Home
Avaya Using Technician Interface Software User's Manual
Contents
1. Table 8 4 Technician Interface Access Levels continued Command User Manager let refer to Writing Technician Interface Scripts vA va list Y Y loadmap Y log Y Y logout Vv Vv mibget refer to Writing Technician Interface Scripts Y Y mkdir DOS only A more A A mount DOS only Y Y octetfmt refer to Writing Technician Interface Scripts Y V on Vv Y osidata Y Y partition vA Y password Manager Vv password User vA va pause refer to Writing Technician Interface Scripts Y va ping Vv Y pktdump refer to Troubleshooting Routers VY printf refer to Writing Technician Interface Scripts A A prom V readexe Vv Vv record va rename DOS only V reset Y restart Y return refer to Writing Technician Interface Scripts Y V Y rmdir DOS only 8 80 114088 Rev A System Administration Table 8 4 Technician Interface Access Levels continued Command User Manager run refer to Writing Technician Interface Scripts VY A save aliases save config save env refer to Writing Technician Interface Scripts save log set setenv refer to Writing Technician Interface Scripts show refer to Using Technician Interface Scripts source aliases source env refer to Writing Technician Interface Scripts sprintf refer to Writing Technician Interface Scripts NISSEN SIS stamp stop LN and CN only
2. APPN ping ping of bay did not complete in the time allowed An unreachable message This message appears if no route could be calculated to the remote device or if the remote device does not support APINGD A sample message follows APPN ping bay is unreachable An invalid name message This message appears if the specified node name or mode name is invalid A sample message follows APPN ping invalid name specified AN APPN service is not running message This message appears if the APPN service is disabled on the router A sample message follows APPN ping APPN service is not running 114088 Rev A 3 25 Using Technician Interface Software Examples If you enter on one line ping appn raleigh ping appn raleigh r100 S2000 m inter ping appn raleigh r10 s2000 m batch t100 The system Pings the device at the APPN address raleigh and waits up to 15 seconds default for a response The console dis plays one of the following messages APPN ping raleigh is alive APPN ping raleigh is unreachable Pings the device at the APPN address raleigh 100 successive times sending 2000 bytes of data with each ping and specifying the interactive mode The con sole displays one of the following mes sages APPN ping ping of raleigh did not complete in the time allowed APPN ping raleigh is alive APPN ping raleigh is unreachable Pings the device at the APPN address raleigh 10 successive times
3. C 14 114088 Rev A Using Syslog Messaging to Monitor Router 4 Save the changes you made to syslog conf 5 Enter the UNIX ps command to obtain the process id for the Syslogd process currently running on the workstation 6 Reinitialize Syslogd by entering the following command at the UNIX command line prompt kill HUP lt process_id gt Configure in the same way any other UNIX workstations you use to manage your network To view on a UNIX workstation event messages from a Bay Networks router open the file you designated on the workstation to receive Syslog messages from routers in your network Configuring Syslog on the Router You can use Technician Interface commands to configure Syslog on a router You configure Syslog as a sequence of tasks where some tasks include one or more numbered steps The following is an overview of the tasks required to configure Syslog on a router 1 Using the console attached to the router or using a Telnet connection to the router open a Technician Interface session Define a slot mask a slot map for loading Syslog on the router Create the Syslog entity on the router Configure Syslog global attributes Add a remote host to the Syslog Host Table Add an entity filter to the Syslog entity filter table Nn WwW FY N Return to Task 5 to add another remote host or return to task 6 to add another entity filter for the remote host otherwise go to Task 8 8 Save to a fil
4. 2 16 114088 Rev A Parameter Attribute Name Attribute Number Default Options Function Instructions Command MIB Object ID Parameter Attribute Name Attribute Number Default Options Function Instructions Command MIB Object ID Configuring the Console Port Force User Logout wfSerialPortUserAbortLogoutDisable 31 2 Disable 1 Enable 2 Disable Specifies whether or not the user can execute a control c C to break out of a user autoscript at login when a user autoscript is in effect Set the parameter to Enable to prevent the user from using C to break out of the user autoscript at login Set the parameter to Disable to allow the user to execute C to break out of the user autoscript at login Use the default Disable if you want users to access the Technician Interface Set to Enable if you want to force users to enter the Telnet logout command set wfSerialPortEntry 31 lt port_no gt lt option gt 1 3 6 1 4 1 18 3 3 2 11 1 1 31 History Depth wfSerialPortHistoryDepth 32 20 commands 1 to 40 commands Specifies the maximum number of Technician Interface commands stored in the local command history table The table stores each command you enter at the Technician Interface prompt on a first in first out FIFO basis Set the maximum number of commands that you want the router to remember for subsequent recall via the Technician Interface history
5. 8 38 114088 Rev A System Administration During an update the system erases the image stored in the target PROM and writes the new image into the PROM This is sometimes called burning the PROM To verify the image update the system compares the contents of the new image file to the image file in the PROM Upgrading PROMs Remotely Because the operations involved in upgrading PROMs place an increased load on the router there is a greater chance that the PROM upgrade process will time out or fail during periods of peak traffic on your network Caution If the PROM upgrade process is interrupted the router could be disabled Follow these guidelines to ensure that the PROM upgrade is successful e Store the PROM executable files for example frediag exe or freboot exe on a Flash card that resides on the least utilized slot in the system e Perform the upgrade during non peak hours to ensure a minimum traffic load on the router e On multislot systems upgrade the PROM for each slot separately Attempting to upgrade multiple slots at the same time increases the load on the backplane Determining Current PROM Image Versions To decide whether or not you need to upgrade the PROMs in a router you need to determine the versions of Boot and Diagnostics PROM images currently running in that router Note A label on the back panel of some router models indicates the installed version of Boot and Diagnostic PR
6. For example to upgrade the diagnostics PROMs in Slots 2 through 5 you can enter prom w 2 frediag exe 2 5 Caution When upgrading PROMs with new software upgrade all slots that contain FRE modules to avoid a mismatch of software More examples of command lines appear at the end of this section 8 42 114088 Rev A System Administration To verify successful completion of a PROM upgrade enter prom v lt volume_no gt lt Diag_PROM_source_file gt lt slot_ID gt For example for a boot PROM enter prom v lt volume_no gt freboot exe asnboot exe anboot exe lt s ot_ D gt For a diagnostics PROM enter prom v lt volume_no gt frediag exe asndiag exe andiag exe lt s ot_ D gt The system verifies that the PROM image on a designated Flash volume that is the image file used as a source for upgrading the PROM matches the image actually stored in the boot or diagnostics PROM on a designated slot When you use the v option the console displays one of the following messages after the verification routine terminates prom slot lt slot_ID gt completed successfully prom PROM data does not match file data on slot lt slot ID gt If the operation succeeds the new images stored in the boot and diagnostics PROMs run when you reboot the router If the operation fails the console displays a message describing the cause of the failure Additional Examples If you enter pro
7. string system S telnet s tftp type unalias unmount DOS only unsetenv refer to Writing Technician Interface Scripts verbose NINES SNUS wfsnmpkey wfsnmpmode wfsnmpseed QINENSE SENSES SENSE N NESSES NNN SENSES SENSES xmodem 114088 Rev A 8 81 Chapter 9 Managing Aliases An alias is acommand you create to take the place of long or multiple commands After creating the alias you enter the alias name to invoke its associated commands This chapter describes how to do the following Create an alias in memory and enter its name to invoke its associated commands Display the commands associated with an alias Debug an alias Delete an alias Save aliases to a file in the NVFS for later retrieval Load aliases from a file into RAM Use the aliases in the debug al file to debug common network problems 114088 Rev A 9 1 Using Technician Interface Software Creating and Displaying an Alias You can use the alias command either to create an alias or to display the commands associated with an existing alias Enter the following to display or create an alias alias lt name gt lt alias_value gt lt name gt is one of the following optional alias name types e The name of the alias you are creating The name may be one to 15 alphanumeric characters the initial character must be alphabetical e The name of an exi
8. Refer to the following section to copy all MIB values from operating RAM toa configuration file for later retrieval 7 8 114088 Rev A Accessing the MIB Saving the Configuration You can copy all MIB values from operating RAM to a configuration file for later retrieval You use the save config command to copy the configuration in memory to the default configuration file or to an alternative configuration file Enter the following where lt filename gt is the name of the file you are creating to store the configuration save config lt vol gt lt filename gt Examples If you enter The system save config 2 config Overwrites the default configuration file config on Volume 2 with the configuration in memory save config 2 config 2 Creates an alternate configuration file named con fig 2 on Volume 2 and stores the configuration resid ing in memory in this file Refer to Booting the Router in Chapter 8 to load a configuration from a file Using the MIB II Counter You can use the MIB II counter feature with Version 8 10 and later router software The feature enables you to track the number of packets each circuit in the Bay Networks router processes at the data link layer You can enable the Bay Networks MIB to count all incoming and outgoing packets by using the set and commit commands with the following parameter 114088 Rev A 7 9 Using Technician Interface Software Parameter Attribute Name Att
9. Vpi vci Atm address IP address Life 0 63 39000000000000000000000000 0000a20d74aa01 128 185 97 74 399 114088 Rev A 3 27 Using Technician Interface Software 2 1 atmarp table a 128 185 97 73 ATM address Vpi vci 39000000000000000000000000 0000a20d74aa01 0 63 Examples client 2 1 atmarp table v 128 185 97 74 Vpi vci Atm address IP address Life 0 63 39000000000000000000000000 00979797979700 2 1 atmarp table a 128 185 97 74 ATM address Vpi vci 39000000000000000000000000 00979797979700 0 63 3 28 114088 Rev A Chapter 4 Managing a NonVolatile File System You can use the Technician Interface to manage nonvolatile file system NVFS files on a Bay Networks router When you manage an NVFS you can Use multiple memory cards Name files Display the status of each memory card installed in the router Display a directory Change the active volume Copy a file from one volume to another or to the same volume Transfer a file Display the contents of a file Delete a file Compact file space Format a memory card Partition a memory card or SIMM Note The NVFS automatically mounts and unmounts memory cards 114088 Rev A 4 1 Using Technician Interface Software Overview The NVFS file system on the router reads and writes to one or more memory cards Memory cards exist in 2 MB 4 MB and 8 MB sizes Each memory card provides system access to the software image and configurati
10. alive message to the console The default is 5 lt repeat_count gt is the number of ping messages to send Enter a value between 0 and 10 inclusive The default is 1 lt size gt is the number of bytes of data to send with each ping The default is 16 p generates a path trace report that displays the intervening hop addresses to the destination lt address gt is the source address v verbose generates statistical information about the ICMP echo request including information about the success rate and round trip time Note Our implementation of the ICMP protocol does not support loopback pinging your own system or broadcast addresses 3 8 114088 Rev A Using Operating Commands The console displays one of the following messages when you issue a ping command if you enter a value in the lt repeat_count gt argument the system displays one of the following messages for the default ping plus one for each additional ping e Analive message This message appears if the system receives an ICMP echo response from the target device within the lt timeout gt allowed The message also indicates the size of the test packet A sample message follows ping 192 32 1 151 is alive size 16 bytes e A does not respond message This message appears if the system does not receive an ICMP echo response from the target device within the lt timeout gt allowed A sample message follows ping 193 32 1 151 d
11. alive message to the console The default is 5 lt repeat_count gt is the number of ping messages to send The system does not wait for the timeout before sending the next ping Enter a value between 0 and 10 inclusive The default is 1 lt size gt is the number of bytes of data to send with each ping The default is 16 p generates a path trace report that displays the intervening hop addresses to the destination Note If you use the p option to display the intervening hops to the destination and the intervening hops are Bay Networks routers the Technician Interface displays their network addresses Otherwise it displays a for each hop that is not a Bay Networks router 3 18 114088 Rev A Using Operating Commands The console displays one of the following messages when you issue a ping command if you enter a value in the lt repeat_count gt argument the system displays one of the following messages for the default ping plus one for each additional ping An alive message This message appears if the system receives a response from the target device within the lt timeout gt allowed The message also indicates the size of the test packet A sample message follows VINES ping 2705682 8003 is alive size 16 bytes A does not respond message This message appears if the address of the target device is resolved but the system does not receive a response from the target device within the lt t
12. lt day gt lt hour gt lt minute gt lt second gt lt deci seconds gt lt direction_offset_from_UTC gt lt hours_offset_from_UTC gt lt minutes_offset_from_UTC gt TS0006A RUIBOOT Date and Time Entry 8 16 114088 Rev A The following table specifies acceptable values for each octet of lt wfRuiBootDateAndTime gt System Administration Allowable Values in decimal Field notation Octet No Year 1996 to 9999 1 and 2 Month 1 to 12 3 Day 1 to 31 4 Hour 0 to 23 5 Minute 0 to 59 6 Second 0 to 60 7 Deci seconds 0to9 8 Direction offset from UTC ASCII 43 for 9 ASCII 45 for Hours offset from UTC Oto 11 10 Minutes offset from UTC 0 to 59 11 Use 60 for leap second Example Schedule a delayed boot event for May 26 1996 at 1 30 15 p m where the actual time and date at the location of the target router is offset from UTC GMT by 9 hours and 22 minutes Assuming that you have already enabled delayed boot services on the router enter the following command line at the Technician Interface prompt set wfRuiBootEntry wfRuiBootDateAndTime 19 96 05 26 13 30 15 00 45 09 22 Figure 8 2 shows how the values date time and UTC offset for this example map into the value of the 11 octet attribute wfRuiBootDateAndTime 114088 Rev A 8 17 Using Technician Interface Software Octet 1 Octet 2 Octet
13. source aliases 2 aliases 1 or Loads the aliases contained in the run 2 aliases 1 or aliases 1 file which is stored on source 2 aliases 1 Volume 2 Note With Version 7 70 or later router software running you can use the source aliases command to load alias files created in any version of Series 7 or later router software You cannot however use earlier releases of router software to read alias files created with Version 7 70 or later software 114088 Rev A 9 9 Using Technician Interface Software Debugging with Predefined Aliases This section describes how to use aliases that are useful for debugging common network problems These aliases are located in the debug al file Enter the following to load the aliases that are predefined for debugging where lt vol gt is the volume containing the files from Bay Networks source aliases lt vo gt debug al Note You can also use run lt vol gt debug al Table 9 1 shows each alias and its associated function To invoke an alias enter the alias after the Technician Interface prompt Follow the alias with a space and the parameter indicated if applicable The console displays the data associated with the alias You can display the commands associated with an alias loaded in memory in two ways e You can use the alias command to display the commands without invoking them e You can use the verbose command to display the commands associated with an alias when
14. Enter next cardcode Valid cardcode yes Login privileges granted From Figure 1 2 PIN accepted by the SecurlD server Figure 1 1 SecuriD Login Procedure and Interface Dialog 1 8 114088 Rev A Introducing the Technician Interface Card is in new PIN mode Enter a passcode after the Enter Passcode prompt ae 1 1 from the router Login lt User Manager gt Password lt password gt Enter Passcode lt cardcode gt New PIN required Do you wish to continue yes no System configured to generate new PINs containing alphanumeric characters or digits only Are you authorized digits only to select your own PIN alphanumeric characters Enter your new PIN containing x characters Enter your new PIN containing x digits New PIN rejected lt Return gt to generate a new PIN and display it on the screen Go to Figure 1 1 New PIN accepted The SecurlD Server accepted your new PIN New PIN protocol aborted Figure 1 2 SecurlD PIN Assignment Procedure and Interface Dialog 114088 Rev A 1 9 Using Technician Interface Software Technician Interface Welcome Screen When you initially boot a router during installation using the configuration file ti cfg you receive a colon as the login prompt on your console display or Telnet connection For example booting from a console locally connected to
15. Enter stamp to display the current software version and the date and time it was created 8 32 114088 Rev A System Administration Halting Packet Transfer between Slots When you reset a slot containing a processor FRE or ACE module the router automatically halts packet transfer between the resetting slot and the other slots in the router Packet transfer automatically resumes after the slot is operational again When you hot swap a FRE module the router also automatically halts and then resumes packet transfer When you hot swap Bay Networks ACE module be sure to enter the following Technician Interface command first where lt slot_no gt is the number of the slot containing the ACE you are going to hot swap stop lt slot_no gt This command halts packet transfer between the slot you specify in the lt slot_no gt field and the other slots in the router When you insert another ACE module in the slot ACE diagnostics automatically start up the software resumes on the slot and the other slots are informed that the slot in question is available for packet transfer Verifying and Upgrading Software The Technician Interface provides the following commands for verifying and upgrading executable software e The readexe command calculates file header and image checksums on executable files on the file system verifies that the checksums match those within the files and displays the results and all file header informati
16. If the protocol application cannot find in the internal cache a route to the desired destination then it searches the main routing table to find one Once the application finds a route in the main routing table it adds that route to the internal cache for the local slot If the routing table changes with old routes replaced by new routes the changes also propagate to the internal cache on the same slot The internal cache is limited and fixed in size and operates on a first in first out FIFO basis For this reason cache entries routes also have a finite lifetime determined by the size depth of the internal cache The larger the size of the internal cache the longer it takes for an entry in that cache to disappear With the ip command you can examine e The entire contents of the internal cache on any slot e A subset of the total contents of the cache on any slot To view the internal cache on any slot enter the ip command using the following syntax ip cache 255 255 255 255 lt s gt lt S gt is a slot number 255 255 255 255 is the default address bit mask for the internal cache on any slot 114088 Rev A 8 75 Using Technician Interface Software OSPF Link State Database With the ip command you can examine e The entire contents of the router s OSPF Link State Data Base OSPF LSDB e A subset of the detailed contents of the router s OSPF LSDB To view the OSPF LSDB enter the ip command using the
17. Using Out of Band Access to Transfer Files 10 Enter an xmodem send binary command with the print display transfer events and information option flag p set in the command line as follows xmodem sbyp lt source_vol dir gt lt filename gt lt filename gt sb is a send binary file y is the YMODEM file transfer option p prints displays important information and events pertaining to the file transfer s you are about to initiate lt source_vol dir gt The disk drive volume and directory that contain the files you want to send to the router lt filename gt lt filename gt The names of the files you want to send from the workstation to the router If you want to enter multiple filenames as part of a YMODEM batch file transfer operation insert a space character between filenames For more information on Technician Interface filename specifications refer to Chapters 4 and 5 Pressing return to execute the xmodem command triggers the necessary handshakes between the YMODEM protocol program running on the workstation and the YMODEM program running on the router This handshaking in turn triggers the start of the file transfer s you specified in the xmodem command entered at the UNIX command line prompt 114088 Rev A Using Technician Interface Software 11 12 Workstation and router response typical XMODEM Send Function File Name atl cfg File Size 7k 56 Records 7160 Bytes Estimated
18. Using Technician Interface Software Router Software Version 11 0 Site Manager Software Version 5 0 Part No 114088 Rev A August 1996 Bay Networks Bay Networks 4401 Great America Parkway 8 Federal Street Santa Clara CA 95054 Billerica MA 01821 Copyright 1988 1996 Bay Networks Inc All rights reserved Printed in the USA August 1996 The information in this document is subject to change without notice The statements configurations technical data and recommendations in this document are believed to be accurate and reliable but are presented without express or implied warranty Users must take full responsibility for their applications of any products specified in this document The information in this document is proprietary to Bay Networks Inc The software described in this document is furnished under a license agreement and may only be used in accordance with the terms of that license A summary of the Software License is included in this document Restricted Rights Legend Use duplication or disclosure by the United States Government is subject to restrictions as set forth in subparagraph c 1 ii of the Rights in Technical Data and Computer Software clause at DFARS 252 227 7013 Notice for All Other Executive Agencies Notwithstanding any other license agreement that may pertain to or accompany the delivery of this computer software the rights of the United States Government regarding its use r
19. lt IP_Hexadecimal_Address gt as your SecurID server If you accepted the default port the following message appears on your console display The default port 755 will be used for SecurID services 8 50 114088 Rev A System Administration If you entered a different port number the following message appears on your console or Telnet display The port lt port_number gt will be used for SecurID services Is this information correct yes no yes If you entered no go to step 4 otherwise securelogin replies with Telnet login now requires SecurID followed by Reinitialize Client yes no yes a If you entered no go to step 3b otherwise securelogin replies with Client reinitialized You have completed the procedure The SecureID client software on the router has been reinitialized If you want to disable SecureID login for Telnet users follow the procedure in the next section Disabling SecureID Authentication b If you entered no securelogin replies with Client not reinitialized You have completed the procedure but the SecureID client software on the router has not been reinitialized You entered no indicating that the information about SecurID setup was incorrect securelogin replies with Do you still wish telnet login to require SecurID yes no yes If you entered yes return to step 2 if you entered no go to step 5 You entered no indicating that you do not want Telnet users to
20. 407 997 1714 In addition you can receive information on support programs from your local Bay Networks field sales office or purchase Bay Networks support directly from your authorized partner xxviii 114088 Rev A Technical Support and Online Services Bay Networks Information Services Bay Networks Information Services provide up to date support information as a first line resource for network administration expansion and maintenance This information is available from a variety of sources World Wide Web The Bay Networks Customer Support Web Server offers a diverse library of technical documents software agents and other important technical information to Bay Networks customers and partners A special benefit for contracted customers and resellers is the ability to access the Web Server to perform Case Management This feature enables your support staff to interact directly with the network experts in our worldwide Technical Response Centers A registered contact with a valid Site ID can e View a listing of support cases and determine the current status of any open case Case history data includes severity designation and telephone e mail or other logs associated with the case e Customize the listing of cases according to a variety of criteria including date severity status and case ID e Log notes to existing open cases e Create new cases for rapid efficient handling of noncritical network
21. Bay Networks Router UNIX System UNIX System Error Event Message Error Codes Levels Severity Levels 1 LOG_EMERG Fault 2 LOG_ALERT Warning 3 LOG_CRIT Warning 4 LOG_ERR Warning 5 LOG_WARNING Warning 6 LOG_NOTICE Info 7 LOG_INFO Info 8 LOG_DEBUG Debug Trace 114088 Rev A Using Technician Interface Software You determine how Bay Networks router event message severity levels map to error levels on your UNIX workstation based on requirements of the network management application software you want to use Refer to Configuring Syslog on the Router for instructions on how to map router event messages to UNIX system facility and error level codes Time Sequencing Syslog Messages If you enable the message time sequencing feature Syslog on each slot e Polls that slot for event messages logged since the previous polling attempt e Filters all event messages retrieved via polling e Reformats router event messages into Syslog message format e Forwards Syslog messages to a Sequencer gate which arranges in time stamp order any messages it receives e Forwards sequenced messages from the router to the appropriate remote hosts Without sequencing Syslog polls filters reformats and forwards messages from each slot to IP on the router IP forwards the messages in retrieved order to the appropriate remote hosts Syslog Message Handling on a Workstation Syslogd on your manageme
22. The following autoscript files for the Manager login and the User login are configured using the Technician Interface software Manager login autoscript PE HE REE REE HERE EE EE EE EE EAE EE RE EEE EEE EERE REE ERE Autoscript for Manager Copyright 1995 Bay Networks Inc HHEE ETH HEE EE HE HEE EE HH HHA EE EE HERE EHH EEE HE EEE EEE EHH HEE Initialize aliases for script based commands alias sho run show bat S alias show run show bat S alias setpath run setpath bat alias disable run disable bat alias enable run enable bat alias monitor run monitor bat alias menu run menu bat S User login autoscript HHEE EE HEHE EEE HEE EEE HH HEE EH HE HEE EE REE EHH EHRAEEEE EE H EHEE Autoscript for User Copyright 1995 Bay Networks Inc HHEE ERE EEE EEE HE HEE HH HEE EEE HE HEE HEHE EEE HEE HEE EEE EHH HEHE Initialize aliases for script based commands alias sho run show bat S alias show run show bat S alias setpath run setpath bat alias disable run disable bat alias enable run enable bat alias monitor run monitor bat alias menu run menu bat S 2 20 114088 Rev A Configuring the Console Port Customizing Autoscript Files You can customize the automgr bat or autouser bat scripts by entering the appropriate commands or aliases into the scripts Refer to Chapter 9 of this guide and the Writing Technicia
23. Transferring Files from Router to UNIX Workstation sesseeeeeseeeseeesssesrerssrnssns B 10 Transferring Files from UNIX Workstation to Router EEEE A E B 13 Out of Band File Transfers from a Windows Workstation cccccccseeeeeeeeeeeteeeeeeees B 17 xmodem and the Bay Networks Communications Terminal Program 0 0 B 17 ESTA WAE sanane A B 18 Checking and Verifying Current Modem Interface Settings ceeeees B 19 Initializing the Local WOM suseso rianda ei B 21 Usma Witermi Telephone Call FUNCIONS ccsccisiscsticctsccarcaceadacidianreiaaseeesiiamiigcentaiiens B 22 Bialinga Remote POUEI csi sscecsrasn rte en oiacaminaadaatinieninett wdinaeninianies B 22 Logging In to the Routers Technician Interface ccccceeseeeeeseeeeeteeeeteeeeeeneees B 24 114088 Rev A xi Pile tTansier FUNCIONS scansano AANA B 24 Transferring Files from Router to DOS Workstation 0 ccccceecseeeeeeeeeeeeeeeteeeees B 25 Transferring Files from DOS Workstation to Router isisisisissnidiniiiiinieinniierinsnas B 28 Gosia NS Comecon eea AE Site eae B 30 Quitting WRS eee re ee eer E EE E PN B 31 Appendix C Using Syslog Messaging to Monitor Router Events EE E E E E E O E E E C 1 Remolie FISTS and FINES ainiin inania ida deanei aaan C 4 Fono me ENS LOD aridin C 5 dentino Ente FRSE nainn aR rrr paceet prerree tery rset rere rt rere eer C 5 Fitermng By Event WINE snicccsttoctipan mcenaiawasen mat a i C 6
24. accessed To use InfoFACTS in the United States or Canada call toll free 1 800 786 3228 Outside North America toll calls can be made to 1 408 764 1002 In Europe toll free numbers are also available for contacting both InfoFACTS and CompuServe Please check our Web page for the listing in your country How to Get Help Use the following numbers to reach your Bay Networks Technical Response Center Technical Response Center Telephone Number Fax Number Billerica MA 1 800 2LANWAN 508 670 8765 Santa Clara CA 1 800 2LANWAN 408 764 1188 Valbonne France 33 92 968 968 Sydney Australia 612 9927 8800 612 9927 8811 Tokyo Japan 81 3 5402 0180 33 92 966 998 81 3 5402 0173 114088 Rev A XXxi Chapter 1 Introducing the Technician Interface The Technician Interface provides management access to a Bay Networks router by means of e Telnet inband connection to the router e Direct or dial out of band connection to the router s console port You can use the Technician Interface to install a router and to maintain or diagnose router operation In addition you can use the Technician Interface to monitor and configure certain basic functionality in the Bay Networks router Refer to Using Technician Interface Scripts and Writing Technician Interface Scripts for more information on performing these tasks This chapter describes e D
25. command set wfSerialPortHistoryDepth 32 lt port_no gt lt option gt 1 3 6 1 4 1 18 3 3 2 11 1 1 32 114088 Rev A 2 17 Using Technician Interface Software Parameter Attribute Name Attribute Number Default Options Function Instructions Command MIB Object ID Parameter Attribute Name Attribute Number Default Options Function Instructions Command MIB Object ID Maximum Autosaved Files wfSerialPortAutoSaveNumFiles 33 0 log autosave off 1 to 99 Specifies the number of times the system saves the events log to a new file automatically when the log is full The system saves the log the maximum number of times you specify or until the memory card or diskette drive on the router becomes full Accept the default value 0 disabled or specify the number of times you want to save the log to a new file set wfSerialPortEntry 33 lt port_no gt lt option gt 1 3 6 1 4 1 18 3 3 2 11 1 1 33 Autosave Volume wfSerialPortAutoSave Volume 34 None Any valid memory card volume slot number from 1 to 14 or the diskette drive designation a Specifies the target volume where the system stores new log files saved through the log autosave feature Specify the memory card or diskette file system volume on which you want to save the events log through the log autosave feature set wfSerialPortEntry 34 lt port_no gt lt option gt 1 3 6 1 4 1 18 3 3 2 11 1 1 34 2 18 1
26. gt lt option gt 1 3 6 1 4 1 18 3 3 2 11 1 1 15 Note To help identify the slot where the Technician Interface that is your console or Telnet session is running you can configure the console and Telnet prompts on Bay Networks routers in your network to lt router_name gt slot The router substitutes for slot the number of the actual slot where the session is running on the router For more information on how to configure the Telnet prompt on a router refer to Configuring IP Utilities Parameter Attribute Name Attribute Number Default Range Function Instructions Command MIB Object ID Login Timeout wfSerialPortLoginTimeOut 16 1 min 1 to 99 min 99 indicates infinity Specifies the number of minutes the Technician Interface waits to time out when no one has pressed the enter key after the Login prompt This parameter is valid only when Modem Enable is set to 1 Enable The Technician Interface hangs up the phone when the timeout value is exceeded Accept the default 1 minute or specify a different timeout value set wfSerialPortEntry 16 lt port_no gt lt option gt 1 3 6 1 4 1 18 3 3 2 11 1 1 16 2 12 114088 Rev A Configuring the Console Port Parameter Attribute Name Attribute Number Default Range Function Instructions Command MIB Object ID Parameter Attribute Name Attribute Number Default Range Function Instructions Command MIB
27. initializes The cold start trap is delayed up to 30 seconds to give the network interfaces time to initialize thus improving the chances that the trap will be received by all the registered managers of this device Issued when the management protocol is re enabled after being disabled Issued when an interface has been initialized and is providing service to upper layers Note that during system initialization the transmission of link traps may be masked because the network layer may not be fully initialized and ready to send traps Issued when an interface is no longer providing service 114088 Rev A A 9 Using Technician Interface Software authenticationFailure egpNeighborLoss enterpriseSpecific Unsupported Operations Issued when an SNMP access occurs An invalid access occurs if a bad community or illegal manager address is used Authentication traps will be masked if they are not enabled Issued when an acquired EGP neighbor is lost All Bay Networks router system log events can be sent as traps They must be configured through the wfSnmpTrapEntityTable and the wfSnmpTrapEventTable The specific trap value is a four byte value The first most significant byte indicates the slot generating the event the second byte indicates the severity debug 1 informational 2 warning 4 fault 8 and trace 16 the third byte indicates an entity code for example ip 2 snmp 3 csmacd 9 and the fou
28. lt vol gt lt log_file gt d lt date gt t lt time gt e lt entity gt f lt severity gt s lt s ot_ID gt Refer to Logging and Displaying Event Messages earlier in this chapter for a description of the optional arguments Examples If you enter The console displays log 2 10_12 log All events stored in the 0_ 2 log file in Slot 2 log 2 10_12 log eTFTP All events logged by the TFTP driver and stored in the 10_12 log file in Slot 2 log 2 10_12 log All trace and fault events logged by the SNMP driver eSNMP ftf and stored in the 0_ 2 log file in Slot 2 log 2 10_12 log s3 All events logged to Slot 3 and stored in the 10_12 log file in Slot 2 114088 Rev A 6 13 Using Technician Interface Software Clearing Events Clearing events from the events log buffer is useful if you want to conduct an experiment and examine the events log afterwards Note You may want to save the log to a file for later retrieval before clearing it Refer to Saving the Events Log earlier in this chapter Enter the clearlog command with one or more of the following parameters to clear all events from an event buffer or buffers lt slot_no gt is the location of the log buffer you are clearing clearlog lt s ot_no gt clearlog lt s ot_no gt lt slot_no gt clearlog lt s ot_no gt lt slot_no gt The system automatically clears all events from the buffer associated with the slot
29. order 114088 Rev A 6 3 Using Technician Interface Software After log i or log x enter Followed by To specify e lt entity_name gt The name of the software service for which the router will log write event messages to the local events log or exclude from the events log When you specify an lt entity_name gt you must e Use uppercase letters Enter the lt entity_name gt in quotes when that name contains spaces for example FRAME RELAY See Event Messages for Routers and BNX Platforms for a list of router software entity names f lt severity_levels gt The severity levels of messages that the router will log write to the local events log or exclude from the events log The severity codes are e for F for fault e jor for informational e torT for trace e wor W for warning e dor D for debug Debug events are for use and interpretation by Bay Networks Technical Response Center personnel only You can specify in the same log command one or more severity codes For example enter log i fwi to specify a filter that writes only Warning and Info messages to the events log S lt slot_numbers gt The number of the slot s on which the router will write event messages to the local log buffer 114088 Rev A Examples If you enter log i fdft log i fdi s2 log i ff eGAME log i fd s2 eOSPF log i log i fdfitw log
30. sending 2000 bytes of data with each ping and specify ing the batch mode and a timeout of 100 seconds The console displays one of the following messages APPN ping ping of raleigh did not complete in the time allowed PPN ping raleigh is alive PPN ping raleigh is unreachable A A 3 26 114088 Rev A Using Operating Commands Displaying the ATM ARP Table for an Interface You can display the ATM ARP tables for a specific IP interface address by entering the atmarp command during a Technician Interface session The command has the following syntax and options atmarp table lt options gt lt P_address gt lei Purpose a Displays ATM address for the lt P_address gt you enter in the command line r Displays the resolution table for the lt P_address gt you enter in the command line V Displays the Virtual Circuit VC table for the lt P_address gt you enter in the command line l Displays all r v and a tables for the lt P_address gt you enter in the command line lt IP_address gt is the address of an IP interface on the ATM ARP client or server Examples server 2 1 atmarp table r 128 185 97 73 IP address Life ATM address Vpi vci 128 185 97 74 423 39000000000000000000000000 0000a20d74aa01 0 63 2 1 atmarp table I 128 185 97 73 IP Address State Encaps Lifetime Retries 128 185 97 74 Resolved Default 410 0 2 1 atmarp table v 128 185 97 73
31. the router to use for a specific delayed boot event Manage disable re enable or delete delayed boot services or specific delayed boot events configured on a router The router s RUIBOOT software supports all delayed boot services Some Technician Interface commands you use to configure delayed boot services contain the RUIBOOT software entity name Adding Delayed Boot Services to a Router Before scheduling any delayed boot events you must add the RUIBOOT base record to the router configuration as follows 1 Log in to the router s Technician Interface Log in to the Technician Interface of the router you want to configure with a delayed boot event If you need instructions on how to perform a login via local console or remote Telnet session refer to Chapter 1 Define a slot mask for delayed boot services on the router Before creating the delayed boot service on the router define a slot mask for the RUIBOOT entity The slot mask identifies the slots on which the system will load and run RUIBOOT At the Technician Interface prompt enter BN 3 set wfServices wfRuiBootLoad 0 0x7FFE0000 commit This command allows RUIBOOT once created to run on all slots The hexadecimal value Ox7FFE0000 works for any model of Bay Networks router regardless of the number of slots in that router 8 14 114088 Rev A System Administration 3 Create a delayed boot service on the router Create the RUIBOOT service in the rout
32. the severity levels you specify If you specify a range of event numbers using the Log Evt Lower Bound and Log Evt Upper Bound parameters Syslog ignores the Severity Mask parameter If you do not specify a range of event numbers Syslog applies the value of the Severity Mask attribute to the current filter Enter the severity level identifiers of event messages you want to forward to the remote host associated with this filter Use the first letter of each event severity level you want to include f fault w warning i information t trace d debug Enter lowercase letters only Do not separate the letters with commas or spaces set wiSyslogEntFltrEntry wfSyslogEntFltrSevMask lt host_IP_address gt lt entity_code gt lt filter_index gt lt witfd gt 1 3 6 1 4 1 18 3 3 2 15 3 1 9 114088 Rev A C 41 Using Technician Interface Software Parameter Attribute Name Attribute Number Default Range Function Instructions Command MIB Object ID Slot Lower Bound wfSyslogEntFltrSlotLowBnd 10 0 0 to 14 Along with the Slot Upper Bound this parameter attribute specifies a slot number or range of slot numbers Syslog forwards to the remote host associated with this filter messages logged only on the slot s you specified Consider the location of each router in an ASN chassis as a numbered slot To specify a range of slots set the value of this parameter attribute to the low number of
33. 1 The table has a single line entry Example The following command retrieves the circuit number attribute 6 for every entry in the CSMACD Line_Table g wfCSMACDEntry 6 wfCSMACDEntry wfCSMACDCct 2 1 ll w wf CSMACDEntry wfCSMACDCct 2 3 2 Example The following command retrieves the circuit number attribute 5 for every entry in the IP Interface table g wflpInterfaceEntry 5 wfIpInterfaceEntry wfIpInterfaceCircuit 192 32 174 33 3 3 wfIpInterfaceEntry wfIpInterfaceCircuit 192 32 174 66 4 4 wfIpInterfaceEntry wfIpInterfaceCircuit 192 32 174 98 2 2 wfIpInterfaceEntry wfIpInterfaceCircuit 192 32 175 66 1 1 The instance ID for each entry in this case is lt IP_address circuit_number gt 114088 Rev A 8 77 Using Technician Interface Software Example The following command retrieves the circuit number attribute 2 for every entry in the Circuit Name table g wiCircuitNameEntry 2 wfCircuitNameEntry wfCircuitNumber 1 1 wfCircuitNameEntry wfCircuitNumber 2 2 wfCircuitNameEntry wfCircuitNumber 3 3 wfCircuitNameEntry wfCircuitNumber 4 4 Technician Interface Commands and Access Levels The Technician Interface provides two access levels e User access level accepts read only commands e Manager access level accepts all Technician Interface commands Table 8 4 lists all Technician Interface commands and their associated access levels Table 8 4 Technician
34. 1 ping 192 32 244 2 ping 192 32 1 151 is alive size 16 bytes 3 10 114088 Rev A If you enter on one line ping 192 32 1 151 t3 r8 s62 ping 192 32 1 151 v Using Operating Commands The system Pings the device at the IP address 192 32 1 151 eight successive times sends 62 bytes of data with each ping and waits up to 3 seconds for a response to each ping The console displays one of the following for each ping sent ping 192 32 1 151 is alive size 62 bytes ping 193 32 1 151 does not respond ping ICMP host unreachable from 192 32 243 1 ping 192 32 1 151 is unreachable Provides statistical information about the ping of IP address 192 32 1 151 For exam ple the console displays the following mes sages 192 32 1 151 icmp_seq 0 time 1 ms IP ping 192 32 1 151 is alive size 16 bytes PING Statistics IP ping 192 32 1 151 responded to 1 out of 1 100 success round trip ms min avg max 1 1 1 114088 Rev A Using Technician Interface Software IPX Ping When you issue the ping command for IPX the router sends an IPX configuration request packet to the remote IPX address that you specify If the remote device is listening on socket number 456h for an IPX configuration request packet it responds if it can be reached and the console displays a message indicating that the device is alive ordoes not respond Note The router also listens for and responds
35. 1 wfHwModuleGroup wfHardwareConfig 4 wfHwidentities wfHardwareConfig 5 wfHwFn wfHwidentities 1 wfHwLn wfHwldentities 2 wfHwCn wfHwldentities 3 wfHwAfn wfHwldentities 4 wfHwAn wfHwldentities 16 wfHwAnMpr wfHwAn 1 wfHwAnHub wfHwAn 2 wfHwBln wfHwidentities 16640 wfHwBcen wfHwldentities 16896 wfHwRblin wfHwidentities 17152 wfHwAsn wfHwldentities 20480 wfHwAsnZ wfHwidentities 20736 wfHwAsnB wfHwldentities 20992 wfSoftwareConfig wfSwSeries7 2 wfSystem wfSwSeries7 3 wfSys wfSystem 1 wfServices wfSystem 2 wfPacketGenGroup wfServices 4 wfGameGroup wfServices 5 wfStaGroup wfServices 6 wfMibHeapGroup wfServices 7 wfCircuitNameExtension wfServices 9 wfNetBootGroup wfServices 10 wfSerialPortGroup wfServices 11 wfFileSystemGroup wfServices 12 wfPingGroup wfServices 13 wfRuiBootGroup wfServices 14 wfSyslogGroup wfServices 15 wfDCMmwGroup wfServices 16 Figure A 1 Sample Top Level Hierarchy of the Bay Networks Router MIB 114088 Rev A A 3 Using Technician Interface Software wfLine wfSwSeries7 4 Figure A 1 wfCSMACDTable wfLine 1 wfWfTokenRingTable wfLine 2 wfAsyncTable wfLine 3 wfFddiTable wfLine 4 wfSyncTable wfLine 5 wfHwF Group wfLine 6 wfHssiTable wfLine 7 wfMcT1Group wfLine 8 wfDS1E1Group wfLine 9 wfDs1 Group wfLine 12 wfDs3Group wfLine 13 wfSipGroup wfLine 14 wfSipPlcpGroup wfSipGroup 2 wfFddiGroup wfLine 15 wf
36. 10 command 6 6 6 13 input filters 6 3 displaying list of 6 5 ouput filters 6 6 login levels 1 3 Manager s Script 2 15 procedure 1 3 retries 2 14 script search path 2 15 timeout 2 13 timeout guidelines 1 11 User s Script 2 16 with password 1 4 with Secure ID 1 5 Login Script Search Path 2 15 logout command 1 12 setting 2 17 loopback 3 8 Management Information Base See MIB manager session command access levels 8 78 to 8 81 starting from within user session 1 13 terminating 1 12 Manager s Login Script parameter 2 15 Manager s login script setting 2 15 memory buffer 6 2 displaying the status of volumes 4 6 formatting 4 20 partitioning 4 21 transferring files to a full card 4 20 using multiple cards 4 3 menu command 1 13 Index 6 114088 Rev A messages mapping router events to Syslog format C 8 time sequencing Syslog C 35 MIB 1 13 accessing 7 1 to 7 8 Bay Networks files A 7 committing sets 7 8 compliance with specifications A 7 getting values 7 4 to 7 6 implementation notes A 8 to A 10 listing objects 7 2 to 7 4 setting values 7 6 to 7 8 structure of A 2 to A 5 using A 1 to A 10 MIB II counter 7 9 mkdir command 5 12 modem enabling a 2 10 monitor command 1 13 more command 3 2 Motorola processor module 4 4 mount command 5 4 N named boot 8 11 NLSP ping response 3 12 Non Volatile File System See NVFS NSAP address 3 15 NVFE
37. 3 3 2 15 2 1 5 C 34 114088 Rev A Using Syslog Messaging to Monitor Router Parameter Host Time Seq Enable Attribute Name wfSyslogLogTimeSeqEnable Attribute Number 6 Default 2 Disable Options 1 Enable 2 Disable Function Enables or disables time sequencing and forwarding of Syslog event messages to the remote host associated with this host entry Instructions Enable this feature only if it is essential for the remote host to receive Syslog event messages in the order in which they were logged on the router When you enable this feature Syslog on each slot Polls the local events log Retrieves messages from the local log Filters the messages Time sequences messages that pass through the filters Forwards sequenced messages to IP on the router which in turn forwards the messages to the remote host associated with this entry When you disable this feature Syslog on each slot Polls the local events log Retrieves messages from the local log Filters the messages Forwards sequenced messages to IP on the router which in turn forwards the messages to the remote host associated with this entry Command set wfSyslogHostEntry wfSyslogLogTlmeSeqEnable lt host_IP_address gt lt 1 2 gt MIB Object ID 1 3 6 1 4 1 18 3 3 2 15 2 1 6 114088 Rev A C 35 Using Technician Interface Software Parameter Attribute Name Attribute Number Default Options Fu
38. 4 instances of the wfSerialPortEntry object Each instance corresponds to one of the following ports e wfSerialPortEntry wfSerialPortName 1 CONSOLE e wfSerialPortEntry wfSerialPortName 2 MODEM1 e wfSerialPortEntry wfSerialPortName 3 MODEM2 e wfSerialPortEntry wfSerialPortName 4 PRINTER Configure the log autosave attributes for the CONSOLE port instance only Model ASN Supports 4 instances of the wfSerialPortEntry object Each instance corresponds to one of the 4 slots possible in an ASN stack Enable the log autosave feature only on one occupied slot in the ASN stack 114088 Rev A Using Technician Interface Software Models 5380 and 5580 System 5000 hubs support up to 14 instances of the wfSerialPortEntry object Each instance corresponds to one of the 14 possible hub slots Enable the log autosave feature only on one slot occupied by a Model 5380 5580 router in a System 5000 hub Multiple 5380 5580 boards installed in the same System 5000 hub operate as one logical router if that hub contains an ATM PPX backplane Note If the System 5000 does not contain an ATM PPX backplane each Model 5380 5580 board operates as an independent router In this case you can configure the log autosave feature on each Model 5380 5580 board independently Configuring the Log Autosave Feature Proceed as follows to enable and customize operation of the log autosave feature 1 Determine how you want to confi
39. Encaps processing The packet will be forwarded out of the interface e Reassembly processing The packet is for this router e Redirect processing An ICMP Redirect packet will be sent from the interface back to the source e Net Unreachable processing An ICMP Net Unreachable packet will be sent from the interface back to the source e Host Unreachable processing An ICMP Host Unreachable packet will be sent from the interface back to the source 114088 Rev A 8 73 Using Technician Interface Software e ARP processing The packet has been held and an ARP request packet has been sent to the LAN for that host When the address is resolved the cache entry for this host is flushed deleted and the packet is forwarded e Multicast processing The packet will be handled using information from the multicast cache More information follows on the multicast cache The internal cache is limited in size and operates on a first in first out FIFO basis For this reason cache entries routes also have a finite lifetime dictated largely by the size depth of the internal cache The larger the size of the internal cache the longer it takes for an entry in that cache to expire With the ip command you can examine the entire contents of the cache for a specific logical interface configured on the router To view the cache for any interface configured on the router enter the ip command using the following syntax
40. Interface to e Specify events you want to include in or exclude from the events log e Specify events you want to display from the events log e Save an events log to a file e Configure the router to save the events log to a new file automatically when the log becomes full e Display an events log file previously saved e Clear event messages from the events log Refer to Event Messages for Routers and BNX Platforms for information about the event display format or about specific events 114088 Rev A 6 1 Using Technician Interface Software Overview The operating software in each processor module logs stores events in a first in first out FIFO memory buffer When you issue a command to display or save the current log the system sorts the events from all processor modules in chronological order You can also clear events from all slots or from a single slot The event logs are checksum protected during a warm start Issuing the boot or reset command or pressing the Reset button warm starts the router However events are lost during a cold start Power cycling the router or issuing the diags command cold starts the router When you remove and reinsert a processor module the events clear from that module only Logging and Displaying Event Messages Use the log command mainly to specify the types of events that you want the router to include in the events log exclude from the events log or display from the events l
41. Object ID Password Timeout wfSerialPortPasswordTimeOut 17 1 min 1 to 99 min 99 indicates infinity Specifies the number of minutes the Technician Interface waits to time out when no one has pressed the enter key after the Password prompt This parameter is valid only when Modem Enable is set to 1 Enable The Technician Interface returns to the Login prompt when the timeout value is exceeded Accept the default value 1 minute or specify a different timeout value set wfSerialPortEntry 17 lt port_no gt lt option gt 1 3 6 1 4 1 18 3 3 2 11 1 1 17 Command Timeout wfSerialPortCommandTimeOut 18 15 min 1 to 99 min 99 indicates infinity Specifies the number of minutes that can elapse before the Technician Interface disconnects the Telnet session if you do not enter a command at the command prompt This parameter is valid only when Modem Enable is set to 1 Enable Accept the default value 15 minutes or specify a different timeout value set wfSerialPortEntry 18 lt port_no gt lt option gt 1 3 6 1 4 1 18 3 3 2 11 1 1 18 114088 Rev A 2 13 Using Technician Interface Software Parameter Attribute Name Attribute Number Default Range Function Instructions Command MIB Object ID Parameter Attribute Name Attribute Number Default Range Function Instructions Command MIB Object ID Login Retries wfSerialPortLoginRetries 19 3 login attempts 1 to 99 99 indicates
42. Serial Port 1 of a router initializes the Technician Interface on Slot 1 of that router and you receive the prompt Led The 1 preceding the colon represents Slot 1 where the Technician Interface is running on the router The 1 following the colon represents Serial Port 1 where you physically connect the console or terminal to the router When you log into the system subsequently by means of simple login or with user authentication with password and or SecurID the Technician Interface by default displays a Welcome message and the prompt Figure 1 3 _ N Bay Networks Inc and its Licensors Copyright 1992 1993 1994 1995 1996 All rights reserved Login Manager Welcome to the Backbone Technician Interface Ka P Figure 1 3 Technician Interface Welcome Screen 1 10 114088 Rev A Introducing the Technician Interface Your network administrator can change the Technician Interface prompt you receive on a local or remote ASCII console or Telnet connection screen For instructions on how to change the Technician Interface login prompt you receive on a local or remote ASCII terminal or console screen see Chapter 2 For instructions on how to change the Technician Interface login prompt you receive on a remote Telnet screen refer to the Configuring TCP Services guide You enter Technician Interface commands after the colon prompt the dollar sign prompt or whatever prompt your ne
43. Use this guide if you are responsible for maintaining a Bay Networks router or BNX platform using Bay Networks Technician Interface commands The guide provides an overview of the Technician Interface and instructions on how to Log in and log out Configure console port parameters Use the Technician Interface operating commands Manage a nonvolatile file system and DOS file system Use the Technician Interface to manage events Configure enable use and disable Secure ID user authentication for Telnet login to the Technician Interface Access the Bay Networks MIB Perform system administration tasks such as booting the router resetting a slot and running diagnostics Manage aliases Use out of band access to transfer files Use the router s Syslog messaging capability to manage event messages on any UNIX based network management workstation 114088 Rev A xix Using Technician Interface Software Audience Written for network managers and router technicians this guide assumes that you have a working knowledge of TCP IP networking and some familiarity with network management principles concerning the MIB SNMP system event messaging file system and configuration management The guide also assumes a working knowledge of hardware elements commonly used in Bay Networks routers for example PROMs Flash memory cards and network cables Note In this guide the term system refers to the router system software Be
44. Using Technician Interface Software This section describes e The asynchronous terminal program available on UNIX and 386 486 DOS remote workstations e The Technician Interface xmodem command its parameters and its options e How you use the asynchronous terminal program and xmodem commands together in procedures for transferring files to and from Bay Networks routers About xmodem Bay Networks routers support xmodem as a Technician Interface command and a set of protocols for moving files between the Technician Interface console port of a router and a remote workstation xmodem is based on the Christensen protocol file transfer utility V3 9 November 1990 You determine the protocol for the task you need to perform by selecting the appropriate syntax parameters and options for each xmodem command You enter xmodem commands directly at the command line prompt of either a UNIX workstation or a 386 486 DOS workstation The procedural information you need to enter and use xmodem commands follows later in this appendix AS a Set of protocols xmodem includes the e XMODEM CRC protocol e MODEM7 batch protocol e XMODEM 1K block protocol e YMODEM batch protocol Of the four protocols available through xmodem commands you need to use only the YMODEM batch protocol to transfer Bay Networks files between a remote workstation and a router For this reason this section covers information on the YMODEM protocol only For information on
45. Wfterm Communications Settings window You access this window by selecting the Settings option of the Modem pull down menu in the Wfterm startup window as shown in Figure B 4 This menu selection invokes the window shown in Figure B 5 114088 Rev A B 19 Using Technician Interface Software Wellfleet Communication Terminal Program l l File ESELA Phone File Transfers Help Settings gt Connect Ctrl C Figure B 4 Accessing the Modem Settings Window Communications Settings Baud rate 300 2400 9600 38400 1200 4800 19200 Data bits _ M Parity Oa O6 8 even mark none O85 OF odd space Stop bits Flush Time Seconds 1 015 C2 Break Time Hundredths O xXonpxoft DTRTime Hundredths O Yield Figure B 5 Verifying or Modifying Modem Interface Settings B 20 114088 Rev A Using Out of Band Access to Transfer Files You access this window by means of the Modem Settings pull down menu in the Wfterm base program window The settings shown in Figure B 5 reflect default operational values for any Hayes compatible modem However if you are sure that current interface settings for the modem locally attached to your Site Manager workstation are correct proceed to Initializing the Local Modem If you are unsure of the current modem interface settings refer to the user manual supplied with the modem make the required chan
46. against message stream modification an intruder cannot reorder a sequence of set requests because the requests counters would not match the next sequence expected by the agent The following sections describe the Technician Interface commands you use to manage the security feature Setting the Router to Operate in Secure Mode The wfsnmpmode command allows you to specify whether or not you want the router to operate in snmp secure mode Enter the wfsnmpmode command in the following format wfsnmpmode 1 3 1 trivial indicates that the router should provide no additional security beyond a simple community name 3 proprietary indicates that the router should operate using our proprietary security mechanism Note Do not use the default Public community and wildcard manager 0 0 0 0 with the router in snmp secure mode Instead configure a specific SNMP community and manager address For more information on how to configure SNMP communities refer to Configuring SNMP BOOTP DHCP and RARP Services 114088 Rev A 8 53 Using Technician Interface Software Setting the Encryption Key Use the wfsnmpkey command to specify the key that the encryption algorithm uses when it encrypts the security counters The encryption algorithm uses the attributes of the key size range and value as integral parts of its encryption process Also when Site Manager issues the first set request within an application it prom
47. can remove these protections Hexadecimal values with a Ox prefix determine the set of attributes associated with DOS files Determine which hex value is associated with the set of attributes you want for a file Then enter the attr command along with the hex value and the name of the file s whose attributes you are assigning Enter the following to assign one or more attributes to a file in the present working directory attr lt hex_value gt lt filename ext gt Enter the following to assign one or more attributes to a file in another directory attr lt hex_value gt lt pathname gt lt filename ext gt You can use the wildcard characters and when naming files Table 5 3 lists the DOS file attributes their meanings and their hex values Table 5 3 DOS File Attribute Hex Values Attribute Flag Meaning Hex Value a Archive needed 0x20 d Subdirectory 0x10 not user modifiable v Volume ID 0x08 not user modifiable s System file 0x04 h Hidden 0x02 r Read only file 0x01 To assign a single attribute to a file use the hex value associated with the attribute you want in the attribute command For example enter the following command to assign the read only file attribute to a file named config located in the present working directory 114088 Rev A 5 19 Using Technician Interface Software attr 0x01 config To assign multiple attributes to a file add the hex values associat
48. change the name of the manager s login script file accept the default Otherwise enter the name of your manager s login script file This name can have up to eight characters followed by up to a three character extension If the login script file does not contain a volume specification the system searches the volumes you specify with the Login Script Search Path parameter set wfSerialPortEntry 29 lt port_no gt lt option gt 1 3 6 1 4 1 18 3 3 2 11 1 1 29 114088 Rev A 2 15 Using Technician Interface Software Parameter Attribute Name Attribute Number Default Options Function Instructions Command MIB Object ID User s Login Script wfSerialPortUserAutoScript 30 None None or autouser bat A script named autouser bat exists within the Technician Interface software You can use the script as is or you can modify it to suit your requirements Executes the user s login script file automatically at login If you did not change the name of the user s login script file accept the default Otherwise enter the name of your user s login script file This name can have up to eight characters followed by up to a three character extension If the login script file does not contain a volume specification the system searches the volumes you specify with the Login Script Search Path parameter set wfSerialPortEntry 30 lt port_no gt lt option gt 1 3 6 1 4 1 18 3 3 2 11 1 1 30
49. delayed boot entries 7 Log out of the Technician Interface session BN 3 logout For more information on how to close a Technician Interface session with a Bay Networks router refer to Chapter 1 114088 Rev A 8 19 Using Technician Interface Software Managing Delayed Boot Services This section describes how to Disable or re enable delayed boot services on the router Disable or re enable a delayed boot event scheduled at an earlier time on the router Change the name of the router software image and or configuration file you want the router to boot with at a later time Delete entries from the RUIBOOT table of delayed boot events Delete delayed boot services from the router Disabling or Re enabling Delayed Boot Services on a Router You can if necessary disable the delayed boot service anytime after enabling it on a router Enter the following command BN 3 set wfRuiBoot wfRuiBootBaseDisable 0 2 commit Enter the following command to re enable the delayed boot service after disabling it on a router BN 3 set wfRuiBoot wfRuiBootDisable 0 1 commit Disabling or Re enabling a Delayed Boot Event Disable or re enable a delayed boot event on the router as follows 1 Enter the following command line to disable a delayed boot event anytime after adding it to the router configuration BN 3 set wfRuiBootEntry wfRuiBootDisable lt wfRuiBootDateAndTime gt 2 commit Enter the following command l
50. dici gt Lists all MIB attributes for the virtual circuit table of the specified Frame Relay PVC 114088 Rev A 9 13 Using Technician Interface Software Table 9 1 Aliases for Debugging Network Problems continued If you enter The system hwmods Displays slots and their associated hardware module IDs hwnode Displays the serial number and revision level of router ipfwd Displays the age of each entry in the IP forwarding table ipfwdage Displays the age of each entry in the IP forwarding table ipfwdas Displays the next hop AS of each entry in the IP forwarding table ipfwdmetric Displays the metric of each entry in the IP forwarding table iproutes Displays all IP networks that are known and the next hop iphops Displays all IP networks that are known and their associated hop counts iphosts Displays all configured adjacent IP hosts iparp Displays all MAC addresses and associated ARP addresses in the router s ARP cache ipifs Displays all IP interfaces and their associated indexes ipif lt address index gt Displays all IP information for the IP interface address you enter For example enter the following where 192 32 10 10 is the first interface ipif 192 32 10 10 1 You can obtain the lt address index gt by using the ipifs alias ipsroutes Displays all IP static routes configured in the node ipstats Displays all IP receive and IP tran
51. different router software image A copy of the combined bootstrap PROM and diagnostics PROM image for an AFN router A copy of the bootstrap image resident on the bootstrap PROM of an AN series router You cannot read or change this file A copy of the diagnostics image resident on the diagnostics PROM of an AN series router You cannot read or change this file A copy of the bootstrap image resident on the bootstrap PROM of an ASN router You cannot read or change this file A copy of the diagnostics image resident on an ASN router You cannot read or change this file The default configuration file The system refers to this binary file for configuration data when booting You can change the configuration by copying an alternative configuration file to config You can also use the boot command to specify a different configuration file This file must have the config filename for the system to configure automatically after booting We recommend that you copy config to a new backup filename before overwriting it 114088 Rev A 4 9 Using Technician Interface Software debug al An ASCII file containing aliases commands that abbreviate long or multiple commands that you can use to debug common network problems Refer to Debugging with Predefined Aliases in Chapter 9 to use the aliases in this file frediag exe A copy of the diagnostics image resident on the diagnostics PROM of a BLN BLN 2 or BCN router You
52. exe afn exe asn exe bn exe or config after every boot To change the default boot or configuration file overwrite the old default file with the new default file using the copy command But be sure to back up the old default file using the copy command before overwriting it 114088 Rev A 8 11 Using Technician Interface Software Examples If you enter The system boots with boot The default router software image for example bn exe and the configuration file config on the volume to come up with the valid boot name boot 2 2 e The default router software image on Volume 2 or The default configuration file config on Volume 2 boot 2 bn exe 2 config boot 2 net1 exe 3 e The netl exe router software image on Volume 2 e The default configuration file config on Volume 3 boot 3 2 Trident cfg e The default router software image on Volume 3 e The user s customized configuration file Trident cfg on Volume 2 boot 2 net1 exe 2 Trident cfg e The net1 exe router software image on Volume 2 e The user s customized configuration file Trident cfg on Volume 2 Using the PCMCIA Floppy Switch The PCMCIA Floppy switch on the Flash System Controller board of an FN LN or CN determines where the router looks for the image and configuration file when booting The PCMCIA Personal Computer Memory Card International Association position is for memory card boot access and the
53. exe PROM image file 4 9 asndiag exe PROM image file 4 9 atmarp command 3 27 attr command 5 19 to 5 20 attributes See parameters audience for this guide xx autosave log 6 10 114088 Rev A Index 1 Using Technician Interface Software Autoscript parameters Force User Logout 2 17 Login Script Search Path 2 15 Manager s Login Script 2 15 User s Login Script 2 16 autoscripts at manager login 2 20 at user login 2 20 automer bat 2 19 to 2 20 autouser bat 2 19 to 2 20 customizing 2 21 samples 2 20 backplane command 8 46 setting the 8 46 baud rate setting 2 8 Bay Networks CompuServe forum xxx Customer Service FTP xxix home page on World Wide Web xxix InfoFACTS service xxxi publications ordering xxiii support programs xxviii Support Source CD xxx Technical Response Center xxvii Xxxi technical support xxvii bconfig command 8 3 to 8 4 bn exe image 4 4 4 9 boot after graceful shutdown 8 13 command 8 9 to 8 12 delayed 8 14 router 8 9 to 8 13 BOOTP server 8 7 8 8 broadcast addresses 3 8 C cd command 4 10 5 7 clearlog command 6 14 CLNP echo request 3 15 clocking 8 6 commands aborting 3 3 access levels 8 78 to 8 81 alias management alias 9 2 echo 9 5 save aliases 9 8 source aliases 9 9 unalias 9 7 verbose 9 7 atmarp 3 27 bconfig 8 3 to 8 4 DOS attr 5 19 to 5 20 cd 5 7 copy 5 14 delete 5 21 dir 5 8 label 5 11 mkdir 5 12 mount 5 4
54. fddift lt circuit_no gt Displays the number of FDDI frames transmitted for the specified circuit fddi_stats Displays all FDDI receive and transmit packet statistics fddistat lt circuit_no gt Displays the state of the FDDI circuit fddistats lt circuit_no gt Displays all FDDI receive and transmit packet statistics for the specified circuit hwslot lt s ot_no gt Displays hardware information for the associated slot This includes the serial number and revision level fr_dicmi lt line lindex gt Lists all MIB attributes for the DLCMI entry of the specified Frame Relay interface fr_enable_ad lt ine lindex gt Enables the Annex D Data Link Control Management interface on the specified Frame Relay interface fr_enable_Imi lt ine lindex gt Enables the LMI Data Link Control Management interface on the specified Frame Relay interface fr_enable_none lt ine lindex gt Disables all DLCMI functions for the specified Frame Relay interface fr_info Lists all configured Frame Relay interfaces and their instance IDs line lindex fr_mgttype lt ine lindex gt Displays the management type selected for the specified Frame Relay interface fr_status lt ine lindex gt Displays the status of the specified Frame Relay interface fr_vcs Lists all instances configured PVCs in the Frame Relay virtual circuit table fr_ve lt line llindex
55. file to 100 You can store as many alias files in your file system as space allows 9 2 114088 Rev A Managing Aliases Examples If you enter The system alias Displays all aliases residing in RAM alias ebridge set wfBrTp 2 0 1 Creates an alias named ebridge that set wfBrStp 2 0 1 commit invokes the listed commands ebridge e Enables the Translating Bridge and the Spanning Tree Bridge e Notifies all relevant software modules of set changes to the MIB alias gbridge get wfBrTp 2 0 Creates an alias named gbridge that get wfBrStp 2 0 gets the Translating Bridge and Spanning Tree Bridge Enable values alias sbridge ebridge gbridge Creates an alias named sbridge that invokes the aliases ebridge and gbridge Inserting Parameters in an Alias You can insert one or more parameters in an lt alias_value gt when creating an alias You can insert a parameter in an lt alias_value gt in two ways Parameter concatenation You can insert a dollar sign in the last character position of the lt alias_value gt Then when a user enters the alias name and follows it with the value of the parameter the system executes the alias with the value the user entered Parameter reference You can embed one or more parameters anywhere inside the lt alias_value gt For each parameter you embed when creating the alias you insert a percentage sign and a parameter number The parameter 1 in an lt alias_value gt
56. format precede each address with the Ox prefix t lt timeout gt r lt repeat_count gt s lt size gt are optional These parameters are as follows lt timeout gt is the number of seconds for each ping to time out If the system receives a response to a ping after it has timed out the system does not send an alive message to the console The default is 5 lt repeat_count gt is the number of ping messages to send The system does not wait for the timeout before sending the next ping Enter a value between 0 and 10 inclusive The default is 1 lt size gt is the number of bytes of data to send with each ping The default is 16 The console displays one of the following messages when you issue a ping command If you enter a value in the lt repeat_count gt argument the system displays one of the following messages for the default ping plus one for each additional ping 114088 Rev A 3 21 Using Technician Interface Software e Analive message This message appears if the system receives a response from the target device within the lt timeout gt allowed The message also indicates the size of the test packet A sample message follows AT ping 100 5 is alive size 16 bytes e A does not respond message This message appears if the address of the target device is resolved but the system does not receive a response from the target device within the lt timeout gt allowed A sample message follows
57. history list The router retrieves the list from the command history table The history list contains up to 20 commands by default You can increase the number of commands in the history list to a maximum of 40 by setting new values for the console serial port attribute wfSerialPortHistoryDepth and the Telnet attribute wfTelnetHistoryDepth Example From a Technician Interface session set wfSerialPortEntry wfSerialPortHistoryDepth 40 set wiTelnet wfTelnetHistoryDepth 40 commit By running the history command you can recall and run any one of the last 40 commands you entered at the Technician Interface prompt 3 4 114088 Rev A Using Operating Commands Example gt dinfo Command 1 VOL STATE TOTAL SIZE FREE SPACE CONTIG FREE SPACE 23 FORMATTED 4194304 745101 697153 4 FORMATTED 4194304 2106021 2106021 gt dir 2 Command 2 Volume in drive 2 is Directory of 2 File Name Size Date Day Time bn exe 3271441 06 12 95 Mon 16 35 07 debug al 12568 06 12 95 Mon 16 38 57 install bat 152524 06 12 95 Mon 16 39 00 ti cfg 128 06 12 95 Mon 16 39 08 mk_foo cfg 4516 06 14 95 Wed 14 18 39 config 2044 06 18 95 Sun 13 5735 syslog cfg 2628 06 18 95 Sun 15 58 09 osi cfg 3048 07 19 95 Wed 16 55 40 4194304 bytes Total size 745101 bytes Available free space 697153 bytes Contiguous free space 114088 Rev A 3 5 Usin
58. in router Slot 2 B 28 114088 Rev A Using Out of Band Access to Transfer Files At the Technician Interface command line prompt enter the xmodem receive binary command as follows xmodem rbye rb is a receive binary file y is the YMODEM file transfer option e disables the EOT verification Note To ensure that files are transferred properly do not issue the xmodem command with the lt wait gt parameter when you perform out of band file transfers to or from a Windows workstation that has Wfterm running on it Set the sending Wfterm utility into send mode by selecting the YMODEM Send option from the File Transfers pull down menu Selecting this option invokes the File to Transfer window as shown in Figure B 10 Select highlight the drive directory and file you want to send to the router Use the cursor to press the OK button in the File to Transfer window Pressing the OK button initiates the file transfer to the router You verify that the file transfer was successful when you see the File Transfer Completed message in the Wfterm base program window If the transfer was unsuccessful you should see the message File Transfer Aborted You can optionally enter a dir command at the Technician Interface command line prompt in order to verify that the file you sent now exists in the router disk or memory card volume you set in Step 4 If you are finished transferring files from the workstation to the router
59. ip cache lt interface_address gt lt interface_address gt is the IP address of the logical interface associated with the interface cache you want to examine Multicast Cache If you enable a multicast protocol on a circuit the system allocates and maintains one multicast cache for that circuit Each entry in a multicast cache entry identifies the hosts sources and multicast groups from which the local circuit is receiving multicast traffic With the ip command you can examine the entire contents of the multicast cache for a specific physical circuit To view the multicast cache for any circuit configured on the router enter the ip command using the following syntax ip cache M lt interface_address gt lt interface_address gt is the IP address of the logical interface associated with the multicast cache you want to examine 8 74 114088 Rev A System Administration Slot Internal Cache The router operating system maintains an internal cache storage space on and for each slot in the router This slot level internal cache stores routing information captured from traffic originated on the router For example the PING protocol the IP protocols and TFTP can each generate their own traffic destined for IP address locations internal or external to the router The internal cache provides to such protocols a local high speed database of best routes from that slot to any other IP destination address in your network
60. lt dir_name gt is the new directory name you are creating and lt pathname gt is the name of the path to that directory mkdir lt pathname gt lt dir_name gt Examples If you enter The system mkdir logs Creates a new subdirectory called logs mkdir logs L_6_23 Creates a new subdirectory called L_6_23 in the path called logs Removing a Directory Use the rmdir command to remove an existing directory The directory must be empty before it can be removed Enter the following to remove a directory where lt dir_name gt is the directory name you are removing and lt pathname gt is the name of the path to that directory rmdir lt pathname gt lt dir_name gt 5 12 114088 Rev A Managing a DOS File System Examples If you enter The system rmdir logs L_6_23 Deletes the subdirectory called L_6_23 in the logs path rmdir logs Deletes the subdirectory called logs Renaming a File or Directory Use the rename command to change a filename or directory name If you specify a path to the file or directory the file is moved to the new directory The new file or directory must reside on the same diskette as the original You can use the wildcard characters and to rename files and directories with the character strings you specify Enter the following to rename a file or directory rename lt o ld_name gt lt new_name gt Note You cannot rename a file whose attributes are h for hidden or s for
61. lt wfSyslogEntFitrHostindex gt lt wfSyslogEntFltrNum gt lt wfSyslogEntFitrindex gt 2 commit Disabling a filter e Transitions the operational state of that filter wfSyslogEntrFltrOperState to INACTIVE e Stops Syslog from forwarding event messages through that filter C 24 114088 Rev A Using Syslog Messaging to Monitor Router b Re enable an entity filter by entering the following command line set wfSyslogEntFlitrEntry wfSyslogEntFltrDisable lt wfSyslogEntFitrHostindex gt lt wfSyslogEntFltrNum gt lt wfSyslogEntFitrindex gt 1 commit Re enabling a filter e Transitions the operational state of that filter wfSyslogHostOperState to ACTIVE e Allows Syslog to resume forwarding event messages through that filter Deleting Remote Hosts or Entity Filters from the Syslog Configuration You can delete a remote host from the Syslog host table or delete a filter from the Syslog filter table as follows 1 If you want to delete a remote host entry from the Syslog host table enter the following command line set wfSyslogHostEntry wfSyslogHostDelete lt wfSysiogHostDest gt 2 commit 2 If you want to delete a filter from the Syslog Entity Filter table enter the following command line set wfSyslogEntFltrEntry wfSyslogEntFltrDelete lt wfSysiogEntFitrHostindex gt lt wfSyslogEntFitrNum gt lt wfSyslogEntFitrindex gt 2 commit 3 Save the changes to your configuration Refer to Task 8 earlier i
62. managing 8 52 to 8 55 Index 8 114088 Rev A SecurID access 1 3 login and PIN assignment 1 6 security counter resetting 8 54 set command 2 3 7 6 show command 1 13 Site Manager 1 2 slot number displaying the 2 7 resetting 8 24 restarting 8 22 Technician Interface running on 1 3 software displaying version 8 32 upgrading 8 33 verifying 8 33 source aliases command 9 9 Spanning Tree 7 7 SRM L board 2 1 to 2 2 stamp command 8 32 Standard Point to Point protocol 8 6 state of a console port displaying the 2 6 stop bits setting 2 10 stop command 8 33 Support Source CD xxx SYS I O board 2 1 to 2 2 Syslog configuring the router for C 15 deleting from router C 25 deleting remote hosts or filters C 25 disabling or re enabling C 23 disabling or re enabling remote hosts or filters C 24 entity filter parameters C 37 example configuration C 26 global parameters attributes C 30 IP header C 9 mapping router events to Syslog format C 8 message filtering diagram C 5 parameter descriptions C 28 Index parameters Debug Map C 46 Delete C 30 Enable C 30 Entity Filter Delete C 37 Entity Filter Enable C 37 Fault Map C 44 Filter Operational State C 38 Host Delete C 33 Host Log Facility C 34 Host Operational State C 36 Host Time Seq Enable C 35 Host UDP Port C 34 Info Map C 45 Log Evt Lower Bound C 39 Log Evt Upper Bound C 40 Log Poll C 32 Maximum Hosts C 32 Messaging Enabl
63. must notify Bay Networks in writing of any such intended examination of the Software and Bay Networks may provide review and assistance Notwithstanding any foregoing terms to the contrary if licensee licenses the Bay Networks product Site Manager licensee may duplicate and install the Site Manager product as specified in the Documentation This right is granted solely as necessary for use of Site Manager on hardware installed with licensee s network This license will automatically terminate upon improper handling of Software such as by disclosure or Bay Networks may terminate this license by written notice to licensee if licensee fails to comply with any of the material provisions of this license and fails to cure such failure within thirty 30 days after the receipt of written notice from Bay Networks Upon termination of this license licensee shall discontinue all use of the Software and return the Software and Documentation including all copies to Bay Networks Licensee s obligations under this license shall survive expiration or termination of this license 114088 Rev A Contents Using Technician Interface Software About This Guide P NEI ana tab dunndh dnttinages adabdichacstactar saa tanceseattnedi A N XX Bane GUBEN mansir eiia iaa XX COWON ONE cana xxi E a T E E E A Tenet E T e E T rar erry xxii Ordenna Bay Networks PUDIICAUONG eierniie aa n aai XXV Technical Support and Online Services Bay Networks Custom
64. next hop to each of these areas decarinf lt area gt Displays DECnet area information for the area you enter decbase Displays DECnet global configuration parameters base record decdr Displays the designated router address for each DECnet interface decnrts Displays DECnet Level 1 routing node information decninf lt area node gt Displays DECnet information about the node whose area and node number you enter decifs Displays node and area configuration and interface indexes for all interfaces running DECnet decif lt index gt Displays DECnet information for the interface index you enter You can obtain the lt index gt by using the decifs alias decpri Displays DECnet circuit priorities for all interfaces deccost Displays DECnet circuit costs for all interfaces 9 12 114088 Rev A Managing Aliases Table 9 1 Aliases for Debugging Network Problems continued If you enter The system decstats Displays all DECnet receive transmit and dropped statistics enetstats Displays all Ethernet receive and transmit statistics fddior lt circuit_no gt Displays the number of FDDI octets received for the specified circuit fddifr lt circuit_no gt Displays the number of FDDI frames received for the specified circuit fddiot lt circuit_no gt Displays the number of FDDI octets transmitted for the specified circuit
65. or Entity Filters ccccssececcsecesascocesssiascsneetteenceeeantanccees C 22 Task 8 Saving Your Syslog Configuration on the Router cccceeseeeeseeeseeeees C 22 Task 8 Log Outot the Technician Menace croises C 22 Managing Syslog Ona ROET soddasi a aaa rane C 23 Disabling or Re enabling Syslog on the Router deve Nagase E E A C 23 xii 114088 Rev A Disabling or Re enabling Syslog Hosts or Filters cceccceceeeeeeeneeeeeeeeeseeeeeeneees C 24 Deleting Remote Hosts or Entity Filters from the Syslog Configuration C 25 Deleting Syslog tom the ROUTEN scasarcnansisteun asinine ainsi C 25 Example Syslog Co niere ont cd iscecek secrets eects aaa tnands C 26 Syslog Parameter Descriptions EAT E EET E EET E C 28 Gibal Group PAP TONS cipem a aae iia C 30 FAS LIN VE oina aaa CUA aaa aE EA Arda C 33 ies Fika Patter Sc cscetsasd dears oy seco bahacaage a C 37 PO Marc ROTI siiri ice ATEA tee adie aan sets C 47 Index 114088 Rev A xiii Figures Figure 1 1 SecurlD Login Procedure and Interface Dialog ccssceeeeeeeneeeeee 1 8 Figure 1 2 SecurlD PIN Assignment Procedure and Interface Dialog 2 05 1 9 Figure 1 3 Technician Interface Welcome SCIreen cccceecceseneeseeeeeeeseeeteeeereeeeenees 1 10 Figure 4 1 Sample Dinto DIS play canica a a i 4 6 Figure 4 2 Sample NYFS Directory LISTING ssiriiseiaae anke 4 8 Figure S i Mounting a Vom ssrcnstnrii
66. receive and transmit packet statistics for the specified circuit trs lt circuit_no gt Displays the state of the Token Ring circuit vines_info lt router_ D gt Displays the information contained in the VINES database record for the specified router vines_ID lt router_ID gt Displays the VINES network number of the router vines_nbrs Displays the contents of the VINES Table of Neighbors vines_nets Displays the contents of the VINES Table of Networks vines_nexthops Displays the contents of the VINES Table of Next Hops vines_cctstats lt circuit_no gt Displays VINES statistics for a specified circuit vines_client_en Enables VINES clients 9 18 114088 Rev A Appendix A Using the Bay Networks Router MIB This appendix describes how to use the Bay Networks router Management Information Base MIB The Bay Networks router MIB is a proprietary database that contains configuration parameters and statistics You use the Bay Networks router MIB to obtain and change configuration parameters and statistics through the Technician Interface or through network management software This appendix provides e An overview of the structure of the Bay Networks router MIB e A description of the Bay Networks router MIB files e Specifications with which the Bay Networks router MIB complies e Implementation notes 114088 Rev A A 1 Using Technician Interface Softwar
67. receive packets 8 24 114088 Rev A System Administration 4 The resetting processor module completes the boot process and requests a configuration The first available processor module forwards the configuration resident in its memory 5 The resetting processor module loads the configuration image and initiates the services provided by the slot connectivity is thus reestablished The resetting processor module alerts the other processor modules that it can receive packets 6 The other processor modules resynchronize their routing tables accordingly To reboot the entire system enter only reset at the command line prompt To reset only the processor module or modules you specify by lt slot_no gt enter the reset command as follows If you enter reset lt s ot_no gt The system resets Reset one slot reset lt s ot_no gt lt slot_no gt Reset a range of slots reset lt s ot_no gt lt slot_no gt Reset a list of slots Examples If you enter reset reset 1 reset 1 5 reset 4 6 The system reboots The entire system Slot 1 Slots 1 2 3 4 and 5 Slots 4 and 6 114088 Rev A 8 25 Using Technician Interface Software When you issue the reset or reset slot commands from a local console rather than from a Telnet session the results depend on The slot number you designate in the command line The slot number from which you issue the command The model of Bay Netw
68. remote router select the Dial Phone function of the Wfterm pull down menu The Dial Command window appears as shown in Figure B 8 B 22 114088 Rev A Using Out of Band Access to Transfer Files Wellfleet Communication Terminal Program File Modem Phone File Transfers Help Dial Command Phone Number to Dial B7i GES PRY Figure B 8 The Wfterm Dial Command Window Enter in the Dial Command window the telephone number of a router that has a configuration file you want to retrieve Using the cursor to press the OK button initiates the dialing sequence Note This release of the Wfterm utility allows you to enter and store one telephone number in the Dial Command window Each time you need to call a different router enter the telephone number of that router in the Dial Command window It may be helpful for you to maintain a list of the telephone numbers for every router you need to access by means of out of band dial in connection The Wfterm utility always retains the last number you enter Closing and reopening Wfterm does not clear the number last stored If the call in progress is successful Wfterm opens a connection between your Site Manager workstation and the Technician Interface port of the called router The Technician Interface login prompt appears in the Wfterm base program window but you may have to press return to invoke the Technician Interface prompt If the call in prog
69. rename 5 13 rmdir 5 12 tftp 5 16 type 5 20 unmount 5 6 history 3 4 ifconfig 8 5 to 8 8 issuing 3 1 Index 2 114088 Rev A MIB commit 2 4 7 8 get 7 4 list 7 2 save config 7 9 set 7 6 wfsnmpkey 8 54 wfsnmpmode 8 53 wfsnmpseed 8 54 NVFS cd 4 10 compact 4 19 copy 4 11 delete 4 18 dinfo 4 6 dir 4 7 format 4 20 partition 4 21 tftp 4 14 type 4 17 out of band file transfer tip B 1 B 10 xmodem B 1 B 4 Technician Interface operating backplane 8 46 boot 8 9 clearlog 6 14 date 8 46 diags 8 29 exec 3 7 help 3 2 history 3 4 ifconfig 8 5 loadmap 8 44 log 6 6 6 13 logout 1 12 more 3 2 password 8 49 ping AppleTalk 3 21 to 3 23 ping APPN 3 24 to 3 26 ping IP 3 8 to 3 11 ping IPX 3 12 to 3 14 ping OSI 3 15 to 3 17 ping VINES 3 18 to 3 20 Index prom 8 33 8 38 readexe 8 33 to 8 35 record 8 60 repeat 3 3 reset 8 24 restart 8 22 save log 6 8 stamp 8 32 stop 8 33 system 1 13 timeout condition 2 14 commit command 2 4 7 8 compact command 4 19 compression file 8 37 hardware 8 55 CompuServe Bay Networks forum on xxx config file 4 9 8 10 configuring AN ASN boot and config file source 8 8 for Telnet access 1 12 log autosave 6 10 the console port 1 12 configuring Syslog on a router C 15 connection dial in to router 1 1 telnet to router 1 1 console port parameters 2 4 Autosave Volume 2 18 Baud Rate 2 8 Comm
70. router software image The router software image for the AFN The router software image for the BLN BLN 2 and BCN You cannot read or change this file The system automatically refers to this binary file for booting instructions unless you use the boot command to specify a different router software image A copy of the combined bootstrap PROM and diagnostics PROM image for an AFN router The default configuration file The system refers to this binary file for configuration data when booting You can change the configuration by copying an alternative configuration file to config You can also use the boot command to specify a different configuration file This file must have the config filename for the system to configure automatically after booting We recommend copying config to a new backup filename before overwriting it An ASCII file containing aliases commands that abbreviate long or multiple commands that you can use to debug common network problems Refer to Debugging with Predefined Aliases in Chapter 9 to use the aliases in this file A copy of the diagnostics image resident on the diagnostics PROM of a BLN BLN 2 or BCN router You cannot read or change this file A copy of the bootstrap image resident on the bootstrap PROM of a BLN BLN 2 or BCN router You cannot read or change this file 5 10 114088 Rev A Managing a DOS File System install bat A script file that you use during the init
71. sent OSI ping 49000400000a12121200 is alive OSI ping 49000400000a12121200 does not respond OSI ping 49000400000a12121200 is unreachable The console also displays the following type of message after reporting the progress of each ping OSI ping 49000400000a12121200 responded to 8 out of 8 100 success 114088 Rev A 3 17 Using Technician Interface Software VINES Ping When you issue the ping command for VINES to a remote VINES device it responds if it can be reached and the console displays the response or the result of the request Enter the following to ping a remote device running VINES ping vines lt network_address gt lt host_address gt t lt timeout gt r lt repeat_count gt s lt size gt p lt network_address gt lt host_address gt is the required VINES address of the remote device This address consists of a 32 bit serial number identifying the server node and a 16 bit subnetwork number identifying the node within the server node s logical grouping Note You can enter the network and host addresses in decimal or hexadecimal format If you use hexadecimal format precede each address with the 0x prefix t lt timeout gt r lt repeat_count gt s lt size gt p are optional These parameters are as follows lt timeout gt is the number of seconds for each ping to time out If the system receives a response to a ping after it has timed out the system does not send an
72. software image and or configuration file reside e The full pathname of the software image and configuration file You must use the bconfig command once to specify the location of the software image and again to specify the location of the configuration file Use one of the following formats for the bconfig command bconfig image config local network lt TFTP_host gt lt TFTP_pathname gt bconfig d image config Note After making the change enter the following command to save it to the configuration file in the router s file system as follows save config 1 config config is the name of the configuration file Table 8 1 describes command settings for the bconfig command Table 8 1 bconfig Command Settings Option Description image Specifies information about the router s software image config Specifies information about the router s configuration file local Indicates that the specified file image or config resides in the router s local file system network Indicates that the specified file resides on a network server 114088 Rev A 8 3 Using Technician Interface Software Table 8 1 bconfig Command Settings continued Option Description lt TFTP_host gt Specifies the IP address of the host where the image or configuration file resides If both the software image and configuration file reside on the network the files must reside on the same host I
73. specify Ibbase Displays all Learning bridge global configuration parameters base record Ibfwd Displays all node MAC addresses in the bridge s forwarding table Ibif lt index gt Displays bridge information for the interface index you enter You can obtain the lt index gt by using the Ibstate alias 114088 Rev A 9 15 Using Technician Interface Software Table 9 1 Aliases for Debugging Network Problems continued If you enter The system Ibstate Displays bridge interfaces and their current states The following example shows one line in the list of interfaces where 1 is the index and 2 is the state wfBrTpInterfaceEntry wfBrTpinterfaceState 1 2 The states are 1 Up 2 Down 3 Init 4 Not present Ibstats Displays bridge receive transmit and dropped packet statistics mem_info lt s ot_no gt Displays the specified slot s total physical memory and the memory allocation for the local and global memory pools in KB For example if you enter mem_info 2 the system displays information similar to the following Memory information for slot 2 wfKernParamEntry wfKernParamTotMem 2 8192 wfKernParamEntry wfKernParamLocMem 2 6144 wfKernParamEntry wfKernParamGlobMem 2 2048 osiadjs Displays the adj ID osililsp Displays the LSP ID for Level 1 osil2Isp Displays the LSP ID for Level 2 osiliroutes Displays the path or
74. stored on its own volume if one is available The processor module then boots The processor module requests a copy of the configuration currently in use after it boots The first processor module to respond to the request forwards a copy of the configuration from its memory If none is in use the processor module uses the default configuration file config stored on its own volume if one is available The processor module then loads the configuration and initiates software services Use the boot command to boot the entire system Caution If you do not specify the router software image and configuration file when entering the boot command the system boots from the default image for example bn exe and configuration file config We recommend that you have only one version of the config file on the router You can comply with this recommendation by assigning new names to alternative versions of the configuration file It is possible that the processor modules can simultaneously load different configurations if you have alternative versions of the config file and you enter the boot command without specifying the volume and configuration file with which to boot Enter the following command to boot the entire system with the default software image for example bn exe and default configuration file config boot 8 10 114088 Rev A System Administration You can also boot the entire system by naming a specific imag
75. system Refer to the Changing File Attributes section later in this chapter for instructions on changing these protections Examples If you enter The system rename new cfg old cfg Changes the file named new cfg in the present working directory to old cfg rename cfg arc Changes all filenames with a cfg extension to have a arc extension in the present working direc tory rename logs I6_22 log Moves the 6_22 og file in the logs directory to inv span log the inv directory and renames the file to span log 114088 Rev A 5 13 Using Technician Interface Software Copying a File Use the copy command to make a copy of a file You can use the wildcard characters and when issuing the copy command to copy multiple files The new file must reside on the same diskette as the original Use a PC to copy a file from one diskette to another Caution The system automatically overwrites any file in the directory that has the same filename as the file you are copying To avoid overwriting an existing file display the directory and determine the filenames that are already in use Enter the following command to copy a single file in the present working directory and rename the new version of the file copy lt old_name ext gt lt new_name ext gt Enter the following command to copy a file from one directory to another and use the same filename copy lt dir_1 gt lt old_name ext gt lt dir_2 g
76. takes the value of the first parameter the user enters at the command line after the alias name the parameter 2 in an lt alias_value gt takes the value of the second parameter the user enters and so on 114088 Rev A 9 3 Using Technician Interface Software Note You cannot combine the two methods of inserting parameters within an alias The parameter number indicates the position of the value in the user entry This feature allows you to use the same value for more than one parameter Refer to the last two examples Examples If you enter alias scroll more scroll on alias cp copy 2 1 3 2 cp config2 cfg alt cfg alias backup copy 2 1 3 1 backup config The system Creates an alias named scroll that invokes the more command and inserts the value the user enters when using the alias as shown in the next example Invokes the command more on Creates an alias named cp that accepts two values and inserts them in parameter positions 1 and 2 respectively as shown in the next example Invokes the copy command associated with the alias cp inserts the config2 cfg value in the first parameter position 1 and inserts the alt cfg value in the second parameter 2 The system then invokes the command it copies the config2 cfg file on Slot 2 to a new file alt cfg on Slot 3 Creates an alias named backup that takes the first value the user enters when using the al
77. the show ip script command which retrieves from the router s active MIB an aggregated view of data from IP routing tables and internal caches across all slots the Technician Interface ip command retrieves the contents of the routing table on a single slot that you specify For this reason the ip command retrieves information significantly faster than the show ip command With the ip command you can examine e The entire contents of the routing table on any slot e A subset of the total contents of the routing table on any slot You limit the view of a routing table by applying filters subcommand options and flags to the ip command syntax For example you can enter ip routes lt s gt where lt s gt is a slot number you specify Note RIP and EGP routes are refreshed only on a slot that receives a routes update Route ages may be different on each slot for this reason Interface Cache The router operating system allocates a cache storage space to each protocol specific logical interface that you define on any physical circuit of the router The interface cache stores routing information relevant only to itself and its own view of the networks external to the router This cache provides an initial source for an interface to retrieve at high speed the best routes to any other IP destination address in your network Upon receiving a packet the interface checks its local cache then specifies processing for the packet e
78. the status of the specified circuit stid Displays the Spanning Tree node identifier stif lt index gt Displays all Spanning Tree bridge information for the Learning bridge interface index you enter You can obtain the lt index gt by using the Ibstate alias stroot Displays the Spanning Tree designated root node identifier 114088 Rev A 9 17 Using Technician Interface Software Table 9 1 Aliases for Debugging Network Problems continued If you enter The system ststate Displays the current state of each link running the Spanning Tree protocol in the node The states are 1 Disabled 2 Blocking 3 Listening 4 Learning 5 Forwarding 6 Broken todec lt hex_no gt Converts the specified hexadecimal number to decimal A hexadecimal number begins with Ox for example 0x1234 tohex lt decimal_no gt Converts the specified decimal number to hexadecimal trrxo lt circuit_no gt Displays the number of Token Ring octets received for the specified circuit trrxf lt circuit_no gt Displays the number of Token Ring frames received for the specified circuit trtxo lt circuit_no gt Displays the number of Token Ring octets transmitted for the specified circuit trtxf lt circuit_no gt Displays the number of Token Ring frames transmitted for the specified circuit tr_stats lt circuit_no gt Displays all Token Ring
79. the type to the screen backplane LN Sets the backplane type to LN Use for LN or ALN backplane CN Sets the backplane type to CN backplane FN Sets the backplane type to FN the Date and Time The date command allows you to display or change the system date time or time zone offset The time is based on the 24 hour clock The offset is the time difference between the current time and Greenwich Mean Time GMT Enter the following to display the system date time and GMT offset date 8 46 114088 Rev A System Administration The date time and GMT offset are displayed in mm dd yy hh mm ss l hh mm format For example Jan 16 1995 15 26 23 GMT 12 The GMT offset is stored as a direction or and a value in hours and minutes Most time zone offset values are in hours and do not include minutes For example the eastern standard time EST zone is 5 hours behind GMT or GMT 5 Enter the following to change the date time and GMT offset date lt mm dd yy hh mm ss gt l hh mm The console displays the new date time and time zone offset If you do not enter a parameter for example the date the system uses the current system setting Note When you change the date time and GMT offset the GAME operating system distributes the new date and time to all processor modules Changing the GMT offset changes the timestamps of messages in the event log For example the GMT offset was 0 at 2 00 p m
80. this section to avoid corrupting the config file We recommend that you first rename or copy the file at the source to a new temporary filename if the name is the same as an existing file at the destination Enter the following command to initiate a file transfer from the Technician Interface tftp get put lt remote IP address gt lt filename gt lt filename gt get put is put if you are transferring the file to the remote node and get if you are transferring the file to the local router lt remote_IP_address gt is the address of the remote node lt filename gt is the name of the file to be transferred lt filename gt is the name to which you want to transfer the file If you do not enter a name the system defaults to the lt filename gt you specified for the source file Caution The local system erases the file if you enter its address in the lt remote_IP_address gt field of the tftp command The system executes one TFTP request at a time for the duration of the file transfer The destination system stores the file under the name you specify If you do not enter a destination filename the system defaults to the source filename 114088 Rev A 5 17 Using Technician Interface Software Examples If you enter The local system tftp put 192 32 1 62 config2 cfg Sends a copy of config2 cfg to newconf on newconf the remote node at the IP address 192 32 1 62 tftp get 192 32 1 62 config2 c
81. to the most current technical and support information through a choice of access retrieval means These include the World Wide Web CompuServe Support Source CD Customer Support FTP and InfoFACTS document fax service 114088 Rev A xxvii Using Technician Interface Software Bay Networks Customer Service If you purchased your Bay Networks product from a distributor or authorized reseller contact that distributor s or reseller s technical support staff for assistance with installation configuration troubleshooting or integration issues Customers can also purchase direct support from Bay Networks through a variety of service programs As part of our PhonePlus program Bay Networks Service sets the industry standard with 24 hour 7 days a week telephone support available worldwide at no extra cost Our complete range of contract and noncontract services also includes equipment staging and integration installation support on site services and replacement parts delivery within approximately 4 hours To purchase any of the Bay Networks support programs or if you have questions on program features use the following numbers Region Telephone Number Fax Number United States and 1 800 2LANWAN enter Express Routing 508 670 8766 Canada Code ERC 290 when prompted 508 436 8880 direct Europe 33 92 968 300 33 92 968 301 Asia Pacific Region 612 9927 8800 612 9927 8811 Latin America 407 997 1713
82. y Selects the YMODEM batch protocol for sending files Sends in sequence any list of files you specify in the Technician Interface command line Selects the MODEM7 batch protocol for sending files Uses 1 kB packets on transmit Selects CRC mode on receive z 3 Causes the Technician Interface to wait 15 seconds before initiating the startup handshake which in turn commences the specified file transfer operation If you are using a 386 486 DOS PC as a workstation you trigger the initial handshake by selecting Ymodem Send or Ymodem Receive from the File Transfers pull down menu l When specified in the command line inhibits the logging of YMODEM events in the system log Automatic logging is a default mechanism of the XMODEM YMODEM protocols When you enable logging by not specifying the flag in the command line log messages for significant events errors and retries are sent to the system log The log messages can be useful for troubleshooting p Prints displays information and events pertaining to the YMODEM batch file transfer in progress UNIX only n Allows CAN CAN x x aborts during midtransfer Otherwise the YMODEM protocol allows CAN CAN aborts only at the beginning of a file transfer operation e Disables EOT verification when transferring files to the router DOS only B 6 114088 Rev A Using Out of Band Access to Transfer Files Filenames The conv
83. you transfer between a remote workstation and a Bay Networks router e The YMODEM protocol truncates binary files received in a batch transfer operation The YMODEM header specifies the truncated size e YMODEM sets the file modification timestamp field in the header of all transmitted binary files Note however that the timestamp is subject to a specific time zone reference Error Checking YMODEM performs the following error checks on file transfers between remote workstations and Bay Networks routers e IfYMODEM detects 10 or more errors during the transmission or reception of any one packet it cancels the transfer in progress e If an unexpected error occurs before a file is completely received Y MODEM deletes the incomplete file Canceling a File Transfer While waiting for the beginning of a file transfer YMODEM treats two CAN control x characters received within 3 seconds of each other as a request to cancel the operation CAN characters do not cancel the operation if received while a transfer is in progress unless you specify the n option flag in the Technician Interface xmodem command line Modem Interface Differences If you are not using a Hayes compatible modem locally attached to your workstation you may need to follow interface line control procedures appropriate for that modem Such procedures may be necessary if for example quitting the terminal interface program for example tip or Wfterm fails to switch
84. 088 Rev A 9 7 Using Technician Interface Software Examples If you enter The system unalias scroll Deletes the alias named scroll unalias Deletes all aliases from memory Saving Aliases to a File You can copy all aliases residing in RAM to a file on a volume for later retrieval Enter the following to create an alias file save aliases lt vol gt lt filename gt lt vol gt is the volume that will store the alias file lt filename gt is the name of the alias file Example If you enter The system save aliases 2 aliases 1 Creates a file named aliases on volume 2 and copies the aliases from RAM to this file Note The command alias precedes the alias name and alias text for each entry in the file allowing you to run the file as a script file 9 8 114088 Rev A Managing Aliases Loading Aliases from a File You can use the source aliases command to load the aliases from a file residing on the volume to active RAM The aliases already residing in memory remain in memory however the system overwrites any aliases in memory that have duplicate names Use the unalias command if you want to delete all aliases from memory before entering the source aliases command Enter the following to load aliases source aliases lt vol gt lt filename gt lt vol gt is the volume storing the alias file lt filename gt is the name of the file that contains aliases Example If you enter The system
85. 1 For the ASN use xevr lt network_module_no gt lt port_no gt continued 114088 Rev A 8 7 Using Technician Interface Software Table 8 3 ifconfig Settings for an Ethernet Interface continued Setting Description IP address settings lt P_address gt Specifies the IP address of the interface you set with lt interface gt Provide this address in dotted decimal notation lt subnet_mask gt Specifies the IP subnet mask of the interface you selected with the lt interface gt setting Provide this address in dotted decimal notation lt next_hop_address gt Specifies the IP address of the next hop router Provide this address in dotted decimal notation You only need to specify this address if there are intermediate routers between the router and the BOOTP server Enabling and Disabling Interfaces with ifconfig To enable an AN or ANH interface for the network boot process or to disable an interface from the network boot process use the following command formats ifconfig disable lt interface gt ifconfig enable lt interface gt To enable an ASN interface for the network boot process or to disable an interface from the network boot process use the following command formats ifconfig s lt s ot_no gt disable lt interface gt ifconfig s lt s ot_no gt enable lt interface gt lt slot_no gt Specifies the slot containing the interface you want to e
86. 11 1 1 4 2 6 114088 Rev A Parameter Attribute Name Attribute Number Default Options Function Instructions Command MIB Object ID Parameter Attribute Name Attribute Number Default Options Function Instructions Command MIB Object ID Configuring the Console Port Port Name wfSerialPortName 5 None Set by the system The name that the system has assigned to the port Users may not specify a name You can use this name to correlate the port number to the name printed on the hardware next to the physical port connection You cannot change this parameter get wfSerialPortEntry 5 lt port_no gt 1 3 6 1 4 1 18 3 3 2 11 1 1 5 Port Slot wfSerialPortSlot 6 None Set by the system The slot on which the login session for the console port is running The system sets this number You cannot change this parameter get wfSerialPortEntry 6 lt port_no gt 1 3 6 1 4 1 18 3 3 2 11 1 1 6 114088 Rev A 2 7 Using Technician Interface Software Parameter Attribute Name Attribute Number Default Options Function Instructions Command MIB Object ID Parameter Attribute Name Attribute Number Default Options Function Instructions Command MIB Object ID Port Type wfSerialPortType 7 1 Technician Interface 1 Technician Interface 2 Printer Configures the port for either Technician Interface Console or Modem or Printer The Printer
87. 14 255 1 2 set wfSyslogEntFlitrEntry wfSyslogEntFltrSlotLowUpp 192 32 6 14 255 1 4 commit 114088 Rev A C 27 Using Technician Interface Software Note If you add another filter for a specific entity that filter takes precedence over the wildcard filter for the host you specified At such time the wildcard filter transitions to the INACTIVE state the new filter transitions to the ACTIVE state and the remote host receives messages only through the entity specific filter Syslog Parameter Descriptions Syslog objects and key parameters attributes that you can set on the router or get from the router by means of Technician Interface commands exist in the router MIB in the following hierarchy wfSyslog group or global parameters pertaining to Syslog operation wiSyslogDelete wiSyslogDisable wiSyslogOperState wiSyslogMaxHosts wfSyslogPollTimer wfSyslogHostTable table or list of remote host destinations for Syslog wfSyslogHostEntry individual remote host entry in the host table wiSyslogHostDelete wifSyslogHostDisable wiSyslogHostDest wifSyslogHostUDPPort wiSyslogHostLogFacility wiSyslogTimeSeqEnable wifSyslogHostOperState C 28 114088 Rev A Using Syslog Messaging to Monitor Router wfSyslogEntityFilterTable table of entity filters for one host wfSyslogEntFltrEntry individual entity filter entry in the entity filter table wifSyslogEntFltrDelete wfSyslogEntFltrDisable wifSyslogEntFlt
88. 14088 Rev A Configuring the Console Port Using Autoscript Files You can configure the Technician Interface to use the autoscript files automgr bat and autouser bat so that the Technician Interface executes certain commands every time you log in as either a Manager or User To configure the Technician Interface to use these autoscript files you must modify the following serial port parameters e Login Script Search Path e Manager s Login Script e User s Login Script e Force User Logout Use the Login Script Search Path parameter to specify the list of file system volumes to be searched You can set up separate autoscript files to be run for the Manager login and the User login by configuring the Manager s Login Script and User s Login Script parameters You can set the Force User Logout parameter when the User autoscript is in effect This parameter locks the user into the User autoscript When this parameter is enabled any attempt to abort the script results in the user being logged out The Technician Interface configuration file ti cfg looks for the automgr bat script when the Manager logs in or for the autouser bat script when the User logs in If the autoscript is not present login proceeds normally without any error messages The ti cfg file has a default search path of slots 1 to 14 and a volume A This works for any platform 114088 Rev A 2 19 Using Technician Interface Software Sample Autoscript Files
89. 3 Octet4 Octet5 Octet6 Octet 7 Octet 8 Octet 9 Octet 10 Octet 11 26 i 13 lt month gt lt day gt lt hour gt lt minute gt lt second gt lt deci seconds gt lt direction_offset_from_UTC gt lt hours_offset_from_UTC gt lt minutes_offset_from_UTC gt Figure 8 2 RUIBOOT Date and Time Example 3 Specify a boot image name Specify a router software image name for that entry as follows BN 3 set wfRuiBootTable wfRuiBootImageName lt wfRuiBootDateAndTime gt bn exe BN 3 commit The name you specify belongs to the RUIBOOT table entry that has the same instance ID 8 18 114088 Rev A System Administration 4 Specify a configuration file name as follows BN 3 set wfRuiBootTable wfRuiBootConfigName lt wfRuiBootDateAndTime gt config2 BN 3 commit The name you specify belongs to the RUIBOOT table entry that has the same instance ID 5 Schedule additional delayed boot events If you want to add more delayed boot events to the router configuration return to step 2 otherwise continue with step 6 6 Save the current configuration file on the router as follows BN 3 save config lt vol gt lt filename gt Note This is an optional step lt vol gt is the NVFS Flash volume on which you want to store a copy of the current modified configuration file on the router lt filename gt is the name you assign to the configuration file that contains your
90. 4 eight successive times and waits up to 3 seconds for a response to each ping The console displays one of the following for each ping sent IPX ping O0xAB12 0xCD1234 is alive IPX ping O0xAB12 0xCD1234 does not respond IPX ping 0xAB12 0xCD1234 is unreachable The console also displays the following type of message after reporting the progress of each ping IPX ping OxAB12 0xCD1234 responded to 8 out of 8 100 success 3 14 114088 Rev A OSI Ping Using Operating Commands When you issue the ping command for OSI the router sends a Connectionless Network Protocol CLNP echo request to the remote Network Service Access Point NSAP address you specify The remote device responds with a CLNP echo response if it can be reached and the console displays the response or the result of the request Enter the following to ping a remote device running OSI ping osi lt NSAP_address gt t lt timeout gt r lt repeat_count gt lt NSAP_address gt is the required NSAP address in hexadecimal notation 0 9 A F of the remote device A leading Ox is not required when entering the NSAP address t lt timeout gt r lt repeat_count gt are optional These parameters are as follows lt timeout gt is the number of seconds for each ping to time out If the system receives a response to a ping after it has timed out the system does not send an alive message to the console The default is 5 lt repeat_count gt i
91. 8 All events in wide format as follows 114088 Rev A 6 7 Using Technician Interface Software Example log w 1 08 13 95 16 32 20 011 INFO SLOT 2 GAME Code 11 Starting image int 9 00 52 Mon Jul 31 22 20 19 EDT 2 08 13 95 3 08 13 95 4 08 13 95 5 08 13 95 6 08 13 95 7 08 13 95 16 16 16 16 16 L63 32 21 031 INFO SLOT 2 GAME Code 9 BackBone 0 became re connected 323 21 511 INFO SLOT 2 GAME Code 10 slot 4 became re connected 32721554 INFO SLOT 2 GAME Code 10 slot 3 became re connected 32 229 238 INFO SLOT 2 NVFS Code 42 Volume 2 Service initializing 32 33 347 INFO SLOT 2 MIB Code 4 Using configuration file 2 config 32 33 480 INFO SLOT 2 MIB Code 3 Service initializing Saving the Events Log You can save the events in the current event buffer to a file for later retrieval Caution The system automatically overwrites any file on the volume that has the same filename To avoid overwriting an existing file display a list of the volume s contents with the dir lt vo gt command and determine the filenames already in use Enter the following save log lt vol gt lt og_file gt lt vol gt is the volume on which to store the file lt log_file gt is the name of the file you are creating to store the events We recommend that you use the log file extension when creating log files You can verify that the log file is saved by entering the dir lt vo gt command You c
92. 8 20 gt ftp exe 0x30418310 gt tcp exe 0x30422770 gt tftp exe 0x304b9c90 gt snmp exe 0x30430650 gt tn exe 0x304bed70 gt ip exe 0x3048e350 gt ilacc exe 0x304cb670 gt genet exe 0x30523f10 on SLOT 4 0118168 0060288 0089652 0055608 0004052 0026760 0055608 0004008 0008816 0087680 0105916 0118168 0042060 057040 020680 030344 178468 011872 0 0 0 0038424 0 0 0 004072 System Administration 114088 Rev A 8 45 Using Technician Interface Software Setting the ACE Backplane Type Resetting The backplane command allows you to set or display the ACE backplane type in nonvolatile RAM You issue the backplane command during the initial startup of your VME based Bay Networks router You need only enter the backplane command once during the life of the system controller installed in Slot 1 of the router unless you insert the system controller in another type of VME router For instructions on using the backplane command see Quick Starting Routers and BNX Platforms Enter the following command to set the ACE backplane type in nonvolatile RAM lt type gt is the VME based router type ALN LN CN or FN backplane lt type gt If you issue the backplane command without specifying a type the system displays the router s backplane type to the screen Examples If you enter The system backplane Reads the backplane type from the hardware and displays
93. A 8 55 Using Technician Interface Software Testing Compression and Throughput Perform the following tests before and after making any change to the set values of the line and circuit WCP search depth attributes e Measure end to end throughput for several file transfer operations across the circuit s or line for which you are changing the search depth value Select files that contain data representative of the type of information your organization needs to send and receive daily e Measure the percentage of bandwidth utilization required to send your test file s over the synchronous line e Calculate the compression ratio s resulting from the file transfer operations Compare your compression ratios and line utilization figures taken before and after your changes Determine from these results whether you have improved the configuration for data compression on the desired line and or circuit s The best settings for the search depth attributes result in the best trade offs between end to end throughput compression ratios and line costs for the type of data you want to send over a synchronous line 8 56 114088 Rev A System Administration WCP Search Depth Attributes The modifiable search depth attributes for the WCP entity have the following characteristics Parameter Attribute Name Attribute Number Default Options Function Instructions Command MIB Object ID WCP Line Search Depth wfWcpLineSe
94. A C 39 Using Technician Interface Software Parameter Attribute Name Attribute Number Default Range Function Instructions Command MIB Object ID Log Evt Upper Bound wfSyslogEntFltrLogEvtUppBnd 8 255 0 to 255 Along with the Log Evt Lower Bound this parameter attribute specifies an event number code or range of event numbers The number s correspond to event messages you want to forward to the remote host associated with this filter For a complete list of event codes for each entity refer to Event Messages for Routers and BNX Platforms for this version of the router software To specify a range of event numbers that identify messages you want to forward to a remote host set the value of this parameter attribute to the high number of the range Set the value of the wfSyslogEntFltrLogEvtLowBnd Log Event Upper Bound parameter to the low number of the range Any range you specify includes the values for the lower and upper bound parameters attributes For example if you specify a lower bound of 2 and an upper bound of 7 Syslog forwards all messages with event codes of 2 through 7 inclusive logged by the entity defined under wfSyslogEntFltrNum Filter Entity Name Syslog ignores all other event messages To filter select only a specific event set the value of wfSyslogEntFltrLogEvtUppBnd to the code number for that event Set the value of wfSyslogEntFltrLogEvtLowBnd Log Event Lower Bound to th
95. AT ping 100 5 does not respond e A lt target_address gt is unreachable message This message appears if the local Bay Networks router cannot find the specified address in its routing table A sample message follows AT ping 100 5 is Unreachable e A resource error message This message appears if the local Bay Networks router cannot allocate a buffer for the request because none is available A sample message follows AT ping resource error e An Invalid AppleTalk option message This message appears if you specify an invalid parameter for example p A sample message follows AT ping Invalid AppleTalk option e An Invalid AppleTalk address message This message appears if you specify an invalid address for example 1 2 3 4 A sample message follows AT ping Invalid AppleTalk address e A Specified size too large message This message appears if you specify a lt size gt that is larger than 585 The system uses the maximum of 585 bytes A sample message follows AT ping Specified size too large using maximum of 585 bytes e AMAT service is not running message This message appears if the AppleTalk service is not enabled on the router A sample message follows AT ping AT service is not running 3 22 114088 Rev A Examples If you enter ping at 100 5 ping at 100 5 t3 r8 Using Operating Commands The system Pings the device at the AppleTalk address 100 5 and waits up to 5 seconds default f
96. At 10 00 p m you access the event log to check the messages that came in between 2 00 and 10 00 If you then change the GMT offset to 2 the timestamp of each message in the event log is offset by 2 hours that is if the timestamp was 2 00 p m it changes to 12 00 p m 114088 Rev A 8 47 Using Technician Interface Software Examples If you enter The following occurs date The console displays the current system date time and time zone offset Jan 25 1995 16 00 GMT 4 date 01 25 95 16 02 The system date and time change to Jan 25 1995 16 02 date 01 25 95 16 02 5 The system date time and time zone offset change to Jan 25 1995 16 02 GMT 5 Assigning Passwords This section describes how to assign or reassign the Manager and User access passwords The Technician Interface runs on a single processor module When you assign a password the GAME operating system distributes the new password to nonvolatile RAM in all processor modules For this reason the system retains passwords if the Technician Interface runs subsequently on a different processor module after you booted the router reset a slot or replaced a board Note If you insert a new processor module you must reassign the Manager and User passwords otherwise the Technician Interface will not require passwords when it runs on that slot You can assign the User access password when you are logged in as User or Manager You can assign th
97. Avtomatically sirieni danaa bidata aaa 6 10 Log Autosave Plater DiferehcES as sce ctcicassetecisgiecaselaau seeaiuaueteaaleesesaaleoneenaned 6 11 Gonfiguring the Log Autosave Feature i ccscsesdcagiaiecectutiontaliccciavanteditncde 6 12 Displaying an Events Log File Previously Saved 2 ccccceecceeeeeeeeeceeeeseeeeeeeeseeeeeeeees 6 13 CIGARRO E VEE siani ines pecs Gtasemnaedgacateaccegeetesdeaaasand dessdeuennses oesatesansaactaamscavaunitensess 6 14 Chapter 7 Accessing the MIB Ret pear MID ODOC arsar 7 2 CEOE VAOS giair a decade va OE 7 4 Se erie NIB YUCE aa Nous tienda n aena a a a Ea 7 6 Cammin ME SOLS risign E R a 7 8 Sao IG COTAN sainia AEA A 7 9 Using imne MIB OO0mET corsnnnnesene a ieeetacdunidle tales amea on demtaaetieace 7 9 Chapter 8 System Administration AN ANH ASN Administration siinid a aa daa aaa aaa aa adana 8 2 COTA ihe Bool SOUPE esnie nana aa iaa Siae 8 3 Configuring Initial Interfaces and Netboot Operation 0 ccccceceeeeeeeeeeeeteeeeeneeeees 8 5 Configuring the Initial IP Synchronous Interface ccccceeeeeeeeeeseeeeeeeneeeeees 8 5 Configuring an Ethernet Interface for Network Booting 0 ccccsccceeessteeeeees 8 7 Enabling and Disabling Interfaces with ifconfig c cecceeeeeeeeceeeeeeteeeeeeeeaee 8 8 Booting the Router sssrinin E E E E T AVEA eR ipao 8 9 viii 114088 Rev A How TE Router ES ceca ccwcreriirsaccccte ve asederirasaawadcrei andes duacneceete sencstes taumeedeit
98. B Object ID Parameter Attribute Name Attribute Number Default Range Function Instructions Command MIB Object ID Maximum Hosts wfSyslogMaxHosts 4 5 1 to 10 Specifies the maximum number of remote hosts considered active and able to receive messages from the Syslog service on the router The number includes Syslog hosts configured to receive time sequenced messages as well as hosts configured to receive messages nonsequentially Enter the maximum number of active hosts allowed to receive messages from Syslog on the router The actual number of entries in the host table can exceed the value of wfSyslogMaxHosts but Syslog will forward messages only to the first n active hosts where n equals the current setting of wfSyslogMaxHosts Increasing the value of wfSyslogMaxHosts increases the overhead processing requirements for Syslog on the router set wfSyslog wfSyslogMaxHosts 0 lt 1 10 gt 1 3 6 1 4 1 18 3 3 2 15 1 4 Log Poll Timer WfSyslogPollTimer 5 5 seconds 5 to 610000 Determines the amount of time Syslog waits before initiating another cycle to poll all slots for event messages logged since the previous polling cycle Enter the number of seconds that you want Syslog to wait between polling cycles set wfSyslog wfSyslogPollTimer 0 lt 5 610000 gt 1 3 6 1 4 1 18 3 3 2 15 1 5 C 32 114088 Rev A Host Parameters Using Syslog Messaging to Monitor Router This section
99. BCN FRE 1 FRE 2 Caution It is possible that the FRE modules can simultaneously load different images or configurations if you have alternate versions of the boot or configuration file We recommend that you have only one version of each on the router Assign new names to alternate versions 114088 Rev A Managing a NonVolatile File System Naming Files Rules and Conventions The rules for naming files are as follows You must specify the volume location slot number of any file you reference and of any file you create The sections that follow detail the syntax requirements including the slot number specification for each command Filenames must start with an alphabetical character The remaining characters must be alphanumeric and may also include the underscore _ character and dot character Spaces are not allowed Filenames can consist of one to 15 characters We recommend a limit of 8 characters however to ensure that all operating systems that we support can recognize the names File extensions are optional and must be preceded by a filename and a dot The total Technician Interface limit for the filename and file extension is 15 characters including the dot We also recommend the following conventions when naming files so that you can easily distinguish files by type Use the exe file extension for router software images for the FRE and Motorola modules BLN BLN 2 BCN AFN AN AN
100. CSMACD connector on module 1 of slot 2 A 12 114088 Rev A Overview Appendix B Using Out of Band Access to Transfer Files This appendix describes how to use the xmodem command to perform out of band file transfers The xmodem command enables you to transfer files between remote workstations and Bay Networks routers when all IP routing paths between them are down You cannot use the xmodem command to transfer files between Bay Networks routers Both UNIX and 386 486 DOS remote workstations allow you to log in to the Technician Interface port of a router and enter xmodem commands However each type of workstation uses a different utility program for opening and closing out of band dial connections between workstation and router With a Sun workstation you initially establish a connection by configuring and running the Terminal Interface Program TIP The program has two associated files etc phones and etc remote in which you can enter setup information such as the telephone number of a remote router etc phones and modem interface settings etc remote You run the program by entering a tip command with appropriate syntax at the UNIX command line prompt With a 386 486 DOS workstation you initially establish a connection by configuring and running the Bay Networks Terminal Program filename wfterm To run the program click on the Wfterm icon in the display of your Site Manager workstation 114088 Rev A B 1
101. Disable 0 get 1 3 6 1 4 1 18 3 5 3 5 1 1 get 1 3 6 1 4 1 18 3 5 3 5 1 1 0 get 1 3 6 1 4 1 18 3 5 3 5 1 1 get wfSnmp 1 0 get wfSnmp 1 get wfSnmp 0 get wfSnmp The console displays wfSnmp wfSnmpDisable 0 1 The object name the base record 0 and the value Appending the base 0 to the object name is optional when issuing a get command Likewise appending the base 0 or to the instance identifier is optional when issuing a get command wfSnmp wfSnmpDisable 0 1 wfSnmp wfSnmpUseLock 0 1 wfSnmp wfSnmpLockAddress 0 get Invalid obj attr inst specified 7 5 Using Technician Interface Software Setting MIB Values The set command modifies the value of an instance You set an instance by specifying its object attribute instance You may use names or identifiers to specify object groups and attributes use only an appropriate identifier or index value to specify the instance Note When you enter the set command the attribute is set on each running processor module Enter the following to change the value of an object instance set lt object gt lt attribute gt lt instance gt lt value gt or s lt object gt lt attribute gt lt instance gt lt value gt lt object gt is the required name or identifier of the object lt attribute gt is the required name or identifier of the attribute lt instance gt is the required unique identifier of a nontabular object or the IND
102. E processor module 4 2 4 4 freboot exe PROM image file 4 10 frediag exe PROM image file 4 10 G get command 7 4 getting help from a Bay Networks Technical Response Center xxx1 from the Support Source CD xxx through CompuServe xxx through Customer Service FTP xxix through InfoFACTS service xxxi through World Wide Web xxix graceful shutdown BNX 8 13 8 23 8 28 H hardware compression 8 55 hardware configuration for out of band file transfers B 9 HDLC encapsulation 8 6 help command 3 2 displaying online 3 2 history command 3 4 list changing the size of the 3 4 114088 Rev A Index 5 Using Technician Interface Software l ICMP echo request 3 8 ifconfig command 8 5 to 8 8 images 4 4 ace out 4 4 4 9 5 4 afn exe 4 9 afnboot exe 4 9 anboot exe 4 9 andiag exe 4 9 asnboot exe 4 9 asndiag exe 4 9 bn exe 5 4 freboot exe 4 10 frediag exe 4 10 list 4 4 4 9 in band file transfers DOS 5 16 to 5 18 NVFS 4 14 to 4 16 InfoFACTS service xxxi initializing the Technician Interface 1 3 install bat file 4 10 5 11 interface configuration 8 5 to 8 8 internal clock mode enabling 8 62 IP address settings 8 7 8 8 connector setting 8 6 8 7 default setting 8 6 8 7 ping command 3 8 to 3 11 IPX ping command 3 12 to 3 14 L label command 5 11 lines per screen setting 2 11 list command 2 2 7 2 loadmap command 8 44 log automatically saving the 6
103. EX value of a tabular object Note The MIB uses the value of the INDEX in the Entry 1 attribute of a table object to define the lt instance_id gt of any entry belonging to that table The INDEX typically defines the lt instance_id gt by means of one attribute or by means of multiple attributes that together define the lt instance_id gt of a table entry 7 6 114088 Rev A Accessing the MIB lt value gt is the required new value of an instance of an object This value may be one of the following depending on the data type e Integer unsigned integer types decimal number e IP addresses dotted decimal format for example 192 32 0 0 e Octet strings hexadecimal number starting with Ox e Display strings string enclosed in double quotes Refer to the Bay Networks MIB to determine the data type Caution If you are running Spanning Tree always follow any Technician Interface set command to the Bridge with the corresponding Technician Interface set command to the Spanning Tree Otherwise you may lose connectivity to LANs Refer to the last two examples that follow Also make sure the values you set are legal Illegal or incompatible MIB values can disrupt software or network services after you enter the commit command Refer to the Bay Networks MIB for the legal values You can use the list command or refer to the Bay Networks MIB to determine the symbolic names and identifiers for ob
104. FS 4 5 O online help 3 2 operational state of a Syslog filter C 38 of a Syslog host C 36 of the Syslog entity C 31 OSI ping command 3 15 to 3 17 Index out of band file transfers from a UNIX workstation B 10 to B 16 from a Windows workstation B 17 to B 31 hardware configuration B 9 overview of B 1 to B 2 overwriting files 5 14 5 17 P packet transfer halting between slots 8 33 parameters Console Baud Rate 2 8 Command Timeout 2 14 Data Bits 2 9 Force User Logout 2 17 Lines Per Screen 2 11 Login Retries 2 14 Login Script Search Path 2 15 Login Timeout 2 13 Manager s Login Script 2 15 Modem Enable 2 10 More Enable 2 11 Password Timeout 2 13 Port Delete 2 5 Port Disable 2 5 Port Name 2 7 Port Number 2 6 Port Parity 2 9 Port Slot 2 7 Port State 2 6 Port Type 2 8 Stop Bits 2 10 User s Login Script 2 16 Syslog Debug Map C 46 Entity Filter Delete C 37 Entity Filter Enable C 37 Fault Map C 44 Filter Operational State C 38 Host Delete C 33 Host Log Facility C 34 Host Operational State C 36 Host Time Seq Enable C 35 114088 Rev A Index 7 Using Technician Interface Software Host UDP Port C 34 Info Map C 45 Log Evt Lower Bound C 39 Log Evt Upper Bound C 40 Maximum Hosts C 32 Messaging Enable C 33 Operational State C 31 Severity Mask C 41 Slot Lower Bound C 42 Slot Upper Bound C 43 Syslog Delete C 30 Syslog Enable C 30 Syslog
105. FddiSmtGroup wfFddiGroup 1 wfFddiMacGroup wfFddiGroup 2 wfFddiPathGroup wfFddiGroup 3 wfFddiPortGroup wfFddiGroup 4 wfCSMACDAutoNegGroup wfLine 16 wfPktCaptureGroup wfLine 21 wfCompressionGroup wfLine 22 wfAtmInterfaceGroup wfLine 23 wfAtmCommonGroup wfAtmInterfaceGroup 1 wfAtmLinkModuleGroup wfAtmInterfaceGroup 2 wfAtmCellSwitchGroup wfAtmInterfaceGroup 3 wfSonetGroup wfLine 24 wfDsx3Group wfLine 26 wfBisyncGroup wfLine 27 Sample Top Level Hierarchy of the Bay Networks Router MIB continued A 4 114088 Rev A Using the Bay Networks Router MIB wfApplication wfSwSeries7 5 wfDataLink wfApplication 1 wfBridgeGroup wfDataLink 1 wfBrLearning wfBridgeGroup 1 wfBrSourceRouting wfBridgeGroup 2 wfBrTplnterface wfBridgeGroup 3 wfBrTrafficFilterTable wfBridgeGroup 4 wfBrNativeModeLan wfBridgeGroup 5 wfSpanningTree wfDataLink 2 wflfGroup wfDataLink 3 wfCircuitOptsGroup wfDataLink 4 wfDlsGroup wfDataLink 5 wfLIcGroup wfDataLink 6 wfSdlicGroup wfDataLink 7 wfLapbTable wfDataLink 8 wfProtocolPriorityGroup wfDataLink 9 wflRedundGroup wfDataLink 10 wfDecGroup wfApplication 2 wfiInternet wfApplication 3 wfArpGroup wflnternet 1 wflpRouting wflnternet 2 wflpGroup wflpRouting 1 wfRipGroup wflpRouting 2 wfOspfGroup wflpRouting 3 wfEgpGroup wflpRouting 4 wfBgpGroup wflpRouting 5 wfBgpGeneralGroup wfBgpGroup 1 wfBgp3Group wfBgpGroup 2 wfBgp4Group
106. Filtering Dy Event Severity Lavel scciiscecsdcnccasstesesgreeteese lidswsacsionarasansideatsisarsicessacniasces C 7 Fienna Dy Soi NUM DET aissar AEA C 7 Mapping Router Event Messages into Syslog Message Format sasse C 8 IP Heada ca tteeey arta sees ctaredes entrar aNioladicaant Gee ess at ee lade aul eerapeitaes C 9 UDE DEI 2 antennae nee armor a ormrreroen ne creree prin lueaer mnnre oem neta er C 10 UDF DA nson P E eta E E OET REN C 10 Pont CNS cass crater iaianraieiwanenaue EE EA C 10 Time Sequencing Syslog MeSSaQES ccccceeceeneeececeeeesaeeceeaeeeeaaeeeeeeeeeaaeeneaes C 12 Syslog Message Handling on a Workstation ccccccceseeeeeeeeeeeteeeeeeeeeseeeseneees C 12 Contiguring Syslogd ona UNIX Workstation oi czccessedccesssaseeetiatiaccaddeeauergesvsancesnadaateads C 13 Configuring Syslog on the Router cseeeeeeeeetteeeeeeeeee EE deus EE ET series C 15 Task 1 Logging In to the Router s Technician Interface csseeeeeteeeeeeeees C 16 Task 2 Defining a Slot Mask for Syslog on the Router ccccesceeeseeesteeeeees C 16 Task 3 Creating Syslog OM the ROUtOM sosser iaeiaiai C 16 Task 4 Configuring Syslog Global Attributes 2 0 0 0 cece eeceeeeceeeeeeeseeeeeeeeeeeteaeeneaes C 16 Task 5 Adding a Remote Host to the Syslog Host Table ccceeeeeeeeeeeeeees C 17 Task 6 Adding ah Enty Filter for a Remote HOSE cisccccicecisacecenctermiccestsssacicctestnvions C 18 Task 7 Adding More Hosts
107. Floppy position is for diskette boot access You can use Site Manager and the Technician Interface to access both the memory card and diskette files regardless of the position of this switch However you cannot override the switch setting when booting For example you cannot boot from a diskette if the switch is set in the PCMCIA position When you use Site Manager to boot the router or specify an image and configuration file in a Technician Interface boot command the software verifies the file s existence before allowing the boot to take place 8 12 114088 Rev A System Administration If the PCMCIA Floppy switch is in the PCMCIA setting and you boot the router the following occurs 1 The router boots from 1 ace out if it is available If not it boots from 2 ace out if it is available If both are unavailable a boot error occurs 2 The router configures from 1 config if it is available If not it configures from 2 config if it is available If both are unavailable a configuration error occurs Booting after Crossnet Shutdown Notification BNX Only On BNX platforms only you can use the shutdown option of the boot command to boot the BNX following a graceful crossnet shutdown With this option the system notifies the remote end of any configured Frame Relay Switch frsw PVCs to expect a loss of connectivity The BNX sends to the remote end of each PVC an update message packet with the A bit set to inacti
108. H and ASN The default router software images are bn exe afn exe an exe and asn exe Use the out file extension for router software images for the ACE modules FN LN CN and ALN The default router software image is ace out Use the cfg file extension for alternate configuration files The default configuration file is config Use the al file extension for alias files U se the log file extension for log files Use the bat file extension for script files 114088 Rev A 4 5 Using Technician Interface Software Displaying the Status of All Memory Cards Enter dinfo to display the status of all memory cards currently installed in the router Figure 4 1 shows a sample dinfo display of a system with memory cards installed in Slots 2 and 5 T N dinfo VOL STATE TOTAL SIZE FREE SPACE CONTIG FREE SPACE C2 FORMATTED 2097152 228663 220209 5 FORMATTED 4194304 1356883 1356883 S P Figure 4 1 Sample Dinfo Display The dinfo command displays the following data Vol Slot number where the memory card is currently installed Vol is short for volume State Either formatted or corrupted If you purchase a card from another supplier the dinfo display may list it as corrupted If a card is corrupted format it Refer to Formatting a Memory Card later in this chapter for instructions Total Size Total number of bytes used and unused in the memory card Free Space Numbe
109. ID client software Whenever you enter information that the SecurID client considers incorrect you receive more prompts until you log in successfully or until the SecurID client denies you further access to the router Figure 1 2 shows the complete new PIN assignment procedure and interface dialog you encounter during your initial login attempt if you do not already have a valid assigned SecurID PIN To configure the SecurID client software on the router refer to Enabling and Disabling SecurID Authentication in Chapter 8 114088 Rev A 1 7 Using Technician Interface Software Open a Telnet connection to the router gt telnet lt router_name gt Trying lt router_ip_address gt Connected to lt router_name gt Escape character is SecurlD authentication enabled on the router BEGIN HERE Your first login attempt using SecurlD authentication Is your card in Set PIN to next cardcode mode See A Figure 1 2 Enter a passcode after the Fourth login Enter Passcode prompt attempt from the router Login lt User Manager gt Password lt password gt Enter Passcode lt passcode gt Enter only your Login level User Manager and if enabled enter a password Access denied password bad Login lt User Manager gt Password lt password gt Access denied cardcode bad Fourth attempt to authenticate Valid password
110. II Receive ASCII Send Kermit Receive Kermit Send MODEM Receive MODEM Send XMODEMC Receive XMODEMC Send YMODEM Receive PgDn YMODEM Send PgUp ZMODEM Receive ZMODEM Send ZMODEMD Receive 7MONFMD Send Figure B 9 The Wfterm File Transfer Operation Selection Window Note Because the Wfterm utility provides more functionality than is required to support YMODEM file transfers the File Transfers pull down menu contains options for up to fourteen different file transfer operations However to transfer files between a workstation and a Bay Networks router you need only the ymodem send and receive options This section provides only the information you need for the YMODEM options Transferring Files from Router to DOS Workstation To transfer one or more files from a router to your Site Manager workstation you must e Be logged in to the Technician Interface of the desired router Refer to the earlier section Logging In to the Router s Technician Interface e Select the disk volume or memory card volume that contains the files you want to transfer to your workstation e Set the receiving Wfterm utility into receive mode e Trigger or initiate the file transfer from router to workstation 114088 Rev A B 25 Using Technician Interface Software Proceed as follows to transfer one or more files from router to workstation 1 Enter a cd command t
111. IVE Syslog is filtering against the criteria specified for this filter When the state is INACTIVE Syslog is not using this filter to select and forward messages to a remote host for one or more of the following reasons Filter s host is not ACTIVE Filter does not have a configured event number or range Filter does not have a configured severity mask Filter slot number s do not correspond to actual slot numbers on this model of router Instructions Retrieve the value of this attribute when you want to check the status of a filter for a specific entity Command get wfSyslogEntFltrEniry wfSyslogEntFltrOperState MIB Object ID 1 3 6 1 4 1 18 3 3 2 15 3 1 6 C 38 114088 Rev A Parameter Attribute Name Attribute Number Default Range Function Instructions Command MIB Object ID Using Syslog Messaging to Monitor Router Log Evt Lower Bound wfSyslogEntFltrLogEvtLowBnd 7 0 0 to 255 Along with the Log Evt Upper Bound this parameter attribute specifies an event number code or range of event numbers The number s correspond to event messages you want to forward to the remote host associated with this filter For a complete list of event codes for each entity refer to Event Messages for Routers and BNX Platforms for this version of the router software To specify a range of event numbers that identify messages you want to forward to a remote host set the value of this parameter a
112. Interface Access Levels Command User Manager Vv alias arrayenv refer to Writing Technician Interface Scripts atmarp KIRIS attr DOS only backplane bconfig boot cd Y clearlog KISIS SISIN SISS 8 78 114088 Rev A System Administration Table 8 4 Technician Interface Access Levels continued Command User Manager commit Y compact NVFS only Y copy Vv cutenv refer to Writing Technician Interface Scripts VY VY date Vv Vv delete Y diags Vv dinfo NVFS only Vv Vv dir VY VY disable refer to Using Technician Interface Scripts VY echo refer to Writing Technician Interface Scripts VY VY enable refer to Using Technician Interface Scripts VY enumenv refer to Writing Technician Interface Scripts A A exec Y export refer to Writing Technician Interface Scripts Y A format NVFS only A get Y Y getenv refer to Writing Technician Interface Scripts Y A gosub refer to Writing Technician Interface Scripts Y A goto refer to Writing Technician Interface Scripts VY VY help Vv Y history Y Y if refer to Writing Technician Interface Scripts A A ifconfig Vv instenv refer to Writing Technician Interface Scripts A A ip Y Y Y label DOS only 114088 Rev A 8 79 Using Technician Interface Software
113. Log Poll C 32 Trace Map C 46 Warning Map C 45 partition command 4 21 password access 1 3 assigning a 8 48 command 8 49 for new systems 1 4 setting timeout for 2 13 path trace report 3 8 pausing and scrolling the screen 3 2 PCMCIA Floppy switch 8 12 to 8 13 ping command AppleTalk 3 21 to 3 23 APPN 3 24 to 3 26 IP 3 8 to 3 11 IPX 3 12 to 3 14 IPX NLSP response 3 12 OSI 3 15 to 3 17 VINES 3 18 to 3 20 pinging a remote device 3 7 to 3 26 platform key 8 37 port name displaying the 2 7 number displaying the 2 6 parity setting 2 9 type displaying the 2 8 processor modules 4 4 prom command 8 33 8 38 verifying and upgrading software on 8 38 protected access via password 1 3 via SecureID 1 3 Q QENET underflow errors 8 62 R readexe command 8 33 to 8 38 record command 8 60 recording console messages to a file 8 60 rename command 5 13 repeat command 3 3 repeating a Technician Interface command 3 3 3 4 reset after graceful shutdown 8 28 reset command 8 9 to 8 10 8 24 restart after graceful shutdown 8 23 restart command 8 22 rmdir command 5 12 router software images 4 4 S save aliases command 9 8 save command 2 4 save config command 7 9 8 3 save log command 6 8 saving the log automatically 6 10 screen pauses setting 2 11 scripts Technician Interface 1 2 1 13 scrolling the Technician Interface screen 3 2 secure mode
114. OM images you want to use as source files for upgrading boot or diagnostic PROMs on one or more slots To determine the amount of contiguous free space display the directory of the Flash volume by entering the following command from the Technician Interface prompt dir lt volume_no gt 114088 Rev A 8 41 Using Technician Interface Software If you need more contiguous free space for the image e Delete unnecessary or obsolete files e Compact the contents of the Flash card Transfer the PROM image files for example freboot exe and frediag exe to the Flash card From the Technician Interface use the tftp command Refer to In Band File Transfers in Chapter 4 if you need more information Establish a Technician Interface session with the router Refer to Chapter 1 if you need more information on how to open a Technician Interface session with the router If you are updating a Boot PROM enter prom w lt volume_no gt lt Boot_PROM_source_file gt lt slot_ID gt For example prom w 2 freboot exe 3 Note Once you enter the prom command it must run to completion The control c abort command is disabled for the duration of the prom command execution to allow it to run to completion Upgrading takes from 2 to 10 minutes per PROM Verifying takes up to 2 minutes per PROM If you are updating a Diagnostic PROM enter prom w lt volume_no gt lt Diag_PROM_source_file gt lt slot_ID gt
115. OMs 114088 Rev A 8 39 Using Technician Interface Software Determining the Version of the Current Boot PROM Image To determine the version number of Boot PROM images residing in a router start a Telnet session with the router and enter the following command at the Technician Interface prompt get wfHwEntry 19 With a Model BLN router for example information similar to the following appears with one wfHwEntry wfHwBootPromSource line for each slot wfHwEntry wfHwBootPromSource 1 nil wfHwEntry wfHwBootPromSource 2 rel 8 10 freboot exe wfHwEntry wfHwBootPromSource 3 rel 8 10 freboot exe wfHwEntry wfHwBootPromSource 4 rel 8 10 freboot exe wfHwEntry wfHwBootPromSource 5 rel 8 10 freboot exe Each line of response to the command specifies e A slot number for example wfHwEntry wfHwBootPromSource 2 identifies Slot 2 e A pathname that contains the version number of the image stored in the Boot PROM for example re1 8 10 freboot exe identifies the Version 8 10 Boot PROM image freboot exe in Slot 2 Note The command does not return a Boot PROM version number for slot 1 because slot 1 contains a System Resource Module SRM This applies to all models of router except AN and ASN routers Determining the Version of the Current Diagnostics PROM Image To determine the version number of DIAG PROM images residing in a router start a Telnet session wi
116. OT BIG riranin aea joertecedsieatiacageegenateniiece 8 33 yalidaing an Executable FWE crisisen iiaia a Een Moreen en erry pene pnc rr ee rererner 8 35 Upgrading and Ver tying a PROM sssascesssiiecctotssdenetacs ickcderi ai 8 38 Upgrading PROMS Remoto siisii inaa 8 39 Determining Current PROM Image Versions siiisaeisinisiiinninniinnnei aii 8 39 Determining the Version of the Current Boot PROM Image sseeeeeee 8 40 Determining the Version of the Current Diagnostics PROM Image 8 40 Using the prom Command ccciseeadscs isasei chassaacaiess duaigtoeiaamubioueeee en diciebaaliemieaan 8 41 Viewing the Load Addresses and Sizes of Applications c cccceeeeeeseeeeteeeeeeneeeeees 8 44 Seting Me AGE Backolane NPE scissa einai A ai 8 46 Resetting the Date and Time PE E ATE A E T ank 8 46 hee e ela oe A E EIEE E A A E E E A 8 48 Enabling and Disabling SecurlD Authentication s sissisisidsiinorsansadnninaiuniiin iiinn andains 8 50 Enabling SecuriD AUTNeniEaNON sssrini ane 8 50 114088 Rev A ix Disabling SecurelD Authentication senina a 8 52 Managing SNMP Sepure MOE aiiussidoinnsidann kaeida aiaa aaia 8 52 Setting the Router to Operate in Secure Mode ccsceceeeeeeeeeeeeeeeeeeeetaeeeeeneeees 8 53 Seting 0e ENYD KOY srira iosian AE NE 8 54 Resetting the Security Counter a se E E T ernia 8 54 Customizing Hardware Compression Search Depth assenissisirsnirinissminarniss 8 55 Testing Compress
117. Ox indicates that the address is in hexadecimal notation 3 12 114088 Rev A Using Operating Commands An IPX address in decimal notation consists of a 4 byte network address and a 6 byte host address where e Each byte is a number between 0 and 255 inclusive e A period separates successive address bytes for example 0 1 23 47 0 0 0 1 2 55 Note If you issue an IPX ping to an entity on a Token Ring network you must enter the host portion of the IPX address in byte swapped form noncanonical form t lt timeout gt r lt repeat_count gt are optional These parameters are as follows lt timeout gt is the number of seconds for each ping to time out If the system receives a response to a ping after it has timed out the system does not send an alive message to the console The default is 5 lt repeat_count gt is the number of ping messages to send The system does not wait for the timeout before sending the next ping Enter a value between 0 and 10 inclusive The default is 1 The console displays one of the following messages when you issue a ping ipx command If you enter a value other than 0 in the lt repeat_count gt argument the system displays one of the following messages for the default ping plus one for each additional ping e Analive message This message appears if the system receives an IPX reply packet from the target device within the lt timeout gt allowed A sample message fo
118. PC to determine which files are corrupt and delete those files File size is wrong shows the number of File Allocation Table FAT entries and directory table entries that do not match Use a PC to reformat the diskette Missing EOF shows the number of files in the FAT that are missing an End of File EOF marker Use a PC to reformat the diskette Directory errors shows the number of errors in the directory Refer to the log Use a PC to reformat the diskette if necessary Unmounting a Volume Use the unmount command to make the diskette drive unavailable before you remove a diskette reboot the router or reset Slot 2 When you issue the unmount command without using a f argument the system reports an error if files are in use at the moment you issue the command 5 6 114088 Rev A Managing a DOS File System To unmount the currently active volume make sure the diskette drive LED is off and enter the command as follows unmount The system reports an error if a file is in use at the moment you issued the command Otherwise you can assume that the unmount was executed If the system reports an error make sure the diskette drive LED is off and retry until no error is reported You can use the f argument to force an unmount regardless of whether a file is in use Caution Use the f argument to force an unmount only in emergencies File corruption errors may occur when you force an unmount while DOS is
119. P_address gt lt entity_code gt lt filter_index gt lt 1l2 3l4l5lel7ia gt 1 3 6 1 4 1 18 3 3 2 15 4 1 16 C 46 114088 Rev A Using Syslog Messaging to Monitor Router For More Information Refer to the instructions provided in the UNIX man ual pages on your workstation for more information on syslog syslogd and syslog conf 114088 Rev A C 47 Symbols command 3 3 wildcard 5 2 wildcard 5 2 A aborting a command 3 3 access levels manager 8 78 to 8 81 user 8 78 to 8 81 password protection 1 3 via SecurelID 1 3 ACE backplane 8 46 processor module 4 4 ace out image 4 4 ace out image file 4 9 afn exe image 4 4 afn exe image file 4 9 afnboot exe PROM image file 4 9 alias command 9 2 aliases creating 9 2 debugging 9 7 debugging network problems with predefined 9 10 definition of 9 1 deleting from memory 9 7 displaying 9 2 file 4 10 in debug al file 9 10 to 9 18 Index inserting character strings in 9 5 inserting parameters in 9 3 loading from a file 9 9 managing 9 1 to 9 18 saving to a file 9 8 an exe image 4 9 an exe image file 4 4 AN ASN configuring boot and config file source 8 2 to 8 8 anboot exe PROM image file 4 9 andiag exe PROM image file 4 9 APING 3 24 AppleTalk ping command 3 21 to 3 23 applications viewing addresses and sizes of 8 44 APPN ping command 3 24 to 3 26 asn exe image 4 9 asn exe image file 4 4 asnboot exe 4 9 asnboot
120. SWS Switched Services TCP Transport Control Protocol TFTP Trivial File Transfer Protocol TIP Terminal Interface Program TP Transaction Program VC Virtual Circuit VINES Virtual Networking System WAN Wide Area Network XB Translation Bridge XNS Xerox Networking Systems XXiV 114088 Rev A About This Guide Ordering Bay Networks Publications To purchase additional copies of this document or other Bay Networks publications order by part number from the Bay Networks Press at the following telephone or fax numbers e Telephone U S Canada 1 888 4BAYPRESS e Telephone International 1 510 490 4752 e Fax 1 510 498 2609 You can also use these numbers to request a free catalog of Bay Networks Press product publications 114088 Rev A XXV Technical Support and Online Services To ensure comprehensive network support to our customers and partners worldwide Bay Networks Customer Service has Technical Response Centers in key locations around the globe e Billerica Massachusetts e Santa Clara California e Sydney Australia e Tokyo Japan e Valbonne France The Technical Response Centers are connected via a redundant Frame Relay Network to a Common Problem Resolution system enabling them to transmit and share information and to provide live around the clock support 365 days a year Bay Networks Information Services complement the Bay Networks Service program portfolio by giving customers and partners access
121. Syslog host table set wfSyslogHostEntry wfSyslogHostDisable lt host_ P_address gt lt 1 2 gt 1 3 6 1 4 1 18 3 3 2 15 2 1 2 114088 Rev A C 33 Using Technician Interface Software Parameter Attribute Name Attribute Number Default Range Function Instructions Command MIB Object ID Parameter Attribute Name Attribute Number Default Options Function Instructions Command MIB Object ID Host UDP Port wfSyslogHostUDPPort 4 514 514 to 530 Identifies the UDP port of the remote host associated with this host entry Set designate the UDP port at which the remote host associated with this host entry will receive Syslog event messages from the router set wfSyslogHostEntry wfSyslogHostUDPPort lt host_IP_address gt lt 514 530 gt 1 3 6 1 4 1 18 3 3 2 15 2 1 4 Host Log Facility wfSyslogHostLogFacility 5 184 LOCAL7 128 LOCALO 136 LOCAL 1 144 LOCAL2 152 LOCAL3 160 LOCAL4 168 LOCALS 176 LOCAL6 184 LOCAL7 Specifies the UNIX system facility that receives and dispatches Syslog event messages from the router Set designate the facility that you want the remote host to use for receiving and dispatching Syslog event messages from the router Designate the same facility in the syslog conf file on the remote host set wfSyslogHostEntry wfSyslogHostLogFacility lt host_IP_address gt lt 128 136 144 152 1601 168 176 184 gt 1 3 6 1 4 1 18
122. Then save the configuration with these changes to the configuration file When you set the wf CSMACDAlignmentMode attribute to 1 ALIGN_ALL the router realigns the nonoptimally aligned frames before transmitting them When you set the wfCSMACDAlignmentMode attribute to 3 DISABLED the router transmits the nonoptimally aligned frames without realigning them first When you set the wfCSMACDAlignmentMode attribute to 2 ALIGN_OVER_128_BYTES the router realigns the nonoptimally aligned frames exceeding 128 bytes before transmitting them and transmits the nonoptimally aligned frames of 128 bytes or less without realigning them first Monitoring ip Routes The ip command allows you to display IP data from any of the following sources e The main routing table for any slot e The internal cache for any slot e The routing cache for a specific logical interface e The multicast routes cache e The BGP routes table for any BGP peer e The OSPF Link State Data Base LSDB You choose the source by specifying a lt subcommand gt in the command line You can also selectively filter the data by specifying one or more option lt flags gt in the command line Enter the ip command as follows ip lt subcommand gt lt flags gt lt subcommand gt lt routes bgp_routes cache ospf_Isdb gt 114088 Rev A 8 63 Using Technician Interface Software The subcommands have the following meanings If you enter t
123. VGA aisi a a ASEA 5 6 Changina the Working DUI ONY itis sas canes viasczna pica lea nation sabsated ass tauugisatedd aR i anaia 5 7 Hemana a Drecioiy sareei i A 5 8 ee VS ISRO srair i NEA enaeneit aed 5 11 Creare a DECI oorr d 5 12 Removing a DISCO sirain i a R AS 5 12 Reramng a Pleat DECOY siaa N 5 13 CORI a PUA aaa tanadacn vark dsdontistuatese nauseam asi cae 5 14 Copying Files fom DOS 16 NVF G niente enniasenieen ads 5 15 Mie 11d ate Gl ell pereegem erence rer searnett emer ricreeereen corre tel E eur itTreneyrr 5 15 In Band File Transfers er PEE E E ERT P PEER 5 16 114088 Rev A vii Out of Band File WaNSi rs cscs cseccccccssaeccccensasessnessenadacesa vanesvecsasanccsessevnaecuevessaencees 5 18 Chanana Fie NIRE crinis daka n adia une nct btauduss aain tating 5 19 Bie ey ety ira lg he C onena o Oa aare 5 20 Dee eh iote bei FIE Wrpeeeer Peeeeeee reper er rereer Peet rret crs tere rrrrerer ct reyrecr N 5 21 Chapter 6 Managing Events RE RONE A ia ania acct teen OAE T E EE VAA AT E 6 2 Logging and Displaying Event Messages ccccceececeeeceeeeeeeeseeeeeeeeseeeeeeeeeeeseieetaees 6 2 Appling Write Filters to the Events LOO sicesccssedengcccileeastesiceneraiecdencercesiieasess 6 3 Displaying Actve Write FINETS siuisiad tiirsa nnn NE E 6 5 Applying Read Display Filters to the Events Log cccceceeeeeeeseeeeeeeeeeeneeeeeees 6 6 Saving Me Evene LOO arinina a E R Aa 6 8 Saving ihe Events LOG
124. _index gt lt 1 8 gt The default value of wfSyslogEntFltrDebugMap is 8 mapping router DEBUG level messages to UNIX system level DEBUG messages 114088 Rev A C 21 Using Technician Interface Software Task 7 Adding More Hosts or Entity Filters You can add more hosts or entity filters to your Syslog configuration as follows 1 If you have finished adding entity filters for this remote host and you do not want to add another remote host at this time go to Task 8 Otherwise continue with Step 2 2 If you want to add another entity filter for the same remote host return to Adding an Entity Filter for a Remote Host Otherwise continue with Step 3 3 If you want to add another remote host to receive Syslog messages from the router return to Adding a Remote Host to the Syslog Host Table Task 8 Saving Your Syslog Configuration on the Router Save to a file on an NVFS volume the Syslog additions to your configuration as follows save config lt vol gt lt filename gt Task 9 Log Out of the Technician Interface Enter at the Technician Interface command line interface the following command logout For more information on how to close a Technician Interface session with a Bay Networks router refer to Chapter 1 C 22 114088 Rev A Using Syslog Messaging to Monitor Router Managing Syslog on a Router Once you finish configuring Syslog on a router you may occasionally need to Disable or r
125. _notice txt on your UNIX workstation or PC 2 Enter the text of a greeting or notice message that meets your requirements Format the message with appropriate spacing and return characters Note The router software imposes no limit on the size of the message in kB However the file system volume Flash card where the ti_notice txt file resides must have contiguous free space sufficient to accommodate your message Depending on the setup of a user s console device or Telnet application the topmost lines of a long pre login message may scroll out of view For this reason we recommend that you limit the length of your message to less than 20 lines 3 Save ti_notice txt on your workstation or PC 4 Use TFTP to copy ti_msg txt to the router s default file system volume Whenever someone attempts to log in to the router the message appears on the router s local console display or the remote user s Telnet screen Customizing the Technician Interface Welcome Message You can modify or replace the login message Welcome to the lt router_model gt Technician Interface according to the needs of your organization or network site The Technician Interface software invokes the message from an ASCII text file named ti_msg txt 114088 Rev A 8 59 Using Technician Interface Software To replace or customize the Welcome message on a particular router 1 Back up or copy ti_msg txt to another filename such as fi_m
126. a file By default the system writes messages to both the terminal and the file 8 60 114088 Rev A System Administration pause immediately places the system in pause mode Use this option with the fileonly option lt vol gt is the slot number containing the volume used to store the file lt filename gt is the name of the file used to store the output You can suspend recording temporarily by using the pause option You can determine the state of recording by testing the global variable RECORD_STATE from a script ON indicates the system is recording OFF indicates recording is turned off and PAUSED indicates that recording is temporarily suspended To display the pause state of the record command enter the following record pause To change the pause state enter record pause on off on disables recording off re enables recording To close the record file and save it enter the following command record close Note When you specify a record file on a Flash NVFS volume remember that only one record file at a time can be open on that volume If you attempt to concurrently write other Technician Interface commands to another open record file on the same volume those commands will fail 114088 Rev A 8 61 Using Technician Interface Software Enabling Internal Clocking Mode Within test environments and when using the HSSI Crossover Cable Order No 7832 you may need to configure Bay Netw
127. an Interface 5 2 to 5 22 naming files and directories 5 3 E echo command 9 5 enable command 1 13 enabling internal clock mode 8 62 encryption key setting 8 54 End of File marker 5 6 entity filters for Syslog remote hosts C 5 events via Events Manager clearing 6 14 displaying filters 6 5 displaying log for 6 2 6 13 filtering log input 6 3 filtering log output 6 6 managing 6 2 to 6 14 saving log for 6 8 Index 4 114088 Rev A events via Syslog See Syslog exec command 3 7 executable files 4 4 8 34 F FIFO memory buffer 6 2 File Allocation Table 5 6 file attributes 5 19 File System Check Report 5 5 to 5 6 files ace out 4 9 afn exe 4 9 afnboot exe 4 9 an exe 4 9 anboot exe 4 9 andiag exe 4 9 asn exe 4 9 asndiag exe 4 9 bn exe 4 9 changing attributes of 5 19 compacting space 4 19 config 4 9 copying 4 11 5 14 from DOS to NVFS 5 15 from NVFS to DOS 4 11 debug al 4 10 default names of 4 9 deleting 4 18 5 21 displaying the contents of 4 17 5 20 freboot exe 4 10 install bat 4 10 names 4 5 renaming 5 13 syslog conf C 47 ti cfg 4 10 transferring 4 13 5 15 to full memory card 4 20 validating an executable 8 35 Index filters events log input 6 3 events log input filters displaying 6 5 events log output 6 6 Syslog C 4 Flash System Controller 4 2 Force User Logout parameter 2 17 format command 4 20 Frame Relay settings 8 6 FR
128. an use the same optional arguments when displaying a log file you previously saved as you can to display a current log refer to the section that follows for instructions Another option is to limit the event types you save to a log file When you display the log file after saving it only those event types you saved are displayed Enter the following command to limit the event types you save to a log file save log lt vol gt lt log_file gt d lt date gt t lt time gt e lt entity gt f lt severity gt s lt s ot_ID gt Refer to the previous section for a description of the optional arguments 6 8 114088 Rev A Managing Events Note The save log command does not clear events from memory Refer to Clearing Events later in this chapter Examples If you enter The system saves save log 2 10_12 log All events to a file named 0_ 2 log in Slot 2 save log 2 10_12 log d10 Events logged since October 12 1995 to a file 12 95 named 0_12 log in Slot 2 save log 2 temp log Events logged since 9 02 today to a file named t09 02 00 temp log in Slot 2 If it is earlier than 9 02 the system saves all events logged since 9 02 yes terday save log 3 tftp log eTFTP Events logged by the TFTP driver to a file named tftp log in Slot 3 save log 3 snmp log Trace and fault events logged by the SNMP eSNMP ftf driver to a file named snmp log and stores the file in Slot 3 save log 2 slot3 log s3 Eve
129. and Timeout 2 14 Data Bits 2 9 Delete 2 5 Disable 2 5 Force User Logout 2 17 History Depth 2 17 Lines Per Screen 2 11 Login Retries 2 14 Login Script Search Path 2 15 Login Timeout 2 13 Manager s Login Script 2 15 Maximum Autosaved Files 2 18 114088 Rev A Index 3 Using Technician Interface Software Modem Enable 2 10 More 2 11 Password Timeout 2 13 Port Name 2 7 Port Number 2 6 Port Parity 2 9 Port Type 2 8 Slot Number 2 7 State 2 6 Stop Bits 2 10 User s Login Script 2 16 Control Point name 3 24 copy command 4 11 5 14 Customer Service FTP xxix customer support See getting help D data bits setting 2 9 date command 8 46 debug aliases 9 10 to 9 18 debug al file 4 10 default filenames 4 9 default settings IP interface 8 7 delayed boot 8 14 delete command 4 18 5 21 deleting a console port instance 2 5 diagnostics running 8 29 diags command 8 9 to 8 10 8 29 dial connection to router 1 1 dinfo command 4 6 dir command 4 7 5 8 directed boot 8 11 Directed Netboot configuring with bconfig command 8 4 directories changing 5 7 creating 5 12 displaying 5 8 removing 5 12 renaming 5 13 disable command 1 13 disabling a console port 2 5 Syslog hosts or filters C 24 the Syslog entity C 23 display filters events log 6 6 DLCMI settings 8 6 DOS file attributes 5 19 file system labeling a diskette 5 11 managing using the Technici
130. ansfer Protocol Feeder Node Frame Relay Fast Routing Engine Gate Access Management Entity Greenwich Mean Time High level Data Link Control High Speed Serial Interface Internet Control Message Protocol Internet Group Membership Protocol Integrated Node Internet Protocol Internet Packet Exchange Integrated Services Digital Network Local Area Network Link Access Procedure Balanced Light Emitting Diode Logical Link Control Local Management Interface Link Node LAN Network Manager Link State Packet Media Access Control Multichannel T1 Management Information Base Managed Object Syntax Native Mode LAN 114088 Rev A xxiii Using Technician Interface Software NSAP Network Service Access Point NVFS Non Volatile File System OSI Open Systems Interconnection OSPF Open Shortest Path First PCMCIA Personal Computer Memory Card International Association PPP Point to Point Protocol PPX Parallel Packet Express PROM Programmable Read Only Memory QENET Quad Ethernet RAM Random Access Memory RARP Reverse Address Resolution Protocol RIF Routing Information Field RFC Request for Comment SAP Service Access Point SDLC Synchronous Data Link Control SIMM Single In line Memory Module SMDS Switched Multimegabit Data Services SNAP SubNetwork Access Protocol SNMP Simple Network Management Protocol SR Source Routing SRM L System Resources Link Module STA Statistics Thresholds and Alarms SYSCON System Controller board
131. aps filtered event messages into Syslog message format For example the following system log message 1 02 07 95 16 03 18 679 INFO SLOT2 FTP Code 5 FTP is initializing looks as follows in Syslog format Bia lt ENT_CODE 88 5 lt AE gt FTP SLOT 2 SEVERITY Info ENTITY_CODE E FTP is initializing Figure C 3 shows how Syslog encapsulates a message into a UDP packet C 8 114088 Rev A lt Facility Level gt IP header UDP header UDP Data Using Syslog Messaging to Monitor Router Syslog Message lt priority code gt Tee ee Entity Description SLOT Slot Number SEVERITY Severity Level ENTITY_CODE EVENT_CODE Entity_code Event_code TSO003A Figure C 3 Syslog Message Encapsulation Syslog retrieves the variables shown in brackets from the router s system log message or from the host table The following paragraphs describe the variables for e IP header e UDP header e UDP data e Priority code IP Header Syslog adds to any event message that passes all filtering criteria the destination IP address for a specific remote host 114088 Rev A C 9 Using Technician Interface Software UDP Header Syslog adds to any event message that passes all filtering criteria the destination UDP port number on the remote host identified in the IP header UDP Data The UDP data field in the Syslog packet contains a reforma
132. archDepth 9 3 0 no compression on this line to 255 maximum compression on this line Defines the depth of searching for repetitive patterns in the data you want to send over a synchronous line Unless you also configure search depth at the circuit level independently using wfWcpCircuitSearchDepth any virtual circuit you configure on this line inherits the setting for line search depth Compression ratios may improve with settings higher than the default value of 3 however throughput may actually decrease for settings higher than 12 or 13 The compression engine yields higher compression ratios but takes longer to find token matches for the data being sent over the line Bay Networks does not recommend settings higher than 13 Accept the default value or choose a customized search depth value that provides the best trade off between compression ratio and throughput on this line Test end to end throughput and line utilization before and after modifying the WCP search depth attributes set wiWcpLineEntry wfWcpLineSearchDepth lt 0 255 gt 1 3 6 1 4 1 18 3 4 22 1 1 9 114088 Rev A 8 57 Using Technician Interface Software Parameter Attribute Name Attribute Number Default Options Function Instructions Command MIB Object ID WCP Circuit Search Depth wfWepCircuitSearchDepth 7 256 0 no compression on this circuit to 255 maximum compression on this circuit or 256 inherit wfWcpLineS
133. ard increases the contiguous free space Caution Back up the files by copying them to a second memory card before issuing the compact command Enter the following to erase the memory card contents and rewrite its files where lt vol gt is the slot number of the card compact lt vol gt 114088 Rev A 4 19 Using Technician Interface Software The following message appears Compacting file system on volume lt vol gt This may take several minutes Please wait 100 Complete Compaction completed The space is compacted when the Technician Interface prompt reappears Formatting a Memory Card Use the format command to erase all files on a memory card and format it where lt vol gt is the slot number of the card format lt vol gt Use the format command to format new memory cards if you do not obtain them from Bay Networks Enter dinfo to ensure that the file system formatted the card successfully G Caution You cannot recover your files after entering the format command We recommend that you copy them to a second volume before issuing the format command Transferring a File to a Full Memory Card If you attempt to transfer a file to a memory card that does not have enough space the name of the file with a length of 0 bytes appears in the memory card s directory Before you transfer another file to the memory card you should optimize the available space by completing the followi
134. ark 2 install bat Volume 2 on the router known as dark Out of Band File Transfers Appendix B in this guide describes how to transfer files out of band via the dial telephone network by means of the xmodem command Displaying the Contents of a File Use the type command to display the contents of a file Before displaying a file enter more on to display the file one screen at a time Enter the following to display a file type x lt vol gt lt filename gt X is an optional argument to display the file in hexadecimal format This allows files containing nonprintable information to be viewed lt vol gt specifies the slot number of the volume containing the file lt filename gt is the name of the file you are displaying The file is displayed in the same format in which it is stored provided that you do not enter the x argument binary for log files and ASCII for alias files Log files are stored in binary format use the log command described in Logging and Displaying Event Messages in Chapter 6 to display a log file in ASCII format 114088 Rev A 4 17 Using Technician Interface Software Examples If you enter The console type 2 install bat Displays the contents of the install bat file which is stored on the volume in Slot 2 type x 3 config Displays the config file which is stored on the volume in Slot 3 This file is displayed in hexadecimal format Deleting a File Use the delete
135. bnet mask of the interface you selected with the lt interface gt setting Provide this address in dotted decimal notation lt next_hop_address gt Specifies the IP address of the next hop router Provide this address in dotted decimal notation You only need to specify this address if there are intermediate routers between the router and the BOOTP server Configuring an Ethernet Interface for Network Booting To configure an Ethernet interface for network booting of a router use the following command format ifconfig s lt s ot_no gt d lt interface gt lt P_address gt lt subnet_mask gt lt next_hop_address gt Table 8 3 describes the ifconfig command arguments for configuring the router s Ethernet interface Table 8 3 ifconfig Settings for an Ethernet Interface Setting Description Slot setting s lt slot_no gt Specifies the slot containing the interface you want to configure The slot corresponds to the ASN slot ID which can be 1 through 4 If you omit this argument ifconfig uses the current slot Default setting d Resets the router s IP interface settings to the default values Resetting an Ethernet interface makes it inactive in the network booting process The output of the getcfg command shows the default as None IP connector setting lt interface gt Specifies the type of IP connector you are configuring For the AN and ANH use xevr
136. bootstrap PROM matches the freboot exe file use the prom v command bn exe is the router software image for the BLN BLN 2 and BCN an exe is the router software image for the AN and ANH afn exe is the router software image for the AFN asn exe is the router software image for the ASN ace out is the router software image for the FN LN CN and ALN When the system boots it automatically loads the default router software image unless you specify another router software image from another slot into memory on the processor module or if another slot is unavailable from the file system to memory To upgrade with a new image transfer it to the file system and reset the system do not use the prom w command when upgrading with a new router software image Note You cannot edit executable files The sections that follow describe how to use the readexe prom w and prom v commands to validate upgrade and verify executable software 8 34 114088 Rev A System Administration Validating an Executable File You validate executable files before upgrading by using the readexe command This command calculates file header and image checksums on executable files on the file system verifies that the checksums match those within the files and displays the results and all file header information Enter the following command and parameter to validate an executable file on the active volume lt filename gt is the name of the exe
137. cannot read or change this file freboot exe A copy of the bootstrap image resident on the bootstrap PROM of a BLN BLN 2 or BCN router You cannot read or change this file install bat A script file that you use during the initial startup ti cfg A configuration file containing the MIB variables associated with the default Technician Interface console operating parameters This file contains the minimal configuration necessary to operate the router This file is stored in binary format The Total size Available free space and Contiguous free space fields that appear below the dir display show the same information as the Total Size Free Space and Contig Free Space in the dinfo display Refer to the earlier section Displaying the Status of All Memory Cards for a description of these fields Changing the Active Volume Use the cd command to change the active volume as follows cd lt vol gt lt vol gt is the slot number of the volume The system displays the new active volume If you enter the cd command without specifying a volume the system displays the present working directory as follows cd Present Working Directory 2 4 10 114088 Rev A Managing a NonVolatile File System Copying a File Use the copy command to make a copy of a file You can use the wildcard characters and when issuing the copy command to copy multiple files Caution The system automatically overwrites any file al
138. cation of Abstract Syntax Notation One ISO 8824 114088 Rev A A 7 Using Technician Interface Software Also the latest editions of the following textbooks provide information about these standards e Comer Douglas E Internetworking with TCP IP Vol 1 Englewood Cliffs New Jersey Prentice Hall e Rose Marshall T The Simple Book Englewood Cliffs New Jersey Prentice Hall e Stevens Richard W TCP IP Illustrated Vol 1 Reading Massachusetts Addison Wesley Implementation Notes The following notes list the assumptions made about MIB II object definitions supported traps unsupported objects and unsupported operations MIB II Object Definitions The assumptions about MIB II object definitions are as follows ifNumber ifIndex Represents the total number of rows in the interface table Represents a unique integer corresponding to a data link layer entity ifIndex values are derived from Bay Networks circuit numbers A single interface or a group of interfaces multiline can be a member of a single circuit With a single interface a single ifIndex value matching the circuit number is allocated and the ifTable statistics correspond to the single interface With a group of interfaces a single ifIndex value is still allocated however the ifTable statistics are aggregated for all interfaces in the circuit group Four statistics require special consideration when using multiline ifAdminStatus ifOp
139. ch PVC an update message packet with the A bit set to inactive To initiate graceful shutdown followed by a system or slot restart enter the appropriate command at the Technician Interface prompt The system performs If you enter a graceful shutdown and restarts restart shutdown All slots restart shutdown lt s ot_no gt One slot restart shutdown lt s ot_no gt lt s ot_no gt A range of slots restart shutdown lt s ot_no gt lt slot_no gt 5 A list of slots The console displays the following message during shutdown Shutdown in progress If shutdown succeeds the console displays the message Shutdown is complete Upon issuing this message the system performs a restart operation If shutdown fails the console displays the message Continue shutdown Y N If you choose N no at this time the system terminates shutdown and displays the following message on the console device Shutdown aborted Upon issuing this message the system performs a restart operation 114088 Rev A 8 23 Using Technician Interface Software If you choose instead to Continue Y the system continues the shutdown attempt We recommend that you terminate this procedure after no more than one additional shutdown attempt Resetting a System or Slot The reset command allows you to reboot one or more slots with a new router software image You reset one or more slots by entering the slot n
140. ch file versions of scripts in an identical manner using the script commands described in Using Technician Interface Scripts The embedded scripts run more efficiently than scripts based on loadable batch files 114088 Rev A Using Technician Interface Software The router software currently includes embedded scripts for the following router software entities e CSMACD e TCP e IP TFTP e IPX e SNMP e FR e SYNC FTP e TELNET You can also use menus described in Using Technician Interface Scripts as an alternative way of accessing the full set of scripts 114088 Rev A Chapter 2 Configuring the Console Port To configure a router s console port parameters using the Technician Interface you have to change the default parameter settings associated with the console port on the back of the router You can change the default parameter settings for the console port associated with the following boards e System Resources Link Module SRM L board found in the BLN BLN 2 and BCN routers e System Input Output SYS I O board found in the FN LN CN and ALN routers e Motherboard found in the AFN oe AN and ASN routers The autoscript feature allows you to automatically execute certain Technician Interface commands when you log in as either a Manager or User Note You can use the console port to connect either a console or modem to the router 114088 Rev A 2 1 Using Technician Interface Softwa
141. cian Interface commands to configure a console port parameter set wfSerialPort Entry lt attribute_name gt lt port_no gt lt option gt set wfSerialPort Entry lt attribute_no gt lt port_no gt lt option gt set wfSerialPortEntry lt attribute_name gt lt attribute_no gt lt port_no gt lt option gt Example Refers to the Technician Interface set command You must have Manager access to issue a set command Refers to the MIB attribute name associated with all serial port parameters Is the MIB attribute name associated with one of the serial port parameters Is the MIB attribute number associated with one of the serial port parameters Is the number of the serial port you are configuring Is the new setting taken from the Options or Range list The following commands set the Parity parameter to Odd set wfSerialPortEntry wfSerialPortParity 1 2 or set wfSerialPortEntry 10 1 2 Note You can use s instead of set 114088 Rev A 2 3 Using Technician Interface Software Using the commit Command Enter the following command after issuing one or more set commands commit The commit command causes the changes you made to the configuration to take effect in active memory but not in Flash memory You must use the save command subsequently to save changes to a configuration file config and Flash volume on the router The Technician Interface software service resets wh
142. cify a filter for an individual message by setting the upper and lower boundaries of the event number range equal to the same message number If you configure an event number range of 0 to 255 Syslog ignores the range as a filtering parameter and checks instead to see if a Message Severity Mask exists for the same entity filter Filtering by Event Severity Level Each event message generated by the router software has a unique severity level To determine the severity level of any router event message refer to the guide Event Messages for Routers and BNX Platforms As an alternative to specifying event numbers as filtering criteria you can specify in an entity filter one or more event message severity levels that is you define a severity mask for the filter Note Syslog checks the message severity mask only when you accept the default event message number range of 0 to 255 for the same filter This causes Syslog to ignore event numbers as criteria for selecting and forwarding messages to a remote host Syslog uses the severity levels as criteria for selecting and forwarding only the types of messages you want a remote host to receive An entity filter passes only messages that have a severity level equal to any you specified in the message severity mask You define severity levels by setting a value for the wfSyslogEntFltrSevMask filter attribute in the router s active MIB For example if an entity filter for FTP has a Mes
143. cility defaults to a value of 184 Local7 C 26 114088 Rev A Using Syslog Messaging to Monitor Router 4 Create a wildcard filter to forward events of type fault warning and debug and on Slots 2 3 4 5 a Create the filter as follows set wfSyslogEntFlitrEntry wfSyslogEntFltrDelete lt Host_IP_Address gt 255 1 1 commit lt Host_IP_Address gt is the address of the remote host associated with this filter 255 is the wildcard entity number 1 represents the index number of the filter commit commits router system resources to the filter you are creating Define the wildcard setting for filtering by event numbers The setting causes Syslog to ignore event numbers as a filtering criteria and to use instead message severity levels as a filtering criteria set wfSyslogEniFlitrEntry wfSyslogEntFltr_ogEvtLowBnd 192 32 6 14 255 1 0 set wfSyslogEniFlitrEntry wfSyslogEntFltr_ogEvtUppBnd 192 32 6 14 255 1 255 Define a set of message severity levels a severity mask that causes Syslog to select and forward only messages that have a severity level of fault warning or debug set wfSyslogEntFlitrEntry wfSyslogEntFltrSevMask 192 32 6 14 255 1 fwd The next two commands define the range of Slots 2 to 4 inclusive as an additional filtering criterion The commands cause Syslog to select only messages logged on Slots 2 to 5 set wfSyslogEniFitrEntry wfSyslogEntFltrSlotLowBnd 192 32 6
144. command to delete files that you specify You can use the wildcard characters and when issuing the delete command Caution You cannot recover a file after it is deleted The delete command does not prompt you to verify a deletion Enter the following to delete a file on the active volume delete lt filename gt Enter the following to delete a file on a different volume delete lt vol gt lt filename gt lt vol gt is the slot number of the volume containing the file lt filename gt is the name of the file You can enter del or delete when deleting a file 4 18 114088 Rev A Managing a NonVolatile File System Examples If you enter The system delete alt cfg Deletes the alt cfg file on the active volume delete Deletes the 6_22 log file on Volume 2 2 16_22 log delete 3 log Deletes all files with the log filename extension on Volume 3 delete Deletes all files with a three character filename and a log file 4 222 log name extension on Volume 4 Compacting File Space When you delete a file from a memory card the file and its data become inaccessible and eventually occupy all remaining storage space on that card Use the compact command to e Copy active files to memory e Erase the card s contents e Copy the active files back to the memory card If responses to the dir or dinfo commands reveal more free space than contiguous free space on a memory card compacting the space on the c
145. curlD Authentication This section describes how to enable or disable SecureID services from a Technician Interface session Note You enable disable SecureID services only from a router console an ASCII terminal or terminal emulator connected directly to the router console port You cannot enable disable SecureID services through a Technician Interface session supported by means of Telnet connection to the router To enable or disable SecureID services you answer questions from the securelogin configuration utility running on the router Press Return after each entry If you press Return without entering a response to a question securelogin repeats the last question Enabling SecurlD Authentication Once you log in to the Technician Interface and the prompt appears on the console display proceed as follows to enable SecureID authentication services on the router 1 Enter the following at the Technician Interface prompt securelogin 2 Respond to each question that appears on your console display The sequence shows responses as bold text within brackets Do you wish telnet login to require SecurID yes no yes What is the IP address of the router being secured a b c d lt IP_Address gt What is the IP address of the SecurID server a b c d lt IP_Address gt What is the TCP port number for SecurID services default 755 lt TCP_Port_Number gt You have designated lt IP_Decimal_Address gt
146. cutable file readexe lt filename gt Enter the following command and parameters to validate an executable file on another volume readexe lt vol gt lt filename gt lt vol gt is the volume storing the file lt filename gt is the name of the executable file Figure 8 3 shows a sample system response to the readexe command 114088 Rev A 8 35 Using Technician Interface Software readexe 5 bn exe Processing contents of 5 bn exe Validating header checksum OK Validating image checksum OK Program execution address space Load Address 0x30300000 Size 767449 Bytes Entry point PROM storage address space PROM Load address 0x00000000 Input file information Workspace int 8 10 40 Compression ON Revision 8 10 Last Modifed Friday December 30 18 44 14 1994 File type Executable file use name Oasys Linker Platform Key 0101000B BB M68000 MotherBoard FRE FRE2 FRE2_60 P Figure 8 3 Sample Response to readexe Command The system response to the readexe command contains the following information e Validating header checksum The system calculates a checksum on the file s header and compares the checksum to the data in the checksum field of the file s header The system reports that the header checksum is OK if it matches or BAD if it does not match e Validating image checksum The system calculates a checksum on the file s image data and compares th
147. d 15 25 48 mfg log 172052 11 03 94 Thurs 16 24 28 config Tse WAPI oA Etis 15242 01 bn exe 2635353 01 05 95 Thurs 09 08 55 4194304 bytes Total size 1356883 bytes Available free space 1356883 bytes Contiguous free space a P Figure 4 2 Sample NVFS Directory Listing Examples If you enter The console dir Displays the list of files on the active volume dir cfg Displays the list of files with a cfg extension on the active vol ume dir 3 Displays the list of files on Volume 3 dir 4 log Displays the list of files with a three character filename and a log extension on Volume 4 4 8 114088 Rev A Managing a NonVolatile File System The factory default filenames are as follows ace out ajn exe an exe asn exe bn exe afnboot exe anboot exe andiag exe asnboot exe asndiag exe config The router software image for the FN LN CN and ALN You cannot read or change this file The system automatically refers to this binary file for booting instructions unless you use the boot command to specify a different router software image The router software image for the AFN The router software image for the AN and ANH The router software image for the ASN The router software image for the BLN BLN 2 and BCN You cannot read or change this file The system automatically refers to this binary file for booting instructions unless you use the boot command to specify a
148. d external to the workstation For example Syslogd on a UNIX workstation concurrently handles messages received from applications running on the workstation as well as messages received from Bay Networks routers running in a network accessible to the workstation Figure C 1 illustrates the following Syslog and Syslogd functionality Syslog running on each slot Polls the local events log buffer to retrieve new event messages Selects from the local events log messages that meet the requirements of entity filters you configure on the router Maps into Syslog message format any messages retrieved from the local events log Inserts a priority code into each reformatted message Time sequences messages if you first enabled the message sequencing feature Forwards messages to IP on the router which in turn forwards messages to remote hosts identified in the Syslog host table At a remote UNIX management workstation Syslogd Receives Syslog messages from Bay Networks routers Examines the priority code in each message Uses the priority code to determine appropriate system handling for each message Based on the priority code in each message Syslog dispatches each message to any or all of the following destinations Workstation display A local log file A designated printer One or more remote hosts C 2 114088 Rev A Router e Retrieves event messages e Filters retrieved Messages e Maps retrie
149. d forward to a specific remote host enter the following set wfSyslogEntFlitrEntry wfSyslogEntFltrSevMask lt host_IP_address gt lt entity_code gt lt filter_index gt lt fwitd gt commit To also define by slot number s the event messages you want Syslog to select and forward to a specific remote host enter the following set wfSyslogEntFlitrEntry wfSyslogEntFltrSlotLowBnd lt host_IP_address gt lt entity_code gt lt filter_index gt lt 0 14 gt set wfSyslogEntFlitrEntry wfSyslogEntFltrSlotLowUpp lt host_IP_address gt lt entity_code gt lt filter_index gt lt 0 14 gt commit Note Although the valid range for the slot lower and upper boundaries is 0 to 14 specify only values within the range of actual slot numbers for the model of router you are configuring Otherwise the filter will not transition to an active state 3 Define how router event message severity levels and UNIX system error levels map to one another In most cases you accept the default mapping and go to Task 7 Otherwise continue with the following instructions to customize the message mapping Enter at the Technician Interface prompt the command line s appropriate for the message mapping s you want to change a Change router FAULT message mapping as follows set wiSyslogEniFlitrEntry wfSyslogEntFltrFaultMap lt host_IP_address gt lt entity_code gt lt filter_index gt lt 1 8 gt The default
150. d to the DOS events in the log to determine the cause The most common cause of file corruption is that DOS was interrupted while writing to the diskette and was unable to complete its operation This can occur when the power resets the router reboots or Slot 2 is reset You can avoid corrupting files when performing these tasks by first entering the unmount command described next and making sure the system does not respond with an error message indicating that a file is in use 114088 Rev A 5 5 Using Technician Interface Software The File System Check Report entries are as follows Allocated but unused clusters shows the number of reserved sectors not allocated to files The router may in some cases be able to recover from this error when mounting the volume The Technician Interface displays a message indicating success or failure after a recovery attempt Enter the unmount a and mount a commands to determine whether DOS fixes the error If the file system comes up clean the error is fixed If an error is detected again use the check disk chkdsk command with the fix F switch on a PC to free the allocated but unused sectors Used but unallocated clusters shows the number of unreserved sectors allocated to files The directory is corrupt Use a PC to reformat the diskette Cluster chains shared between files shows the number of sector chains that are allocated to more than one file Use the chkdsk command on a
151. d value for this attribute Entity Filters Each protocol and system service in the router software has a unique entity number For a complete list of entity numbers refer to the guide Event Messages for Routers and BNX Platforms The router software uses an entity number plus the IP address of a specific remote host to identify each entity filter you configure on the router For example if you configure a filter that selects only messages logged by entity number 2 IP on a router Syslog forwards those messages only to the host IP address associated with that filter You must also assign a filter index number wfSyslogEntFltrIndex to each filter you configure for the same entity and remote host pair Assign a value of 1 to the first filter you configure for a specific entity and remote host pair To each subsequent filter that you configure for the same entity and remote host pair assign an index number increased by 1 114088 Rev A C 5 Using Technician Interface Software Note Although you assign each filter an index number manually through the Technician Interface Site Manager automatically assigns an index number to each new filter you add to the configuration When you want Syslog to select and forward from all entities event messages that satisfy severity and slot criteria that you specify configure a filter for the wildcard entity number 255 Note The wildcard filter is active for a host only if ther
152. describes parameters you can configure for each host you add to the Syslog host table list of remote UNIX hosts Parameter Attribute Name Attribute Number Default Options Function Instructions Command Parameter Attribute Name Attribute Number Default Options Function Instructions Command MIB Object ID Host Delete wfSyslogHostDelete 1 1 Create 1 Create 2 Delete Adds or deletes a remote host entry in the Syslog host table Parameters associated with this entry collectively define a remote host that will receive Syslog event messages from the router Set to 1 to add a host to the Syslog host table Set to 2 to delete a host from the Syslog host table set wfSyslogHostEntry wfSyslogHostDelete lt host_ P_address gt lt 1 2 gt Messaging Enable wfSyslogHostDisable 2 1 Enable 1 Enable 2 Disable Enables or disables message forwarding from Syslog to the remote host associated with this host entry Set to 1 to enable message forwarding from Syslog to the remote host associated with this host entry Set to 2 to disable message forwarding from Syslog to the remote host associated with this host entry You can also stop forwarding router events to the host by deleting the host Refer to the Host Delete parameter wfSyslogHostDelete If you delete a remote host and later decide you want to forward router events to that host you must add the remote host again to the
153. dure before acquiring access to the router s Technician Interface Managing SNMP Secure Mode Bay Networks implements an optional security mechanism for all SNMP set requests This proprietary mechanism is an interim solution to solve some of SNMP s security problems until a stable widely accepted industry standard security solution is available Our security system uses counters to synchronize management operations between manager and agent In secure mode when Site Manager sends a set request to the router the request includes the encrypted value of a counter plus 1 as the first variable binding in the PDU 8 52 114088 Rev A System Administration When the agent on the router receives the set request it compares the decrypted value with the value of its own counter plus 1 If the two values match the agent considers the set request to be authentic and increments the counter by 2 The agent stores the new value of the counter in an encrypted form in the MIB and sends it back to Site Manager as the first variable binding in the response The manager receiving the response validates that the received counter matches the manager s counter plus 2 If the two values match the response is declared authentic The use of counters guards against masquerade security violations because an intruder would have to know the encryption key and the correct counter to send as the first variable binding The security mechanism also guards
154. e The following sections describe each use of the ifconfig command Configuring the Initial IP Synchronous Interface To Netboot the router you must first configure the router s initial IP synchronous interface to the network using the following interface configuration command ifconfig s lt s ot_no gt lt synchronous_options gt lt interface gt lt P_address gt lt subnet_mask gt lt next_hop_address gt lt synchronous_options gt indicates some combination of the following settings d fr annexd Imi annexa int_clk Note You must insert a space to separate each command option from the next You can use the same command format to configure other synchronous interfaces on the router for network booting Table 8 2 describes the ifconfig command arguments for configuring a router s synchronous interface 114088 Rev A 8 5 Using Technician Interface Software Table 8 2 ifconfig Command Settings Setting Description Slot setting s lt slot_no gt Specifies the slot containing the interface you want to configure The slot corresponds to the ASN slot ID which can be 1 through 4 If you omit this argument ifconfig uses the current slot Default setting d Resets the router s IP interface settings to the default values This setting tries four WAN configurations in the following order until it finds the correct type for the router s connection to the ne
155. e Overview This section examines the structure of the Bay Networks router MIB The object tree assigned to the Bay Networks router MIB is as follows iso org dod internet private enterprises wellfleet The corresponding numeric identifier assigned to the Bay Networks router MIB subtree is as follows 1 3 6 1 4 1 18 Figure A 1 shows an example of the hierarchy of objects The prefix that precedes each object name identifies a Bay Networks enterprise specific object The wfSwSeries7 wellfleet 3 object names and identifies the Bay Networks router MIB for the Series 7 and later software The nodes in the first level below wfSwsSeries7 are as follows e wfHardwareConfig wfSwSeries7 1 contains the objects that pertain to the hardware configuration e wfSoftwareConfig wfSwSeries7 2 contains the objects that pertain to software that is loaded such as protocols and drivers and information required for loading such as where in memory a driver gets loaded e wfSystem wfSwSeries7 3 contains the objects that pertain to the system record console remote console and the circuit name table e wfLine wfSwSeries7 4 contains the objects that determine the functioning of the drivers that control the data link layer media e wfApplication wfSwSeries7 5 contains the protocol applications A 2 114088 Rev A Using the Bay Networks Router MIB wellfleet enterprises 18 wfSwSeries7 wellfleet 3 wfHardwareConfig wfSwSeries7
156. e 2 LSID the IP interface address of the network s Designated Router If LS Type 3 LSID the destination network s IP address If LS Type 4 LSID the Router ID of the AS boundary router If LS Type 5 LSID the destination network s IP address A discretionary attribute used by a BGP speaker to inform other BGP speakers in its own autonomous system of the originating speaker s degree of preference for an advertised route Indicates the type of OSPF Link State advertisement as follows 0 stub advertisement 1 router links advertisement 2 network links advertisement 3 summary link IP network advertisement 4 summary link ASBR advertisement 5 external link advertisement Refer to RFC 1583 for more information on LS Type 114088 Rev A 8 71 Using Technician Interface Software Mask Subnet mask to be combined with the destination address and then compared with the value in Destination If the value of Destination is 0 0 0 0 a default route then the mask is 0 0 0 0 Prefix 0 Metric Indicates the costs of the various interfaces described in a router LS Type advertisement Also indicates the cost of each path described in summary link and AS external link advertisements Network Destination IP address for this route where 0 0 0 0 indicates a default route NextHopAddr AS IP address of the next hop and next Autonomous System of this route If the next hop is an unnumbered interface the com
157. e Attribute Number Default Options Function Instructions Command MIB Object ID Entity Filter Delete wfSyslogEntFltrDelete 1 1 Create 1 Create 2 Delete Creates or deletes an entity filter for the remote host at the location defined by wfSyslogEntFltrHostIndex for this filter table entry Set to 1 to create an entity filter for the remote host at the IP address defined by wfSyslogEntFltrHostIndex for this filter table entry Set to 2 to delete this entity filter set wfSyslogEntFltrEntry wfSyslogEntFltrDelete lt host_IP_address gt lt entity_code gt lt filter_index gt lt 1 2 gt 1 3 6 1 4 1 18 3 3 2 15 3 1 1 Entity Filter Enable wfSyslogEntFltrDisable 2 1 Enable 1 Enable 2 Disable Enables or disables the entity filter associated with this filter table entry Set to 1 to enable the entity filter associated with this filter table entry Set to 2 to disable the entity filter associated with this filter table entry set wfSyslogHostEntry wfSyslogEntFltrDisable lt host_ P_address gt lt entity_code gt lt filter_index gt lt 1 2 gt 1 3 6 1 4 1 18 3 3 2 15 3 1 2 114088 Rev A C 37 Using Technician Interface Software Parameter Filter Operational State Attribute Name wfSyslogEntFltrOperState Attribute Number 6 Default 2 inactive filter Options 1 active filter 2 inactive filter Function Indicates the actual status of the filter When the status is ACT
158. e 1 Up 2 Down 3 Init 4 Invalid 5 NotPresent bgpconnstate Displays the BGP FSM state of all configured BGP connections Valid values are 1 Idle 2 Connect 3 Active 4 OpenSent 5 OpenConfirm 6 Established bgp3origin Displays the ORIGIN attribute of each network advertisement received via BGP 3 Valid values are 1 IGP 2 EGP 3 Incomplete bgp3aspath Displays the AS_ PATH attribute of each network advertisement received via BGP 3 bgp3nexthop Displays the NEXT_HOP attribute of each network advertisement received via BGP 3 114088 Rev A Using Technician Interface Software Table 9 1 Aliases for Debugging Network Problems continued If you enter The system bgp3metric Displays the INTER_AS_METRIC attribute of each network advertisement received via BGP 3 cctnames Displays all circuit names ccttypes Displays all circuits and their types The types are as follows 10 CSMACD 20 SYNC 30 T1 40 E1 50 Token 60 FDDI decadjs Displays all DECnet adjacent nodes and their respective adjacency table indexes The following example shows one line in the display where 6145 is the index 2 is the area and 3 is the node wfivAdjEntry wfivAdjNodeAddr 6145 2 3 decadj lt index gt Displays DECnet adjacency information about the index you enter You can obtain the lt index gt by using the decadjs alias decarts Displays all known DECnet areas and the
159. e C 33 Operational State C 31 Severity Mask C 41 Slot Lower Bound C 42 Slot Upper Bound C 43 Trace Map C 46 Warning Map C 45 remote host address C 9 Remote Host Parameters C 33 syslog conf file on UNIX workstation C 13 system command 1 13 T Technician Interface accessing via ASCII terminal 1 2 accessing via Telnet connection 1 2 establishing multiple sessions 2 2 initializing 1 3 logging out 1 12 Site Manager differences between 1 2 telnet command 3 7 connection to router 1 1 114088 Rev A Index 9 Using Technician Interface Software Terminal Interface Program tip B 10 TFTP 4 14 4 15 5 16 tftp command 4 14 5 16 ti cfg file 2 19 4 10 time setting the 8 46 timeout command entry 2 14 login 1 11 password 1 11 2 13 Secure ID 1 11 tip command B 10 Transaction Program 3 24 type command 4 17 5 20 U unalias command 9 7 underflow errors QENET 8 62 unmount command 5 6 user session command access levels 8 78 to 8 81 starting manager session from within 1 13 terminating 1 12 User s Login Script parameter 2 16 user s login script setting 2 16 V verbose command for debugging aliases 9 7 verbose option ping command 3 8 3 11 VINES ping command 3 18 to 3 20 VME routers 4 2 8 46 volume changing the active 4 10 displaying directory on 4 7 displaying the active 4 10 mounting 5 4 unmounting 5 6 W Welcome screen customizi
160. e Manager access password only when you are logged in as Manager Note Passwords as well as Technician Interface commands and filenames are case sensitive 8 48 114088 Rev A System Administration Proceed as follows to assign a password 1 Enter the following to display or assign a password password Manager User The console displays one of the following messages Changing password for User Changing password for Manager Proceed to Step 3 if you are logged in as Manager and you are changing the User password Otherwise enter the old password at the following prompt Old password If there is no old password press the return key Enter the new password after the following prompt New Password The password may have 0 to 16 alphanumeric characters If you want to remove password protection press the return key Repeat Step 3 after the following prompt Retype new password The console displays one of the following messages User password changed Manager password changed If you enter the wrong password the console displays the following message User password not changed The prompt reappears If you do not reply to password prompts within about 30 seconds the system cancels the password command and displays the following messages Input timed out Command aborted The prompt reappears 114088 Rev A 8 49 Using Technician Interface Software Enabling and Disabling Se
161. e are no other entity filters active for that host If you configure and activate a filter for any entity number other than 255 that filter takes precedence over the wildcard filter The wildcard filter transitions to the inactive state The setting of the attribute wifSyslogEntFltrOperState indicates the current operational state of any filter instance you configure for a given host If wfSyslogEntFltrOperState 1 the filter is active if wfSyslogEntFltrOperState 2 the filter is inactive Filtering by Event Number Each event message generated by the router software has a unique message number For a complete list of event message numbers refer to the guide Event Messages for Routers and BNX Platforms You can use event message numbers to specify an entity filter that selects only the types of messages you want a remote host to receive You define a range of event message numbers for a router software entity by specifying e An upper boundary number MIB object wfSyslogFltrLogEvtUppBnd e A lower boundary number MIB object wfSyslogFltrLogEvtLowBnd Syslog considers the upper and lower boundary values as part of the range For example an entity filter for FTP has an Event Number Range with a lower boundary of 5 and an upper boundary of 27 With this filter Syslog forwards to a remote host FTP log messages with event numbers 5 to 27 inclusive C 6 114088 Rev A Using Syslog Messaging to Monitor Router You can spe
162. e checksum to the data in the checksum field of the image The system reports that the image checksum is OK if it matches or BAD if it does not match 8 36 114088 Rev A System Administration e Program execution address space provides information about where the file is located in memory Load Address indicates the memory location Size indicates the size of the file Entry point indicates the location in memory of the first software instruction when the file is loaded into memory This field is 0 if the file is compressed e PROM storage address space Indicates the location in the PROM for the frediag exe and freboot exe software This field is 0 if the file is not stored in a PROM e Input file information contains the following information about the file Platform Key indicates the platform that the file is intended to run on Workspace indicates the software release and software integration numbers Compression indicates whether the file is compressed The executable files are normally compressed Revision indicates the software release Last Modified indicates day date and time of the software release File type indicates that the file is executable Tool name is for Bay Networks use only 114088 Rev A 8 37 Using Technician Interface Software Examples If you enter The system readexe frediag exe Calculates file header and image checksums on the frediag exe fil
163. e enable the entire Syslog entity on the router Refer in this section to Disabling or Re enabling Syslog on the Router Disable or re enable a Syslog host or filter on the router Refer in this section to Disabling or Re enabling Syslog Hosts or Filters Delete remote hosts or entity filters from the current Syslog configuration Refer in this section to Deleting Remote Hosts or Entity Filters from the Syslog Configuration Delete Syslog from the router Refer in this section to Deleting Syslog from the Router Disabling or Re enabling Syslog on the Router You can if necessary disable the Syslog service anytime after enabling it on a router Enter the following command line to disable Syslog set wfSyslog wfSyslogDisable 0 2 commit Disabling Syslog on the router Transitions all Syslog hosts and their filters to an INACTIVE operational state in the router configuration Halts all message forwarding from Syslog to any Syslog hosts configured on the router You can also re enable Syslog after disabling it on a router Enter the following command line to re enable Syslog set wfSyslog wfSyslogDisable 0 1 commit Re enabling Syslog on the router Transitions Syslog hosts and their filters to an ACTIVE operational state in the router configuration Only n Syslog host entries transition to the ACTIVE state where n the value of wfSyslogMaxHosts Resumes all message forwa
164. e following commands to initiate a file transfer from the Technician Interface tftp get lt host_address gt lt remote_vol gt lt remote_file gt lt local_vol gt lt local_file gt tftp put lt host_address gt lt remote_vol gt lt remote_file gt lt local_vol gt lt local_file gt get means you are transferring the file to the local Bay Networks router and put means you are transferring the file to the remote node lt host_address gt is the address of the host for transfers lt remote_vol gt is the volume number containing the volume to which you want to transfer the file lt remote_file gt is the name to which you want to transfer the file If you do not enter a destination name the system defaults to the lt ocal file gt you specified for the source file lt local_vol gt is the volume number containing the volume in the local Bay Networks router lt local_file gt is the name of the file used on the local router 114088 Rev A 4 15 Using Technician Interface Software Caution The local system erases the file if you enter its address in the lt host_address gt field of the tftp command The system executes one TFTP request at a time for the duration of the file transfer The destination system stores the file under the name you specify If you do not enter a destination name the system defaults to the source filename Examples If you enter on one line The local system tftp pu
165. e located on the active volume verifies that the header and image checksums match those within the file and displays the results and all file header information readexe 3 freboot exe Calculates file header and image checksums on the freboot exe file located on Volume 3 verifies that the header and image checksums match those within the file and displays the results and all file header infor mation Upgrading and Verifying a PROM You use the prom command to upgrade or verify the software on a diagnostics or bootstrap PROM in a Bay Networks router or BNX platform Only users who login as Manager can access the prom command Caution If a software release includes a PROM software upgrade see the upgrade documentation shipped with the software for instructions on upgrading the PROMs on your router The instructions describe How to determine the models of router that need a PROM update How to determine whether you must upgrade the PROM s in a specific model of router by using the Technician Interface prom command or by physically replacing the existing PROM device with a new PROM device How the PROM upgrade process works How to determine the current versions of PROM images residing in a router What you need to know about upgrading PROMs in a remote router How to specify the commands necessary to upgrade and verify a PROM If you do not follow these instructions you may disable the router you are trying to upgrade
166. e on an NVFS volume the Syslog additions to your configuration 9 Log out of the Technician Interface session The paragraphs following in this section describe the Syslog configuration sequence in greater detail to the task and step level 114088 Rev A Using Technician Interface Software Following the configuration procedure this appendix provides an example of Syslog configuration plus definitions of Syslog attributes you use during configuration Task 1 Logging In to the Router s Technician Interface For information on how to open a Technician Interface session with a Bay Networks router refer to Chapter 1 Task 2 Defining a Slot Mask for Syslog on the Router Before creating the Syslog entity on the router define a slot mask for Syslog The slot mask identifies the slots on which the system will load and run the Syslog entity At the Technician Interface prompt enter set wfProtocols wfSYSLLoad 0 0x7FFE0000 commit This command enables Syslog to run on all slots regardless of router model Next create the Syslog entity on the router Task 3 Creating Syslog on the Router Create the Syslog entity in the router configuration as follows set wfSyslog wfSyslogDelete 0 1 commit This also enables Syslog on the router The system sets the attribute wfSyslogDisable OID 1 3 6 1 4 1 18 3 3 2 15 1 2 in the Syslog base record to a value of 1 Next configure the Syslog global attributes Task 4 Config
167. e or configuration file With this named boot operation the system uses the image or config file name that you specify instead of the default image or config file Use the following syntax to perform a named boot operation boot lt vol gt lt image_name gt lt vol gt lt config_name gt boot lt vol gt lt vol gt lt config_name gt boot lt vol gt lt image_name gt lt vol gt lt vol gt identifies the volume that contains the lt image_name gt lt image_name gt identifies the filename of the router software image or identifies the default router software image lt vol gt identifies the volume that contains the lt config_name gt lt config_name gt identifies the name of the configuration file or identifies the default configuration file config Note If you enter one argument in the boot command you must enter the other If you want to use the default router software image with a named configuration file you must enter a dash as the image argument Similarly to use a named router software image with the default configuration file you must enter a dash as the configuration argument When the source is network enter only a dash to indicate no volume for the router software image or config If you enter anything else the Technician Interface displays an error message The software image and configuration files revert to their respective default filenames ace out an
168. e same code number For example to forward only log messages that have an event code of 10 enter 10 as the value of wfSyslogEntFltrLogEvtUppBnd and as the value of the wfSyslogEntFltrLogEvtLowBnd Log Event Lower Bound If you do not want to filter by event code accept the upper and lower boundary default values of 0 and 255 In this case Syslog checks for filtering criteria based on a message severity mask wfSyslogEntFltrSevMask If you specify lower and upper boundary values of 255 the wildcard entity number Syslog ignores this attribute as filtering criterion set wfSyslogEntFltrEntry wfSyslogEntFltrLogEvtUppBnd lt host_IP_address gt lt entity_code gt lt filter_index gt lt 0 255 gt 1 3 6 1 4 1 18 3 3 2 15 3 1 8 C 40 114088 Rev A Parameter Attribute Name Attribute Number Default Options Function Instructions Command MIB Object ID Using Syslog Messaging to Monitor Router Severity Mask wfSyslogEntFltrSevMask 9 None w warning i information t trace f fault d debug Use individually such as f or d or combined such as fwitd Identifies the severity levels warning informational trace fault debug of events you want to forward Syslog uses this severity mask as filtering criteria only if you specify the wildcard event number range 0 255 as the values for wfSyslogEntFltrLogEvtLowBnd and wfSyslogEntFltrLogEvtUppBnd Syslog looks only for events that have
169. earchDepth value on this circuit Defines the depth of searching for repetitive patterns in the data you want to send over a specific virtual circuit Whenever you choose a customized value within the range 0 to 255 for wfWcpCircuitSearchDepth you automatically choose not to inherit the wfWcpLineSearchDepth value Compression ratios may improve with settings higher than 3 the value inherited from the wfWcpLineSearchDepth attribute however throughput may actually decrease for settings higher than 12 or 13 The compression engine yields higher compression ratios but takes longer to find token matches for the data being sent over the circuit Bay Networks does not recommend settings higher than 13 Accept the default value to inherit the wfWcpLineSearchDepth value on this circuit or choose a customized value that provides the best trade off between compression ratio and throughput on this circuit Test end to end throughput on this circuit before and after modifying the WCP circuit search depth value set wfWepCircuitEntry wfWepCircuitSearchDepth lt 0 255 256 gt 1 3 6 1 4 1 18 3 4 22 2 1 7 8 58 114088 Rev A System Administration Displaying a Greeting or Notice Before the Login Prompt You can create a greeting notice caution or warning message that displays before the Technician Interface Login prompt To create and initialize this message on the router proceed as follows 1 Create an ASCII file named fi
170. eate a MIB record with system defaults for a console port Set to 2 Delete to delete a MIB record for a console port set wfSerialPortEntry 1 lt port_no gt lt option gt 1 3 6 1 4 1 18 3 3 2 11 1 1 1 Port Disable wfSerialPortDisable 2 1 Enable 1 Enable 2 Disable Enables or disables the console port Select the status of the console port set wfSerialPortEntry 2 lt port_no gt lt option gt 1 3 6 1 4 1 18 3 3 2 11 1 1 2 114088 Rev A 2 5 Using Technician Interface Software Parameter Attribute Name Attribute Number Default Options Function Instructions Command MIB Object ID Parameter Attribute Name Attribute Number Default Options Function Instructions Command MIB Object ID Port State wfSerialPortS tate 3 4 Not present 1 Up 2 Down 3 init 4 Not present Up enabled Down disabled Init initializing for new instances Not present the port does not physically exist Shows the current state of the port You cannot change this parameter get wfSerialPortEntry 3 lt port_no gt 1 3 6 1 4 1 18 3 3 2 11 1 1 3 Port Number wfSerialPortNumber 4 None 1121314 The port number for the information being displayed Not all routers have four physical ports The system places a configured port that doesn t exist into the Not present state You cannot change this parameter get wfSerialPortEntry 4 lt port_no gt 1 3 6 1 4 1 18 3 3 2
171. ed 4 0 0 0 8 ELES ORS ER 3 233362 IGP 8183 BEST USED As Path SEQ 200 5 0 0 0 8 2 2 23 2232 53 IGP 8183 As Path SEQ 300 SLOT 2 Total Nets 2 SLOT 5 Total Nets 7 When you specify the i p or ip_address options for the ip bgp_routes command the resulting display specifies the total number of networks plus the following additional information e Multi exit disc Multiple exit discriminator RFC1771 defines this as an optional nontransitive attribute that is a four octet nonnegative integer A BGP speaker uses the value of this attribute to help discriminate among multiple exits to a neighboring autonomous system AS e Aggregator RFC1771 defines this as an optional transitive attribute of length 6 The attribute contains the last AS number that formed the aggregate route encoded as 2 octets followed by the IP address of the BGP speaker that formed the aggregate route encoded as 4 octets 8 68 114088 Rev A System Administration Example bgp routes Enter the following command to display routes announced to the peer with a local address of 3 3 3 1 and a remote address of 3 3 3 2 ip bgp_routes N p3 3 3 1 3 3 3 2 Network Mask Peer Rem Addr NextHop Address Org Loc Pref 1 0 0 0 8 Sa 3032 343331 IGP As Path SEQ 100 Multi exit disc 1 Aggregator 100 192 32 140 40 2 0 0 0 8 Susie t2 3 36031 IGP 1 As Mul SLOT 5 256 Routes To 3 3 3 1 3 3 3 2 Path SEQ 100
172. ed a password for Manager access Enter the password after the prompt The Technician Interface prompt appears when the system logs you in Enter logout to terminate the Manager session You return to the User session when the Technician Interface prompt reappears Using Technician Interface Scripts The Technician Interface scripts are programs that let you manage the router using information stored in the Management Information Base MIB You can use the scripts to display information about protocols and network services and to enable or disable protocols circuits lines and services You access the Technician Interface scripts using the following commands e show displays system configuration state and statistical information This command helps you isolate problems such as circuits that are not working packets that are not being forwarded and so on e monitor displays the same information as the show command but refreshes the display periodically so you can examine trends and changes e enable disable enables or disables system features protocols drivers or individual circuits e menu provides a menu interface to the other scripts You can also use the menu building features of this script to create custom menus A number of Technician Interface scripts exist as programs embedded within the router software image rather than as individually loadable batch files filename lt entity_name gt bat You run the embedded and bat
173. ed by the local Syslogd software module For Syslogd to properly dispatch router event messages to a file display printer and or another remote host you must edit the contents of the etc syslog conf file Configure Syslogd on your UNIX workstation as follows 1 Log in as superuser as follows su root 2 Open etc syslog conf and examine the lt facility level gt indicators local lt 0 7 gt lt fault warning info trace debug gt 3 Edit etc syslog conf as needed to achieve message handling appropriate for your management workstation requirements 114088 Rev A C 13 Using Technician Interface Software Example Messages dispatched to console display local7 debug local7 info local7 notice local7 err local7 crit local7 alert local7 emerg or dev console dev console dev console dev console dev console dev console dev console local7 debug local7 info local local7 notice local7 err local7 crit local7 alert local7 emerg dev console Messages dispatched to a file local7 info local7 debug local7 warning Messages dispatched to a host local7 notice Messages dispatched to a printer local7 trace var log syslog file dev log debug_file var log warning_file lt host_name gt lt printer_name gt In this example the path specified next to each local facility indicator in the file shows a unique destination for each severity level of router event message
174. ed with the attributes you want and enter the total in the attribute command For example to assign the attributes archive needed hidden and read only to the config file add their associated hex values 0x20 0x02 0x01 0x23 Then enter the following command to assign these file attributes attr 0x23 config You can also assign attributes to a file in another directory by specifying the pathname For example enter the following command to change the file attributes of a file named 6_23 log in the logs path attr 0x23 logs I6_23 log Examples If you enter The system attr 0X01 config Sets the attribute of the file config to read only attr 0X03 config Sets the attributes of the file config to hidden and read only attr 0X23 config Sets the attribute of the file config to hidden read only and archive needed Displaying the Contents of a File Use the type command to display the contents of a file Before displaying a file enter more on to display the file one screen at a time Enter the following to display a file type x lt filename gt X is an optional command to display the file in hexadecimal format This allows files containing nonprintable information to be viewed lt filename gt is the name of the file you are displaying 5 20 114088 Rev A Managing a DOS File System The file is displayed in the same format in which it is stored provided that you do not enter the x argument bina
175. eeeeeeeeeeseeeeeneeeneaees 3 27 vi 114088 Rev A Chapter 4 Managing a NonVolatile File System ENEA e e E E jones cack iaguesdanes E E ieaabjacuesdacunacet 4 2 Weing Muhe Memory GWS ssni en ee a er aaa ada aaa 4 3 Naming Files Rules and Comventiona sirsie ai iE A 4 5 Displaying the Status of All Memory Cards ssiginnuiiininintainodiaiiien ated 4 6 Dispenn a ca eae eee tine ee ee Pr ere a Uren ereter ser tr 4 7 Changing the PAC GING cabs csiciecceddunicacnsiad tonsa ranahineiadananeomediaiaqan iaeiaiaateddaaeeeehdacsianey 4 10 al PAN coc Se vancuceterue citadel viedeeainsasoney aaaddudasaeden yadda einen manana 4 11 Copying Fikes Tom VRS ta DOS arranoari 4 11 Teee A ml meee rree een rere cerre Toit ee Tee ere Crr ree rere marr Terre tener ee 4 13 MEg File Wem S snes aa 4 14 Out of Band File Transfers E AE EEEE E PAET E T TAT 4 17 Displaying the Contents of a FIG cc ccsvsncerctssorsseietanrddenesennvinsiasniaamaineaineas 4 17 DEUDA Ws ca tec ceree raat anced cysts paeaaneaen T EEA TA E AEEA EATA 4 18 COGRVID CIC TINNY FING SPACE erco esi tlia et ieee eel all 4 19 Formatoa Memory oat aiarra a aiian ete nua dauutatarane 4 20 Transferring a File to a Full Memory Card sassen E PEET PA 4 20 Paritonina a Memory Cador SIMM airain 4 21 Chapter 5 Managing a DOS File System OTEN anie E a Qeeuei ences 5 2 Nammo Files and Directorios MacieAtaccd dete EA NAERAN 5 3 Mounting a Volume E T sepeli EAE T piiescides sateen E E 5 4 onnaa
176. eful method for example for router diagnosis and management You use this method most beneficially when You can dial in to the Technician Interface port of a router you choose as the source or destination for a file transfer operation All IP routing paths between the file source and the file destination are down nonoperational You can use either a UNIX or a 386 486 DOS remote workstation to transfer files in band or out of band using Technician Interface xmodem commands as operating conditions within your network allow 114088 Rev A 4 13 Using Technician Interface Software In Band File Transfers The tftp command invokes the Trivial File Transfer Protocol TFTP software to transfer a file between a Bay Networks router and another router or host capable of serving tftp file transfer requests The TFTP software resides within the IP router Consequently you must load TFTP on the router and enable it refer to Quick Starting Routers and BNX Platforms for instructions When you transfer a file to a Bay Networks router unless you specify the target volume the TFTP server of the receiving client router uses the value of the wfTftp 2 0 MIB attribute to determine the target volume For example if you enter tftp put 192 xx x xx 2 config where 192 xx x xx is a valid IP address the file config will be called config on the router at the specified IP address and will go to the volume specified in wifTftp 2 0 The same w
177. en you enter the commit command Using the save Command After you set and commit changes to the current configuration running in active memory on the router use the save command to store that configuration to a file on a Flash memory volume as follows save config lt vol gt lt filename gt Note You can also use the save command to save the current contents of the router s Event log environment variable list or alias list Refer to Chapters 6 7 and 9 for more information on these applications of the save command Console Port Parameters This section describes parameters for configuring the serial console port on the router e Parameter e Attribute name e Attribute number e Bay Networks default setting e Options or range of valid settings e Parameter s function e Instructions for setting the parameter e Command you enter to configure or monitor the parameter 114088 Rev A Configuring the Console Port Note You cannot configure the following console port parameters State Number Name and Slot Parameter Attribute Name Attribute Number Default Options Function Instructions Command MIB Object ID Parameter Attribute Name Attribute Number Default Options Function Instructions Command MIB Object ID Port Delete wfSerialPortDelete 1 1 Create 1 Create 2 Delete Creates or deletes an instance of a console port Set to 1 Create to cr
178. encounter the SecureID login procedure securelogin replies with Securelogin information remains unchanged Are you sure you want to turn off secure ID yes no yes If you entered yes securelogin replies with SecurID no longer required on Telnet login You have completed the procedure and you have not changed any configuration information for the SecureID client software on the router 114088 Rev A 8 51 Using Technician Interface Software Disabling SecurelD Authentication Once the Technician Interface login prompt appears or whatever your network administrator has set up for a prompt proceed as follows to disable SecureID authentication services already enabled and active on the router 1 Run the securelogin configuration utility securelogin 2 Respond to each of the questions that appear in your Telnet or console display Press Return after each entry beginning with Do you wish to secure telnet login yes no yes Entering yes invokes an additional verification Are you sure you want to turn off secure ID yes no yes If you entered yes securelogin replies with SecurID no longer required on Telnet login If you entered no securelogin replies with Secure login information remains unchanged If you entered no and received the reply Secure login information remains unchanged the SecureID client is still enabled on the router Telnet users continue to encounter the SecureID login proce
179. ense whatsoever either explicitly or implicitly except by acceptance of an order for either Software or for a Bay Networks product Equipment that is packaged with Software Each such license is subject to the following restrictions 1 Upon delivery of the Software Bay Networks grants to licensee a personal nontransferable nonexclusive license to use the Software with the Equipment with which or for which it was originally acquired including use at any of licensee s facilities to which the Equipment may be transferred for the useful life of the Equipment unless earlier terminated by default or cancellation Use of the Software shall be limited to such Equipment and to such facility Software which is licensed for use on hardware not offered by Bay Networks is not subject to restricted use on any Equipment however unless otherwise specified on the Documentation each licensed copy of such Software may only be installed on one hardware item at any time Licensee may use the Software with backup Equipment only if the Equipment with which or for which it was acquired is inoperative Licensee may make a single copy of the Software but not firmware for safekeeping archives or backup purposes Licensee may modify Software but not firmware or combine it with other software subject to the provision that those portions of the resulting software which incorporate Software are subject to the restrictions of this license Licensee shal
180. enter logout at the Technician Interface command line prompt in the Wfterm base program window At the conclusion of file transfer operations you can close the connection between the workstation and the router Refer to Closing the Connection 114088 Rev A B 29 Using Technician Interface Software Closing the Connection You can gracefully close the connection between your workstation and a target router after you e Finish transferring downloading or uploading files between the remote router and your workstation e Log off the Technician Interface of the target router To close a connection select the Hangup function in the Wfterm File pull down menu as shown in Figure B 7 When the connection closes the Wfterm Connection Closed window appears as shown in Figure B 11 Wellfleet Communication Terminal Program File Modem Phone File Transfers Help WiTerm Figure B 11 The Wfterm Connection Closed Window At any time you can also close a connection simply by quitting the Wfterm utility Once you close the connection between your workstation and the target router you can quit the Wfterm program as described in the next section B 30 114088 Rev A Using Out of Band Access to Transfer Files Quitting Wfterm You can quit the Wfterm utility after you e Finish transferring files e Log out of the Technician Interface of the target router e Close the connection between your
181. entions for the treatment of filenames by the YMODEM protocol are The source router or the remote workstation sends files with path names stripped and limited to eight characters plus a three character extension The router or workstation converts all filename characters to lower case and all characters to characters The target router or workstation stores received files under their transmitted names However YMODEM converts characters in the received filename back into characters YMODEM also translates all uppercase characters into lowercase and eliminates any trailing dots in the filename If you want to specify multiple filenames in a single xmodem command that is a YMODEM batch file transfer operation insert a space after every filename except for the last name you specify in the command line You can also use wildcards in a filename for example bat For More Information The following book provides additional information about xmodem protocols Forsberg Charles Ed XMODEM YMODEM Protocol Reference Implementation Notes This section provides implementation notes on How xmodem handles files and checks for errors in files How xmodem responds when you cancel a file transfer operation How to manage modem hardware incompatibilities How to view xmodem log events 114088 Rev A B 7 Using Technician Interface Software File Handling The following information applies to configuration files
182. eproduction and disclosure are as set forth in the Commercial Computer Software Restricted Rights clause at FAR 52 227 19 Trademarks of Bay Networks Inc ACE AFN AN BCN BLN BN BNX CN FN FRE GAME LN Optivity PPX SynOptics SynOptics Communications Wellfleet and the Wellfleet logo are registered trademarks and ANH ASN BayeSIS BCNX BLNX EZ Install EZ Internetwork EZ LAN PathMan PhonePlus Quick2Config RouterMan SPEX Bay Networks Bay Networks Press the Bay Networks logo and the SynOptics logo are trademarks of Bay Networks Inc Third Party Trademarks All other trademarks and registered trademarks are the property of their respective owners Statement of Conditions In the interest of improving internal design operational function and or reliability Bay Networks Inc reserves the right to make changes to the products described in this document without notice Bay Networks Inc does not assume any liability that may occur due to the use or application of the product s or circuit layout s described herein Portions of the code in this software product are Copyright 1988 Regents of the University of California All rights reserved Redistribution and use in source and binary forms of such portions are permitted provided that the above copyright notice and this paragraph are duplicated in all such forms and that any documentation advertising materials and other materials related to such distribution and
183. er SeINICe occ cantatas cia ts ate aedeea esate ieee xxviii Bay Networks Information Services ceccsceeeeeeeeeees PAE ET anonn Xxix Word Wide ABE sipna ieachiacterauneveleteuacaienieadeaidoentdaninnaes Xxix RUS ER ete OU F IP oaninoar dad E Aaa Xxix Cl PION QUT OD coe se 5 cctetcead sean asd essen a aad een seme XXX NES RMU VS tessa sachs NE AEN teseeiiens adele XXX MORS TS a a a S xxxi How to Get HE oiai a ERA XXXi Chapter 1 Introducing the Technician Interface Ginerencess Tom ste Marae anieri iaiia 1 2 Running bine teemaan Were caniae na NAE AERA 1 3 BO n a nr REDS a trey later orueeeri te 1 3 Uervinager COT sicrie A AEA 1 3 Eare aE EEEo e I T VE A EA E AET A A AE ET 1 4 LUPINE SO CUIMILY raa edad adeeuoeadlenetatatew ie talaiidicmaadieminisenes 1 4 Technician Interface Welcome Screen cccceccceseeceeesseeeeeseeeeeeeeeeesaeeeeeeeenes 1 10 Login Timeout BOMBINGS arrsa rinnan aa 1 11 Login Gonigutatoh surrainn E T AET rda 1 12 114088 Rev A v NT I sn E E EE 1 12 Starting a Manager Session from within a User Session cccecceeseeeesteeeeeeeeees 1 13 Using Technician lolsrface Str seciono i ia aiia na ices 1 13 Chapter 2 Configuring the Console Port EVO WOW aoira PEE T EAEE PE EE E E R 2 2 Coniiguring Console Port Parameters scsccssiaacacisarcedaaise ctseeucrnniis edn uaa 2 2 Usmo the Smt 2 71 cas lg ete epee Raremene ear Rete Seer hee adena iaa iaa crn nee tnr cree 2 2 Using he ser C
184. er configuration as follows BN 3 set wfRuiBoot wfRuiBootBaseDelete 0 1 commit This also enables delayed boot services on the router The system sets the attribute wfRuiBootBaseDisable OID 1 3 6 1 4 1 18 3 3 2 14 1 1 in the RUIBOOT base record to its default value of 1 or enabled Scheduling Delayed Boot Events You can schedule a delayed boot event on a router as follows 1 Log in to the router s Technician Interface Log in to the Technician Interface of the router you want to configure with a delayed boot event If you need instructions on how to perform a login via local console or remote Telnet session refer to Chapter 1 then resume the procedure for scheduling a delayed boot event 2 Schedule a delayed boot event To schedule a delayed boot event you must first create add an entry in the RUIBOOT table of delayed boot events as follows BN 3 set wfRuiBootTable wfRuiBootDelete lt wfRuiBootDateAndTime gt 1 BN 3 commit Note that the instance ID lt wfRuiBootDateAndTime gt e Specifies when the delayed boot event will occur e Comprises 11 octets each of which contain in decimal notation one element of the date and time you want to specify for the boot event see Figure 8 1 114088 Rev A 8 15 Using Technician Interface Software Octet 1 Octet 2 Octet 4 Octet 5 Octet 3 Octet 6 Octet7 Octet8 Octet9 Octet 10 Octet 11 lt year gt Figure 8 1 lt month gt
185. er in an ASN chassis as a numbered slot Instructions To specify a range of slots set the value of this parameter attribute to the high number in the range Also set the value of wfSyslogEntFltrSlotLowBnd Slot Lower Bound to the low number of the range Any range you specify includes the values for the lower and upper bound parameters attributes For example if you specify a lower bound of 1 and an upper bound of 4 Syslog forwards all event messages logged on Slots 1 through 4 inclusive Syslog ignores all other event messages To filter events for a specific slot set the value of wfSyslogEntFltrSlotLowBnd to the desired slot number Set the value of wfSyslogEntFltrSlotUppBnd to the same number For example to forward only event messages logged on Slot 2 set the value of wfSyslogEntFltrSlotLowBnd and wfSyslogEntFltrSlotUppBnd to 2 If you do not want to filter messages by slot number s accept the lower and upper bound default values of 0 Command set wfSyslogEntFltrEntry wfSyslogEntFltrSlotUppBnd lt host_IP_address gt lt entity_code gt lt filter_index gt lt 0 14 gt MIB Object ID 1 3 6 1 4 1 18 3 3 2 15 3 1 11 114088 Rev A C 43 Using Technician Interface Software Parameter Fault Map Attribute Name wfSyslogEntFltrFaultMap Attribute Number 12 Default 3 CRIT Options 1 EMERG 2 ALERT 3 CRIT 4 ERR 5 WARNING 6 NOTICE 7 INFO 8 DEBUG Function Maps router event mes
186. er the xmodem send binary command as follows xmodem sby lt source_vol gt lt filename gt lt filename gt sb is a send binary file y is the YMODEM file transfer option lt source_vol gt is either a slot number of a memory card or the letter of the disk drive volume that contains the files you want to send to the workstation lt filename gt is the name of the file you want to send from the router to the workstation If you want to enter multiple filenames as part of aYMODEM batch file transfer operation insert a space character between the filenames For more information on Technician Interface filename specifications refer to Chapters 4 and 5 Type c tilde c to escape momentarily from the Technician Interface command line prompt to the UNIX workstation command line prompt The workstation responds Local command Enter an xmodem receive binary command with the print display transfer events and information option flag p set in the command line as follows xmodem rbyp lt ilename gt lt filename gt rb is a receive binary file y is the YMODEM file transfer option p prints displays important information and events pertaining to the file transfer s you are about to initiate lt filename gt lt filename gt The optional filenames you want to assign to files when they reach the workstation Pressing return to execute the xmodem command triggers the necessary handshakes between the YMODEM pro
187. erStatus ifMTU and ifPhysAddress ifAdminStatus and ifOperStatus return UP if at least one interface is up All interfaces must be down before DOWN is returned The ifMTU value returned is the minimum MTU for the circuit group and the ifPhysAddress is the physical address of the first interface in the circuit to initialize A 8 114088 Rev A ifSpecific ipAddrEntry ipRouteEntry Supported Traps Using the Bay Networks Router MIB The object identifier that points to an instance of the first conceptual column in the appropriate proprietary media MIB In certain circumstances the index to this table ip AdEntAddr may not be sufficient to uniquely identify a particular instance In these situations the attribute ipAdEntIfIndex is appended to the instance identifier for subsequent entries with the same index The instance identifier for the MIB II routing table ipRouteDest is insufficient to uniquely identify all possible routes to a given destination The MIB II routing table therefore contains only a representative sample of the total routing table For a more accurate description of the system s IP routes see wflpForward Entry 1 3 6 1 4 1 18 3 5 3 2 1 16 1 which is indexed by destination address destination subnet mask route source policy and next hop address The following generic traps are supported by the software coldStart warmsStart linkUp linkDown Issued when the network management entity
188. erface Software Parameter Attribute Name Attribute Number Default Options Function Instructions Command MIB Object ID Parameter Attribute Name Attribute Number Default Options Function Instructions Command MIB Object ID Stop Bits wfSerialPortStopBits 11 1 1 1 1 12 1 5 13 2 Specifies the number of bits that follow each ASCII character received or transmitted by the router Selecting option 2 1 5 stop bits for any AN ANH series router defaults to option 3 2 stop bits Set according to your console requirements set wfSerialPortEntry 11 lt port_no gt lt option gt 1 3 6 1 4 1 18 3 3 2 11 1 1 11 Modem Enable wfSerialPortModemEnable 12 2 Disable 1 Enable 2 Disable Specifies whether the terminal connects directly or via a modem to the Technician Interface Use the 1 Enable setting to configure the terminal for connection via a modem to the Technician Interface Use the 2 Disable setting to configure the terminal for connection directly to the Technician Interface set wfSerialPortEntry 12 lt port_no gt lt option gt 1 3 6 1 4 1 18 3 3 2 11 1 1 12 2 10 114088 Rev A Parameter Attribute Name Attribute Number Default Range Function Instructions Command MIB Object ID Parameter Attribute Name Attribute Number Default Options Function Instructions Command MIB Object ID Configuring the Console Port L
189. esents the syntax of the xmodem command xmodem sb st rb rt lt y m k c w p e n gt lt voldir gt lt filename gt lt filename gt Command ee OOR Subcommands Options Source Volume Files to send and Source Directory or Files to receive or Files to receive as Note You can enter the xmodem command line parameters and option flag characters in upper or lower case Do not insert spaces between parameter characters between option flag characters or between a parameter and an option flag character Do insert a space character after the last option flag and between filenames for YMODEM batch file transfers For out of band file transfer operations use only the xmodem command parameters and options that are appropriate for e The YMODEM protocol e The type of file you need to transfer The relevant xmodem command parameters are sb send binary and rb receive binary The relevant option flags are y ymodem I logging w wait before initiating transfer p print display xmodem information and events n allow midtransfer cancel and e disable EOT verification DOS only The y and w option flags are required in the xmodem commands to select YMODEM and for proper handshaking with the YMODEM protocol program running on the remote workstation You should use the p option to monitor the progress of any out of band file transfer in progress UNIX only You can enable or disable logging of xmodem
190. ete 0 2 commit 114088 Rev A 8 21 Using Technician Interface Software Restarting a Slot The restart command allows you to restart the GAME image currently in use on a specified slot or slots Restarting a slot does not reboot with a new router software image You restart a slot or slots by entering the slot number or numbers after the restart command If you do not enter a slot number when issuing the restart command all slots are restarted Enter the following to restart the entire system restart Enter the restart command with one of the following parameters to restart a processor module or modules lt slot_no gt is the number of the slot where the processor module is located restart lt s ot_no gt restart lt s ot_no gt lt slot_no gt restart lt s ot_no gt lt slot_no gt Examples If you enter The system restarts restart The entire system restart 1 Slot 1 restart 1 5 Slots 1 2 3 4 and 5 restart 4 6 Slots 4 and 6 8 22 114088 Rev A System Administration Restarting After Crossnet Shutdown Notification BNX Only On BNX platforms only you can use the shutdown option of the restart command to restart the GAME image on one or more slots following a graceful crossnet shutdown on the same slots With this option the system notifies the remote end of any associated Frame Relay Switch frsw PVCs to expect a loss of connectivity The BNX sends to the remote end of ea
191. euanceeeens 8 9 NG NNT ET A EE ATT E rae eae nach ate Bai A Aces an asec adnan ead shown TA 8 10 Using the PCMCIA Floppy SIWNCN usciranno iia 8 12 Booting after Crossnet Shutdown Notification BNX Only 8 13 Configuring Delayed Boot Services 006 ET P E T seventies 8 14 Adding Delayed Boot Services to a Router ceccccecccteeeeeeeseteeeeeeeseeeeeessseeeeeees 8 14 Scheduling Delayed Boot Eves sciiccicacedes niet sinitcandnisareadbceonsntarsiweraneue 8 15 Managing Delayed Boor Servicos ainmide a 8 20 Disabling or Re enabling Delayed Boot Services on a Router sessen 8 20 Disabling or Re enabling a Delayed Boot Event ccccceeeeeeeeeeeeeeetteeeeeees 8 20 Modifying Attributes for Scheduled Delayed Boot Events ccssceceeeee 8 21 Deleting Delayed Boot Events sssisssersisssiisreirssniorserdsadini iannis 8 21 Deleting Delayed Boot Services from the Router ccccceeeseteeeeeeetteeeeeeeees 8 21 Reskrim a SOl onae S errs errr rr ere Teer 8 22 Restarting After Crossnet Shutdown Notification BNX Only s 8 23 Resetting a System or Slot E agus sd dees E nada P ET TNS 8 24 Resetting After Crossnet Shutdown Notification BNX Only nesses 8 28 R nno CSUN iynin aaa a aaa A a aED AE ATA 8 29 Tumia oi the DIAG Mdicator LED priii EE 8 32 Dispaymno he Sate VERSION seriiriioriint snika OANA NNR 8 32 Halting Packet Transfer between Slots csceeeeeeeeeees E PA 8 33 MEPIS and Upgrading S
192. events by means of the I flag or cancel a particular file transfer by entering control x B 4 114088 Rev A Command Parameters Using Out of Band Access to Transfer Files When you enter an xmodem command at the Technician Interface command line prompt follow the entry with only one of the following parameters Parameter Name sb Send Binary st Send Text rb Receive Binary rt Receive Text Command Options Meaning or Action Sends files as they exist on disk or in Flash memory without conversion Sends ASCII text files Places files on disk or in Flash memory without conversion YMODEM silently destroys existing files of the same name Receives ASCII text files After you enter the xmodem command parameter that is appropriate for the operation you need to perform sb rb enter e They option flag for any send binary or send receive operation e The w option flag for any send binary operation e The p option flag for any xmodem command you use to set the UNIX workstation in either send binary or receive binary mode e Thee option flag for any xmodem command you use to transfer files to the router using the Windows Terminal program The xmodem option flags relevant to the use of the YMODEM single or batch file transfer protocol have the meanings shown in Table B 1 114088 Rev A B 5 Using Technician Interface Software Table B 1 Xmodem Option Flags Option Flag Meaning or Action
193. ever an alias executes Examples Table 9 1 Aliases for Debugging Network Problems If you enter The system at_intf lt circuit gt 1 2 Enables or disables a circuit Valid values are 1 Enable circuit 2 Disable circuit at_if lt circuit_no gt Retrieves configuration information and statistics for the selected circuit at_addr Lists the AppleTalk addresses for the AppleTalk interfaces on the router at_cfg Displays the configured network start network end and default zone for all AppleTalk interfaces 9 10 114088 Rev A Managing Aliases Table 9 1 Aliases for Debugging Network Problems continued If you enter The system at_cur Displays the current network start network end and default zone for all AppleTalk interfaces at_it Displays the status of all AppleTalk interfaces at_rt Displays the entries in the routing table including the node and network IDs of the next hops in the network the number of hops and the status of the network at_zones Lists the zones in the router s zone table at_arp Lists the AARP entries in the router s address mapping table bgpenabled Displays the state of all configured BGP connections Valid values are 1 Enabled 2 Disabled bgppeers Displays the BGP IDs for the connections that are established of all BGP peers bgppeerstate Displays the administrative state of all configured BGP connections Valid values ar
194. ext gt Figure 5 2 shows a sample response to the dir command The screen shows an entry for each file on the volume Each entry consists of a filename size modification date weekday time and attributes 5 8 114088 Rev A Managing a DOS File System a dir a File Name ACE OUT TI CFG CONFIG TOMACIP TOMAC CFG AURP CFG G Performing mount check Volume in drive A is Directory of A 0 01 01 92 0 01 01 92 1302081 01 04 95 184 09 13 94 184 06 15 94 1760 06 16 94 3544 08 16 94 4264 10 04 94 1474560 bytes Total size 143872 bytes Available free space Attributes gt Figure 5 2 Examples If you enter dir dir cfg dir log Sample DOS Directory Listing The system Displays the list of files in the present working directory Displays the list of files with a cfg extension in the present working directory Displays the list of files with a three character filename and a log extension in the present working directory 114088 Rev A 5 9 Using Technician Interface Software The factory default filenames are as follows ace out ajn exe bn exe afnboot exe config debug al frediag exe freboot exe The router software image for the FN LN CN and ALN You cannot read or change this file The system automatically refers to this binary file for booting instructions unless you use the boot command to specify a different
195. fg Gets a copy of config2 cfg from the remote node at the IP address 192 32 1 62 After transferring the file you can rename or copy it at the source to its original name If the new file at the destination is a configuration file or an executable file verify its integrity by booting with it If the system boots and loads the configuration without problems you can rename or copy the filename at the destination to its original name You can also load a file onto the router by specifying the router host name and volume using the following command tftp put lt remote_file gt lt host_name gt lt local_vol gt lt local_file gt This method is useful if the wfTftp 2 0 attribute for the default volume was not set during the Quick Start procedure Example If you enter The local system tftp dark Transfers a copy of the install bat file to put install bat dark 2 install bat Volume 2 on the router known as dark Out of Band File Transfers Appendix B in this guide describes how to transfer files out of band using facilities outside the IP network using the xmodem command 5 18 114088 Rev A Managing a DOS File System Changing File Attributes The attr command changes the DOS file attributes These attributes are displayed when you enter the dir command You cannot delete or rename a file whose attributes are s for system or h for hidden This section describes how to reassign attributes to such files so that you
196. following syntax ip cache ospf_Isdb lt A a gt s t A invokes the complete OSPF LSDB for all OSPF areas known to the router 20 lines maximum per advertisement a is the address of the OSPF area associated with the LSDB you want to view s is the slot number associated with the LSDB you want to view t is the OSPF LS Type indicator stub router network summary link or external Determining Circuit Numbers Whenever you create a new circuit via the Technician Interface or the Configuration Manager tool the router operating system software GAME maps the circuit name you assign such as E21 to a circuit number such as 4 in the router s active MIB When you use the Technician Interface ip command to display data pertaining only to a specific circuit on a router you must enter the circuit number after the c option flag for that command Example The following ip command displays all IP routes accessible via circuit 4 on the router The command shows the contents of the cache for an unnumbered IP interface on circuit 4 ip cache 0 0 0 0 c4 8 76 114088 Rev A System Administration You can determine the circuit number from the router s active MIB by using the Technician Interface get command in a variety of ways Example The following command retrieves the circuit number attribute 6 for every entry in the FDDI Line_ Table g wfFddiEniry 6 wfFddiEntry wfFDDICct 5 1
197. fore You Begin Before using this guide to run Technician Interface commands on a router or BNX platform you must e Install the router or BNX platform e Use one of the following methods to establish a connection to the router or BNX platform Connect the serial port of an ASCII terminal device for example a DEC VT100 directly to the console port of the router or BNX platform Connect the serial port of a workstation or PC directly to the console port of the router or BNX platform Run ASCII terminal emulation software on the workstation or PC Dial in to the console port of the router or BNX platform from a workstation or PC running ASCII terminal emulation software This alternative requires one modem locally attached to your workstation or PC and another modem locally attached to the console port of the router or BNX platform you want to access Establish a Telnet in band connection to the router or BNX platform Note Before you can access the Technician Interface using Telnet the router or BNX platform must have at least one assigned IP address Although there is no limit to the number of Telnet connections that you can make to the Technician Interface we recommend that you establish no more than one Telnet session per router or BNX platform XX 114088 Rev A Conventions angle brackets lt gt bold text brackets ellipsis points italic text quotation marks
198. from the router 2 Enter a tip command on the workstation to open a dial connection between the workstation and the desired router For example tip modem0 modem0 designates the workstation port that accommodates the dial modem attached to the workstation The system displays the following message Connected B 10 114088 Rev A Using Out of Band Access to Transfer Files 3 Press return to invoke the Technician Interface login prompt from the target router The system displays the following prompt Login 4 Enter Manager and a password if necessary to log in to the router s Technician Interface The system displays the following message and prompt Welcome to the lt node type gt Technician Interface 5 Enter a cd command to designate the disk volume or memory card volume that contains the files you want to transfer to your UNIX workstation For example cd a designates diskette Volume a or cd 2 designates a memory card volume in router Slot 2 6 Enter a dir command if necessary to view the list of files in the volume memory card The system displays a screen similar to the following table File Name Size Date Day Time abc cfg 1814 10 28 94 Thurs 10 29 06 def cfg 2293 11 03 94 Wed 17 16 29 ghi cfg 4197 11 15 94 Mon 08 34 04 7 Determine which files you need to transfer from the router to the workstation 114088 Rev A B 11 Using Technician Interface Software 10 Ent
199. g Technician Interface Software gt stamp Command 3 Image beta 9 00 1 Created Tue Jun 6 13 08 17 EDT 1995 gt history Displays the history list 1 dinfo 2 dir 2 3 stamp gt history 2 Repeats the second command currently in the history list dir 2 Volume in drive 2 is Directory of 2 File Name Size Date Day Time bn exe 3271441 06 12 95 Mon 2 35 07 debug al 12568 06 12 95 Mon 238257 install bat 152524 06 12 95 Mon 2 39 00 ti cfg 128 06 12 95 Mon 2 39 08 mk_foo cfg 4516 06 14 95 Wed 2 18 39 config 2044 06 18 95 Sun 254235 syslog cfg 2628 06 18 95 Sun 2 58 09 osi cfg 3048 07 19 95 Wed 2 55 40 3 6 114088 Rev A Using Operating Commands Loading a Command into Memory Use the exec command to load or unload dynamically loadable Technician Interface commands to and from memory Currently you can load only the telnet command into memory The exec telnet command is useful when booting a Bay Networks router over a network using BOOTP Using exec telnet locks the telnet command into memory in case the connection to the BOOTP server fails Enter the following to load a command into memory or unload a command from memory exec load unload lt command_name gt Once you load a command into memory it remains there until you issue an exec unload command or until you restart the Technician Interface Pinging a Remote Device Use the ping command to test the reachabil
200. ges to the modem interface settings then proceed to the next section Initializing the Local Modem Initializing the Local Modem Before attempting to open a dial connection between your workstation and a remote target router you need to initialize and wake up the modem locally attached to the PC You initialize the modem by selecting the Connect option of the Wfterm Modem pull down menu You verify that the local modem has initialized successfully when you observe and respond to the message window shown in Figure B 6 d Modem Initialized Figure B 6 Verifying Successful Modem Initialization Use the cursor to press the OK button The following message appears below the Modem Initialized window 114088 Rev A B 21 Using Technician Interface Software ATSO 0 OK With the local modem online and initialized you can access and use the telephone call functions supported by the Wfterm utility as described in the next section Using Wfterm Telephone Call Functions Using Wfterm Telephone Call Functions You can access two telephone call functions from the Phone pull down menu of the Wfterm base program window as shown in Figure B 7 Wellfleet Communication Terminal Program File Modem aituitag File Transfers Help Dial Phone Ctrl D Hangup Ctrl H Figure B 7 Accessing Wfterm Telephone Call Functions Dialing a Remote Router To dial and connect to the Technician Interface port of a
201. gging with Predefined AliaS s scscconiacniiininnia e 9 10 Appendix A Using the Bay Networks Router MIB OR aoe ar aa a a a aaa A 2 X 114088 Rev A Bay Networke Rouvier MIB FiOS seasons a A 7 LONNIE EAS wih SISOS AON S aiieieo anaia AE ANENA EAE A 7 mpemenianan NOES sicaire a A 8 MBOR se E IUE eiit A 8 Supported Taps ciccdscstassscenensczes garag EA E PET ET E A 9 Lmsupborted OPRAO NE scnasena AE Eiaa A 10 Lie AAS ANODE cscs est autee ica casaeiedatada re ara AA aaa dE A 10 Appendix B Using Out of Band Access to Transfer Files LS Ph ops 14 MOE CTRECTEEPIE CT TCPTETPE TE ETTTCEC TECETPETCLTER TEE ETT ee TTTTTOTTCrT ae Ce VPrevre ETT Tree TT rrr tree B 1 ABOUT RIMBOSNY arenitos veah EE ET yenas PRT Avena enai undi B 2 The AVION C Oma sirain a AA B 4 Carmena PIE TETS ainiai adyenda D debita danai aeai B 5 AORTA ENG OPIO riain Sind eis sma sel ugantteee aie ee aoenenidaane B 5 PUB RANG oa B 7 ot More INGIMAION sen aaNet B 7 TETAS INPUT ATION OTE ssrin aa Ai B 7 PS PANIES arinaa EEN B 8 Eror EVO UMASS saine aaa B 8 Canceling a Fik TANSIET aeectarecs cent atigee nua dsiNQin aadealalorpaenegracclanns B 8 Modem Interiace DIfSrenees sicris sees cece catag sade aiani ainaani ances B 8 Viewing xmodem Log Events EERE EE E A T peneda B 9 PUA Aiea Connora suorine a E SANES B 9 Out of Band File Transfers from a UNIX Workstation seesseessseeesseessesssrsssrresrnresrnnes B 10 Openinga CONMOCHOR sasecdadrneoin ia a aE B 10
202. gure the log autosave feature based on descriptions of wfSerialPortEntry attributes wfSerialPortaAutoSaveNumFiles and wfSerialPortAutoSave Volume e Log autosave platform differences see previous section 2 Open a Technician Interface session with the router 3 Enter with appropriate arguments the command shown for each attribute followed by a commit command 4 Close the Technician Interface session when you finish configuring the log autosave feature Repeat this procedure for any Bay Networks router on which you need to enable the log autosave feature For more explanation of the Technician Interface set and commit commands refer to Using the Set Command and Using the Commit Command in Chapter 2 6 12 114088 Rev A Managing Events Displaying an Events Log File Previously Saved You can use the log command to display a log file you previously saved Enter the following to display a log file where lt vol gt identifies the volume and lt log_file gt is the name of the log file you want to display log lt vol gt lt log_file gt The system reads the log file which is stored in binary and forwards an ASCII representation to the console The event format is identical to the format of the current log display You can use the same optional arguments when displaying a log file as you can to display or save the current log Enter the following command to limit the event types to display log
203. he Th m displ subcommand e System displays routes The routing table you select by specifying appropriate command flags RIP and EGP routes refresh only on slots that receive route updates Route ages may be different on each slot for this reason bgp_routes The BGP routing table you select by specifying appropriate command flags Lists routes announced to various configured BGP peers cache The routing cache you select by specifying appropriate command flags The cache subcommand requires an interface address For unnumbered interfaces use 0 0 0 0 with the circuit option ospf_Isdb The contents of the ospf_Isdb you select by specifying appropriate command flags lt flags gt lt IP_address gt lt P_address prefix gt a lt area_address gt A c lt circuit_no gt i lt BGP_router_ID gt M N p lt ocal_peer_adaress remote peer address gt S lt source_address gt s lt slot_number gt t lt type_number gt The lt flags gt apply to subcommands as follows 8 64 114088 Rev A System Administration gees Applicable Flag Filtering Effect Subcommand s lt address gt Retrieves data for IP addresses that match your address routes bgp_routes entry in dotted decimal notation cache ospf_Isdb lt address prefix gt Retrieves data for IP addresses with an address mask routes bgp_routes that matches your entry Specify an IP address in dotted decimal notation Specif
204. he maximum number of times you specify or until the memory card or diskette drive on the router becomes full Accept the default value 0 disabled or specify the number of times you want to save the log to a new file set wfSerialPortEntry 33 lt instance_no gt lt option gt 1 3 6 1 4 1 18 3 3 2 11 1 1 33 6 10 114088 Rev A Managing Events Parameter Autosave Volume Attribute Name wfSerialPortAutoSave Volume Attribute Name 34 Default None Options Any valid memory card volume slot number from 1 to 14 or the diskette drive designation a Function Specifies the target volume where the system stores new log files saved through the log autosave feature Instructions Specify the memory card or diskette file system volume where the system will save log files automatically through the log autosave feature Command set wfSerialPortEntry 34 lt instance_no gt lt option gt MIB Object ID 1 3 6 1 4 1 18 3 3 2 11 1 1 34 Log Autosave Platform Differences This section describes platform specific differences you need to consider before attempting to configure the log autosave feature on any Bay Networks router Models AFN ALN AN ANH BLN BLN 2 BCN and BNX Each model supports only one instance of the wfSerialPortEntry object For that instance you can configure the log autosave attributes wfSerialPortAutoSaveNumFiles and wfSerialPortAutoSave Volume Models CN FN and LN Each model supports
205. her or to the same directory cd Changes the present working directory delete Y Deletes a file dir Y Displays all files in a directory label Changes the internal label of the diskette mkdir Creates a directory mount Makes the diskette drive available rename Y Renames file and directories rmdir Removes a directory save Saves the current software configuration aliases or events to a file Refer to Chapter 6 7 or 9 for instructions on the save command tftp Transfers a file to or from the router type Y Displays the contents of a file in ASCII or hexadecimal format unmount Makes the diskette drive unavailable The sections that follow describe the commands in detail They also show how to use the wildcards Naming Files and Directories The rules for naming files and directories are as follows e Filenames and directory names must start with an alphabetical character The remaining characters must be alphanumeric and may also include the underscore _ character Spaces are not allowed e DOS directory names and filenames can consist of one to eight characters 114088 Rev A Using Technician Interface Software e You can specify a directory or filename in upper or lowercase letters however in directory listings and other displays DOS shows all directory and filenames in upper case e File extensions are optional and must be preceded by a dot They can be from one to three characters Also
206. ial startup ti cfg A configuration file containing the MIB variables associated with the default Technician Interface console operating parameters This file contains the minimal configuration necessary to operate the router This file is stored in binary format Table 5 2 identifies the DOS file attributes that can appear in a DOS directory display and their meanings Refer to Changing File Attributes later in this chapter for more information about file attributes Table 5 2 DOS File Attributes Attribute Flag Meaning a Archive needed d Subdirectory v Volume ID s System file h Hidden Read only file Labeling a Diskette Use the label command to change or display a diskette s internal label Enter the following to display the internal label label Enter the following to change the internal label where lt diskette_name gt is the new label label lt diskette_name gt 114088 Rev A 5 11 Using Technician Interface Software The name you enter may be from one to 11 characters You can use letters numbers symbols or spaces But you cannot enter the following characters A a eae Ore Examples If you enter The system label Displays the internal label of the diskette label disk1 Writes the internal label disk1 to the diskette Creating a Directory Use the mkdir command to create a new directory Enter the following to create a new directory where
207. ias and inserts it in both parameter positions indicated by 1 as shown in the next example Invokes the copy command associated with the alias backup inserts the config value in the parameter positions indicated by 1 in the lt alias_value gt and copies the config file from Slot 2 to Slot 3 9 4 114088 Rev A Managing Aliases Inserting Character Strings in an Alias The echo command prints one or more strings of characters to the Technician Interface console When the Technician Interface receives the echo request it sends the accompanying string or strings back to the console This command is used primarily to accompany system responses to alias commands with meaningful text This section describes how to issue an echo command and how to insert the echo command in an alias Enter the following command with one or more of the following parameters to submit an echo request echo lt siring gt lt string gt is any string of characters echo lt string gt l lt string gt Double quotes are required only when the string contains one or more spaces or semicolons Examples If you enter The console displays echo hi hi echo IP Input Statistics IP Input Statistics echo Hi hello How are you Hi hello How are you To command the system to display a string of characters when responding to an alias command you insert an echo command within the lt alias_value gt S
208. ication Manage Secure Mode Configure search depth for hardware compression Display a greeting or message before the login prompt Customize the Technician Interface Welcome message Record console messages to a file Enable Internal Clocking Mode Respond to QENET Underflow Errors Monitor IP routes for IP OSPF BGP A table of all the Technician Interface commands and their associated access levels appears at the end of this chapter Table 8 4 AN ANH ASN Administration The following sections apply to the Access Node AN Access Node Hub ANH and Access Stack Node ASN routers The following guides collectively provide complete instructions for setting up Netboot and Directed Netboot on an AN ANH or ASN router Installing and Operating BayStack AN and ANH Systems Installing and Maintaining ASN Routers and BNX Platforms Connecting BayStack AN and ANH Systems to a Network Connecting ASN Routers and BNX Platforms to a Network You need to use the ifconfig and bconfig commands to configure the AN ANH and ASN Use the ifconfig command to configure the router s initial IP interface to the network Use the bconfig command to specify the location and name of the router s software image and configuration file 8 2 114088 Rev A System Administration Configuring the Boot Source To use Directed Netboot you must use the bconfig command to specify the following e The IP address of the server where the router s
209. ices by also defining at least one remote host entry in the Syslog table list of hosts and at least one entity filter for the remote host you define Set to 2 Disable if you want to disable Syslog services on the router set wfSyslog wfSyslogDisable 0 lt 1 2 gt 1 3 6 1 4 1 18 3 3 2 15 1 2 C 30 114088 Rev A Parameter Attribute Name Attribute Number Default Options Function Instructions Command MIB Object ID Using Syslog Messaging to Monitor Router Syslog Operational State wfSyslogOperState 3 1 active 1 active 2 inactive Indicates the operational state of the Syslog service on the router If the state is active syslog has been enabled and is filtering and forwarding messages to designated hosts If the state is inactive Syslog is not filtering or forwarding messages for any of the following reasons Syslog has been disabled wfSyslogDisable 2 No entries exist in the Syslog host table Noentries in the Syslog host table have been enabled Noentries enabled in the Syslog host table have any filters that have been enabled Examine the value of this attribute to determine the operational state of Syslog services on the router get wiSyslog wfSyslogOperState 1 3 6 1 4 1 18 3 3 2 15 1 3 114088 Rev A C 31 Using Technician Interface Software Parameter Attribute Name Attribute Number Default Range Function Instructions Command MI
210. ifferences between the Technician Interface and Site Manager e How to log in and out of the Technician Interface e Technician Interface scripts brief overview 114088 Rev A 1 1 Using Technician Interface Software Differences from Site Manager The Technician Interface running on the router and the Site Manager application running on a PC or UNIX workstation both manage the router software The Technician Interface differs from Site Manager as follows e The Technician Interface resides in the router s operating system kernel and automatically loads when you boot the router You do not need to install the Technician Interface software from a separate medium first all you need is an ASCII terminal or Telnet connection to the router Site Manager however resides on a workstation and runs independently of router software e You establish a Technician Interface session through the router s console port using a local ASCII terminal or dialup connection You establish a Site Manager session independently and establish a connection in band over the network e The Technician Interface scripts let you display information about various protocols and network services and enable or disable protocols circuits lines and services e The Technician Interface is a command line interface it assumes that you are a network manager who knows the Technician Interface command syntax the MIB and SNMP The Technician Interface does provide
211. ignated slot 114088 Rev A 8 31 Using Technician Interface Software When you issue the Technician Interface diags command to test and reboot a specific module the test and reboot process may take anywhere from 2 1 2 minutes to 10 minutes to complete depending on the memory configuration of the board For example when you issue the diags command for a FRE 2 processor module with 8 MB of DRAM the process takes approximately 3 minutes to complete When you issue the diags command for a FRE 2 processor module with 32 MB of DRAM the process takes approximately 10 minutes to complete Turning off the DIAG Indicator LED The DIAG LED lights during diagnostics and goes out after diagnostics have determined that the processor module and its associated link module are functional If they are not functional the DIAG LED on the front panel and LED 8 on the FRE processor module daughterboard remain on If this occurs make sure the modules are seated properly in the router and issue the diags command again Call your Bay Networks Technical Response Center if the DIAG LED does not go out If you hot swap a Link Module the diagnostics do not automatically run and the Fail LED on that module may remain ON In this case you can enter the following command to switch off the Fail LED diag l lt s ot_number gt If you do not specify a slot number the command switches off the Fail LED on all slots Displaying the Software Version
212. ile source and the file destination are down nonoperational You can use either a UNIX or a 386 486 DOS remote workstation to transfer files in band or out of band using Technician Interface xmodem commands as operating conditions within your network allow In Band File Transfers The tftp command invokes the TFTP software to transfer a file between a Bay Networks router and another router or host capable of serving tftp file transfer requests The TFTP software resides within the IP router Consequently you must load the TFTP software on the router and enable it refer to Quick Starting Routers and BNX Platforms for instructions Also when you transfer a file to a Bay Networks router the TFTP driver of the receiving client router uses the value of the wifTftp 2 0 MIB attribute to determine the target volume This attribute is set during the Quick Start procedure using the debug al alias setvol 65 to target the DOS volume 5 16 114088 Rev A Managing a DOS File System Caution The destination system in a file transfer automatically overwrites any file already on its volume that has the same filename If enough space does not exist on the file system for the new file and the new file has the same name as an old file the old file will be destroyed and the new file will be corrupted This is because TFTP copies the new file over the old and runs out of space before completing the copy Be sure to follow the instructions in
213. ill happen if you enter tftp put 192 xx x xx 2 config new_config except that the file will be called new_config However if you enter tftp put 192 xx x xx 2 config 3 test_config the file config will now be called test_config and reside on Volume 3 overriding whatever is in wfTftp 2 0 The wfTftp 2 0 attribute is set during the Quick Start procedure using the debug al alias setvol lt slot no gt to target an NVFS volume or setvol 65 to target a DOS volume 4 14 114088 Rev A Managing a NonVolatile File System Caution The destination system in a file transfer automatically overwrites any file already on its volume that has the same filename If enough space does not exist on the file system for the new file and the new file has the same name as an old file the old file will be destroyed and the new file will be corrupted This is because TFTP copies the new file over the old and runs out of space before completing the copy Be sure to follow the instructions in this section to avoid corrupting the config file If the destination system has a memory card to which you are transferring a file we recommend that you compact it first to optimize the space available for the file Refer to Compacting File Space later in this chapter for instructions We recommend that you first copy the file at the source to a new temporary filename if the name is the same as an existing filename at the destination Enter th
214. imeout gt allowed A sample message follows VINES ping 2705682 8003 does not respond A lt target address gt is unreachable message This message appears if the local Bay Networks router cannot find the specified address in its routing table A sample message follows VINES ping 2705682 8003 is unreachable An invalid parameter specified message This message appears if you specify an invalid parameter when you issue a ping vines command A sample message follows VINES ping invalid parameter specified A resource error message This message appears if the local Bay Networks router cannot allocate a buffer for the request because none is available A sample message follows VINES ping resource error A VINES service is not running message This message appears if the VINES service is not enabled on the router A sample message follows VINES ping VINES service is not running 114088 Rev A 3 19 Using Technician Interface Software Examples If you enter ping vines 2705682 8003 ping vines 2705682 8003 p ping vines 2705682 8003 t3 r8 The system Pings the device at the VINES address 2705682 8003 and waits up to 5 seconds default for a response The console displays one of the fol lowing messages VINES ping 2705682 8003 is alive VINES ping 2705682 8003 does not respond VINES ping 2705682 8003 is unreachable All of the above but displays the intervening hop add
215. in privileges The network administrator must first enable the feature on the router We recommend SecurID authentication for routers that require the highest level of protection from unauthorized Telnet access to the Technician Interface To support Technician Interface login via SecurID you must have a Security Dynamics SecurID ACE server system installed on your IP network Routers with the SecurID ACE client enabled communicate with the SecurID server during each user authentication sequence For more information about SecurID server systems contact your Bay Networks sales representative SecurlD Login and PIN Assignment Dialog This section describes more fully the interface dialog you may encounter when attempting a login to a router configured with SecurID client software Normally you can open a Technician Interface session as long as you enter a valid PASSCODE your PIN followed by the current card code If you do not have a valid SecurID PIN when you attempt the login you may receive another series of prompts for automated PIN assignment Note The SecurID administrator for your network must first configure the SecurID system to allow you to receive a PIN through the SecurID client software on the router 1 6 114088 Rev A Introducing the Technician Interface Figure 1 1 shows the complete authentication procedure and interface dialog you may encounter when attempting a login to a router configured with Secur
216. in upper case For example if you enter copy a b exe 2 the system copies all files that begin with the letter b and end with the file extension exe to NVFS in the format BXXXXXXX EXE where XXXXXXX represents the missing characters in the filename Transferring a File Depending on conditions existing within your network you can use either of two methods of performing file transfers to and from Bay Networks routers and remote workstations The methods are e In band using Technician Interface tftp commands and a route through your high speed IP network e Out of band using Technician Interface xmodem commands and a route through a lower speed dial network 114088 Rev A 5 15 Using Technician Interface Software You can transfer a file in band whenever e You can dial in to the Technician Interface port of a router you choose as the source or destination for a file transfer operation e An operational IP routing path exists through your network between the file source a router or a remote workstation and the file destination also a router or a remote workstation Out of band file transfers are typically a less efficient but sometimes useful method for example for router diagnosis and management You use this method most beneficially when e You can dial in to the Technician Interface port of a router you choose as the source or destination for a file transfer operation e All IP routing paths between the f
217. ine to re enable a delayed boot event anytime after disabling it in the router configuration BN 3 set wfRuiBootEntry wfRuiBootDisable lt wfRuiBootDateAndTime gt 1 commit 8 20 114088 Rev A System Administration Modifying Attributes for Scheduled Delayed Boot Events You can modify e The name of the router software image file e The name of the router configuration file You cannot directly modify the date time or UTC offset attribute wfRuiBootDateAndTime for a scheduled boot event If you need to change any of these for an existing entry in the RUIBOOT table of delayed boot events proceed as follows e Delete the entry from the RUIBOOT table of delayed boot events e Create a replacement entry Deleting Delayed Boot Events Delete a delayed boot event as follows BN 3 set wfRuiBootEntry wfRuiBootDelete lt wfRuiBootDateAndTime gt 2 commit You can save your change s to the current configuration file as follows BN 3 save config lt vol gt lt filename gt lt vol gt is the NVFS Flash volume on which you want to store a copy of the current modified configuration file on the router lt filename gt is the name you assign to the router s current configuration file Deleting Delayed Boot Services from the Router If you want to delete delayed boot services from the router change the setting for wfRuiBootDelete a global parameter attribute as follows BN 3 set wfRuiBoot wfRuiBootBaseDel
218. ines Per Screen wfSerialPortLinesPerScreen 13 24 lines 1 to 512 lines Specifies the maximum number of lines displayed on the console screen before the system displays the More prompt The screen may override the number of lines you specify if Telnet can negotiate the window size with the remote client Set according to your console requirements set wfSerialPortEntry 13 lt port_no gt lt option gt 1 3 6 1 4 1 18 3 3 2 11 1 1 13 More Enable wfSerialPortMoreEnable 14 1 Enable 1 Enable 2 Disable Specifies whether the Technician Interface pauses after each screen fills with data Select 1 Enable to configure the Technician Interface to pause after each screen fills with data Select 2 Disable to configure the Technician Interface not to pause after each screen fills with data set wfSerialPortEntry 14 lt port_no gt lt option gt 1 3 6 1 4 1 18 3 3 2 11 1 1 14 114088 Rev A Using Technician Interface Software Parameter Attribute Name Attribute Number Default Options Function Instructions Command MIB Object ID Prompt wfSerialPortPrompt 15 Any string of up to 19 keyboard characters except for control key sequences Specifies the character string used as the Login prompt on the Technician Interface console screen Accept the default or specify a different character string If you include spaces enclose this string in quotes set wfSerialPortEntry 15 lt port_no
219. infinity Specifies the maximum number of login attempts you can make before the Technician Interface disconnects the Telnet session This parameter is valid only when Modem Enable is set to 1 Enable Accept the default value 3 or specify a different value set wfSerialPortEntry 19 lt port_no gt lt option gt 1 3 6 1 4 1 18 3 3 2 11 1 1 19 Login Script Search Path wfSerialPortInitialSearchPath 28 2 A string of valid volume numbers depending on your login ID Manager or User Specifies a list of file system volumes for the system to search if the manager s login script file or the user s login script file does not contain a volume specification The environment variable PATH is set to this string Accept the default value 2 to search for the Technician Interface autoscript files on Volume 2 Otherwise enter a text string that uses the format lt vol gt lt vol gt For example enter A 1 2 or 2 4 6 9 set wfSerialPortEntry 28 lt port_no gt lt option gt 1 3 6 1 4 1 18 3 3 2 11 1 1 28 2 14 114088 Rev A Parameter Attribute Name Attribute Number Default Options Function Instructions Command MIB Object ID Configuring the Console Port Manager s Login Script wfSerialPortManagerAutoScript 29 automgr bat The name of the manager s login script file Executes the manager s login script file automatically at login If you did not
220. ion and Throughput sirsiran iaaa an 8 56 WOP Search Deptt ANTONIS cornet sceussancty siaaa a ni raiat 8 57 Displaying a Greeting or Notice Before the Login Prompt sssssrssresrsrreressisressrrsrrrens 8 59 Customizing the Technician Interface Welcome Message 2 cccceeeeeeeeeeteeeeeeneeteees 8 59 Recording Console Messages to a FIE sisiraan aaa 8 60 Enabling Intetival Clocking Mode occ seccasssdocteriauccdermaseaviusneeea landaaacinacess 8 62 Responding to GENET Underilow PRORS 1s cciciisscietcad wittesadiismiatotizceerieadigieleaideneeaiieds 8 62 NCTM Tei ROES arine E ema ae ee iaalis 8 63 Pontio TNES eae renee en een eee eee meery rrr cee rc ret emt rrereny epoca ye metere terse reser ace te 8 72 Interface Cache ssassn yanai EA EE E E E jarning niarra URNS 8 73 DNS ST CANE raae ENa AE ESR 8 74 NUT KE e its A NE A N E A TENT 8 75 OPF GHk State DanS Oana N nena eee 8 76 Determining Gipson Numbers rinioiiirniini ai niaan EA RRA 8 76 Technician Interface Commands and Access Levels E Sad EE T 8 78 Chapter 9 Managing Aliases Creating and Displaying am AWAS oireissa aa iiaeia daia a 9 2 neering Parameters MANATI arcena aai AE 9 3 Inserting Character Strings man ANAS cccisriens Godan danse 9 5 Debugging Aliases cceeeee coated TEE AE ncaa E E T Aidaan iieiea ee 9 7 DSHS TING ty Alas Korm MEMON cessie a Ra 9 7 Sanna Aineesta a FE iaa anadai A lawn da anaa 9 8 kasd Aldses TOn A FIE sarina a n a 9 9 Debu
221. ity of a remote device running the IP IPX OSI VINES AppleTalk or APPN protocol Although we use the term ping to refer to the action of testing the reachability of a remote device our implementation of ping is different for each protocol The following sections describe e The procedure the router uses to ping a remote device running a given protocol e The syntax of the ping command for each protocol e The possible messages displayed when you issue the ping command Note The ping command is not case sensitive 114088 Rev A 3 7 Using Technician Interface Software IP Ping When you issue the ping command for IP the ping program sends an Internet Control Message Protocol ICMP echo request to the remote IP address you specify The remote device responds if it can be reached and the console displays the response or the result of the request Enter the following to ping a remote device running IP ping ip lt P_address gt t lt timeout gt r lt repeat_count gt s lt size gt p a lt address gt v lt IP_address gt is the required IP address in dotted decimal notation of the remote device t lt timeout gt r lt repeat_count gt s lt size gt p a lt address gt v are optional These parameters are as follows lt timeout gt is the number of seconds for each ping to time out If the system receives a response to a ping after it has timed out the system does not send an
222. ject groups and attributes Use the commit command described in the next section to notify the software services of the MIB changes accomplished with the set command Then to copy the changes you make to a configuration file use the save command described in Saving the Configuration Note Be sure to enter commit after entering the set command see the next section for instructions 114088 Rev A 7 7 Using Technician Interface Software Examples If you enter Any one of the following set wiSnmp wfSnmpDisable 0 1 set 1 3 6 1 4 1 18 3 5 3 5 1 1 0 1 set wfSnmp 1 0 1 set wflpInterfaceEntry 2 192 32 13 99 32 Both of the following set wfBrTp 2 0 1 set wfBrStp 2 0 1 Both of the following set wfBrTp 2 0 2 set wfiBrStp 2 0 2 Committing MIB Sets The system Changes the value of wfSnmp wfSnmpDisable 0 1 3 6 1 4 1 18 3 5 3 5 1 1 0 to 1 to enable SNMP Changes the value of wflIpInterfaceEntry WflpInter faceEnable 192 32 13 99 to 2 This disables IP for the interface whose IP address is 192 32 13 99 and whose circuit is 3 Changes the values wfBrTp wfBrTpBaseEnable 0 and wfBrStp wfBrStpBaseEnable 0 to 1 to enable the Translating Bridge and Spanning Tree Disables the Translating Bridge and Spanning Tree The commit command causes all previously entered set commands to take effect When you enter commit the system notifies all software services whose configuration parameters have changed
223. kstation Wfterm enables you to e Dial in to the Technician Interface port of a router e Log in to the Technician Interface for that router start a Technician Interface session e Initiate Technician Interface commands For out of band file transfers to and from a router you run the xmodem commands described in the section About xmodem e Close the connection between the workstation and the router Before you use Wfterm and enter any xmodem command you must e Open Wfterm from its icon in the Site Manager program group e Enter Wfterm setup information local modem settings and the phone number of a target router 114088 Rev A B 17 Using Technician Interface Software Opening Wfterm You can open Wfterm by double clicking on its icon in the Site Manager icon group as shown in Figure B 2 site Manager ley Figure B 2 Wfterm Icon Wfterm opens the window shown in Figure B 3 Wellfleet Communication Terminal Program File Modem Phone File Transfers Help Figure B 3 The Wfterm Base Program Window B 18 114088 Rev A Using Out of Band Access to Transfer Files From this window you can e Check current settings or enter new settings for the interface to the modem locally attached to your workstation e Initialize the locally attached modem with the current settings e Enter a telephone number initiate autodialing and open a connection to a remote target router e Log in to
224. l not make the resulting software available for use by any third party Neither title nor ownership to Software passes to licensee Licensee shall not provide or otherwise make available any Software in whole or in part in any form to any third party Third parties do not include consultants subcontractors or agents of licensee who have licensee s permission to use the Software at licensee s facility and who have agreed in writing to use the Software only in accordance with the restrictions of this license Third party owners from whom Bay Networks has acquired license rights to software that is incorporated into Bay Networks products shall have the right to enforce the provisions of this license against licensee Licensee shall not remove or obscure any copyright patent trademark trade secret or similar intellectual property or restricted rights notice within or affixed to any Software and shall reproduce and affix such notice on any backup copy of Software or copies of software resulting from modification or combination performed by licensee as permitted by this license 114088 Rev A iil Bay Networks Software License continued 10 11 12 Licensee shall not reverse assemble reverse compile or in any way reverse engineer the Software Note For licensees in the European Community the Software Directive dated 14 May 1991 as may be amended from time to time shall apply for interoperability purposes Licensee
225. ld see the message File Transfer Aborted If you are finished transferring files from the router to the Site Manager workstation enter logout at the Technician Interface command line prompt in the Wfterm base program window At the conclusion of file transfer operations you can close the connection between the workstation and the router Refer to the later section Closing the Connection Transferring Files from DOS Workstation to Router To transfer one or more files from your Site Manager workstation to a router you must Log in to the Technician Interface of the desired router Refer if necessary to the earlier section Logging In to the Router s Technician Interface Select the disk volume or memory card volume that should receive the file you want to transfer from your workstation Set the receiving Technician Interface into binary receive mode Set the sending Wfterm utility into binary send mode Select the disk volume directory and file you want to send to the router Trigger or initiate the file transfer from workstation to router Proceed as follows to transfer one or more files from workstation to router 1 At the Technician Interface command line prompt enter a cd command to designate the disk volume or memory card volume that should receive the desired file from the workstation For example cd a designates diskette Volume a or cd 2 designates a memory card volume
226. le No 77850 only for BLN BLN 2 and BCN routers 114088 Rev A B 9 Using Technician Interface Software Out of Band File Transfers from a UNIX Workstation This section provides the procedures you need to e Open a dial connection between your workstation and a specific router e Transfer files to or from a router e Close hang up the connection between the workstation and router Opening a Connection On a SunOS platform you can use the Terminal Interface Program or tip command to e Establish a connection to the Technician Interface port of a router e Initiate file transfers to and from the router e Close the connection between the remote workstation and the router For detailed information on how to set up and use tip and its related files etc phones and etc remote on a Sun workstation enter man tip at the UNIX command line prompt The workstation should respond by displaying all of the information that is available on tip in the UNIX online command reference manual You enter modem interface settings into the etc remote file You enter dial information a telephone number in the etc phones file Transferring Files from Router to UNIX Workstation To transfer one or more files from a Bay Networks router to your UNIX workstation use the following procedure 1 At the UNIX command line prompt enter a cd command to change from the current directory to the directory that should receive the files you want to transfer
227. llows IPX ping O0OxAB12 0xCD1234 is alive e A does not respond message This message appears if the IPX address of the target device is resolved but the system does not receive an IPX reply packet from the target device within the lt timeout gt allowed A sample message follows IPX ping O0xAB12 0xCD1234 does not respond e target address is unreachable message This message appears if the local Bay Networks router cannot find the specified network address in its table of IPX networks IPX ping O0xAB12 0xCD1234 is unreachable 114088 Rev A 3 13 Using Technician Interface Software e An invalid parameter specified message This message appears if the network or host address is all Os all Fs or not a valid IPX address A sample message follows IPX ping invalid parameter specified e A resource error message This message appears if the router cannot allocate a buffer for the request because none are available A sample message follows IPX ping resource error Examples If you enter on one line ping ipx 0xAB12 0xCD1234 ping ipx 0xAB12 0xCD1234 t3 r8 The system Pings the device at the IPX address OxAB12 0xCD1234 and waits up to 5 seconds default for a response The console displays one of the following messages IPX ping O0xAB12 0xCD1234 is alive IPX ping OxAB12 0xCD1234 does not respond IPX ping OxAB12 0xCD1234 is unreachable Pings the device at the IPX address OxAB12 0xCD123
228. logEntFltrWarningMap 13 5 WARNING 1 EMERG 2 ALERT 3 CRIT 4 ERR 5 WARNING 6 NOTICE 7 INFO 8 DEBUG Maps router event messages with a severity level of warning to a UNIX system error level that Syslogd recognizes Table C 1 describes each of these error levels We recommend accepting the default UNIX system error level for this severity level To map this severity level to a different UNIX error level set wfSyslogEntFltrWarningMap to the error level you want set wfSyslogEntFlitrEntry wfSyslogEntFltrWarningMap lt host_IP_address gt lt entity_code gt lt filter_index gt lt 1 2 3l4l5l l7 8 gt 1 3 6 1 4 1 18 3 3 2 15 4 1 13 Info Map wfSyslogEntFltrInfoMap 14 7 INFO 1 EMERG 2 ALERT 3 CRIT 4 ERR 5 WARNING 6 NOTICE 7 INFO 8 DEBUG Maps router event messages with a severity level of info to a UNIX system error level that Syslogd recognizes Table C 1 describes each of these error levels We recommend accepting the default UNIX system error level for this severity level To map this severity level to a different UNIX error level set wfSyslogEntFltrInfoMap to the error level you want set wfSyslogEntFitrEntry wfSyslogEntFlitrinfoMap lt host_ P_address gt lt entity_code gt lt filter_index gt lt 1l2 3l4l5l l 78 gt 1 3 6 1 4 1 18 3 3 2 15 4 1 14 114088 Rev A C 45 Using Technician Interface Software Parameter Attribute Name Attribute Nu
229. m v 2 frediag exe 3 prom w 2 freboot exe 3 Any one of the following prom w 2 frediag exe 2 3 4 5 prom w 2 frediag exe 2345 prom w 2 frediag exe 2 3 5 prom w 2 frediag exe 2 5 The system Verifies the contents of the diagnostics PROM on Slot 3 against the contents of the frediag exe file on Volume 2 Erases the bootstrap PROM on Slot 3 and copies the contents of the freboot exe file on Volume 2 to the PROM on Slot 3 Erases the diagnostics PROMs on Slots 2 3 4 and 5 and copies the contents of the frediag exe file on Volume 2 to the PROMs on Slots 2 3 4 and 5 114088 Rev A 8 43 Using Technician Interface Software Viewing the Load Addresses and Sizes of Applications The loadmap command allows you to view the load address and size of each dynamically loadable application Enter the loadmap command with one or more of the following optional parameters to view the addresses and sizes of the applications located on a specified slot or slots lt s ot_no gt is the number of the slot where the applications are located you can also enter the keyword all to view the applications for all slots lt filename gt is the name of the file to which you want to direct the output loadmap lt s ot_no gt lt filename gt loadmap lt s ot_no gt lt slot_no gt lt filename gt loadmap lt s ot_no gt lt slot_no gt lt filename gt If you enter the loadmap command without entering a slot
230. mand displays un IP cct lt n gt where n is the number of the circuit on which the interface has been configured Org Origin of the path information EGP IGP or INCOMPLETE Peer Rem Addr The remote address of a BGP peer Proto Routing method through which the router learned this route Other Local Netmgmt ICMP EGP BGP Hello RIP IS IS OSPF or BGP Seq Nbr A signed 32 bit integer used to detect old and duplicate link state advertisements The larger the sequence number when compared as signed 32 bit integers the more recent the advertisement SI or Slot Number of the slot on which the network address mask is configured Weight Weight value assigned to the route displayed only if you specify all routes A Routing Tables Each slot on the router maintains an independent routing table or routing pool The table is the default but not initial source for a slot to look up routing information necessary to forward locally received packets Each routing table continuously receives from IP and all other nonmulticast IP protocols configured on the router updates on routes added changed or deleted in your network By means of this continuous high speed internal update mechanism the system synchronizes the contents of routing tables on all slots The only exceptions to this rule occur during the first 10 seconds of a router boot or slot reset operation 8 72 114088 Rev A System Administration Unlike
231. mber Default Options Function Instructions Command MIB Object ID Parameter Attribute Name Attribute Number Default Options Function Instructions Command MIB Object ID Trace Map wfSyslogEntFltrTraceMap 15 8 DEBUG 1 EMERG 2 ALERT 3 CRIT 4 ERR 5 WARNING 6 NOTICE 7 INFO 8 DEBUG Maps router event messages with a severity level of trace to a UNIX system error level that Syslogd recognizes Table C 1 describes each of these error levels We recommend accepting the default UNIX error level for this severity level To map this severity level to a different UNIX error level set wfSyslogEntFltrTraceMap to the error level you want set wfSyslogEntFitrEntry wfSyslogEntFltrTraceMap lt host_ P_address gt lt entity_code gt lt filter_index gt lt 1l 2 3l4l5l l 78 gt 1 3 6 1 4 1 18 3 3 2 15 4 1 15 Debug Map wfSyslogEntFltrDebugMap 16 8 DEBUG 1 EMERG 2 ALERT 3 CRIT 4 ERR 5 WARNING 6 NOTICE 7 INFO 8 DEBUG Maps router event messages with a severity level of debug to an error level that UNIX Syslogd recognizes Table C 1 describes each of these error levels We recommend accepting the default UNIX system error level for this severity level To map this severity level to a different UNIX system error level set wfSyslogEntFltrDebugMap to the error level you want set wfSyslogEntFitrEntry wfSyslogEntFlitrDebugMap lt host_
232. messages from Syslog on the router Next add an entity filter for the host entry you just added Task 6 Adding an Entity Filter for a Remote Host Once you define a host in the Syslog host table add define an entity specific message filter for the host If this is not the first filter for a given entity and remote host pair first obtain a list of filter instances as follows list i wfSyslogEntFltrEntry From the resulting list of instance IDs of the form lt host_IP_address gt lt entity_code gt lt filter_index gt determine the next lt filter_index gt number available to assign to a new filter for a given lt host_IP_address gt lt entity_code gt pair The number you assign to the new filter will have a value of 1 higher than the highest lt filter_index gt in the list Now proceed to Step 1 114088 Rev A Using Syslog Messaging to Monitor Router Create a new filter for the desired entity and remote host pair by first creating an entry in the Syslog Entity Filter Table as follows set WfSyslogEntityFilterTable WfSyslogEntFltrDelete lt host_IP_address gt lt entity_code gt lt filter_index gt 1 commit lt host_IP_address gt is the IP address of the desired remote host a management workstation lt entity_code gt identifies the software entity for which you want Syslog to forward event messages to the remote host at the lt host_IP_address gt lt filter_index gt is the next available i
233. mmand to reset one or more slots following a graceful crossnet shutdown on the same slots With this option the system notifies the remote end of any associated Frame Relay Switch PVCs to expect a loss of connectivity The BNX sends to the remote end of each PVC an update message packet with the A bit set to inactive To initiate a graceful shutdown followed by a system or slot reset enter the appropriate command at the Technician Interface prompt The system performs If you enter a graceful shutdown and reset reset shutdown On all slots reset shutdown lt s ot_no gt One one slot reset shutdown lt s ot_no gt lt slot_no gt On a range of slots reset shutdown lt s ot_no gt lt slot_no gt On a list of slots The console displays the following message during shutdown Shutdown in progress If shutdown succeeds the console displays the message Shutdown is complete Upon issuing this message the system performs the reset operation If shutdown fails the console displays the message Continue shutdown Y N If you choose N no at this time the system terminates shutdown and displays the following message on the console device Shutdown aborted Upon issuing this message the system performs the reset operation 8 28 114088 Rev A System Administration If you choose instead to Continue Y the system continues the shutdown attempt We recommend tha
234. n you encounter up to three levels of router access security e User Manager Login Telnet and console access e Password Authentication Telnet and console access e SecurID Authentication Telnet access only User Manager Login To access the Technician Interface on a Bay Networks router you must enter one of the following commands at the Login prompt that appears in your Telnet or console display Login User or Login Manager 114088 Rev A Using Technician Interface Software Note You must press the return key after every Technician Interface command Technician Interface commands and passwords are case sensitive Use upper and lowercase as indicated The User login entry allows you to enter read only commands These only read information from the router The Manager login entry allows you to enter any Technician Interface commands Certain commands read information from the router and or write information to the router We recommend limiting Manager access to network managers and the Bay Networks Technical Response Center The section Technician Interface Commands and Access Levels in Chapter 8 lists all of the Technician Interface commands and their associated access requirements Login with Password If you enable password authentication on a router you must also enter a password after the Password prompt that appears following your login entry Login lt User Manager gt Password lt pa
235. n Interface Scripts guide for information on aliases and script files Use vi or another text editor to edit automgr bat or autouser bat on your workstation Then transfer the files via TFTP or XMODEM to the router where the scripts are located For instructions on using TFTP on a non volatile file system see Chapter 4 For instructions on using TFTP on a DOS file system see Chapter 5 For instructions on using XMODEM see Appendix B 114088 Rev A 2 21 Overview Chapter 3 Using Operating Commands The basic Technician Interface operating commands allow you to e Display online help e Pause and scroll text on a screen e Abort a command e Repeat the command last entered e Repeat a command recently entered e Load a command into memory e Ping a remote IP IPX OSI VINES AppleTalk or APPN address e Display the ATM ARP table for a specific IP interface address Technician Interface commands passwords and filenames are case sensitive You must press the return key to issue a Technician Interface command If you issue a command using an incorrect syntax the Technician Interface displays the term usage and the correct syntax to help you Refer to Conventions in the preface for conventions used in this documentation and the Technician Interface online help for information on Technician Interface commands 114088 Rev A 3 1 Using Technician Interface Software Displaying Online Help Use the help command to dis
236. n other words you must specify the same IP address for the TFTP host for both files lt TFTP_pathnames gt _ Specifies the complete pathname of the software image or configuration file on the host d Resets the default values for the software image or configuration file The command bconfig d image tells the router to look for the image file locally and nullifies the IP address and pathname for the file The command bconfig d config tells the router to obtain the configuration file over the network and nullifies the IP address and pathname for the file Without the IP address and pathnames the router resorts to using Netboot rather than Directed Netboot However if you want to get one file locally while using Directed Netboot for the other file you can use the bconfig commands as the following examples show bconfig image local bconfig config network 21 3 5 62 usr anstartup config or bconfig image network 21 3 5 62 usr mykernel exe bconfig config local 8 4 114088 Rev A System Administration Configuring Initial Interfaces and Netboot Operation You can use the ifconfig command to do the following e Configure the router s initial IP interface to the network You also use the same procedure to configure other synchronous interfaces for the network booting procedure e Configure Ethernet interfaces for the network booting procedure e Enable or disable network booting on an interfac
237. n this appendix Deleting Syslog from the Router If you want to delete Syslog from the router change the setting for wfSyslogDelete a global parameter attribute as follows set wiSyslog wfSyslogDelete 0 2 commit 114088 Rev A C 25 Using Technician Interface Software Example Syslog Configuration The following is an example of a Syslog configuration procedure when Your management workstation has an IP address of 192 32 6 14 You want to receive at your management workstation messages for all software entities running on a particular Bay Networks router This is a wildcard configuration scenario You want to create and enable Syslog on a model BLN router You want to capture all fault warning and debug level messages from the router You want to capture only messages logged on Slots 2 to 4 of the router Proceed as follows 1 Define a slot mask for Syslog on the router set wfProtocols wfSYSLLoad 0 0x7FFE0000 commit The hexadecimal number 7FFE0000 converts to the binary number 0111 1111 1111 1110 0000 0000 0000 0000 The most significant bit position of the binary number represents Slot 1 The bit positions in descending order of significance represent Slots 2 3 4 etc Create the Syslog base record on the router set wfSyslog 1 0 1 commit Create a host record for 192 32 6 14 set wfSyslogHostTable wfSyslogHostEntry 1 192 32 6 14 1 commit Note When you create a host record the log fa
238. nable or disable The slot corresponds to the ASN slot ID which can be 1 through 4 If you omit this argument ifconfig uses the current slot lt interface gt Specifies the type of IP connector you are enabling or disabling For the AN and ANH use com1 or com2 for synchronous media or xevr1 for Ethernet media For the ASN use xevr lt network_module_no gt lt port_no gt or com lt network_module_no gt lt port_no gt 8 8 114088 Rev A System Administration Booting the Router The Technician Interface provides the following commands for booting The boot command warm starts the entire system Pressing the Reset button on the front panel of the router initiates the same procedure You can override the default router software image and configuration by specifying an alternative router software image and an alternative configuration file when entering the boot command The reset command warm starts a single processor module or the entire system with the router software image and configuration currently in use Resetting the entire system is equivalent to booting it The diags command cold starts a single processor module or the entire system The cold start consists of CPU backbone and link diagnostics and a reboot If you do not enter a slot number the system tests and reboots all slots How the Router Boots This section describes how each processor module in the router obtains its router softwa
239. nction Instructions Command MIB Object ID Host Operational State wfSyslogHostOperState 7 2 inactive host 1 active 2 inactive Indicates the operational state of this Syslog host entry on the router If the state is active Syslog is filtering and forwarding messages to the host at the IP address for this entry lt wfSyslogHostDest gt If the state is inactive Syslog is not filtering or forwarding messages for any of the following reasons Syslog has been disabled wfSyslogDisable 2 This entry in the Syslog host table has been disabled This entry has no configured filters No filter entries for this host are active Too many Syslog host entries are already active The number of configured hosts is greater than the value of wfSyslogMaxHosts Examine the value of wfSyslogHostOperState to determine whether or not Syslog is forwarding any messages to the host associated with this wifSyslogHostEntry lt instance_id gt get wiSyslogHostEniry wfSyslogHostOperState lt wfSyslogHostDest gt 1 3 6 1 4 1 18 3 3 2 15 2 1 7 C 36 114088 Rev A Using Syslog Messaging to Monitor Router Entity Filter Parameters This section describes the parameters you can configure for each filter entry you add to the Syslog entity filter table Parameter Attribute Name Attribute Number Default Options Function Instructions Command MIB Object ID Parameter Attribute Nam
240. nd gt reset reset lt S ot_no gt reset lt Slot_no gt l Router V ALN Warm boot all slots Warm bootthe designated Cold boot the designated CN e No diagnostics slot slot FN e Load new image No diagnostics e Run diagnostics on the LN e Initialize new image e Load new image on designated slot multislot e Retain log info on all local slot e Load new image on the routers Slots e Initialize new image on designated slot local slot e Initialize new image on e Retain log info on the designated slot designated slot e Lose log info on the designated slot BLN Warm boot all slots Warm bootthe designated Warm boot the designated BLN 2 e No diagnostics slot slot BCN e Load new image No diagnostics e No diagnostics multislot e Initialize new image Load new image on e Load new image on the routers e Retain log info on all designated slot designated slot slots e Initialize new image on Initialize new image on designated slot the designated slot e Retain log info on e Retain log info on the designated slot designated slot or with the same slot on a single slot system Note If you reset the slot in which the Technician Interface is running the Technician Interface resets with the next available slot on a multi slot system 114088 Rev A 8 27 Using Technician Interface Software Resetting After Crossnet Shutdown Notification BNX Only On BNX platforms only you can use the shutdown option of the reset co
241. ndex number you can assign to a filter for the desired entity and remote host pair After you create an entity filter for a specific host define e Anevent number or range and a slot number or range or e A severity mask and a slot number or range Note The filter remains inactive until you define the event and slot number s or the severity mask and slot number s Set entity filter attributes as follows a To define by event number s the event messages you want Syslog to select and forward to a specific remote host set wfSyslogEniFlitrEntry wfSyslogEntFlitr_ogEvtLowBnd lt host_IP_address gt lt entity_code gt lt filter_index gt lt 0 255 gt set wfSyslogEniFlitrEntry wfSyslogEntFltrLogEvtUppBnd lt host_IP_address gt lt entity_code gt lt filter_index gt lt 0 255 gt commit If you do not want to define filtering by event number s accept the default values for event number lower bound 0 and upper bound 255 Go to Step 2b Accepting these default values causes Syslog to use only the severity and slot mask criteria for selecting and forwarding messages b Define a severity mask only if you did not already define an event number or event number range If you defined an event number or number range Syslog ignores any severity mask for this filter 114088 Rev A Using Technician Interface Software To define by severity levels the event messages you want Syslog to select an
242. ndexes multiple lines over one connector such as on the MCT1 board This is equivalent to channel for MIB objects using slot conn chan format For boards that support only 1 line per connector chan 0 type 0 99 The interface type identifier for example CSMACD and SYNC These are the same as the constants defined in the CCT_NAME portion of the MIB For example CIRCUIT_TYPE_CSMACD 1 10 CIRCUIT_TYPE_SYNC 2 20 CIRCUIT_TYPE_T1 3 30 CIRCUIT_TYPE_E1 4 40 CIRCUIT_TYPE_TOKEN 5 50 CIRCUIT_TYPE_FDDI 6 60 CIRCUIT_TYPE_HSSI 7 70 slot 1 99 For most Bay Networks routers each numbered slot holds a CPU module and a link module For model ASN routers this number represents the chassis unit identifier which contains a CPU and drives up to four link modules You set the ASN slot number by means of a thumbwheel on the chassis The thumbwheel has settings that range from 1 to 4 mod 1 9 The module number has a default value of 1 on most Bay Networks routers which corresponds to the first only module on a slot The mod can be any number from 1 to 9 for a model ASN router where one CPU supports up to four link modules conn 1 16 Connector number for a given media It is given 2 digits to accommodate 16 port boards 114088 Rev A Using Technician Interface Software Example Line number 102101 chan 1 type 0 slot 2 mod 1 conn 01 This is the only line on the first
243. ng Quitting the Wfterm Program 0 ccsscceeeeeeeeseeeeeeeeeeseaeeeeeneees B 31 Figure C 1 Syslog and Syslogd Operation 0 6 A E lt eracaa e C 3 Figure C 2 Router Event Message Filtering for One Host cccceeeeeeeeeeeeeseeee C 5 Figure C 3 Syslog Message Encapsulation ccccccceseeeeseeeeeeseeseeneeeseeeeeeneeeens C 9 Figure CA Syslog Message COmmostion ciixccecicdssercscticecsendinietsntetieaaleesainieas C 10 114088 Rev A XV Tables Table 4 1 Nyro S751 Toys hs ogpeeetey Peepererr rere ear rurrpre ry prerrere rem t Tt rer rere epee Tyee nT 4 3 Table 4 2 Ro ter Sonware MAJEE saienisi aaa aae aa aii 4 4 Table 5 1 DOS File Mananement COMMAS orses 5 3 Table 5 2 DOS Fe AERIS cst sss ccxssevaansiceevvaxeecdsatenaccesteisancrs AE 5 11 Table 5 3 DOS File Alribute Hex Values sorrisi 5 19 Table 8 1 peonia Command Senge sscscicavecciseteee cnsricad ses ster ideeeen Repeeeiiaaseas 8 3 Table 8 2 contig Command Senings cccancncenascinunnia musician 8 6 Table 8 3 ifconfig Settings for an Ethernet Interface E E E E EE 8 7 Table 8 4 Technician Interface Access Levels ccccssceeeeeeeeeeeeeeeeeeeeteaeeeeeaeeeeees 8 78 Table 9 1 Aliases for Debugging Network Problems cccccceeseeeeseeeeeeeesees 9 10 TeBe i Xmodem Opion Faga csiisecsictetnie digs cers cient vied sieent aes eriadees B 6 ladei ysl Error Levele rieien ienien C 44 114088 Rev A xvii About This Guide
244. ng steps 1 Delete the file from the memory card using the delete command 2 Compact the file system using the compact command 4 20 114088 Rev A Managing a NonVolatile File System Partitioning a Memory Card or SIMM Memory partitioning enables you to use commands such as the compact command on one partitioned volume at a time Partitioning also enables you to store copies of boot images and configuration files on each partition to provide redundancy The partition command only works with a 4 MB or greater memory card or SIMM used with an AN or ASN loaded with Version 8 10 or later router software The command creates or deletes a partition on a specified volume or on the present working volume if a volume is not specified Such partitioning provides two independent file systems on two independent volumes Enter the following commands to partition the memory card or SIMM or delete a memory partition partition create lt vol gt partition delete lt vol gt When creating a partition the current file system cannot exceed one half the total media size For example if you are using a 4 MB memory card that contains files totaling more than 2 MB you need to remove or edit some of those files until they total 2 MB or less Once the partition has been created the new volume is referred to as lt vol gt b and the existing volume is referred to as either lt vol gt a or lt vol gt Caution Be careful when dele
245. ng the 1 10 wfsnmpkey command 8 54 wisnmpmode command 8 53 wfsnmpseed command 8 54 Wfterm accessing from Site Manager B 18 dialing a remote router B 22 file transfer functions B 24 initializing local modem B 21 logging into the Technician Interface B 24 modem interface settings B 19 opening B 18 overview of B 17 telephone call functions B 22 wildcards 4 2 4 3 World Wide Web Bay Networks home page on XXiX X xmodem command option flags B 5 command parameters B 5 command syntax B 4 filename conventions B 7 implementation notes B 7 to B 9 overview of B 2 YMODEM protocol B 2 xmodem command 4 13 Index 10 114088 Rev A
246. nk module 6 6 114088 Rev A Managing Events lt rate gt is an option that enables continuous polling of the system s events log and display of new event messages p uses a default rate of 5 seconds You can change this by entering a lt rate gt in seconds The system displays the events that occur between polling intervals lt code_no gt is an event code number or a range of event code numbers The system displays the events associated with the specified event code w enables the log command to provide console output in wide format Examples If you enter log log 3 ftp log log d12 12 94 log t09 02 00 log eTFTP log eGAME eTl log ffw log s3 log eTFTP ffw s3 log eTCP eTELNET fiw log p10 log c8 log w The console displays All fault warning and info events in memory All events saved to the ftp log file stored on Vol ume 3 Displays all events logged since December 12 1994 All events logged since 9 02 today If it is earlier than 9 02 the console displays all events logged since 9 02 yesterday All events logged by the TFTP service All events logged by the GAME and TI services All fault and warning events All events logged in Slot 3 All fault and warning events logged by the TFTP service in Slot 3 All fault and warning events logged by the TEL NET and TCP services All events logged in the past 10 seconds All events associated with Event Code
247. nt workstation uses the priority code in each locally received Syslog message to e Determine that the message came from an external source a Bay Networks router in an IP network accessible to the workstation rather than from an internal source such as the workstation s email system or line printer spooling system e Determine whether to redispatch the message to a local log file to the workstation display to a printer or to another remote UNIX host Syslogd makes these determinations by examining the two parts of the priority code facility error in each message 114088 Rev A Using Syslog Messaging to Monitor Router Refer to Configuring Syslog on the Router for instructions on how to enable the Syslog time sequencing feature Note Enable time sequencing only when it s important for your management workstation to receive router event messages in time stamped order rather than in order of retrieval from each slot When you enable the time sequencing feature Syslog requires more processing resources from the router Configuring Syslogd on a UNIX Workstation Before you configure and activate Syslog on any routers configure Syslogd on UNIX network management workstations in your network This helps to prevent the loss of event messages you may want to capture as you begin to enable Syslog on each router UNIX workstations have a syslog conf file in which you define destinations for event messages receiv
248. nts logged in Slot 3 to a file named s lot3 log and stores the file in Slot 2 114088 Rev A 6 9 Using Technician Interface Software Saving the Events Log Automatically Attribute Name Attribute Name Default Note Use this feature only for the purpose of troubleshooting a Bay Networks router Leave the feature disabled by default at all other times You can configure any model of Bay Networks router to save the entire events log automatically The system saves the file just prior to overwriting the oldest messages in the log This feature helps to prevent the loss of event message information accumulated in the log over time The system Parameter Options Function Instructions Command MIB Object ID Saves the log the number of times you designate in MIB attribute wfSerialPortEntry wfSerialPortAutoSaveNumFiles or until the memory card or diskette drive becomes full Saves the log to the memory card or diskette file system volume you designate in MIB attribute wfSerialPortEntry wfSerialPortAutoSave Volume Saves the log to the filename auto lt x gt log where lt x gt is a value from 1 to the maximum value you set for MIB attribute wfSerialPortEntry wfSerialPortAutoSaveNumFiles Maximum Autosaved Files wfSerialPortAutoSaveNumFiles 33 0 log autosave off 0 to 99 Specifies the number of times the system automatically saves the events log to a file system volume The system saves the log t
249. nued A 6 114088 Rev A Using the Bay Networks Router MIB Bay Networks Router MIB Files A collection of ASCII files one per router entity together describe the Bay Networks router MIB These files load automatically onto the Site Manager workstation or PC when you install the Site Manager software The Site Manager software modules read these files during startup Site Manager installs these files at wf nibs on PCs and at usr wf mibs on UNIX workstations For example the path to the PPP mib definition file on a UNIX workstation is usr wf mibs ppp mib If you want to load these MIB files into a local MIB browser tool first load the file wfcommon mib otherwise you may experience errors using the browser tool Caution If you want to open any MIB file with an ASCII text editor do so with read only protection enabled This should eliminate the possibility of corrupting over writing the contents of that file Compliance with Specifications The Bay Networks router MIB complies with the standards described in the following documents with the exceptions noted in the Implementation Notes section e Concise MIB Definitions RFC 1212 e Management Information Base for Network Management of TCPAP based Internets MIB IT RFC 1213 e Structure and Identification of Management Information for TCP IP Based Internets SMI RFC 1155 Information Processing Systems Open Systems Interconnection Specifi
250. number the system dumps the addresses and sizes of all applications on all slots to the specified filename If you do not specify a destination filename the system displays the addresses and sizes of the applications on the screen Examples If you enter The system loadmap Displays the load addresses and sizes for all applications on all slots on the screen loadmap 3 45 Displays the load addresses and sizes for all applications on Slots 3 4 and 5 on the screen loadmap 3 8 Displays the load addresses and sizes for all applications on Slots 3 4 5 6 7 and 8 on the screen loadmap all 2 map dump Dumps the load addresses and sizes for all appli or cations on all slots to the specified file loadmap 2 map dump The following example shows a sample screen display when you issue the loadmap command without any optional parameters If no applications reside on a slot the message No dynamically loadable modules on SLOT appears 8 44 114088 Rev A No dynamically loadable modules Loadmap from SLOT 2 gt vines exe 0x304a5c60 gt drs exe 0x30467550 gt tms380 exe 0x304760e0 gt hdlc exe 0x304caaf0 gt dst exe 0x30526400 Loadmap from SLOT 5 gt fr exe 0x310b9f 00 gt hdlc exe 0x310c67d0 gt qsync exe 0x3111c630 Loadmap from SLOT 3 gt arp exe 0x3048c0d0 gt ipx exe 0x303fec60 gt at exe 0x303e4e90 gt vines exe 0x3044
251. o designate the disk volume or memory card volume that contains the files you want to transfer to your UNIX workstation For example cd a designates diskette Volume a or cd 2 designates a memory card volume in router Slot 2 2 Enter a dir command to view the list of files in the volume memory card The system displays a screen similar to the following table File Name Size Date Day Time abc cfg 1814 10 28 94 Thurs 10 29 06 def cfg 2293 11 03 94 Wed LT2162 29 ghi cfg 4197 11 15 94 Mon 08 34 04 3 Determine which files you need to transfer from the router to the workstation 4 Enter the xmodem send binary command as follows xmodem sby lt source_vol gt lt filename gt sb is a send binary file y is the YMODEM file transfer option lt source_vol gt is either a slot number of a memory card or the letter of the disk drive volume that contains the files you want to send to the workstation lt filename gt is the name of the file you want to send from the router to the workstation If you want to enter multiple filenames as part of aYMODEM batch file transfer operation insert a space character between the filenames For more information on Technician Interface filename specifications refer to Chapters 4 and 5 B 26 114088 Rev A Using Out of Band Access to Transfer Files Note To ensure that files are transferred properly do not issue the xmodem command with the lt wait gt parameter when you pe
252. oes not respond e An ICMP host unreachable from y y y y message This message appears if the local Bay Networks router or remote router whose address is y y y y cannot forward the ping request any further along the path to the target device A sample message follows where y y y y is the address of the ICMP host ping ICMP host unreachable from 192 32 243 1 e A target address is unreachable message The local Bay Networks router previously issued an ICMP host unreachable from y y y y message Within 40 seconds the local Bay Networks router received a subsequent ICMP echo request addressed to the same target device The ARP timed out or the address could not be resolved A sample message follows ping 192 32 1 151 is unreachable 114088 Rev A 3 9 Using Technician Interface Software Examples If you enter on one line ping ip 192 32 1 151 ping ip 192 32 1 151 p The system Pings the device at the IP address 192 32 1 151 and waits up to 5 seconds default for a response The console dis plays one of the following messages ping 192 32 1 151 is alive size 16 bytes ping 193 32 1 151 does not respond ping ICMP host unreachable from 192 32 243 1 ping 192 32 1 151 is unreachable All of the above but displays the intervening hop addresses to the destination before dis playing the response message for each ping For example the console displays the fol lowing messages ping 192 32 243
253. og as follows e To display the unfiltered contents of the events log enter the log command without any command arguments e To select the types of messages you want the router to include in or exclude from the events log add write filter arguments to the log command You can select or specify event types by Entity code Message severity levels Router slot numbers e To display all write filters currently in effect enter the log command with the z subcommand option 6 2 114088 Rev A Managing Events e To enable the router to read only certain messages from the events log to the console display add read filter arguments to the log command You can select or specify event types by Entity code Severity level Slot number Event date Event time Event number or number range Applying Write Filters to the Events Log During normal operation the events log captures all event messages generated internally by the router However for troubleshooting purposes only use the log command to e Include specific event messages in the events log e Exclude specific event messages from the events log Specify the log command as follows log i X e lt entity gt f lt severity gt s lt slot_ID gt i Include the e f and or s options that follow x Exclude the e f and or s options that follow Note You can add the e f and s arguments to the log command in any
254. olume and names the copy alt cfg The alt cfg file on Volume 3 and stores the copy also named alt cfg on the active volume The 6_22 log file on Volume 2 and names the copy sp log The config file on Volume 2 and stores the copy also named config on Volume 3 All files from the active volume to Volume 3 All executable files from Volume 2 to Volume 4 All files with a filename of three characters from Vol ume 3 to Volume 4 Note You cannot copy from NVFS to DOS on an AFN which allows only one file system NVFS to be available after a system boot 4 12 114088 Rev A Managing a NonVolatile File System Transferring a File Depending on conditions existing within your network you can transfer files between Bay Networks routers and remote workstations using either of two methods In band using Technician Interface tftp commands and a route through your high speed IP network Out of band using Technician Interface xmodem commands and a route through a lower speed dial network You can transfer a file in band whenever You can dial in to the Technician Interface port of a router you choose as source or destination for a file transfer operation An operational IP routing path exists through your network between the file source a router or a remote workstation and the file destination also a router or a remote workstation Out of band file transfers are typically a less efficient but sometimes us
255. ommand beemeneee eoeerre te retrre eT erareen tert T tre torn entrar or mere etree TS 2 3 Ueno Blat ws el uimero palate lyre perenne yrereet Per err ee treet ree revere st rererr Terre ee ye trerrer terry rr 2 4 Using the save Command yerai E EEE E T EE T E 2 4 OONIGOIS Pot Parame leig onina ES 2 4 WEEE Tio e droda E EA E E NTA A TET A AA E 2 19 Sampie AWSE FIIS sagaia A auiw ee dceee ace 2 20 Gustomzna Antos cript PIGS nanosite nain 2 21 Chapter 3 Using Operating Commands EEA e E EEE T T A E A E E E T 3 1 De NC Onine TIE iaaa kadai ESE EES 3 2 Pasig and Scrolling ihe SOReei sariini a E 3 2 Painga O75 salar le siran A AEEA LENA OAN 3 3 Repeating the Command Last Entered cceccccesseeeeeeeeeeeeeseeneeesaaeseeeeeeeeeaeeeeaaeeenee 3 3 Repeating a Command Mecently Entered ociera aian iarainn 3 4 Loading a command mio PTGS arinena ANS 3 7 Proma a Remol 0 asa sch tincs saacaste tees ce badtdeienacaisdbet asi eaetaiada ald te teed adore ema 3 7 ag 0 ner ere peg Uhre E E E tr tear tere rere net ere error ee ee ree err re tater 3 8 Lee MG live meeaereecenet te metten tener a teremmmneet crema teehee acer or 3 12 OS FNO peereeet ene een mere cet erree ana PE Dena E EE 3 15 VIDNE SIFI ssp sha eesnncactinccten neritic gicy taaaency eid ad R NANEN 3 18 ela TU PNG E E NT T PATTE ATEA IAT E T AEE TT 3 21 APERIRI o e E meee eee meer eee rer ee ee eee rere 3 24 Displaying the ATM ARP Table for an Interface eccecceceeeeeeeeeec
256. on Use this command to validate executable files before upgrading e The prom w command erases the PROM and copies the contents of the PROM update file to the PROM Use this command to update write a PROM with new software e The prom v command compares the contents of a PROM file on the file system to the contents of a PROM Use this command to verify that the software installed in the file system matches the software loaded on a PROM 114088 Rev A 8 33 Using Technician Interface Software The executable software consists of the following binary files frediag exe is the diagnostics image file To upgrade with a new diagnostics image transfer the new frediag exe file to the file system issue the readexe command to validate it and issue the prom w command to load write it onto the diagnostics PROM The diagnostics PROM device supplies the FRE processor module with diagnostic instructions during a cold start If you want to verify that the image resident on the diagnostics PROM matches the frediag exe file use the prom v command freboot exe is the bootstrap image file To upgrade with a new bootstrap image transfer the new freboot exe file to the file system issue the readexe command to validate it and issue the prom w command to load write it onto the bootstrap PROM The bootstrap PROM supplies the FRE module with bootstrap instructions during a cold start If you want to verify that the image resident on the
257. on file during a cold start A cold start occurs after a power cycle or after you enter the diags command Each FRE module BLN BLN 2 BCN in a router can host one memory card A Flash System Controller VME based routers only in a router can host one or two memory cards Multiple memory cards are optional in the router The section that follows suggests how to manage multiple memory cards A volume number is the same number as the slot that hosts the memory card For example Volume 2 resides on Slot 2 Table 4 1 outlines the NVFS commands The Wildcard column indicates whether you can use wildcards and when entering the commands You use wildcards to display multiple filenames and to copy or delete multiple files The wildcards have the same meaning as those in UNIX e The wildcard matches any number of characters including zero characters e The wildcard matches any single character A match occurs only when a character is present in the position indicated by the wildcard The sections that follow describe the commands in detail They also show how to use the wildcards 4 2 114088 Rev A Managing a NonVolatile File System Table 4 1 NVFS Commands Command Wildcard Function compact Reallocates file space on a memory card cd Changes the active volume copy Y Copies a file from one volume to another or to the same volume delete a Deletes a file from a volume dinfo Dis
258. online help however In contrast Site Manager is menu driven when you display screens and select options from Site Manager s pop up menus it automatically sends the appropriate SNMP commands to the router Site Manager also provides help text or verification that Site Manager s static configuration feature provides Technician Interface users can set erroneous values commit the values to memory and save the values to configuration files thereby possibly disrupting router functionality and network activity Caution The Technician Interface does not provide the consistency checking 1 2 114088 Rev A Introducing the Technician Interface Running the Technician Interface Logging In The Technician Interface software entity normally runs on one slot only except as noted otherwise in the following table Router Model Technician Interface runs on AN Slot 1 only ASN Slots 1 to 4 individually or simultaneously depending on the number of ASN routers stacked and the setup of the back panel for each router BN BLN BLN 2 BCN Slot 2 LN or CN with SYSCON II Any slot one slot only Flash system controller If you reset the slot on which the Technician Interface is running the Technician Interface resets to another available slot on a multislot system or to the same slot on a single slot system When you access the Technician Interface via Telnet or console sessio
259. option is not supported at this time Set according to your console requirements set wfSerialPortEntry 7 lt port_no gt lt option gt 1 3 6 1 4 1 18 3 3 2 11 1 1 7 Baud Rate wfSerialPortBaudRate 8 9600 9600 4800 1200 600 300 Specifies the rate of data transfer between the console and the router Set according to your console requirements set wfSerialPortEntry 8 lt port_no gt lt option gt 1 3 6 1 4 1 18 3 3 2 11 1 1 8 2 8 114088 Rev A Parameter Attribute Name Attribute Number Default Options Function Instructions Command MIB Object ID Parameter Attribute Name Attribute Number Default Options Function Instructions Command MIB Object ID Configuring the Console Port Data Bits wfSerialPortDataBits 9 8 718 Specifies the number of bits in each ASCII character received or transmitted by the router Set according to your console requirements set wfSerialPortEntry 9 lt port_no gt lt option gt 1 3 6 1 4 1 18 3 3 2 11 1 1 9 Port Parity wfSerialPortParity 10 1 None 1 None 2 Odd 3 Even Enables or disables data error detection for each character transmitted or received Use the 2 Odd or 3 Even setting to enable data error detection Use the 1 None setting to disable data error detection set wfSerialPortEntry 10 lt port_no gt lt option gt 1 3 6 1 4 1 18 3 3 2 11 1 1 10 114088 Rev A 2 9 Using Technician Int
260. or a response The console displays one of the following mes sages AT ping 100 5 is alive AT ping 100 5 does not respond AT ping 100 5 is unreachable Pings the device at the AppleTalk address 100 5 eight successive times and waits up to 3 seconds for a response to each ping The console displays one of the following for each ping sent AT ping 100 5 is alive AT ping 100 5 does not respond AT ping 100 5 is unreachable The console also displays the following type of message after reporting the progress of each ping AT ping 100 5 responded to 8 out of 8 100 Success 114088 Rev A 3 23 Using Technician Interface Software APPN Ping When you issue the ping command for APPN to a remote APPN device it responds if it can be reached and the console displays the response or the result of the request APPN ping uses the APING APPN Ping Transaction Program TP to send an APING request to the APINGD TP running on the remote device Enter the following to ping a remote device running APPN ping appn lt CP_name gt t lt timeout gt r lt repeat_count gt s lt size gt m lt mode gt lt CP_name gt is the required APPN address in the format of a Control Point name of the remote device Use the format lt network_ID gt lt CP_name gt if the remote device is not on the same network as the system you are pinging from t lt timeout gt r lt repeat_count gt s lt size gt m lt mode gt a
261. or slots you indicate Examples If you enter The system clears all events from clearlog Memory clearlog 2 The Slot 2 event buffer clearlog 5 7 The Slot 5 6 and 7 event buffers clearlog 2 5 8 The Slot 2 5 and 8 event buffers 6 14 114088 Rev A Chapter 7 Accessing the MIB You can use the Technician Interface to access and manage the Bay Networks Management Information Base MIB This chapter assumes you already know how to manage the MIB but you need instructions on entering MIB management commands at the Technician Interface console Refer to Appendix A for more information You can manage the Bay Networks MIB as follows Display MIB object names identifiers and values Change MIB values Commit MIB value changes Save the configuration in RAM to a file for later retrieval when booting Use the MIB II counter 114088 Rev A 7 1 Using Technician Interface Software Listing MIB Objects You can display MIB object names and their associated identifiers using the list command When you want to display or change a MIB value but don t know its object or attribute name use this command Enter the following to display a list of all MIB object names and identifiers list You can also enter the following to display a list of attributes and their associated identifiers where lt object_name gt is the name of the object at the level above the attributes list lt object_name gt Finally yo
262. orks router The type of router single slot or multislot Based on these variables the router system or slot performs a restart a warm boot or cold boot operation The following table describes the different responses You issued a reset command from a Technician Interface session console or Telnet on one slot and the target lt S ot_no gt you specified was The same slot the A slot other than the slot the session is running None session is running on on Command gt reset reset lt S ot_no gt reset lt Slot_no gt l Router V AN Warm boot Slot 1 Warm boot Slot 1 N A ANH e No diagnostics No diagnostics single slot e Load new image on Slot Load new image on Slot routers 1 1 e Initialize new image on Initialize new image on Slot 1 Slot 1 e Retain log info e Retain log info AFN Warm boot Slot 2 Restart Slot 2 N A single slot e No diagnostics e No diagnostics router e Load new image on Slot No image reload on Slot 2 2 e Initialize new image on Re initialize current Slot 2 image on Slot 2 e Retain log info e Retain log info 8 26 114088 Rev A System Administration You issued a reset command from a Technician Interface session console or Telnet on one slot and the target lt S ot_no gt you specified was The same slot the A slot other than the slot the session is running None session is running on on Comma
263. orks routers from the Technician Interface to enable internal clocking mode Enter the following at the Technician Interface prompt set wfHssiEnitry wfHssilnternalClkTestMode 4 1 1 commit The default value 2 enables external clocking The new value 1 enables internal clocking Enter the following to display the new value get wfHssiEniry wfHssilnternalClkTestMode 4 1 The Technician Interface displays wfHssiEntry wfHssiInternalClkTestMode 4 1 1 Be sure to enter the following to set the variable back to external clocking to use the external clock source set wfHssiEniry wfHssilnternalClkTestMode 4 1 2 commit Responding to QENET Underflow Errors Transmit underflow errors can occur when a QENET link module is connected to a FRE module and all four ports are transmitting This often occurs when non SNAP encapsulated frames received from an FDDI ring are routed out the interface of a QENET An example of such a frame is a Novell proprietary encapsulated frame on FDDI The wfCSMACDUfloTx attribute in the wfCSMACDEntry MIB object shows the number of transmit underflow errors These errors result in other stations detecting CRC errors Enter the following Technician Interface command for each of the four connectors only if you are experiencing transmit underflow errors as described above set wiCSMACDEntry wfCSMACDAlignmentMode lt slot no gt lt connector gt 1 commit 8 62 114088 Rev A System Administration
264. orwDatagrams 192 32 6 4 3 149189 wfIpInterfaceEntry wfIpInterfaceForwDatagrams 192 32 15 21 4 28400 wfIpInterfaceEntry wfIpInterfaceForwDatagrams 192 32 16 1 2 1086 wfIpInterfaceEntry wfIpInterfaceForwDatagrams 192 32 243 2 1 120635 9 6 114088 Rev A Managing Aliases Debugging Aliases The verbose command allows you to display the commands within an lt alias_value gt as an alias executes This command is useful for locating syntax errors within the lt alias_value gt Enter the following to display the verbose mode verbose If the verbose mode is on the system displays the commands as they execute If the verbose mode is off the system does not display the commands Enter the following to change the setting of the verbose mode where on loff is on to display alias commands or off to turn off the display verbose on off Examples If you enter The system verbose Displays Verbose mode on or Verbose mode off verbose on Displays alias commands when they execute verbose off Does not display alias commands when they execute Deleting an Alias from Memory The unalias command removes the specified alias from memory If you substitute the wildcard character for the alias name the system removes all aliases from memory Enter the following to delete aliases from RAM unalias lt alias name gt lt alias name gt is the name of the command you want to delete represents all aliases 114
265. ostics on Slot 1 single slot Slot 1 e Load new image on Slot 1 routers e Load new image on Initialize new image on Slot 1 Slot 1 e Lose log info e Initialize new image on Slot 1 e Lose log info AFN Warm boot Slot 2 Restart Slot 2 N A single slot e No diagnostics e No diagnostics router e Load new image on No image reload Slot 2 e Re initialize current image on e Initialize new image Slot on Slot 2 e Retain log info e Retain log info ALN Cold boot all slots Cold boot the designated slot Cold boot the designated slot CN e Run diagnostics e Run diagnostics on local slot Run diagnostics on the FN e Load new image Load new image on local slot designated slot LN e Initialize new image Initialize new image on local Load new image on the multislot e Lose log info on all slot designated slot routers slots e Lose log info on local slot e Initialize new image on the designated slot e Lose log info on the designated slot BLN Cold boot all slots Cold boot the designated slot Cold boot the designated slot BLN 2 e Run diagnostics e Run diagnostics on e Run diagnostics on the BCN e Load new image designated slot designated slot multislot e Initialize new image Load new image on e Load new image on the routers e Lose log info on all designated slot designated slot slots e Initialize new image on e Initialize new image on the designated slot designated slot e Lose log info on designated e Lose log info on the slot des
266. play online help text for any Technician Interface command as follows help lt commana gt When you enter help followed by a space and the name of a command the console displays a detailed description of the command along with its syntax requirements For example when you enter help date the console displays a detailed description of the date command To display all Technician Interface commands in a brief table enter help help To display all Technician Interface commands and their associated syntax requirements enter help Use this command as an online quick reference card when you know the command s function but don t know the command name or its syntax The screen may scroll automatically refer to the next section to control scrolling Pausing and Scrolling the Screen Use the more command to view output before it scrolls out of view If the more mode is on the system forwards the number of lines you specify to the screen and displays the following prompt at the bottom of the screen Type lt space gt to page lt return gt advance 1 line Q to quit If the more mode is off the screen automatically scrolls when it fills 3 2 114088 Rev A Using Operating Commands Enter the following command to set or display the more mode more s on off lt _of_lines gt S Prevents the console from displaying output on Enables the more mode off Disables the more mode Examples If you enter The sys
267. plays the volume number status and space for each volume dir Vv Displays all files on a volume format Erases any existing files on a volume and formats the volume partition Partitions file system media into two volumes save Saves the current software configuration aliases or events to a file Refer to Chapter 6 7 or 9 for instructions on the Save command tftp Transfers a file to or from the router type VY Displays the contents of a file in ASCII or hexadecimal format Using Multiple Memory Cards This section describes how to manage multiple memory cards on the router You may want to allocate them as follows e Keep one card as the primary card used for booting e Use another card for redundancy If you are providing redundancy be sure to copy files that you modify to the redundant volumes e Use another card as temporary storage for log files and test configuration files 114088 Rev A Using Technician Interface Software The system boots from the default router software image Table 4 2 and configuration file config if you do not specify the boot image and configuration file when booting Refer to Table 4 2 for a list of router software images associated with particular routers and processor modules Table 4 2 Router Software Images Image Router Processor Module ace out FN LN CN ALN ACE afn exe AFN Motorola an exe AN ANH Motorola asn exe ASN Motorola bn exe BLN BLN 2
268. pts the user to enter this key as a password that enables Site Manager to operate in secure mode Enter the command in the following format wfsnmpkey lt key gt lt key gt is the string of ACSII characters that make up the encryption key for this router The key can be no longer than six characters Note If you replace a board in a BCN BLN or BLN 2 router you should re enter the wfsnmpkey command to ensure that the key is updated for all slots Resetting the Security Counter The wfsnmpseed command allows you to reset the counter used by the security mechanism Under normal operating conditions it is not necessary to reset the counter this command is mainly for debugging purposes To reset the seed counter enter the wfsnmpseed command in the following format wfsnmpseed lt comm_name gt lt mgr_address gt l lt value gt l lt value gt l lt value gt l lt value gt lt value gt lt comm_name gt is the name of the SNMP community for which you want to reset the counter lt mgr_address gt is the address of the manager for which you want to reset the counter lt value gt is either a dash to indicate no change to a specific counter value or the value to which you want to reset the counter 8 54 114088 Rev A System Administration Example The manager with address 192 32 1 20 If you enter in community public wifsnmpseed public 192 32 1 20 Sets the second counter
269. r a slot number the command retrieves only data pertaining to the slot where the Technician Interface is running t lt type_number gt Retrieves data for the OSPF LS type type of Link State ospf_Isdb advertisement that you specify after the t flag as follows 0 stub advertisement 1 router links advertisement 2 network links advertisement 3 summary link IP network advertisement 4 summary link ASBR advertisement 5 external link advertisement For more information on LS Types refer to RFC 1583 Example ip routes Enter the following command to display the table of IP best used or active routes ip routes Network Mask Proto Age Slot Cost NextHop Address AS 2 0 0 0 8 RIP 30 192 168 125 33 10 0 0 0 8 RIP 30 192 168 125 33 122 0 0 0 8 RIP 30 192 168 125 33 131 192 0 0 16 RIP 30 132 245 0 0 16 RIP 30 134 177 0 0 16 RIP 30 140 200 0 0 16 RIP 30 162 78 0 0 16 RIP 30 192 168 125 33 192 168 125 33 192 168 125 33 192 168 125 33 192 168 125 33 NNN NNN DN NY WWWWW UW UI Total Networks on Slot 2 268 Data from the ip routes command excludes inactive or unused routes that exist in the complete table of IP routes To view the complete table including inactive unused routes use the ip routes A command 8 66 114088 Rev A System Administration Example IP routes Enter the following command to display the entire table of routes including inac
270. r of unused bytes in the memory card Contig Free Space Number of unused bytes in the largest block of available space in the memory card 4 6 114088 Rev A Managing a NonVolatile File System When you delete a file on a memory card the file becomes inaccessible but the data remains on the card Eventually all space is used The compact command copies the active files to memory erases the memory card and copies the files back to the memory card Refer to the section Compacting File Space to free up space to prevent or respond to a file allocation failure Displaying a Directory Use the dir command to display a list of the files on a particular volume You can enter the wildcard characters and to display filenames with the character strings you specify Enter the following to list the files stored on the active volume dir Enter the following to list the files stored on a different volume where lt vol gt is the slot number containing the volume dir lt vol gt The directory display shows an entry for each file on the volume Each entry consists of a filename size and modification date weekday time Figure 4 2 shows a sample response to the dir command on a BLN 114088 Rev A 4 7 Using Technician Interface Software dir Volume in drive 5 is Directory of 5 File Name Size Date Day Time pvc0 cfg 6872 10 14 94 Fri 13751212 fr al 5616 09 16 94 Fri 08 04 26 fr VIII 10158 09 28 94 We
271. rHostIndex wfSyslogEntFltrNum wfSyslogEntFltrIndex wifSyslogEntFltrOperS tate wifSyslogEntFltrLogEvtLowBnd wifSyslogEntFltrLogEvtUppBnd wifSyslogEntFltrSevMask wifSyslogEntFltrSlotLowBnd wifSyslogEntFltrSlotUppBnd wifSyslogEntFltrFaultMap wifSyslogEntFltrWarningMap wifSyslogEntFltrInfoMap wifSyslogEntFltrTraceMap wifSyslogEntFltrDebugMap For each attribute or parameter this appendix provides information about default settings valid options function instructions for setting and the Management Information Base MIB object ID 114088 Rev A C 29 Using Technician Interface Software Global Group Parameters This section describes the Syslog group global parameters Parameter Attribute Name Attribute Number Default Options Function Instructions Command MIB Object ID Parameter Attribute Name Attribute Number Default Options Function Instructions Command MIB Object ID Syslog Delete wfSyslogDelete 1 1 Create 1 Create 2 Delete Creates or deletes the Syslog service on the router Set to 1 Create to create a MIB record with system defaults for the Syslog service on the router Set to 2 Delete to delete the Syslog service from the router configuration set wfSyslog wfSyslogDelete 0 lt 1 2 gt 1 3 6 1 4 1 18 3 3 2 15 1 1 Enable wfSyslogDisable 2 1 Enable 1 Enable 2 Disable Enables or disables Syslog services on the router Enable Syslog serv
272. rding from Syslog to Syslog hosts configured on the router Syslog forwards messages to n hosts only where n the value of wiSyslogMaxHosts 114088 Rev A C 23 Using Technician Interface Software Disabling or Re enabling Syslog Hosts or Filters You can disable or re enable host or filter entries already defined in your Syslog configuration as follows 1 Disable or re enable message forwarding to a Syslog host as follows a Disable a Syslog host anytime after adding it to the router configuration by entering the following command line set wfSyslogHostEntry wfSyslogHostDisable lt wfSysiogHostDest gt 2 commit Disabling a host e Transitions the operational state of that Syslog host entry and its corresponding filters to INACTIVE e Stops Syslog from forwarding event messages to the host Re enable message forwarding to a specific Syslog host by entering the following command line set wfSyslogHostEntry wfSyslogHostDisable lt wfSysiogHostDest gt 1 commit Re enabling a host e Transitions the operational state of that Syslog host entry and its corresponding filters to ACTIVE e Allows Syslog to resume forwarding event messages to the host 2 Disable or re enable an entity filter for a specific Syslog host as follows a Disable an entity filter anytime after adding it to the router configuration by entering the following command line set wfSyslogEntFlitrEntry wfSyslogEntFltrDisable
273. re Overview You access the Technician Interface software through a console or modem attached to a router serial port The number of Technician Interface sessions you can establish for a router depends on the number of serial ports available on that router The SRM L board has one serial port labeled Console allowing you to establish 1 session The SYS I O board has 3 serial ports labeled Console Modem 1 and Modem 2 allowing you to establish up to 3 sessions The AFN motherboard has two serial ports labeled Console and Modem allowing you to establish 1 or 2 sessions The AN motherboard has 1 serial port labeled Console allowing you to establish 1 session The ASN motherboard has one serial port per router with up to 4 routers stacked allowing you to establish up to 4 sessions with the interconnected stack Refer to Configuring Routers if you prefer to user Site Manager to configure the serial port parameters for the router console Configuring Console Port Parameters The following sections describe how to use the following Technician Interface commands list set commit save Using the list Command You can list and review all serial port attributes by entering the following command line at the Technician Interface prompt list wfSerialPortEntry 2 2 114088 Rev A Using the set Command Configuring the Console Port Enter one of the following Techni
274. re image and configuration when you do not override the default router software image for example bn exe and configuration file config You do not override these files when you Power cycle the router Issue the diags command Hot swap a module Issue the reset command Issue the boot command without specifying defaults A cold start occurs when you power cycle the router or issue the Technician Interface diags command The processor module executes CPU and backbone diagnostics and if a link module is present link diagnostics When CPU and backbone diagnostics terminate successfully and link diagnostics terminate successfully or unsuccessfully the processor module boots 114088 Rev A 8 9 Using Technician Interface Software Booting A warm start occurs when you hot swap a module press the Reset button or issue the boot or reset command The processor module boots without running diagnostics When you hot swap a module the DIAG LED on the front panel and LED 8 on the FRE module daughterboard behind the RFI shield remain on indicating that diagnostics have not been run We recommend that you issue the diags command when you hot swap a board When a processor module boots it requests a copy of the router software image currently in use The first processor module to respond to the request forwards a copy of the router software image from its memory If none is in use the processor module uses the router software image
275. re optional These parameters are as follows lt timeout gt is the number of seconds for each ping to time out If the system receives a response to a ping after it has timed out the system does not send an alive message to the console The default is 15 lt repeat_count gt is the number of ping messages to send The system does not wait for the timeout before sending the next ping The default is 1 lt size gt is the number of bytes of data to send with each ping The default is 100 lt mode gt is the mode name Choices include INTER BATCH INTERSC and BATCHSC INTER refers to the interactive mode that is where not much data is involved and response time is very important BATCH refers to a mode where a lot of data is involved and response time is not important INTERSC and BATCHSC are secure versions of INTER and BATCH If you do not specify a mode the mode defaults to a blank value 3 24 114088 Rev A Using Operating Commands The console displays one of the following messages when you issue a ping command An alive message This message appears if the system receives a response from the target device within the lt timeout gt allowed A sample message follows APPN ping bay is alive A did not complete in the time allowed message This message appears if the node is alive but congested the data transfer time exceeded the timeout or the directory search is not complete A sample message follows
276. ready on the volume that has the same filename as the file you are creating To avoid overwriting an existing file display a directory of the volume s contents and determine the filenames that are already in use Enter the following to copy a file on the active volume copy lt old_file gt lt new_file gt Enter the following to copy a file to a different volume copy lt vol gt lt old_file gt lt vol gt lt new_file gt lt vol gt in lt vol gt lt old_file gt is the slot number of the source volume lt vol gt in lt vol gt lt new_file gt is the slot number of the target volume Copying Files from NVFS to DOS When copying files from NVFS to DOS on EN LN or CN routers equipped with Flash System Controllers make sure that the NVFS filename contains no more than eight characters with an optional extension of no more than three characters preceded by a dot xxxxxxxx xxx NVFS filenames can consist of one to 15 characters DOS filenames can consist of one to eight characters with an optional one to three character extension When the DOS operating system receives a filename that contains more than eight characters it truncates the filename 114088 Rev A Using Technician Interface Software Examples If you enter copy config alt cfg copy 3 alt cfg copy 2 16_22 log 2 sp log copy 2 config 3 config copy 3 copy 2 exe 4 copy 3 4 The system copies The config file on the active v
277. resiiienesi aa 5 5 Figure 5 2 Sample DOS Directory LISHAQ isirsiruiaioniuoiersniinarouinne i 5 9 Figure 8 1 RUIBOOT Date and Time Entry E gut E EAE E E 8 16 Figure 8 2 RUIBOOT Date and Time Example crnsirrsnoiissniirissnniiaiiiesn 8 18 Figure 8 3 Sample Response to readexe COMMANA ccccceeeeeeeeeeeeeteeeeeeneees 8 36 Figure A 1 Sample Top Level Hierarchy of the Bay Networks Router MIB A 3 Figure B Modem Caneco iu iiidumetisicentsdatioahaiiannuqaainiiaa B 9 Figure B 2 Wterm Icon 4 P E E ecca dinate caer venetian B 18 Figure B 3 The Wfterm Base Program Window ccccssecseeseeeeeeeeseeeeeeneeeeeeees B 18 Figure B 4 Accessing the Modem Settings Window cccceceseeeeeeeeestteeeeeneees B 20 Figure B 5 Verifying or Modifying Modem Interface Settings cceeeeeeeeees B 20 Figure B 6 Verifying Successful Modem Initialization cecceceeeeeeeeeeeeeeteeeeeneees B 21 Figure B 7 Accessing Wfterm Telephone Call Functions cceceeeeeeeeeeeeneees B 22 Figure B 8 The Wfterm Dial Command WINdOW ccceceeeeeeeeeeteeeeeeeeeteaeeeeeneees B 23 Figure B 9 The Wfterm File Transfer Operation Selection Window 0 cce B 25 Figure B 10 The Wfterm File to Transfer Window ceeeeeeeeeeeeeeeeeeeteeneeneneees B 27 Figure B 11 The Wfterm Connection Closed Window csseseeeecrseeeeeceeeeeenes B 30 Figure B 12 Exiti
278. ress is unsuccessful Wfterm displays an appropriate message in the base program window 114088 Rev A B 23 Using Technician Interface Software Once Wfterm connects to the Technician Interface port of a router you must log in to that Technician Interface Logging In to the Router s Technician Interface Once Wfterm connects to the Technician Interface port of a router log in to the router s Technician Interface as follows 1 Press return if necessary to invoke the Technician Interface login prompt from the target router Watch for the prompt in the Wfterm base program window The system displays the following prompt Login 2 At the login prompt enter Manager The system displays the following message and prompt Welcome to the lt node_type gt Technician Interface Note Your network administrator may have customized the Welcome message and login prompt for the router on which you are attempting a login procedure Once you are logged in to the router s Technician Interface you can transfer files to and from that router File Transfer Functions Once you are logged in to the router s Technician Interface you can access and use the file transfer functions of the Wfterm utility by means of the File Transfers pull down menu Figure B 9 B 24 114088 Rev A Using Out of Band Access to Transfer Files Wellfleet Communication Terminal Program File Modem Phone QgiGaienpiadg ASC
279. resses to the destination before displaying the response message for each ping For example the console displays the following messages VINES ping 809637039 1 VINES ping 809847041 1 VINES ping 2705682 8003 is alive size 16 bytes Pings the device at the VINES address 2705682 8003 eight successive times and waits up to 3 seconds for a response to each ping The con sole displays one of the following for each ping sent VINES ping 2705682 8003 is alive VINES ping 2705682 8003 does not respond VINES ping 2705682 8003 is unreachable The console also displays the following type of message after reporting the progress of each ping VINES ping 2705682 8003 responded to 8 out of 8 100 success 3 20 114088 Rev A Using Operating Commands AppleTalk Ping When you issue the ping command for AppleTalk to a remote AppleTalk device it responds if it can be reached and the console displays the response or the result of the request AppleTalk ping uses the AppleTalk Echo Protocol Enter the following to ping a remote device running AppleTalk ping at lt network_ID gt lt node_ID gt t lt timeout gt r lt repeat_count gt s lt size gt lt network_ID gt lt node_ID gt is the required AppleTalk address of the remote device in the format of a 16 bit network number and an 8 bit node number Note You can enter the network and node addresses in decimal or hexadecimal format If you use hexadecimal
280. rform out of band file transfers to or from a Windows workstation that has Wfterm running on it 5 To set the receiving Wfterm utility into receive mode select the YMODEM Receive option from the File Transfers pull down menu Selecting this option invokes the File to Transfer window as shown in Figure B 10 Wellfleet Communication Terminal Program File Modem Phone File Transfers Help File to Transfer File Name Directories _win did asn2stf_exe ccomm ico convert exe install_exe install ins 3 kds cfg wfscms kermit dll List Files of Type ALL Files Figure B 10 The Wfterm File to Transfer Window 6 Select highlight the drive and directory that should receive the file from the router If you want to rename the file upon receipt at the workstation you can also type a filename into the File Name line of the File to Transfer window 7 Use the cursor to press the OK button in the File to Transfer window Pressing the OK button notifies the sending Technician Interface to terminate its wait before transmit state and to send the file you specified in the File to Transfer window 114088 Rev A B 27 Using Technician Interface Software You verify that the file transfer was successful when you see the File Transfer Completed message in the Wfterm base program window You should also see the filename appear in the receiving directory on the workstation If the transfer was unsuccessful you shou
281. ribute Number Default Options Instructions Command MIB Object ID MIB II Counters Enable wfSysMibCounterEnable 12 1 Enable 1 Enable 2 Disable Enables or disables the following five counters in the MIB for Version 8 10 and later router software ifInUcastPkts ifInNUCastPkts IfINUnknownProtos ifOutUcastPkts ifOutNUcastPkts Set to 1 Enable to enable the five counters on all circuits and slots Set to 2 Disable to disable the counters on all circuits and slots set wfiSys 12 0 lt option gt 1 3 6 1 4 1 18 3 3 1 12 7 10 114088 Rev A Chapter 8 System Administration You can use the Technician Interface to perform the following system administration tasks Configure the Access Node AN or Access Stack Node ASN router s boot or configuration sources when booting Configure AN or ASN initial interfaces Boot the router Configure and manage delayed boot services Restart a slot Reset a slot Run diagnostics Display the version number of the Bay Networks router software Halt the transfer of packets between slots Verify and upgrade the software Validate an executable file Upgrade and verify a PROM View the address and size of a dynamically loadable application Set the Bay Networks ACE backplane type Reset the date and time Assign Technician Interface passwords 114088 Rev A 8 1 Using Technician Interface Software Enable disable SecurID authent
282. rograms each card with a Personal Identification Number PIN to uniquely identify its prospective owner then assigns the card for exclusive use by that person only If you do not have an assigned PIN the SecurID client on the router also prompts you through a routine for PIN assignment The SecurID administrator for your network must first configure the ID system to allow you access to the PIN assignment feature The SecurID administrator can enable you either to select your own PIN or to accept a system generated PIN The SecurID card uses an internal algorithm to electronically generate temporary card codes Before allowing you access to the Technician Interface of a router the SecurID client requires you to enter your PIN followed by the current card code from your SecurID card The SecurID server on your network either e Recognizes your PASSCODE and grants access to the router s Technician Interface e Does not recognize your PASSCODE and denies access to the router s Technician Interface 114088 Rev A Using Technician Interface Software Note If the SecurID system denies you access to a router after four login attempts the system then removes your PIN from the current list of valid SecurID users To reactivate your SecurID PIN you must request reactivation from the SecurID administrator of your network Newly installed routers initially do not require SecurID authentication for Technician Interface log
283. router ID for Level 1 osil2routes Displays the path or router ID for Level 2 ospf_drs Reports the designated router and backup designated router for each of the router s attached OSPF networks ospf_intf Reports the state of all the router s OSPF interfaces including virtual links The states are 1 Down 2 Loopback 3 Waiting 4 Point to point 5 Designated router 6 Backup designated router 7 Other designated router 9 16 114088 Rev A Table 9 1 Managing Aliases Aliases for Debugging Network Problems continued If you enter The system ospf_Isdb Lists all interfaces in the link state database ospf_nbrs Reports the state of every OSPF neighbor that the router knows about The states are 1 Down 2 Attempt 3 Init 4 Two way 5 Exchange start 6 Exchange 7 Loading 8 Full protocols Displays bit map in decimal form representing all protocols running and their associated slots setvol lt s ot_no gt Sets the active volume for TFTP puts and gets shovol Displays the current active volume for TFTP puts and gets snmpbase Displays all SNMP configuration parameters base record sr_intf lt instance_ID gt Enables or disables Source Routing for a specific interface 1 Enable 2 Disable sr_info Displays the contents of the Source Routing database record sr_cctstats lt circuit_no gt Displays
284. rth byte indicates the event number or the particular event type unique to each entity The specific traps contain one variable binding a display string with the name 1 3 6 1 4 1 18 3 5 3 5 4 1 0 The string contains the actual log message that was recorded in the system event log The SNMP set operation is not supported for MIB II objects All set operations must be performed through the Bay Networks private MIB 1 3 6 1 4 1 18 3 Line Number Attributes Line number attributes exist in all line records for example SYNC HSSI CSMACD and TOKEN in the Bay Networks router MIB for Version 9 00 router software These attributes have the name wfXyzLineNumber where Xyz is the prefix for the appropriate line record Site Manager generates a line number attribute to uniquely identify each port in the router configuration The router uses line numbers to accommodate more than one line per port and to reference WAN protocols configured on those lines A 10 114088 Rev A Using the Bay Networks Router MIB The line number encodes several attributes of the line it represents You can use Technician Interface list and get commands to examine and decode a line number The individual fields of the number correspond to different attributes of a line as follows 0 00 00 00 0 00 resv chan type slot mod conn Field Purpose resv 0 1 Reserved for future expansion with a default value of 0 chan 0 99 I
285. ry for log files and ASCII for alias files Log files are stored in binary format use the log command described in Logging and Displaying Event Messages in Chapter 6 to display a log file in ASCII format Examples If you enter The console displays type install bat The contents of the install bat file type x config The config file in hexadecimal format Deleting a File Use the delete command to delete files that you specify You can use the wildcard characters and when issuing the delete command Caution You cannot recover a file after it is deleted The delete command does not prompt you to verify a deletion Enter the following to delete a file in the present working directory delete lt filename gt You can enter del or delete when deleting a file Note You cannot delete a file whose attributes are h for hidden or s for system Refer to Changing File Attributes earlier in this chapter for instructions on changing these protections 114088 Rev A 5 21 Using Technician Interface Software Examples If you enter The system delete alt cfg Deletes the alt cfg file in the present working directory delete log Deletes all files with the Jog filename extension in the present working directory delete log Deletes all files with a three character filename and a log filename extension 5 22 114088 Rev A Chapter 6 Managing Events You can use the Technician
286. s Bay Networks Information Services maintain an active forum on CompuServe a global bulletin board system This forum provides file services technology conferences and a message section to get assistance from other users The message section is monitored by Bay Networks engineers who provide assistance wherever possible Customers and resellers holding Bay Networks service contracts also have access to special libraries for advanced levels of support documentation and software To take advantage of CompuServe s recently enhanced menu options the Bay Networks Forum has been re engineered to allow links to our Web sites and FTP sites We recommend the use of CompuServe Information Manager software to access these Bay Networks Information Services resources To open an account and receive a local dial up number in the United States call CompuServe at 1 800 524 3388 Outside the United States call 1 614 529 1349 or your nearest CompuServe office Ask for Representative No 591 When you are on line with your CompuServe account you can reach us with the command GO BAYNET XXX 114088 Rev A InfoFACTS Technical Support and Online Services InfoFACTS is the Bay Networks free 24 hour fax on demand service This automated system has libraries of technical and product documents designed to help you manage and troubleshoot your Bay Networks products The system responds to a fax from the caller or to a third party within minutes of being
287. s that you use to manage the files and directories on the diskette For a list of these commands refer to Table 5 1 To alert the system that the diskette is available for access issue the mount a command DOS performs an implied mount if you issue any of the DOS file management commands listed in Table 5 1 except of course the unmount command Caution Be sure to issue the unmount command as described in this chapter before you remove a diskette reboot the router or reset Slot 2 File corruption errors can occur when you perform these tasks without first issuing the unmount command The Wildcard column indicates whether you can use wildcards and when entering the commands You use wildcards to display multiple filenames and to copy or delete multiple files The wildcards have the same meaning as those in UNIX e The wildcard matches any number of characters including zero characters e The wildcard matches any single character A match occurs only when a character is present in the position indicated by the wildcard Note The DOS file system in the router does not format diskettes however you can format them on a PC and use them in the router 5 2 114088 Rev A Managing a DOS File System Table 5 1 DOS File Management Commands Command Wildcard Function attr Vv Changes file attributes copy Vv Copies a file from one directory to anot
288. s the number of ping messages to send The system does not wait for the timeout before sending the next ping Enter a value between 0 and 10 inclusive The default is 1 The console displays one of the following messages when you issue a ping osi command If you enter a value other than 0 in the lt repeat_count gt argument the system displays one of the following messages for the default ping plus one for each additional ping e An alive message This message appears if the system receives a CLNP echo response from the target device within the lt timeout gt allowed A sample message follows OSI ping 49000400000a12121200 is alive e A does not respond message This message appears if the NSAP address of the target device is resolved but the system does not receive a CLNP echo response from the target device within the lt timeout gt allowed A sample message follows OSI ping 49000400000a12121200 does not respond 114088 Rev A 3 15 Using Technician Interface Software A lt target address gt is unreachable message This message appears if the local Bay Networks router cannot find the specified address in its routing table OSI ping 49000400000a12121200 is unreachable An NSAP address is too short message This message appears if the NSAP address is too short The minimum allowed NSAP address length is 20 hexadecimal characters 10 bytes A sample message follows OSI ping NSAP address is too short An OSI
289. sage Severity Mask of wfi the filter passes only FTP event messages that have a severity level of warning w fault f or information i Filtering by Slot Number The router stores event messages in the log buffer associated with each slot You can configure an entity filter to select for forwarding only event messages logged on the slots you specify You must specify at least one slot in the range 1 to 14 where the slot numbers depend on the model of router 114088 Rev A C 7 Using Technician Interface Software You define a range of slot numbers for an entity filter by specifying e An upper boundary number MIB object wfSyslogFltrSlotUppBnd e A lower boundary number MIB object wfSyslogFltrSlotLowBnd Syslog considers the upper and lower boundary numbers as part of the range For example you can configure an entity filter for FTP with an event number range of 5 to 27 and a slot number range of 2 to 5 In this case Syslog forwards to the associated remote host FTP log messages numbered 5 to 27 logged on Slots 2 to 5 only You can configure a filter to select messages logged on a specific slot by setting the upper and lower slot boundary values to the same number Note With both the upper and lower boundary attributes set to 0 the default value for those attributes the filter cannot transition to the active state Mapping Router Event Messages into Syslog Message Format Syslog running on each slot m
290. sages with a severity level of fault to a UNIX system error level that Syslogd recognizes Table C 1 describes each of these error levels Instructions We recommend accepting the default UNIX system error level for this severity level To map this severity level to a different UNIX system error level set wfSyslogEntFltrFaultMap to the error level you want Command set wfSyslogEntFitrEntry wfSyslogEntFlitrFaultMap lt host_ P_address gt lt entity_code gt lt filter_index gt lt 1 213141516171 8 gt MIB Object ID 1 3 6 1 4 1 18 3 3 2 15 4 1 12 Table C 1 Syslogd Error Levels Error Level Description EMERG A panic condition that syslogd normally broadcasts to all users ALERT A condition that you should correct immediately such as a corrupted system database CRIT Critical conditions such as hard device errors ERR Errors WARNING Warning messages NOTICE Conditions that are not errors but may require special handling INFO Informational messages DEBUG Messages that contain information you can use when debugging or troubleshooting your network C 44 114088 Rev A Parameter Attribute Name Attribute Number Default Options Function Instructions Command MIB Object ID Parameter Attribute Name Attribute Number Default Options Function Instructions Command MIB Object ID Using Syslog Messaging to Monitor Router Warning Map wfSys
291. sary to view the list of files in the directory Determine which files you need to transfer from the workstation to the router Enter a tip command on the workstation to open a dial connection between the workstation and the desired router For example tip modem0 modem0 designates the workstation port that accommodates the dial modem attached to the workstation The system displays the following message Connected 114088 Rev A Using Technician Interface Software 5 Press return to invoke the Technician Interface login prompt from the target router The system displays the following prompt Login 6 Enter Manager and a password if necessary to log in to the router s Technician Interface The system displays the following message and prompt Welcome to the lt Node_Type gt Technician Interface 7 Enter a cd command to designate the disk volume or memory card volume that should receive the files you want to transfer from your UNIX workstation For example cd a designates diskette Volume a or cd 2 designates a memory card volume in router Slot 2 8 Enter the xmodem receive binary command as follows xmodem rby rb is a receive binary file y is the YMODEM file transfer option 9 Type c tilde c to escape momentarily from the Technician Interface command line prompt to the UNIX workstation command line prompt The workstation responds Local command B 14 114088 Rev A
292. screen text separator gt vertical line I About This Guide Indicate that you choose the text to enter based on the description inside the brackets Do not type the brackets when entering the command Example if command syntax is ping lt p_address gt you enter ping 192 32 10 12 Indicates text that you need to enter command names and buttons in menu paths Example Enter wism amp Example Use the dinfo command Example ATM DXI gt Interfaces gt PVCs identifies the PVCs button in the window that appears when you select the Interfaces option from the ATM DXI menu Indicate optional elements You can choose none one or all of the options Horizontal and vertical ellipsis points indicate omitted information Indicates variable values in command syntax descriptions new terms file and directory names and book titles Indicate the title of a chapter or section within a book Indicates data that appears on the screen Example Set Bay Networks Trap Monitor Filters Separates menu and option names in instructions and internal pin to pin wire connections Example Protocols gt AppleTalk identifies the AppleTalk option in the Protocols menu Example Pin 7 gt 19 gt 20 Indicates that you enter only one of the parts of the command The vertical line separates choices Do not type the vertical line when entering the command Example If the command syntax is show at routes nets yo
293. service is not running message This message appears if the OSI service is not enabled on the router A sample message follows OSI ping OSI service is not running A resource error message This message appears if the router cannot allocate a buffer for the request because none is available A sample message follows OSI ping resource error A system error message The message appears if the Technician Interface has failed A sample message follows OSI ping system error A lt y Y Y Y Y Y Y Y Y Y Y Y Y Y Y Y Y Y Y y gt is a bad NSAP address message The message appears if the NSAP address is more than 20 hexadecimal characters or contains nonhexadecimal characters A sample message follows OSI ping 4900040000a1121212000 is a bad NSAP address 3 16 114088 Rev A Examples If you enter on one line ping osi 49000400000a1 2121200 ping osi 49000400000a1 2121200 t3 r8 Using Operating Commands The system Pings the device at the NSAP address 49000400000a12121200 and waits up to 5 default seconds for a response The con sole displays one of the following messages OSI ping 49000400000a12121200 is alive OSI ping 49000400000a12121200 does not respond OSI ping 49000400000a12121200 is unreachable Pings the device at the NSAP address 49000400000a12121200 eight successive times and waits up to 3 seconds for a response to each ping The console displays one of the following for each ping
294. sg txt orig on the router You may want to restore the default Welcome message at some later time 2 Use TFTP to copy ti_msg txt from the router to your UNIX workstation or PC 3 Open ti_msg txt on your workstation or PC 4 Edit the default Welcome message or enter a replacement message up to 256 characters in length Format the message with appropriate spacing and return characters 5 Save your new version of ti_msg txt 6 Use TFTP to copy ti_msg txt back to the router The new version of the file replaces the original version on the router Recording Console Messages to a File Use the record command to record to a file all messages the system sends to the console terminal In this way you can save the output of Technician Interface commands and if necessary forward the results to Bay Networks customer support personnel Open the record file before recording then close the file when you finish recording You can lose the file if it is not closed before you unmount the file system or reset the router Enter the following command to open the record file and record messages to that file record open fileonly pause lt vo gt lt filename gt open creates and opens a record file The system sends command output and messages to both the console terminal and the file fileonly writes messages only to the file not to the terminal Use this option only within a script This option allows a script to write to
295. situations e Communicate directly via e mail with the specific technical resources assigned to your case The Bay Networks URL is http www baynetworks com Customer Service is a menu item on that home page Customer Service FTP Accessible via URL ftp support baynetworks com 134 177 3 26 this site combines and organizes support files and documentation from across the Bay Networks product suite including switching products from our Centillion and Xylogics business units Central management and sponsorship of this FTP site lets you quickly locate information on any of your Bay Networks products 114088 Rev A xX X Using Technician Interface Software Support Source CD This CD ROM sent quarterly to all contracted customers is a complete Bay Networks Service troubleshooting knowledge database with an intelligent text search engine The Support Source CD contains extracts from our problem tracking database information from the Bay Networks Forum on CompuServe comprehensive technical documentation such as Customer Support Bulletins Release Notes software patches and fixes and complete information on all Bay Networks Service programs You can run a single version on Macintosh Windows 3 1 Windows 95 Windows NT DOS or UNIX computing platforms A Web links feature enables you to go directly from the CD to various Bay Networks Web pages CompuServe For assistance with noncritical network support issue
296. smit packet statistics ipx_intf Enables or disables a specific IPX interface 1 Enable 2 Disable ipx_if lt interface_ID gt Displays the IPX interface record for the specified interface ID 9 14 114088 Rev A Table 9 1 Managing Aliases Aliases for Debugging Network Problems continued If you enter The system ipx_route lt nstance_ID gt Displays the IPX route record for the instance ID of the particular route you specify ipx_server lt instance_ID gt Displays the IPX server table for the instance ID of the particular server you specify ipx_it Displays the IPX interface table including the state of the interfaces The states are 1 Up 2 Down ipx_rt Displays the metrics of all routes ipx_st Displays the names of all servers ipxinr lt interface_ID gt Displays the number of packets received on a specific interface ipxind lt nterface_ID gt Displays the number of packets RIP or SAP received on a specific interface ipxforwd lt interface_ID gt Displays the number of packets forwarded on a specific interface ipxoutr lt interface_ID gt Displays the number of out requests RIPs and SAPs originated from the router for the interface you specify ipx_stat lt interface_ID gt Displays the last four aliases on the interface you specify ipx_nexthop lt instance_ D gt Displays the next hop for the network you
297. ssword gt New routers initially have no password login requirements If your network administrator enables password access on a router the Password prompt appears when you attempt a login to that router We recommend password access to help establish access and data security for routers in your network For instructions on how to enable or disable password authentication on a router see Assigning Passwords in Chapter 8 Login with SecurlD SecurID is a feature for barring unauthorized users from accessing the Technician Interface on a Bay Networks router through a Telnet session 114088 Rev A Introducing the Technician Interface If you enable this feature on a router you enter in addition to a login entry a SecurID PASSCODE after the Passcode prompt as follows Login lt User Manager gt Password lt password gt if enabled Passcode lt passcode gt If your SecurID administrator enables the SecurID client on a router you need to access you see the Passcode prompt at login time When you enter a valid PASSCODE you receive Technician Interface login privileges to the router You receive on your Telnet access screen the Technician Interface login prompt or whatever your network administrator selects for the Telnet login prompt Each User or Manager authorized to access a router configured with an active SecurID client must have an electronic SecurID card issued by Security Dynamics Inc Security Dynamics p
298. stance gt lt object gt is the required object name or identifier lt attribute gt is the required name identifier or wildcard character of the object attribute s The wildcard character displays all attributes of the object and their associated values lt instance gt is the optional name or identifier of the instance An asterisk in place of the instance displays all instances of the object and their associated values You can also indicate an asterisk as part of the instance identifier to display all instances that begin with the partial instance you specify For example if you enter the following command the system returns all instances of Attribute 1 wherever the instance ID also begins with 192 32 get wflpBaseRtEntry 1 192 32 Note You cannot use more than one wildcard in a get command 7 4 114088 Rev A Accessing the MIB The following examples demonstrate ways to display the value of an attribute The attribute in these examples is named wfSnmpDisable Its instance ID is 1 Its object name is wfSnmp and object identifier is 1 3 6 1 4 1 18 3 5 3 5 1 The instance ID of 0 is reserved for base record objects Specifying the base record instance ID in the get command is optional Refer to the second example The last example demonstrates how to obtain a group of values associated with an object Examples If you enter Any one of the following get wfSnmp wfSnmpDisable get wfSnmp wfSnmp
299. sting alias when you want to display its associated commands lt alias_value gt is a string of Technician Interface commands The following rules apply to inserting characters in the lt alias_value gt e Separate commands with a space and a semicolon 66 99 e Use double quotes outside the lt alias_value gt if it includes a space or a semicolon The quotes are otherwise optional e Enter a backslash before every quote character inside the lt alias_value gt This includes the quotes in an echo command embedded within the lt alias_value gt e Enter a backslash before the following characters when you use them literally another backslash a percentage sign or a dollar sign at the last character position of the lt alias_value gt e Limit the lt alias_value gt to 255 bytes of data just over three 80 character lines You can create an alias that invokes other aliases by entering the alias command and nesting up to 15 other aliases in the lt alias_value gt argument Separate the aliases with a space and a semicolon Refer to the last example in the examples that follow When you create an alias the system stores it in memory Use the save command described in a later section to save the aliases in RAM to a file for later retrieval The system can store up to 100 aliases in memory provided that memory isn t dedicated to other tasks so limit the number of aliases in an alias
300. t Enter the following command to copy a file from one directory to another and use a new filename copy lt dir_1 gt lt old_name ext gt lt dir_2 gt lt new_name ext gt Examples If you enter The system copy config alt cfg Copies the config file in the present working directory and names the new copy alt cfg copy newfiles Copies all files in the present working directory to the directory new files copy logf l6_22 log Copies the 6_22 log file from the logf directory to the inv span log inv directory and names the new file span log 5 14 114088 Rev A Managing a DOS File System Copying Files from DOS to NVFS When copying files from DOS diskettes to NVFS memory cards you must specify the destination filename in the command DOS filenames are in upper case The NVFS filenames for the router software image and the configuration file must be in lower case Caution The router will fail to boot from a memory card whose image and configuration file have uppercase names If you copy files from DOS diskettes to NVFS memory cards and you do not specify the destination filename the system copies the filename in upper case For example if you enter copy a ace out 1 the system copies the file to NVFS as ACE OUT If you enter copy a ace out 1 ace out the system copies the file to NVES as ace out Do not use wildcards If you copy files from DOS to NVFS using a wildcard the filenames will be copied
301. t 192 32 1 62 Sends a copy of config2 cfg from Volume 2 2 config2 cfg 3 newconf to newconf in Volume 3 on the remote node at the IP address 192 32 1 62 tftp get 192 32 1 62 Requests a copy of config2 cfg from Volume 2 2 config2 cfg of the remote node at the IP address 192 32 1 62 and stores the copy in the current working directory tftp put 192 32 1 62 Sends a copy of config2 cfg to config2 cfg in 2 config2 cfg Volume wfTftp 2 0 on the remote node at the IP address 192 32 1 62 tftp put 192 32 1 62 Sends a copy of 2 config2 cfg but puts it on 2 config2 cfg 3 config3 cfg Volume 3 and calls it config3 cfg After transferring the file you can copy it at the source to its original name If the new file at the destination is a configuration file or an executable file verify its integrity by booting with it If the system boots and loads the configuration without problems you can rename or copy the filename at the destination to its original You can also load a file onto the router by specifying the router host name and volume using the following command tftp put lt remote_file gt lt host_name gt lt local_vol gt lt local_file gt 4 16 114088 Rev A Managing a NonVolatile File System This method is useful if the wfTftp 2 0 attribute for the default volume was not set during the Quick Start procedure Example If you enter The local system tftp dark Transfers a copy of the install bat file to put install bat d
302. t you terminate this procedure after no more than one additional shutdown attempt Running Diagnostics The diags command cold starts one or more specified slots or the entire system The cold start consists of CPU backbone and link diagnostics and a reboot If you do not enter a slot number the system tests and reboots all slots Enter the following to run diagnostics on the entire system diags The system returns the following message Perform diags on all slots y n If you still want to run diagnostics on all slots enter y yes Entering n no aborts the command Enter the diags command with one of the following parameters to run diagnostics and reboot one or more ILIs diags lt s ot_no gt diags lt s ot_no gt lt slot_no gt diags lt s ot_no gt lt slot_no gt 114088 Rev A 8 29 Using Technician Interface Software Examples If you enter The system diags Runs diagnostics and reboots the entire system diags 1 Runs diagnostics for Slot 1 and reboots Slot 1 diags 1 5 Runs diagnostics for Slots 1 2 3 4 and 5 and reboots Slots 1 2 3 4 and 5 diags 4 6 Runs diagnostics for Slots 4 and 6 and reboots Slots 4 and 6 The system runs diagnostics on the associated slot or slots loads the router software image loads the configuration and initiates the router software services We recommend that you issue the diags command to the associated slot immediately after
303. tem more Displays more mode on or more mode off more on more s on 24 more on lt no gt more off Halting a Command Enables the more mode pauses the system and prompts you to continue when a screen fills Enables the more mode sets screen size to 24 lines no output displayed Displays the number of lines that you specify before pausing Disables the more mode The screen scrolls automatically without prompting you Press control c hold down the control key and press c to halt processing of a command you just issued This escape sequence returns Technician Interface prompt to your console or Telnet screen Repeating the Command Last Entered Use the repeat command to repeat execution of the last command you entered You can specify an optional repetition count to repeat the command 114088 Rev A 3 3 Using Technician Interface Software Enter the following to execute the last command you entered where lt repeat_count gt is the optional number of times you want to execute the command The default is 1 time lt repeat_count gt Examples If you enter The system Executes the last command you entered 15 Executes the last command you entered five times Repeating a Command Recently Entered Use the history command to e View a list of the Technician Interface commands most recently entered during the current console or Telnet session e Recall and run a specific command from the
304. ter 2 For instructions on changing the default values associated with Telnet access to the Technician Interface refer to Configuring IP Utilities For information on changing the default values associated with SecurID services see Enabling and Disabling SecurID Authentication in Chapter 8 Logging Out To exit a Technician Interface session enter the following command after the Technician Interface prompt logout For a console connected directly to the router the Login prompt reappears Login lt User Manager gt Password lt password gt if enabled Passcode lt passcode gt if enabled For a remote terminal program on a PC or workstation connected to the router by means of modems the following messages appear and the Technician Interface hangs up the telephone TI session logged out Goodbye Note To use the Technician Interface with a modem see Chapter 2 If the Modem Enable parameter has a setting of Disable default and the session terminates unexpectedly the router does not automatically log you out You must re establish a connection to the router and log out using the logout command 114088 Rev A Introducing the Technician Interface Starting a Manager Session from within a User Session You can initiate a Manager session within a User session by entering the following command system The Password prompt appears at this time if your network administrator configur
305. th the router and enter the following command at the Technician Interface prompt get wfHweEntry 16 8 40 114088 Rev A System Administration With a Model BLN router for example information similar to the following appears with one wfHwEntry wfHwDiagPromSource line for each slot wf my wf wy wf wy wf wy HwEntry wfHwDiagPromSource 2 harpdiag rel v4 00 wf pj harpoon ss image p frediag exe HwEntry wfHwDiagPromSource 3 harpdiag rel v4 00 wf pj harpoon ss image p frediag exe HwEntry wfHwDiagPromSource 4 harpdiag rel v4 00 wf pj harpoon ss image p frediag exe HwEntry wfHwDiagPromSource 5 harpdiag rel v4 00 wf pj harpoon ss image p frediag exe Each line of response to the command specifies A slot number for example wfHwEntry wfHwDiagPromSource 2 identifies Slot 2 A pathname that contains the version number of the image stored in a diagnostics PROM for example harpdiag rel v4 00 wf pj harpoon ss image p frediag exe identifies the v4 00 Version 4 0 diagnostics PROM image frediag exe in Slot 2 Using the prom Command Note Before upgrading any router software always save a copy of the original configuration file and boot image as a safeguard in case you encounter problems during the procedure To upgrade the PROMs 1 Insert a Flash card with contiguous free space sufficient to accommodate the PR
306. the Technician Interface of the remote router e Transfer files between the router and your workstation You can initiate other Technician Interface commands as well at the Technician Interface prompt inside the Wfterm program window However this section does not provide information on Technician Interface procedures other than those required to support xmodem out of band file transfers e Log off the target router terminate the Technician Interface session e Disconnect terminate the connection between the workstation and the target router If you are opening Wfterm for the first time proceed to the next section Checking and Verifying Current Modem Interface Settings If you are sure that the current interface settings for the modem locally attached to your workstation are already correct and you have determined the types of file transfer operations you need to perform proceed to Initializing the Local Modem Checking and Verifying Current Modem Interface Settings You must ensure that the modem locally attached to your workstation can establish a connection with a modem attached to the Technician Interface port of a remote target router To satisfy this requirement you need to check current settings for the physical layer interface to that modem If the settings you observe are inappropriate for the type of data link and modem attached to the remote target router you can enter new settings dynamically through the
307. the following command at the Technician Interface prompt list i wfSyslogHostEniry The list includes the instance IDs in this case the IP addresses of all remote hosts currently defined in the Syslog host table 1 Add a new host entry to the Syslog Host Table as follows set wfSyslogHostTable wfSyslogHostDelete lt host_ P_address gt 1 commit This entry informs Syslog of a remote host at the destination IP address that you specified If you want to accept the default settings for host attributes wfSyslogHostLogFacility 184 Local7 and wfSyslogHostTimeSeqEnable 2 disabled go to Task 6 Otherwise continue with Step 2 to configure a customized setting for either attribute 114088 Rev A Using Technician Interface Software 2 To define the UNIX system facility you want to receive Syslog messages from the router enter the following set wfSyslogHostTable wfSyslogHostLogFacility lt host_ P_address gt lt 128 1361 144 1521 1601 168 1761 184 gt commit 128 local0 160 local4 136 locall 168 local5 144 local2 176 local6 152 local3 184 local7 3 To optionally enable Syslog message time sequencing for the remote host enter the following set wfSyslogHostTable wfSyslogHostTIlmeSeqEnable lt host_IP_address gt 1 commit Note Only hosts represented by entries that are ENABLED wfSyslogHostDisable 1 and have an operational state of ACTIVE wfSyslogHostOperState 1 receive
308. the modem to an on hook state Going on hook should cause the dialed connection between the local and the remote modems to be dropped You may also encounter differences in modem interface cabling requirements B 8 114088 Rev A Using Out of Band Access to Transfer Files For more detailed information on these and other modem related issues refer to the user manual for the modem you want to use for Technician Interface access Viewing xmodem Log Events To view the log information for xmodem YMODEM file transfers enter the following command at the Technician Interface command line prompt log eXMODEM fdi Hardware Configuration To transfer files out of band between any Bay Networks router and a remote workstation you use the hardware configuration shown in Figure B 1 Figure B 1 shows how to connect a Bay Networks router and workstation to a dial network using two Hayes compatible modems With this configuration you use a remote PC or UNIX workstation The configuration supports a remote connection to the router s Technician Interface Modem Dial Network Modem TS0005A Figure B 1 Modem Connection Note Use a network interface cable to connect a modem to the dial network Use an RS 232 C modem cable to connect a workstation or Bay Networks router to a modem Use cable No 7825 for all except BLN BLN 2 and BCN routers Use cab
309. the other protocols supported by xmodem commands refer to For More Information later in this appendix B 2 114088 Rev A Using Out of Band Access to Transfer Files In support of Bay Networks router file management tasks the YMODEM batch protocol has the following capabilities Supports batch file transfers moving one or more files specified in a single xmodem command Automatically converts filenames received during batch file transfer operations Transfers binary files with error detection Marks every transferred file with a time stamp which indicates the most recent modification date of a file Automatically deletes a file unsuccessfully transferred between a router and a workstation Allows you to cancel a file transfer operation while that operation is still in progress Y MODEM transfers binary files intact with no padding and using a default packet size of 128 bytes To use the YMODEM protocol a Bay Networks router does not require access in band to the IP network on which a source destination remote workstation also resides Instead you use out of band dial network access from the UNIX or 386 486 DOS workstation to run Technician Interface xmodem commands and conduct file transfers through a modem You are most likely to use the YMODEM protocol to move files when your IP network is down or impaired 114088 Rev A B 3 Using Technician Interface Software The xmodem Command The following repr
310. the range Also set the value of wfSyslogEntFltrSlotUppBnd Slot Upper Bound to the higher number of the range Any range you specify includes the values for the lower and upper bound parameters attributes For example if you specify a lower bound of 1 and an upper bound of 4 Syslog forwards all event messages logged on Slots 1 through 4 inclusive Syslog ignores all other event messages To filter events for a specific slot set the value of wfSyslogEntFltrSlotLowBnd to the desired slot number Set the value of wfSyslogEntFltrSlotUppBnd to the same number For example to forward only event messages logged on Slot 2 enter 2 as the value of wfSyslogEntFltrSlotLowBnd and as the value of wfSyslogEntFltrSlotUppBnd If you do not want to filter messages by slot number s accept the lower and upper bound default values of 0 set wiSyslogEntFltrEntry wfSyslogEntFltrSlotLowBnd lt host_IP_address gt lt entity_code gt lt filter_index gt lt 0 14 gt 1 3 6 1 4 1 18 3 3 2 15 3 1 10 C 42 114088 Rev A Using Syslog Messaging to Monitor Router Parameter Slot Upper Bound Attribute Name wfSyslogEntFltrSlotUppBnd Attribute Number 11 Default 0 Range Otol4 Function Along with the Slot Lower Bound this parameter attribute specifies a slot number or range of slot numbers Syslog forwards to the remote host associated with this filter messages logged only on the slot s you specified Consider the location of each rout
311. ti exit disc 1 Total Peers 1 Total Nets 256 For ip bgp_routes N the display specifies e Total number of peers e Total number of networks IGP 5 EGP 0 INC 251 e Total number of routes announced to the first 5 peers on each slot 114088 Rev A 8 69 Using Technician Interface Software Example bgp routes Enter the following command to display routes announced to BGP peers known to the local router ip bgp_routes N Network Mask Peer Rem Addr NextHop Address Org Loc Pref 192 32 174 4 30 192 32 175 6130 192 323 175129 IGR As Path SEQ 2 192 32 174 8 30 192 32 175 130 192 32 175 129 IGP As Path SEQ 2 192 32 174 32 27 192 32 175 130 192 32 175 129 IGP As Path SEQ 2 192 32 174 96 27 192 32 175 130 192 32 175 129 IGP As Path SEQ 2 192 32 174 128 27 192 32 175 130 192 32 175 129 IGP As Path SEQ 2 192 32 174 160 27 192 32 175 130 192 32 175 129 INC As Path SEQ 2 192 32 174 192 27 192 32 175 130 192 32 175 129 INC As Path SEQ 2 SLOT 4 Total Peers 1 Total Nets 7 7 Routes To 192 32 175 129 192 32 175 130 IGP 5 EGP 0 INC 2 Example ospf_Isdb Define a command to display the OSPF Link State Database for Type 1 link states in area 0 0 0 0 ip ospf_Isdb t1 a0 0 0 0 The following is a typical response from the router LS Type Link State ID Adv Router Metric ASE Fwd Addr Age Seq Nbr Router 192 32 174 62 192 32 174 62 100 1904 80000009 Ro
312. ting a partition When you issue the partition delete command without specifying a subvolume all files on lt vol gt b are lost 114088 Rev A 4 21 Using Technician Interface Software Examples If you enter The system partition create 1 Divides memory card or SIMM Volume 1 into two vol umes storing all existing files in Volume 1a and creat ing and formatting a new Volume 1b partition delete 1b Removes Volume 1b files included or partition delete 1 4 22 114088 Rev A Chapter 5 Managing a DOS File System You can use the Technician Interface to manage DOS files on a Bay Networks router This chapter is intended only for users whose routers are equipped with a diskette drive To manage a DOS file system you do the following Name files Mount and unmount a volume Change the present working directory Display a directory Label a diskette Create and remove a directory Rename a file or directory Copy files to different filenames on the same directory or to a different directory Transfer a file Change a file s attributes Display the contents of a file Delete a file 114088 Rev A 5 1 Using Technician Interface Software Overview The DOS file system on the router reads and writes to the diskette The diskette gives the system access to the software image and configuration file during a cold start A cold start occurs after a power cycle The DOS file system accepts the DOS command
313. tive unused and best routes ip routes A Network Mask Proto Age Sl Cost NextHop Address AS Weight 0 0 0 0 0 RIP 20 2 2 19232 174433 7p9e0002 0 0 0 0 0 Direct 385 0 131071 Unreachable ffffffff 0 0 0 0 32 Host N A 0 O un IP cct 0 00000000 6 0 0 0 8 Direct 385 2 0 6 6 6 6 00000000 6 0 0 0 32 Host N A 2 0 Broadcast 00000000 6 6 6 6 32 Host N A 2 0 This Router 00000000 6 255 255 255 32 Host N A 2 0 Broadcast 00000000 128 128 0 0 16 RIP 20 2 2 192 32 174 33 7b9e0002 129 128 0 0 16 RIP 20 2 29252327 UTA 33 7b9e0002 130 128 0 0 16 RIP 20 2 2 192 32 174 33 7b9e0002 131 119 0 0 16 RIP 20 2 2e VOR 32 0 fA 33 7b9e0002 134 177 0 0 16 RIP 20 2 2 192 32 174 33 7b9e0002 141 251 0 0 16 RIP 20 2 2 192 32 174 33 7b9e0002 146 240 0 0 16 RIP 20 lt 2 2 192 32 174 33 7b9e0002 170 41 0 0 16 RIP 20 2 2 192 32 174 33 7b9e0002 172 14 0 0 16 RIP 20 2 21 92 322174533 7o9e0002 172 15 0 0 16 RIP 20 2 2192 32217433 7b9e0002 192 1 1 0 24 RIP 20 2 2 192732174733 7b9e0002 192 1 2 0 24 RIP 20 2 2 192 32 1 745333 7b9e0002 192 32 1 0 24 RIP 20 2 2 192 32 174 33 769e0002 Total Networks on Slot 2 268 The asterisk indicates best routes or routes currently being used by IP 114088 Rev A 8 67 Using Technician Interface Software Example bgp routes Enter the following command to display the entire BGP table of routes ip bgp_routes Network Mask Peer Rem Addr NextHop Address Org Loc Pref Best Us
314. to the NLSP based ping However NLSP based ping is not currently an option of the ping ipx command on the router IPX configuration request packets typically obtain configuration information from other devices on a NetWare network However the router only uses these packets to test the reachability of a remote device that listens for and responds to IPX configuration request packets Note The Bay Networks IPX router will neither send nor acknowledge IPX configuration request packets addressed to network 0x00000000 local network destination or network OxFFFFFFFF or host 0xO00000000000 or host OXFFFFFFFFFFFF broadcast host destination The IPX router responds only to request packets sent directly to one of its interface addresses If you send a request packet from a router to an IPX interface on that same router the router does not send the request packet out onto the line Instead the router sends the packet internally to the specified interface which then responds internally Enter the following to ping a remote device running IPX ping ipx lt PX_address gt t lt timeout gt r lt repeat_count gt lt IPX_address gt is the required IPX address in hexadecimal or decimal notation of the remote device An IPX address in hexadecimal notation consists of a 4 byte network address and a 6 byte host address separated by a period for example Ox0000AB 12 0x000000CD 1234 leading zero padding is not required The
315. to 23 and the 23 44 fourth counter to 44 The first third and fifth counters are not changed Customizing Hardware Compression Search Depth If you have model BLN BLN 2 and BCN routers configured to run frame relay on circuits of an Octal Sync link module you can customize the depth of search for tokens to replace data patterns sent and received by the optional Octal Sync Hardware Compression daughterboard Note For more information on hardware and software compression services refer to the Configuring Data Compression Services guide By increasing the search depth you may enable the daughterboard to attain compression ratios higher than are possible using default or inherited search depth values The results you achieve depend greatly on the type of data you want to compress over a circuit or line Note however that increasing the compression ratio beyond a certain value on a circuit or line may also lower the throughput on that circuit or line Configure search depth attributes for the best trade off between compression ratio and end to end for example workstation to workstation throughput on the circuit or line Use Technician Interface commands to customize e wfWcpLineSearchDepth e wfWcpCircuitSearchDepth Note Only expert network technicians or administrators should attempt to modify the set value of these WCP attributes You cannot modify these attributes from a Site Manager workstation 114088 Rev
316. to Managing Routers and BNX Platforms Each entity filter selects only event messages that e Originate from a router software entity that you specify by entity number AND e Have an event message number OR severity level that matches one of the values you configured AND e Originate from a router slot you specify Figure C 2 illustrates how an entity filter limits the number of event messages forwarded by Syslog from a router to a specific remote host Each filter attribute or parameter entity number event numbers or severity levels and slot numbers that you specify increases the selectivity of a filter 114088 Rev A New unfiltered the events log Using Syslog Messaging to Monitor Router Entity Filter for One Host Select by Event Number Range Filtered i event i Select by Select by Slot messages gt fora messages from gt Entity _ OR a Number Range i Number 5 designated S Select by Event i remote host Polling the Identifying Severity Levels TSO002A Figure C 2 Router Event Message Filtering for One Host Events Log Syslog polls the events log buffer on the local slot to retrieve any new messages logged since the previous polling attempt Syslog polls the local slot at an interval determined by the set value of the wfSyslogPollTimer poll timer attribute You can accept the system default value or set a customize
317. tocol program running on the workstation and the YMODEM program running on the router This handshaking in turn triggers the start of the file transfers you specified in the xmodem command entered at the Technician Interface command line prompt B 12 114088 Rev A 11 12 Using Out of Band Access to Transfer Files Workstation and router response typical XMODEM File Receive Function CRC mode requested on command line YMODEM Batch Protocol YMODEM Batch Receive Complet away for 37 seconds the amount of time the router s Technician Interface relinquished control to the router s YMODEM protocol program i e the duration of the file transfer operation If you are finished transferring files from the router to the remote workstation enter logout at the Technician Interface command line prompt This action returns control to the UNIX workstation command line prompt Enter the Is command to list the contents of the current receiving directory to verify that the file transfer operation completed successfully Transferring Files from UNIX Workstation to Router To transfer one or more files from your UNIX remote workstation to a Bay Networks router use the following procedure 1 At the UNIX command line prompt enter a cd command to change if necessary from the current directory to the directory that contains the files you want to transfer to the router Enter a dir command if neces
318. transmission time 9 seconds Receiver invoked CRC mode on ACK on sector 1 Sector 0 sent Sector 32 sent Send Complete 56 Sectors Transferred in 31 seconds Transfer Rate 231 Characters per Second Closing down Batch Transmission Non ACK on Sector 1 Sector 0 sent Batch Send Complete away for 40 seconds the amount of time the workstation s command line relinquished control to the workstation s YMODEM protocol program i e the duration of the file transfer operation f Enter the dir command to list the contents of the receiving volume in order to verify that the file transfer operation completed successfully If you are finished transferring files from the router to the workstation enter logout This action returns control to the UNIX workstation command line prompt B 16 114088 Rev A Using Out of Band Access to Transfer Files Out of Band File Transfers from a Windows Workstation This section describes the Bay Networks Communications Terminal Program and its applications for logging in to the Technician Interface of a remote router and for transferring files to and from a router xmodem and the Bay Networks Communications Terminal Program The Bay Networks Communications Terminal Program filename wfterm exe is an ASCII terminal emulation utility included with your Site Manager for Windows 3 1 PC software Nearly identical in purpose to the tip Terminal Interface Program command on a UNIX wor
319. tted router event message plus a priority code required by the remote host The remote host uses this information to make decisions on how to handle messages received from a router Priority Code The example of a priority code and its text Figure C 4 consists of a facility code plus an error level code in the form facility error Facility Code 2340 Error Level Code 740 TSO004A Figure C 4 Syslog Message Composition The facility code identifies a standard UNIX system facility that receives a message from an internal or external software entity The Local lt 0 7 gt UNIX system facilities receive event messages in Syslog format from routers in your network The following table relates UNIX system facility names to their respective facility codes on a workstation C 10 114088 Rev A Using Syslog Messaging to Monitor Router UNIX System Facility Name Facility Code equivalent decimal value Local 0 1 Local 1 Local 2 Local 3 Local 4 Local 5 Local 6 Local 7 ooINIDDJA J AJOJN The error level code identifies the severity level level of urgency of a received message for UNIX system handling decisions such as logging displaying printing or forwarding the message The following table shows one way to map UNIX system error codes and error levels to the severity levels of event messages from Bay Networks routers Suggested Mapping to
320. ttribute to the low number of the range Set the value of the wfSyslogEntFltrLogEvtUppBnd Log Event Upper Bound parameter to the high number of the range Any range you specify includes the values for the lower and upper bound parameters attributes For example if you specify a lower bound of 2 and an upper bound of 7 Syslog forwards all messages with event codes of 2 through 7 inclusive logged by the entity defined under wfSyslogEntFltrNum Filter Entity Name Syslog ignores all other event messages To filter select only a specific event set the value of wfSyslogEntFltrLogEvtLowBnd to the code number for that event Set the value of wfSyslogEntFltrLogEvtUppBnd Log Evt Upper Bound to the same code number For example to forward only log messages that have an event code of 10 enter 10 as the value of wfSyslogEntFltrLogEvtLowBnd and as the value of the wfSyslogEntFltrLogEvtUppBnd Log Evt Upper Bound If you do not want to filter by event code accept the lower and upper bound default values of 0 to 255 In this case Syslog checks for filtering criteria based on a message severity mask wfSyslogEntFltrSevMask If you specify lower and upper boundary values of 255 the wildcard entity number Syslog ignores this attribute as filtering criterion set wfSyslogEntFltrEntry wfSyslogEntFltrLogEvtLowBnd lt host_IP_address gt lt entity_code gt lt filter_index gt lt 0 255 gt 1 3 6 1 4 1 18 3 3 2 15 3 1 7 114088 Rev
321. twork 1 Bay Networks HDLC encapsulation also referred to as Bay Networks Standard Point to Point with external clocking 2 Frame Relay Annex D Frame Relay LMI Frame Relay Annex A Pro Frame Relay settings fr Configures the router s synchronous port as a Frame Relay connection With this setting use one of the following options to specify a DLCMI setting annexd annexa or Imi annexd annexa Imi When one of these options is used with the fr setting it specifies a DLCMI setting Use the same setting as the network to which the router s Frame Relay interface is connected The default setting for Frame Relay is annexd Internal clocking setting int_clk Sets the router s synchronous port to internal clocking at 1 25 MB s If you do not specify the int_clk setting the router defaults to external clocking IP connector setting lt interface gt Specifies the type of IP connector you are configuring For the AN and ANH use com or com2 for synchronous media For the ASN use com lt network_module_no gt lt port_no gt continued 114088 Rev A System Administration Table 8 2 ifconfig Command Settings continued Setting Description IP address settings lt I P_address gt Specifies the IP address of the interface you set with lt interface gt Provide this address in dotted decimal notation lt subnet_mask gt Specifies the IP su
322. twork administrator sets on the router for console or Telnet access to the router You can also customize the Technician Interface Welcome screen with a message appropriate for the requirements of your organization or network site Refer to Customizing the Technician Interface Welcome Message in Chapter 8 for instructions Login Timeout Guidelines Keep the following in mind when you enter your login name User or Manager and password e If you do not make an entry at the Login prompt for 1 minute default the Technician Interface disconnects from the router e Ifyou do not make an entry at the Password prompt for 1 minute default the Technician Interface returns you to the Login prompt e If you enter the login name or password incorrectly 3 times default the Technician Interface disconnects you from the router e Ifyou do not make an entry at the SecurID prompt for 1 minute default the Technician Interface returns you to the Login prompt e Ifyou enter the SecurID PASSCODE incorrectly 4 times default the SecurID client software disconnects you from the router and initiates deactivation of your SecurID card account You must request reactivation from the SecurID administrator for your network 114088 Rev A 1 14 Using Technician Interface Software Login Configuration For instructions on changing the default values associated with the console port see Configuring Console Port Parameters in Chap
323. types you want to display Enter the log command as follows to limit the display of events log lt vol gt lt log_file gt d lt date gt t lt time gt e lt entity gt f lt severity gt s lt s ot_ID gt p lt rate gt c lt code_no gt w You can enter any combination of the following optional parameters lt vol gt lt log_file gt is the volume number or letter where a log file is located and the name of the log file The system displays the events saved to this file lt date gt is the date in mm dd yy format The system displays the events logged on and after that date lt time gt is the time in hh mm ss format The time you can enter ranges from 00 00 00 to 23 59 59 The system displays the events logged at and after that time lt entity gt is a software service that logs events Quotes are required when the lt entity gt contains spaces Use uppercase letters when specifying the lt entity gt See Event Messages for Routers and BNX Platforms for a list of the entities lt severity gt is one or more letter codes for an event type The system displays the events by type The severity codes are f or F for fault i or I for informational t or T for trace w or W for warning and d or D for debug Debug events are intended only for Bay Networks Technical Response Center personnel lt slot_ID gt is the number of the slot containing a link module The system displays the events associated with the li
324. u can display a list of instance identifiers using the list command Enter the list command with the following parameters to display a list of instance identifiers list instances lt object_name gt or list i lt object_name gt instances or i represents the optional key word instances lt object_name gt is the name of the object at the level above the attributes 7 2 114088 Rev A Examples If you enter list list wKCSMACDEntry list instances wfCSMACDEniry list i wfCSMACDEntry Accessing the MIB The console displays All object names and their associated object identifiers wfCSMACDEntry 1 wfFddiEntry 1 3 wfFddiSmtEntry 1 36141183419121 All attribute names and associated attribute identifiers of the wfCSMACDEntry object wfCSMACDDelete 1 wfCSMACDEnable 2 w CSMACDState 3 All instance identifiers of the wfCSMACDEntry object configured on your system inst_ids 2 1 2 2 4 1 4 2 114088 Rev A 7 3 Using Technician Interface Software Getting MIB Values The get command displays the value of a MIB object You can also insert a wildcard character into the attribute name or into the instance identifier to display the values of multiple objects Enter the following to display one or more object identifiers and their associated values get lt object gt lt attribute gt lt instance gt or g lt object gt lt attribute gt lt in
325. u enter either show at routes or show at nets but not both 114088 Rev A xxi Using Technician Interface Software Acronyms ACE Advanced Communications Engine AFN Access Feeder Node ALN Access Link Node AN Access Node ANH Access Node Hub APING APPN Ping APPN Advanced Peer to Peer Routing ARP Address Resolution Protocol ASCII American Standard Code for Information Interchange ASN Access Stack Node ASN 1 Abstract Syntax Notation AT AppleTalk Protocol ATM Asynchronous Transfer Mode AURP Appletalk Update based Routing Protocol BCN Backbone Concentrator Node BGP Border Gateway Protocol BLN Backbone Link Node BLN 2 Backbone Link Node 2 power supplies BOOTP Bootstrap Protocol CLNP Connectionless Network Protocol CN Concentrator Node CPU Central Processing Unit CRC Cyclic Redundancy Check CSMA CD Carrier Sense Multiple Access with Collision Detection DCM Data Collection Module DLCMI Data Link Control Management Interface DLSw Data Link Switch DOS Disk Operating System DRAM Dynamic RAM DSAP Destination Service Access Point DVMRP Distance Vector Multicast Routing Protocol xxii 114088 Rev A EOF EGP FAT FDDI FIFO FRSW FTP FN FR FRE GAME GMT HDLC HSSI ICMP IGMP IN IP IPX ISDN LAN LAPB LED LLC LMI LN LNM LSP MAC MCTI MIB MOSY NML About This Guide End of File Exterior Gateway Protocol File Allocation Table Fiber Distributed Data Interface First In First Out Frame Relay Switch File Tr
326. umber or numbers after the reset command If you do not enter a slot number when issuing the reset command the entire system reboots with the default router software image and configuration Entering the reset command without entering at least one slot number is equivalent to entering the boot command Enter the following to reset the entire system reset The system returns the following message Reset all slots y n If you still want to reset all slots enter y yes Entering n no aborts the command Note With multiple slot routers such as the BLN and BLN 2 a local Flash volume serves as a backup source for files required by any slot you want to reset For this reason multiple slot routers running Version 7 60 or later with the dynamic loading feature must contain a Flash volume that contains a copy of the router s software image The following events occur when you reset a processor module 1 The GAME operating system software running on the processor module forwards a boot request to the other processor modules 2 The first processor module to respond to the boot request forwards the router software image resident in its memory 3 The resetting processor module receives and executes the router software image At this instant connectivity to the associated slot and the services provided in the slot are disrupted The other processor modules resynchronize their routing tables after the slot fails to
327. uring Syslog Global Attributes Once you create and enable Syslog on the router you can accept the default values for the wfSyslogMaxHosts and wfSyslogPollTimer attributes or you can configure a customized value for either attribute If you want to accept default values for the Syslog global attributes go to Task 5 otherwise perform the following steps 114088 Rev A 1 Using Syslog Messaging to Monitor Router Configure the maximum number of active hosts served by Syslog on the router set wfSyslog wfSyslogMaxHosts 0 lt 1 10 gt commit The default setting for wfSyslogMaxHosts is 5 hosts You can add to the Syslog Host Table more entries than the configured maximum but Syslog forwards messages only to the first n active hosts where n the current value of wfSyslogMaxHosts Configure the interval in seconds between Syslog polling cycles on the router set wfSyslog wfSyslogPollTimer 0 lt 5 6 0000 gt commit The default setting for wfSyslogPollTimer is 5 seconds Next add a remote host to the Syslog Host Table Task 5 Adding a Remote Host to the Syslog Host Table You must define any remote hosts that you want to receive Syslog event messages from routers in your network If this is the first host you are adding to the Syslog host table go to Step 1 Otherwise you may want to first obtain a list of hosts already configured on the router To list existing entries in the Syslog host table enter
328. urround each lt string gt within the echo command with double quotes if the lt string gt contains one or more spaces or semicolons Precede each of the double quotes surrounding the lt string gt with a backslash If you do not use double quotes insert a backslash before the semicolon that separates the echo command from the next command Insert echo to command the system to display blank lines between commands within an lt alias_value gt 114088 Rev A 9 5 Using Technician Interface Software You can also embed parameter references within an echo command Refer to the first example to see how this is done Examples If you enter alias ipstats echo echo IP Input Statistics echo get WfipInterfaceEntry 21 echo echo IP Output Statistics echo get WfipinterfaceEntry 24 The system creates an alias named ipstats that invokes the commands shown in quotes The text wraps as you enter text past column 80 Do not press the return key until you have entered the entire command ipstats The system displays the following IP Input Statistics wfIpInterfaceEntry wfIpInterfaceInReceives 192 32 6 4 3 141501 wfIpInterfaceEntry wfIpInterfaceInReceives 192 32 15 21 4 41304 wfIpInterfaceEntry wfIpInterfaceInReceives 192 32 16 1 2 538 wfIpInterfaceEntry wfIpInterfaceInReceives 192 32 243 2 1 130137 IP Output Statistics wfIpInterfaceEntry wfIpInterfaceF
329. use acknowledge that such portions of the software were developed by the University of California Berkeley The name of the University may not be used to endorse or promote products derived from such portions of the software without specific prior written permission SUCH PORTIONS OF THE SOFTWARE ARE PROVIDED AS IS AND WITHOUT ANY EXPRESS OR IMPLIED WARRANTIES INCLUDING WITHOUT LIMITATION THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE In addition the program and information contained herein are licensed only pursuant to a license agreement that contains restrictions on use and disclosure that may incorporate by reference certain limitations and notices imposed by third parties ji 114088 Rev A Bay Networks Software License Note This is Bay Networks basic license document In the absence of a software license agreement specifying varying terms this license or the license included with the particular product shall govern licensee s use of Bay Networks software This Software License shall govern the licensing of all software provided to licensee by Bay Networks Software Bay Networks will provide licensee with Software in machine readable form and related documentation Documentation The Software provided under this license is proprietary to Bay Networks and to third parties from whom Bay Networks has acquired license rights Bay Networks will not grant any Software lic
330. uter 192 32 174 65 192 32 174 65 1 1773 8000000b Router 192 32 174 66 192 32 174 66 1 1707 8000000c 8 70 114088 Rev A System Administration The column headings in screens invoked by the ip command have the following meanings asterisk Adv Router Age ASE Fwd Addr Cost Link State ID LSID Loc Pref LS Type Indicates routes actively used by IP versus routes not currently used The asterisk appears only when you specify the all routes A flag Indicates the OSPF Router ID of the advertisement s originator For router links advertisements this field is identical to the Link State ID field The network s Designated Router originates Network Link advertisements Area border routers originate Summary Link advertisements AS boundary routers originate AS External Link advertisements Number of seconds since this route was last updated or verified to be correct The meaning of too old depends on the routing protocol specified under Proto Note that RIP and EGP routes are refreshed only on a slot that receives a routes update Route ages may be different on each slot for this reason An address for forwarding packets to a destination external to the AS but not accessible through an AS boundary router Number of hops to reach the destination Indicates the piece of the routing domain that the advertisement describes as follows If LS Type 1 LSID the originating router s Router ID If LS Typ
331. value of wfSyslogEntFltrFaultMap is 3 mapping router FAULT level messages to UNIX system level CRIT messages C 20 114088 Rev A Using Syslog Messaging to Monitor Router b Change router WARNING message mapping as follows set wfSyslogEntFlitrEntry wfSyslogEntFlirWarningMap lt host_IP_address gt lt entity_code gt lt filter_index gt lt 1 8 gt The default value of wfSyslogEntFltrWarningMap is 5 mapping router WARNING level messages to UNIX system level WARNING messages Example set wfSyslogEntFlitrEntry wfSyslogEntFlirWarningMap 5 The example command maps each Warning level router event message to a Warning level UNIX system error message c Change router INFO message mapping as follows set wfSyslogEntFlitrEntry wfSyslogEntFltrinfoMap lt host_IP_address gt lt entity_code gt lt filter_index gt lt 1 8 gt The default value of wfSyslogEntFltrInfoMap is 7 mapping router INFO level messages to UNIX system level INFO messages d Change router TRACE message mapping as follows set wfSyslogEniFlitrEntry wfSyslogEntFlirTraceMap lt host_IP_address gt lt entity_code gt lt filter_index gt lt 1 8 gt The default value of wfSyslogEntFltrTraceMap is 3 mapping router TRACE level messages to UNIX system level CRIT messages e Change router DEBUG message mapping as follows set wfSyslogEntFlitrEntry wfSyslogEntFlitrDebugMap lt host_IP_address gt lt entity_code gt lt filter
332. ve To initiate graceful shutdown followed by a system boot enter the following command at the Technician Interface prompt boot shutdown lt vol gt lt image_name gt lt vol gt lt config_name gt The console displays the following message during shutdown Shutdown in progress If shutdown succeeds the console displays the message Shutdown is complete Upon issuing this message the system performs a boot operation using the image and configuration files you specified originally If shutdown fails the console displays the message Continue shutdown Y N If you choose N no at this time the system terminates shutdown and displays the following message on the console device Shutdown aborted Upon issuing this message the system performs a boot operation using the image and configuration files you specified originally 114088 Rev A 8 13 Using Technician Interface Software If you choose instead to Continue Y the system continues the shutdown attempt We recommend that you terminate this procedure after no more than one additional shutdown attempt Configuring Delayed Boot Services You can configure the router to boot at a date and time that you specify With Technician Interface commands you Add delayed boot services to a router Schedule one or more nonrepeatable delayed boot events on a router Name the router software image file and the router configuration file you want
333. ved messages into Syslog message format e Forwards Syslog messages to remote hosts Outgoing wW Syslog Messages 7 a IP Network Log Slot Using Syslog Messaging to Monitor Router 1 1 J Message Forwarded te ee gt Remote Host Unix Workstation Identifies message sources e Determines message priorities e Logs displays prints and or forwards messages Figure C 1 i UNIX Workstation Message Printed Message Disk Logged Message Displayed TSOOOLA Syslog and Syslogd Operation 114088 Rev A C 3 Using Technician Interface Software Remote Hosts and Filters You use a management workstation to monitor event messages generated by specific software entities on each router in your network To receive at a management workstation event messages from a router you must e Enable Syslog on the router e Define in the Syslog host table any remote hosts you want to receive messages e Configure entity specific message filters for each host You can configure entity filters by means of the Configuration Manager tool under Site Manager or by means of set and commit commands you enter at the Technician Interface of the router Note This appendix covers Syslog configuration via Technician Interface commands only For information on how to configure Syslog through Site Manager refer
334. we recommend that you use the following conventions when naming files so that you can distinguish files by type e Use the exe file extension for software images for the FRE and other modules BLN BLN 2 BCN AFN AN ANH and ASN The default software images are bn exe afn exe an exe and asn exe Use the out file extension for software images for the ACE modules FN LN CN and ALN The default software image is ace out e Use the cfg file extension for alternate configuration files The default configuration file is config se the al file extension for alias files U e Use the log file extension for log files U se the bat file extension for script files Mounting a Volume Use the mount command to make the diskette drive available Issue the following command when you install a diskette mount a The screen displays a File System Check Report Figure 5 1 5 4 114088 Rev A Managing a DOS File System K A mount a Device label Directory A File System Check Report Allocated but unused clusters Used but unallocated clusters Cluster chains shared between files File size is wrong Missing EOF Directory errors e a a a e N e a E a f Ss x Figure 5 1 Mounting a Volume The File System Check Report indicates the number of errors on a diskette All values should be zero Nonzero values indicate file corruption Refer to the description of these values an
335. wfBgpGroup 3 wflpPolicyGroup wflpRouting 6 wfTcpGroup wflnternet 3 wfUdpGroup wflnternet 4 wfSnmpGroup wflnternet 5 wiTftp wflnternet 6 wfTelnetGroup wflnternet 7 Figure A 1 Sample Top Level Hierarchy of the Bay Networks Router MIB continued 114088 Rev A A 5 Using Technician Interface Software wflnternet continued wfBootpGroup wfinternet 8 wfBootpClientGroup wfBootpGroup 1 wfBootpServerGroup wfBootpGroup 2 wfBootpRelayAgentGroup wfBootpGroup 3 wfRarpGroup wflnternet 9 wfFtpGroup wflnternet 10 wfNetBlOSIpGroup wflnternet 11 wfDvmrpGroup wflnternet 12 wflgmpGroup wflnternet 13 wfPimGroup wflInternet 14 wflpv6Group wflInternet 16 wfAppletalkGroup wfApplication 4 wflpxGroup wfApplication 5 wfOsiGroup wfApplication 6 wfVinesGroup wfApplication 8 wfWanGroup wfApplication 9 wfFrameRelayGroup wfWanGroup 1 wfPppGroup wfWanGroup 2 wfX25Group wfWanGroup 4 wfAtmGroup wfWanGroup 5 wfAtmLeGroup wfAtmGroup 20 wfFrswGroup wfWanGroup 6 wfSmdsSwGroup wfWanGroup 7 wflsdnGroup wfWanGroup 8 wfFrameRelay2Group wfWanGroup 9 wfXnsGroup wfApplication 10 wfLanManagerGroup wfApplication 12 wfAppnGroup wfApplication 14 wflpexGroup wfApplication 15 wflntegratedServicesGroup wfApplication 16 wfRRedGroup wfApplication 17 wfBotGroup wfApplication 18 wfAccountingGroup wfApplication 20 Figure A 1 Sample Top Level Hierarchy of Bay Networks Router MIB Objects conti
336. workstation and the target router Quit Wfterm by selecting the Exit option under the File pull down menu as shown in Figure B 12 Wellfleet Communication Terminal Program gt AG Modem Phone File Transfers Help Exit Alt F4 Figure B 12 Exiting Quitting the Wfterm Program 114088 Rev A B 31 Overview Appendix C Using Syslog Messaging to Monitor Router Events This appendix provides An overview of Syslog services on a Bay Networks router and counterpart Syslogd services on a UNIX workstation Procedures for Configuring Syslogd on a UNIX workstation Configuring Syslog services on a router Managing Syslog services on a router An example Syslog configuration Descriptions of Syslog MIB attributes parameters To use the information in this appendix you should have experience with UNIX system commands and facilities and also with the Technician Interface for Bay Networks routers You can use the Syslog messaging feature of the Bay Networks router software to manage router event messages on any UNIX based network management platform The Syslog software supports this functionality by communicating with a counterpart software component named Syslogd on your management workstation 114088 Rev A C 1 Using Technician Interface Software Syslogd is a UNIX daemon software component that receives and locally logs displays prints and or forwards messages that originate from sources internal an
337. writing to the diskette Enter the command as follows to force an unmount unmount f Changing the Working Directory Use the cd command to change the present working directory You can also use this command to display the present working directory Enter the following command to display the present working directory cd Enter the following command to change to another working directory cd lt dir_name gt 114088 Rev A 5 7 Using Technician Interface Software Examples If you enter The system cd Displays the present working directory cd old Changes the present working directory to the subdirectory old cd old logs Changes the present working directory to the subdirectory oldVlogs cd Changes the present working directory to the parent direc tory cd Changes the present working directory to the root directory Displaying a Directory Use the dir command to display a list of the files in a directory You can enter the wildcard characters and to display filenames with the character strings you specify You cannot use wildcard characters in the directory portion of the pathname Enter the following command to list the files stored in the default directory dir Enter the following command to display selected contents of another directory where lt dir_name gt is the path to the directory and lt filename ext gt is the file specification you want to display dir lt pathname gt lt filename
338. x fd log x fdfitw elP log x log x fdfitw Managing Events The events log Includes only debug fault and trace events Includes only debug and info events on slot 2 Includes only fault events for the router operating system entity Includes only debug events for OSPF running on Slot 2 Includes no events since none are specified Includes all events since all severity levels are specified Excludes only debug events Excludes all except IP events Excludes no events since none are specified Excludes all events since all severity levels are specified Displaying Active Write Filters Display a list of all write log input filters currently in effect across the router as follows If you enter The Technician Interface log z Displays write filters currently in effect across all slots log z S lt s ot gt Displays write filters currently in effect for the slot you specify 114088 Rev A 6 5 Using Technician Interface Software Applying Read Display Filters to the Events Log Enter the following command to display the events stored in all event buffers log The system sorts the events and displays them in chronological order For information about the event display format or about specific events refer to the guide Managing Routers and BNX Platforms Note To abort the command press control c hold the control key and press c Add arguments to the log command to select the event
339. y the number of bits in the address mask by entering a decimal number 1 to 24 starting with the msb in the prefix portion of your entry ospf_Isdb a lt area_address gt Retrieves data for the OSPF area you specify after the a flag ospf_Isdb A Retrieves e The entire table of routes including best routes and routes not used or e The entire OSPF LSDB 20 lines max per route advertisement routes ospf_Isdb c lt circuit_no gt Retrieves data for the circuit number you specify after cache the c flag See Determining Circuit Numbers later in this chapter i lt BGP_router_ID gt Retrieves routes to or from a BGP peer that you specify bgp_routes after the i flag M Retrieves only the contents of the multicast cache cache N Retrieves the BGP ANNOUNCE table of routes bgp_routes p lt ocal_peer_address Retrieves routes announced to a BGP peer you specify remote_peer_address gt by its local or remote address S lt source_address gt Retrieves data pertaining only to the advertising source ospf_Isdb you specify after the S flag 114088 Rev A 8 65 Using Technician Interface Software S lt slot_number gt Retrieves data for the slot you specify after the s flag routes bgp_routes If you also specify an address of 255 255 255 255 fora cache given slot the command displays only the internal cache for that slot If you do not ente
340. you hot swap a board Otherwise the DIAG LED on the front panel and LED 8 on the FRE module remain on indicating that diagnostics have not been run on the ILI Refer to the Installing and Maintaining BN Routers manual for more information If the board is functional and you do not issue the diags command the processor module automatically boots loads the configuration starts the router software services and operates normally although the DIAGS LED remains lit When you issue the diags or diags lt s ot_no gt commands from a local console rather than from a Telnet session the results depend on e The slot number you designate in the command line e The slot number from which you issue the command e The model of Bay Networks router e The type of router single slot or multislot Based on these variables the router system or slot performs a restart a warm boot or a cold boot operation The following table describes the different responses 8 30 114088 Rev A System Administration You issued a diag command from a Technician Interface session console or Telnet on one slot and the target lt S ot_no gt you specified was The same slot the session is A slot other than the slot the session is running on None running on Command gt diag diag lt S ot_no gt diag lt S ot_no gt Router V AN Cold boot Slot 1 Cold boot Slot 1 N A ANH e Run diagnostics on Run diagn
Download Pdf Manuals
Related Search
Related Contents
MG-6060 / MG-6030 (Magellan) : User Guide INS248-2 Premier 24 Installation Manual continued - Lochinvar Sure Trac® Ultra QUIZ FOR NEW MRI USERS 取扱説明書 お客さまへ Copyright © All rights reserved.
Failed to retrieve file