Home

Western Telematic RSM-16 User's Manual

image

Contents

1. 0 cece ttt 4 2 5 Configuration inclu rh hr uh ea de ee ele whole Bate ee a ETE ed n 5 1 5 1 Communicating with the RSM Unit llsseseses eee 5 1 5 131 The TextInterface oce o Ere Yd EO CRUEL eliexsi pEEGUMET 5 1 5 1 2 The Web Browser Interface isses ee 5 8 5 2 System SetUp Ports od ieee c4 eb Bee rade dee pap bee x a a eO 5 4 5 3 Configuration Menus 0 0 06 cee rn 5 4 5 4 Defining System Parameters es 5 5 5 4 1 The Real Time Clock and Calendar 00 0 cece eee ee 5 7 5 4 8 The Invalid Access Lockout Feature 0 00 sees 5 8 5 49 The Audit hog osi i beers nbus rx es ees e ed o e Reg ug 5 9 5 4 4 Callback Security ssa mter beer RR x UE RI RETRO RR eee 5 10 5 5 User Accounts x5 oo tie EN ERR TERI Rd RS ad oon babe us 5 12 5 5 4 Supervisor ACCESS 0 nn 5 12 5 5 2 Port AcCeSS Loses ad ee re erit d hee teer xe eee S 5 12 5 6 Managing User Accounts lssseeeeeee nets 5 13 5 6 1 Viewing User Accounts ne 5 13 5 6 2 Adding User Accounts an ea a tte nee 5 14 5 6 3 Modifying User Accounts 0 cect ete eee 5 16 5 6 4 Deleting User Accounts 0 000000 eee ee eee 5 16 5 7 RS232 Port Configuration 0 0 cette eae 5 17 5 7 1 RS232 Port Modes 0 cece eet eens 5 17 5 7 2 RS232 Port Configuration Menus iiis 5 19 5 7 3 Configuring the Internal Modem 00 0 cette 5 23 5 8 Network C
2. User Directory Site ID Real Time Clock 01 09 2007 00 26 06 Invalid Access Lockout On Audit Log On Without Syslog Callback Security On Callback Without Password Prompt PW Command Off Enter lt CR gt to change lt ESC gt exit Figure 5 3 The System Parameters Menu Text Interface UU 28 REMOTE SITE MANAGER Location undefined Navigation Home System Parameters Configuration site Ip undefined Set Site ID System Parameters N ration User Management Audit Log On Without Syslog SetAuditLog PW Command Oft z SetUser PW Real Time Clock Configure Invalid Access Lockout Configure Callback Security 2007 Western Telematic Inc 5 Sterling Irvine Ca 92618 http Avww wti com Figure 5 4 The System Configuration Menu Web Browser Interface 5 5 Configuration In the Text Interface the System Parameters menu is also used to create and manage user accounts and passwords Note however that when you are communicating with the unit via the Web Browser Interface accounts and passwords are managed and created via a separate menu that is accessed by clicking on the Users link on the left hand side of the menu The Text Interface Type F and press Enter The System Parameters Menu will appear as shown in Figure 5 3 Web Browser Interface Click the System Properties link on the left hand side of the RS
3. 3 From the Port Configuration Menu define the Port Name 4 Repeat steps 2 and 3 to assign identical names to the other ports in the Hunt Group For example a series of ports in a group could all be named SERVER 5 To connect to the next available port in the hunt group invoke the C command using the port name to specify the desired group For example C SERVER Enter 6 Your port will be connected to the first available port in the group If all ports are presently connected the RSM will respond with the BUSY message 7 It is only necessary to enter enough letters of the port name to differentiate Hunt Group ports from other ports Type an asterisk to represent the remaining characters in the name For example to connect to the first available port in a group of ports named SALES1 SALES2 and SALES3 the connect command can be invoked as c S Enter providing no other port names begin with the letter S Notes e If the Hunt Group method is used by a port or account that does not permit Supervisor commands the C command will only connect to the ports allowed by that user account e Hunt Group port names must be unique Otherwise ports with similar names will also be included in the Hunt Group Hunt Group Example 1 1 Ports 1 and 2 are Modem Mode ports and modems are installed at both ports Port 1 is named MODEM 1 and Port 2 is named MODEM2 2 Your resident port is Port 4 To connect to the f
4. STATUS undefined undefined undefined undefined undefined undefined undefined undefined MODEM l l l l l l SS E E RS Ro ooooooooo E a m p p p D D D D m Enter H for command menu RSM gt Figure 6 2 Port Diagnostics Screen RSM 8 Shown 6 2 The Port Diagnostics Screen SD The Port Diagnostics Screen provides more detailed information about each port To display the Port Diagnostics Screen access the Text Interface command mode and type SD Enter the screen will appear as shown in Figure 6 2 Note that the screen format will vary depending upon whether your account permits or denies access to Supervisor commands If the username entered at login does not allow Supervisor commands then the Port Diagnostics Screen will only display the status of the ports allowed by that account Ports that are not assigned to the account will not be displayed The Port Diagnostics Screen lists the following items Port The Port Number If this column contains a plus sign next to the port number this indicates that the port is allowed to invoke Supervisor commands providing the user account allows access to these commands Name The user defined name for each port Status The connect status for each port When the port is connected this column will list the number of the other port connected to this port If the column contains an asterisk this indicates th
5. 6 2 6 3 6 4 6 5 9 1 A 1 Instrument Front Panel Model RSM 8 Shown 00 cece eee eee eee ee 2 1 Instrument Back Panel Model RSM 8 isses esee 2 2 Instrument Back Panel Model RSM 16 isses esee 2 2 Instrument Back Panel Model RSM 32 sssssseseseeeee eee 2 2 The Port Status Screen Text Interface RSM 8 Shown 00 cee ee eee 3 3 The Home Screen Web Interface 1 0 0 cee 3 3 Terminal Block Assembly DC Units Only 00 0000 cece eee 4 1 The Port Status Screen Text Interface RSM 8 Shown lees eee eee eee 5 2 The Home Screen Web Browser Interface llle eee 5 3 The System Parameters Menu Text Interface llle eese 5 5 The System Configuration Menu Web Browser Interface 00e eeu 5 5 The Add User Menu Text Interface RSM 8 Shown isses 5 14 The Add User Menu Web Browser Interface RSM 8 Shown 0 005 5 14 Port Configuration Menu Text Interface llle 5 18 Port Configuration Menu Web Browser Interface ssl 5 18 Network Parameters Menu Supervisor Mode Only 0000 eee eeee 5 24 Network Configuration Menu Web Browser Interface lille esses 5 24 Network Parameters Menu Web Browser Interface lesse ee eee 5 26 Network Port Parameters Menu Web Browser Interface 20 eee eee 5 27 IP Security Menu Text Interface llle 5 29 I
6. In addition to merely entering a specific IP address or partial IP address in the Allow or Deny list you may also use any standard Linux operator or wild card In most cases the only operator used is EXCEPT and the only wild card used is ALL but more experienced Linux users may note that other operators and wild cards may also be used EXCEPT This operator creates an exception in either the allow list or deny list For example if the Allow list includes a line which reads 192 EXCEPT 192 255 255 6 then all IP address that begin with 192 will be allowed except 192 255 255 6 providing that this address appears in the Deny list ALL The ALL wild card indicates that all IP Addresses should be allowed or denied When ALL is included in the Allow list all IP addresses will be allowed to connect conversely if ALL is included in the Deny list all IP Addresses will be denied except for IP addresses listed in the Allow list For example if the Deny list includes a line which reads ALL EXCEPT 168 255 192 192 then all IP addresses except 168 255 192 192 will be denied except for IP addresses that are listed in the Allow list Net Mask Pairs An expression of the form n n n n m m m m is interpreted as a net mask pair A host address is matched if net is equal to the bitwise AND of the address and the mask For example the net mask pattern 131 155 72 0 255 255 254 0 matches every address in the range 131 1
7. undefined Location undefined Community public Enter lt CR gt to change lt ESC gt for previous menu Figure 5 19 SNMP Access Menu Text Interface SNMP TRAP Note The SNMP trap feature is enabled by defining at least one manager 1 Manager 1 undefined 2 Manager 2 undefined 3 Community public Enter lt CR gt to change lt ESC gt for previous menu Figure 5 20 SNMP Trap Menu Text Interface 0 REMOTE SITE MANAGER Location undefined Navigation Home Configuration SNMP Parameters System Parameters Serial Pot SNMP Access Network Configuration Enable Off v User Management SNMP Contact Users SNMP Location SNMP Community SNMP Trap SNMP Manager 1 SNMP Manager 2 Trap Community public Change SNMP Parameters 2007 Western Telematic Inc 5 Sterling Irvine Ca 92618 http www wti com Figure 5 21 SNMP Parameters Menu Web Browser Interface 5 8 6 SNMP Parameters These menus are used to select parameters that will be used when an SNMP trap is generated To define or change SNMP parameters proceed as follows Text Interface Type N and press Enter to display the Network Parameters Menu Figure 5 9 At the Network Parameters Menu type 25 and press Enter to display the SNMP Access Menu Figure 5 19 or type 26 and press Enter to display the SNMP Trap Menu Figure 5 20 Web Browser Interface Click on the Network Co
8. SSH and Web Browser Counter Counts all invalid attempts to access command mode via Telnet SSH or Web Browser interface If the number of cumulative invalid attempts exceeds the user defined Lockout Attempts value then the Network Port will be locked Note that when an Invalid Access Lockout occurs you can either wait for the Lockout Duration period to elapse after which the RSM will automatically reactivate the port or you can issue the UL command type UL and press Enter via the Text Interface to instantly unlock all RSM serial ports Notes Invalid Access Lockout parameters defined via the System Parameters menu will apply to all RSM serial ports When a Port is locked an external modem connected to that port will not answer When a given RSM serial port is locked the other RSM serial ports will remain unlocked unless the Invalid Access Lockout feature has been triggered at those other ports e f any one of the RSM s logical network ports is locked all other network connections to the unit will also be locked All invalid access attempts at the RSM Network Port are cumulative the count for invalid access attempts is determined by the total number of all invalid attempts at all 64 logical network ports If a valid login name password is entered at any of the logical network ports then the count for all RSM logical network ports will be restarted A Port that has been locked by the Invalid Access Lockout featur
9. The unit will display the Are you Sure y n prompt Type y and press Enter to disconnect iv Type s Enter to display the Port Status Screen The Status screen should now list Ports 2 and 3 as Free 5 Exit Command Mode When you finish communicating with the unit via the text interface it is important to always log off using the appropriate RSM command rather than by simply closing your Telnet program When you log off using the proper command this ensures that the unit has completely exited from command mode and is not waiting for the inactivity timeout to elapse before allowing additional connections To exit command mode type X and press Enter This completes the RSM Quick Start procedure Prior to placing the unit into operation it is recommended to refer to the remainder of this User s Guide for important information regarding advanced configuration capabilities and more detailed operation instructions If you have further questions regarding the RSM unit please contact WTI Customer Support as described in Appendix C 4 Hardware installation 4 1 Connecting Power to the RSM Unit The RSM is available in both AC and DC powered versions When connecting AC or DC power to the RSM proceed as follows A CAUTIONS LN Before attempting to install this unit please review the warnings and cautions listed at the front of the user s guide This device should only be operated with the type of power source indi
10. accounts that permit Supervisor commands Notes e f your user account does not permit Supervisor commands you will only be allowed to connect to ports specifically allowed by that account e f the user account permits Supervisor commands you are allowed to connect to any port e RS232 Ports are not allowed to create a Third Party connection to the Network Port For example Port 1 cannot connect Port 3 to the Network Port Availability Supervisor Non Supervisor Format C x x Enter Where x is the number or name of the port s to be connected Response Verbose Connected xx When a Resident Connection is initiated the RSM will also display the Resident Disconnect Sequence Terse 1 CP Copy RS232 Port Parameters Allows quick set up when several RS232 ports will be configured with similar parameters When the CP command is invoked the RSM will display a menu that can be used to copy parameters to RS232 ports For more information and other command options please refer to Section 5 9 Availability Supervisor Only Format cP Enter Response Displays Copy Parameters Menu 13 4 Command Reference Guide D Third Party Disconnect Invoke the D command at your resident port to disconnect two other ports Note that the D command cannot disconnect your resident port Availability Supervisor Only Format D Y x x Enter Where X Optional suppresses the Sure prompt x Is the number or nam
11. e Settings for network parameters depend on the configuration of your network Please contact your network administrator for appropriate settings The Network Parameters Menu selects parameters for all 16 logical Network Ports When a new IP Adaress is selected or the status of the DHCP feature is changed the unit will disconnect and reconfigure itself with the new values when you exit the Network Parameters Menu When configuring the unit via Web or Telnet make certain your DHCP server is set up to assign a known fixed IP address in order to simplify reconnection to the unit after the new address has been assigned The Network Parameters menu is only available when you have logged into command mode using an account and port that permit Supervisor commands The Network Parameters menu allows you to define the parameters that are discussed in the following sections Note that although the descriptions of network parameters are arranged according to the Web Browser Interface in the Text Interface all parameters except IP Security configuration are included in one menu 5 25 Configuration 0 REMOTE SITE MANAGER Location undefined Navigation Home Configuration Network Parameters System Parameters Serial Port Network Configuration User Management if IP Address 2 52 Subnet Mask 55255 2550 Gateway Address s2520 DHCP fora Telnet Access on Web Access on SSH Access on SYSLOG
12. menu For more information refer to Section 5 4 Availability Supervisor Only Format F Enter Response Displays System Parameters Menu H Help Displays a Help Screen which lists all available Text Interface commands along with a brief description of each command Availability Supervisor Non Supervisor Format H Enter Response Displays Help Screen l Reboot System Default Reinitializes the unit with default parameters When the I command is invoked the unit will offer four reboot options Reboot Only Do Not Keep Parameters Reboot and Default Keep IP Parameters Reboot and Default Reset All Parameters Reboot and Default Reset All Parameters but Keep SSH Keys Availability Supervisor Only Format I Enter Response Prompts for reboot option J Display Site ID Displays the Site I D message Availability Supervisor Non Supervisor Format J Enter Response Displays Site I D Message 13 6 Command Reference Guide K Send SSH Key Instructs the RSM to provide you with a public SSH key for validation purposes This public key can then be provided to your SSH client in order to prevent the SSH client from warning you that the user is not recognized when you attempt to create an SSH connection For more information please refer to Section 8 2 Availability Supervisor Only Format K k Enter Where k is a required argument which indicates the key type The k argument
13. provides the following options 1 SSH1 2 SSH2 RSA 3 SSH2 DSA Response Sends public key N Set Network Port Parameters Displays a menu which is used to select parameters for the Network Port Also allows access to the IP Security function which can restrict network access by unauthorized IP addresses Note that all of the functions provided by the N command are also available via the Web Browser Interface in the Network Configuration menu For more information please refer to Section 5 8 Availability Supervisor Only Format N Enter Response Displays Network Parameters Menu P Set RS232 Port Parameters Displays a series of menus used to select options and parameters for the RS232 ports Note that all functions provided by the P command are also available via the Web Browser Interface in the Serial Port menu Section 5 7 2 describes the procedure for defining port parameters Availability Supervisor Only Format P x Enter Where x is the number or name of the port to be configured If the port number name is not specified the RSM will display the configuration menu for your resident port Response The Port Parameters Menu is displayed 13 7 Command Reference Guide PW Change Password When enabled the PW command can be invoked by a user account in order to change their own password Note that the PW command can be enabled disabled via the System Parameters command as described in Section 5
14. undefined Callback Phone d Enter lt CR gt to select lt ESC gt to return to previous menu Figure 5 5 The Add User Menu Text Interface RSM 8 Shown REMOTE SITE MANAGER Location undefined Navigation Home Configuration Add User ystem P Serial Port User Name Password User Management Users Password Confirm Supervisor Access or Port 1 Access or Port 6 Access or Port 2 Access or Port7 Access or Pot3Access om y Port 8 Access Of Port 4 Access or Port 9 Access or ot v Port 5 Access Callback Phone Add User 2007 Western Telematic Inc 5 Sterling Irvine Ca 92618 http Iwww wti com Figure 5 6 The Add User Menu Web Browser Interface RSM 8 Shown 5 6 2 Adding User Accounts The Add Username option allows you to create new accounts and assign usernames passwords command level port access rights and Callback Numbers to each account Note that the Add User function is only available to users who have accessed command mode using a password that permits Supervisor Level commands Notes On RSM 8 units the internal modem port is Port 9 On RSM 16 units the internal modem port is Port 17 On RSM 32 units the internal modem port is Port 33 5 14 Configuration To create new user accounts proceed as follows Text Interface From the User Directory menu type 2 and press Enter The Add Username menu Figure 5 5 will b
15. 192 The IP Security Configuration menu is only available when the Supervisor Mode is active 5 30 Configuration Access the IP Security Configuration Menu a Text Interface Type N Enter to display the Network Configuration Menu From the Network Configuration Menu type 5 Enter to display the screen shown in Figure 5 13 Web Browser Interface Click on Network Configuration on the left hand side of the screen When the Network Configuration menu appears click on IP Security to display the screen shown in Figure 5 14 Allow List Enter the IP Address es for the clients that you wish to allow Note that if an IP Address is found in the Allow list the client will be allowed to connect and the RSM will not check the Deny list a Text Interface Note the number for the first empty field in the Allow list then type that number at the command prompt press Enter and then follow the instructions in the resulting submenu Web Browser Interface Place the cursor in the first empty field in the parameters menu then key in the desired IP Address operators wild cards and or net mask pairs Deny List Enter the IP Address es for the clients that you wish to deny Note that if the client s IP Address is not found in the Deny List that client will be allowed to connect Use the same procedure for entering IP Addresses described in Step 2 above 5 31 Configuration 5 8 3 2 Linux Operators and Wild Cards
16. 4 and that once a given password has been changed accounts with Supervisor Level access can still employ the Modify User function to change the password Availability Supervisor Non Supervisor Format Pw Enter Response Displays the Change Password Menu R Read Buffer Reads from Buffer Mode ports as described in Section 7 3 1 Note that when the R command is invoked the counter for the SNMP Traps function will also be reset Availability Supervisor Non Supervisor Format R n Enter Where n is the number or name of the port buffer to be read Response The Read Buffer Menu is displayed S Display Port Status Displays the Port Status Screen Figure 6 1 which summarizes conditions and parameters for all ports For more information please refer to Section 6 1 Availability Supervisor Non Supervisor Format S Enter Response Displays Port Status Screen SD Display Port Diagnostics Provides detailed information regarding the status of each port When this command is issued by an account that does not permit Supervisor commands the resulting screen will only display parameters for the ports allowed by the account For more information please refer to Section 6 2 Availability Supervisor Non Supervisor Format sD Enter Response Displays Port Diagnostics Screen SN_ Display Network Status Displays the Network Status Screen which lists current conditions and parameters for the Network Por
17. Access E Port 9 Access z Port 5 Access Off Delete LDAP Group 2007 Western Telematic Inc 5 Sterling Irvine Ca 92618 http www wti com Figure 5 31 Delete LDAP Group Menu Web Browser Interface 5 8 7 4 Deleting LDAP Groups The Delete LDAP Group function is used to delete LDAP Groups that are no longer in use To delete an existing LDAP Group proceed as follows Text Interface Type N and press Enter to display the Network Parameters Menu Figure 5 9 At the Network Parameters Menu type 27 and press Enter to display the LDAP parameters menu Figure 5 22 then type 13 and press Enter to display the LDAP Group Menu Figure 5 24 then type 4 and press Enter The RSM will prompt you to select the desired group key in the name of the group and press Enter the RSM will delete the specified LDAP Group immediately Web Browser Interface At the RSM Home Screen click on the Network Configuration link to display the Network Configure menu Figure 5 10 and then click on the LDAP Parameters link to display the LDAP Parameters menu Figure 5 23 At the LDAP Parameters menu click on the LDAP Group Configuration link to display the LDAP Group Configuration menu then click the View Modify LDAP Group link to display the Choose LDAP Group menu use the drop down menu to select the desired group select Delete LDAP Group and then click the Choose LDAP Group button to display the screen shown in Figur
18. Enables disables the SNMP Trap function and sets the byte level that will generate traps at this port If set to 0 zero then SNMP Traps are disabled at this port If this value is set between 1 and 32 767 then the SNMP Trap function is enabled and traps will be sent to the SNMP Managers whenever the buffer for this port reaches the specified level For more information please refer to Section 10 Default Off Note The SNMP Trap feature only applies to Buffer Mode Ports This option is not available to RS232 Ports 1 or 2 This is because Ports 1 and 2 are reserved as SetUp Ports and cannot be configured as Buffer Mode Ports 5 7 5 Configuring the Internal Modem The RSM s internal modem can be configured via the Text Interface or Web Browser Interface The configuration menu for the internal modem is identical to the configuration menus for the RS232 Serial Ports except that the Port Mode for the Modem Port is always set at Modem Mode and the Any to Any Mode Buffer Mode and Passive Mode are not available To access the Modem Port configuration menu proceed as follows Text Interface Use the P command to access the Modem Port Configuration Menu RSM 8 Units Type P 9 and press Enter RSM 16 and RSM 16DC Units Type P 17 and press Enter RSM 32 and RSM 32DC Units Type P 33 and press Enter Web Browser Interface Click on the Serial Port link on the left hand side of the screen to display the
19. Group Membership Value Type DN Fallback Off LDAP Group Setup 1 2 3 4 5 6 Ts 8 9 Enter lt CR gt to change lt ESC gt for previous menu Figure 5 22 LDAP Parameters Menu Text Interface REMOTE SITE MANAGER Location undefined Navigation Configuration LDAP Parameters Serial Port Enable orz Network Configuration EF User Management Users Primary Host Secondary Host Bind Type Search Bind DN Search Bind Password Search Bind Password Confirm User Search Base DN User Search Filter Group Membership Attribute Group Membership Value Type Fallback AP Gri tu LDAP Kerberos Setup Change LDAP Parameters 2007 Western Telematic Inc 5 Sterling Irvine Ca 92618 http www wti com Figure 5 23 LDAP Parameters Menu Web Browser Interface 5 8 7 LDAP Parameters The RSM supports LADP Lightweight Directory Access Protocol which allows authentication via the Active Directory network Directory Service When LDAP is enabled and properly configured command access rights can be granted to new users without the need to define individual new accounts at each RSM unit and existing users can also be removed without the need to delete the account from each RSM unit This type of authentication also allows administrators to assign users to LDAP groups and then specify which ports the members of each group will be allowed to access at each RSM unit 5 38 Configuratio
20. Interface 0 000 eee eee eee 5 47 The TACACS Parameters Menu Web Browser Interface 0 0 000s 5 47 The RADIUS Parameters Menu Text Interface llle 5 49 The RADIUS Parameters Menu Web Browser Interface 0 0 0 ea ee 5 49 The Copy Port Parameters Menu 02 0 0 0c cect eee 5 51 Port Status Screen Sample Data Shown RSM 8 Unit Shown lulu 6 2 Port Diagnostics Screen RSM 8 Shown isses 6 3 Network Status Screen 0 0 tenet eee 6 4 Port Parameters Screen RS232 Port Shown 0 00 eee eee eee eee 6 5 Port Parameters Screen Network Port Shown 0 000 e eee eee eee eee 6 5 The Test Menu Text Interface Supervisor Mode Only 0 0 0 eee eee eee 9 3 RS232 Port Interface 0 0 ec ccc an Apx 1 Vii 1 Introduction The RSM 8 RSM 16 RSM 16DC RSM 32 and RSM 32DC Remote Site Managers provide in band and out of band access to RS 232 console ports and maintenance ports on UNIX servers routers and any other network element that includes a serial console port System administrators can access the RSM via TCP IP network using SSH or Telnet or out of band via modem or local terminal The RSM features two separate command interfaces a convenient user friendly web browser interface and a simple command driven text interface Intelligent Port Selection Each of the RSM s RS232 serial ports can be individually accessed by number
21. Network Port Support Sure Prompt Index 3 Index 11 1 13 9 5 39 5 39 5 39 5 50 5 48 11 1 13 7 7 3 5 27 5 20 2 3 5 19 to 5 25 13 7 5 51 Apx 1 5 4 2 1 12 1 12 1 to 12 2 13 9 5 6 13 6 10 1 to 10 2 5 36 to 5 37 5 37 5 37 5 37 5 37 10 1 to 10 3 10 3 5 23 10 2 Apx 2 8 1 5 26 5 1 5 2 8 1 to 8 4 13 7 8 1 5 22 8 2 5 34 6 1 to 6 6 Syslog 5 9 5 22 9 1 to 9 3 Configuration 9 1 to 9 2 Facility 5 23 Level 5 23 Message Criteria 9 2 Syslog IP Address 5 26 Testing Configuration 9 3 System Parameters 5 5 to 5 7 13 6 T TACACS Parameters 5 47 Technical Support Apx 3 Telnet Access 5 26 Telnet Functions 8 1 to 8 4 Telnet Port 5 22 Terminal Block Assembly 4 1 Test Menu 9 3 10 3 13 9 Test Network Parameters 13 9 Text Interface 5 1 to 5 3 13 1 to 13 10 Third Party Connections 7 1 to 7 2 Third Party Disconnect 7 3 13 5 Time 5 7 Timeout 7 4 Time Zone 5 7 Trap Community 5 37 Unlocking Ports Upgrading Firmware Username User Directory Add User Delete User Edit User View Users User Search Base DN User Search Filter View Users Web Access Web Browser Interface Who Command XON XOFF Index 4 Index 5 8 13 9 12 1 to 12 2 13 9 5 15 5 6 5 12 to 5 17 5 15 5 16 5 16 5 13 5 40 5 40 5 13 5 26 5 3 to 5 4 6 5 to 6 6 13 10 5 19
22. RSM will only display information for the port from which you have logged in The W command can be applied to either an RS232 Port or the Network Port Figure 6 4 shows the screen displayed when the W command is applied to an RS232 Port and Figure 6 5 shows the screen displayed when an account that permits Supervisor commands applies the W command to the Network Port 6 5 The Status Screens The W command uses the following format W xx Enter Where xx is the desired port number If the W command is invoked at a serial port by a user with access to Supervisor Level commands then the letter N can be entered as the command argument to display parameters for the Network Port Note When command mode is accessed via the Network Port using an account that does not permit Supervisor commands the W command will only display the Sequence Disconnect Logoff Character and the status of the Accept Break item 7 Operation This section discusses the procedures for connecting and disconnecting ports and describes the various port modes Note The Web Browser Interface cannot be used to connect or disconnect ports In order to connect or disconnect ports you must access command mode via the Text Interface 7 1 Any to Any Mode Any to Any Mode Ports can be connected to other Any to Any Passive Buffer or Modem Mode ports by accessing command mode via the Text Interface and issuing the C Command All ports can be conf
23. RTS CTS Buffer Params ee Modem Params GENERAL PARAMETERS NETWORK SERVICES Supervisor Mode 31 Direct Connect Logoff Char Telnet Port Sequence Disc SSH Port Inact Timeout Raw Port Command Echo Syslog Accept Break SNMP Trap Lv RSM gt Figure 6 4 Port Parameters Screen RS232 Port Shown NETWORK PARAMETERS COMMUNICATION SETTING SERVERS AND CLIENTS IP Address 192 168 100 48 Telnet Access On Subnet Mask 255 255 255 0 SSH Access On Gateway Addr undefined Web Access On DHCP Off SYSLOG Addr undefined IP Security Off SNMP Access Off Static Route Off SNMP Trap Off DNS Servers undefined LDAP Off TACACS Off GENERAL PARAMETERS RADIUS Off Supervisor Mode Permit PING Access On Logoff Char X Raw Socket Access Off Sequence Disc One Char Inact Timeout 5 Min Command Echo On Accept Break On RSM gt Figure 6 5 Port Parameters Screen Network Port Shown 6 4 The Port Parameters Screens W The W Who command displays more detailed information about an individual RSM port Rather than listing general connection information for all ports the Port Parameters screen lists all defined parameters for a specific port The Port Parameters Screens are available to accounts that permit Supervisor commands and accounts that do not permit Supervisor commands Note however that if your account that does not permit Supervisor commands the
24. SITE MANAGER Location undefined Navigation Configuration Static Routes System Parameters Serial Port 1 Network Configuration 2 User Management Users Change Static Route Parameters 2007 Western Telematic Inc 5 Sterling Irvine Ca 92618 http www wti com Figure 5 16 Static Route Menu Web Browser Interface 5 8 4 Static Route The Static Route menu allows you to type in Linux routing commands that will be automatically executed each time that the unit powers up or reboots In the Text Interface the Static Route menu is accessed via item 6 in the Network Configuration menu In the Web Browser Interface the Static Route menu is accessed by first clicking the Network Configuration link and then clicking the Static Route link To access the Static Route Menus proceed as follows Text Interface Type N and press Enter to display the Network Parameters Menu Figure 5 9 At the Network Parameters Menu type 6 and press Enter The Static Route Menu should appear as shown in Figure 5 15 Web Browser Interface Click on the Network Configuration link on the left hand side of the RSM Home screen to display the Network Configuration menu Figure 5 10 From the Network Configuration Menu Click the Static Route link to display the menu shown in Figure 5 16 5 34 Configuration DNS SERVER IP ADDRESSES Enter lt CR gt to select menu lt ESC gt for previous menu Figur
25. Supervisor Mode Permits denies access to Supervisor commands If disabled the Network port is not allowed to invoke Supervisor commands Default Permit Note When Supervisor Mode for the Network Port is set to Deny accounts that permit Supervisor commands will not be allowed to access command mode via network Logoff Character Defines the Logoff Character for this port This determines which command s must be issued at this port in order to disconnect from a second port The Logoff Character does not apply to Telnet Direct Connections Default X Ctrl plus X Sequence Disconnect Enables Disables and configures the Resident Disconnect command Offers the option to either disable the Sequence Disconnect or select a one character or three character command format Default One Character Notes The One Character Disconnect is intended for situations where the destination port should not receive the disconnect command When the Three Character format is selected the disconnect sequence will pass through to the destination port prior to breaking the connection When Three Character format is selected the Resident Disconnect uses the format Enter LLL Enter where L is the selected Logoff Character 5 27 Configuration Inactivity Timeout Enables and selects the Inactivity Timeout period for the Network Port If enabled and the port does not receive or transmit data for the specified time per
26. appropriate Telnet port number in the connect command e g Port 5 2105 For more information please refer to Section 8 3 As described below the Direct Connect feature offers three options Default Off Off Telnet users will not be able to employ the Direct Connect feature to connect to this port On No Password Telnet users will be able to employ the Direct Connect feature to connect to this port without entering a password On Password Telnet and SSH users will be able to use Direct Connect to connect to this port but will be required to enter a password before the connection is established Note f On Password is selected and Supervisor commands are disabled at the Network Port then only accounts that do not permit Supervisor commands will be allowed to establish a direct connection via the Network Port If Supervisor commands are disabled at a given port then that port will not allow access by accounts that permit Supervisor commands When the Port Parameters menu is accessed via the Text Interface the menu also lists both Direct Connect port numbers for this port port numbers are not listed in the Web Browser Interface Telnet Port The Telnet port number employed to create a Direct Connection to this port using standard Telnet protocol SSH Port When Direct Connect Item 13 is set at On Password this line will display the Telnet port number used to create a Direct Connection to this por
27. configures the Callback Security Function as described in Section 5 4 4 In order for this feature to function a Callback number must also be defined for each desired user account as described in Section 5 6 IPW Command Enables Disables the PW Change Password command When enabled the PW command can be issued at the text interface by any user account in order to change that account s password When disabled accounts that do not permit Supervisor commands will not be able to change passwords Default Off Configuration 5 4 1 The Real Time Clock and Calendar The Real Time Clock menu is used to set the RSM s internal clock and calendar To access the Real Time Clock Menu proceed as follows Text Interface Type F and press Enter The System Parameters menu will appear as shown in Figure 5 3 At the System Parameters menu type 3 and press Enter to display the Real Time Clock menu Web Browser Interface Click on the System Properties link at the left hand side of the RSM Home Screen to display the System Parameters menu as shown in Figure 5 4 From the System Parameters Menu click on the Real Time Clock link to access the Real Time Clock menu The configuration menu for the Real Time Clock offers the following options e Date Sets the Month Date Year and day of the week for the RSM s real time clock calendar Time Sets the Hour Minute and Second for the RSM s real time clock calendar Key in the
28. long for the primary NTP server Default undefined Configuration Secondary NTP Address Defines the IP address or domain name up to 64 characters long for the secondary fallback NTP Server Default undefined NTP Timeout The amount of time in seconds that will elapse between each attempt to contact the NTP server When the initial attempt is unsuccessful the RSM will retry the connection four times If neither the primary nor secondary NTP server responds the RSM will wait 24 hours before attempting to contact the NTP server again Default 3 Seconds 5 4 2 The Invalid Access Lockout Feature When properly configured and enabled the Invalid Access Lockout feature will watch all login attempts made at all RSM ports Ifa given port exceeds the selected number of invalid attempts then that port will be automatically disabled for a user defined length of time The Invalid Access Lockout feature uses three separate counters to track invalid access attempts Serial Port Counter Counts invalid access attempts at each individual serial port If the number of invalid attempts at a given port exceeds the user defined Lockout Attempts value then that port will be locked Raw Socket Counter Counts invalid attempts to connect to a port via Raw Socket protocol If the number of invalid attempts at a given port exceeds the user defined Lockout Attempts value then Raw Socket connections to that port will be locked Telnet
29. of basic parameters and parameters selected via one interface will also be applied to the other To access the configuration menus proceed as follows Text Interface Refer to the Help Screen H and then enter the appropriate command to access the desired menu When the configuration menu appears key in the number for the parameter you wish to define and follow the instructions in the resulting submenu Web Browser Interface Click the appropriate button on the left hand side of the Home Screen Figure 5 2 to access the desired configuration menu To change parameters click in the desired field and key in the new value or select a value from the pull down menu To apply newly selected parameters click on the Change Parameters button at the bottom of the menu or the Set button next to the field The following sections describe options and parameters that can be accessed via each of the configuration menus Please note that essentially the same set of parameters and options are available to both the Web Browser Interface and Text Interface Note Configuration menus are only available when you have logged into command mode using a password and port that permit Supervisor Level commands Configuration 5 4 Defining System Parameters The System Parameters menus are used to define the Site ID Message set the system clock and calendar and configure the Invalid Access Lockout feature and Callback feature SYSTEM PARAMETERS
30. provides access to Supervisor commands and allows connections with any RSM RS232 port The default username for this account is super lowercase no quotation marks and the password for the account is also super Notes n order to ensure security it is recommended that when initially setting up the unit you should either change the username and password for the default super user account or preferably a new user account with Supervisor access should be created and the super account should then be deleted e f the RSM is reset to default parameters all user accounts will be cleared and the default super account will be restored e If Supervisor commands are disabled at a given port then accounts that permit Supervisor commands will not be able to access command mode via that port In most cases a password with Supervisor Access can be entered at any port allowing the user to invoke Supervisor level commands However if you wish to completely deny a specific port s access to Supervisor commands even with a password that normally permits them the Port Parameters menus can disable Supervisor commands at ports 3 and above and the Network Port The Supervisor Mode cannot be disabled at Ports 1 and 2 the System Setup Ports For a summary of commands and status screens available to Supervisors and non Supervisors please refer to Section 13 5 5 2 Port Access Each account can be granted access to a different selectio
31. servers Default undefined Fallback Timer Determines how long the RSM will continue to attempt to contact the primary TACACS Server before falling back to the secondary TACACS Server Default 3 Seconds Fallback Local Determines whether or not the RSM will fallback to its own password username directory when an authentication attempt fails When enabled the RSM will first attempt to authenticate the password by checking the TACACS Server if this fails the RSM will then attempt to authenticate the password by checking its own internal username directory Default Off Authentication Port The port number for the TACACS function Default 49 5 48 RADIUS Enable Off Primary Address undefined Primary Secret Word undefined Secondary Address undefined Secondary Secret Word undefined Fallback Timer 3 Sec Fallback Local Off Authentication Port 1812 Accounting Port 1813 T 2 3 4 5 6 7 8 9 Enter lt CR gt to change lt ESC gt for previous menu Figure 5 36 The RADIUS Parameters Menu Text Interface UU E E L REMOTE SITE MANAGER M MM M M M MS Location undefined Navigation Home Configuration RADIUS Parameters System Parameters Enable Of v Primary Address User Management E g Primary Secret Word Serial Port Network Configuration Secondary Address Secondary Secret W
32. terminate a Direct Connection e Any RSM port that allows Supervisor commands can terminate a direct connection at another port by issuing the D command as described in Section 7 1 1 Acknowledgment of data received by the RSM network port does not automatically indicate that the data has been completely sent out the serial port Data may still be queued in RSM buffers Any data queued at the time of a client initiated disconnect is discarded and is not passed to the attached device 9 The Syslog Feature The Syslog feature can create time stamped log records of each buffer event As these event records are created they are sent to a Syslog Daemon located at an IP address defined via the Network Parameters menu Note The Syslog Function is only available to Buffer Mode ports This option is not available to RS232 Port 1 which is reserved as a System SetUp Port and therefore cannot be configured as a Buffer Mode Port 9 1 Configuration The Syslog function is individually configured for each RSM RS232 Port If you wish to employ this feature it must be enabled at each desired port using the Port Parameters menus You must also set the real time clock and calendar via the System Parameters Menu and define the IP address for the Syslog Daemon via the Network Port Configuration menu To configure the Syslog function please proceed as follows 1 Access command mode Note that the following configuration menus are o
33. that include a Callback Number will be required to re enter their username password when their modem answers If the account does not include a Callback Number then that user will be granted immediate access and a Callback will not be performed Configuration On Callback ONLY Without Password Prompt Callbacks will be performed for user accounts that include a Callback Number and the username password prompt will not be displayed when the user s modem answers Accounts that do not include a Callback Number will not be able to access command mode via an RSM modem port On Callback ONLY With Password Prompt Callbacks will be performed for user accounts that include a Callback Number and the username password prompt will be displayed when the user s modem answers users will be required to re enter their username password when their modem answers Accounts that do not include a Callback Number will not be able to access command mode via an RSM modem port Callback Attempts The number of times that the RSM will attempt to call the Callback number Default 3 attempts Callback Delay The amount of time that the RSM will wait between Callback attempts Default 30 seconds Notes After configuring and enabling Callback Security you must then define a callback phone number for each desired user account as described in Section 5 6 in order for this feature to function properly When using the On Callback
34. the LDAP Group names that you have assigned to users at your LDAP server Default undefined Access Level Sets the command mode and port access level When this feature is On members of this group will be allowed to access Supervisor Level commands and access all ports when the feature is Off group members will not be allowed to access Supervisor Level commands and will be restricted to the ports that are specifically allowed for this group Default Off Port Access This prompt is used to determine which ports the user will be allowed to create connections with Default All Ports Off Notes On RSM 8 units the internal modem port is Port 9 On RSM 16 units the internal modem port is Port 17 On RSM 32 units the internal modem port is Port 33 5 41 VIEW LDAP GROUP DETAILS LDAP Group Access Level Port Access PORT PORT NAME undefined undefined undefined undefined undefined default Admin ACCESS PORT PORT NAME ACCESS undefined undefined undefined MODEM Enter lt CR gt or lt ESC gt to return to previous menu Figure 5 27 View LDAP Group Menu Text Interface RSM 8 Shown REMOTE SITE MANAGER Location undefined Navigation Configuration System Parameters Serial Port Network Configuration User Management Users View LDAP Group LDAP Group fault Access Level On x Port 1 Access On Port 2 Access on s Port 3 Acc
35. time using the 24 hour military format Time Zone Sets the time zone relative to Greenwich Mean Time Note that the Time Zone setting will function differently depending on whether or not the NTP feature is enabled and properly configured Default GMT No DST NTP Enabled The Time Zone setting is used to adjust the Greenwich Mean Time value received from the NTP server to determine the precise local time for the selected time zone NTP Disabled If NTP is disabled or if the RSM is not able to access the NTP server then status screens and activity logs will list the selected Time Zone and current Real Time Clock value but will not apply the correction factor to the displayed Real Time Clock value NTP Enable When enabled the RSM will contact an NTP server defined via the NTP IP Address prompts once a day and update its clock based on the NTP server time and selected Time Zone Default Off Notes e The RSM will also contact the NTP server and update the time whenever you change NTP parameters To command the RSM to immediately contact the NTP server at any time make certain that the NTP feature is enabled and configured then type F and press Enter When the System Parameters menu appears press Esc 7he RSM will save parameters and then attempt to contact the server as specified by currently defined NTP parameters Primary NTP Address Defines the IP address or domain name up to 64 characters
36. update file Firmware modifications can either be mailed to the customer on a CDR or downloaded from WTI Place the upgrade CDR in your disk drive or copy the file to your hard drive 2 Access Text Interface command mode via Serial Port Telnet or SSH client session using a username password and port that permit Supervisor commands 3 When the command prompt appears type UF and then press Enter The RSM will display a screen which offers the following options a Start FTP SFTP Servers and Save Parameters To proceed with the upgrade while retaining user defined parameters type 1 and press Enter All existing parameter settings will be restored when the upgrade is complete b Start FTP SFTP Servers and Default Parameters To proceed with the upgrade and reset parameters to default settings type 2 and press Enter When the upgrade is complete all parameters will be set to default values c Abort Upload To cancel the upgrade and return to the command prompt type 3 and press Enter Note that if either option 1 or option 2 are selected the RSM will start the receiving servers and wait for an FTP SFTP client to make a connection and upload a valid firmware binary image 4 To proceed with the upgrade select either option 1 or option 2 The RSM will display a message that indicates that the unit is waiting for data Leave the current Telnet SSH client session connected at this time 12 1 Upgrading SCM Firmware 5
37. using an account and port that permit Supervisor commands type A s press Enter where s is an optional text string that you wish to search for and follow the instructions in the resulting submenu When the s search string option is included the A command will return only those records that match the selected search string Notes e The RSM dedicates a fixed amount of internal memory for Audit Log records and if log records are allowed to accumulate until this memory is filled memory will eventually wrap around and older records will be overwritten by newer records The Audit Log cannot be viewed via the Web Browser Interface When the s option is used to search for all records that contain a specific text string the Delete function will still delete all Audit Log records the Delete function is not limited to the records that are currently displayed on screen Configuration 5 4 4 Callback Security The Callback function provides an additional layer of security when callers attempt to access command mode via modem When this function is properly configured modem users will not be granted immediate access to command mode upon entering a valid password instead the unit will disconnect and dial a user defined number before allowing access via that number If desired users may also be required to re enter the password after the RSM dials back In order for Callback Security to function properly you must first enabl
38. 0 1 Configuration The SNMP Trap function is individually configurable for RS232 Ports 2 and above If you wish to employ this feature it must be enabled at each desired port To configure the SNMP Trap function proceed as follows 1 Access command mode using an account and port that permit Supervisor commands Port Parameters Menu Access the Port Parameters Menu for the desired port as described in Section 5 7 2 and then set the following parameters a Port Mode Set the Port Mode to Buffer b SNMP Trap Level Enable the SNMP Trap function and select the byte level The byte level determines the number of bytes the buffer must contain in order to cause an SNMP trap to be sent Note that when the byte level is set to 0 zero the SNMP Trap function is disabled 10 1 SNMP Traps Network Parameters Menu Access the Network Parameters Menu as described in Section 5 8 Set the following a b c d e Enable SNMP Access must be enabled in order for SNMP traps to function SNMP Contact Optional SNMP Location Optional SNMP Community Consult your network administrator and then use the Network Parameters menu to set the SNMP Community SNMP Managers 1 and 2 Consult your network administrator to determine the IP address es for the SNMP Manager s then use the Network Parameters menu to set the IP address for each SNMP Manager Note that it is not necessary to define both SNMP Managers Trap Commu
39. 43 5 41 5 42 2 1 5 23 Linux Operators Linux Routing Commands Lockout Attempts Lockout Duration Login Procedure Logoff Character Network Port Serial Port Modem Mode Hang Up String Initialization String Periodic Reset Value Reset String Modem Port Modify User Net Mask Pairs Network Parameters Network Port Accept Break Command Echo DHCP Gateway Address Inactivity Timeout IP Address Logoff Character Ping Access Raw Socket Access Sequence Disconnect SSH Access Subnet Mask Supervisor Mode Syslog IP Address Telnet Access Web Access Network Port Configuration Network Port Numbers Network Port Parameters Network Status Screen NTP Address NTP Server NTP Timeout ON Indicator Operation Index 2 5 17 7 9 5 21 2 2 5 17 5 23 5 32 5 26 13 7 2 2 4 2 5 26 5 28 5 28 5 26 5 26 5 28 5 26 5 27 5 26 5 26 5 27 5 26 5 26 5 27 5 26 5 26 5 26 5 24 to 5 37 8 1 5 27 to 5 28 6 4 to 6 5 13 8 5 7 Parity Serial Port Passive Mode Password Password on Dialback Periodic Reset Value Phone Line Port Ping Access Ping Command Port Access LDAP Groups Port Buffers Port Configuration Port Diagnostics Screen Port Interface Drawing Port Mode Port Name Port Parameters Screen Port Status Screen Power Connection Power Inlet Power Switch Primary Host Public Key PW Command Quick Start Guide RADIUS Parameters Raw Port Raw Socket Access Network Port Raw Socket C
40. 55 72 0 through 131 155 73 255 5 32 Configuration 5 8 3 3 IP Security Examples 1 Mostly Closed Access is denied by default and the only clients allowed are those explicitly listed in the Allow list To deny access to all clients except 192 255 255 192 and 168 112 112 05 the Allow and Deny lists would be defined as follows Allow List 1 192 255 255 192 2 168 112 112 05 Deny List 1 ALL Mostly Open Access is granted by default and the only clients denied access are those explicitly listed in the Deny list and as exceptions in the Allow list To allow access to all clients except 192 255 255 192 and 168 112 112 05 the Allow and Deny lists would be defined as follows Allow List 1 ALL EXCEPT 192 255 255 192 168 112 112 05 Deny List 1 192 255 255 192 168 112 112 05 Notes When defining a line in the Allow or Deny list that includes several IP addresses each individual address is separated by either a space a comma or a comma and a space as shown in Example 2 above Take care when using the ALL wild card When ALL is included in the Allow list it should always include an EXCEPT operator in order to allow the unit to proceed to the Deny list and determine any addresses you wish to deny 5 33 Configuration STATIC ROUTES 1 2 3 4 5 6 Ts 8 Enter lt CR gt to select menu lt ESC gt for previous menu Figure 5 15 Static Route Menu Text Interface 0 REMOTE
41. AP Parameters Menu Figure 5 22 or Figure 5 23 allows you to define the following parameters Enable Enables disables LDAP authentication Default Off LDAP Port Defines the port that will be used to communicate with the LDAP server Default 389 Primary Host Defines the IP address or domain name up to 64 characters for the primary LDAP server Default undefined Secondary Host Defines the IP address or domain name up to 64 characters for the secondary fallback LDAP server Default undefined Bind Type Sets the LDAP bind request password type Note that in the Text Interface when the Bind Type is set to Kerberos LDAP menu will include an additional prompt item 14 that is used to select Kerberos parameters as described in Section 5 8 7 5 In the Web Interface the link to the kerberos parameters menu is located at the bottom of the LDAP Parameters Menu Default Simple Search Bind DN Selects the user name who is allowed to search the LDAP directory Default undefined Search Bind Password Sets the Password for the user who is allowed to search the LDAP directory Default undefined 5 39 Configuration User Search Base DN Sets the directory location for user searches Default undefined User Search Filter Selects the attribute that lists the user name Note that this attribute should always end with s no quotes Default undefined Group Membership Attribute S
42. Address n Ping Access on Raw Socket Access Off v Change Network Parameters 2007 Western Telematic Inc 5 Sterling Irvine Ca 92618 http www wti com Figure 5 11 Network Parameters Menu Web Browser Interface 5 8 1 Network Parameters In the Text Interface these parameters are accessed via the Network Configuration menu Figure 5 9 In the Web Browser Interface these parameters can be found by first clicking the Network Configuration link and then Clicking the Network Parameters link to display the Network Parameters menu Figure 5 11 IP Address Default 192 168 168 168 Subnet Mask Default 255 255 255 0 Gateway Address Default undefined DHCP Enables Disables Dynamic Host Configuration Protocol When this option is On the RSM will perform a DHCP request Note that the MAC address for the RSM is listed on the Network Status Screen Default Off Note Before configuring this feature via Telnet or Web make certain your DHCP server is set up to assign a known fixed IP address You will need this new IP address in order to reestablish a network connection with the RSM unit Telnet Access Enables disables Telnet access When Telnet Access is Off users will not be allowed to establish a Telnet connection to the unit Default On Web Access Enables disables the Web Browser Interface When disabled users will not be allowed to contact the unit via the Web Browser Interf
43. Interface proceed as follows Note Command mode cannot be accessed via a Buffer Mode Port Passive Mode Port or any port that is presently connected to another RSM port 1 Contact the RSM Unit a ViaLocal PC Start your communications program and press Enter Wait for the connect message then proceed to Step 2 b Via Network The RSM includes a default IP address 192 168 168 168 anda default subnet mask 255 255 255 0 This allows you to contact the unit from any network node on the same subnet without first assigning an IP Address to the unit For more information please refer to Section 5 8 i Via SSH Client Start your SSH client and enter the RSM s IP Address Invoke the connect command wait for the connect message then proceed to Step 2 ii Via Telnet Start your Telnet Client and then Telnet to the RSM s IP Address Wait for the connect message then proceed to Step 2 Note When communicating with the unit for the first time you will not be able to contact the unit via Telnet until you have accessed command mode via Local PC or SSH Client and used the Network Parameters Menu N to enable Telnet as described in Section 5 8 c Via Modem Use your communications program to dial the number for the line connected to the RSM s Phone Line port 2 Login Password Prompt A message will be displayed which prompts you to enter a username login name and password The default username is super all lower ca
44. M Home Screen The System Parameters menu will be displayed as shown in Figure 5 4 System Parameters Menus are used to define the following User Directory This function is used to create modify and delete user accounts and passwords As discussed in Section 5 6 user accounts allow you to set the security level for each password as well as determine which ports a user will be allowed to access Note The User Directory option does not appear in the Web Browser Interface s System Parameters menu and is instead accessed via the Users link on the left hand side of each configuration menu Site ID A text field generally used to note the installation site or name for the RSM unit Up to 32 chars Default undefined Notes e The Site ID cannot include double quotes The Site ID will be cleared if the RSM is reset to default settings Real Time Clock This prompt provides access to the Real Time Clock menu which is used to set the clock and calendar and to enable and configure the NTP Network Time Protocol feature as described in Section 5 4 1 Invalid Access Lockout If desired this feature can be used to automatically disable an RSM serial port after a user specified number of unsuccessful login attempts are made For more information please refer to Section 5 4 2 Audit Log Enables and configures the Audit Log feature as described in Section 5 4 3 Default 2 On Without Syslog Callback Security Enables
45. Open your FTP SFTP application and login to the RSM unit using a username and password that permit access to Supervisor Level commands 6 Transfer the binary format upgrade file to the RSM 7 After the file transfer is complete the RSM will install the upgrade file and then reboot itself and break all port connections Note that it will take approximately 7 to 10 minutes to complete the installation process The unit will remain accessible until it reboots a Some FTP SFTP applications may not automatically close when the file transfer is complete If this is the case you may close your FTP SFTP client manually after it indicates that the file has been successfully transferred b When the upgrade process is complete the RSM will send a message to all currently connected network sessions indicating that the RSM is going down for a reboot Note Do not power down the RSM unit while it is in the process of installing the upgrade file This can damage the unit s operating system 8 If you have accessed the RSM via the Network Port in order to start the FTP SFTP servers the RSM will break the network connection when the system is reinitialized f you initially selected Start FTP SFTP Servers and Save Parameters you may then reestablish a connection with the RSM using your former IP address f you initially selected Start FTP SFTP Servers and Default Parameters you must then login using the RSM s default IP address Defaul
46. P Security Menu Web Browser Interface llle elles 5 29 Static Route Menu Text Interface liess 5 34 Static Route Menu Web Browser Interface 0 000 cece eee 5 34 Nomain Name Server Menu Text Interface lisse 5 35 Domain Name Server Menu Web Browser Interface 0 cc eee eee 5 35 SNMP Access Menu Text Interface 0 0 cect ete ee 5 36 SNMP Trap Menu Text Interface 0 0 0 cece eee 5 36 SNMP Parameters Menu Web Browser Interface 0000 cece eee 5 36 LDAP Parameters Menu Text Interface llle 5 38 LDAP Parameters Menu Web Browser Interface llle 5 38 LDAP Group Configuration Text Interface 2 0 0 cee tte 5 40 Add LDAP Group Menu Text Interface RSM 8 Shown 00e eee eee 5 41 Add LDAP Group Menu Web Browser Interface RSM 8 Shown 5 41 View LDAP Group Menu Text Interface RSM 8 Shown 20 002005 5 42 View LDAP Group Menu Web Browser Interface RSM 8 Shown 5 42 Modify LDAP Group Menu Text Interface RSM 8 Shown 0 0 eee eee 5 43 Modify LDAP Group Menu Web Browser Interface RSM 8 Shown 5 43 Delete LDAP Group Menu Web Browser Interface 0000 eee eeeeee 5 44 LDAP Kerberos Set Up Menu Text Interface 0 0 0 0 cece sess 5 45 LDAP Kerberos Set Up Menu Web Browser Interface llli llle esee 5 45 The TACACS Parameters Menu Text
47. Port Selector Menu Use the Port Selector Menu to select the Modem Port as follows RSM 8 Units Click on the down arrow to display the drop down menu highlight port 9 and then click on the Select Port button RSM 16 and RSM 16DC Units Click on the down arrow to display the drop down menu highlight port 17 and then click on the Select Port button RSM 32 ad RSM 32DC Units Click on the down arrow to display the drop down menu highlight port 33 and then click on the Select Port button For a description of the various parameters that can be configured via the Modem Port Configuration Menu please refer to Section 5 7 2 5 23 5 8 Network Configuration Configuration The Network Parameters Menus are used to select parameters and options for the Network Port and also allow you to implement IP Security features which can restrict access based on the user s IP Address Although the Web Browser Interface and Text Interface allow definition of essentially the same parameters parameters are arranged differently in the two interfaces In the Text Interface most network parameters are defined via one menu But in the Web Browser Interface network parameters are divided between eight separate submenus as described in this section NETWORK PARAMETERS COMMUNICATION SETTING IP Address Subnet Mask Gateway Addr DHCP IP Security Static Route DNS Servers GENERAL PARAMETERS Supervisor Mode Logoff C
48. Test feature is selected the RSM will attempt to send a test Syslog message using the current Syslog configuration If the test message is not received by your Syslog Daemon review the procedure outlined in Section 9 1 to make certain the RSM and the Syslog Daemon are properly configured In addition to providing a means to test the Syslog and SNMP Trap features the Test Menu also includes a Ping command option which can be used in a manner similar to the DOS ping command to check to make certain that the unit is communicating properly Note that in order for the Ping command to function with domain names you must first configure Domain Name Server parameters as described in Section 5 8 5 10 SNMP Traps SNMP is an acronym for Simple Network Management Protocol The SNMP Trap function allows Buffer Mode Ports to send a message to two different SNMP Managers indicating the amount of data currently stored in buffer memory Note The SNMP Trap function is only available to Buffer Mode Ports This option is not available to RS232 Port 1 which is reserved as a System SetUp Port and therefore cannot be configured as a Buffer Mode Port e The SNMP feature cannot be configured via the SNMP Manager SNMP reading ability is limited to the System Group The SNMP feature includes the ability to be polled by an SNMP Manager When the R command is invoked the counter for the SNMP Trap function will automatically be reset 1
49. WTI Part No 13662 Rev D Remote Site Managers Models Covered RSM 8 RSM 16 RSM 16DC RSM 32 RSM 32DC For Firmware Version 2 16 and Higher Luie p vestem ne A Warnings and Cautions Installation Instructions Secure Racking If Secure Racked units are installed in a closed or multi unit rack assembly they may require further evaluation by Certification Agencies The following items must be considered 1 The ambient within the rack may be greater than room ambient Installation should be such that the amount of air flow required for safe operation is not compromised The maximum temperature for the equipment in this environment is 45 C Consideration should be given to the maximum rated ambient 2 Installation should be such that a hazardous stability condition is not achieved due to uneven loading 1 Check nameplate ratings to assure there is no overloading of supply circuits that could have an effect on overcurrent protection and supply wiring 2 When installing 48 VDC rated equipment it must be installed only per the following conditions A Connect the equipment to a 48 VDC supply source that is electrically isolated from the alternating current source The 48 VDC source is to be connected to a 48 VDC SELV source B Input wiring to terminal block must be routed and secured in such a manner that it is protected from damage and stress Do not route wiring past sharp edges or moving parts C A
50. With Password Prompt option it is important to always define a callback number for each user account Otherwise accounts that do not include a callback number will be allowed to immediately access command mode and the callback function will not be performed Configuration 5 5 User Accounts Prior to accessing command mode or establishing a Telnet Direct Connection you will be prompted to enter a username login and password The username and password entered at login determine which port s you will be allowed to connect and what type of commands you will be allowed to execute Each username password combination is defined within a user account The RSM allows up to 128 user accounts each account includes a username password security level port access rights and an optional callback number 5 5 1 Supervisor Access In order to protect access to important command functions the RSM allows you to enable or disable Supervisor commands for specific accounts Accounts that have Supervisor Access enabled will be allowed access to all configuration menus review all status screens and connect to any RSM RS232 port When Supervisor Access is disabled the account will be blocked from changing configuration parameters access to status screens will be restricted and the user will only be able to connect to ports specifically allowed by that account Note that in the default state the RSM includes one predefined user account that
51. ablishing an inbound Telnet connection to the unit This allows the user to grant Telnet access to only a specific group of IP addresses or block a particular IP address In the default state the RSM accepts incoming IP connections from all hosts In the Text Interface IP Security parameters are defined via item 5 in the Network Configuration menu Figure 5 9 In the Web Browser Interface these parameters are found by clicking the Network Configuration link and then Clicking the IP Security link In the default state IP Security is disabled 5 29 Configuration The IP Security Function employs a TCP Wrapper program which allows the use of standard Linux operators wild cards and net mask pairs to create a host based access control list As shown in Figures 5 13 and 5 14 the IP Security configuration menus include hosts allow and hosts deny client lists Basically when setting up IP Security you must enter IP addresses for hosts you wish to allow in the Allow list and addresses for hosts you wish to deny in the Deny list Since Linux operators wild cards and net mask pairs are allowed these lists can indicate specific addresses or a range of addresses to be allowed or denied When the IP Security feature is properly enabled and a client attempts to connect the RSM will perform the following checks 1 Ifthe client s IP address is found in the hosts allow list the client will be granted immediate access Once an IP
52. ace Default Off SSH Access Enables disables SSH communication Default On SYSLOG Address The IP Address or domain name up to 64 characters for the Syslog Daemon that will receive log records generated by the RSM For more information please refer to Section 9 Default 0 0 0 0 Ping Access Enables Disables response to the ping command When Disabled the RSM will not respond to Ping commands Default On Raw Socket Access Enables Disables Raw Socket Protocol access to the Network Port via Direct Connect Default Off 5 26 Configuration UL eg REMOTE SITE MANAGER Location undefined Navigation Configuration Network Port Parameters System Parameters Supervisor Mode Permit Logoff Character x ii eran Sequence Disconnect One CharacterOny 2 Inactivity Timeout for Command Echo fon Accept Break on Change Network Port Parameters Serial Port Network Configuration 2007 Western Telematic Inc 5 Sterling Irvine Ca 92618 http vww wti com Figure 5 12 Network Port Parameters Menu Web Browser Interface 5 8 2 Network Port Parameters In the Text Interface these parameters are found in the main Network Configuration menu Figure 5 9 In the Web Browser Interface these parameters are found by first clicking the Network Configuration link and then clicking the Network Port Parameters link to display the Network Port Configuration Menu Figure 5 12
53. address is found in the Allow list the RSM will not check the Deny list and will assume you wish to allow that address to connect 2 Ifthe client s IP address is not found in the Allow list the RSM will then proceed to check the Deny list 3 Ifthe client s IP Address is found in the Deny list the client will not be allowed to connect 4 Ifthe client s IP Address is not found in the Deny list the client will be allowed to connect even if the address was not found in the Allow list Notes If the RSM finds an IP Address in the Allow list it will not check the Deny list and will allow the client to connect f both the Allow and Deny lists are left blank then the IP Security feature will be disabled and all IP Addresses will be allowed to connect providing that the proper password and or SSH key is supplied When the Allow and Deny lists are defined the user is only allowed to specify the Client List the Daemon List and Shell Command cannot be defined 5 8 5 1 Adding IP Addresses to the Allow and Deny Lists To add an IP Address to the Allow or Deny list and begin configuring the IP Security feature proceed as follows Notes Both the Allow and Deny list can include Linux operators wild cards and net mask pairs n some cases it is not necessary to enter all four digits of the IP Address For example if you wish to allow access to all IP addresses that begin with 192 then you would only need to enter
54. allback LDAP Fallback Local RADIUS TACACS Fallback Timer RADIUS TACACS Firmware Upgrade Front Panel FTP Upgrade Index 1 5 1 to 5 44 11 2 11 1 13 9 5 4 13 1 7 1 to 7 2 13 4 5 51 to 5 52 13 4 5 6 5 10 to 5 11 5 11 5 11 5 22 5 26 8 2 to 8 4 8 2 to 8 3 8 4 8 6 5 22 8 4 7 3 13 3 13 10 13 8 5 21 12 1 to 12 2 13 9 2 1 12 1 12 1 to 12 2 13 9 Gateway Address General Parameters Group Membership Attribute Group Membership Value Type H Handshake Mode Serial Port Hang Up String Hardware Installation Help Menu Hunt Groups Inactivity Timeout Network Port Serial Port Initialization Initialization String Installation Internal Modem Invalid Access Lockout IP Address Network Port RADIUS Syslog TACACS IP Security KDC Kerberos LDAP Bind Type Fallback Group Membership Attribute Group Membership Value Type Kerberos LDAP Port Parameters Primary Host Search Bind DN Search Bind Password Secondary Host User Search Base DN User Search Filter LDAP Groups Access Level Deleting Modifying Port Access Viewing LED Indicators Level Syslog 5 26 5 5 to 5 7 5 40 5 40 5 19 5 21 4 1 to 4 2 13 6 7 5 to 7 6 7 4 5 28 5 20 2 1 5 21 4 1 5 23 5 6 5 8 13 9 5 26 5 49 5 26 5 47 5 29 5 29 to 5 32 5 46 5 45 to 5 46 5 39 5 40 5 40 5 40 5 45 to 5 46 5 39 5 38 to 5 43 5 39 5 39 5 39 5 39 5 40 5 40 5 40 to 5 44 5 41 5 44 5
55. ally overrides the RSM s Invalid Access Lockout feature Normally when a user defined number of unsuccessful password attempts are detected at a given port the Invalid Access Lockout feature will shut down that port for a user specified time period in order to prevent further access attempts When the UL command is invoked the RSM will immediately unlock all ports that are currently in the locked state Availability Supervisor Only Format UL Enter Response The RSM will unlock all RSM RS232 Ports 13 9 Command Reference Guide W Display Port Parameters Who Displays configuration information for an individual port but does not allow the user to change parameters Accounts that do not permit Supervisor commands can only display parameters for their resident port For more information please refer to Section 6 4 Availability Supervisor Non Supervisor Format W x Enter Where x is the port number or name To display parameters for the Network Port enter an N If the x argument is omitted parameters for your resident port will be displayed Response Displays port parameters Example To display parameters for a port named SERVER access the Command Mode from a port and account that permits Supervisor commands and type W SERVER Enter X Exit Command Mode Exits command mode When issued at the Net Port also ends the Telnet session Note that exiting from command mode will not terminate port connecti
56. an unconnected port will exit command mode when the Timeout Disconnect expires Command Echo Enables or Disables command echo at this port Default On Accept Break Determines whether the port will accept breaks received from the attached device and pass them along to a connected port When enabled breaks received at this port will be passed to any port this port is connected to When disabled breaks will be refused at this port Default On 5 20 Configuration Port Mode Parameters Port Mode The operation mode for this port Ports 1 and 2 cannot be configured as Passive or Buffer Mode ports and the internal modem port is always configured for Modem Mode Port 1 and 2 Default Any to Any Mode Serial Ports 3 and above Default Passive Mode Internal Modem Port Default Modem Mode Depending on the Port Mode selected the RSM will also display the additional prompts listed in this section In the Text Interface these parameters are accessible via a submenu which will only be active when the appropriate port mode is selected and in the Web Browser Interface fields will be grayed out unless the corresponding port mode is selected Any to Any Mode Passive Mode Allows the following Mode specific parameter to be defined DTR Output Determines how DTR will react when the port disconnects DTR can be held low held high or pulsed for 0 5 seconds and then held high Default Pulse Modem Mod
57. and at the command prompt the menu shown in Figure 5 38 will be displayed The following options are available a Copy to All Ports Type CP Enter b Copy to a Range of Ports Type CP m n Enter Where m and n are port numbers that specify the desired range For example to copy parameters to ports 3 through 7 type CP 3 7 and press Enter c Copy to Several Ports Type CP m n x Enter Where m n and x are the numbers of the desired ports For example to copy parameters to ports 3 5 and 7 type CP 3 5 7 Enter d Combination To invoke the CP command in a manner where a range of ports is specified along with several ports outside the range type CP m n x z Enter Where m n x and z are port numbers For example to copy parameters to ports 3 and 5 plus ports 7 through 9 type CP 3 5 7 9 Enter 3 Selecting Parameters To select parameters to be copied key in the number for the desired parameter press Enter then follow the instructions in the submenu Note The CP command will only copy the parameters currently displayed by the Copy Port Parameters menu 4 Clear Menu After defining several parameters if you wish to clear the CP menu and start again type dash and press Enter the menu will be reset 5 Exit Without Copy To exit from the Copy Parameters menu without copying selected parameters type X Enter The RSM will return to the command prompt 6 Copy Parameters When you have finishe
58. arameters menu click on the LDAP Group Configuration link to display the LDAP Group Configuration menu then click the Add LDAP Group link to display the Add LDAP Group menu Figure 5 26 LDAP GROUP 1 View LDAP Groups 2 3 4 Add LDAP Group Modify LDAP Group Delete LDAP Group Enter lt CR gt to select XESC for previous menu Figure 5 24 LDAP Group Configuration Text Interface 5 40 Configuration ADD LDAP GROUP LDAP Group Access Level Port Access PORT PORT NAME ACCESS PORT ACCESS undefined undefined undefined undefined undefined undefined undefined MODEM undefined lt CR gt to select lt ESC gt to return to previous menu Figure 5 25 Add LDAP Group Menu Text Interface RSM 8 Shown REMOTE SITE MANAGER Location undefined Navigation Configuration Add LDAP Group System Parameters Serial Port LDAP Group Network Configuration Access Level Off v ae gem Port 1 Access or Port 6 Access or Port 2 Access Off Port 7 Access Off Port 3 Access or Port 8 Access for Port 4 Access ot Port 9 Access or Port 5 Access ott Add LDAP Group 2007 Westem Telematic Inc 5 Sterling Irvine Ca 92618 http www wti com Figure 5 26 Add LDAP Group Menu Web Browser Interface RSM 8 Shown The Add LDAP Group menus allow the following parameters to be defined LDAP Group Note that this name must match
59. arams NETWORK SERVICES 31 Direct Connect Configuration Logoff Char Sequence Disc Inact Timeout Command Echo 32 Syslog Accept Break 33 SNMP Trap Lv lt CR gt to define parameter Port 1 and internal modem port restricted values NOT changed lt CR gt to remove all values set X lt CR gt to exit WITHOUT copy lt ESC gt to copy to ports and exit Figure 5 38 The Copy Port Parameters Menu 5 9 Copying Parameters to Several RS 232 Ports Text Interface Only When the CP command Copy Port Parameters is invoked the unit will display a menu which allows you to select parameters and copy them to all or several RS 232 ports The Copy Port Parameters menu can set all parameters for the specified port s or define only a select group of parameters for a specific group of ports Notes The CP command is not available via the Web Browser Interface The CP command will not copy parameters to the Network Port or Internal Modem Port The CP command is only available to accounts and ports that permit Supervisor commands The CP command cannot be used to set Ports 1 or 2 to Passive or Buffer Mode or to disable the Supervisor Mode at Ports 1 or 2 To copy parameters to all or several RS 232 ports proceed as follows 1 Use the Text Interface to enter command mode via an account and port that permit access to Supervisor commands 5 51 Configuration 2 Invoke the CP comm
60. at a time If a second user attempts to read from a port that is already being read an error message will be sent Operation To clear data from any port buffer with or without reading it first access command mode via the text interface using an account and port that permit Supervisor commands then issue the E Erase Buffer command using the following format E xx Enter Where xx is the number of the port buffer to be cleared Note 7he E command cannot erase data from a port buffer that is currently being read by another port 7 3 2 Port Buffers The Status Screen lists the amount of Buffer Memory currently used by each port The RSM uses buffer memory in two different ways depending on the user selected port mode Any to Any Passive and Modem Mode Ports When two ports are communicating at dissimilar baud rates the buffer memory prevents data overflow at the slower port Buffer Mode Ports Stores data received from connected devices The user issues a Read Buffer command R from an Any to Any or Modem Mode port to retrieve data If the Status Screen indicates an accumulation of data the E Erase Buffer command can be invoked to clear the buffer Note When a Buffer Mode port is reconfigured as an Any to Any Passive or Modem Mode port any data stored in the buffer prior to changing the port mode will be lost eration 7 4 Modem Mode The Modem Mode provides features specifically related to modem c
61. ation TACACS Parameters System Parameters Serial Port Enable Of v Network Configuration c Primary Address User Management Users Secondary Address Secret Word Fallback Timer Fallback Local ff Authentication Port Za Change TACACS Parameters 2007 Western Telematic Inc 5 Sterling Irvine Ca 92618 http www wti com Figure 5 35 The TACACS Parameters Menu Web Browser Interface 5 8 8 TACACS Parameters To access the TACACS Configuration Menus proceed as follows Text Interface Type N and press Enter to access the Network Configuration Menu From the Network Configuration Menu type 28 and press Enter to display the TACACS Configuration Menu Figure 5 34 Web Browser Interface Click on the Network Configuration link to display the menu shown in Figure 5 10 then click the TACACS Parameters link to display the TACACS Configuration Menu Figure 5 35 The TACACS Configuration Menus offer the following options Enable Enables disables the TACACS feature at the Network Port Default Off Primary Address Defines the IP address or domain name up to 64 characters for your primary TACACS server Default undefined Secondary Address Defines the IP address or domain name up to 64 characters for your secondary fallback TACACS server if present Default undefined 5 47 Configuration Secret Word Defines the shared TACACS Secret Word for both TACACS
62. ay the Choose LDAP Group menu use the drop down menu to select the desired group select View LDAP Group and then click the Choose LDAP Group button to display the screen shown in Figure 5 28 5 42 Configuration MODIFY LDAP GROUP DETAILS LDAP Group default Access Level Admin Port Access PORT PORT NAME ACCESS PORT PORT NAME ACCESS undefined undefined undefined undefined undefined undefined undefined MODEM undefined Enter lt CR gt to select lt ESC gt to return to previous menu Figure 5 29 Modify LDAP Group Menu Text Interface RSM 8 Shown REMOTE SITE MANAGER Location undefined Navigation Home Configuration Modify LDAP Group System Parameters LDAP Group defauilt Access Level On Serial Port Network Confiquration faa Port 1 Access On Port 6 Access On Port 2 Access on e Port 7 Access ong Port 3 Access On x Port 8 Access On Port 4 Access for Port 9 Access ong Port 5 Access On x Modify LDAP Group 2007 Western Telematic Inc 5 Sterling Irvine Ca 92618 http www wti com Figure 5 30 Modify LDAP Group Menu Web Browser Interface RSM 8 Shown 5 8 7 3 Modifying LDAP Groups If you want to modify an existing LDAP Group in order to change command access rights or port access rights the Modify LDAP Group function can be used to edit group parameters To Modify an existing LDAP Group proceed as follows Tex
63. cated on the instrument nameplate If you are not sure of the type of power service available please contact your local power company Reliable earthing grounding of this unit must be maintained Particular attention should be given to supply connections when connecting to power strips rather than directly to the branch circuit 4 1 1 AC Powered Units Plug the power cable supplied with the unit into the receptacle on the RSM back panel Then connect the power cable to an appropriate grounded outlet The RSM features a self adjusting power supply that automatically adapts to power supplies between 90 and 250 VAC Press the Power Switch ON The ON LED should light and the RDY LED should begin to flash 4 1 2 DC Powered Units When connecting the RSM to your DC Power source first remove the protective cover from the terminal block attach the wires from the 48 VDC power source to the screw terminals connect the ground line to the labeled ground screw and then replace the protective cover 48V 0 1A GROUND SCREW Qu aiv am Figure 4 1 Terminal Block Assembly DC Units Only 4 1 Hardware Installation 4 2 Connecting the Network Cable The Network Port is an RJ45 10 100BaseT Ethernet Jack for connection to a TCP IP network Note that the RSM features a default IP Address 192 168 168 168 Providing that you are communicating with the unit from a node on the same subnet this allows you to contact the RSM with
64. ccount allows access to the target port b Ifa valid username password is not entered in 30 seconds or three attempts the port will timeout and disconnect Notes e f you intend to use SSH to establish direct connections to the RSM the Direct Connect ON PASSWORD option must be selected e f Supervisor commands are disabled at the Network Port then accounts that permit Supervisor commands will not be able to initiate a Direct Connection e If Supervisor commands are enabled at the Network Port then accounts with Supervisor access and accounts without Supervisor access will both be allowed to establish Direct Connections e f your user account does not permit access to the target port the connection will be refused 8 3 3 1 Telnet amp SSH Functions Connecting to an RS232 Port using Direct Connect Direct Connect TCP port numbers are as follows Standard Telnet Direct Connection with Password a RSM 8 e Serial Ports TCP port numbers 2101 through 2108 Internal Modem Port TCP port number 2109 RSM 16 amp RSM 16DC Serial Ports TCP port numbers 2101 through 2116 Internal Modem Port TCP port number 2117 RSM 32 amp RSM 32DC Serial Ports TCP port numbers 2101 through 2132 nternal Modem Port TCP port number 2133 Standard Telnet Direct Connection without Password 8 RSM 8 Serial Ports TCP port numbers 2301 through 2308 Internal Modem Port TCP port nu
65. ch lists all currently defined accounts Key in the name of the account you wish to delete and press Enter The RSM will delete the specified account without further prompting Web Browser Interface From the User Configuration menu click the View Modify Users link The RSM will display a menu that lists all currently defined accounts Select the Delete User box then click the down arrow scroll to the account you wish to delete select the account and then click Choose User The RSM will display a screen that lists details for the specified account click Delete User to confirm deletion Notes Deleted accounts cannot be automatically restored The RSM allows you to delete the default super account which is included to permit initial access to command mode Before deleting the super account make certain to create another account that permits Supervisor Access If you do not retain at least one account with Supervisor Access you will not be able to invoke supervisor level commands Configuration 5 7 RS232 Port Configuration When responding to prompts invoking commands and selecting items from port configuration menus note the following Configuration menus are only available to accounts and ports that permit Supervisor commands If you are configuring the RSM via modem modem parameters will not be changed until after you exit command mode and disconnect from the RSM 5 7 1 RS232 Port Modes The RSM off
66. connect Sequence cannot terminate a Direct Connection For more information please refer to Section 8 Availability Supervisor Non Supervisor Format Default x Response Verbose The RSM will send the Disconnected message followed by the Port Status Screen Terse 3 A Audit Log Reads the contents of the Audit Log and displays them on a screen which includes command options that can be used to erase the Audit Log The Audit log provides a record of command activity at all RSM ports For more information please refer to Section 5 4 3 Availability Supervisor Only Format A search Enter Where the search option defines a text string When the search option is included the A command will display all Audit Log Records that contain the specified text Note The Audit Log s Delete function will delete all stored records the Delete operation will not be limited to only the records displayed by the search option Response Displays the Audit Log screen 13 3 Command Reference Guide C Connect Establishes a bidirectional connection between two ports For more information see Section 7 1 There are two types of connections e Resident Connect If the C command specifies only one port your resident port will be connected to the specified port Third Party Connect If the C command specifies two ports the unit will connect the two ports indicated Third Party Connections can only be initiated by ports and
67. console ports This snapshot of the last data received is stored in memory and can be viewed saved or erased by the system operator at any time Console messages can be stored in the RSM port buffers and sent to a remote location via SYSLOG or an SNMP message can be generated to alert administrators when new console messages are received 1 1 Introduction Configuration Backup Once you have configured the RSM to fit your application parameters and options can be saved to an ASCII text file on your PC This allows you to quickly restore user selected parameters if unit configuration is accidentally altered or deleted Saved parameters can also be uploaded to other RSM units This allows rapid set up when several units will be configured with identical or similar parameters RSM 8 RSM 16 RSM 16DC RSM 32 and RSM 32DC Units This User s Guide discusses five different models from our RSM product line the RSM 8 RSM 16 RSM 16DC RSM 32 and the RSM 32DC Throughout this User s Guide all of these units are referred to as the RSM Note however that these units differ as described below RSM 8 8 Serial Ports 100 to 240 VAC 50 60 Hz 5 Watts RSM 16 16 Serial Ports 100 to 240 VAC 50 60 Hz 5 Watts RSM 16DC 16 Serial Ports 48 VDC RSM 32 32 Serial Ports 100 to 240 VAC 50 60 Hz 5 Watts RSM 32DC 32 Serial Ports 48 VDC Aside from the differences listed above all other features function identically in all fi
68. d the k argument offers the following options 1 SSH1 2 SSH2RSA 3 SSH2DSA For example to obtain the public SSH key for an SSH2 RSA client type K 2and then press Enter Note Although the RSM does not support SSH1 the K 1 command will still return a key for SSH1 Telnet amp SSH Functions 8 5 The Direct Connect Feature The Direct Connect feature allows you to initiate a Telnet SSH or Raw Socket session with the RSM and make an immediate connection to a specific RS232 Port of your choice without first being presented with the command interface This allows you to connect to a TCP port that is mapped directly to one of the RSM s RS232 Serial Ports Direct Connect employs unique pre assigned TCP port numbers for each RS232 Port The user connects to the port of choice by including the associated TCP port number in the Telnet or SSH connect command line The Direct Connect feature can be individually configured at each RS232 Port and can be used to connect to Any to Any Passive Buffer or Modem Mode ports 8 3 1 Standard Telnet Protocol SSH and Raw Socket The Direct Connect feature allows you to establish port connections using either Standard Telnet Protocol SSH encryption or Raw Socket When Standard Telnet Protocol is used the RSM will respond to all IACs When configuring a port to allow Direct Connections using SSH protocol note that the Direct Connect option Port Configuration Menu Item 31 must be set t
69. d selecting parameters press Esc to copy the selected parameters 5 10 Save User Selected Parameters Although this step is optional it is strongly recommended to save all user defined parameters to an ASCII file as described in Section 11 This will allow quick recovery in the event of accidental deletion or reconfiguration of port parameters 5 52 6 The Status Screens The Status Screens display connection status and communication parameters for the RS232 ports and the Network Port There are four different status screens The Port Status Screen S the Port Diagnostics Screen SD the Network Status Screen SN and the Port Parameters Screens W Note The status screens discussed in this section are only available via the Text Interface The status screens cannot be accessed via the Web Browser Interface The Status Screens PORT STATUS Site ID undefined 02 07 2007 00 33 38 GMT GMT 0000 STATUS undefined undefined undefined undefined l undefined l undefined undefined l undefined l MODEM l l l l l ooooooooo Enter H for command menu RSM gt Figure 6 1 Port Status Screen Sample Data Shown RSM 8 Unit Shown 6 1 The Port Status Screen S The Port Status Screen lists the general status of the RSM s sixteen RS 232 ports To display the Port Status Screen access the Text Interface command m
70. diate radio frequency energy and if not installed and used in accordance with the instruction manual may cause harmful interference to radio communications Operation of this equipment in a residential area is likely to cause harmful interference in which case the user will be required to correct the interference at his own expense This device complies with part 15 of the FCC Rules Operation is subject to the following two conditions 1 This device may not cause harmful interference and 2 this device must accept any interference received including interference that may cause undesired operation WARNING Changes or modifications to this unit not expressly approved by the party responsible for compliance could void the user s authority to operate the equipment EMC Safety and R amp TTE Directive Compliance The CE mark is affixed to this product to confirm compliance with the following European Community Directives Council Directive 89 336 EEC of 3 May 1989 on the approximation of the laws of Member States relating to electromagnetic compatibility and e Council Directive 73 23 EEC of 19 February 1973 on the harmonization of the laws of Member States relating to electrical equipment designed for use within certain voltage limits and e Council Directive 1999 5 EC of 9 March on radio equipment and telecommunications terminal equipment and the mutual recognition of their conformity Industry Canada This Class A digita
71. e Allows the following mode specific parameters to be defined Reset String Redefines the modem reset string The Reset String can be sent prior to the Initialization string Default ATZ Initialization String Defines a command string that can be sent to initialize a modem to settings required by your application Default AT amp C1 amp D2S0 1 amp B1 amp H1 amp R2 Hang Up String Although the RSM will pulse the DTR line to hang up an attached modem the Hang Up string is often useful for controlling modems that do not use the DTR line Default undefined Periodic Reset Value Determines how often the Reset String will be sent to the modem at this port Note When communicating with the RSM v a modem these parameters will not be changed until after you exit command mode and disconnect Buffer Mode Allows the following mode specific parameters to be defined Buffer DateTime Enables Disables the Time Date stamp for buffered data When enabled the RSM will add a time date stamp whenever five seconds elapse between data items received Default On Buffer Connect When enabled the RSM will continue to Buffer captured data while you are connected to the Buffer Mode port Default Off 5 21 Configuration Network Services Direct Connect Direct Connect allows users to access the RSM and automatically create a connection between the Network Port and a specific RS232 port by including the
72. e 27 and press Enter to display the LDAP Parameters menu Figure 5 22 At the LDAP Parameters Menu type 5 and press Enter and then use the resulting submenu to set the Bind Type to Kerberos Next return to the LDAP Parameters menu Note that the LDAP Parameters Menu now includes a prompt which is used to select Kerberos parameters Type 14 and press Enter to display the Kerberos Set Up menu as shown in Figure 5 32 Web Browser Interface At the Home Screen click on the Network Configuration link to display the Network Configure menu Figure 5 10 and then click on the LDAP Parameters link to display the LDAP Parameters menu Figure 5 23 At the LDAP Parameters menu click on the LDAP Kerberos Setup link to display the LDAP Kerberos Setup menu as shown in Figure 5 33 The LDAP Kerberos Setup menu allows you to define the following parameters Port Default 88 Realm Default Undefined Key Distribution Centers KDC1 through KDC5 Default Undefined Domain Realms 1 through 5 Default Undefined 5 46 Configuration TACACS Enable Off Primary address undefined Secondary address undefined Secret Word undefined Fallback Timer 3 Sec Fallback Local Off Authentication Port 49 Enter lt CR gt to change lt ESC gt for previous menu Figure 5 34 The TACACS Parameters Menu Text Interface 0 SECURE CONSOLE MANAGER Location undefined Navigation Configur
73. e 5 17 Nomain Name Server Menu Text Interface UL 2 REMOTE SITE MANAGER Location undefined Navigation Configuration DNS Servers System Parameters IP Address t IP Address IPAddess3 iP Address Change Name Servers Serial Port Network Configuration User Management Users 2007 Western Telematic Inc 5 Sterling Irvine Ca 92618 http www wti com Figure 5 18 Domain Name Server Menu Web Browser Interface 5 8 5 Domain Name Server The Domain Name Server menu is used to select IP addresses for the Domain Name Servers When web and network addresses are entered the Domain Name Server interprets the domain name e g www wti com and translates it into an IP address Note that if you don t define at least one DNS server then IP addresses must be used rather than domain names To access the Domain Name Server Menu proceed as follows Text Interface Type N and press Enter to display the Network Parameters Menu Figure 5 9 At the Network Parameters Menu type 7 and press Enter The Static Route Menu should appear as shown in Figure 5 17 Web Browser Interface Click on the Network Configuration link on the left hand side of the RSM Home screen to display the Network Configuration menu Figure 5 10 From the Network Configuration Menu Click the Domain Name Server link to display the menu shown in Figure 5 18 5 35 Configuration SNMP ACCESS Enable Off Contact
74. e 5 31 If the Delete LDAP Group menu shows the desired group then click the Delete LDAP Group button to immediately delete the group 5 44 Configuration LDAP KERBEROS SETUP 1 Port 88 2 Realm KDC KDC1 KDC5 Domain Realm Domain Realm1 Domain Realm5 Enter lt CR gt to select lt ESC gt for previous menu Figure 5 32 LDAP Kerberos Set Up Menu Text Interface REMOTE SITE MANAGER Location undefined Navigation Home Configuration LDAP Kerberos Setup System Parameters Serial Port Port Network Configuration Realm User Management Users KDC 1 KDC2 KDC 3 KDC 4 KDC 5 Domain Realm 1 Domain Realm 2 IEEE DomanReam3 c m Domain Realm 4 Domain Realm 5 Change LDAP Kerberos Parameters 2007 Western Telematic Inc 5 Sterling Irvine Ca 92618 http www wti com Figure 5 33 LDAP Kerberos Set Up Menu Web Browser Interface 5 8 7 5 LDAP Kerberos Set Up Kerberos is a network authentication protocol which provides a secure means of identity verification for users who are communicating via an insecure network 5 45 Configuration To access the LDAP Kerberos Set Up menu access the command mode using a port and password that permit access to Supervisor Level commands and then proceed as follows Text Interface Type N and press Enter to display the Network Parameters Menu Figure 5 9 At the Network Parameters Menu typ
75. e and configure the feature via the System Parameters menus as described in this section and then define a callback number for each desired user account as described in Section 5 6 To configure and enable the Callback function proceed as follows Text Interface Type F and press Enter to access the System Parameters menu then type 6 and press Enter to display the Callback Security Menu Web Browser Interface Click the System Properties link on the left hand side of the screen to access the System Configuration menu then click the Configure Callback Security link to display the Callback Security Menu In both the Text Interface and Web Browser Interface the Callback Security Menu offers the following options Callback Enable This prompt offers five different configuration options for the Callback Security feature Default 2 On Callback Without Password Prompt Off All Callback Security is disabled On Callback Without Password Prompt Callbacks will be performed for user accounts that include a Callback Number and the login prompt will not be displayed when the user s modem answers If the account does not include a Callback Number that user will be granted immediate access and a Callback will not be performed On Callback With Password Prompt Callbacks will be performed for user accounts that include a Callback Number and the login prompt wil be displayed when the user s modem answers accounts
76. e displayed Web Browser Interface From the Edit User menu click the Add User link The RSM will display the Add User menu Figure 5 6 The Add Username Menu can be used to define the following parameters for each new account Username Up to 32 characters long and cannot include non printable characters Duplicate usernames are not allowed Default undefined Password Five to sixteen characters long and cannot include non printable characters Note that passwords are case sensitive Default undefined Supervisor Access Determines whether the account is allowed to invoke Supervisor commands Default Off Port Access Determines which port s this account will be allowed to create connections with Default All Ports Off Callback Number Assigns a number that will be called when this user attempts to access command mode via modem at an RSM port where the Callback Security Function has been enabled as described in Section 5 4 4 Default undefined Notes e If the Callback Number is not defined then Callbacks will not be performed for this user If the Callback Number is not defined for a given user and the Callback Security feature is configured to use either of the On Callback options then this user will be granted immediate access to command mode via modem f the Callback Number is not defined for a given user and the Callback Security feature is configured to use the On Callback ONLY o
77. e of the port s to be disconnected To disconnect all ports enter an asterisk To disconnect a Telnet session enter the Nn format Network Port Number Response Verbose Are you Sure y n if Y unit will respond with Disconnected Terse 5 if Y unit will respond with 3 Example To disconnect Port 2 from Port 3 without the Sure prompt access the Command Mode from a third port with Supervisor Level command capability and type D X 2 Enter or p x 3 Enter E Erase Buffer Erases data from the buffer for a specified port s Note that erased data cannot be recovered Availability Supervisor Non Supervisor Format E Y x x Enter Where x Is the number or name of the port buffer s to be cleared To erase buffers for all ports enter an asterisk X Optional Suppresses the SURE Y N prompt Response Verbose Are You Sure y n if Y unit responds with OK Terse 5 if Y the unit will respond with O Example To clear the buffer for Port 3 access the Command Mode from a port and account that permit Supervisor commands and type E 3 Enter 13 5 Command Reference Guide F Set System Parameters Displays a menu which is used to define the Site ID message create user accounts set the system clock and configure and enable the Invalid Access Lockout feature Note that all functions provided by the F command are also available via the Web Browser Interface in the System Parameters
78. e port has accessed command mode f the connected port is listed as Nn where n is a number this indicates that the RS232 port is connected to the Network port The numbers indicate which of the available Telnet sessions is being used for example C 06 Baud The baud rate selected for each port COM The Data Bits Parity and Stop Bits selected for each port For example 8N1 indicates Eight data bits No parity and One stop bit HS The handshaking flow control mode for each port Mode The user selected Port Mode BUF The amount of data in bytes currently stored in the buffer for this port CTS The High Low status of the CTS line at the RS232 interface 6 3 The Status Screens NETWORK STATUS MAC Address 00 09 9b 00 b7 fa PORT TCP PORT STATUS USERNAME PORT TCP PORT STATUS USERNAME 23 Active super 23 Active super N18 Free Free N19 Free Free N20 Free Free N21 Free Free N22 Free Free N23 Free Free N24 Free Free N25 Free Free N26 Free Free N27 Free Free N28 Free Free N29 Free Free N30 Free Free N31 Free Enter lt CR gt to show more lt ESC gt to quit Figure 6 3 Network Status Screen 6 3 The Network Status Screen SN This screen lists current conditions for the Network Port To display the Network Status Screen type SN and press Enter The Network Status Screen is only available when you have logged in using an account and port that permit Supervis
79. e will still respond to the ping command providing that the ping command has not been disabled 5 8 Configuration The Invalid Access menus allow you to select the following Lockout Enable Enables Disables the Invalid Access Lockout feature Default On Lockout Attempts The number of invalid attempts required to activate the Invalid Access Lockout feature Default 9 Lockout Duration The length of time ports will remain locked when an Invalid Access Lockout occurs If the duration is set at Infinite then ports will remained locked until the UL command is issued Default 30 Minutes 5 4 3 The Audit Log This feature allows you to create a record of command activity at all RSM ports Audit Log records will include the time date username and a brief description of each logged event e g Connect Login etc The Audit Log is enabled and configured via the System Parameters Menus as described in Section 5 4 The System Parameters Menus includes three different options for Audit Log configuration Off Audit Log disabled On with Syslog and On without Syslog When On with Syslog is selected each individual Audit Log record will be sent out to the user defined Syslog IP Address as a Syslog message at the time that it is generated The Syslog IP Address is defined via the Network Parameters Menu as described in Section 5 8 To read or erase the Audit Log access command mode via the Text Interface
80. ees 6 4 6 4 The Port Parameters Screens W 00 cee eee ete eee 6 5 llc EEUU 7 1 TAs Anysto Any Mode esce bes werde es dee ERE TREE EE 7 1 7 1 1 Port Connection and Disconnection 000 cee ee 7 1 7 1 1 1 Connecting Ports 7 1 7 1 1 2 Disconnecting Ports errero eer ui eiar enne ne a eee 7 3 7 1 2 Defining Hunt Groups sssssssssseeee een 7 5 7 2 Passive Mod n cone Ue Oey ERR Re be eed ura e dde qon adis a ood dv 7 6 Ta Buffer Mode zc iso Rr Unde abe e aie a ROO d deme De Dn a n 7 7 7 3 1 Reading Data from Buffer Mode Ports 0 c eee eee 7 7 VA CRM od sua p 7 8 7 4 Modem Mod8 iocos dE dees de pr aa eer e re ga ge dere 7 9 Telnet amp SSH Functions 0 0 cece eee eh hh hn 8 1 8 1 Network Port Numbers sssseseeee e n 8 1 8 2 SSH Encryption 0 eens 8 1 8 3 The Direct Connect Feature slsssssssee enn 8 2 8 3 1 Standard Telnet Protocol SSH and Raw Socket 0 00 eee eee 8 2 9 39 2 Configurations i esl eek Rr Ae e t RE E TUR ERES 8 2 8 3 8 Connecting to an RS232 Port using Direct Connect 0 005 8 4 8 3 4 Terminating a Direct Connect Session 00 0 cece eee 8 6 THe Syslog Eeat t sexes Ro m a rele e xe usc verano geek dee ee ane one E 9 1 94 Configuration icis soos eI he up ee de races Mahe Minh ree ee 9 1 9 2 Criteria for Generating a Syslog Message isses eese ees 9 2 9 3 Testing Syslo
81. efault undefined Fallback Timer Determines how long the RSM will continue to attempt to contact the primary RADIUS Server before falling back to the secondary RADIUS Server Default 3 Seconds Fallback Local Determines whether or not the RSM will fallback to its own password username directory when an authentication attempt fails When enabled the RSM will first attempt to authenticate the password by checking the RADIUS Server if this fails the RSM will then attempt to authenticate the password by checking its own internal username directory This parameter offers three options Off Fallback Local is disabled Default On All Failures Fallback Local is enabled and the unit will fallback to it s own internal user directory when it cannot contact the Radius Server or when a password or username does not match the Radius Server On Transport Failure Fallback Local is enabled but the unit will only fallback to it s own internal user directory when it cannot contact the Radius Server Authentication Port The Authentication Port number for the RADIUS function Default 1812 Accounting Port The Accounting Port number for the RADIUS function Default 1813 5 50 COPY PORT PARAMETERS COMMUNICATION SETTING 1 Baud Rate 2 Bits Parity 3 Stop Bits 4 Handshake GENERAL PARAMETERS Supervisor Mode PORT MODE PARAMETERS Port Name Port Mode DTR Output Buffer Params Modem P
82. elects the attribute that list group membership s Default undefined Group Membership Value Type Default DN Fallback Enables Disables the LDAP fallback feature When enabled the RSM will revert to its own internal user directory see Section 5 5 if no defined users are found via the LDAP server In this case port access rights will then be granted as specified in the default LDAP group Default Off 5 8 7 1 Adding LDAP Groups Once you have defined several users and passwords via your LDAP server and assigned those users to LDAP Groups you must then grant command and port access rights to each LDAP Group at each individual RSM unit To add LDAP groups to your RSM unit access the command mode using a port and password that permit access to Supervisor Level commands and then proceed as follows Text Interface Type N and press Enter to display the Network Parameters Menu Figure 5 9 At the Network Parameters Menu type 27 and press Enter to display the LDAP parameters menu Figure 5 22 then type 13 and press Enter to display the LDAP Group Menu Figure 5 24 At the LDAP Group Menu type 2 and press Enter to display the Add LDAP Group menu Figure 5 25 Web Browser Interface At the RSM Home Screen click on the Network Configuration link to display the Network Configure menu Figure 5 10 and then click on the LDAP Parameters link to display the LDAP Parameters menu Figure 5 23 At the LDAP P
83. er of invalid access attempts For more information please refer to Section 5 4 2 8 Telnet amp SSH Functions 8 1 Network Port Numbers Whenever an inbound Telnet or SSH session connects to an RSM RS232 Port the Port Status Screen and Port Diagnostics Screen will indicate that the RS232 port is presently connected to Port Nn where N indicates a network connection and n is a number that lists the logical Network Port being used for example N11 This Nn number is referred to as the logical Network Port Number 8 2 SSH Encryption In addition to standard Telnet protocol the RSM also supports SSH connections which provide secure encrypted access via network In order to communicate with the RSM using SSH protocol your network node must include an appropriate SSH client Note that when the K Send SSH Key command is invoked the RSM can also provide you with a public SSH key which can be used to streamline connection to the RSM when using SSH protocol Although you can establish an SSH connection to the unit without the public key the public key provides validation for the RSM and once this key is supplied to the SSH client the client will no longer display a warning indicating that the RSM is not a recognized user when the client attempts to establish a connection The K command uses the following format K k Enter Where k is an argument that determines which type of public key will be displayed an
84. ers four different RS232 port operation modes Any to Any Mode Allows communication between connected ports and permits access to command mode Any to Any Mode Ports can be connected to other Any to Any Passive Buffer or Modem Mode Ports by invoking the C command The Any to Any Mode is available to all ports and is the default Port Mode for Ports 1 and 2 Passive Mode Allows communication between connected ports but does not allow access to command mode Passive Mode Ports can be connected by accessing command mode from a free Any to Any or Modem Mode port and invoking the C command Passive Mode is not available at Ports 1 and 2 or the Network Port and is the default mode at Ports 3 and above Buffer Mode Allows storage of data received from connected devices Collected data can be retrieved by accessing command mode from a free Any to Any or Modem Mode Port and issuing the Read Buffer R Command Furthermore Buffer Mode ports can also be configured to support the Syslog and SNMP Trap features discussed in Sections 9 and 10 The Buffer Mode is not available at Ports 1 and 2 or the Network Port Modem Mode Allows communication between connected ports permits access to command mode and simplifies connection to an external modem Modem Mode ports can perform all functions normally available in Any to Any Mode but Modem Mode also allows definition of a Hang Up String Reset String and Initialization String The Modem Mode is not a
85. es generated by the RSM This is often useful if your Syslog Daemon does not perform time date stamping itself Syslog Daemon In order to capture messages sent by the RSM a computer must be running a Syslog Daemon set to UDP Port 514 at the IP address specified in Step 4 above 9 2 Criteria for Generating a Syslog Message Once the RSM is properly configured Syslog messages will be generated as follows 1 Data Terminated by NULL Character Syslog will generate a message whenever a properly configured Buffer Mode Port receives data or text terminated by a NULL character 0x00 The message sent to the Syslog Daemon will contain header information and the event buffered data or text captured by the RSM Note that the event written to the buffer port will also be retained If a Buffer Mode Port receives data or text that is not terminated by a NULL character it will not be sent out as a Syslog message but will be retained by the buffer providing the maximum Syslog message size described in item 2 below is not exceeded This prevents the RSM from sending spurious characters that do not represent actual text or data Maximum Syslog Message Size Reached Syslog messages are limited to 1024 bytes including the header Therefore if data or text in the buffer exceeds this limit the queued message will be sent immediately and the rest of the data will be accumulated and forwarded in another subsequent message either when a NULL i
86. ess o e Port 4 Access On v Port 6 Access on el Port 7 Access on e Port 8 Access on e Port 9 Access on el Configuration Port 5 Access Y 2007 Western Telematic Inc 5 Sterling Irvine Ca 92618 http www wti com Figure 5 28 View LDAP Group Menu Web Browser Interface RSM 8 Shown 5 8 7 2 Viewing LDAP Groups If you want to examine an existing LDAP group definition on an RSM unit the View LDAP Groups function can be used to review the group s Access Level and Port Access Settings To view an existing LDAP group proceed as follows Text Interface Type N and press Enter to display the Network Parameters Menu Figure 5 9 At the Network Parameters Menu type 27 and press Enter to display the LDAP parameters menu Figure 5 22 then type 13 and press Enter to display the LDAP Group Menu Figure 5 24 then type 1 and press Enter The RSM will prompt you to select the desired group key in the name of the group and press Enter the RSM will display the View LDAP Group screen Figure 5 27 Web Browser Interface At the RSM Home Screen click on the Network Configuration link to display the Network Configure menu Figure 5 10 and then click on the LDAP Parameters link to display the LDAP Parameters menu Figure 5 23 At the LDAP Parameters menu click on the LDAP Group Configuration link to display the LDAP Group Configuration menu then click the View Modify LDAP Group link to displ
87. etwork and your PC must be equipped with a JavaScript enabled web browser 1 Start your JavaScript enabled Web Browser key the RSM s IP address default 192 168 168 168 into the web browser s address bar and press Enter 2 Username Password Prompt A message box will prompt you to enter your username and password The default username is super all lower case no quotes and the default password is also super 3 Ifa valid username and password are entered the RSM Home Screen will appear as shown in Figure 5 2 REMOTE SITE MANAGER Location undefined Navigation NetReach Model RSM Configuration SSHv2 Remote Site Manager System Parameters User Management Users et a a a CM i tn cA a RSM Version 2 16 2007 Western Tetematic Inc 5 Sterling Irvine Ca 92618 http www wti com Figure 5 2 The Home Screen Web Browser Interface Configuration 5 2 System SetUp Ports Serial Ports 1 and 2 are reserved as SetUp Ports and will always permit password protected access to Supervisor commands Therefore Ports 1 and 2 cannot be configured as Buffer Mode Port or Passive Mode Ports because these port modes do not permit access to command mode In addition the Supervisor Mode cannot be disabled at Ports 1 and 2 5 3 Configuration Menus Although the Web Browser Interface and Text Interface provide two separate means for selecting parameters both interfaces allow access to the same set
88. face 11 1 Sending Parameters to a File 1 Start your terminal emulation program e g HyperTerminal and access the Text Interface command mode using an account and port that permit Supervisor commands 2 When the command prompt appears type U and press Enter The RSM will prompt you to configure your terminal emulation program to receive an ASCII download a Set your terminal emulation program to receive an ASCII download and the specify a name for a file that will receive the saved parameters e g RSM PAR b Disable the Line Wrap function for your terminal emulation program This will prevent command lines from being broken in two during transmission 3 When the terminal emulation program is ready to receive the file return to the RSM s Save Parameter File menu and press Enter to proceed RSM parameters will be saved on your hard drive in the file specified in Step 2 above 4 The RSM will send a series of ASCII command lines which specify currently selected parameters The last line of the file should end with a G 00 command When the download is complete press Enter to return to the command prompt Saving and Restoring Configuration Parameters 11 2 Restoring Saved Parameters This section describes the procedure for using your terminal emulation program to send saved parameters to the RSM 1 Start your terminal emulation program and access the RSM s Text Interface command mode using an account and
89. g Configuration lisse 9 3 SNMP Traps isis crux ys Ee e EE ie OR are e Aye as bx Ee edn iE Bynes sane A Lm EC ae 10 1 10 1 Configuration sesser tati Sede et eae ide I erc ha EEY Rua RE AER DRE PS 10 1 10 2 SNMP Trap Message sssssssses eee hh 10 2 10 3 How and When SNMP Traps are Sent 00 0 0 10 2 10 4 Testing the SNMP Trap Function ene 10 3 Saving and Restoring Configuration Parameters 0000 0c eee eee eee 11 1 11 1 Sending Parameters to a File 0 0 0 cette 11 1 11 2 Restoring Saved Parameters 0 0 0 c ees 11 2 Upgrading RSM Firmware 0 0c eee 12 1 Command Reference Guide leen nnn 13 1 13 1 Command Conventions llle nn 13 1 13 2 Command Summary 0 0 ce ete 13 2 19 3 Command Set ssc 600 eee ata pes duca m P bebe deed de ee eee 13 3 Table of Contents Appendices A RS232 Port Interface 22 26 ee eee Apx 1 B Specifications d c vie ee Aui nis es RE EE S eae gee eee es Apx 2 C Customer Service crgo ek Ros ao Eaedem e edi E RR tage ERR dea Sedge Gag Apx 3 lp dap PETI Index 1 VI Table of Contents List of Figures 2 1 2 2 2 3 2 4 3 1 3 2 4 1 5 1 5 2 5 3 5 4 5 5 5 6 5 7 5 8 5 9 5 10 5 11 5 12 5 13 5 14 5 15 5 16 5 17 5 18 5 19 5 20 5 21 5 22 5 23 5 24 5 25 5 26 5 27 5 28 5 29 5 30 5 31 5 32 5 33 5 34 5 35 5 36 5 37 5 38 6 1
90. har Sequence Disc Inact Timeout Command Echo Accept Break Enter lt CR gt to change lt ESC gt exit 192 168 168 168 255 255 255 0 undefined Off Off Off undefined SERVERS AND CLIENTS Telnet Access SSH Access Web Access SYSLOG Addr SNMP Access SNMP Trap LDAP TACACS RADIUS PING Access Raw Socket Access On On On undefined off Off Off Off Off On Off Figure 5 9 Network Parameters Menu Supervisor Mode Only Location undefined Navigation Home Configuration P Serial Port N figurati User Management Users Network Configuration Network Parameter Network Port Parameters IP Security Static Route DNS Servers SNMP Parameters LDAP Parameters TACACS Parameters RADIUS Parameters REMOTE SITE MANAGER 2007 Westem Telematic Inc 5 Sterling Irvine Ca 92618 http www wti com Figure 5 10 Network Configuration Menu Web Browser Interface 5 24 Configuration To access the Network Parameters Menus proceed as follows Text Interface Type N and press Enter The Network Parameters Menu shown in Figure 5 9 will be displayed Web Browser Interface Click on the Network Configuration link on the left hand side of the screen The RSM will display the Network Configuration menu shown in Figure 5 10 which allows you to access the various submenus used to configure the network port Notes
91. ibed in Section 5 6 3 Delete User Clears user accounts as described in Section 5 6 4 5 6 1 Viewing User Accounts The View User Directory option allows you to view details about each account including the ports the account is allowed to access and whether or not the account is allowed to invoke Supervisor commands The View User option will not display actual passwords and instead the password field will read either defined or undefined Note that the View User Accounts function is only available to users who have accessed command mode using a password that permits Supervisor Level commands To view account details proceed as follows Text Interface From the User Directory menu type 1 and press Enter The RSM will display a screen which lists all defined user accounts Key in the name of the desired account and then press Enter Web Browser Interface From the User menu click the View Modify User link The RSM will display a menu that allows you to select the desired user and directory function Select the View User button and then click on the down arrow scroll to the desired username select the username and then click Choose User 5 15 Configuration ADD USERNAME TO DIRECTORY Username Password undefined Supervisor Access Off Port Access PORT PORT NAME ACCESS PORT PORT NAME ACCESS undefined undefined undefined undefined undefined undefined undefined MODEM
92. iddle of a transfer when a character that accidentally matches the Logoff Character is passed Sequence Disconnect Enables Disables and configures the Resident Disconnect command This offers the option to disable the Sequence Disconnect select a one character format or a three character format Default One Character Notes When a Resident Connection is initiated the RSM will list the connected ports and the command required in order to terminate the connection The One Character Disconnect is intended for situations where the other port should not receive the disconnect command When the Three Character format is selected the disconnect sequence will be passed to the other port When the Three Character format is selected the Resident Disconnect Sequence will use the Enter LLL Enter format where L is the selected Logoff Character Inactivity Timeout Enables and selects the Timeout Period for this port If enabled the port will disconnect when no additional data activity is detected for the duration of the timeout period When the port is set for Any to Any Mode Passive Mode or Buffer Mode the default setting is Off When set for Modem Mode the default setting is 5 minutes Notes The Inactivity Timeout value is also applied to Direct Connections The Inactivity Timeout is also applied to non connected ports that are left in command mode If the timeout is enabled and no additional activity is detected
93. igured for Any to Any Mode and it is also the default mode for Ports 1 and 2 7 1 1 Port Connection and Disconnection The RSM allows communication between devices without the requirement that both ports use the same communication parameters 7 1 1 1 Connecting Ports Two different types of connections can be made between RSM ports Resident Connections and Third Party Connections Resident Connections Your resident port issues a C command to connect to a second port For example Port 4 issues the C command to connect to Port 5 Third Party Connections Supervisor Only Your resident port issues a C command to create a connection between two other ports For example Port 1 is your resident port and Port 1 issues a command to connect Port 2 to Port 3 Notes Third Party Connections can only be initiated by accounts and ports that permit Supervisor commands e The RS232 Ports cannot employ the C command to initiate a connection to the Network Port e f your account does not permit Supervisor commands you will only be able to connect to ports allowed by your account Accounts with Supervisor access are allowed to connect to all RS232 ports Operation To Connect ports proceed as follows 1 2 Access command mode via the Text Interface Invoke the C command to connect the desired ports a Resident Connect To connect your resident port to another port type C xx Enter Where xx is the number or
94. iod the port will disconnect Default 5 Minutes Note The Inactivity Timeout value is also applied to Direct Connections Command Echo Enables or Disables the command echo for the Network Port Default On Accept Break Determines whether the port will accept breaks received from the attached device and pass them along to a connected port When enabled breaks received at this port will be passed to any port this port is connected to and sent to the device connected to the other port When disabled breaks will be refused at this port Default On 5 28 Configuration IP SECURITY CLIENT LIST FOR hosts allow FILE 1 CLIENT LIST FOR hosts deny FILE Enter lt CR gt to select menu lt ESC gt for previous menu Figure 5 13 IP Security Menu Text Interface REMOTE SITE MANAGER Location undefined Navigation Home Vorfigumbe n IP Security Parameters r Serial Port Allow Host Parameters Deny Host Parameters Network Configuration Mask 1 Mask 9 User Management Users Mask 2 Mask 10 Mask 3 0 Mask 11 Mask 4 0 Mask 12 Mask 5 0 Mask 13 Mask 6 Mask 14 Mask 7 i Mask 15 Mask 8 0 Mask 16 Change IP Security Parameters 2007 Western Telematic Inc 5 Sterling Irvine Ca 92618 http www wti com Figure 5 14 IP Security Menu Web Browser Interface 5 8 3 IP Security The RSM can restrict unauthorized IP addresses from est
95. irst available Modem type C MODEM Enter Hunt Group Example 2 1 Ports 3 4 and 5 are Any to Any Mode ports All three ports are named SERVER 2 Your resident port is Port 1 If you want to connect Port 2 to the first available server type C 2 SERVER Enter Operation 7 2 Passive Mode Passive Mode Ports function the same as Any to Any Mode Ports but do not allow access to command mode A Passive Mode Port can communicate with other ports but cannot enter command mode and therefore cannot redefine parameters display status or connect or disconnect ports The Passive Mode is the default at Serial Ports 3 and above Passive Mode Ports can be connected by accessing command mode from a free Any to Any or Modem Mode Port and invoking the Third Party Connect or Resident Connect Command as described in Section 7 1 1 Passive Mode ports will not buffer data except during baud rate conversion Note n order to ensure Supervisor access to important command functions the Passive Mode is not available to Port 1 the SetUp Port Operation 7 3 Buffer Mode The Buffer Mode allows collection of data from various devices without the requirement that all devices use the same communication parameters e g baud rate parity etc In addition Buffer Mode ports can also be configured to support the SYSLOG and SNMP Trap functions as described in Sections 9 and 10 Notes Buffer Mode Ports cannot access command mode B
96. is Quick Start procedure it is recommended to configure your communications program to accept the default parameters The RSM features a default IP Address 192 168 168 168 and a default Subnet Mask 255 255 255 0 This allows network access to command mode providing that you are contacting the RSM from a node on the same subnet When attempting to access the RSM from a node that is not on the same subnet please refer to Section 5 8 for further configuration instructions 1 Access Command Mode The RSM includes two separate user interfaces the Text Interface and the Web Browser Interface The Text Interface is available via Local PC SSH Client Telnet or Modem and can be used to both configure the RSM and create connections between ports The Web Browser interface is only available via TCP IP network and can be used to configure the unit but cannot create port connections e Via Local PC Start your communications program and then press Enter Via SSH Client Start your SSH client enter the default IP address 192 168 168 168 for the RSM and invoke the connect command Via Web Browser Make certain that Web Browser access is enabled as described in Section 5 8 Start your JavaScript enabled Web Browser enter the default RSM IP address 192 169 168 168 in the Web Browser address bar and then press Enter Via Telnet Make certain that Telnet access is enabled as described in Section 5 8 1 Start your Telnet client and e
97. l apparatus complies with Canadian ICES 003 Cet appareil num rique de la classe A est conforme la norme NMB 003 du Canada This product meets the applicable Industry Canada technical specifications The Ringer Equivalence Number is an indication of the maximum number of devices allowed to be connected to a telephone interface The termination on an interface may consist of any combination of devices subject only to the requirement that the sum of the RENs of all the devices does not exceed five Ill Table of Contents 1 Introd cti ri 2 2 rr ees eee Re eee ok See eed ue Tes 1 1 2 Unit Description asear pia ccc eee hh hh hh 2 1 2 1 Front Panel tee LAE RR nc Pp RU RUE heen auk Sd as 2 1 2 2 Back Pariel Re mue poatea ded eds howe ek guo e Rc UR ipsc 2 2 3 Getting Started osc eds see sce e arme ke ceux ee e ecce e cel rima E TR moe Qe BU 3 1 3 1 Quick Hardware Installation llli eh 3 1 3 1 1 Apply Power to the RBM sssssssssesee ee n 3 1 3 1 2 Connect your Control Device to the RSM 0 0 eee ee 3 1 3 2 Communicating with the RBM lsllssssesesee ees 3 2 4 Hardware Installation eleeeeeee RII II uh 4 1 4 1 Connecting Power to the RSM Unit 0 0 cette ee 4 1 4 1 1 AC Powered Units uuan 0c eee eee 4 1 4 1 2 DC Powered Units 0 0 c cette eee 4 1 4 2 Connecting the Network Cable 0 0 eet 4 2 4 3 Connecting Devices to the RSM
98. m Port TCP port number 3333 Teinet amp SSH Functions When establishing a Direct Connection the correct TCP port number must be used If conditions are acceptable e g Target Port must be free and properly configured an immediate connection will be made with one possible exception password entry may first be required depending on configuration settings Note When a Direct Connect attempt fails because the Port is busy the call is rejected at the TCP level Connection Example 1 telnet 1 2 3 4 2108 Enter 8 5 Assume that Port 8 is configured as described in Section 8 3 2 If the RSM s IP address is 1 2 3 4 and you wish to establish a standard Telnet protocol connection with port 8 TCP Port Number 2108 then on a UNIX system the connect command would be invoked as follows The RSM will first send the site ID Port Number Port Name and Telnet Port number and then once a connection is established the Connected message will be sent Telnet amp SSH Functions 8 3 4 Terminating a Direct Connect Session To terminate a Direct Connect session use the client program s disconnect feature The following will occur immediately upon a client initiated disconnect 1 The Network port is disconnected from the RS232 Port 2 The Network session is terminated 3 The RS232 Port is put to sleep Notes The Sequence Disconnect Command which is defined via the Port Configuration menus cannot be used to
99. mber 2309 RSM 16 amp RSM 16DC Serial Ports TCP port numbers 2301 through 2316 Internal Modem Port TCP port number 2317 RSM 32 amp RSM 32DC Serial Ports TCP port numbers 2301 through 2332 Internal Modem Port TCP port number 2333 SSH Direct Connection with Password 8 RSM 8 Serial Ports TCP port numbers 2201 through 2208 e Internal Modem Port TCP port number 2209 RSM 16 amp RSM 16DC Serial Ports TCP port numbers 2201 through 2216 Internal Modem Port TCP port number 2217 RSM 32 amp RSM 32DC Serial Ports TCP port numbers 2201 through 2232 Internal Modem Port TCP port number 2233 8 4 Raw Socket Direct Connection with Password a RSM 8 Serial Ports TCP port numbers 3101 through 3108 e Internal Modem Port TCP port number 3109 RSM 16 amp RSM 16DC Serial Ports TCP port numbers 3101 through 3116 Internal Modem Port TCP port number 3117 RSM 32 amp RSM 32DC Serial Ports TCP port numbers 3101 through 3132 e Internal Modem Port TCP port number 3133 Raw Socket Direct Connection without Password 8 RSM 8 Serial Ports TCP port numbers 3301 through 3308 Internal Modem Port TCP port number 3309 RSM 16 amp RSM 16DC Serial Ports TCP port numbers 3301 through 3316 Internal Modem Port TCP port number 3317 RSM 32 amp RSM 32DC Serial Ports TCP port numbers 3301 through 3332 Internal Mode
100. n In order to apply the LDAP feature you must first define User Names and associated Passwords and group membership via your LDAP server and then access the RSM command mode to enable and configure the LDAP settings and define port access rights and command access rights for each group that you have specified at the LDAP server To access the LDAP Parameters menu access the command mode using a port and password that permit access to Supervisor Level commands and then proceed as follows Text Interface Type N and press Enter to display the Network Parameters Menu Figure 5 9 At the Network Parameters Menu type 27 and press Enter to display the LDAP parameters menu Figure 5 22 Web Browser Interface At the Home Screen click on the Network Configuration link to display the Network Configure menu Figure 5 10 and then click on the LDAP Parameters link to display the LDAP Parameters menu Figure 5 23 Notes Port access rights are not defined at the LDAP server They are defined via the LDAP Group configuration menu on each RSM unit and are specific to that RSM unit alone When LDAP is enabled and properly configured LDAP authentication will supersede any passwords and access rights that have been defined via the RSM user directory If no LDAP groups are defined on a given RSM unit then access rights will be determined as specified by the default LDAP group The default LDAP group cannot be deleted The LD
101. n of ports Accounts with Supervisor access are always allowed to establish connections with all ports but accounts without Supervisor Access can be restricted to a specific port or group of ports Note also that several accounts can be allowed access to the same port 5 12 Configuration 5 6 Managing User Accounts The User Directory function is employed to create new accounts display parameters for existing accounts modify accounts and delete accounts Up to 128 different user accounts can be created The User Directory function is only available when you have logged into command mode using an account and port that permit Supervisor commands Text Interface Type F and press Enter to access the System Parameters Menu From the System Parameters Menu type 1 and press Enter to access the User Directory Web Interface Click the Users link on the left hand side of the screen to access the User Directory management menus In both the Text Interface and the Web Browser Interface the user configuration menu offers the following functions View User Directory Displays currently defined parameters for any RSM user account as described in Section 5 6 1 Add Username Creates new user accounts and allows you to assign a username password command level port access rights and callback number as described in Section 5 6 2 Modify User Directory This option is used to edit or change account information as descr
102. n typing in the value for that option Since the Web Browser Interface and Telnet accessibility are both disabled in the default state you will need to use the Text Interface to contact the unit via Local PC or SSH connection when setting up the unit for the first time After you have accessed command mode using the Text Interface you can then enable Web Access and Telnet Access in order to allow future communication with the unit via Web Browser or Telnet You will not be able to contact the unit via Web Browser or Telnet until you have specifically enabled those options Once Telnet Access is enabled you will then be able to use the Text Interface to communicate with the RSM via local PC Telnet or SSH connection You can also use the text interface to access command mode via the RSM s internal modem or via an external modem installed at one of the RSM s RS232 serial ports In order to use the Text Interface your installation must include Access via Network The RSM must be connected to your TCP IP Network and your PC must include a communications program such as HyperTerminal Access via Modem A phone line must be connected to the RSM s Phone Line port and your PC must include a communications program Access via Local PC Your PC must be physically connected to one of the RSM s RS232 ports as described in Section 4 3 and your PC must include a communications program Configuration To access command mode via the Text
103. name of the port you want to connect The RSM will display the numbers of the connected ports along with the command required in order to disconnect the two ports Example To connect your resident port to Port 8 type c 8 Enter Third Party Connect Supervisors Only To connect any two ports other than your resident port type C xx XX Enter Where xx and XX are two port names or numbers The RSM will display the numbers of the two connected ports Example To connect Port 5 to Port 6 access command mode at a third port that permits Supervisor commands using an account that also permits supervisor commands and invoke the following command C 5 6 Enter Notes Resident Connections RS232 Ports are not allowed to initiate a Resident Connection to the Network Port Third Party Connections RS232 Ports are not allowed to connect another port to the network port For example Port 1 is not allowed to connect Port 3 to the Network Port When the C command specifies the port name it is only necessary to enter enough letters to differentiate the desired port from other ports Type an asterisk to represent the remaining characters in the port name For example to connect your resident port to a port named SALES the connect command can be invoked as C S providing no other port names begin with the letter S Operation 7 1 1 2 Disconnecting Ports There are three different methods for disconnecting ports
104. name or group via SSH or Telnet sessions The RSM also allows direct connections using TCP port assignments Each RSM serial port can be separately configured using simple menu driven commands to set the port password data rate flow control and other operating parameters The full matrix capability of the RSM allows you to easily connect any two ports on the switch even when the ports are using different communications settings Ports can also be connected or disconnected by a third party with supervisor rights and system managers can swap various RS232 devices between ports at a remote location Security and Collocation Features Secure Shell SSHv2 encryption and address specific IP security masks prevent unauthorized access to command and configuration functions The RSM also provides two different levels of user security the Supervisor level and the Non Supervisor level The Supervisor level which is intended for use by system managers and other administrators provides complete access to all RSM port connection disconnection functions operating features and configuration menus and also allows access to any port on the switch The Non Supervisor level is ideal for collocation applications since users are only permitted to view status and connect to the ports allowed by their password Capture Buffer Buffer Mode allows individual ports to capture and store incoming data such as error and status messages received from attached
105. nfiguration link on the left hand side of the RSM Home screen to display the Network Configuration menu Figure 5 10 From the Network Configuration Menu Click the SNMP Parameters link to display the menu shown in Figure 5 21 5 36 Configuration In the Text Interface SNMP parameters are defined via two separate menus The SNMP Access Menu and the SNMP Trap Menu In the Web Browser Interface all SNMP parameters are defined via a single menu Both the Text Interface and Web Browser Interface allow the following parameters to be defined Enable Enables disables SNMP Polling Default Off Note This item only applies to external SNMP polling of the RSM it does not effect the ability of the RSM to send SNMP traps SNMP Contact Default undefined SNMP Location Default undefined SNMP Community Default Public SNMP Manager 1 The IP Address for the first SNMP Manager For more information please refer to Section 10 Default Undefined Note n order to enable the SNMP Trap feature you must define at least one SNMP Manager SNMP Manager 2 Default Undefined Trap Community Default Public 5 37 Configuration EB o W Enable Off LDAP Port 389 Primary Host undefined Secondary Host undefined Bind Type Simple Search Bind DN undefined Search Bind Password undefined User Search Base DN undefined User Search Filter undefined Group Membership Attribute undefined
106. ng Apx 2 Appendix C Customer Service Customer Service hours are from 8 00 AM to 5 00 PM PST Monday through Friday When calling please be prepared to give the name and make of the unit its serial number and a description of its symptoms If the unit should need to be returned for factory repair it must be accompanied by a Return Authorization number from Customer Service WTI Customer Service 5 Sterling Irvine California 92618 Local Phone 949 586 9950 Toll Free Service Line 1 888 280 7227 Service Fax 949 457 8138 Email service wti com Apx 3 Appendices Trademark and Copyright Information WTI and Western Telematic are trademarks of Western Telematic Inc All other product names mentioned in this publication are trademarks or registered trademarks of their respective companies Information and descriptions contained herein are the property of Western Telematic Inc Such information and descriptions may not be copied disseminated or distributed without the express written consent of Western Telematic Inc Copyright Western Telematic Inc 2007 Printed in the United States of America December 2007 Part Number 13662 Revision D Trademarks Used in this Manual HyperTerminal is a registered trademark of Hilgraeve Inc ProComm and ProComm Plus are registered trademarks of Datastorm Technologies Inc Apx 4 Accept Break Network Port Serial Port Access Level Accounting Port Activi
107. nity Consult your network administrator and then use the Network Parameters menus to set the Trap Community 10 2 SNMP Trap Message The trap messages which are sent to the SNMP Managers will appear as follows RSM Port Buffer RSM Site ID site id Port port number byte level byte trigger level reached 10 3 How and When SNMP Traps are Sent 1 When the buffer port reaches the trigger level SNMP Traps are immediately sent to each defined SNMP manager SNMP uses the UDP protocol an unreliable protocol Successful manager receipt of traps are assisted by the following 8 b The RSM verifies that the ARP table is updated completely before sending a trap to each manager defined The user may choose to use the 2nd manager as a backup in the event that the 1st manager fails When an SNMP trap is sent to a manager for a particular port the RSM also sets a one hour timer for that port 8 b If during the hour the buffer never drops below the trap level then SNMP Traps are resent and the timer is reset If during the hour the buffer does drop below the trap level the timer is immediately cleared No more traps will be sent unless the buffer level once again exceeds the trap trigger level SNMP Traps 10 4 Testing the SNMP Trap Function After you have finished setting up the SNMP Trap function it is recommended to test the configuration to ensure that it is working correctly To test configura
108. nly available to accounts and ports that permit Supervisor commands 2 System Parameters Menu Type F Enter to access the System Parameters Menu Set the following parameters a Set Clock and Calendar Use the Systems Parameters menu to set the Real Time Clock and Calendar and or configure and enable the NTP server feature If desired the RSM can time stamp each Syslog message that is sent as described in Step 4 3 Port Parameters Menu Access the Port Parameters Menu for the desired port as described in Section 5 7 2 and then set the following parameters a Port Mode Set the Port Mode to Buffer b Syslog Function Enable the Syslog Function The Syslog Function allows you to select either On Not Connected messages are only sent when a user is not connected to the Buffer port or On Always all captured data is sent whether a user is connected to the Buffer port or not c Syslog Facility and Level If desired set the Facility and Level priority for messages sent by this port The Syslog Feature Network Parameters Menu Access the Network Parameters Menu as described in Section 5 8 then set the following parameters a Syslog IP Address Determine the IP address for the device that will run the Syslog Daemon then use the Network Port Configuration menu to define the IP Address for the Syslog Daemon b Syslog Date Time If desired you may wish to enable automatic time date stamping of all Syslog messag
109. nter the RSM s default IP address 192 168 168 168 Via Modem Use your communications program to dial the number for the line connected to the RSM s Phone Line port 2 Username Password Prompt A message will be displayed which prompts you to enter your username Login and password The default username is super all lower case no quotes and the default password is also super If a valid username and password are entered the RSM will display either the Home Screen Web Browser Interface or the Port Status Screen SSH Telnet or Modem as shown in Figure 3 1 and Figure 3 2 Getting Started PORT STATUS Site ID undefined 02 07 2007 00 23 39 GMT GMT 0000 STATUS undefined undefined undefined I undefined undefined undefined undefined undefined MODEM ooooooooo Enter H for command menu RSM gt Figure 3 1 The Port Status Screen Text Interface RSM 8 Shown REMOTE SITE MANAGER Location undefined ne NetReach Model RSM A Configuration SSHv2 Remote Site Manager System Parameters Serial Port Network Configuration User Management Users mu a a etm c c ia b N RSM Version 2 16 2007 Westem Telemabc Inc 5 Sterling irvine Ca 92618 http www wti com Figure 3 2 The Home Screen Web Interface 3 Review Help Menu If you a
110. o On Password as described in Section 8 3 2 When configuring a port to allow Direct Connections using either Standard Telnet or Raw Socket Mode note that the Direct Connect option Port Configuration Menu Item 31 may be set to either On Password or On No Password 8 3 2 Configuration The Direct Connect Function is configured on a per port basis using the Port Configuration Menus P nn item 13 Direct Connect The following options are available 1 Direct Connect OFF Direct Connect disabled at this port Default 2 Direct Connect ON NO PASSWORD The Direct Connect feature is enabled at this port but no password is required in order to connect to the port a When the Telnet connection is established the user is immediately connected directly to the specified port and the client is notified at the TCP level b This option is intended for situations where security is provided by the attached device Note 7he SSH Direct Connection function is disabled when the On No Password option is selected Telnet amp SSH Functions Direct Connect ON PASSWORD The Direct Connect feature is enabled at this port but a password must be entered before a Direct Connection is established a Upon login the RSM will prompt for a username and password If a valid username password is entered the RSM will return a message which confirms the connection and lists the name and number of the port providing the user a
111. o applies to Telnet Direct Connections For more information please refer to Section 8 3 a RS232 Ports To select the timeout period for RS232 Ports access the Port Configuration Menu for the desired port as described in Section 5 7 2 b Network Port To select the timeout period for the Network Port access the Network Port Configuration Menu as described in Section 5 8 c When the Timeout Feature is enabled the port will automatically disconnect if no data is received during the defined Timeout Period Notes When two connected ports time out both ports will exit command mode after disconnecting e The Timeout value also applies to unconnected ports that are left in command mode When an unconnected port is left in command mode and no additional activity is detected the port will automatically exit command mode when its timeout value elapses Operation 7 1 2 Defining Hunt Groups A Hunt Group creates a situation where the RSM will scan a group of similarly named ports and connect to the first available port in the group Hunt Groups are created by assigning identical or similar names to two or more ports Hunt Groups can be defined using Any to Any Passive Buffer or Modem Mode Ports Note that the Network Port cannot be included in Hunt Groups 1 Access command mode using a port and account that permit Supervisor commands 2 Access the Port Configuration Menu for the desired Port s as described in Section 5 7 2
112. ode and type S Enter the screen will appear as shown in Figure 6 1 Note that the screen format will vary depending upon whether the user account permits or denies access to Supervisor commands If the username entered at login does not allow Supervisor commands then the Port Status Screen will only display the status of the ports allowed by that account The Port Status Screen lists the following items Port The Port Number Notes On RSM 8 units the internal modem port is Port 9 On RSM 16 units the internal modem port is Port 17 On RSM 32 units the internal modem port is Port 33 Name The user defined name for each port Username The username that was entered in order to access command mode via this port Status The connect status of each port If the port is connected to an RS232 port this column will list the number of the other RSM port in c nn format where nn is the number of the RSM port connected to this port for example C 07 If the connected port is listed as Nn where n is a number this indicates that the RSM RS232 port is connected to the Network port The numbers indicate which of the available Telnet sessions is being used for example C N5 Mode The user selected Port Mode Buffer Count The amount of data in bytes stored in the buffer for this port 6 2 The Status Screens PORT DIAGNOSTICS Site ID undefined 02 07 2007 00 34 51 GMT GMT 0000
113. ommunication A Modem Mode Port can perform all functions normally available in Any to Any Mode The Modem Mode is available to all RSM ports except the Network Port and is the default port mode at the Internal Modem port When Modem Mode is selected the Port Configuration menu will display three additional prompts which allow you to re define the modem reset string initialization string and hang up string When a call is received the unit will prompt the caller to enter a username and password The RSM allows three attempts to enter a valid username and password If a valid username and password is not entered within three attempts or if the user does not respond to the login prompt within 30 seconds the modem will disconnect Notes When a Modem Mode port exits command mode or the DCD line is lost while command mode is active the RSM will pulse DTR to the modem The unit will then send the user defined modem command strings to make certain the modem is properly disconnected and reinitialized When an external modem is installed at an RSM port other ports can use the modem for calling out To call out invoke the C command to connect to the port then access the modem as you normally would If desired the Invalid Access Lockout feature can provide additional security for Modem Mode ports When properly configured the Invalid Access Lockout will automatically shut down a port whenever that port exceeds the user defined numb
114. onfiguration n 5 24 5 84 Network Parameters n 5 26 5 8 2 Network Port Parameters 0 eects 5 27 5 6 3 IP SOC ite Dudes Ere set Laetitia 5 29 5 8 3 1 Adding IP Addresses to the Allow and Deny Lists 5 30 5 8 3 2 Linux Operators and Wild Cards 000 cece eens 5 32 5 8 3 3 IP Security Examples 0000 c eee ete 5 33 5 8 4 Static Route erosut Rott a Sele wee haut leat 5 34 5 8 5 Domain Name Server 0 0 0 cect een 5 35 5 8 6 SNMP Parameters hn 5 36 10 11 12 13 Table of Contents Configuration continued 5 8 7 LDAP Parameters 22i ie Ry tE karne d Pe eee wba oa 5 38 5 8 7 1 Adding LDAP Groups ssssseeee eh 5 40 5 8 7 2 Viewing LDAP Groups lesse eres 5 42 5 8 7 3 Modifying LDAP Groups sisse eh 5 43 5 8 7 4 Deleting LDAP Groups ssssseeer een 5 44 5 8 7 5 LDAP Kerberos Set Up 0 0 0 cece tte 5 45 5 8 8 TACACS Parameters 00 0 cect n 5 47 5 8 9 RADIUS Parameters 00 0 cece eet ees 5 49 5 9 Copying Parameters to Several RS 232 Ports Text Interface Only 5 51 5 10 Save User Selected Parameters lieieleeelee ees 5 52 The Status ScreensS 2 2 0c cece eee eee eh nhanh mn 6 1 6 1 The Port Status Screen S 0 00 0c cette eee 6 2 6 2 The Port Diagnostics Screen SD 00 0 cette 6 3 6 3 The Network Status Screen SN 00 0 t
115. onnections RDY Indicator Reading Buffered Data Read Buffer Command Real Time Clock Reboot System Reset String Resident Connections Resident Disconnect Restoring Saved Parameters RJ45 Connector Routing Commands RS232 Ports RS232 Port Configuration Copying Parameters RS232 Port Interface RTS CTS 5 19 5 17 7 6 5 12 to 5 17 5 15 13 8 5 10 5 21 2 2 5 26 5 26 9 3 13 9 5 12 5 15 5 41 7 8 5 17 to 5 40 6 3 to 6 4 13 8 Apx 1 5 17 5 21 5 19 6 5 to 6 6 6 2 to 6 3 13 8 4 1 2 3 2 3 5 39 8 1 5 6 3 1 to 3 4 5 49 5 22 5 26 8 2 2 1 7 7 13 8 5 6 5 7 to 5 8 13 6 5 21 7 1 to 7 2 13 3 11 2 2 2 4 2 5 34 2 3 5 19 to 5 25 13 7 5 51 to 5 52 Apx 1 5 19 Saving Parameters Search Bind DN Search Bind Password Secondary Host Secret Word RADIUS TACACS Sending Parameters to a File Send SSH Key Sequence Disconnect Network Port Serial Port Serial Ports Serial Port Configuration Copying Parameters Serial Port Interface Setup Ports Set Button SFTP Upgrade Site I D SNMP Configuration Parameters SNMP Community SNMP Contact SNMP Location SNMP Manager SNMP Traps Testing Trap Level Trap Message Specifications SSH Encryption SSH Access SSH Communication SSH Functions SSH Key SSH Encryption SSH Port Standard Telnet Protocol Static Route Status Screens Stop Bits Serial Port Subnet Mask Supervisor Access Supervisor Level Commands Supervisor Mode
116. ons Any to Any Mode Exits command mode Modem Mode Disconnects and resets modem hang up message is sent hardware line to modem drops for 500 ms and reset message is sent Availability Supervisor Non Supervisor Format x Enter Response Disconnected 13 10 Appendix A RS232 Port Interface Carrier Detect Data In Data Out RS232 Ready Out Port Request to Send Clear to Send Figure A 1 RS232 Port Interface DCD and DTR hardware lines function as follows 1 When connected a If either port is set for Modem Mode the DTR output at either port reflects the DCD input at the other end b If neither port is set for Modem Mode DTR output is held high active 2 When not connected a Ifthe port is set for Modem Mode upon disconnect DTR output is pulsed for 0 5 seconds and then held high b Ifthe port is not set for Modem Mode DTR output is controlled by the DTR Output option Serial Port Parameters Menu Option 23 Upon disconnect Option 23 allows DTR output to be held low held high or pulsed for 0 5 seconds and then held high Apx 1 Appendix B Specifications Network Interface 10 100Base T Ethernet RJ45 multi session Telnet RS232 Port Interface Connectors Model RSM 8 Eight 8 DB9 connectors DTE pinout Models RSM 16 amp RSM 16DC Sixteen 16 DB9 connectors DTE pinout Models RSM 32 amp RSM 32DC Thirty Two 32 DB9 connectors DTE pinout Coding 7 8 bit
117. or commands Note that the RSM will allow up to sixty four simultaneous inbound TCP connections and that the Network Status Screen will report the current status of all sixty four TCP ports The first screen shown will list ports N1 through N32 to display additional ports press Enter As shown in Figure 6 3 the Network Status Screen lists the following MAC Address The permanent physical address assigned to the Network Card Port The Network Port Number for each logical TCP Port For more information please refer to Section 8 1 TCP Port The logical TCP port number to which each Telnet session is connected Normally when a Telnet session has been established this field will list port number 23 however if the Direct Connect feature has been used to establish a connection the TCP Port number will be listed as described in Section 8 3 3 Status The status for each TCP port If the Status Column reads Active this indicates the port has accessed command mode If this Telnet session is connected to an RS232 Port this column will read C nn where nn indicates the connected port for each Telnet session Username The username that was entered at this port in order to access command mode 6 4 The Status Screens PORT PARAMETERS 03 COMMUNICATION SETTING PORT MODE PARAMETERS 1 Baud Rate 9600 Port Name 2 Bits Parity 8 None Port Mode Passive 3 Stop Bits 1 DTR Output Pulse 4 Handshake
118. ord Fallback Timer Fallback Local Authentication Port 2 Accounting Port 1 Change RADIUS Parameters 2007 Western Telematic Inc 5 Sterling Irvine Ca 92618 http www wti com Figure 5 37 The RADIUS Parameters Menu Web Browser Interface 5 8 9 RADIUS Parameters To access the RADIUS Configuration Menus proceed as follows Configuration Text Interface Type N and press Enter to access the Network Configuration Menu From the Network Configuration Menu type 29 and press Enter to display the RADIUS Configuration Menu Figure 5 36 Web Browser Interface Click on the Network Configuration link to display the menu shown in Figure 5 10 then click the RADIUS Parameters link to display the RADIUS Configuration Menu Figure 5 37 The RADIUS Configuration Menus offer the following options Enable Enables disables the RADIUS feature at the Network Port Default Off Primary Address Defines the IP address or domain name up to 64 characters long for your primary RADIUS server Default undefined Primary Secret Word Defines the RADIUS Secret Word for the primary RADIUS server Default undefined 5 49 Configuration Secondary Address Defines the IP address or domain name up to 64 characters long for your secondary fallback RADIUS server if present Default undefined Secondary Secret Word Defines the RADIUS Secret Word for the secondary RADIUS server D
119. out first accessing command mode to assign an IP address When installing the RSM in a working network environment it is recommended to assign the IP Address Gateway Address and Subnet Mask as described in Section 5 8 4 3 Connecting Devices to the RSM 1 Determine which RSM port will be used for connection to the new device e g Port 3 Use an appropriate DB9 cable to connect the RS232 serial port on the device to a DB9 port on the RSM a External Modems and other DCE Devices Use a standard serial modem cable b PCs and other DTE Devices Use a null modem cable Access the RSM command mode and select communication parameters for each RSM port as described in Section 5 7 5 Configuration 5 1 Communicating with the RSM Unit In order to configure the RSM you must first connect to the unit and access command mode Note that the RSM offers two separate configuration interfaces the Web Browser Interface and the Text Interface In addition the RSM also offers three different methods for accessing command mode via network via modem or via local console The Web Browser interface is only available via network and the Text Interface is available via network SSH or Telnet modem or local PC 5 1 1 The Text Interface The Text Interface consists of a series of simple ASCII text menus which allow you to set options and define parameters by entering the number for the desired option using your keyboard and the
120. port that permit Supervisor commands Configure your terminal emulation program to upload an ASCII text file Upload the ASCII text file with the saved RSM parameters If necessary key in the file name and directory path Your terminal emulation program will send the ASCII text file to the RSM When the terminal program is finished with the upload make certain to terminate the Upload mode Note f ihe RSM detects an error in the file it will respond with the Invalid Parameter message If an error message is received carefully check the contents of the parameters file correct the problem and then repeat the Upload procedure If the parameter upload is successful the RSM will send a confirmation message and then return to the command prompt Type S and press Enter the Status Screen will be displayed Check the Status Screen to make certain the unit has been configured with the saved parameters 12 Upgrading RSM Firmware When new improved versions of the RSM firmware become available the Upgrade Firmware function can be used to update the unit Updates can be uploaded via FTP or SFTP protocols Notes The FTP SFTP servers can only be started via the Text Interface All other ports will remain active during the firmware upgrade procedure If the upgrade includes new parameters or features not included in the previous firmware version these new parameters will be set to their default values 1 Obtain the
121. ption then this user will not be able to access command mode via a Modem Mode port Configuration 5 6 5 Modifying User Accounts The Edit User Directory function allows you to edit existing user accounts in order to modify passwords and usernames or change port access or Supervisor Command capability Note that the Edit Modify User function is only available to users who have accessed command mode using a password that permits Supervisor Level commands To modify a user account proceed as follows Text Interface From the User Directory menu type 3 and press Enter The RSM will display a screen which lists all user accounts Key in the name of the account you wish to modify and press Enter Web Browser Interface From the User Configuration menu click the View Modify User link The RSM will display a menu that allows you to select the user Select the Modify User button then click the down arrow scroll to the name of the desired account select the username and then click Choose User to display the Modify User menu 5 6 4 Deleting User Accounts This function is used to delete individual user accounts Note that the Delete User function is only available to users who have accessed command mode using a password that permits Supervisor Level commands To delete an existing user account proceed as follows Text Interface From the Users Directory menu type 4 and press Enter The RSM will display a screen whi
122. re communicating with the RSM via the text interface SSH Telnet or Modem type H and press Enter to display the Help Menu which lists all available RSM commands Note that the Help Menu is not available via the Web Browser Interface 4 Creating Connections Between Ports The RSM can perform two types of connections Resident Connections and Third Party Connections Note that Port Connection commands are only available via the Text Interface and cannot be invoked via the Web Browser Interface a Resident Connection Your resident port e g Port 1 issues a C command to connect to a second port i To connect Port 1 to Port 2 type C 2 Enter While Port 1 is connected the RSM will not recognize commands issued at Port 1 However the unit will recognize a Resident Disconnect Sequence issued at Port 1 or Port 2 ii Issue the Resident Disconnect Sequence Logoff Sequence type x press Ctrl and X at the same time 3 5 Getting Started b Third Party Connection Your resident port e g Port 1 issues a C command to create a connection between two other ports i To connect Port 2 to Port 3 type c 2 3 Enter ii While Ports 2 and 3 are connected Port 1 will still recognize RSM commands Type S Enter to display the Port Status Screen The STATUS column should now list Ports 2 and 3 as connected and Port 1 as Free iii Issue a Third Party Disconnect command to disconnect Ports 2 and 3 type D 2 Enter
123. readily accessible disconnect device with a 3 mm minimum contact gap shall be incorporated in the fixed wiring Reliable earthing of this equipment must be maintained Particular attention should be given to supply connections when connecting to power strips rather than direct connections to the branch circuit No Serviceable Parts Inside Authorized Service Personnel Only Do not attempt to repair or service this device yourself Internal components must be serviced by authorized personnel only Shock Hazard Do Not Enter e Lithium Battery CAUTION Danger of explosion if battery is incorrectly replaced Replace only with same or equivalent type recommended by the manufacturer Discard used batteries according to the manufacturer s instructions Warnings and Cautions Disconnect Power If any of the following events are noted immediately disconnect the unit from the outlet and contact qualified service personnel 1 Ifthe power cord becomes frayed or damaged 2 If liquid has been spilled into the device or if the device has been exposed to rain or water Agency Approvals FCC Part 15 Regulation This equipment has been tested and found to comply with the limits for a Class A digital device pursuant to part 15 of the FCC Rules These limits are designed to provide reasonable protection against harmful interference when the equipment is operated in a commercial environment This equipment generates uses and can ra
124. rial Ports RSM 32 and RSM 32DC units include 32 Serial Ports Power Inlet An IEC 320 C14 inlet for connection to your 100 to 240 VAC power supply Note that RSM 16DC and RSM 32DC units 48 VDC powered models include a terminal block assembly see Figure 4 1 in place of the power inlet For more information please refer to Section 4 1 Power On Off Switch 3 Getting Started This section describes a simplified installation procedure for our RSM 8 RSM 16 RSM 16DC RSM 32 and RSM 32DC models which will allow you to communicate with the unit in order to demonstrate basic features and check for proper operation Note that this Quick Start Guide does not provide a detailed description of unit configuration or discuss advanced operating features in detail In order to take full advantage of the features provided by this unit it is recommended that you should complete the entire Installation and Configuration sections after performing this Quick Start procedure Quick Hardware Installation 3 1 1 Apply Power to the RSM Refer to the safety precautions listed at the beginning of this User s Guide and in Section 4 and then connect the unit to an appropriate power source Note that RSM 8 RSM 16 and RSM 32 units are designed for 100 to 240 VAC 50 60 Hz operation and feature an auto sensing power supply while RSM 16DC and RSM 32DC models are designed for 48 VDC operation When power is applied to the RSM the ON LED sho
125. rval 1 DTR Output Pulse upon Disconnect then go High Buffer DateTime Buffer Connect Syslog Off v Facility tocar o amp Level Em 1 SNMP Trap Level Change Serial Parameters 2007 Western Telematic Inc 5 Sterling Irvine Ca 92618 http vwww wti com Figure 5 8 Port Configuration Menu Web Browser Interface 5 18 5 7 2 Configuration RS232 Port Configuration Menus The Port Configuration Menus are used to select communications parameters and enable disable options for each RS232 port Text Interface Type P nand then press Enter Where n is the number or name of the desired RS232 Serial Port The Port Parameters menu will be displayed as shown in Figure 5 7 Web Browser Interface Click the Serial Port link on the left hand side of the screen to display the Port Selector Menu From the Port Selector Menu use the drop down menu to select the desired port and then click Choose Port The Port Parameters menu will be displayed as shown in Figure 5 8 The Port Configuration menus allow the following parameters to be defined Note that all of these parameters are available via both the Text Interface and Web Browser Interface and that parameters selected via one interface are also applied to the other Communication Settings Port Name Up to 16 characters Default undefined Notes Port Names cannot include non printable characters the forward slash character backsla
126. s Even Odd No Parity 1 2 Stop Bits Flow Control XON XOFF RTS CTS Both or None Data Rate 300 to 115 2K bps all standard rates Inactivity Timeout No activity timeout disconnects port modem sessions Off 5 15 30 90 minutes Memory Stores Parameters and captured data 256K per port Break Send Break or Inhibit Break Site ID 32 Characters Port Name 16 Characters per port Usernames amp Passwords 16 characters each case sensitive Up to 128 pairs definable port and system access LEDs Power On Ready Data Activity for each RS232 Serial Port Physical Environmental Power e AC Version IEC 320 Inlet 100 to 240 VAC 50 60 Hz 5 Watts e DC Version Terminal Strip 726 32 48 VDC 0 2 Amp Max Size Models RSM 8 RSM 16 amp RSM 16DC Height 1 75 4 4 cm 1 Rack Unit Width 19 00 48 3 cm Depth 6 50 16 5 cm Rack Mounts Included Models RSM 32 and RSM 32DC Height 3 5 8 8 cm 2 Rack Units Width 19 00 48 3 cm Depth 8 75 22 2 cm Rack Mounts Included Shipping Weight e Models RSM 8 RSM 16 amp RSM 16DC 6 bs 2 7 Kg Models RSM 32 amp RSM 32DC 12 Lbs 5 5 Kg Operating Temperature 32 F to 122 F 0 C to 50 C Storage Temperature 4 F to 128 F 20 C to 70 C Humidity 10 to 90 RH Non Condensing Venting Side vents are used to dissipate heat generated within the unit When mounting the unit in an equipment rack make certain to allow adequate clearance for venti
127. s SN Enter X Test Network Options TEST Enter X Send Parameter File U Enter X Upgrade Firmware UF Enter X Unlock Port Invalid Access UL Enter X Display Port Parameters Who W n Enter X Xo Exit Command Mode X Enter X X o 00O O88 6 other ports A User Port cannot perform a Third Party Connect Disconnects a TCP Port where Nn is the desired RSM TCP Port 13 2 Resident Disconnect Disconnects your resident port from another port The disconnect sequence can be redefined via the Port Configuration Menus Third Party Disconnect Disconnects two or more nonresident ports Must be issued from a third port with Supervisor command capability If desired The PW can be disabled via the System Parameters Menu Supervisor Mode displays parameters for all ports User Mode only displays parameters for ports allowed by the Port Password A port or account that does not permit Supervisor commands cannot view parameters for Command Reference Guide 13 3 Command Set This Section provides information on all Text Interface commands sorted alphabetically by command X Resident Disconnect Sequence The Resident Disconnect Sequence is used to disconnect your resident port from another port as described in Section 5 7 Although the default Resident Disconnect Sequence is X Ctrl plus X the command can be redefined via the Port Configuration Menus as described in Section 5 7 2 Note The Resident Dis
128. s detected or when the accumulated data plus header again reaches 1024 bytes Audit Log If the System Parameters menu has been used to set the Audit Log feature for the On with Syslog option then a Syslog message will be sent each time that an Audit Log record is generated Audit Log records will be generated whenever a user connects or disconnects from a port whenever a user enters or exits from command mode and whenever a user session is disconnected due to a time out The Port Parameters Menus are used to enable disable the Syslog feature at each port and also to determine whether or not messages will be sent while a user is connected to the port As described in Section 5 7 2 the Syslog feature can be set to either send all information captured by the port or to stop sending messages when a user is connected to that port The Syslog Feature TEST NETWORK OPTIONS SNMP Trap Test Manager 1 SNMP Trap Test Manager 2 Syslog Test Ping Enter lt CR gt to select lt ESC gt to exit Figure 9 1 The Test Menu Text Interface Supervisor Mode Only 9 3 Testing Syslog Configuration After you have configured the RSM as described in Section 9 1 the TEST command can be used to make certain that the function is properly set up To test the Syslog function access the RSM command mode via the text interface then type TEST and press Enter to display the Test Menu shown in Figure 9 1 When the Syslog
129. scribed in Section 5 7 2 2 Third Party Disconnect Supervisors Only The D command is issued from your resident port to disconnect two other ports For example if your Resident Port is Port 1 a Third Party Disconnect is used to disconnect Ports 3 and 4 Note 7he Third Party Disconnect method can be used to terminate a Telnet Direct Connection For more information please refer to Section 8 3 4 a The D command uses the format D xx XX Enter where xx and XX are the numbers of the ports you wish to disconnect b The D Disconnect command can only be invoked by accounts and ports that permit Supervisor commands Operation c The D command can specify both connected ports or either of the two ports For example if Port 1 is your resident port any of the following commands can be used to disconnect Port 3 from Port 4 D 3 4 Enter or D 3 Enter or D 4 Enter d The D command can also disconnect a remote user from the Network Port This is useful in cases where a user has unsuccessfully disconnected via Telnet and you can t wait for the RSM to timeout in order to free up the TCP port To disconnect a TCP port type D Nn and then press Enter Where Nn is one of the RSM s logical TCP ports e g D N2 Enter No Activity Timeout Providing the Timeout feature is enabled at either connected port the No Activity Timeout can disconnect Resident Ports or Third Party Ports Note 7he No Activity Timeout als
130. se no quotes and the default password is also super PORT STATUS Site ID undefined 02 07 2007 00 23 39 GMT GMT 0000 STATUS I undefined undefined undefined l l l l l l l undefined undefined undefined undefined undefined MODEM ooooooooo Enter H for command menu RSM gt Figure 5 1 The Port Status Screen Text Interface RSM 8 Shown 5 2 Configuration 3 Ifa valid username and password are entered the RSM will display the Port Status Screen shown in Figure 5 1 Note f the Telnet connection is refused it is most likely due to one of the following reasons The IP Security feature has denied the connection Youare attempting to use an account that permits Supervisor commands to connect to a port that does not permit Supervisor Commands 5 1 2 The Web Browser Interface The Web Browser Interface consists of a series of web forms which can be used to select configuration parameters and enable disable RSM operating functions by clicking on radio buttons and or entering text into designated fields Notes The Web Browser Interface cannot be used to connect and disconnect ports the Web Browser Interface is used only for configuration purposes In order to use the Web Browser Interface Web Access must be enabled via the Text Interface Network Parameters Menu N the RSM must be connected to a TCP IP n
131. sh characters double quotes asterisks or blank spaces Port Names must begin with an alphabetic character Port Names cannot begin with a number or punctuation character A Port cannot be named N1 through N66 these names are reserved for the logical Network Ports Port names are case sensitive Baud Rate Any standard rate from 300 bps to 115 2K bps Default 9600 bps Bits Parity Default 8 None Stop Bits Default 1 Handshake Mode XON XOFF RTS CTS hardware Both or None Default 2 RTS CTS Configuration General Parameters Supervisor Mode Permits denies port access to supervisor commands When enabled Permit the port will be allowed to invoke supervisor commands providing the unit is accessed using an account that permits them If disabled Deny the port may not invoke Supervisor commands Default Permit Note f the Supervisor Mode is set to Deny then user accounts that permit Supervisor commands will not be allowed to access command mode via this port Logoff Character The Logoff Character determines the command s or character s that must be issued at this port in order to disconnect from a second port Note that the Logoff Character does not apply to Direct Connections Default X Note When redefining the Logoff Character select a character that does not normally occur in your data This prevents the RSM from accidentally disconnecting ports in the m
132. t 192 168 168 168 or access command mode via Serial Port 1 or 2 or via Modem When firmware upgrades are available WTI will provide the necessary files via download or mailed CDR At that time an updated Users Guide or addendum will also be available 12 2 13 Command Reference Guide 13 1 Command Conventions Most commands described in this section conform to the following conventions Text Interface Commands discussed in this section can only be invoked via the Text Interface These commands cannot be invoked via the Web Browser Interface Slash Character Most RSM commands begin with the Slash Character Apply Command to All Ports When an asterisk is entered as the argument of the D Disconnect or E commands Erase Buffer the command will be applied to all ports For example to erase all port buffers type E Enter Port Name Wild Card It is not always necessary to enter the entire port name Port names can be abbreviated in command lines by entering the first character s of the name followed by an asterisk For example a port named SERVER can be specified as S Note however that this command would also be applied to any other port name that begins with an S Suppress Sure Prompt When the D Disconnect or E Erase Buffer commands are invoked the Y option can be included to override the Sure prompt For example to disconnect Port 8 without displaying the Sure prompt t
133. t For more information please refer to Section 6 3 Availability Supervisor Only Format SN Enter Response Displays Network Status Screen 13 8 Command Reference Guide TEST Test Network Parameters Displays a menu which is used to test configuration of the Syslog and SNMP Trap functions and can also be used to invoke a Ping Command For more information please refer to Section 9 3 and 10 4 Notes In order for the ping command to function with domain names Domain Name Server parameters must be defined as described in Section 5 8 5 The Test Menu s Ping command is not effected by the status of the Network Parameters Menu s Ping Access function Availability Supervisor Only Format TEST Enter Response Displays Syslog SNMP Trap Test Menu U Save Parameters Sends RSM configuration parameters to an ASCII text file as described in Section 11 Availability Supervisor Only Format u Enter Response The RSM will send a series of command lines UF Upgrade Firmware When new versions of the RSM firmware become available this command is used to update existing firmware as described in Section 12 This command will only function at the Network Port and at Port One the Setup Port Availability Supervisor Only Format UF Enter Response The RSM will display a menu which offers the options to retain existing parameters default parameters or abort UL Unlock Port Invalid Access Lockout Manu
134. t using SSH protocol For more information please refer to Section 8 3 Raw Port The Telnet port number that is used to create a Direct Connection to this port using Raw Socket protocol Syslog The Syslog feature is used to create records of each buffer event As event records are created they are sent to a Syslog Daemon at an IP address defined via the Network Parameters menu For more information please refer to Section 9 The Syslog feature offers three possible settings Default Off Off Syslog disabled Default On Not Connected Messages will only be generated when a user is not connected to a buffer port either by C or direct connect This prevents information captured from the attached device from being put into Syslog messages while a user is connected to a buffer port On Always All captured information will be sent out via Syslog message whether a user is connected or not Notes Syslog is only available at Buffer Mode Ports This option is not available to RS232 Ports 1 and 2 because Ports 1 and 2 cannot be configured as Buffer Mode Ports 5 22 Configuration The Port Parameters menu also offers two additional items used to set the priority of Syslog messages generated by this port Facility The facility under which this port will log messages Default Local_0 Level The severity or priority of messages generated by this port Default Emergency SNMP Trap Level
135. t Interface Type N and press Enter to display the Network Parameters Menu Figure 5 9 At the Network Parameters Menu type 27 and press Enter to display the LDAP parameters menu Figure 5 22 then type 13 and press Enter to display the LDAP Group Menu Figure 5 24 then type 3 and press Enter The RSM will prompt you to select the desired group key in the name of the group and press Enter the RSM will display the Modify LDAP Group screen Figure 5 29 Web Browser Interface At the RSM Home Screen click on the Network Configuration link to display the Network Configure menu Figure 5 10 and then click on the LDAP Parameters link to display the LDAP Parameters menu Figure 5 23 At the LDAP Parameters menu click on the LDAP Group Configuration link to display the LDAP Group Configuration menu then click the View Modify LDAP Group link to display the Choose LDAP Group menu use the drop down menu to select the desired group select Modify LDAP Group and then click the Choose LDAP Group button to display the screen shown in Figure 5 30 5 43 Configuration uleg Location undefined REMOTE SITE MANAGER Navigation Configuration Delete LDAP Group System Parameters Serial Pot LDAP Group festdept Network Configuration Access Level Off User Management 9 Port 1 Access On Port 6 Access z Users Port 2 Access E Port 3 Access Off Port 4 Access t Port 7 Access E Port 8
136. the Resident Disconnect the Third Party Disconnect and the No Activity Timeout Providing the Timeout feature is enabled a No Activity Timeout will disconnect resident ports or third party ports Note The DTR Output option in the Port Parameters menu determines how DTR will react when the port disconnects DTR can be held low held high or pulsed and then held high 1 Resident Disconnect Disconnects your resident port from another port For example if you are communicating via Port 3 and Port 3 is connected to Port 4 a Resident Disconnect is used to disassociate the two ports The RSM offers two different disconnect command formats the One Character Format and the Three Character Format for more information please refer to Section 5 7 2 Note The Resident Disconnect methods discussed here cannot be used to terminate a Telnet Direct Connection For more information please refer to Section 8 3 4 a One Character Default Enter the logoff character once Default Ctrl plus X It is not necessary to enter a carriage return before or after the logoff character b Three Characters Uses the Enter LLL Enter format where L is the logoff character For example if the logoff character is then the disconnect sequence is Enter Enter c Ifthe default disconnect command is not compatible with your application both the command format and logoff character can be redefined via the Port Configuration menus as de
137. tion of the SNMP Trap function proceed as follows 1 Configure the SNMP Trap function as described in Section 10 1 2 Access the Text Interface command mode using an account and port that permit Supervisor commands then invoke the TEST command at the RSM command prompt Note that the TEST Command is only available in Supervisor Mode 3 Select Item 1 or 2 to send an SNMP test trap to Manager 1 or 2 respectively It is possible that the ARP table will not be properly setup If this occurs a message to that effect is displayed and the RSM immediately refreshes the ARP table Repeat steps 2 and 3 to try again For more information on the TEST command and the Test Menu please refer to Section 9 3 10 3 11 Saving and Restoring Configuration Parameters Once the RSM is properly configured parameters can be downloaded and saved as an ASCII text file Later if the configuration is accidentally altered the saved parameters can be uploaded to automatically reconfigure the unit without the need to manually assign each parameter Saved parameters can also be uploaded to other RSM units allowing rapid set up when several units will be configured with the same parameters The Save Parameters procedure can be performed from any terminal emulation program e g HyperTerminal TeraTerm etc that allows downloading of ASCII files Note The Save and Restore features described in this section are only available via the Text Inter
138. ty LEDs RSM 16 and RSM 16DC units include 16 Activity LEDs RSM 32 and RSM 32DC units include 32 Activity LEDs 2 1 Unit Description 2 2 Back Panel As shown in Figures 2 2 2 3 and 2 4 the RSM Back Panel includes the following components Phone Line Port For connection to your external phone line Q Network Port network Note An RJ45 Ethernet port for connection to your 10 100Base T TCP IP that the RSM features a default IP address 192 168 168 168 This allows you to connect to the unit without first assigning an IP address Note that the Network Port also includes two small LED indicators for Link and Data Activity For more information on Network Port configuration please refer to Section 5 8 a 2 3 4 5 6 7 8 Figure 2 3 Instrument Back Panel Model RSM 16 18 20 22 24 26 28 30 32 so roopaser LC o un Bu E oma uu e 15 2 i me LI I rmv 4 6 8 10 12 14 16 Figure 2 4 Instrument Back Panel Model RSM 32 2 2 Unit Description RS232 Serial Ports For connection to console ports on target devices Standard DB9 connectors configured as DTE ports The RS232 ports are similar to a serial port on a PC When connecting a modem use a standard serial cable When connecting a PC or other DTE device use a null modem cable RSM 8 units include 8 Serial Ports RSM 16 and RSM 16DC units include 16 Se
139. ty LEDs AC Powered Units Add User Allow List Any to Any Mode Audit Log Authentication Port RADIUS TACACS Back Panel Baud Rate Serial Port Bind Type Bits Serial Port Buffer Erase Read Buffer Connect Buffer Date Time Buffer Mode Callback Callback Attempts Callback Delay Callback Number Callback Security Callback Attempts Callback Delay Change Password Clear Button Clock and Calendar Command Availability Command Echo Network Port Serial Port Command Mode Access Exit Command Reference Guide Command Set Command Summary 5 28 5 20 5 41 5 50 2 1 4 1 5 15 5 31 5 17 7 1 to 7 6 5 6 5 9 13 3 5 50 5 48 2 2 5 19 5 39 5 19 13 5 13 8 5 21 5 21 5 17 7 7 to 7 8 5 10 to 5 11 5 11 5 11 5 15 5 6 5 10 to 5 11 5 11 5 11 5 6 13 8 2 1 5 6 5 7 to 5 8 13 2 5 28 5 20 5 1 to 5 4 13 10 13 1 to 13 10 13 3 to 13 10 13 2 Configuration Restoring Saving Configuration Menus Confirmation Prompt Connecting Ports Copying Parameters Customer Service Date DC Powered Units Default System Delete User Deny List DHCP Dialback Number Dialback Security Dialback Attempts Dialback Delay Direct Connect Configuration Connection to Serial Ports Disconnection Port Numbers Disconnecting Ports Display Port Parameters Display Port Status DTR Output Edit User Encryption SSH Erase Buffer Ethernet Port Exit Command Mode External Modem Facility F
140. uffer Mode is not available to Port 1 the SetUp Port or the Network Port 7 8 1 Reading Data from Buffer Mode Ports To check port buffers for stored data access command mode via the text interface using an account and port that permit Supervisor commands and type S Enter to display the Port Status Screen The Buffer Count column in the Port Status Screen indicates how much data is currently being stored for each port To retrieve data from buffer memory go to a free Any to Any or Modem Mode Port then issue the R command using the following format R xx Enter Where xx is the number of the port buffer to be read Notes In order to read data from a given port your account must allow access to that port When the R command is invoked the counter for the SNMP Trap function will also be reset If the buffer contains data the RSM will display a prompt that offers the following options Display One Screen To send data one screen at a time press Enter Each time Enter is pressed the next screen is sent Display All Data To send all data currently stored in the buffer type 1 and press Enter Erase Data on Screen To erase the data currently displayed on screen type 2 and press Enter Erase all Data Supervisor Only To erase all data currently stored in the buffer type 3 and press Enter Exit To exit from Read Buffer mode press Esc Note Only one user can read from a port buffer
141. uld light and the RDY LED should begin to flash Note however that the boot up procedure may take up to two minutes this delay is due to the time required to generate SSH keys 3 1 2 Connect your Control Device to the RSM The RSM can either be controlled via local PC Serial Port modem or TCP IP network In order to connect ports or select parameters commands are issued to the RSM via either the Network Port Modem or RS232 Setup Port Note that it is not necessary to connect to both the Network and Setup Ports and that the Setup Port can be connected to either a local PC or an external modem Network Port Connect your 10Base T or 100Base T network interface to the RSM 10 100Base T Network port Console Port Use the supplied null modem cable to connect your PC COM port to the RSM Set Up Port RS232 Modem Connect your phone line to the RSM s Phone Line Modem port 3 1 Getting Started 3 2 Communicating with the RSM When properly installed and configured the RSM will allow command mode access via Telnet Web Browser SSH client modem or local PC However in order to ensure security both Telnet and Web Browser access are disabled in the default state To enable Telnet and or Web Browser access please refer to Section 5 8 Notes Default RSM serial port parameters are set as follows 9600 bps RTS CTS Handshaking 8 Data Bits One Stop Bit No Parity Although these parameters can be easily redefined for th
142. vailable at the Network Port and is the default mode for the internal modem port The Modem Port is Port 9 on RSM 8 units Port 17 on RSM 16 and RSM 16DC units and Port 33 on RSM 32 and RSM 32DC units For more information on Port Modes please refer to Section 7 Configuration PORT PARAMETERS 03 COMMUNICATION SETTING PORT MODE PARAMETERS 1 Baud Rate 9600 21 Port Name 2 Bits Parity 8 None 22 Port Mode Passive 3 Stop Bits 1 23 DTR Output Pulse 4 Handshake RTS CTS 24 Buffer Params 25 Modem Params GENERAL PARAMETERS NETWORK SERVICES 11 Supervisor Mode Permit 31 Direct Connect 12 Logoff Char X Telnet Port 13 Sequence Disc One Char SSH Port 14 Inact Timeout 5 Min Raw Port 15 Command Echo On Syslog 16 Accept Break On SNMP Trap Lv Enter lt previous port gt next port lt ESC gt exit Figure 5 7 Port Configuration Menu Text Interface UU 28 REMOTE SITE MANAGER Location undefined Navigation Home Configuration Serial Port 3 Configuration MS Port Name Network Connouraflon Baud Rate 9600 User Management Bits Parity e None Users Stop Bits fix Handshake Mode hd Port Mode Passie Supervisor Mode Permit Logoff Character x Sequence Disconnect One Character Ony 3 Inactivity Timeout Off g Command Echo On v Accept Break Direct Connect Modem Reset String Modem Init String Modem Hang Up String Periodic Reset Inte
143. ve models Typographic Conventions e g X Indicates a control character For example the text X Control X indicates the Ctrl key and the X key must be pressed simultaneously COURIER FONT Indicates characters typed on the keyboard For example E or P 02 Bold Font Text set in bold face and enclosed in square brackets indicates a specific key For example Enter or Esc lt gt Indicates required keyboard entries For Example P n Indicates optional keyboard entries For Example W n 1 2 2 Unit Description 2 1 Front Panel w B a www wti com RSM 8 Site Manager Figure 2 1 Instrument Front Panel Model RSM 8 Shown D CLEAR Restarts the RSM without changing user selected parameter settings Note When Clear is pressed all ports will be disconnected Q ON Lights when AC Power is applied SET Used to Initialize the RSM to default parameters To initialize the RSM press and hold the SET button for approximately five seconds Notes During initialization all port LEDs will flash ON three times After initialization all command selected parameters will be cleared and the RSM will revert to the default parameters The default super user account will also be restored 4 RDY Ready Flashes to indicate unit is operational ACTIVITY LEDs A series of LEDs which light to indicate data activity at the corresponding port RSM 8 units include 8 Activi
144. ype D Y 8 Enter Enter Key Most commands are invoked by pressing Enter Connected Ports When two ports are connected most RSM commands will not be recognized by either of the connected ports The only exception is the Resident Disconnect Sequence Default x Ctrl plus X Configuration Menus To exit from a configuration menu press Esc The only exception to this rule is the Copy Parameters Menu CP and in that case the Esc key is used to confirm the copy operation 13 1 Function Command Syntax Command Reference Guide 13 2 Command Summary Command Availability Supervisor Non Super Resident Disconnecte X X X Display Audit Log A search text Enter X Connect C x x Enter X Xe Copy RS232 Port Parameters CP Enter X CP x y z Enter CP x z Enter Third Party Disconnecte D Y x x Enter X D X Enter D Nn Enter e Erase Buffer E Y x x Enter X E Y Enter Set System Parameters F Enter X Help Menu H Enter X X Reboot System Default I Enter X Display Site ID 3J Enter X X Send SSH Keys K k Enter X Set Network Port Parameters N Enter X Set Serial Port Parameters P x Enter X Set Passworde PW Enter X X Read Buffer R n Enter X X Display Port Status S Enter Xo Xo Display Port Diagnostics sD Enter Xo Xo Display Network Statu

Download Pdf Manuals

image

Related Search

Related Contents

manual de instruções  BaseSpace Onsite v2.1 LT System Guide - Support  取扱説明軍  No Drilling Required PB20-1 Instructions / Assembly : Free Download, Borrow, and Streaming : Internet Archive    Tipps für bessere Fotos 24 eload  INDASH MANUAL DO USUÁRIO  EVGA 512-A8-N403-EL NVIDIA GeForce 6200 0.5GB graphics card  Users Manual  

Copyright © All rights reserved.
Failed to retrieve file