to use two-wire mode.
4Wire
Sets the SCS to use four-wire mode.
12-93
Command Reference Port Commands
Termination
Enable termination whenever you are using long cable runs and Disable it at
other times. Only end nodes should be terminated.
TXDrive
Controls how the SCS drives the TX pin.
Always
Sets the SCS to drive TX. The SCS will never tristate TX, even if data is not
being sent. Always is only valid for four-wire mode.
Auto
Sets the SCS to drive TX only when transmitting, and tristate when not
transmitting.
Defaults Disabled
Mode = 4Wire
Termination disabled
TXDrive = Always
See Also Show RS485, page 12-98; RS-485 Configuration, page 8-15
⎧ ⎫
⎪ ⎧ DELETE ⎫ ⎪
⎪ DELETE ⎨ ⎬ ⎪
⎪ ⎩ BACKSPACE ⎭ ⎪
⎪ ⎪
⎪ ⎧ ENABLED ⎫ ⎪
⎪ ECHO ⎨ ⎬ ⎪
⎪ ⎩ DISABLED ⎭ ⎪
⎪ ⎪
⎪ ⎪
⎪ ⎧ ⎫ ⎪
SET SESSION ⎨ ⎪ ⎪
CR ⎪ ⎬
⎪ NEWLINE ⎪ ⎪
⎪ ⎨ LF ⎬ ⎪
⎪ ⎪ ⎪ ⎪
⎪ ⎪ CRLF ⎪ ⎪
⎪ ⎩ ⎭ ⎪
⎪ ⎪
⎪ INTERACTIVE ⎪
⎪ ⎪
⎪ PASSALL ⎪
⎪ PASTHRU ⎪
⎩ ⎭
Parameters Delete
Specifies which character to send as the delete character. Set Session Delete
sends a delete character (ASCII 0x7f). This command has no effect if Pasthru
or Passall are in effect. This command and the Newline command may be
helpful if you are getting odd output from a Telnet session.
12-94
Command Reference Port Commands
Backspace
Set Session Delete Backspace sends a backspace character (ASCII 0x8, or
Ctrl-H).
Echo
Enabling asks the unit to echo for TCP connections. The default is Disabled,
on the assumption that the remote host will provide echoing.
Newline
Changes what is sent to the remote service when you press the newline (usually
<Return>) key. This command has no effect if Pasthru or Passall (see below)
are in effect.
CR
Send carriage returns (ASCII 0xA) only.
LF
Send linefeeds (ASCII 0xD) only.
CRLF
Send both carriage return and linefeed.
Interactive
Allows server-specific keys (i.e. Forward, Backward, and Local) and messages
to be interpreted by the unit.
Passall
Disables server interpretation of switch characters, messages, and XON/XOFF
flow control. Used for binary transfers, such as executable files and graphics.
Pasthru
Disables server interpretation of switch characters and server messages, but not
XON/XOFF flow control. Used for ASCII file transfers.
Starts PPP on this port using the specified site’s configuration. If no site is specified, a site with the default
site characteristics will be used.
12-95
Command Reference Port Commands
Parameters IPaddress
Defines the non-negotiable remote IP address.
address
An IP address in standard numeric format (for example, 193.0.1.50).
SiteName
A name of 12 characters or less. If no site name is given, a site with the default
site characteristics will be used.
Parameters SiteName
A site name of up to 12 characters. If no site name is given, a site with the
default site characteristics will be used.
IPaddress
Defines the non-negotiable remote IP address.
address
An IP address in standard numeric format (for example, 192.75.2.0).
See Also Set/Define Ports SLIPdetect, page 12-88; Starting PPP/Slip for Incoming
Connections, page 4-11
ALL
PortNum CHARACTERISTICS
⎧ SHOW ⎫ COUNTERS
⎪ ⎪ ⎧ ⎫
⎨ MONITOR ⎬ PORTS ⎪ LOCAL ⎪ STATUS
⎪ ⎪ ⎪ DYNAMIC ⎪ SUMMARY
⎩ LIST ⎭ ACCESS ⎨ ⎬
⎪ REMOTE ⎪ PPP
⎪ ⎪
⎩ NONE ⎭ MODEM [ STATUS ]
12-96
Command Reference Port Commands
These commands display information about the server’s ports. The current port is the default, unless another
port number or All is specified. You can also get information about all the local ports having a particular
Access value. If no keywords are added to the command, the current port’s Characteristics will be shown.
If the port is a virtual port, irrelevant information (such as baud rate, parity, or flow control) will not be
displayed. Any List command performed for a virtual port will display the template port’s configuration.
Restrictions You must be the privileged user to use the Monitor command.
Secure ports cannot Show or List ports other than their own.
Errors Status and Counters parameters are not valid with List.
Parameters All
Displays information for all ports.
PortNum
Specifies a particular port.
Access
Display ports that match a specified access-type. Must be used in conjunction
with the Local, Dynamic, Remote, or None parameter.
Local
Displays ports set to Local access. Local access restricts logins on the port to
local users.
Dynamic
Displays ports set to Dynamic access. Dynamic access permits local or remote
users to log into the port.
Remote
Displays ports set to Remote access. Remote access restricts logins on the port
to remote (network) users.
None
Displays ports with access set to None. None prevents all access to the port,
including user logins.
Characteristics
Displays information from the operational database about the specified ports,
including the port’s settings, such as baud rate, parity, preferred services,
name, username, port buffering setting, and group codes.
Counters
Displays the port’s local and remote accesses as well as any communication
errors.
Status
Displays information regarding the port’s serial connections, including the
current flow control state and the state of the DSR and DTR signals.
12-97
Command Reference Port Commands
Summary
Displays a one-line summary of information about the specified ports. The
information includes type of access, status, and services offered. The Summary
option shows the access type, any offered services, and the login status of the
port.
PPP
Displays information about the Point to Point Protocol's Link Control Protocol
on the specified ports.
Modem
Displays information about modem control and configuration strings on the
specified ports.
Status
The Modem Status option shows the last connect speed of the modem
connected to the specified port(s), and the last available Caller-ID information
for the port(s). Modem control must be enabled for this command to work.
Note: The Modem Status option is of no use for remote access or no access ports.
SHOW RS485
Displays the current RS-485 networking settings, including wire mode, termination, and TXDrive.
See Also Define Protocols RS485, page 12-93; RS-485 Configuration, page 8-15
Restrictions You must be the privileged user to use the Monitor command.
12-98
Command Reference Port Commands
Parameters PortNum
Specifies a particular port.
All
Displays the sessions currently running on all ports.
See Also Set/Define Ports Security, page 12-85; Port-Specific Session Configuration,
page 8-4
Tests a serial port’s connection by sending a continuous stream of ASCII alphabetic characters until the
number of lines specified by Count is reached. You can stop the test by pressing any key.
Virtual and multisession-enabled ports can only be tested by the user on that
port.
Parameters PortNum
Specifies a particular SCS port.
PostScript
Sends a Postscript test page to the port instead of ASCII data.
Count
Specifies the number of test lines to be send, or if in postscript mode, the
number of pages to print. Any character will terminate the test. Must be used
in conjunction with the lines parameter.
lines
The number of lines to be sent to the port. There is no line limit.
Width
The number of characters per line in the test pattern. Must be used in
conjunction with the characters parameter.
characters
Enter an integer between 1 and 132, inclusive.
12-99
Command Reference Port Commands
DTR
Lowers and then raise the DTR signal on the serial port. If a delay is not
specified, DTR will lower for approximately one second and then raise.
Delay
Lowers DTR will for the specified delay length, then raises DTR.
time
Enter a delay time from 50 to 3,000 (milliseconds).
Unlocks a locked port, which may be necessary if the user has locked the port and forgotten the password.
The command does nothing if the port is already unlocked.
Parameters PortNum
The number of the locked SCS port.
See Also Lock, page 12-52; Locking a Port, page 8-9; Locking a Port, page 11-21
12-100
Command Reference Service Commands
⎧ CLEAR ⎫ ⎧ LOCAL ⎫
⎨ ⎬ SERVICE ⎨ ⎬
⎩ PURGE ⎭ ⎩ ServiceName ⎭
Removes an SCS service. Clearing a service only disables it until re-initialization of the SCS. For a
permanent removal, the Purge command must be used.
Errors Clear Service fails when there are sessions connected to the service or when
there are connect requests in the service’s queue. These conditions can be
corrected with the Logout Port and Remove Queue commands.
Parameters Local
Specifies that all local services should be removed.
ServiceName
A specific service to be removed.
⎧ ⎫
⎪ ENTRYnumber ⎪
⎪ ⎪
REMOVE QUEUE ⎨ NODEname ⎬
⎪ SERVICEname ⎪
⎪ ALL ⎪
⎩ ⎭
Removes requests for local services from that service’s queue. A particular request or all requests may be
specified.
Parameters Entry
Specifies a particular queue entry to be removed. Must be used in conjunction
with the number parameter.
12-101
Command Reference Service Commands
number
A queue entry number.
Node
Specifies a particular node from which all connection requests will be
removed. Must be used in conjunction with the name parameter.
Service
Specifies a particular local service; all entries queued to this service will be
deleted. Must be used in conjunction with the name parameter.
name
A node or service name.
All
Removes all entries in the local service queue.
Creates a new service. For the description and syntax of particular parameters used in conjunction with this
command, refer to the individual entries that follow.
Parameters ServiceName
A string of up to 16 alphanumeric characters. Spaces are not permitted.
12-102
Command Reference Service Commands
Specifies whether the SCS should print a banner page before starting the job. Banners should be disabled
(the default) for all PostScript and plotter (binary) data.
Defaults Enabled
If the binary characteristic is enabled on a service, character translation (i.e. <cr> to <cr><lf> translation)
and tab expansion will be permitted on the print data. The binary characteristic should be disabled when
printing PCL data.
Defaults Disabled
Specifies a string to be sent to the attached device at the end of every job regardless of network protocol.
Parameters EndString
Any ASCII characters, or non-ASCII characters entered as hexadecimal digits
(e.g. \45). The combined length of the SOJ and EOJ strings must not exceed 62
characters.
12-103
Command Reference Service Commands
None
Clears any previously-configured string.
If enabled (the default), the SCS will append a formfeed at the end of any LPR print jobs.
Defaults Enabled
Parameters string
Enter an information string of up to 40 characters.
12-104
Command Reference Service Commands
Provides a password for the specified service. Local connections to service and IP connections to TelnetPort
or TCPPort sockets will be prompted for this password.
Parameters Password
Enter a password of up to six characters.
ServiceName
Specifies a service name of up to 16 characters. Spaces are not permitted.
Specifies a list of ports that will support or offer this service. If Enabled or Disabled is specified, the ports
listed will be added to or removed from the current list, respectively. If neither option is specified, the new
port list will replace the old port list. Note that ports offering a service must be in the correct access mode
for connections to succeed.
Parameters PortList/All
Specifies a particular port or group of ports, or all ports. Port numbers should
be separated with commas (for lists) or dashes (for ranges).
Note: In the absence of a PortList or the All parameter, the configuration will affect the
current port only.
Defaults Disabled
See Also Clear/Purge Service, page 12-101; Set/Define Ports Access, page 12-57
12-105
Command Reference Service Commands
If enabled, the SCS will assume there is a PostScript printer attached to the service ports and will try to
ensure a job is done before starting another. It will send a Ctrl-D to the attached device and wait for the new
printer to return a Ctrl-D before starting the job transfer. If this is not done, slower printers may lose new
jobs while interpreting the previous job. Setting PostScript mode is strongly recommended for all PostScript
queues.
Defaults Disabled
Controls whether the SCS will place a PostScript wrapper around each job. The SCS will try to detect if it
is already a PostScript job, in which case it would not add an additional wrapper.
Defaults Enabled
12-106
Command Reference Service Commands
Specifies a string to be sent to the attached device at the start of every access regardless of network protocol.
Parameters StartString
Any ASCII characters, or a backslash and two hex digits.
None
Clears any previously-configured string. No string is configured by default.
Associates a TCP listener socket with the given service. TCP connections to this socket will be connected
to the service.
Parameters SocketNum
A particular socket. The socket number can be an integer from 4000 to 4999.
None
Clears the current socket number.
Defaults None
12-107
Command Reference Service Commands
Associates a TCP listener socket with the given service. TCP connections to this socket will be connected
to the service. Unlike the TCPport option, a Telnetport socket will do Telnet IAC negotiations on the data
stream.
Parameters SocketNum
A particular socket. The socket number can be an integer from 4000 to 4999.
None
Clears the current socket number.
Defaults None
This command is used to display the characteristics of the services on the network. Remember that this list
is masked by the services that this port is eligible to see—users will not see services they cannot connect to.
Restrictions You must be the privileged user to use the Monitor command.
Parameters Local
Displays those services local to this server, whether available or not.
service
Specifies a particular service. Numbers and wildcards are permitted.
All
Displays all known services usable by the current port.
Characteristics
Displays information about the known (local and remote) services.
Information includes service rating, group code, and if the service is local, the
service ports and service flags (such as Queueing and Connections).
Summary
Displays one-line summary information for the specified services.
12-108
Command Reference Service Commands
Status
Displays full information for the specified services including network address,
protocol version, and other services that node offers.
12-109
Command Reference Service Commands
12-110
Command Reference Server Commands
⎧ CLEAR ⎫ ⎧ ALL ⎫
⎨ ⎬ MENU ⎨ ⎬
⎩ PURGE ⎭ ⎩ MenuNum ⎭
Parameters All
Clears all menu entries.
MenuNum
An integer from 1 through 36 specifying a particular menu entry to be
removed.
See Also Set/Define Menu, page 12-112; Set/Define Ports Menu, page 12-76; Show/
Monitor/List Menu, page 12-129; Enabling Menu Mode, page 8-12
⎧ ⎫
⎪ CANCEL ⎪
⎪ DELAYdelay ⎪
⎪ ⎪
INITIALIZE SERVER ⎨ FACTORY ⎬
⎪ ⎪
⎪ NOBOOT ⎪
⎪ RELOAD ⎪
⎩ ⎭
Controls SCS initialization and behavior after the unit is booted. When the server is initialized, all changes
made using Set commands will be lost unless corresponding Define or Save commands were also made.
Initialization also sets local authentication in the first precedence slot (i.e. Set/Define Authentication Local
Precedence 1).
Parameters Cancel
Cancels any pending initialization.
12-111
Command Reference Server Commands
Delay
Schedules the initialization to take place after a specified number of minutes.
Must be used in conjunction with the delay parameter.
delay
An integer between zero and 120, representing seconds before the
initialization. Zero specifies an immediate reboot.
Note: Show/Monitor/List Server will display the time remaining before a scheduled
initialization.
Factory
Reloads the factory settings. All configurations made with the Define and Save
commands will be cleared and will have to be reconfigured.
Noboot
Forces the SCS to remain in the Boot Configuration Program (BCP) instead of
booting.
Reload
On Flash ROM equipped units, re-downloads the operational code and
reprograms the Flash ROM.
See Also Rebooting, page 2-5; Reloading Operational Software, page 2-6
Configures individual Menu Mode menu choices and the menu’s title banner. You can also configure the
menus using a preconfigured text file, which is specified using the filename parameter and is normally saved
on the flash disk .
When using a configuration file, use the Set Menu command to parse the file before using Define to commit
the file into use.
Note: You should add a menu entry that allows users to log out. This can be
accomplished by adding a “Logout Port Port” command to the end of the menu.
Restrictions Requires privileged user status.
Errors The Define command only works with the File parameter if the file is saved in
/flash.
12-112
Command Reference Server Commands
Parameters ItemNum
A number (1 through 36) and corresponds to the menu entry you are changing.
String
A text string, up to 32 characters long, that is displayed to users in the menu
screen.
Command
A string of text, up to 32 characters long, that is displayed to users in the menu
screen.
TitleString
An optional title for the entire menu. Enter up to 5 title lines with up to 48
characters each. The title can include dynamic print variables, as shown in the
table below.
Note: Dynamic print variables are case-sensitive. You must use all capital letters in the
variables to avoid problems.
filename
Enter the name of the text file that contains your menu configurations.
See Also Show/Monitor/List Menu, page 12-129; Clear/Purge Menu, page 12-111;
Enabling Menu Mode, page 8-12; Configuring Menu Mode, page 3-4; Menu
Configuration Files, page 3-5
12-113
Command Reference Server Commands
Enables or disables the on-board FTP server. Disabling the FTP server results in greater security.
Defaults Enabled
See Also Disabling the FTP and HTTP Servers, page 11-23
⎧ ENABLED ⎫
⎧ SET ⎫ PROTOCOL HTTP ⎪ ⎪
⎨ ⎬ ⎨ DISABLED ⎬
⎩ DEFINE ⎭ ⎪ ⎪
⎩ SECURE ⎭
Controls whether the user can log in using the web browser interface.
Defaults Enabled
Parameters Enabled
Normal (non-privileged) users are allowed to view the web pages but must
become the superuser to make any configuration changes.
Disabled
No access is allowed to the web pages.
Secure
Superuser access is required to view any web pages.
See Also Disabling the FTP and HTTP Servers, page 11-23
V1ONLY
⎧ SET ⎫ PROTOCOL SSH MODE V1PREFER
⎨ ⎬
⎩ DEFINE ⎭ V2ONLY
V2PREFER
Allows the user to specify they types of SSH connections allowed from the command prompt of the SCS.
12-114
Command Reference Server Commands
Parameters V1ONLY
The SCS offers only SSHv1 incoming and outgoing connections.
V1PREFER
The SCS offers both v1 and v2 incoming (host to SCS) connections, and the
client chooses. If both versions are available, the SCS chooses SSHv1 for (SCS
to Host) outgoing connections.
V2ONLY
The SCS offers only SSHv2 incoming and outgoing connections.
V2PREFER
The SCS offers both v1 and v2 incoming (host to SCS) connections, and the
client chooses. If both versions are available, the SCS chooses SSHv2 for
outgoing (SCS to Host) connections.
Defaults V2PREFER
⎧ SET ⎫ ⎧ ENABLED ⎫
⎨ ⎬ SERVER ALTPROMPT ⎨ ⎬
⎩ DEFINE ⎭ ⎩ DISABLED ⎭
Enables or disables the alternate UNIX-like prompts at login time. When enabled, the “Username>” prompt
is changed to “login:” and the “Password>” prompt is changed to “Password:.”
Defaults Disabled
Defaults Enabled
12-115
Command Reference Server Commands
Specifies a bootgateway, which allows a router to be used when the SCS attempts to download new code
through a routed network.
Parameters IPaddress
An IP address in standard numeric format (for example, 193.0.1.50).
Defaults Enabled
Specifies the size of the buffer (in bytes) used for TCP/IP connections. The size can be increased for large
data transfers such as file transfers.
Parameters buffersize
Specify the buffer size in bytes between 128 and 8192.
12-116
Command Reference Server Commands
Manually sets. the date and time information on the server clock.
Parameters time
Enter the time in 24-hour hh:mm:ss format. Entering seconds is optional.
date
Enter the date in mm/dd/yyyy format.
See Also Set/Define IP Timeserver, page 12-46; Show/Monitor/List Server Clock, page
12-129; Show/Monitor/List Timezone, page 12-131; Setting the Date and
Time, page 2-10
If a DHCP server exists on the network, enabling it will provide the SCS with an IP address, gateway
address, and subnet mask.
Defaults Enabled
12-117
Command Reference Server Commands
Sets the maximum number of TCP/IP hosts learned from Rwho that the server will keep information for.
Hosts from the preset host table are exempt from this limit. If the new limit is less than the current limit and
the host table is full, the limit will be slowly weeded down to the new value.
Parameters limit
A value between 0 and 200.
None
No limit is set.
⎧ SET ⎫
⎨ ⎬ SERVER INACTIVITY TIMER limit
⎩ DEFINE ⎭
Sets the period of time after which a port with Inactivity Logout enabled is considered inactive and is
automatically logged out.
Parameters limit
Enter an inactivity period of 1 to 120 minutes.
Defaults 30 minutes
12-118
Command Reference Server Commands
⎧ ⎫
⎪ TELNET ⎪
⎪ NONE ⎪
⎧ SET ⎫ SERVER INCOMING ⎪ ⎪
⎨ ⎬ ⎨ PASSWORD ⎬
⎩ DEFINE ⎭ ⎪ ⎪
⎪ NOPASSWORD ⎪
⎪ SECURE ⎪
⎩ ⎭
Allows or denies incoming connections and enforces password protection if desired. If None is applied,
incoming SSH connections will also be denied. The Show Server command shows the status of incoming
connection parameters.
The status of the Incoming Telnet also controls incoming Rlogin sessions from remote hosts—the Set/
Define Server Rlogin command controls outgoing Rlogin connections.
Parameters Telnet
Enables incoming Telnet connects (logins) to the server.
None
Prevents all login attempts.
Password
Requires incoming Telnet login attempts to supply the server login password
before being logged in.
NoPassword
Incoming Telnet logins are permitted and are not prompted for the login
password before connecting.
Secure
Completely disables all non-encrypted connections to the server (Telnet in,
Rlogin in, 200X sockets, and 300X sockets). You will not be able to connect
to the server using EZWebCon.
Defaults Telnet
NoPassword
Note: The default incoming password is “access.” See the Set/Define Server Login
Password command for more information.
12-119
Command Reference Server Commands
See Also Set/Define Server Rlogin, page 12-125; Set/Define Server Login Password,
page 12-121; Login Password, page 8-10, Restricting Connections to SSH,
page 6-17, Disabling HTTP and FTP, page 6-17
⎧ SET ⎫ SERVER
⎨ ⎬ SECONDARY LOADHOST IPaddress
⎩ DEFINE ⎭
Specifies the host to be used for downloads from TCP/IP hosts. The host name must be a numeric IP-style
address. The SCS requests its run-time code from this host.
Parameters IPaddress
An IP address in standard numeric format (for example, 193.0.1.50).
Controls whether or not local users are permitted to Lock their ports.
Defaults Enabled
12-120
Command Reference Server Commands
Specifies the password that is used to log in to the server from the serial ports or the network. If the password
is not given on the command line, you will immediately be prompted to enter the password, which will not
be displayed when typed.
The login password is only required on ports that have been Password Enabled.
Parameters password
Enter a password of 16 or fewer characters.
Defaults “access”
Specifies the name of the SCS. The name string must be in quotes if lowercase characters are used.
Parameters ServerName
Assign a name to the SCS, 16 alpahanumeric characters or less.
Defaults SCS_xxxxxx where xxxxxx represents the last 3 segments of the unit’s
hardware address.
12-121
Command Reference Server Commands
⎧ SET ⎫ SERVER
⎨ ⎬ SECONDARY NAMESERVER IPaddress
⎩ DEFINE ⎭
Specifies the IP address of the name server (if any) for TCP/IP connections. This host will attempt to resolve
text hostnames into numeric form if the local host table is unable to do so.
Parameters IPaddress
The network address of the nameserving host, in numeric IP format.
See Also Set/Define IP Host Limit, page 12-38; Set/Define IP Nameserver, page 12-39;
Configuring the Domain Name Service (DNS), page 6-7
Limits the number of failures allowed when issuing the Set Privileged command, when entering the login
password when logging in to a serial port, or when Set/Define Ports Password Incoming is enabled. After
limit retries, the port will be logged out. The value is also used for determining the number of times a user
can fail an authenticated user login (e.g., local database, Radius, Secure ID) when Set/Define Ports
Authenticate is enabled.
The user can abort the password process by typing Ctrl-Z instead of the password.
This limit does not apply to SSH connections, which always have a password
limit of 3.
Parameters limit
A value between 0 and 100. If zero is specified, the port is never logged out for
too many password failures.
None
Sets the password limit to the default value.
12-122
Command Reference Server Commands
Defaults 3 tries
See Also Set Privileged/Noprivileged, page 12-92; Set/Define Ports Authenticate, page
12-58
Sets the password for becoming the “superuser” of the server. If the password is not given on the command
line, you will immediately be prompted to enter the password, which will not be displayed when typed.
Parameters passwd
Enter a password of 16 or fewer characters.
Defaults “system”
See Also Set Privileged/Noprivileged, page 12-92; Privileged Password, page 2-8
This command allows the manager to change the prompt that users see from the default Local_x> string. A
string of up to 16 characters long can be configured, and should be enclosed in quotes.
12-123
Command Reference Server Commands
Parameters PromptString
The following parameters can be included in the prompt string:
Defaults Local_%n%P
Examples (shown with the prompt that might result on the next line)
12-124
Command Reference Server Commands
⎧ SET ⎫ ⎧ ENABLED ⎫
⎨ ⎬ SERVER RARP ⎨ ⎬
⎩ DEFINE ⎭ ⎩ DISABLED ⎭
Defaults Enabled
Specifies the number of times that a TCP packet will be resent if it is not acknowledged.
Parameters LimitNum
An integer between 4 and 100, inclusive.
Defaults 50 tries
Restricts the use of the Rlogin command from the server. If Rlogins are disabled, you may not Rlogin to
remote hosts. Incoming Rlogin connections may still be permitted, depending on the current Set/Define
Server Incoming setting.
Defaults Disabled
12-125
Command Reference Server Commands
Sets the limit on active sessions per port. Each port can have an additional limit less than or equal to this
limit.
Parameters limit
A number between zero and 8.
None
The maximum possible session limit is used (8).
Defaults 4 sessions
Causes the unit to attempt to boot without sending any status messages to the console port (unless there are
errors).
Defaults Disabled
Specifies the name of the download software file (if any) the server will attempt to load at boot time. For
IP-loading hosts, this is the file that will be requested at boot time. This command is only useful if it is
Defined; if it is Set, it will be cleared/reset at boot time.
12-126
Command Reference Server Commands
For TFTP loading, the complete path of the file can also be specified if the file is located in a directory other
than the default. The path name can be up to 31 characters in length not counting the file name. The full
path must be enclosed in quotes to preserve case.
Parameters filename
Load file name, 15 characters or less. The server will automatically add the
“.SYS” extension to the name.
See Also Set/Define Server Loadhost, page 12-120; Editing Boot Parameters, page 2-6;
Your SCS Installation Guide
Configures the startup configuration file that the SCS will attempt to download at boot time. This file
contains the SCS commands that will configure the server before the users and services are started. If no
retry limit is specified in the command, the SCS will retry failed downloads forever; otherwise it will retry
the specified number of times and then boot normally.
Telnet consoles are available at the time the server attempts to download the startupfile; if there is a problem
with the download, you can still log into the server and determine what went wrong.
Parameters host
An IP address, or a text host name that is resolvable at boot time.
filename
A startup file name of up to 47 characters.
Retry
Configures the server retry limit. Must be used with the retrynum parameter.
retrynum
The number of times to retry the download attempt. The maximum number of
retries is 1000. If a retrynum is not specified, the SCS will retry 5 times (the
default).
None
Clears any specified startup file.
12-127
Command Reference Server Commands
See Also Editing Boot Parameters, page 2-6; Your SCS Installation Guide
⎧ ⎫
⎪ timezone ⎪
⎧ SET ⎫ SERVER TIMEZONE ⎪ ⎪
⎨ ⎬ ⎨ STDzone time DSTzone time ChangeTime ReverTime ⎬
⎩ DEFINE ⎭ ⎪ ⎪
⎪ NONE ⎪
⎩ ⎭
Parameters timezone
A pre-configured timezone name. Use the Show/Monitor/List command to see
a list of available timezone names.
STDzone
A three-letter timezone name that represents your Standard Time zone (for
example, use PST for Pacific Standard Time). Must be used in conjunction
with the time parameter.
DSTzone
A three-letter timezone name that represents your Daylight Savings Time zone
(for example, use PDT for Pacific Daylight Time). Must be used in conjunction
with the time parameter.
time
The time difference from Greenwich Mean Time, entered as h:mm. Entering
the minutes is optional.
ChangeTime
Enter the month, day, and time of day that the change to DST occurs,
separating each element by a space (see the examples below). For the month,
enter the first three letters of the month. For the day, recognized forms include:
For the time of day, use the same format as used for the time parameter.
RevertTime
Enter the month, day, and time of day
12-128
Command Reference Server Commands
None
Specifies that no timezone will be used.
Local>> DEFINE SERVER TIMEZONE MET 1:00 MET-DST 1:00 Mar lastSun 2:00 Sep
lastSun 2:00
(In the last example above, MET is the STDzone, and MET-DST is the DSTzone, both of which
are one hour off of Greenwich Mean Time. The change to DST occurs on the last Sunday in
March at 2:00, and it reverts back to standard time on the last Sunday in September at 2:00.)
See Also Set/Define Server Clock, page 12-117; Show/Monitor/List Timezone, page
12-131
⎧ SHOW ⎫
⎪ ⎪
⎨ MONITOR ⎬MENU
⎪ ⎪
⎩ LIST ⎭
Displays the current or saved Menu entries. If you have a configuration file set, this command will only
display the name of that file.
Restrictions You must be the privileged user to use the Monitor command.
See Also Clear/Purge Menu, page 12-111; Set/Define Menu, page 12-112; Enabling
Menu Mode, page 8-12; Configuring Menu Mode, page 3-4
⎧ SHOW ⎫ BOOTPARAMS
⎪ ⎪ CLOCK
⎨ MONITOR ⎬ SERVER
⎪ ⎪ COUNTERS
⎩ LIST ⎭ TIMEZONE
This command is used to display the global attributes or counters for the server itself.
Restrictions You must be the privileged user to use the Monitor command. The List Server
command can only be used with the Bootparams parameter.
Parameters Bootparams
Displays parameters related to rebooting the unit and reloading the software
file.
12-129
Command Reference Server Commands
Clock
Displays the local time and date and the UTC (GMT) time and date.
Counters
Counters can be reset to zero with the Zero Counters All command. Displays
the accumulated error counters for the Ethernet and TCP/IP protocols. The
four-digit bit position numbers represent one of the network error reasons
listed below:
2 At least one collision has occurred Received packet did not end on byte
while transmitting boundary
Timezone
Displays the timezone if a timezone has been specified.
See Also Set/Define Server Clock, page 12-117; Setting the Date and Time, page 2-10
12-130
Command Reference Server Commands
⎧ SHOW ⎫
⎪ ⎪
⎨ MONITOR ⎬ TIMEZONE
⎪ ⎪
⎩ LIST ⎭
Displays a table of timezone abbreviations which can be used to select a timezone for the server.
Restrictions You must be the privileged user to use the Monitor command.
⎧ SHOW ⎫
⎨ ⎬ USERS
⎩ MONITOR ⎭
Displays the current users logged onto the server. For each user, the SCS displays the port username and
current connection information.
Restrictions You must be the privileged user to use the Monitor command.
12.8.37 Source
Source attempts to download a configuration file from a TFTP host. The file is assumed to be lines of server
commands which will be executed. The Source command is most useful for trying out a configuration file
before using the Set/Define Server Startupfile command, page 12-127.
Parameters host
Enter a TFTP host (text host name or IP address).
filename
The download path and filename, 22 characters maximum.
Verify
Displays each command from the configuration file before executing it.
12-131
Command Reference Site Commands
Creates a new site with the given name. See the following Define Site commands for additional site
configuration options.
⎧ ⎫
⎪ ⎪
⎪ CHAP ⎪
⎪ ⎧ ENABLED ⎫ ⎪
⎪ PAP ⎨ ⎬ ⎪
⎪ PROMPT ⎩ DISABLED ⎭ ⎪
⎪ ⎪
⎪ ⎪
⎪ ⎧ ENABLED ⎫ ⎪
⎪ ⎪ ⎪ ⎪
⎪ DIALBACK ⎨ DISABLED ⎬ ⎪
DEFINE SITE SiteName AUTHENTICATION ⎨ ⎪ ⎪ ⎬
⎪ ⎩ INSECURE ⎭ ⎪
⎪ ⎪
⎪ ⎧ ⎫ ⎪
⎪ LOCAL
⎨
NONE
⎬ ⎪
⎪ REMOTE ⎩ password ⎭ ⎪
⎪ ⎪
⎪ ⎪
⎪ ⎧ NONE ⎫ ⎪
⎪ USERNAME ⎨ ⎬ ⎪
⎪ ⎩ username ⎭ ⎪
⎩ ⎭
Defines authentication information, such as site names and passwords, for link protocols that support
authentication (for example, PPP).
Parameters SiteName
A site name of up to 12 characters.
CHAP
Enables or disables the Challenge Handshake Authentication Protocol for
outgoing calls.
PAP
Enables or disables the Password Authentication Protocol for outgoing calls.
12-132
Command Reference Site Commands
Prompt
When Prompt is enabled, incoming callers will be prompted for the local
password before starting PPP or SLIP.
Dialback
If Dialback is enabled, when the site receives an incoming connection, the SCS
will hang up and initiate an outgoing connection to verify the caller’s identity.
If Insecure dialback is enabled, the caller may be given the option of specifying
the dialback telephone number.
The site must have at least one port and a telephone number defined for the
outgoing connection (See Define Site Port, page 12-143).
Insecure
Allows CBCP-aware PPP clients the option of choosing their own number for
dialback. Be sure to read the cautions listed under Dialback Using CBCP on
page 11-7.
Local
Defines the password required from the remote host. Must be used in
conjunction with the None or password parameters.
Remote
Defines the password to be sent to the remote host. Must be used in conjunction
with the None or password parameter.
Username
Define the username to be sent to the remote site. Must be used in conjunction
with the None or username parameters.
None
Specifies that a password or username will not need to be used.
password
A password of up to 10 alphanumeric characters.
username
A username of up to 10 characters.
12-133
Command Reference Site Commands
⎧ ⎫
⎪ ADD ⎪
⎪ utilization ⎪
⎪ REMOVE ⎪
⎪ ⎪
⎪ DEFAULT ⎪
⎪ ⎪
DEFINE SITE SiteName BANDWIDTH ⎨ INITIAL ⎬
⎪ BytesPerSecond ⎪
⎪ MAXIMUM ⎪
⎪ ⎪
⎪ PERIOD ⎪
⎪ seconds ⎪
⎪ HOLDDOWN ⎪
⎩ ⎭
Sets the initial or maximum amount of bandwidth that should be used when connecting to the specified site.
Also controls how the SCS calculates the bandwidth needed, and how often it is checked to see if it is within
the desired range.
This command is only useful when Multilink (bandwidth on demand) is enabled. See Define Ports PPP
Multilink, page 12-81, and Bandwidth On Demand on page 5-4 for more information.
Parameters SiteName
A site name of up to 12 characters.
Add
Attempts to add bandwidth whenever usage reaches a specified percentage.
Must be used in conjunction with the utilization parameter.
Remove
Removes bandwidth when usage falls below a certain percentage. Must be
used in conjunction with the BytesPerSecond parameter.
utilization
The percentage of usage above which the SCS will attempt to add bandwidth
and below which the SCS will remove bandwidth.
Default
Returns the bandwidth to the SCS’s default setting.
Initial
Sets the initial amount of bandwidth. Must be used in conjunction with the
BytesPerSecond parameter.
Maximum
Sets the maximum amount of bandwidth. Must be used in conjunction with the
BytesPerSecond parameter.
12-134
Command Reference Site Commands
BytesPerSecond
The precise bandwidth amount, up to 6,550,000 bytes per second. The server
will add ports until it reaches the specified amount.
Period
Sets the number of seconds (specified by the seconds parameter) used to
calculate average utilization statistics. The value is expressed as percent usage
over a period of time.
Holddown
Specifies the minimum amount of time, in seconds, after adding or removing
bandwidth to the remote site before bandwidth can be adjusted again. Must be
used in conjunction with the seconds parameter.
Period: 60 seconds.
See Also Define Ports PPP Multilink, page 12-81; Define Site Port Bandwidth, page 12-
143; Show/Monitor/List Sites Bandwidth, page 12-149; Bandwidth On
Demand, page 5-4
12-135
Command Reference Site Commands
⎧ ⎫
⎪ ⎧ ⎫ ⎪
⎪ ⎪ ⎪ ⎪
⎪ ⎧ ⎫ ⎪
⎪ ⎪ EXPECT string ⎪ ⎪
⎪ AFTER LineNum ⎪ ⎪ ⎪
⎪ ⎪ ⎪ ⎪
DEFINE SITE SiteName CHAT ⎨ BEFORE LineNum ⎨ TIMEOUT seconds ⎨ FAIL ⎬ ⎬
⎪ ⎪ ⎬
⎪ REPLACE LineNum ⎪ ⎪ ⎪
⎪ ⎪ SEND string ⎪ ⎪
⎪ ⎪ ⎪ ⎪
⎪ ⎩ ⎭ ⎪
⎩ ⎭
⎪ ⎪
⎪ DELETE LineNum ⎪
⎩ ⎭
Configures a chat script to automate the login sequence when connecting to a remote site. Chat scripts are
a set of commands that send data to the remote site and wait for certain replies after the modems (if any)
have connected. Based on the replies, other commands are executed.
Parameters SiteName
Enter a site name of up to 12 characters.
After
Inserts a line after another line.
Before
Inserts a line before another line.
Replace
Replaces a line with another line, specified with the LineNum parameter.
Timeout
Sets the time to wait before commands, or the number of times to wait for input
before giving up. Must be used in conjunction with the seconds parameter.
seconds
A number of seconds or tries between zero and 65500.
Expect
Looks for a string before executing the next line of the script.
string
The following special characters can be used in CHAT script expect strings,
which are case-sensitive.
Table 12-5:
Fail
Uses the number specified as the Timeout seconds parameter to set the number
of times the search for a string (specified with the Expect parameter) can fail
before the whole script will give up. Each time the Expect command fails, the
script continues at the last Fail command. This permits looping while waiting
for a given prompt.
This script will send a newline and wait for the string “login:” for two seconds.
If found, the script will continue. If not, the script will search again three times
before failing.
Send
Sends the specified string, followed by a newline character (0xd hex, 13
ASCII). If a string is not specified, only a carriage return is sent.
Delete
Removes a line.
LineNum
The line to remove.
See Also Show/Monitor/List Sites Chat, page 12-149; Chat Scripts, page 5-3
12-137
Command Reference Site Commands
ENABLED
DEFINE SITE SiteName DIALONHANGUP
DISABLED
A call and hangup on any of the ports associated with this site causes the site to form an outbound call.
Parameters SiteName
Enter a site name of up to 12 characters.
⎧ ⎫
⎪ IDLE ⎪
⎪ ⎪⎧ filtername ⎫
DEFINE SITE SiteName FILTER ⎨ INCOMING ⎬⎨ ⎬
⎪ OUTGOING ⎪⎩ NONE ⎭
⎪ ⎪
⎩ STARTUP ⎭
Configures packet filters for the site. If a particular packet filter is not configured, all packets are considered
matches of that filter type and are accepted. For example, if no incoming packet filter is configured, all
packets will be accepted as incoming packets and will be allowed in.
Parameters SiteName
Enter a site name of up to 12 characters.
Idle
Configures the packet filter that resets the idle timer. Packets that pass this
filter will reset the timer, keeping the site from timing out and disconnecting.
Must be used in conjunction with the filtername parameter.
Incoming
Configures the packet filter for packets that come into the SCS from the remote
site. Packets that do not pass this filter will be dropped. Must be used in
conjunction with the filtername parameter.
Outgoing
Configures the packet filter for packets going from the SCS to the remote site.
Packets that do not pass this filter will be dropped. Must be used in conjunction
with the filtername parameter.
12-138
Command Reference Site Commands
Startup
Configures the packet filter for regulating connections. Packets that pass this
filter can cause the site to initiate a connection. Packets that do not pass this
filter will be dropped if a link is not already in place, but will continue to their
destination if a link has already been established. Must be used in conjunction
with the filtername parameter.
filtername
Sets the filter to be used for a specific type of packet filtering. Filter names
must be 3 characters or fewer.
None
Clears any previously-set filter for that site.
See Also Set/Define Filter, page 12-166; Show/Monitor/List Filter, page 12-178; Filter
Lists, page 5-2
Sets the maximum time, in seconds, that the specified site may be idle before the link is shut down (“timed
out”).
Note: The SCS must be idle for at least 10 seconds before the link can be shut down.
Parameters SiteName
Enter a site name of up to 12 characters.
seconds
The maximum length of time (specified by an integer between 10 and 65,000)
that the site can remain idle before the link disconnects. A time setting of 0 will
disable timeouts.
See Also Define Site Filter Idle, page 12-138; Set/Define Server Inactivity, page 12-118;
Reducing Cost, page 5-10
12-139
Command Reference Site Commands
Parameters SiteName
Enter a site name of up to 12 characters.
Enabled/Disabled
Enables or disables the site’s use of IP. May be used instead of packet filters to
prevent all IP packets from being forwarded.
Address
Sets the IP address (specified with the address parameter) on this server's IP
interface.
Compress
Enables or disables header compression for the specified protocol.
12-140
Command Reference Site Commands
Dynamic
Allows the SCS to be dynamically assigned an IP address by a remote host.
Default
Advertises this server as the default route to the remote host.
Netmask
Sets the IP Netmask on this server's IP interface.
mask
A value that is used to remove bits that you do not want.
Remoteaddress
Sets the IP address (specified with the address parameter) of the remote host.
If two address are specified, it indicates an acceptable range of addresses for
the remote host.
Callers cannot use IP addresses with the host part of the address set to zero or
-1; these addresses are reserved for broadcast packets. If the specified range
includes such an address (for example, 192.4.5.0 or 192.4.5.255) and a caller
requests this address, the connection will be denied.
address
An IP address in standard numeric format. For example, 192.0.1.3.
None
Clears a current IP address, Remoteaddress address, Othermask, or Netmask.
Unnumbered
An IP address is not to be expected from the remote site.
RIP
Enables or disables RIP parameters, and allows specification of update times
and hop counts for the interface.
Enabled/Disabled
Enables or disables both listen and send at the same time.
Listen
Enables or disables RIP listening only.
Send
Enables or disables RIP sending only.
Metric
Configures the cost (“hop-count”) of this interface. Routes learned through this
interface will have this value added to their metric. Must be used in conjunction
with the cost parameter.
cost
An integer between 1 and 16.
Note: Metric is commonly used to make a given interface less desirable for backup
routing situations.
12-141
Command Reference Site Commands
Update
Configures the time, in seconds, between sending a RIP packet. Must be used
in conjunction with the time parameter.
time
An integer between 10 and 255 representing the number of seconds between
updates.
Slots
Configures the number of header compression slots. Must be used in
conjunction with the SlotNum parameter.
SlotNum
An integer between 1 and 254.
See Also Set/Define Logging Sites, page 12-172; Show/Monitor/List Sites, page 12-
149; Configuring RIP for Sites, page 4-10; Chapter 7,Character Mode Sites
Configures the maximum sized packet that the remote site may send to the SCS. Packets larger than this will
be fragmented by the remote site.
Parameters SiteName
A site name of up to 12 characters.
MaxSize
Between 32 and 1522 bytes, inclusive.
Note: The SCS will negotiate MTU with the remote site, so the actual MTU may be
lower than what is configured.
Default
1522 bytes.
12-142
Command Reference Site Commands
See Also Set/Define IP All/Ethernet MTU, page 12-35; Chapter 4, Basic Remote
Networking
⎧ ⎫
DEFINE SITE SiteName PERMANENT ⎨ ENABLED ⎬
⎩ DISABLED ⎭
Configures a permanently connected site. When enabled, the site connects immediately after the SCS boots.
If the connection is interrupted and the site goes down, the site will reconnect as soon as it is able.
Parameters Enabled
Enables the specified site to be permanently connected.
Disabled
Disables a permanent connection for a site.
BANDWIDTH BytesPerSecond
⎧ ⎫ ⎧ ⎫
DEFINE SITE SiteName PORT ⎨ PortList ⎬ TELEPHONE ⎨ number ⎬
⎩ ALL ⎭ ⎩ NONE ⎭
PRIORITY priorityNum
Configures a port that a site will use for its outgoing calls. Each port must have a telephone number
associated with it. If multiple ports are associated with a site, they must be prioritized.
Note: To purge the port setting from the site, see Purge Site, page 12-148.
Parameters SiteName
A site name of up to 12 characters.
PortList/All
Specifies a particular SCS port, a list or range of ports, or all ports. Port
numbers should be separated with commas (for lists) or dashes (for ranges).
Note: A port must be defined before the Bandwidth, BytesPerSecond, and Telephone
parameters can be used.
12-143
Command Reference Site Commands
Bandwidth
Gives the SCS a bandwidth estimate for the device (for example, a modem)
that is attached to the port. Must be used in conjunction with the
BytesPerSecond parameter.
Note: See Estimate Each Port’s Bandwidth on page 5-6 for more information on how
to use the port bandwidth setting.
BytesPerSecond
The bandwidth value. The value can range from 100 to 6,550,000 bytes per
second.
Telephone
Specifies a telephone number for this port. This number will override the
number defined for the site as a whole. Must be used in conjunction with either
the number parameter or the None parameter.
number
A telephone “number” of up to 24 characters (characters can be of any type).
None
No specific telephone number will be set for this port.
Priority
Specifies a priority level for a particular port. Higher priority ports will be
dialed before ports with lower priority numbers. Must be used with the
prioritynum parameter.
priorityNum
An integer between 1 and 100 representing the priority level of the specified
port.
See Also Define Site Bandwidth, page 12-134; Show/Monitor/List Sites, page 12-149;
How Bandwidth is Controlled, page 5-5
12-144
Command Reference Site Commands
⎧ PPP ⎫
⎪ ⎪
DEFINE SITE SiteName PROTOCOL ⎨ SLIP ⎬
⎪ ⎪
⎩ NONE ⎭
Defines the “line” or “link layer” protocol that this site should use for outgoing calls. Reset the Maximum
Transmission Unit (MTU) value to the default PPP or SLIP MTU value.
Parameters SiteName
Enter a site name of up to 12 characters.
PPP
PPP will be used for outgoing calls.
SLIP
SLIP will be used for outgoing calls.
NONE
No protocol will be used for outgoing calls.
Defaults PPP
⎧ ⎫
DEFINE SITE SiteNameTELEPHONE ⎨ number ⎬
⎩ NONE ⎭
Defines the telephone number of the remote site. Before you assign a telephone number, you must associate
the site with an SCS port or ports.
Parameters SiteName
Enter a site name of up to 12 characters.
number
A telephone “number” of up to 24 characters. Characters of any type can be
used.
None
No telephone number will be defined for this site.
Default
None (no telephone number is defined).
12-145
Command Reference Site Commands
See Also Define Site Port Telephone, page 12-143; Assign a Telephone Number to the
Port or Site, page 4-19
⎧ ⎫
⎪ ADD day starttime day endtime ⎪
⎪ ⎪
⎪ ⎪
⎪ ⎧ ⎫ ⎪
⎪ DEFAULT ⎨ ENABLED ⎬ ⎪
⎪ ⎩ DISABLED ⎭ ⎪
⎪ ⎪
⎪ ⎧ ⎫ ⎪
⎪ CLEAR ⎨ number ⎬ ⎪
DEFINE SITE SiteName TIME ⎨ ⎩ ALL ⎭ ⎬
⎪ ⎪
⎪ ⎪
⎪ FORCEDIAL time ⎪
⎪ NONE ⎪
⎪ ⎪
⎪ SESSION limit ⎪
⎪ ⎪
⎪ FAILURE seconds ⎪
⎪ SUCCESS seconds ⎪
⎩ ⎭
Configures the time ranges during which outgoing connections are allowed from this site, and during which
bandwidth can be adjusted for this site.
Parameters SiteName
Enter a site name of up to 12 characters.
Add
When the Default setting is Enabled (see below), specifies when connections
are not allowed. When the Default setting is Disabled, specifies when
connections are allowed.
day
Specify the days during which Adding will start and stop. Must be followed by
both starttime and endtime parameters. If a second day is not specified, it is
understood that the start time and end time occur on the same day.
starttime, endtime
Specify the time when Add will go into effect, and the time when Add will end,
on the specified day. Times are specified in hh:mm format and are ordered with
respect to their time settings rather than the order in which they were entered.
Specified times are combined if appropriate.
Note: Show/Monitor/List Sites SiteName Time displays the specified time ranges and
their order.
12-146
Command Reference Site Commands
Default
Set the default access parameter for the site.
If the default is enabled, connections are allowed except during the times
specified. If the default is disabled, connections are restricted except during the
times specified.
Clear
Remove a time range.
number
A time range to be removed. Time ranges are listed in numerical order.
Forcedial
Configures the site to dial at a particular time of day. If a time is assigned with
this command, the site will always attempt to create a connection at that
specified time, every day.
time
Enter a time for the Forcedial feature.
All
Remove all time ranges.
Forcedial
Creates a connection, every day, at the time set with the other parameters.
Session
Sets the total time, in seconds, that this site can be active before it is logged out.
Must be used in conjunction with the limit parameter.
limit
Specify a time range from 10 to 65,000 seconds. A setting of zero disables the
session limit.
Success
Specifies a delay after a successful connection before another connection will
be attempted. Must be used in conjunction with the seconds parameter.
Failure
Specifies a delay after a failed connection attempt before another connection
will be attempted. Must be used in conjunction with the seconds parameter.
Note: The success and failure settings control the time between calls. If the connection
worked, the SCS waits for the success delay to pass before attempting another
connection. If the connection did not work, the SCS waits for the failure delay to
pass.
seconds
A delay time of 1 to 65000 seconds.
Connection
Specifies the minimum amount of time, in seconds, after a connection drops or
fails before attempting to form another connection. Must be used in
conjunction with the seconds parameter.
12-147
Command Reference Site Commands
Examples Local>> DEFINE SITE irvine TIME ADD mon 8:00 mon 17:00
Local>> DEFINE SITE irvine CLEAR TIME 3
See Also Set/Define Server Clock, page 12-117; Set/Define Server Timezone, page 12-
128; Show/Monitor/List Sites Time, page 12-149; Getting Timesetting
Information, page 5-11
LOGOUT SITESiteName
Logs out a site on the server. Active sessions are disconnected, and all site circuits are closed.
Restrictions Only privileged users can log out a port or site other than their own.
Parameters Site
Logs out a site, closing all circuits. Must be used in conjunction with the
SiteName parameter.
SiteName
A site name of up to 12 characters.
⎧ PortNum ⎫
PURGESITE ⎧⎨ SiteName ⎫⎬ PORT ⎨ ⎬
⎩ ALL ⎭ ⎩ ALL ⎭
CHAT
Parameters SiteName
Enter a site name of up to 12 characters.
12-148
Command Reference Site Commands
All
When used before the Port parameter, removes all ports from the specified site.
When used either before the Port parameter or both before and after the Port
parameter, removes all ports from all sites.
Port
Removes a port from a site. Must be used in conjunction with the PortNum or
All parameters.
PortNum
An integer between 1 and 16.
Chat
Clears the specified site’s chat scripts.
ALL
BANDWIDTH
CHAT
⎧ SHOW ⎫ COUNTERS
⎪ ⎪ SiteName
⎨ MONITOR ⎬ SITES IP
⎪ ⎪ PORTS
⎩ LIST ⎭
STATUS
TIME
STATUS SiteName
In general, displays information about a specified site. The All keyword is a special case, as described
below.
Parameters SiteName
A particular site name of up to 12 characters.
All
Displays all accumulated statistics for all sites that have started since the SCS
was last booted, not just those that are running.
Bandwidth
Displays the specified site’s bandwidth configuration and related statistics.
Chat
Displays a site's chat script.
12-149
Command Reference Site Commands
Counters
Displays a site’s counters.
IP
Displays a site's IP configuration.
Ports
Displays a site's ports.
Time
Displays time configuration for the specified site, including.
Status
Displays statistics for sites that have been active since booting.
Tests a site without having to force packet traffic. When the command is issued, the SCS will attempt a
connection to the site and return basic status. The site must then be shut down manually.
Errors An error will be returned if the site is unavailable. For more detailed
information, use the Logging feature.
See Also Define Site commands, page 12-132; Set/Define Logging, page 12-172;
Creating a New Site, page 4-3
12-150
Command Reference Security Commands
⎧ CLEAR ⎫ ⎧ ALL ⎫
USER ⎨ ⎬
⎨ ⎬AUTHENTICATION ⎩ username ⎭
⎩ PURGE ⎭
PRECEDENCE num
Parameters User
Clears or purges a user from the local authentication database.
All
Clears or purges all users.
username
A specific username to clear or purge.
Precedence
Clears or purges a given precedence slot. Must be used in conjunction with the
num parameter.
num
A precedence number of 1 through 6.
12-151
Command Reference Security Commands
⎧ CLEAR ⎫ ⎧ ALL ⎫
⎨ ⎬ DIALBACK ⎨ ⎬
⎩ PURGE ⎭ ⎩ username ⎭
Errors Clear Dialback will return an error if the specified username isn’t found, or if
All is specified and no entries are configured.
Parameters All
Clears dialback settings for all usernames.
username
Clears dialback settings for the specified username.
See Also Define Ports Dialback, page 12-70; Set/Define Dialback, page 12-165; Show/
Monitor/List Dialback, page 12-178; Dialback, page 11-5.
⎧ CLEAR ⎫
⎨ ⎬FILTER filtername
⎩ PURGE ⎭
Parameters filtername
A particular packet filter to be removed.
See Also Set/Define Filter, page 12-166; Show/Monitor/List Filter, page 12-178; Filter
Lists, page 5-2
12-152
Command Reference Security Commands
⎧ CLEAR ⎫ ⎧ ALL ⎫
⎨ ⎬ SNMP ⎨ ⎬
⎩ PURGE ⎭ ⎩ CommunityName ⎭
Parameters All
Removes all SNMP table entries.
CommunityName
Enter the name of the SNMP community to be removed.
See Also Set/Define SNMP, page 12-177; Set/Define Filter IP, page 12-169; Show/
Monitor/List SNMP, page 12-179; ,
⎧ KERBEROS { options } ⎫
⎪ ⎪
⎪ LOCAL { options } ⎪
⎪ RADIUS { options } ⎪
⎧ SET ⎫AUTHENTICATION ⎪ ⎪
⎨ ⎬ ⎨ SECURID { options } ⎬
⎩ DEFINE ⎭ ⎪ ⎪
⎪ TFTP { options } ⎪
⎪ UNIQUE { options } ⎪
⎪ ⎪
⎩ USER { options } ⎭
Configures the authentication system. Logins on ports with authentication enabled will be prompted for a
username and password pair, which will be checked sequentially against up to six databases: a Kerberos
database, the SCS local database (NVR), a RADIUS server, a SecurID server, or a UNIX password file
(TFTP).
To configure one or more of the six databases, refer to the appropriate command in this section.
See Also Define Site Authentication, page 12-132; Chapter 11, Security
12-153
Command Reference Security Commands
⎧ ⎫
⎪ ⎧ ⎫ ⎪
⎪ PRIMARY ⎨ address ⎬ ⎪
⎪ ⎩ NONE ⎭ ⎪
⎪ ⎪
⎪ ⎪
⎪ ⎧ address ⎫ ⎪
⎪ SECONDARY ⎨ ⎬ ⎪
⎪ ⎩ NONE ⎭ ⎪
⎪ ⎪
⎪ PRECEDENCE prec_num ⎪
⎪ PRINCIPLE string ⎪
⎪ ⎪
⎧ SET ⎫AUTHENTICATION KERBEROS ⎪ INSTANCE string ⎪
⎨ ⎬ ⎨ ⎬
⎩ DEFINE ⎭ ⎪ AUTHENTICATOR password ⎪
⎪ ⎪
⎪ ⎧ ⎫ ⎪
⎪ ENCRYPTION ⎨ AFS ⎬ ⎪
⎪ ⎩ MIT ⎭ ⎪
⎪ ⎪
⎪ KVNO kvno_num ⎪
⎪ MAXTRIES tries ⎪
⎪ ⎪
⎪ PORT PortNum ⎪
⎪ REALM string ⎪
⎪ ⎪
⎪ TIMEOUT num ⎪
⎩ ⎭
Specifies that a Kerberos database will be used for authentication. Specific Kerberos options are explained
in detail in the Kerberos section on page 11-11.
Parameters Primary
Specifies the first database or server to be checked. A specific address may be
set with the address parameter, or the None parameter may be used to indicate
that the database or file will not be used.
If the SCS fails to authenticate the user using the primary database or server
(due to network failure, server failure, missing or incorrect username/
password), the secondary database or server (discussed below) will be
checked. If the user is authenticated at any point, the search process will stop
and the login will be permitted.
If the user cannot be authenticated using the secondary database or server, the
database or server with the next precedence level will be checked. If all
precedence levels fail to authenticate the user, the user is prevented from
logging in.
Secondary
Sets the secondary database or server to be checked. A specific address may be
set with the address parameter, or the None parameter may be used to indicate
that the server will not be used.
address
A text host name (if a DNS is available for name resolution) or an IP address
in standard numeric format (for example, 192.23.71.49).
12-154
Command Reference Security Commands
None
Clears the current server address.
Precedence
Sets the precedence in which this database or server is checked. The
precedence number must be specified using the prec_num parameter.
prec_num
A precedence number between 1 and 6.
Principle
A label that identifies the authentication service that the SCS requests from the
Kerberos server. Must be used in conjunction with the string parameter.
Instance
A label that is used to distinguish among variations of the principle. Must be
used in conjunction with the string parameter.
string
A case-sensitive string of up to 40 alphanumeric characters. To preserve case,
enclose the string in quotes.
Authenticator
Specifies the password for the principle/instance pair. Must be used in
conjunction with the password parameter.
password
A case-sensitive password of up to 40 alphanumeric or 8 hexadecimal
characters. To preserve case, alphanumeric passwords must be enclosed in
quotes.
Encryption
Specifies that either the Andrew File System (AFS) or MIT Encryption
algorithm will be used to create the Kerberos keys. The SCS encryption
method should match the Kerberos server encryption method.
MIT
Enables use of the MIT encryption algorithm.
AFS
Enables use of the Andrew File System encryption algorithm.
Port
Specifies the UDP/IP Port number used to communicate with the Kerberos
server. The number applies to both the primary and secondary servers. Must be
used in conjunction with the PortNum parameter.
PortNum
An integer between 1 and 65535.
Timeout
Specifies the timeout period for a response from the Kerberos server. Must be
used in conjunction with the seconds parameter.
seconds
An integer between 1 and 255, inclusive.
12-155
Command Reference Security Commands
Maxtries
Specifies the maximum number of times that the SCS will attempt to contact
the Kerberos server.
tries
An integer between 1 and 255, inclusive.
Realm
Sets the Kerberos realm that the SCS resides in. Often set to a name that
mirrors the Internet domain name system. Must be used in conjunction with the
string parameter, discussed earlier.
kvno_num
An integer between 1 and 255, inclusive.
See Also Define Site Authentication, page 12-132; Kerberos, page 11-11
Specifies that an SCS database (saved in NVR or RAM) will be used for authentication. The precedence
number is set to 1 by default.
Parameters Precedence
Sets the precedence in which this database or server is checked. Must be used
in conjunction with the prec_num parameter.
prec_num
A precedence number between 1 and 6, usually set to 1.
Defaults Precedence: 1
12-156
Command Reference Security Commands
See Also Define Site Authentication, page 12-132; Set/Define Authentication Unique,
page 12-163; Local (NVR) Database, page 11-9
⎧ ⎫
⎪ ⎧ address ⎫ ⎪
⎪ PRIMARY ⎨ ⎬ ⎪
⎪ ⎩ NONE ⎭ ⎪
⎪ ⎪
⎪ ⎧ address ⎫ ⎪
⎪ SECONDARY ⎨ ⎬ ⎪
⎪ ⎩ NONE ⎭ ⎪
⎪ ⎪
⎪ PRECEDENCE prec_num ⎪
⎪ ⎪
⎪ MAXTRIES tries ⎪
⎪ PORT PortNum ⎪
⎪ ⎪
⎪ TIMEOUT num ⎪
⎧ SET ⎫AUTHENTICATION RADIUS ⎪ SECRET string ⎪
⎨ ⎬ ⎨ ⎬
⎩ DEFINE ⎭ ⎪ ⎪
⎪ ⎧ ⎫ ⎪
⎪ ⎪ ⎧ ENABLED ⎫ ⎪ ⎪
⎪ ⎪ ⎨ ⎬ ⎪ ⎪
⎪ ⎪ ⎩ DISABLED ⎭ ⎪ ⎪
⎪ ⎪ ⎪ ⎪
⎪ ⎪ ⎧ address ⎫ ⎪ ⎪
⎪ ACCOUNTING ⎪ PRIMARY ⎨ ⎬ ⎪ ⎪
⎪ ⎨ ⎩ NONE ⎭ ⎬ ⎪
⎪ ⎪ ⎪ ⎪
⎪ ⎪ ⎪
⎪ ⎪ ⎧ address ⎫ ⎪ ⎪⎪
⎪ ⎪ SECONDARY ⎨ ⎬ ⎪
⎪ ⎪ ⎩ NONE ⎭ ⎪ ⎪⎪
⎪ ⎪ ⎪ ⎪
⎩ ⎩ PORT PortNum ⎭ ⎭
Specifies that a RADIUS server will be used for authentication and/or accounting.
Parameters Primary
Specifies the first server to be checked. A specific address must be set with the
address parameter, or the None parameter may be used to indicate that the
database or file will not be used.
If the SCS fails to authenticate the user using the primary database or server
(due to network failure, server failure, missing or incorrect username/
password), the secondary database will be checked. If the user is authenticated
at any point, the search process stops and the login is permitted.
If the user cannot be authenticated using the secondary server, the dataserver
with the next precedence level will be checked. If all precedence levels fail to
authenticate the user, the user is prevented from logging in.
12-157
Command Reference Security Commands
Secondary
Sets the secondary server to be checked. A specific address may be set with the
address parameter, or the None parameter may be used to indicate that the
server will not be used.
address
A text host name (if DNS is available for name resolution) or an IP address in
standard numeric format (for example, 193.23.71.49).
None
Clears the current server address.
Precedence
Sets the precedence in which this database or server is checked. The
precedence number must be specified using the prec_num parameter.
prec_num
A precedence number between 1 and 6.
Maxtries
Specifies the maximum number of times that the SCS will attempt to contact
the RADIUS server. Maxtries must be used in conjunction with the tries
parameter.
tries
An integer between 1 and 255, inclusive.
Port
Specifies that authentication or accounting information should be sent to a
specific port on the server, specified with the PortNum parameter.
PortNum
A port number between 0 and 65535, inclusive.
Timeout
Specifies the timeout period for a response from the RADIUS server. Must be
used in conjunction with the num parameter.
num
An integer between 1 and 255, inclusive.
Note: For accounting, the SCS has to hold onto packets until they can be verified. If the
Maxtries and Timeout values are too large, you can overflow the SCS and it will
begin to drop accounting packets. This can be avoided by setting retries and
timeouts to lower values.
Secret
Specifies the Secret to be Shared between the RADIUS client and server. Must
be used in conjunction with the string parameter.
string
A string of up to 64 characters. This string must be identical to that used by the
RADIUS server for the SCS.
12-158
Command Reference Security Commands
Accounting
Specifies that RADIUS accounting information will be sent to a RADIUS
accounting server. Accounting can be enabled even if the SCS does not use a
RADIUS server for authentication.
Primary
Specifies the primary accounting server to which accounting information will
be sent. If the primary server cannot be reached, the secondary server will be
tried.
Secondary
Specifies the secondary accounting server to which accounting information
will be sent when the primary server cannot be reached.
PortNum
A port number between 0 and 65535, inclusive.
See Also Clear/Purge Authentication, page 12-151; Define Site Authentication, page
12-132; Show/Monitor/List Authentication, page 12-177; RADIUS, page 11-
14
⎧ ⎫
⎪ ⎧ ⎫ ⎪
⎪ PRIMARY ⎨ address ⎬ ⎪
⎪ ⎩ NONE ⎭ ⎪⎪
⎪
⎪ ⎪
⎪ ⎧ address ⎫ ⎪
⎪ SECONDARY ⎨ ⎬ ⎪
⎪ ⎩ NONE ⎭ ⎪
⎧ SET ⎫AUTHENTICATION SECURID ⎪ ⎪
⎨ ⎬ ⎨ PRECEDENCE prec_num ⎬
⎩ DEFINE ⎭ ⎪ ⎪
⎪ ⎧ SID ⎫ ⎪
⎪ ENCRYPTION ⎨ ⎬ ⎪
⎪ ⎩ DES ⎭ ⎪
⎪ ⎪
⎪ MAXTRIES tries ⎪
⎪ PORT PortNum ⎪
⎪ ⎪
⎪ TIMEOUT num ⎪
⎩ ⎭
Specifies that a Security Dynamics ACE/SecurID server will be used for authentication.
Restrictions
12-159
Command Reference Security Commands
Parameters Primary
Specifies the first database or server to be checked. A specific address may be
set with the address parameter, or the None parameter may be used to indicate
that the database or file will not be used.
Secondary
If the SCS fails to authenticate the user using the primary database or server
(due to network failure, server failure, missing or incorrect username/
password), the secondary database or server will be checked. A specific
address may be set with the address parameter, or the None parameter may be
used to indicate that the server will not be used.
If the user cannot be authenticated using the secondary database or server, the
database or server with the next precedence level will be checked. If all
precedence levels fail to authenticate the user, the user is prevented from
logging in.
address
A text host name (if a DNS is available for name resolution) or an IP address
in standard numeric format (for example, 192.23.71.49).
None
Clears the current server address.
Precedence
Sets the precedence in which this database or server is checked. The
precedence number must be specified using the prec_num parameter.
prec_num
A precedence number between 1and 6.
Encryption
SecurID (SID) or DES encryption will be used for authentication.
SID
Enables use of SecurID encryption.
DES
Enables use of DES encryption.
Maxtries
Specifies the maximum number of times the SCS will attempt to contact the
SecurID server. Must be used in conjunction with the tries parameter.
tries
An integer between 1 and 255, inclusive.
Port
Specifies the UDP/IP port number used to communicate with the primary and
secondary SecurID servers. Must be used in conjunction with the PortNum
parameter.
12-160
Command Reference Security Commands
PortNum
An integer between 1 and 65535.
Timeout
Specifies the timeout period for a response from the SecurID server. Must be
used in conjunction with the seconds parameter.
seconds
An integer between 1 and 255, inclusive.
See Also Define Site Authentication, page 12-132; SecurID, page 11-17
⎧ ⎫
⎧ SET ⎫ AUTHENTICATION STRICTFAIL ⎪ ENABLED ⎪
⎨ ⎬ ⎨ ⎬
⎩ DEFINE ⎭ ⎪ DISABLED ⎪
⎩ ⎭
Strict fail mode aborts the authentication process if any method returns an error of “invalid error” or “invalid
password.”
Defaults Disabled
12-161
Command Reference Security Commands
⎧ ⎫
⎪ ⎧ address ⎫ ⎪
⎪ PRIMARY ⎨ ⎬ ⎪
⎪ ⎩ NONE ⎭ ⎪
⎪ ⎪
⎧ SET ⎫AUTHENTICATION TFTP ⎪ ⎪
⎨ ⎬ ⎨ ⎧ address ⎫ ⎬
⎩ DEFINE ⎭ ⎪ SECONDARY ⎨ ⎬ ⎪
⎪ ⎩ NONE ⎭ ⎪
⎪ ⎪
⎪ PRECEDENCE prec_num ⎪
⎪ filename ⎪
⎩ ⎭
Specifies that a UNIX password file will be used for authentication. This file will be read via the TFTP
protocol.
Parameters Primary
Specifies the first database or server to be checked. A specific address may be
set with the address parameter, or the None parameter may be used to indicate
that the database or file will not be used.
Secondary
If the SCS fails to authenticate the user using the primary database or server
(due to network failure, server failure, missing or incorrect username/
password), the secondary database or server will be checked. A specific
address may be set with the address parameter, or the None parameter may be
used to indicate that the server will not be used.
If the user cannot be authenticated using the secondary database or server, the
database or server with the next precedence level will be checked. If all
precedence levels fail to authenticate the user, the user is prevented from
logging in.
address
A text host name (if a DNS is available for name resolution) or an IP address
in standard numeric format (for example, 192.23.71.49).
None
Clears the current server address.
Precedence
Sets the precedence in which this database or server is checked. The
precedence number must be specified using the prec_num parameter.
prec_num
A precedence number between 1 and 6.
12-162
Command Reference Security Commands
filename
Specify a TFTP password file name of up to 32 characters. If spaces or
lowercase characters are used, the filename must be enclosed in quotes.
See Also Define Site Authentication, page 12-132; UNIX Password File, page 11-19
When enabled, the authentication code prevents multiple incoming authenticated logins by the same user.
It does not prevent the user from making additional non-authenticated connections.
PASSWORD password
COMMAND command
EXPIRED
⎧ ⎫
ALTER ⎨ ENABLED ⎬
⎩ DISABLED ⎭
⎧ SET ⎫
⎨ ⎬AUTHENTICATION USER username
⎩ DEFINE ⎭ ⎧ ⎫
ALTCOMMAND ⎨ ENABLED ⎬
⎩ DISABLED ⎭
⎧ TARGET ⎧ ⎫⎫
⎪ PortList ⎪
PORTS ⎨ SERIAL ⎨⎩ STRING ALL NONE ⎬⎭ ⎬
⎪ ⎪
⎩ FACTORY ⎭
Configures entries to the local database. To indicate which username entry will be modified, a username
must be specified using the username parameter.
12-163
Command Reference Security Commands
Parameters username
A username of up to 16 characters. The name is converted to all uppercase
unless it is enclosed in quotes.
Password
Configures a password for an authenticated user. The password is converted
to all uppercase unless it is enclosed in quotes.
Note: Users who don’t have passwords configured for them will always be granted
access.
Command
Runs a command or commands immediately after login. The Altcommand
feature must be enabled for this to work. Commands must be enclosed in
quotes and separated by semicolons. The combined length of a series of
commands cannot exceed 100 characters.
Expired
Forces a user to select a new password upon next login.
Alter
Enables or disables a user’s ability to change his password. The password can
be changed with the Set/Define Password command.
Altcommand
Enables the use of the command specified with the command parameter.
None
Removes port list from specified user.
Ports Target
Rejects user connection attempt from the network or “connect local” to a port
not on the user’s port target list.
Ports Serial
Rejects user connection attempt from the serial (character or PPP) not on the
user’s serial port list.
Ports Factory
Resets current port restrictions back to the default.
Portlist/All
Specifies a particular port or group of ports, or all ports. Port numbers should
be separated with commas (for lists) or dashes (for ranges).
See Also Define Site Authentication, page 12-132; Set/Define Password, page 12-176;
Local (NVR) Database, page 11-9; Port User Restrictions, page 11-8
12-164
Command Reference Security Commands
⎧ ⎫
⎪ ⎧ phonenum ⎫ ⎪
⎪ username ⎨ ⎬ ⎪
⎧ SET ⎫ DIALBACK ⎪ ⎩ BYPASS ⎭ ⎪
⎨ ⎬ ⎨ ⎬
⎩ DEFINE ⎭ ⎪ ⎧ ENABLED ⎫ ⎪
⎪ BYPASS ⎨ ⎬ ⎪
⎪ ⎩ DISABLED ⎭ ⎪
⎩ ⎭
The Dialback feature enables a system manager to set up a dialback list of authorized users for incoming
modem connections. Dialback lists include usernames and corresponding phone numbers. When a
username entered matches one in the list, the port is logged out and the SCS sends the corresponding phone
number to the serial port, at which time the port’s modem profile initiates the modem connection.
Parameters username
A text name, up to 16 characters long. If white space or lowercase characters
are used, the username must be enclosed in quotes.
phonenum
A telephone number.
Note: The ATDT command should not be entered in the telephone number string. The
modem profile will prepend any necessary command prefixes.
Bypass
When the Bypass parameter is associated with a username, the port will not be
logged out, and the user will not be dialed back, when attempting to connect to
the SCS. The word “bypass” must be associated with the username in the
dialback database in order for dialback to be bypassed.
When Bypass is used with the Enabled parameter (that is, not associated with
a username), users not in the dialback database are immediately given the
Local> prompt. When disabled, users not in the database are denied access.
See Also Define Ports Dialback, page 12-70; Dialback, page 9-11; Dialback, page 11-5
12-165
Command Reference Security Commands
⎧ CREATE ⎫
⎪ ⎪
⎪ DELETE ruleNum ⎪
⎪ ⎪
⎪ ⎧ ⎫ ⎪
⎧ SET ⎫ FILTER filtername ⎪ ⎪ ADD ⎪ ⎪
⎨ ⎬ ⎨ ⎪ AFTER ⎪ ⎧ ANY ⎫ ⎬
⎩ DEFINE ⎭ ⎪ ⎪ ⎪ ⎧ ALLOW ⎫⎪ ⎪ ⎪
⎪ ⎨ BEFORE ⎬ pos ⎨ ⎬⎨ GENERIC { options } ⎬ ⎪
⎪ ⎪ ⎪ ⎩ DENY ⎭⎪ ⎪ ⎪
⎪ ⎪ CONTINUE ⎪ ⎩ IP { options } ⎭ ⎪
⎪ ⎪ REPLACE ⎪ ⎪
⎩ ⎩ ⎭ ⎭
Creates or deletes a packet filter, or configures a rule in that filter that is used to manage network traffic.
These packet filters are applied to packets arriving from or going to remote dialup sites.
Each rule consists of a name, a position, an action (allow or deny) and a protocol segment. To configure
protocol options, refer to the appropriate command on the following pages. Due to space considerations, the
command syntax from the Add braces to the Allow/Deny braces in the above diagram is represented by an
ellipse (...) in the remaining Set/Define Filter commands.
In-depth protocol-related examples are given with the subcommands listed on the following pages.
Parameters filtername
The name of the filter in which the new rule will be included, up to 12 letters
in length.
Create
Creates a new filter with the specified filtername. Filters must be created
before their rules can be added, deleted, or otherwise modified.
Delete
Removes the specified rule from the named filter.
ruleNum
The number of the rule to be deleted.
Add
Adds a rule after another rule. If no position is specified, the rule is added to
the end of the list of rules.
After
Inserts a rule after another rule. If no position is specified, the rule is added to
the end of the list of rules.
12-166
Command Reference Security Commands
Before
Inserts a rule before another rule. If no position is specified, the rule is added
to the beginning of the list of rules.
Continue
Continues a long filter that won’t fit in the 132-character line limit for
commands.
Replace
Replaces an existing rule with a new one. If no position is specified, the first
rule in the list is replaced.
pos
A location in the filter list to perform a specific function, such as Add.
Allow
Allows passage of data packets that meet the defined filter criteria. The criteria
consists of all specified parameters after Allow.
Deny
Denies passage of data packets that meet the defined filter criteria. The criteria
consists of all specified parameters after Deny.
See Also Define Site Filter, page 12-138; Clear/Purge IP Security, page 12-19; Define
Ports Dialback, page 12-70; Packet Filters and Firewalls, page 11-23.
Specifies that every packet will be allowed or denied passage through the SCS. Using the Any parameter
along with either Allow or Deny will affect all packets regardless of any filter specifications that follow.
Usually, an Any rule is placed at the end of a filter list to process data packets not specifically identified by
the previous rules in the list.
See Also Define Site Filter, page 12-138; Clear/Purge IP Security, page 12-19; Define
Ports Dialback, page 12-70; Packet Filters and Firewalls, page 11-23
12-167
Command Reference Security Commands
⎧ ⎧ ⎫ ⎫
⎪ ⎪ EQ ⎪ ⎪
⎪ ⎪ ⎪ ⎪
⎪ ⎪ GE ⎪ ⎪
⎧ SET ⎫ FILTER filtername ... GENERIC ⎪ OFFSET offset MASK mask ⎪ GT ⎪value ⎪
⎨ ⎬ ⎨ ⎨ ⎬ ⎬
⎩ DEFINE ⎭ ⎪ ⎪ LE ⎪ ⎪
⎪ ⎪ LT ⎪ ⎪
⎪ ⎪ ⎪ ⎪
⎪ ⎪ NE ⎪ ⎪
⎩ ⎩ ⎭ ⎭
Specifies a general filter rule that applies to any packet regardless of protocol. A Generic rule starts at a
location offset bytes from the beginning of the packet, applies the specified mask, and then compares the
result with a specified value. Multiple generic offset segments can be included in a single rule, subject to
the maximum command line length of 132 characters (see the example below).
Parameters offset
Defines where in the data packet to apply the mask. May be a decimal value
from 0 to 1500, where 0 indicates the first data position in the packet.
mask
A hexadecimal or decimal number.
operator
(EQ, GE, GT, LE, LT, NE)
The options are: equal to (EQ), greater than or equal to (GE), greater than (GT),
less than or equal to (LE), less than (LT), and not equal to (NE).
value
A hexadecimal or decimal number.
Examples Local>> DEFINE FILTER abc ADD DENY GENERIC OFFSET 0 MASK 0xff000000 GT
0x25000000 OFFSET 8 MASK 0xffffffff EQ 0x12345678
(Adds a rule containing two generic segments to filter abc.)
See Also Define Site Filter, page 12-138; Clear/Purge IP Security, page 12-19; Define
Ports Dialback, page 12-70; Packet Filters and Firewalls, page 11-23
12-168
Command Reference Security Commands
⎧ ⎫
⎪ ⎧ ⎫ ⎪
⎪ ⎪ EQ ⎪ ⎪
⎪ ⎪ ⎪ ⎪
⎪ ⎪ GE ⎪ ⎪
⎪ ⎪ ⎪ ⎪
⎪ IPGENERIC OFFSET offset MASK mask ⎨ GT ⎬value ⎪
⎪ ⎪ LE ⎪ ⎪
⎪ ⎪ LT ⎪ ⎪
⎪ ⎪ ⎪ ⎪
⎪ ⎪ NE ⎪ ⎪
⎪ ⎩ ⎭ ⎪
⎪ ⎪
⎪ DST ipMask address ⎪
⎪ ⎪
⎪ SRC ipMask address ⎪
⎪ ⎪
⎪ protocolNum ⎪
⎪ ⎪
⎪ ICMP ⎪
⎪ ⎪
⎪ ⎧ ⎫ ⎪
⎪ ⎪ ⎧ ⎫ ⎪ ⎪
⎪ ⎪ ⎪ EQ ⎪ ⎪ ⎪
⎧ SET ⎫ ⎪ ⎪ ⎪ ⎪ ⎪ ⎪
⎨ ⎬ FILTER filtername ... IP ⎨ ⎪ ⎪ GE ⎪ ⎪ ⎬
⎩ DEFINE ⎭ ⎪ ⎪ ⎧ ⎫⎪ GT ⎪⎧ ⎫ ⎪ ⎪
⎪ ⎪ DPORT portNum ⎪ ⎪
⎪ TCP ⎨ ⎨ SPORT ⎬⎨ LE ⎬⎨ portKeyword ⎬ ⎬ ⎪
⎩ ⎭⎪ ⎪⎩ ⎭
⎪ ⎪ ⎪ LT ⎪ ⎪ ⎪
⎪ ⎪ ⎪ ⎪ ⎪ ⎪
⎪ ⎪ ⎪ NE ⎪ ⎪ ⎪
⎪ ⎪ ⎩ ⎭ ⎪ ⎪
⎪ ⎪ ⎪ ⎪
⎪ ⎪ ACK ⎪ ⎪
⎪ ⎩ ⎭ ⎪
⎪ ⎪
⎪ ⎧ ⎫ ⎪
⎪ ⎪ EQ ⎪ ⎪
⎪ ⎪ ⎪ ⎪
⎪ ⎪ GE ⎪ ⎪
⎪ ⎧ ⎫⎪ ⎪⎧ portNum ⎫ ⎪
⎪ UDP ⎨ DPORT ⎬⎨ GT ⎬⎨ ⎬ ⎪
⎪ ⎩ SPORT ⎭⎪ LE ⎪⎩ portKeyword ⎭ ⎪
⎪ ⎪ LT ⎪ ⎪
⎪ ⎪ ⎪ ⎪
⎪ ⎪ NE ⎪ ⎪
⎪ ⎩ ⎭ ⎪
⎪ ⎪
⎪ TOS mask value ⎪
⎩ ⎭
Parameters IPGeneric
Specifies a general IP rule using one set of offset, mask, operator, and value.
Multiple IPGeneric segments can be included in a single rule (in one
command), subject to the maximum command line length of 132 characters.
offset
Defines where in the data packet to apply the mask. May be a decimal value
from 0 to 1500, where 0 indicates the first data position in the data packet.
12-169
Command Reference Security Commands
mask
A hexadecimal or decimal number. The mask is applied to the data using the
operator and the result is compared with the value. In the case of TOS, the
operator EQ is implied.
operator
(EQ, GE, GT, LE, LT, NE)
The available operators are: equal to (EQ), greater than or equal to (GE),
greater than (GT), less than or equal to (LE), less than (LT), and not equal to
(NE).
value
A hexadecimal or decimal number.
DST
Allows or denies passage of data packets destined for a specific node on the
local area network. Must be used in conjunction with the ipMask and address
parameters.
SRC
Allows or denies passage of data packets that originated from a specific node
on the local area network. Must be used in conjunction with the ipMask and
address parameters
ipmask
An IP address in standard numeric format (for example, 193.0.1.255).
address
An IP address in standard numeric format (for example, 193.0.1.50).
TOS
Builds a rule using the IP Type of Service field. Must be used in conjunction
with the mask and value parameters. For TOS, the operator EQ is implied.
protocolNum
Allows or denies packets of the protocol specified by an IP protocol identifier
number between 0 and 65535.
ICMP
Allows or denies Internet Control Message Protocol packets.
12-170
Command Reference Security Commands
TCP
Allows or denies TCP-based packets which match criteria specified by the
subsequent parameters. Applications that use TCP include Telnet, FTP, and
SMTP (Simple Mail Transfer Protocol).
UDP
Allows or denies User Datagram Protocol (UDP) based packets which match
criteria specified by subsequent parameters. Applications that use UDP include
DNS (Domain Name Service), TFTP (a variant of FTP), and BOOTP (used by
some computer systems to acquire IP addresses).
DPort
Defines the destination protocol port. Data packets are filtered based on both
the protocol and on the protocol port of the data packet.
SPort
Defines the source protocol port. Data packets are filtered based on both the
protocol and the protocol port of the data packet.
portNum
A TCP or UDP port number.
portKeyword
A keyword corresponding to the TCP or UDP port number. Available
keywords are BOOTP, DNS, FINGER, FTP, FTPDATA, HTTP, NNTP, NTP,
POP2, POP3, RIP, SMTP, SNMP, SYSLOG, TELNET, and TFTP.
ACK
Allows or denies TCP-based packets in which the ACK (acknowledge) bit is
set.
Local>> DEFINE FILTER abc ADD ALLOW IP IPGENERIC OFFSET 0 MASK 0xff000000
LT 0x34000000 TCP DPORT EQ TELNET
(Adds a rule containing an IP generic segment and DPORT to filter abc.)
Local>> DEFINE FILTER abc ADD ALLOW IP SRC 255.255.255.0 192.34.87.0 TCP
DSOCK EQ NCP
(Adds a rule containing IP SPORT and SRC to filter abc.)
See Also Define Site Filter, page 12-138; Clear/Purge IP Security, page 12-19; Define
Ports Dialback, page 12-70; Packet Filters and Firewalls, page 11-23
12-171
Command Reference Security Commands
⎧ SET ⎫ ⎧ ENABLED ⎫
⎨ ⎬ PROTOCOL FTP ⎨ ⎬
⎩ DEFINE ⎭ ⎩ DISABLED ⎭
See Also Disabling the FTP and HTTP Servers, page 11-23
⎧ SET ⎫ ⎧ ENABLED ⎫
⎨ ⎬ PROTOCOL HTTP ⎨ ⎬
⎩ DEFINE ⎭ ⎩ DISABLED ⎭
See Also Disabling the FTP and HTTP Servers, page 11-23
⎧ ⎫
⎪ ⎧ ⎫ ⎪
⎪ DESTINATION ⎨ location ⎬ ⎪
⎪ ⎩ NONE ⎭ ⎪
⎪ ⎪
⎪ ⎧ ⎫ ⎪
⎪ ⎪ AUTHENTICATION ⎪ ⎪
⎪ ⎪ ⎪ ⎪
⎪ ⎪ DIALBACK ⎪⎧ num ⎫ ⎪
⎪ ⎪ IP ⎪⎪ ⎪ ⎪
⎪ ⎨ ⎬⎨ MAX ⎬ ⎪
⎧ SET ⎫ ⎪ ⎪ MODEM ⎪⎪ ⎪ ⎪
⎨ ⎬LOGGING ⎨ ⎪ ⎪⎩ NONE ⎭ ⎬
⎩ DEFINE ⎭ ⎪ ⎪ PPP ⎪ ⎪
⎪ ⎪ SITE ⎪ ⎪
⎪ ⎩ ⎭ ⎪
⎪ ⎪
⎪ ⎪
⎪ ⎧ ⎫ ⎪
⎪ ⎪ COMMANDS ⎪ ⎪
⎪ ⎪ NETWORK ⎪⎧ ENABLED ⎫ ⎪
⎪ ⎨ ⎬⎨ ⎬ ⎪
⎪ ⎪ PRINTER ⎪⎩ DISABLED ⎭ ⎪
⎪ ⎪ SYSTEM ⎪⎭ ⎪
⎩ ⎩ ⎭
12-172
Command Reference Security Commands
Controls error and event logging on the SCS. Events can be logged to a network host via TCP/IP or to a
terminal connected to the SCS.
The host must be configured to support logging. For a TCP/IP host, the host’s syslog facility must be
configured; make sure all priorities equal to or higher than *.notice are being logged. The syslog file is
typically located in the /etc directory; see your host’s documentation or syslogd for more information.
Note: Logging levels are cumulative; setting logging to level 4 includes levels 1
through 3 as well. See Chapter 11, Security, for a detailed description of the
events that can be logged.
Parameters Destination
Specifies a destination for the logging messages. Must be used in conjunction
with the address parameter or the None parameter.
location
A fileserver name or IP address. This parameter may be specified as one of the
following:
String/Form Action
IP hostname: Specifies a TCP/IP host
CONSOLE Sends events to the SCS console port
MEMORY Saves events in SCS memory
FILE filename Saves events in a file filename. The
default location is the SCS /ram disk,
although other SCS disks can be
specified (e.g. /flash/syslog.txt).
None
Disables logging.
Authentication
Logs events associated with authentication. Must be used with the num
parameter or the None parameter.
Level Information
1 System Problems
2 Failures and Successes
3 All Logins and Logouts
4 Incorrect Passwords
5 All Passwords, RADIUS Warnings
12-173
Command Reference Security Commands
Dialback
Logs events associated with dialback functionality. Must be used with the num
parameter or the None parameter.
Level Information
1 Dialback Problems
2 Unauthorized Users
3 Dialback Failures
4 Dialback Successes
5 Dialback Attempts
6 Modem Chat
IP
Traces the activities of the IP router. Must be used with the num parameter or
the None parameter.
Level Information
1 Errors
2 Packets triggering remote connections
3 Routing table/interface changes
4 Incoming/outgoing RIP packets
5 Resulting routing table (verbose)
6 Contents of all RIP packets (verbose)
7 Routed packets (verbose)
Note: Setting the IP logging level to 2 or greater results in a syslog that prints the
source/destination IP address, protocol, and TCP/UDP source/destination
ports.
Modem
Logs modem activity, including modem jobs (incoming and outgoing). Must
be used with the num parameter or the None parameter.
Level Information
1 Problems
2 Call Statistics Dump From Modem
3 Setup
12-174
Command Reference Security Commands
PPP
Logs events associated with PPP. Must be used with the num parameter or the
None parameter.
Level Information
1 Local System Problems
2 Remote System Problems
3 Negotiation Failures
4 Negotiation Data
5 State Transitions
6 Full Debugging
Site
Logs events associated with sites. Must be used with the num parameter or the
None parameter.
Level Information
1 Errors
2 State Transitions
3 Chat Scripts
4 Modem Dialing
5 Port Connections
6 Connection Failures
7 Usage Summary
num
An integer that specifies a particular level of logging.
12-175
Command Reference Security Commands
Max
Sets logging to the maximum value.
Commands
When enabled, logs all commands users type.
Network
When enabled, logs network events. This is useful for diagnosing network-
related problems.
Printer
When enabled, logs printer related events including online/offline conditions
and job status at the end of job.
System
When enabled, logs server boots, log file open/closes, and other system related
activity.
See Also Show/Monitor/List Logging, page 12-179; Event Logging, page 11-25
⎧ SET ⎫PASSWORD
⎨ ⎬
⎩ DEFINE ⎭
Changes the current user’s password in the local authentication database, provided the user is defined in the
database and has permission to alter the password. When this command is entered, the user will be prompted
for the old password, then prompted to enter and verify a new password.
Note: The user has three chances to enter the old password before he or she is logged
out of the SCS.
Restrictions Does not require privileged user status. To prevent users from altering their
own passwords, enter the Set/Define Authentication User Alter Disabled
command.
12-176
Command Reference Security Commands
⎧ BOTH ⎫
⎧ SET ⎫ ⎪ ⎪
⎨ ⎬ SNMP COMMUNITY community ACCESS ⎨ NONE ⎬
⎩ DEFINE ⎭ ⎪ ⎪
⎩ READ ⎭
Configures a community name and access mode for SNMP access. Each name has an access restriction
associated with it; if an SNMP command comes in with an unknown name or an unauthorized command,
an SNMP error reply will be sent. Community names are not case-sensitive.
Parameters community
A text name, up to 16 characters long.
Access
Specifies the type of SNMP access. Must be used in conjunction with one of
the following parameters: Both, None, or Readonly.
Both
Both read and write requests will be permitted.
None
No SNMP requests are permitted.
Read
Read-only access will be permitted.
⎧ SHOW ⎫
⎪ ⎪
⎨ MONITOR ⎬ AUTHENTICATION USERS username
⎪ ⎪
⎩ LIST ⎭
Parameters username
Displays authentication information for the specified user.
See Also Set/Define Authentication, page 12-153; Local (NVR) Database, page 11-9
12-177
Command Reference Security Commands
⎧ SHOW ⎫
⎪ ⎪
⎨ MONITOR ⎬ DIALBACK
⎪ ⎪
⎩ LIST ⎭
Displays the currently configured dialback strings, as well as the number of connect attempts with that string
the number of connect failures.
See Also Clear/Purge Dialback, page 12-152; Define Ports Dialback, page 12-70; Set/
Define Dialback, page 12-165; Dialback, page 8-12; Dialback from Character
Mode, page 11-6
⎧ SHOW ⎫
⎪ ⎪
⎨ MONITOR ⎬ FILTER filtername
⎪ ⎪
⎩ LIST ⎭
Displays the current packet filters. An individual filter may be specified using the filtername parameter.
See Also Set/Define Filter, page 12-166; Clear/Purge Filter, page 12-152; Filter Lists,
page 5-2
12-178
Command Reference Security Commands
⎧ SHOW ⎫
⎪ ⎪
⎨ MONITOR ⎬ LOGGING MEMORY
⎪ ⎪
⎩ LIST ⎭
Restrictions You must be the privileged user to use the Monitor command.
Parameters Memory
Displays the memory log.
See Also Set/Define Logging, page 12-172; Event Logging, page 11-25
⎧ SHOW ⎫
⎪ ⎪
⎨ MONITOR ⎬ SNMP
⎪ ⎪
⎩ LIST ⎭
SHOW PCCard
12-179
Command Reference Navigation/Help Commands
APROPOS keyword
Displays commands containing the specified keyword. If a command containing the keyword cannot be
found, the SCS will display “nothing appropriate.”
The SCS will not display all relevant commands. If there are any logout commands, such as Set Ports and
Define Ports, only one will be shown (in this case, Set Ports).
Restrictions Privileged commands containing the specified keyword will only be displayed
if you are currently the privileged user.
Parameters keyword
An alphanumeric string. You do not have to type the complete command
keyword in order to get a response; partial strings will yield appropriate
commands that contain that string.
12.11.2 Backwards
BACKWARDS
Switches sessions from the current session to the most recently started previous session. If there is only one
active session, it resumes. Repeating the command will cycle you “backward” through the active sessions.
If you search the beginning of the session list, entering this command returns you to the most recent session.
See Also Forwards, page 12-186; Show/Monitor Sessions, page 12-98; Port-Specific
Session Configuration, page 8-4
12.11.3 Broadcast
⎧ ALL ⎫
⎪ ⎪
BROADCAST ⎨ PORTS PortNum ⎬ message
⎪ ⎪
⎩ username ⎭
Sends a message to another port, all ports, or a specific user on the server. Broadcast may only be used if
broadcasts have been enabled on the server using the Set/Define Server Broadcast command.
12-180
Command Reference Navigation/Help Commands
Restrictions You must be the privileged user to use the All parameter.
Errors An error will be returned if the port broadcasted to is flow controlled or if the
server does not have broadcast enabled. The sender is notified if a message was
not received.
Parameters All
Sends the message to all ports.
Ports
Specifies a particular port as recipient of the message. Must be used with the
PortNum parameter.
PortNum
A particular SCS port.
username
A particular user as recipient of this message.
message
One word, or several words, in quotes. The message will be sent exactly as
typed if enclosed in quotes, or in uppercase if not. The message length is
limited only by the length of the command line.
See Also Set/Define Server Broadcast, page 12-116; Rebooting, page 2-5
12.11.4 Cls
CLS
Clears the screen on your terminal device if the port is configured as Type ANSI.
12-181
Command Reference Navigation/Help Commands
12.11.5 Disk
⎧ ⎫
⎪ CAT file ⎪
⎪ CD directory ⎪
⎪ ⎪
⎪ CHMOD code file ⎪
⎪ CP file1 file2 ⎪
⎪ ⎪
⎪ ⎪
⎪ DF /disk ⎪
⎪ ⎪
⎪ ⎧ ⎫ ⎪
⎪ FORMAT ⎨ /FLASH ⎬ name ⎪
⎪ ⎩ /PCCARD1 ⎭ ⎪
⎪ ⎪
⎪ ⎪
⎪ ⎧ /FLASH ⎫ ⎪
⎪ ⎪ ⎪ ⎪
⎪ FSCK ⎨ /PCCARD1 ⎬ ⎪
⎪ ⎪ ⎪ ⎪
⎪ ⎩ /PCCARD2 ⎭ ⎪
⎪ HEAD file ⎪
⎪ ⎪
⎪ LNflag file1 file2 ⎪
DISK ⎨ ⎬
⎪ LS flag file ⎪
⎪ ⎪
⎪ MKDIRdirectory ⎪
⎪ ⎪
⎪ MORE file ⎪
⎪ ⎪
⎪ MV file target ⎪
⎪ ⎪
⎪ OD flag file ⎪
⎪ ⎪
⎪ PWD ⎪
⎪ ⎪
⎪ RM flag file ⎪
⎪ ⎪
⎪ RMDIR directory ⎪
⎪ ⎪
⎪ SYNC ⎪
⎪ TAIL file ⎪
⎪ ⎪
⎪ TEST flag file ⎪
⎪ ⎪
⎪ TOUCH file ⎪
⎩ ⎭
Performs disk management functions for the SCS and, for models with PC card support, for any installed
ATA flash card. The SCS contains two modifiable directories—/ram and /flash—and one read-only
directory—/rom. For SCS models with one PC card slot, an ATA card can be accessed as /pccard1; for
models with two slots, the card in the top slot can be accessed as /pccard1 and the card in the bottom slot as
/pccard2.
The Disk commands are very similar to the file management commands in UNIX environments. Unlike the
similar UNIX commands, each disk command must be preceded by the word DISK. The commands are also
not case-sensitive.
The Disk commands honor disk permissions. All disks are read only for non-privileged users.
Restrictions The Format and FSCK parameters requires privileged user status.
12-182
Command Reference Navigation/Help Commands
Errors For the /pccard1 and /pccard 2 parameter, you will receive an error if either the
specified card is not a storage card or if there is no card in the slot.
Parameters Cat
Displays an entire file in your terminal window.
Cd
Changes your current working directory.
Chmod
Changes permissions for a file or directory. To assign permissions, enter a 3-
digit number. The first digit represents the owner’s permissions. The second
digit represents the group’s permissions. The third digit represents the world’s
permissions.
Table 12-6:
Digit Meaning
0 No permissions.
1 Execute permission only.
2 Write permission only.
3 Write and Execute permissions.
4 Read permission only.
5 Read and Execute permissions.
6 Read and Write permissions.
7 All permissions.
Cp
Copies or moves a file. To copy a file, enter the filename for file1 and the new
file name as file2. To move a file, specify the filename as file1 and the
destination directory as file2.
Df
Displays the blocks of free space on the SCS disks. When you add the -i switch,
the display includes in the display the number of inodes used versus the
number still available. If no disk name is specified, all disks are displayed.
/disk
Enter the disk name, e.g. /flash.
Format
Formats either the Flash disk or the specified PC card with the Lantronix
filesystem.
/Flash
Formats or erases the /flash disk.
12-183
Command Reference Navigation/Help Commands
/PCCard1
Formats an ATA flash card for use in an SCS PC card slot. An unformatted
card can not be used by the SCS.
name
Names the specified disk
Fsck
Checks the SCS filesystem and corrects any problems.
Head
Outputs the beginning of a string.
Ln
Creates a hard or soft link for files, linking a file or set of files to another file.
using no flag creates a hard link. Adding the -s flag creates a soft link.
Ls
Displays the contents of a directory. The available flags are:
Mkdir
Creates a new directory on the SCS RAM or flash disk.
More
Displays the contents of a file on the terminal, 24 lines of text at a time.
Normally the display pauses after each screen and prints “--MORE--” at the
bottom of the screen. To access the next screen, press the Space bar. To abort,
press Ctrl-C.
Mv
Moves files or directories on the SCS RAM and flash disks. You can also
rename files with this command by inserting the new filename for target
Od
Displays the contents of the specified file as raw hexadecimal byte values. The
possible flags are:
Pwd
Displays the full pathname of your current directory.
12-184
Command Reference Navigation/Help Commands
Rm
Removes files and/or directories from the RAM and Flash disks. The possible
flags are:
Rmdir
Removes a directory from the specified disks. The command can only be used
if the directory is empty. If the directory is full, you must add the DISK RM -
rf command.
Sync
Forces the SCS to write files on all disks (including any PC card disks)
immediately. Normally, when the SCS is rewriting files to disk, it will buffer
data before initiating a write sequence. Write sequences are automatically
written after 5 seconds of disk inactivity.
Tail
Outputs the end of a file.
Test
Evaluates a file (true or false). The possible flags that will be returned are:
Touch
Creates an empty disk file.
12-185
Command Reference Navigation/Help Commands
12.11.6 Finger
This command is based on the UNIX Finger command that displays local and remote users.
If a username is specified, information about that username will be displayed. If the user@hostname
parameters are specified, information regarding user user on TCP/IP host host will be displayed. Using the
Finger command without any parameters will display all current logins.
Parameters username
A username. If this parameter is omitted, all users on the host will be displayed.
@host
The “at” character, followed by a hostname.
Finger
Displays a list of current processes.
12.11.7 Forwards
FORWARDS
Cycles forward through your sessions in the order displayed by the Show Sessions command. The next
session on the list becomes the active session. If there is only one active session, the session will resume. If
the bottom of the session list is reached (the most recently started session) and this command is entered, the
session at the top of the session list is resumed.
See Also Backwards, page 12-180;Set/Define Ports Forward Switch , page 12-73;
Show/Monitor Sessions, page 12-98; Port-Specific Session Configuration,
page 8-4
12-186
Command Reference Navigation/Help Commands
12.11.8 Help
Accesses the SCS Help system. Using the Help command without any parameters displays all available
commands. Specifying a command gives information about that command a list of its parameters.
Specifying a parameter gives information about the parameter, including any sub-parameters it may have.
Parameters command
An SCS command name.
parameter
An SCS parameter name. More than one parameter can be added to the Help
command.
12.11.9 Monitor
MONITOR
Displays current operating characteristics. The displayed information is updated every 3 seconds until a key
is pressed. Each Monitor command and its parameters are documented together with the corresponding
Show command.
12.11.10 Netstat
NETSTAT
Displays the currently active network connections. This information is primarily meant for debugging
network problems.
12-187
Command Reference Navigation/Help Commands
12.11.11 Ping
Sends a TCP/IP request for an echo packet to another network host. This provides an easy way to test
network connections to other TCP/IP hosts. In general, any host that supports TCP/IP will respond to the
request if it is able, regardless of login restrictions, job load, or operating system.
If there is no reply from the host, this may indicate a network or TCP/IP configuration problem.
Parameters hostname
Text name or IP address of the network host.
num
Enter the size of the packet you wish to send. The max size is 2000.
12.11.12 Resolve
RESOLVE hostname
Attempts to resolve a TCP/IP name from the local host table and/or network nameserver.
Errors An error is returned to signal either that the attempted name service failed, or
that the specified hostname is invalid.
Parameters hostname
A TCP/IP hostname. Hostnames are usually limited to 64 characters, so the
string is limited to 64 characters.
12-188
Command Reference Navigation/Help Commands
12.11.13 Save
⎧ ⎫
⎪ AUTHENTICATION ⎪
⎪ FILTER filtername ⎪
⎪ ⎪
⎪ ⎪
⎪ IP ROUTER ⎪
⎪ SECURITY ⎪
⎪ ⎪
⎪ ⎪
⎪ PORT PortList ⎪
⎪ ALL ⎪
SAVE ⎨ ⎬
⎪ SERVER ⎪
⎪ ⎪
⎪ ⎪
⎪ SERVICE name ⎪
⎪ ALL ⎪
⎪ ⎪
⎪ SNMP ⎪
⎪ ⎪
⎪ LOGGING ⎪
⎪ MENU ⎪
⎩ ⎭
Saves current configurations (made with the Set command) into the permanent database. This treats
configurations as if they were made using the Define command.
To easily make current changes permanent, use the Save command after you have configured the port
service, server, or printer. This eliminates the need to issue a corresponding Define command for each Set
command.
Parameters Authentication
Saves authentication database preferences and the local authentication
database.
Filter
Saves the packet filter settings for the specified filter. Must be used in
conjunction with the filtername parameter.
IP Router
Saves the state of the IP router.
IP Security
Saves the current IP security table to the permanent database.
Menu
Saves all of the menu items setup using the Set Menu command to the
permanent database.
Port
Saves the status of particular ports to the permanent database.
12-189
Command Reference Navigation/Help Commands
PortList
A port number or list of ports. Port numbers should be separated with
commands (for lists) or dashes (for ranges).
All
Saves the settings for all ports or services to the permanent database.
Server
Save all the server characteristics to the permanent database.
Service
Save the current characteristics of a local service to the permanent database.
Note: No more than one service per port can be defined at any time; if more than one
service is defined, the Save Service command may fail.
name
A service name.
SNMP
Saves all parameters associated with SNMP.
Logging
Saves the current logging configuration to the permanent database.
Menu
Saves all menu items setup using the Set Menu command (discussed on page
12-112) to the permanent database.
PORT PortNum
⎧ SHOW ⎫ NODE nodename
⎨ ⎬ QUEUE
⎩ MONITOR ⎭ ALL
SERVICE ServiceName
Show Queue will display the entries in a connect queue, if it exists. Particular sets of queues or entries can
be selected with the Port, Node, or Service parameters. All can also be specified to show all entries.
Restrictions You must be the privileged user to use the Monitor command.
Parameters Port
Displays information for all queue entries that can be served by the specified
port. Must be used in conjunction with the PortNum parameter.
PortNum
Specifies a particular SCS port.
12-190
Command Reference Navigation/Help Commands
Node
Displays information for all queue entries requested from the specified node.
Must be used in conjunction with the nodename parameter.
nodename
Specifies a particular node.
All
Displays information for all ports and nodes.
ServiceName
Specifies a service name of up to 16 characters.
SHOW VERSION
12-191
Command Reference Navigation/Help Commands
ALL
ZERO COUNTERS ETHERNET
PORTPortNum
This command is used to reset the counters for errors and other network and server events.
Restrictions You must be the privileged user to zero some other port (or All).
Parameters All
Zeroes all Ethernet, TCP/IP, SLIP, and serial port counters.
Ethernet
Zeroes only Ethernet counters.
Port
Zeroes only the counters for events associated with a single serial port.
Note: In the absence of a PortNum or the All or Ethernet parameters, the configuration
will affect the current port.
12-192
A: Environment Strings
A.1 Usage
An environment string is a sequence of key letters, sometimes prefixed by a plus (+) or minus (-).
Environment strings can be used with certain commands to configure connections. The keys are added after
the hostname (if one is given) and a colon.
Key letters are not case-sensitive, and no white space is allowed in the environment string. In addition,
commands that oppose previously-configured settings will overwrite the previous setting, even if they
appear on the same command line.
Environment keys must be separated from the hostname, if one is specified, by a colon. Read the following
sections carefully for more details on proper usage of each key.
A-1
Environment Strings Usage Examples
A.2.1.1 nnnn
Sets a socket number. For SSH and TCP connections only. The most common socket numbers are 20xx (for
Telnet IAC interpretation), 30xx (for raw TCP/IP), and 22xx (for SSH connections), where xx is the number
of the desired serial port.
A.2.1.2 +C and -C
+C specifies CR to CRLF. -C specifies CR to LF.
A.2.1.3 +D and -D
+D sets Backspace mode. -D sets Delete mode.
A.2.1.4 +E and -E
+E sets Local Echo mode. -E sets Remote Echo mode.
A.2.1.5 +P and -P
+P specifies Passall method. -P specifies Passthru mode. Both Passall and Passthru will prevent the proper
handling of the Forward and Backward keys.
A.2.1.6 R
Specifies that the connection use the Rlogin protocol. Sets the port number to 513 if not already set.
A.2.1.7 S
Specifies that the connection use the SSH protocol.
A.2.1.8 T
Forms a raw Telnet connection. If no environment string is specified, a Telnet connection is assumed.
A-2
B: Show 802.11 Errors
B.1 Introduction
Note: This appendix applies only to the SCS200.
When you enter the Show 80211 command without any other parameters, the resulting screen includes a
field for errors. The “Errors:” field displays two eight-digit numbers, separated by a comma. These
numbers are a 64-bit wide bitfield of error bits, each one indicating whether or not the given error has
occurred at least once.
For example, suppose you're using an SCS200 with a ZoomAir card in Infrastructure mode. After having
been running for a long time, your Access Point loses power in the middle of sending a fragmented packet
to the SCS. If you entered the Show 80211 command, you might see a screen resembling the following:
Status: Scanning
Errors: 08020002,00000920
The Errors bitfield is zeroed each time you issue either a Zero command or a Set 802.11 Reset command
at the Local> prompt.
The Errors bitfield is zeroed each time you issue either a Zero command or a Change 802.11 Reset
command at the Local> prompt.
B-1
Show 802.11 Errors Leftmost Number
08000000 Fragment reassembly timed out. Failed to receive all the fragments of a
fragmented 802.11 packet before the reassembly window expired. Dropped
some correctly received fragments.
00800000 Dropped a correctly received 802.11 packet due to lack of a sufficiently sized
buffer to hold it. May happen under heavy network load if applications are not
processing network data fast enough.
00020000 Lost contact with the AP. Unit will attempt to reestablish contact by itself.
00010000 Unit was deauthenticated or disassociated by the AP for attempting to pass data
packets before being fully associated. (Indicates confusion of either the unit or
the AP.)
00000800 Association with the AP failed because the unit does not support all of the data
rates marked as basic in the AP.
00000400 Association with the AP failed, or the unit was disassociated by the AP because
the AP is full, and cannot handle any more stations associating with it.
00000200 Authentication with the AP timed out. The AP did not receive an expected
reply from the unit within the required time window.
B-2
Show 802.11 Errors Rightmost Number
00000100 Authentication with the AP failed because the WEP key the unit is using is not
the same as the key the AP is using.
00000080 Authentication with the AP failed because either the unit or the AP sent an
incorrect authentication packet. Some APs will erroneously return this error
code when the problem is actually "authentication type not allowed".
00000040 Authentication with the AP failed because the AP does not allow the
authentication type requested by the unit.
00000010 Reassociation with another AP serving the same ESS as the previous one failed
because the association could not be confirmed by the previous AP.
00000008 Association with the AP failed because the AP does not support all 802.11
options requested by the unit.
00000002 Could not find any beacons matching the network parameters the unit is
configured with. Most likely there is no AP or ad-hoc network within range
that satisfies the unit's ESSID, NETWORK-TYPE, and CHANNEL
parameters.
40000000 Unassigned.
20000000 Unassigned.
10000000 Unassigned.
08000000 Unassigned.
04000000 Unassigned.
02000000 Unassigned.
01000000 Unassigned.
00800000 Unassigned.
00400000 Unassigned.
00200000 Unassigned.
B-3
Show 802.11 Errors Rightmost Number
00100000 Unassigned.
00080000 Unassigned.
00040000 Unassigned.
00020000 Internal error. May occur on some cards in conjunction with other described
error codes.
00010000 The 802.11 card in use is not compatible with the regulatory region to which
the unit has been programmed.
00004000 Internal error. May occur on some cards in conjunction with authentication or
association failures, or other configuration mismatches.
00000800 Failed to queue a data packet that could not be sent immediately for later
transmission. It was dropped.
00000200 Failed to find, sync to, and associate with an AP or ad-hoc network within a
reasonable time. Most likely there is no AP or ad-hoc network within range
that satisfies the unit's ESSID, NETWORK-TYPE, and CHANNEL
parameters.
00000100 Received an 802.11 data packet that was not encapsulated as per RFC1042 or
802.1h. Unit will still decapsulate and interpret the packet. Some vendors'
APs trip this error when they send out "magic packets" containing proprietary
extensions not defined by the 802.11 spec.
00000040 Received an encrypted packet that could not properly be decrypted. Packet
was dropped.
00000020 Unspecified error during packet reception. At least one packet was dropped.
Absence of this error bit does not imply that all packets have been received
correctly, however.
00000008 Internal error. May occur in conjunction with "no AP or ad-hoc network
within range" errors.
B-4
Show 802.11 Errors Rightmost Number
B-5
C: SNMP Support
SNMP is an abbreviation for Simple Network Management Protocol. SNMP commands enable users
(usually system administrators) to get information from and control other nodes on a local area network.
Information about SNMP can be obtained in RFCs (Request For Comments) which can be obtained via
anonymous FTP from nisc.jvnc.net. To obtain a specific RFC, use the pathname pub/RFC/ rfcnnn, where
nnn is the name of the desired RFC. To obtain the RFC index, use the pathname pub/RFC/rfc-index.txt.
The extent to which other nodes may be controlled and/or queried for information is documented in
Management Information Bases (MIBs). The MIBs and SNMP in general are documented in RFCs 1066,
1067, 1098,1317, 1318, and 1213.
MIB Description
MIB-II (RFC 1213): System, Interface, Address Translation, IP, ICMP, TCP, and
UDP. They do not support the EGP group.
RS-232 MIB (RFC 1317): All objects (RS-232-style objects).
Character MIB (RFC 1318): All objects (character-oriented devices).
C.1 Support
The SCS will respond to queries for unknown MIBs with a “not in MIB” error to the requesting host.
The SCS has a local SNMP security table to restrict or prevent unauthorized SNMP configuration.
The SCS will also generate limited forms of 3 of the SNMP traps. Traps are sent to a host when an
abnormal event occurs on the SCS.
Currently, the SCS will generate a Coldstart trap when it first boots, and will send a Linkup trap when the
startupfile (if any) has been read from a host and normal operation commences. If a startupfile has been
configured but the download fails, the SCS will send an Authentication trap. In all 3 cases, the trap will be
directed to the IP address of the loadhost for the SCS. If a loadhost has not been specified (Flash ROM based
units, for example), the traps will not be sent. The SCS will not generate traps other than the cases listed
here.
C.2 Security
Because SNMP can be used to change security settings, the SCS provides a security mechanism for
restricting SNMP access to the unit. The security mechanism is linked to the SNMP community name. By
default, the only allowed community name is Public, which is given only Read privilege.
C-1
SNMP Support Security
To change, add, or delete community names in the table, Set/Define SNMP and Clear/Purge SNMP are
used. Set SNMP requires specification of a community name and an access type. Available access types are
Readonly, Both (allows read and write), or None. Clear SNMP requires either a community name to remove
a single entry or the All parameter to clear the entire table. Show/Monitor/List SNMP commands require
privileged access to prevent unauthorized users from seeing the allowed community names.
The SCS sends an error message when it receives SNMP queries or Set requests that are not permitted for
the current user.
C-2
D: Supported RADIUS Attributes
This appendix lists and explains the RADIUS attributes currently supported by the SCS. The SCS transmits
these attributes whenever they are appropriate for the given connection.
Users cannot directly specify which attributes the SCS will transmit—this is negotiated for each connection
based on the connection type and requirements. For example, CHAP-Challenge packets are only needed for
PPP connections that authenticate via CHAP.
User-Name
User-Password
CHAP-Challenge
NAS-Identifier The NAS-Identifier is the SCS’s name string configured with the Set/Define
Server Name command.
NAS-Port
NAS-Port-Type
Calling-Station-ID When Caller-ID is enabled on the port and a phone number is found in the
modem’s response string, the SCS will report this value.
Note: For more information about Caller-ID, see the Caller-ID section on page 9-12.
D-1
Supported RADIUS Attributes Access-Accept
D.1.2 Access-Accept
The SCS interprets reply attributes based on the Service-Type received in the Access-Accept. Supported
service types include:
Callback-Login The user is disconnected and called back, then connected to a host.
Callback-Framed The user is disconnected and called back, then begins a PPP/SLIP connection.
Prompt The user is provided with a command line prompt on the SCS from which it is
possible to enter privileged commands.
Note: See RADIUS on page 11-14 for the differences between the login and prompt
service types and how they are handled by the SCS.
The table below shows the additional attributes that can be used in Access-Accept packets sent by the
RADIUS server. Items marked with plus signs (+) are only valid when the Service-Type is Login or
Callback-Login. Items marked with asterisks (*) are only valid when the Service-Type is Framed or
Callback-Framed.
D-2
Supported RADIUS Attributes Framed-IP-Address
D.1.2.1 Framed-IP-Address
Using this attribute is equivalent to setting the remote address range of a site to “undefined.” Two values
are available:
255.255.255.254 (0xFFFFFFFE) assigns the user an address from the SCS IP address pool
If an IP address pool is defined for the SCS and the incoming user asks for an address, one will be assigned
from the pool. If the user asks for a specific address, the user will be given the address, provided it is
available. In the absence of an address pool, the user will be given any address that he requests.
D.1.2.2 Filter-ID
The SCS renames filters by appending suffixes based on the filter type. For example, a filter named “dallas”
configured on the SCS will be renamed “dallas.in” (for an incoming filter), “dallas.out” (for an outgoing
filter), “dallas.idl” (for an idle timeout filter), and “dallas.st” (for a startup filter).
Note: The maximum filter name length is 12 characters, but should be limited to 8
characters to account for the added suffix.
To understand how the Filter-ID attribute works, imagine that user irvine is trying to make a PPP
connection using RADIUS authentication. When the connection is initiated, the SCS starts a copy of the
default site.
During the authentication phase, RADIUS looks in NVR for a site that has the same name as the user. If
RADIUS finds a match, this site becomes the base site. If the SCS does not find a match, RADIUS will use
a copy of the default site as the base site. RADIUS uses the attributes passed from the RADIUS server
during authentication to modify the base site.
If the Filter-ID attribute is present and has the value “irvine,” RADIUS examines NVR for a filter named
irvine.in. If it finds the filter, it uses that filter as the incoming filter for the site. If it doesn’t find the filter,
the incoming filter from the base site, if any, is used. If no incoming filter is defined for the base site, no
incoming filter is used. RADIUS then repeats the process for the other three filter types (outgoing, idle, and
startup). As long as RADIUS finds at least one filter matching the Filter-ID value, the connection will
succeed.
However, if the Filter-ID attribute is present and no filters are found matching the Filter-ID value, the
connection is refused. This prevents a potential security hole created when a user is allowed to connect
without the intended restrictions being enforced.
Note: Because startup filters only apply to outgoing sites, which RADIUS doesn’t
handle, there is no need to define a startup filter for a RADIUS user.
D.1.2.3 Login-IP-Host
If the Service-Type is Login or Callback-Login and the Login-Ip-Host value is not set or is set to 0.0.0.0,
the preferred Telnet host will be used. If the Service-Type is Login or Callback-Login and this value is set
to 255.255.255.255, the user will be prompted to enter the name of the host to use for the connection,
including normal SCS environment strings. If present, the Login-TCP-Port value will override the user-
entered environment.
D-3
Supported RADIUS Attributes Accounting Attributes
If Login-Service is Rlogin and the Login-IP-Host value is not set, the SCS makes an Rlogin connection to
the preferred Telnet host.
Note: Items marked with * are only sent when the Service-Type value is Framed or
Callback-Framed.
Accounting-Start Accounting-Stop
Acct-Session-ID Acct-Session-ID
Acct-Delay-Time Acct-Delay-Time
User-Name User-Name
NAS-Identifier NAS-Identifier
NAS-Port NAS-Port
NAS-Port-Type Class
Calling-Station-ID Acct-Input-Octets
Class Acct-Output-Octets
Service-Type Acct-Input-Packets*
Framed-Protocol* Acct-Output-Packets*
Framed-IP-Address* Acct-Session-Time
Framed-Routing* Acct-Terminate-Cause (if known)
Filter-ID*
Framed-MTU*
Framed-Compression*
Idle-Timeout
Session-Timeout
D-4
Supported RADIUS Attributes Examples
D.3 Examples
The following examples can be used as templates for the public domain Merit RADIUS server available via
anonymous FTP at ftp.merit.edu. The examples will also work with the public domain Livingston
RADIUS server available via anonymous FTP at ftp.livingston.com.
If you are using a different server, please note that the file format for the Merit and Livingston RADIUS
servers are of following form:
Check-items are attribute/value pairs that must be received from the authentication client (for example, the
SCS) for authentication to occur. Reply-items are attribute/value pairs that will be returned to the client upon
authentication. Note that the Merit and Livingston Password attribute may be used to match either User-
Password or CHAP-Password.
Note: Please read your RADIUS server’s documentation for more information about
how to configure your RADIUS server.
This user may be authenticated via PPP PAP, PPP CHAP, or via the local mode username and password
prompts. If authenticated by the latter, the user will automatically be forced to execute the command Set
PPP sitename; Logout where sitename is the name of the site dynamically created by the SCS for this user.
Note: All settings in the default site other than the IP address will apply for this user.
Here is a more complicated example for a dialback PPP user who is not allowed to perform a local mode
login:
D-5
Supported RADIUS Attributes Forcing a Telnet Connection to Preferred Host
The Telnet; Logout command is forced as soon as authentication is complete. To force the user to make an
Rlogin to connect to the preferred Telnet host, add “Login-IP-Service = Rlogin” to the reply-item list.
In this case, if the SCS sends an authentication request for the user froggy with the Service-Type set to
Framed, the authentication request will be rejected by the RADIUS server.
D-6
Index
Numerics Local 12-156
802.11 2-11– 2-15, 12-24 Multiple-user (example) 11-29
Antenna 12-24, 12-25 Outgoing connections 4-19, 11-4, 11-30
Channel 2-15, 12-26 RADIUS 11-14, 12-157, D-6
Errors B-1 RSA 6-12, 6-13
ESSID 12-27 SecurID 11-17, 12-159
Extended Service Set ID 2-14 Shared key 6-12
Fragmentation 12-28 Sites 4-17, 12-132
MAC address 2-14, 12-28 SSH 6-12, 6-13, 6-14
Network mode 2-14, 12-29 Strict fail mode 11-9, 12-161
Power 12-30, 12-31 TFTP 12-162
Region 2-13, 12-30 Troubleshooting 11-33
RTS 12-32 Unique 11-21, 12-163
WEP 2-15, 12-32 User 12-163
Authenticator 11-12
A Authorized keys file
Abbreviation 2-4 Creating 6-11
Access Autobaud 8-13, 12-58
Dynamic 8-1, 12-57 Autoconnect 12-59
Local 8-1, 12-57 Automatic protocol detection 4-12, 4-13, 8-4
None 12-57 Autostart 8-2, 9-11, 12-60
Ports 8-1 Enabling 8-2
Remote 8-1, 12-57 Save 8-9, 12-60
Access Point (AP) 2-12, 2-14 Trigger 8-2
ACCM 7-1
Accounting 11-16
B
Alternate break sequences 3-10 Backspace key 12-63
Analog leased lines 5-13 Backwards 8-5, 12-180
ANSI 8-14 Bandwidth 5-4, 9-12
Antenna, 802.11 12-24, 12-25 Adding 5-7, 5-9, 5-12
Apropos 12-180 Configuring 5-6
ATA flash cards 2-18, 12-182 Controlling 5-5, 12-134
ATA hard-drive PC cards 2-18 Default 5-8
Attention string 9-8, 9-9 Disadvantages of additional 5-5
Authentication 5-1 Displaying current 5-8
Clear/Purge 12-151 Estimating 5-6
Configuring 12-153 Holddown 5-7
Databases 11-3 Measurement period 5-7
Dialback 11-33 Removing 5-7
Displaying 12-177 Basic Service Set (BSS) 2-12
Examples 11-28 Baud rate 8-16, 12-88
Incoming 4-15, 11-1 Boot Configuration Program (BCP) 12-111
Kerberos 11-11, 12-154 Boot parameters 2-6
Bootgateway 12-116
Index-1
Index
Index-2
Precedence setting 11-9 DTE 9-1
Purging user 11-11 DTR 8-22, 9-8
RADIUS 11-14, 12-157 DTRWait 12-71
SecurID 11-17, 12-159 Dyanmic print 12-55, 12-112
Databases E
Search order 11-28 Email notification 3-3
Datasend 8-14, 12-66 Enable string 9-10
Date Environment strings A-1–??
Setting 2-10 Error correction 5-9, 12-10
DCD 8-21, 9-9, 9-11 ESSID 2-14
DCE 9-1 ESSID, 802.11 12-27
Dedicated port 4-13, 12-68 Ethernet
Dedicated protocols 4-13, 8-8 Configuring interfaces 12-35
Defaults Purge 12-22
Bandwidth 5-8 Event logging 7-8, 11-25, 11-33
Domain name 6-7 Destination 11-25
Factory 2-5 Levels 11-26
IP router 12-18 Extended Service Set (ESS) 2-12
Modem 12-53, 12-55 EZWebCon 2-1
PPP 7-7, 12-53, 12-55 Configuration files 2-16
Routes 6-19, 6-26
Settings 8-15
F
Define commands 2-3 Filter
Device type 8-14, 12-90 Any 12-167
DHCP Displaying 12-178
Setting 12-117 Generic rule 12-168
Dial string 12-8 IP 12-169
Dialback 9-11, 11-33, 12-70, 12-133 Filter lists 5-8
CBCP 11-7 Creating 11-24
Configuring 12-165 Idle time 5-10
Database 11-6 Order 11-24
Displaying 12-178 Removing 12-152
Drawbacks 11-8 Security
Local mode 11-6 Filter lists 5-2
PPP 11-7 Types 5-2
Process 11-6 Finger 12-186
Removing 12-152 Firewalls 11-23
SLIP 11-7 Creating 11-30
Direct connections 5-13 Flash disk 2-18, 12-182
Disable string 9-10 Flash ROM 2-6, 12-111
Disk management 12-182 Flow control 8-18, 8-19, 12-72
DNS 6-6, 6-7, 12-39, 12-40, 12-41 Configuring 8-19
Default domain 6-7 Hardware 8-18
DSR 8-10, 8-21 Forcedial 12-146
Automatic logout 8-21 Forward switch 12-73
Logouts 8-11, 12-70 Forwards 8-5, 12-186
Remote logins 8-21 Fragmentation, 802.11 12-28
Index-3
Index
Index-4
K Loss notification 8-13, 12-75
Kerberos 11-11, 12-154 M
Authenticator 11-12 Mac address 2-14
Configuring 11-12 MAC address, 802.11 12-28
Instance 11-12 Markers 5-4
KVNO 11-12 Measurement period 5-7
Principle 11-12 Menu mode 12-76, 12-112
Realm 11-12 Commands 3-4
KVNO 11-12 Configuration files 3-5
L Configuring 3-4
LAN to LAN 4-2 Displaying 12-129
Bidirectional calling 4-22 Enabling 8-12
Calling one direction 4-21 Entries 12-111
Example 4-21 Menus
IP routing 4-8, 4-9 Nested 3-7
Sites 4-5, 4-6 Metric 6-20
Without modems 5-13 MIB (Management Information Base) C-1
Latency 5-9 Mode
LCP 7-1 Character 4-15
Event logging 7-8 Local 11-6
Line speed 9-2 Menu 3-4, 8-12, 12-112
List commands 2-3 Modem (emulation) mode 8-23
Loadhost 12-120 Modem emulation
Local Ports 12-76
Database 11-9 Modems 9-1
Local prompt 2-2, 2-9 Answer 12-3
Starting PPP or SLIP 4-12 Attention 12-4
Local switch 8-5, 12-74 Busy 12-4
Lock 8-9, 11-21 Caller-ID 9-12, 12-5
Logging Carrierwait 12-5
Configuring 12-172 Commandprefix 12-6
Destination 11-25 Compression 9-9, 12-6
Displaying 12-179 Configuration 4-18
Event 11-25 Connect string 12-7
LoggingLevels 11-26 DCD 9-9, 9-11
Login banner pages 3-8 Default settings 12-53, 12-55
Login password 8-10, 12-78, 12-79 Dial string 12-8
Logins Dial tone 12-12
Character mode 11-1, 11-5 Error correction 9-9, 9-10, 12-10
PPP 11-3, 11-5 Error string 12-9
SLIP 11-4 Examples 9-13
Logouts External switches 9-8
Automatic 8-11 High speed 5-10
Command 8-9 Incoming calls 9-9
Idle 8-11 Init string 9-4, 12-11
Inactivity 5-10, 12-74 Initialization 9-8
Index-5
Index
Index-6
Login 2-7 Buffering 3-2
Privileged 2-8 Character size 12-64
Passwords 2-7 Commands 8-1, 12-52
Limiting attempts 12-122 Configuration 8-13
Local 4-14, 11-2, 11-3 Dedicated 4-13, 12-68
Local database 12-176 Dedicating 4-13, 8-8
Login 4-15, 6-10, 8-10, 11-1, 12-78, 12- Default settings 8-15
79, 12-119, 12-121 Dialback 12-70
Privileged 12-123 Displaying 12-96
Remote 4-17 DSR logouts 8-11
UNIX password file 11-19 Email notification 3-3
Username/password pair 11-2 Flow control 8-18, 8-19
PC cards Inactivity logouts 8-11
802.11 2-11 Locking 8-9, 11-21, 12-52, 12-120
ATA flash 2-18 Login password 8-10, 12-121
ATA hard-drive 2-18 Logout 12-53
Commands 12-179 Modem emulation 12-76
Show 12-179 Modes 8-3
Performance Naming 8-13, 12-77
Increasing 5-8 Parity 12-77
Permanent connections 12-143 PocketPC 12-79
Ping 12-188 PPP 12-81
Pocket PC PPPDetect 12-84
PPP Support 7-7 Preferred 12-79
PocketPC Priority numbers 5-6
Ports 12-79 Privilege status 12-92
Pools Purge 12-53, 12-55
IP address 6-3 RADIUS 11-14
Port log Reducing used 5-10
Viewiing 3-2 Restrictions 8-9, 8-12
Port logging RJ45 8-21
Enabling 3-2 Securing 11-20
Port modes 8-3 Security 8-12, 12-85
Character 8-3 Serial data 12-85
Menu 12-76 Services 10-1, 12-105
PPP 8-3 Session limit 12-126
SLIP 8-3 Signal check 8-10, 12-86
Port user restrictions 11-8 Sites 12-143
Ports 4-17, 8-1 SLIP 12-87
Access 8-1, 11-8, 11-22, 12-57 Speed 12-88
Authentication 8-11, 12-58 SSH connections 6-10
Autobaud 12-58 Starting 8-1, 8-2
Autoconnect 12-59 States 4-20
Automatic logouts 8-11 Stop bits 12-89
Autostart 8-2, 9-11, 12-60 Telephone numbers 4-19
Bandwidth 5-6 Testing 12-99
Broadcast messages 8-12, 12-63, 12-64 Unlocking 12-100
Index-7
Index
Index-8
Reset string 9-9, 12-13 S
Restrictions Save 12-189
Connection times 5-16 Save string 9-8
Filters 11-30 Secure users 8-12, 12-85
User 11-19 SecurID 11-17, 12-159
Return characters, Padding 8-14 Configuring 11-18
Ring string 12-14 PAP 11-17
RIP 4-9, 4-10, 6-22 Passcodes 11-17
Disabling 4-10 Precedence 11-18
Enabling 12-140 Security 5-1, 11-1
Metric 4-10 Authentication 5-1
Proxy ARP 6-22 Commands 12-151
Subnetworks 6-23 Dialback 11-33
Updates 4-10 Filters 11-30
RJ45 8-21 Outgoing authentication 11-30
Rlogin 6-9, 12-22, A-2 Secure server setting 11-22, 12-119
Enabling 12-125 Table 6-18
Incoming connections 6-10, 11-22 Serial breaks 3-9, 3-10
Outgoing connections 6-9, 11-22 Serial data
ROM 2-18 Email notification 12-71
Router Email sites 12-55
Stub 4-8 Logging 3-2, 12-85
Routers 6-1, 6-19 Serial delay 12-66
Remote 4-19 Serial port
Trusted 12-47 Default parameters 2-2
Routes Serial speed 9-2
Costs 6-20 Server
Host 6-3 Altprompt 12-115
Routing Bootgateway 12-116
Default routes 6-26 BOOTP 12-115
Efficient routes 6-19 Broadcasts 12-116
RIP 6-22 Buffering 12-116
Routes 6-19 Clock 12-117
Table 6-22 DHCP 12-117
Routing table 6-23 Displaying 12-129
Routing tables 6-19 Displaying users 12-131
RS-422 8-18 Host limit 12-118
RS-485 8-15, 12-93, 12-98 Idle logouts 8-11
Four-wire mode 8-17 Inactivity timer 12-118
Termination 8-18 Incoming connections 12-119
Two-wire mode 8-16 Initialize 12-111
TXDrive 8-17 Loadhost 12-120
RTS 8-18 Locking ports 12-120
RTS, 802.11 12-32 Name 6-7, 12-121
RTS/CTS 12-72 Privileged user 12-123
Rwho 6-6 Prompt 12-123
Index-9
Index
Index-10
Incoming connection 4-13 Length 6-6
IP address 6-4 Setting 6-5
Local prompt 4-12 Switch
Mode 8-3 Backward 12-61
Ougoing 11-5 Forward 12-73
Sites 12-145 Local 8-5, 12-74
SLIPDetect 4-15, 12-88 Synchronous leased lines 5-13
Starting 4-11, 12-96 T
Static routing 5-15 Tables
Without modems 5-15 ARP 6-3
Slot number 5-9 Routing 6-19, 6-20, 6-23
SNMP 3-14, 12-153, C-1 SNMP security 12-153
Configuring 12-177 TCP
Displaying 12-179 Listener service 10-3
Sockets A-2 TCP/IP
TCP listener 10-3 Buffer size 12-116
Softcopy 8-14 Host limit 12-118
Software 8-19, 12-191 TCPport 10-3, 12-107
File name 12-126 Telephone numbers 4-17
Reloading 2-6 Assigning 4-19, 12-145
Startup file 12-127 Defining 4-17
Source command 12-131 Telnet 6-9, 12-51
SSH 12-51, A-2 Incoming connections 6-10, 11-22
Compression 6-10 Outgoing 6-9
Connections 6-10 Raw connections A-2
Encryption 6-10 Re-enabling 6-17
Host key 6-11 Send 12-23
Incoming Connections 6-15 Telnet pad 8-14, 12-89
Outgoing 6-16 Telnetport 10-3, 12-108
Password 6-14 Terminal
Restriciting connections 6-17 Type 6-9, 12-90
RSA authentication 6-12, 6-13 Terminal adapters 9-12
Supported Connectons 6-11 Terminal type 8-14
UNIX and Non-Unix Connection Termination, RS-485 8-18
6-15 TFTP 12-39
SSH version Configuration file 12-131
Changing 12-114 Password file 11-19, 12-162
Static routes 6-26 Software download 12-126
Static routing 5-14, 5-15 Time
Statistical multiplexors 5-13 Ranges 12-146
Strict fail mode 11-9, 12-161 Setting 2-10
Stub router 4-8 Timeouts 5-4
Subnet masks 6-1, 12-45 Timeserver
BOOTP 6-5 Configuring 2-11, 5-11
CIDR 6-5 Timezone
Contiguous 6-23 Displaying 12-131
Displaying 6-5
Index-11
Index
Index-12
Index-13