Home
        Avaya Using Technician Interface Software User's Manual
         Contents
1.                                                          Table 8 4  Technician Interface Access Levels  continued   Command User Manager  let  refer to Writing Technician Interface Scripts  vA va  list Y Y  loadmap Y  log Y Y  logout Vv Vv  mibget  refer to Writing Technician Interface Scripts  Y Y  mkdir  DOS only   A  more A A  mount  DOS only  Y Y  octetfmt  refer to Writing Technician Interface Scripts  Y V  on Vv Y  osidata Y Y  partition vA Y  password Manager Vv  password User vA va  pause  refer to Writing Technician Interface Scripts  Y va  ping Vv Y  pktdump  refer to Troubleshooting Routers  VY  printf  refer to Writing Technician Interface Scripts   A  A  prom V  readexe Vv Vv  record va  rename  DOS only  V  reset Y  restart Y  return  refer to Writing Technician Interface Scripts  Y V   Y       rmdir  DOS only                    8 80    114088 Rev  A    System Administration    Table 8 4  Technician Interface Access Levels  continued        Command User Manager       run  refer to Writing Technician Interface Scripts  VY  A       save aliases       save config       save env  refer to Writing Technician Interface Scripts        save log       set       setenv  refer to Writing Technician Interface Scripts        show  refer to Using Technician Interface Scripts        source aliases       source env  refer to Writing Technician Interface Scripts        sprintf  refer to Writing Technician Interface Scripts        NISSEN SIS    stamp       stop  LN and CN only   
2.            APPN ping  ping of bay did not complete in the time allowed    An unreachable message  This message appears if no route could be  calculated to the remote device or if the remote device does not support  APINGD  A sample message follows     APPN ping  bay is unreachable    An invalid name message  This message appears if the specified node name  or mode name is invalid  A sample message follows     APPN ping  invalid name specified    AN APPN service is not running message  This message appears if the  APPN service is disabled on the router  A sample message follows     APPN ping  APPN service is not running       114088 Rev  A    3 25    Using Technician Interface Software    Examples     If you enter  on one line      ping  appn raleigh    ping  appn raleigh  r100   S2000  m inter    ping  appn raleigh  r10   s2000  m batch  t100    The system     Pings the device at the APPN address  raleigh and waits up to 15 seconds   default  for a response  The console dis   plays one of the following messages   APPN ping  raleigh is alive   APPN ping  raleigh is unreachable  Pings the device at the APPN address  raleigh 100 successive times  sending  2000 bytes of data with each ping and  specifying the interactive mode  The con   sole displays one of the following mes   sages    APPN ping  ping of raleigh did not  complete in the time allowed   APPN ping  raleigh is alive   APPN ping  raleigh is unreachable  Pings the device at the APPN address  raleigh 10 successive times
3.        C 14    114088 Rev  A    Using Syslog Messaging to Monitor Router    4  Save the changes you made to syslog conf     5  Enter the UNIX ps command to obtain the process id for the Syslogd  process currently running on the workstation     6  Reinitialize Syslogd by entering the following command at the UNIX  command line prompt     kill  HUP  lt process_id gt     Configure in the same way any other UNIX workstations you use to manage your  network     To view on a UNIX workstation event messages from a Bay Networks router   open the file you designated on the workstation to receive Syslog messages from  routers in your network     Configuring Syslog on the Router    You can use Technician Interface commands to configure Syslog on a router  You  configure Syslog as a sequence of tasks  where some tasks include one or more  numbered steps     The following is an overview of the tasks required to configure Syslog on a router     1  Using the console attached to the router  or using a Telnet connection to the  router  open a Technician Interface session     Define a slot mask  a slot map  for loading Syslog on the router   Create the Syslog entity on the router    Configure Syslog global attributes    Add a remote host to the Syslog Host Table    Add an entity filter to the Syslog entity filter table     Nn WwW FY N    Return to Task 5 to add another remote host or return to task 6 to add another  entity filter for the remote host  otherwise go to Task 8     8  Save to a fil
4.       2 16    114088 Rev  A    Parameter   Attribute Name   Attribute Number   Default    Options     Function     Instructions     Command   MIB Object ID     Parameter   Attribute Name   Attribute Number   Default    Options     Function     Instructions     Command   MIB Object ID     Configuring the Console Port    Force User Logout  wfSerialPortUserAbortLogoutDisable  31   2  Disable    1  Enable    2  Disable     Specifies whether or not the user can execute a control c   C  to break out  of a user autoscript at login  when a user autoscript is in effect      Set the parameter to Enable to prevent the user from using    C to break out  of the user autoscript at login     Set the parameter to Disable to allow the user to execute    C to break out  of the user autoscript at login     Use the default  Disable  if you want users to access the Technician  Interface  Set to Enable if you want to force users to enter the Telnet  logout command     set wfSerialPortEntry 31  lt port_no  gt   lt option gt   1 3 6 1 4 1 18 3 3 2 11 1 1 31    History Depth  wfSerialPortHistoryDepth  32   20  commands    1 to 40  commands     Specifies the maximum number of Technician Interface commands stored  in the local command history table  The table stores each command you  enter at the Technician Interface prompt on a first in  first out  FIFO   basis     Set the maximum number of commands that you want the router to  remember  for subsequent recall via the Technician Interface    history   
5.       8 38    114088 Rev  A    System Administration    During an update  the system erases the image stored in the target PROM and  writes the new image into the PROM  This is sometimes called    burning    the  PROM  To verify the image update  the system compares the contents of the new  image file to the image file in the PROM     Upgrading PROMs Remotely    Because the operations involved in upgrading PROMs place an increased load on  the router  there is a greater chance that the PROM upgrade process will time out  or fail during periods of peak traffic on your network          Caution  If the PROM upgrade process is interrupted  the router could be  disabled        Follow these guidelines to ensure that the PROM upgrade is successful     e Store the PROM executable files  for example  frediag exe or freboot exe  on  a Flash card that resides on the least utilized slot in the system     e Perform the upgrade during non peak hours to ensure a minimum traffic load  on the router     e On multislot systems  upgrade the PROM for each slot separately  Attempting  to upgrade multiple slots at the same time increases the load on the backplane     Determining Current PROM Image Versions    To decide whether or not you need to upgrade the PROMs in a router  you need to  determine the versions of Boot and Diagnostics PROM images currently running  in that router        Note  A label on the back panel of some router models indicates the installed  version of Boot and Diagnostic PR
6.       For example  to upgrade the diagnostics PROMs in Slots 2 through 5  you can  enter    prom  w 2 frediag exe 2 5       Caution  When upgrading PROMs with new software  upgrade all slots that  contain FRE modules to avoid a mismatch of software        More examples of command lines appear at the end of this section        8 42    114088 Rev  A    System Administration    To verify successful completion of a PROM upgrade  enter    prom  v  lt volume_no  gt   lt Diag_PROM_source_file gt   lt slot_ID  gt        For example  for a boot PROM  enter   prom  v  lt volume_no  gt    freboot exe   asnboot exe   anboot exe   lt s ot_ D gt   For a diagnostics PROM  enter   prom  v  lt volume_no  gt    frediag exe   asndiag exe   andiag exe   lt s ot_ D gt     The system verifies that the PROM image on a designated Flash volume  that    is  the image file used as a source for upgrading the PROM  matches the  image actually stored in the boot or diagnostics PROM on a designated slot     When you use the  v option  the console displays one of the following  messages after the verification routine terminates     prom  slot  lt slot_ID gt  completed successfully    prom  PROM data does not match file data on slot  lt slot ID gt     If the operation succeeds  the new images stored in the boot and diagnostics  PROMs run when you reboot the router     If the operation fails  the console displays a message describing the cause of    the failure     Additional Examples     If you enter     pro
7.      string       system    S       telnet    s       tftp       type    unalias          unmount  DOS only        unsetenv  refer to Writing Technician Interface Scripts        verbose    NINES SNUS       wfsnmpkey       wfsnmpmode       wfsnmpseed       QINENSE SENSES SENSE N NESSES NNN SENSES SENSES    xmodem                      114088 Rev  A 8 81    Chapter 9  Managing Aliases    An alias is acommand you create to take the place of long or multiple commands   After creating the alias  you enter the alias name to invoke its associated  commands     This chapter describes how to do the following     Create an alias in memory and enter its name to invoke its associated  commands    Display the commands associated with an alias  Debug an alias   Delete an alias   Save aliases to a file in the NVFS for later retrieval  Load aliases from a file into RAM    Use the aliases in the debug al file to debug common network problems       114088 Rev  A    9 1    Using Technician Interface Software    Creating and Displaying an Alias    You can use the alias command either to create an alias or to display the  commands associated with an existing alias  Enter the following to display or  create an alias     alias   lt name gt        lt alias_value gt             lt name gt  is one of the following optional alias name types     e The name of the alias you are creating  The name may be one to 15  alphanumeric characters  the initial character must be alphabetical     e The name of an exi
8.     Refer to the following section to copy all MIB values from operating RAM toa  configuration file for later retrieval        7 8    114088 Rev  A    Accessing the MIB  Saving the Configuration    You can copy all MIB values from operating RAM to a configuration file for later  retrieval  You use the save config command to copy the configuration in memory  to the default configuration file or to an alternative configuration file  Enter the  following  where  lt filename gt  is the name of the file you are creating to store the  configuration     save config  lt vol gt   lt filename gt     Examples     If you enter  The system   save config 2 config Overwrites the default configuration file config on  Volume 2 with the configuration in memory     save config 2 config 2 Creates an alternate configuration file named con   fig 2 on Volume 2 and stores the configuration resid   ing in memory in this file     Refer to    Booting the Router    in Chapter 8 to load a configuration from a file        Using the MIB II Counter    You can use the MIB II counter feature with Version 8 10 and later router  software  The feature enables you to track the number of packets each circuit in  the Bay Networks router processes at the data link layer     You can enable the Bay Networks MIB to count all incoming and outgoing  packets by using the set and commit commands with the following parameter        114088 Rev  A 7 9    Using Technician Interface Software    Parameter   Attribute Name   Att
9.     Vpi vci Atm address IP address Life  0 63 39000000000000000000000000 0000a20d74aa01 128 185 97 74 399  114088 Rev  A 3 27    Using Technician Interface Software     2 1   atmarp table  a 128 185 97 73    ATM address Vpi vci    39000000000000000000000000 0000a20d74aa01 0 63       Examples  client     2 1   atmarp table  v 128 185 97 74    Vpi vci Atm address IP address Life       0 63 39000000000000000000000000 00979797979700     2 1   atmarp table  a 128 185 97 74    ATM address Vpi vci       39000000000000000000000000 00979797979700 0 63       3 28 114088 Rev  A    Chapter 4  Managing a NonVolatile File System    You can use the Technician Interface to manage nonvolatile file system  NVFS   files on a Bay Networks router     When you manage an NVFS  you can    Use multiple memory cards   Name files   Display the status of each memory card installed in the router  Display a directory   Change the active volume   Copy a file from one volume to another  or to the same volume  Transfer a file   Display the contents of a file   Delete a file   Compact file space   Format a memory card    Partition a memory card or SIMM       Note  The NVFS automatically mounts and unmounts memory cards           114088 Rev  A    4 1    Using Technician Interface Software    Overview    The NVFS file system on the router reads and writes to one or more memory  cards  Memory cards exist in 2 MB  4 MB  and 8 MB sizes  Each memory card  provides system access to the software image and configurati
10.     alive    message to the console  The default is 5      lt repeat_count gt  is the number of ping messages to send  Enter a value between 0  and 10  inclusive   The default is 1      lt size gt  is the number of bytes of data to send with each ping  The default is 16      p generates a path trace report that displays the intervening hop addresses to the  destination      lt address gt  is the source address      v  verbose  generates statistical information about the ICMP echo request   including information about the success rate and round trip time        Note  Our implementation of the ICMP protocol does not support loopback   pinging your own system  or broadcast addresses           3 8    114088 Rev  A    Using Operating Commands    The console displays one of the following messages when you issue a ping  command  if you enter a value in the  lt repeat_count gt  argument  the system  displays one of the following messages for the default ping  plus one for each  additional ping      e Analive message  This message appears if the system receives an ICMP echo  response from the target device within the  lt timeout gt  allowed  The message  also indicates the size of the test packet  A sample message follows     ping  192 32 1 151 is alive  size   16 bytes     e A does not respond message  This message appears if the system does not  receive an ICMP echo response from the target device within the  lt timeout gt   allowed  A sample message follows     ping  193 32 1 151 d
11.     alive    message to the console  The default is 5      lt repeat_count gt  is the number of ping messages to send  The system does not  wait for the timeout before sending the next ping  Enter a value between 0 and 10   inclusive   The default is 1      lt size gt  is the number of bytes of data to send with each ping  The default is 16      p generates a path trace report that displays the intervening hop addresses to the  destination        Note  If you use the  p option to display the intervening hops to the  destination  and the intervening hops are Bay Networks routers  the Technician  Interface displays their network addresses  Otherwise  it displays a     for  each hop that is not a Bay Networks router           3 18    114088 Rev  A    Using Operating Commands    The console displays one of the following messages when you issue a ping  command  if you enter a value in the  lt repeat_count gt  argument  the system  displays one of the following messages for the default ping  plus one for each  additional ping      An alive message  This message appears if the system receives a response  from the target device within the  lt timeout gt  allowed  The message also  indicates the size of the test packet  A sample message follows     VINES ping  2705682 8003 is alive  size   16 bytes        A does not respond message  This message appears if the address of the  target device is resolved  but the system does not receive a response from the  target device within the  lt t
12.     lt day gt         lt hour gt         lt minute gt         lt second gt         lt deci seconds gt         lt direction_offset_from_UTC gt         lt hours_offset_from_UTC gt         lt minutes_offset_from_UTC gt     TS0006A    RUIBOOT Date and Time Entry       8 16    114088 Rev  A    The following table specifies acceptable values for each octet of     lt wfRuiBootDateAndTime gt                                       System Administration             Allowable Values   in decimal  Field notation  Octet No   Year 1996 to 9999 1 and 2  Month 1 to 12 3  Day 1 to 31 4  Hour 0 to 23 5  Minute 0 to 59 6  Second 0 to 60  7  Deci seconds 0to9 8  Direction offset from UTC   ASCII 43  for          9  ASCII 45  for           Hours offset from UTC Oto 11 10  Minutes offset from UTC  0 to 59 11    Use 60 for leap second              Example     Schedule a delayed boot event for May 26  1996  at 1 30 15 p m   where the actual  time and date at the location of the target router is offset from UTC  GMT  by   9 hours and 22 minutes     Assuming that you have already enabled delayed boot services on the router  enter  the following command line at the Technician Interface prompt     set wfRuiBootEntry wfRuiBootDateAndTime 19 96 05 26 13 30 15 00 45 09 22    Figure 8 2 shows how the values date  time  and UTC offset for this example map  into the value of the 11 octet attribute  wfRuiBootDateAndTime        114088 Rev  A    8 17    Using Technician Interface Software    Octet 1 Octet 2 Octet
13.     source aliases 2 aliases 1 or Loads the aliases contained in the  run 2 aliases 1 or aliases 1 file  which is stored on  source 2 aliases 1 Volume 2        Note  With Version 7 70 or later router software running  you can use the  source aliases command to load alias files created in any version of Series 7  or later router software  You cannot  however  use earlier releases of router  software to read alias files created with Version 7 70 or later software           114088 Rev  A    9 9    Using Technician Interface Software    Debugging with Predefined Aliases    This section describes how to use aliases that are useful for debugging common  network problems  These aliases are located in the debug al file     Enter the following to load the aliases that are predefined for debugging  where   lt vol gt  is the volume containing the files from Bay Networks     source aliases  lt vo  gt  debug al       Note  You can also use run  lt vol gt  debug al        Table 9 1 shows each alias and its associated function  To invoke an alias  enter  the alias after the Technician Interface prompt  Follow the alias with a space and  the parameter indicated  if applicable  The console displays the data associated  with the alias     You can display the commands associated with an alias loaded in memory in two  ways     e You can use the alias command to display the commands without invoking  them     e You can use the verbose command to display the commands associated with  an alias when
14.    Enter next  cardcode     Valid  cardcode     yes    Login privileges granted    From    Figure 1 2        PIN accepted by the  SecurlD server        Figure 1 1  SecuriD Login Procedure and Interface Dialog       1 8 114088 Rev  A    Introducing the Technician Interface                    Card is in   new PIN  mode     Enter a passcode after the  Enter Passcode prompt  ae 1 1 from the router     Login   lt User   Manager gt   Password   lt password gt   Enter Passcode   lt cardcode gt     New PIN required   Do you wish to  continue   yes no                     System configured to  generate new PINs containing  alphanumeric characters  or digits only        Are you authorized digits only    to select your own PIN            alphanumeric  characters    Enter your new PIN   containing x characters   Enter your new PIN  containing x digits     New PIN rejected           lt Return gt  to generate a new PIN  and display it on the screen           Go to    Figure 1 1        New PIN accepted             The SecurlD  Server accepted your  new PIN     New PIN protocol aborted    Figure 1 2  SecurlD PIN Assignment Procedure and Interface Dialog       114088 Rev  A 1 9    Using Technician Interface Software    Technician Interface Welcome Screen    When you initially boot a router  during installation  using the configuration file  ti cfg  you receive a colon     as the login prompt on your console display or Telnet  connection  For example  booting from a console locally connected to
15.    Enter stamp to display the current software version and the date and time it was  created        8 32 114088 Rev  A    System Administration    Halting Packet Transfer between Slots    When you reset a slot containing a processor  FRE or ACE  module  the router  automatically halts packet transfer between the resetting slot and the other slots in  the router  Packet transfer automatically resumes after the slot is operational  again     When you hot swap a FRE module  the router also automatically halts and then  resumes packet transfer     When you hot swap Bay Networks ACE module  be sure to enter the following  Technician Interface command first  where  lt slot_no  gt  is the number of the slot  containing the ACE you are going to hot swap     stop  lt slot_no  gt     This command halts packet transfer between the slot you specify in the  lt slot_no  gt   field and the other slots in the router  When you insert another ACE module in the  slot  ACE diagnostics automatically start up  the software resumes on the slot  and  the other slots are informed that the slot in question is available for packet transfer     Verifying and Upgrading Software    The Technician Interface provides the following commands for verifying and  upgrading executable software     e The readexe command calculates file header and image checksums on  executable files on the file system  verifies that the checksums match those  within the files  and displays the results and all file header informati
16.    If the protocol application cannot find in the internal cache a route to the desired  destination  then it searches the main routing table to find one  Once the  application finds a route in the main routing table  it adds that route to the internal  cache for the local slot     If the routing table changes  with old routes replaced by new routes   the changes  also propagate to the internal cache on the same slot     The internal cache is limited and fixed in size  and operates on a first in  first out   FIFO  basis  For this reason  cache entries  routes  also have a finite lifetime  determined by the size  depth  of the internal cache   The larger the size of the  internal cache  the longer it takes for an entry in that cache to disappear      With the ip command  you can examine  e The entire contents of the internal cache on any slot    e A subset of the total contents of the cache on any slot    To view the internal cache on any slot  enter the ip command using the following  syntax     ip cache 255 255 255 255   lt s gt     lt S gt  is a slot number     255 255 255 255 is the default address bit mask for the internal cache on any slot        114088 Rev  A    8 75    Using Technician Interface Software    OSPF Link State Database    With the ip command  you can examine  e The entire contents of the router   s OSPF Link State Data Base  OSPF LSDB   e A subset of the detailed contents of the router   s OSPF LSDB    To view the OSPF LSDB  enter the ip command using the 
17.    Using Out of Band Access to Transfer Files    10  Enter an xmodem send binary command with the print  display  transfer    events and information option flag  p  set in the command line  as follows   xmodem sbyp  lt source_vol dir gt   lt filename gt      lt filename gt    sb is a send binary file    y is the YMODEM file transfer option     p prints  displays  important information and events pertaining to the file  transfer s  you are about to initiate      lt source_vol dir gt    The disk drive volume and directory that contain the files  you want to send to the router      lt filename gt      lt filename gt    The names of the files you want to send from  the workstation to the router  If you want to enter multiple filenames as part of  a YMODEM batch file transfer operation  insert a space character between  filenames   For more information on Technician Interface filename  specifications  refer to Chapters 4 and 5      Pressing return to execute the xmodem command triggers the necessary  handshakes between the YMODEM protocol program running on the  workstation and the YMODEM program running on the router  This  handshaking in turn triggers the start of the file transfer s  you specified in the  xmodem command entered at the UNIX command line prompt        114088 Rev  A    Using Technician Interface Software    11     12     Workstation and router response   typical        XMODEM Send Function       File Name  atl cfg  File Size  7k  56 Records  7160 Bytes  Estimated 
18.    Using Technician  Interface Software    Router Software Version 11 0  Site Manager Software Version 5 0    Part No  114088 Rev  A  August 1996       Bay Networks      Bay Networks       4401 Great America Parkway 8 Federal Street  Santa Clara  CA 95054 Billerica  MA 01821       Copyright    1988 1996 Bay Networks  Inc   All rights reserved  Printed in the USA  August 1996     The information in this document is subject to change without notice  The statements  configurations  technical data   and recommendations in this document are believed to be accurate and reliable  but are presented without express or  implied warranty  Users must take full responsibility for their applications of any products specified in this document   The information in this document is proprietary to Bay Networks  Inc     The software described in this document is furnished under a license agreement and may only be used in accordance  with the terms of that license  A summary of the Software License is included in this document     Restricted Rights Legend    Use  duplication  or disclosure by the United States Government is subject to restrictions as set forth in subparagraph   c  1  ii  of the Rights in Technical Data and Computer Software clause at DFARS 252 227 7013     Notice for All Other Executive Agencies    Notwithstanding any other license agreement that may pertain to  or accompany the delivery of  this computer  software  the rights of the United States Government regarding its use  r
19.    lt IP_Hexadecimal_Address gt   as your SecurID server     If you accepted the default port  the following message appears on your  console display     The default port 755 will be used for SecurID services        8 50    114088 Rev  A    System Administration    If you entered a different port number  the following message appears on  your console or Telnet display     The port  lt port_number gt  will be used for SecurID services    Is this information correct   yes no   yes    If you entered no  go to step 4  otherwise  securelogin replies with  Telnet login now requires SecurID    followed by   Reinitialize Client   yes no   yes    a  If you entered no  go to step 3b  otherwise  securelogin replies with  Client reinitialized     You have completed the procedure  The SecureID client software on the  router has been reinitialized  If you want to disable SecureID login for Telnet  users  follow the procedure in the next section     Disabling SecureID  Authentication        b  If you entered no  securelogin replies with  Client not reinitialized     You have completed the procedure  but the SecureID client software on the  router has not been reinitialized     You entered no  indicating that the information about SecurID setup was  incorrect     securelogin replies with   Do you still wish telnet login to require SecurID   yes no   yes   If you entered yes  return to step 2  if you entered no  go to step 5     You entered no  indicating that you do not want Telnet users to 
20.   407  997 1714                   In addition  you can receive information on support programs from your local  Bay Networks field sales office  or purchase Bay Networks support directly  from your authorized partner        xxviii 114088 Rev  A    Technical Support and Online Services    Bay Networks Information Services    Bay Networks Information Services provide up to date support information as a  first line resource for network administration  expansion  and maintenance  This  information is available from a variety of sources     World Wide Web    The Bay Networks Customer Support Web Server offers a diverse library of  technical documents  software agents  and other important technical information  to Bay Networks customers and partners     A special benefit for contracted customers and resellers is the ability to access the  Web Server to perform Case Management  This feature enables your support staff  to interact directly with the network experts in our worldwide Technical Response  Centers  A registered contact with a valid Site ID can    e View a listing of support cases and determine the current status of any open  case  Case history data includes severity designation  and telephone  e mail   or other logs associated with the case     e Customize the listing of cases according to a variety of criteria  including  date  severity  status  and case ID     e Log notes to existing open cases     e Create new cases for rapid  efficient handling of noncritical network  
21.   Bay Networks Router                                     UNIX System   UNIX System Error   Event Message  Error Codes Levels Severity Levels  1 LOG_EMERG Fault   2 LOG_ALERT Warning   3 LOG_CRIT Warning   4 LOG_ERR Warning   5 LOG_WARNING Warning   6 LOG_NOTICE Info   7 LOG_INFO Info   8 LOG_DEBUG Debug  Trace             114088 Rev  A    Using Technician Interface Software    You determine how Bay Networks router event message severity levels map to  error levels on your UNIX workstation  based on requirements of the network  management application software you want to use     Refer to    Configuring Syslog on the Router    for instructions on how to map  router event messages to UNIX system facility and error level codes     Time Sequencing Syslog Messages    If you enable the message time sequencing feature  Syslog on each slot   e Polls that slot for event messages logged since the previous polling attempt  e Filters all event messages retrieved via polling   e Reformats router event messages into Syslog message format    e Forwards Syslog messages to a Sequencer gate  which arranges in time stamp  order any messages it receives    e Forwards sequenced messages from the router to the appropriate remote hosts  Without sequencing  Syslog polls  filters  reformats  and forwards messages from    each slot to IP on the router  IP forwards the messages in retrieved order to the  appropriate remote hosts     Syslog Message Handling  on a Workstation     Syslogd on your manageme
22.   The following autoscript files for the Manager login and the User login are  configured using the Technician Interface software     Manager login autoscript   PE HE REE REE HERE EE EE EE EE EAE EE RE EEE EEE EERE REE ERE  Autoscript for Manager    Copyright 1995 Bay Networks Inc   HHEE ETH HEE EE HE HEE EE HH HHA EE EE HERE EHH EEE HE EEE EEE EHH HEE    Initialize aliases for script based commands          alias sho   run show bat  S      alias show      run show bat  S      alias setpath   run setpath bat        alias disable   run disable bat        alias enable   run enable bat        alias monitor      run monitor bat        alias menu   run menu bat  S           User login autoscript   HHEE EE HEHE EEE HEE EEE HH HEE EH HE HEE EE REE EHH EHRAEEEE EE H EHEE  Autoscript for User    Copyright 1995 Bay Networks Inc   HHEE ERE EEE EEE HE HEE HH HEE EEE HE HEE HEHE EEE HEE HEE EEE EHH HEHE    Initialize aliases for script based commands          alias sho   run show bat  S      alias show      run show bat  S       alias setpath   run setpath bat        alias disable   run disable bat        alias enable   run enable bat        alias monitor      run monitor bat        alias menu   run menu bat  S             2 20 114088 Rev  A    Configuring the Console Port    Customizing Autoscript Files    You can customize the automgr bat or autouser bat scripts by entering the  appropriate commands or aliases into the scripts  Refer to Chapter 9 of this guide  and the Writing Technicia
23.   Transferring Files from Router to UNIX Workstation       sesseeeeeseeeseeesssesrerssrnssns B 10  Transferring Files from UNIX Workstation to Router        EEEE A E   B 13  Out of Band File Transfers from a Windows Workstation             cccccccseeeeeeeeeeeteeeeeeees B 17  xmodem and the Bay Networks Communications Terminal Program           0  0 B 17  ESTA WAE sanane A B 18  Checking and Verifying Current Modem Interface Settings               ceeeees B 19  Initializing the Local WOM suseso rianda ei B 21  Usma Witermi Telephone Call FUNCIONS ccsccisiscsticctsccarcaceadacidianreiaaseeesiiamiigcentaiiens B 22  Bialinga Remote POUEI csi sscecsrasn rte en oiacaminaadaatinieninett wdinaeninianies B 22  Logging In to the Routers Technician Interface              ccccceeseeeeeseeeeeteeeeteeeeeeneees B 24    114088 Rev  A    xi       Pile tTansier FUNCIONS scansano AANA B 24    Transferring Files from Router to DOS Workstation  0           ccccceecseeeeeeeeeeeeeeeteeeees B 25   Transferring Files from DOS Workstation to Router isisisisissnidiniiiiinieinniierinsnas B 28   Gosia NS Comecon eea AE Site eae B 30   Quitting WRS        eee re ee eer E EE E PN   B 31  Appendix C    Using Syslog Messaging to  Monitor Router Events    EE E E E E E O E E E C 1  Remolie FISTS and FINES ainiin inania ida deanei aaan C 4  Fono me ENS LOD aridin C 5  dentino Ente FRSE nainn aR rrr paceet prerree tery rset rere rt rere eer C 5  Fitermng By Event WINE  snicccsttoctipan mcenaiawasen mat a i C 6  
24.   accessed     To use InfoFACTS in the United States or Canada  call toll free 1 800 786 3228   Outside North America  toll calls can be made to 1 408 764 1002  In Europe   toll free numbers are also available for contacting both InfoFACTS and  CompuServe  Please check our Web page for the listing in your country     How to Get Help    Use the following numbers to reach your Bay Networks Technical Response  Center        Technical Response Center   Telephone Number Fax Number       Billerica  MA    1 800 2LANWAN    508  670 8765       Santa Clara  CA    1 800 2LANWAN    408  764 1188       Valbonne  France     33  92 968 968       Sydney  Australia     612  9927 8800    612  9927 8811          Tokyo  Japan        81  3 5402 0180              33  92 966 998          81  3 5402 0173             114088 Rev  A    XXxi    Chapter 1  Introducing the Technician Interface    The Technician Interface provides management access to a Bay Networks router  by means of    e Telnet  inband  connection to the router    e Direct or dial  out of band  connection to the router   s console port    You can use the Technician Interface to install a router  and to maintain or  diagnose router operation     In addition  you can use the Technician Interface to monitor and configure certain  basic functionality in the Bay Networks router  Refer to Using Technician  Interface Scripts and Writing Technician Interface Scripts for more information  on performing these tasks     This chapter describes  e D
25.   command     set wfSerialPortHistoryDepth 32  lt port_no  gt   lt option gt   1 3 6 1 4 1 18 3 3 2 11 1 1 32       114088 Rev  A    2 17    Using Technician Interface Software    Parameter   Attribute Name   Attribute Number   Default    Options     Function     Instructions     Command   MIB Object ID     Parameter   Attribute Name   Attribute Number   Default    Options     Function     Instructions     Command   MIB Object ID     Maximum Autosaved Files  wfSerialPortAutoSaveNumFiles  33   0  log autosave off    1 to 99    Specifies the number of times the system saves the events log to a new file  automatically when the log is full  The system saves the log the maximum  number of times you specify  or until the memory card or diskette drive on  the router becomes full     Accept the default value  0  disabled  or specify the number of times you  want to save the log to a new file     set wfSerialPortEntry 33  lt port_no  gt   lt option gt   1 3 6 1 4 1 18 3 3 2 11 1 1 33    Autosave Volume  wfSerialPortAutoSave Volume  34   None    Any valid memory card volume  slot  number from 1 to 14  or  the  diskette drive designation   a    Specifies the target volume where the system stores new log files saved  through the log autosave feature     Specify the memory card or diskette file system volume on which you  want to save the events log through the log autosave feature     set wfSerialPortEntry 34  lt port_no  gt   lt option gt   1 3 6 1 4 1 18 3 3 2 11 1 1 34       2 18    1
26.   gt   lt option gt   1 3 6 1 4 1 18 3 3 2 11 1 1 15       Note  To help identify the slot where the Technician Interface  that is  your  console or Telnet  session is running  you can configure the console and Telnet    prompts on Bay Networks routers in your network to  lt router_name gt    slot     The router substitutes for     slot     the number of the actual slot where the  session is running on the router  For more information on how to configure the  Telnet prompt on a router  refer to Configuring IP Utilities        Parameter   Attribute Name   Attribute Number   Default    Range     Function     Instructions   Command   MIB Object ID     Login Timeout  wfSerialPortLoginTimeOut   16   1 min   1 to 99 min  99 indicates infinity     Specifies the number of minutes the Technician Interface waits to time out  when no one has pressed the enter key after the Login prompt  This  parameter is valid only when Modem Enable is set to 1  Enable   The  Technician Interface hangs up the phone when the timeout value is  exceeded     Accept the default  1 minute  or specify a different timeout value   set wfSerialPortEntry 16  lt port_no  gt   lt option gt   1 3 6 1 4 1 18 3 3 2 11 1 1 16       2 12    114088 Rev  A    Configuring the Console Port    Parameter   Attribute Name   Attribute Number   Default    Range     Function     Instructions   Command   MIB Object ID     Parameter   Attribute Name   Attribute Number   Default    Range     Function     Instructions   Command   MIB
27.   initializes  The cold start trap is delayed up to 30  seconds to give the network interfaces time to  initialize  thus improving the chances that the trap  will be received by all the registered managers of this  device     Issued when the management protocol is re enabled  after being disabled     Issued when an interface has been initialized and is  providing service to upper layers  Note that during  system initialization  the transmission of link traps  may be masked because the network layer may not be  fully initialized and ready to send traps     Issued when an interface is no longer providing  service        114088 Rev  A    A 9    Using Technician Interface Software    authenticationFailure    egpNeighborLoss    enterpriseSpecific    Unsupported Operations    Issued when an SNMP access occurs  An invalid  access occurs if a bad community or illegal manager  address is used  Authentication traps will be masked if  they are not enabled     Issued when an acquired EGP neighbor is lost     All Bay Networks router system log events can be  sent as traps  They must be configured through the  wfSnmpTrapEntityTable and the  wfSnmpTrapEventTable  The specific trap value is a  four byte value  The first  most significant  byte  indicates the slot generating the event  the second  byte indicates the severity  debug  1   informational   2   warning  4   fault  8   and trace  16    the third  byte indicates an entity code  for example  ip  2    snmp  3   csmacd  9   and the fou
28.   lt vol gt   lt log_file gt    d lt date gt     t lt time gt     e lt entity gt     f lt severity gt      s lt s ot_ID gt      Refer to    Logging and Displaying Event Messages     earlier in this chapter  for a  description of the optional arguments        Examples   If you enter  The console displays   log 2 10_12 log All events stored in the  0_ 2 log file in Slot 2     log 2 10_12 log  eTFTP All events logged by the TFTP driver and stored in the  10_12 log file in Slot 2     log 2 10_12 log All trace and fault events logged by the SNMP driver   eSNMP  ftf and stored in the  0_ 2 log file in Slot 2   log 2 10_12 log  s3 All events logged to Slot 3 and stored in the    10_12 log file in Slot 2        114088 Rev  A 6 13    Using Technician Interface Software    Clearing Events    Clearing events from the events log buffer is useful if you want to conduct an  experiment and examine the events log afterwards        Note  You may want to save the log to a file for later retrieval before clearing  it   Refer to    Saving the Events Log     earlier in this chapter            Enter the clearlog command with one or more of the following parameters to  clear all events from an event buffer or buffers   lt slot_no  gt  is the location of the  log buffer you are clearing     clearlog   lt s ot_no  gt    clearlog   lt s ot_no  gt   lt slot_no  gt    clearlog   lt s ot_no  gt   lt slot_no  gt          The system automatically clears all events from the buffer associated with the slot  
29.   order           114088 Rev  A    6 3    Using Technician Interface Software       After log  i  or log  x     enter  Followed by     To specify         e  lt entity_name gt     The name of the software service for which the  router will log  write  event messages to the local  events log  or exclude from the events log  When  you specify an  lt entity_name gt   you must  e Use uppercase letters      Enter the  lt entity_name gt  in quotes when that  name contains spaces  for example      FRAME RELAY       See Event Messages for Routers and BNX  Platforms for a list of router software entity names         f  lt severity_levels gt     The severity levels of messages that the router will  log  write  to the local events log  or exclude from  the events log    The severity codes are   e for F for fault   e jor   for informational   e torT for trace   e wor W for warning   e dor D for debug    Debug events are for use and interpretation by Bay  Networks Technical Response Center personnel  only     You can specify in the same log command one or  more severity codes  For example  enter log  i  fwi  to specify a filter that writes only Warning and Info  messages to the events log         S  lt slot_numbers gt              The number of the slot s  on which the router will  write event messages to the local log buffer           114088 Rev  A    Examples     If you enter    log  i  fdft   log  i  fdi  s2   log  i  ff  eGAME    log  i  fd  s2  eOSPF    log  i  log  i  fdfitw    log  
30.   sending 2000  bytes of data with each ping and specify   ing the batch mode and a timeout of 100  seconds The console displays one of the  following messages    APPN ping  ping of raleigh did not  complete in the time allowed   PPN ping  raleigh is alive   PPN ping  raleigh is unreachable                   A  A       3 26    114088 Rev  A    Using Operating Commands    Displaying the ATM ARP Table for an Interface    You can display the ATM ARP tables for a specific IP interface address by  entering the atmarp command during a Technician Interface session  The  command has the following syntax and options     atmarp table   lt options gt    lt  P_address gt     lei Purpose    a Displays ATM address for the  lt  P_address gt  you enter in the command line    r Displays the resolution table for the  lt  P_address gt  you enter in the command  line    V Displays the Virtual Circuit  VC  table for the  lt  P_address gt  you enter in the    command line     l Displays all   r   v  and  a  tables for the  lt  P_address gt  you enter in the  command line     lt IP_address gt  is the address of an IP interface on the ATM ARP client or server     Examples  server     2 1   atmarp table  r 128 185 97 73    IP address Life ATM address Vpi vci       128 185 97 74 423 39000000000000000000000000 0000a20d74aa01 0 63     2 1   atmarp table  I 128 185 97 73       IP Address State Encaps Lifetime Retries       128 185 97 74 Resolved Default 410 0     2 1   atmarp table  v 128 185 97 73      
31.   the router to use for a specific delayed boot event    Manage  disable  re enable  or delete  delayed boot services or specific  delayed boot events configured on a router    The router   s RUIBOOT software supports all delayed boot services  Some  Technician Interface commands you use to configure delayed boot services  contain the RUIBOOT software entity name     Adding Delayed Boot Services to a Router    Before scheduling any delayed boot events  you must add the RUIBOOT base  record to the router configuration  as follows     1     Log in to the router   s Technician Interface     Log in to the Technician Interface of the router you want to configure with a  delayed boot event  If you need instructions on how to perform a login via  local console or remote Telnet session  refer to Chapter 1     Define a slot mask for delayed boot services on the router     Before creating the delayed boot service on the router  define a slot mask for  the RUIBOOT entity  The slot mask identifies the slots on which the system  will load and run RUIBOOT  At the Technician Interface prompt  enter    BN  3   set wfServices wfRuiBootLoad 0 0x7FFE0000 commit    This command allows RUIBOOT  once created  to run on all slots  The  hexadecimal value Ox7FFE0000 works for any model of Bay Networks  router  regardless of the number of slots in that router        8 14    114088 Rev  A    System Administration    3  Create a delayed boot service on the router   Create the RUIBOOT service in the rout
32.   the severity levels you specify     If you specify a range of event numbers  using the Log Evt Lower Bound  and Log Evt Upper Bound parameters   Syslog ignores the Severity Mask  parameter     If you do not specify a range of event numbers  Syslog applies the value  of the Severity Mask attribute to the current filter  Enter the severity level  identifiers of event messages you want to forward to the remote host  associated with this filter  Use the first letter of each event severity level  you want to include     f   fault   w   warning   i   information  t   trace   d  debug    Enter lowercase letters only  Do not separate the letters with commas or  spaces     set wiSyslogEntFltrEntry wfSyslogEntFltrSevMask    lt host_IP_address gt   lt entity_code gt   lt filter_index gt   lt witfd gt     1 3 6 1 4 1 18 3 3 2 15 3 1 9       114088 Rev  A    C 41    Using Technician Interface Software    Parameter   Attribute Name   Attribute Number   Default    Range     Function     Instructions     Command     MIB Object ID     Slot Lower Bound  wfSyslogEntFltrSlotLowBnd  10   0   0 to 14    Along with the Slot Upper Bound  this parameter attribute specifies a slot  number or range of slot numbers  Syslog forwards to the remote host  associated with this filter messages logged only on the slot s  you  specified   Consider the location of each router in an ASN chassis as a  numbered slot      To specify a range of slots  set the value of this parameter attribute to the  low number of 
33.  1        The table has a single line entry    Example     The following command retrieves the circuit number  attribute 6  for every entry  in the CSMACD Line_Table       g wfCSMACDEntry 6      wfCSMACDEntry  wfCSMACDCct 2 1    ll  w       wf  CSMACDEntry wfCSMACDCct 2 3   2  Example     The following command retrieves the circuit number  attribute 5  for every entry  in the IP Interface table       g wflpInterfaceEntry 5    wfIpInterfaceEntry wfIpInterfaceCircuit 192 32 174 33 3   3  wfIpInterfaceEntry wfIpInterfaceCircuit 192 32 174 66 4   4    wfIpInterfaceEntry wfIpInterfaceCircuit  192 32 174 98 2   2       wfIpInterfaceEntry wfIpInterfaceCircuit  192 32 175 66 1   1    The instance ID for each entry in this case is  lt IP_address circuit_number gt         114088 Rev  A 8 77    Using Technician Interface Software    Example     The following command retrieves the circuit number  attribute 2  for every entry  in the Circuit Name table       g wiCircuitNameEntry 2    wfCircuitNameEntry wfCircuitNumber 1   1  wfCircuitNameEntry wfCircuitNumber 2   2    wfCircuitNameEntry wfCircuitNumber 3   3       wfCircuitNameEntry wfCircuitNumber 4   4    Technician Interface Commands and Access Levels    The Technician Interface provides two access levels   e User access level accepts read only commands     e Manager access level accepts all Technician Interface commands     Table 8 4 lists all Technician Interface commands and their associated access  levels     Table 8 4  Technician 
34.  1    ping   192 32 244 2    ping  192 32 1 151 is alive  size   16  bytes        3 10    114088 Rev  A    If you enter  on one line      ping 192 32 1 151  t3  r8  s62    ping 192 32 1 151  v    Using Operating Commands    The system     Pings the device at the IP address  192 32 1 151 eight successive times  sends  62 bytes of data with each ping  and waits up  to 3 seconds for a response to each ping  The  console displays one of the following for  each ping sent    ping  192 32 1 151 is alive  size   62  bytes    ping  193 32 1 151 does not respond  ping  ICMP host unreachable from  192 32 243 1   ping  192 32 1 151 is unreachable    Provides statistical information about the  ping of IP address 192 32 1 151  For exam   ple  the console displays the following mes   sages     192 32 1 151   icmp_seq 0  time  1 ms  IP ping  192 32 1 151 is alive  size    16 bytes         PING Statistics       IP ping  192 32 1 151 responded to 1 out  of 1  100  success    round trip  ms  min avg max   1 1 1       114088 Rev  A    Using Technician Interface Software    IPX Ping    When you issue the ping command for IPX  the router sends an IPX configuration  request packet to the remote IPX address that you specify  If the remote device is  listening on socket number 456h for an IPX configuration request packet  it  responds if it can be reached  and the console displays a message indicating that  the device is alive ordoes not respond        Note  The router also listens for  and responds 
35.  1   wfHwModuleGroup  wfHardwareConfig 4   wfHwidentities  wfHardwareConfig 5   wfHwFn  wfHwidentities 1   wfHwLn  wfHwldentities 2   wfHwCn  wfHwldentities 3   wfHwAfn  wfHwldentities 4   wfHwAn  wfHwldentities  16   wfHwAnMpr  wfHwAn 1   wfHwAnHub  wfHwAn 2   wfHwBln  wfHwidentities  16640   wfHwBcen  wfHwldentities  16896    wfHwRblin  wfHwidentities  17152  wfHwAsn  wfHwldentities 20480   wfHwAsnZ  wfHwidentities 20736   wfHwAsnB  wfHwldentities 20992   wfSoftwareConfig  wfSwSeries7 2   wfSystem  wfSwSeries7 3   wfSys  wfSystem 1   wfServices  wfSystem 2   wfPacketGenGroup  wfServices 4   wfGameGroup  wfServices 5   wfStaGroup  wfServices 6   wfMibHeapGroup  wfServices 7   wfCircuitNameExtension  wfServices 9   wfNetBootGroup  wfServices 10   wfSerialPortGroup  wfServices 11   wfFileSystemGroup  wfServices  12   wfPingGroup  wfServices 13   wfRuiBootGroup  wfServices  14   wfSyslogGroup  wfServices 15   wfDCMmwGroup  wfServices 16     Figure A 1  Sample Top Level Hierarchy of the Bay Networks Router MIB       114088 Rev  A A 3    Using Technician Interface Software    wfLine  wfSwSeries7 4     Figure A 1     wfCSMACDTable  wfLine 1    wfWfTokenRingTable  wfLine 2    wfAsyncTable  wfLine 3    wfFddiTable  wfLine 4    wfSyncTable  wfLine 5    wfHwF Group  wfLine 6    wfHssiTable  wfLine 7    wfMcT1Group  wfLine 8    wfDS1E1Group  wfLine 9    wfDs1 Group  wfLine 12    wfDs3Group  wfLine 13    wfSipGroup  wfLine 14   wfSipPlcpGroup  wfSipGroup 2    wfFddiGroup  wfLine 15   wf
36.  10  command  6 6  6 13  input filters  6 3  displaying list of  6 5  ouput filters  6 6  login  levels  1 3  Manager   s Script  2 15  procedure  1 3  retries  2 14  script search path  2 15  timeout  2 13  timeout guidelines  1 11  User   s Script  2 16  with password  1 4  with Secure ID  1 5  Login Script Search Path  2 15  logout    command  1 12  setting  2 17    loopback  3 8    Management Information Base  See MIB    manager session  command access levels  8 78 to 8 81  starting from within user session  1 13  terminating  1 12  Manager   s Login Script parameter  2 15  Manager   s login script  setting  2 15  memory  buffer  6 2  displaying the status of volumes  4 6  formatting  4 20  partitioning  4 21  transferring files to a full card  4 20  using multiple cards  4 3    menu command  1 13       Index 6    114088 Rev  A    messages  mapping router events to Syslog format  C 8  time sequencing Syslog  C 35  MIB  1 13  accessing  7 1 to 7 8  Bay Networks files  A 7  committing sets  7 8  compliance with specifications  A 7  getting values  7 4 to 7 6  implementation notes  A 8 to A 10  listing objects  7 2 to 7 4  setting values  7 6 to 7 8  structure of  A 2 to A 5  using  A 1 to A 10    MIB II counter  7 9   mkdir command  5 12   modem  enabling a  2 10  monitor command  1 13   more command  3 2   Motorola processor module  4 4    mount command  5 4    N    named boot  8 11   NLSP ping response  3 12   Non  Volatile File System  See NVFS  NSAP address  3 15   NVFE
37.  3 3 2 15 2 1 5       C 34    114088 Rev  A    Using Syslog Messaging to Monitor Router    Parameter  Host Time Seq Enable  Attribute Name    wfSyslogLogTimeSeqEnable  Attribute Number  6  Default  2  Disable   Options  1  Enable    2  Disable     Function  Enables or disables time sequencing and forwarding of Syslog  event   messages to the remote host associated with this host entry     Instructions  Enable this feature only if it is essential for the remote host to receive  Syslog  event  messages in the order in which they were logged on the  router     When you enable this feature  Syslog on each slot       Polls the local events log       Retrieves messages from the local log       Filters the messages       Time sequences messages that pass through the filters        Forwards sequenced messages to IP on the router  which in turn  forwards the messages to the remote host associated with this entry    When you disable this feature  Syslog on each slot      Polls the local events log       Retrieves messages from the local log       Filters the messages        Forwards sequenced messages to IP on the router  which in turn  forwards the messages to the remote host associated with this entry    Command  set wfSyslogHostEntry wfSyslogLogTlmeSeqEnable    lt host_IP_address gt   lt 1   2 gt     MIB Object ID  1 3 6 1 4 1 18 3 3 2 15 2 1 6       114088 Rev  A C 35    Using Technician Interface Software    Parameter   Attribute Name   Attribute Number   Default    Options     Fu
38.  4 instances of the  wfSerialPortEntry object  Each instance corresponds to one of the following  ports     e wfSerialPortEntry wfSerialPortName 1    CONSOLE   e wfSerialPortEntry wfSerialPortName 2    MODEM1   e wfSerialPortEntry wfSerialPortName 3    MODEM2   e wfSerialPortEntry wfSerialPortName 4    PRINTER     Configure the log autosave attributes for the    CONSOLE    port instance only     Model ASN    Supports 4 instances of the wfSerialPortEntry object  Each instance  corresponds to one of the 4 slots possible in an ASN stack  Enable the log  autosave feature only on one occupied slot in the ASN stack        114088 Rev  A    Using Technician Interface Software    Models 5380 and 5580    System 5000 hubs support up to 14 instances of the  wfSerialPortEntry object  Each instance corresponds to one of the 14 possible hub  slots  Enable the log autosave feature only on one slot occupied by a Model 5380   5580 router in a System 5000 hub   Multiple 5380 5580 boards installed in the  same System 5000 hub operate as one logical router if that hub contains an ATM   PPX backplane         Note  If the System 5000 does not contain an ATM PPX backplane  each  Model 5380 5580 board operates as an independent router  In this case  you  can configure the log autosave feature on each Model 5380 5580 board  independently        Configuring the Log Autosave Feature    Proceed as follows to enable and customize operation of the log autosave feature     1  Determine how you want to confi
39.  Encaps processing    The packet will be forwarded out of the interface   e Reassembly processing    The packet is for this router     e Redirect processing    An ICMP Redirect packet will be sent from the  interface  back to the source    e Net Unreachable processing    An ICMP Net Unreachable packet will be sent  from the interface  back to the source    e Host Unreachable processing    An ICMP Host Unreachable packet will be  sent from the interface  back to the source        114088 Rev  A    8 73    Using Technician Interface Software    e ARP processing    The packet has been held and an ARP request packet has  been sent to the LAN for that host  When the address is resolved  the cache  entry for this host is flushed  deleted  and the packet is forwarded     e Multicast processing    The packet will be handled using information from the  multicast cache   More information follows on the multicast cache      The internal cache is limited in size  and operates on a first in  first out  FIFO   basis  For this reason  cache entries  routes  also have a finite lifetime dictated  largely by the size  depth  of the internal cache   The larger the size of the internal  cache  the longer it takes for an entry in that cache to expire      With the ip command  you can examine the entire contents of the cache for a  specific logical interface configured on the router  To view the cache for any   interface configured on the router  enter the ip command using the following  syntax    
40.  Interface to   e Specify events you want to include in  or exclude from  the events log  e Specify events you want to display from the events log   e Save an events log to a file    e Configure the router to save the events log to a new file automatically when  the log becomes full    e Display an events log file previously saved    e Clear event messages from the events log    Refer to Event Messages for Routers and BNX Platforms for information about  the event display format or about specific events        114088 Rev  A 6 1    Using Technician Interface Software    Overview    The operating software in each processor module logs  stores  events in a first in   first out  FIFO  memory buffer     When you issue a command to display or save the current log  the system sorts the  events from all processor modules in chronological order  You can also clear  events from all slots or from a single slot     The event logs are checksum protected during a warm start   Issuing the boot or  reset command or pressing the Reset button warm starts the router   However   events are lost during a cold start   Power cycling the router or issuing the diags  command cold starts the router   When you remove and reinsert a processor  module  the events clear from that module only     Logging and Displaying Event Messages    Use the log command mainly to specify the types of events that you want the  router to include in the events log  exclude from the events log  or display from the  events l
41.  Object ID     Password Timeout  wfSerialPortPasswordTimeOut  17   1 min   1 to 99 min  99 indicates infinity     Specifies the number of minutes the Technician Interface waits to time out  when no one has pressed the enter key after the Password prompt  This  parameter is valid only when Modem Enable is set to 1  Enable   The  Technician Interface returns to the Login prompt when the timeout value  is exceeded     Accept the default value  1 minute  or specify a different timeout value   set wfSerialPortEntry 17  lt port_no  gt   lt option gt   1 3 6 1 4 1 18 3 3 2 11 1 1 17    Command Timeout  wfSerialPortCommandTimeOut  18   15 min   1 to 99 min  99 indicates infinity     Specifies the number of minutes that can elapse before the Technician  Interface disconnects the Telnet session  if you do not enter a command at  the command prompt  This parameter is valid only when Modem Enable  is set to 1  Enable      Accept the default value  15 minutes  or specify a different timeout value   set wfSerialPortEntry 18  lt port_no  gt   lt option gt   1 3 6 1 4 1 18 3 3 2 11 1 1 18       114088 Rev  A    2 13    Using Technician Interface Software    Parameter   Attribute Name   Attribute Number   Default    Range     Function     Instructions   Command   MIB Object ID     Parameter   Attribute Name   Attribute Number   Default    Range     Function     Instructions     Command   MIB Object ID     Login Retries  wfSerialPortLoginRetries   19   3 login attempts   1 to 99  99 indicates 
42.  Serial Port  1 of a router initializes the Technician Interface on Slot 1 of that router  and you  receive the prompt     Led    The    1    preceding the colon represents Slot 1  where the Technician Interface is  running on the router     The    1    following the colon represents Serial Port 1  where you physically  connect the console or terminal to the router     When you log into the system subsequently  by means of simple login  or with  user authentication with password and or SecurID   the Technician Interface by  default displays a Welcome message and the   prompt  Figure 1 3       _ N    Bay Networks  Inc  and its Licensors   Copyright 1992  1993  1994  1995  1996   All rights reserved        Login  Manager    Welcome to the Backbone Technician Interface          Ka P       Figure 1 3  Technician Interface Welcome Screen       1 10 114088 Rev  A    Introducing the Technician Interface    Your network administrator can change the Technician Interface prompt you  receive on a local or remote ASCII console or Telnet connection screen  For  instructions on how to change the Technician Interface login prompt you receive  on a local or remote ASCII terminal or console screen  see Chapter 2  For  instructions on how to change the Technician Interface login prompt you receive  on a remote Telnet screen  refer to the Configuring TCP Services guide     You enter Technician Interface commands after the colon     prompt  the dollar  sign     prompt  or whatever prompt your ne
43.  Use this guide if you are responsible for maintaining a Bay Networks    router or  BNX   platform using Bay Networks Technician Interface commands  The guide  provides an overview of the Technician Interface and instructions on how to    Log in and log out   Configure console port parameters   Use the Technician Interface operating commands  Manage a nonvolatile file system and DOS file system  Use the Technician Interface to manage events    Configure  enable  use  and disable Secure ID user authentication for Telnet  login to the Technician Interface    Access the Bay Networks MIB    Perform system administration tasks  such as booting the router  resetting a  slot  and running diagnostics    Manage aliases  Use out of band access to transfer files    Use the router   s Syslog messaging capability to manage event messages on  any UNIX based network management workstation       114088 Rev  A    xix    Using Technician Interface Software    Audience    Written for network managers and router technicians  this guide assumes that you  have a working knowledge of TCP IP networking  and some familiarity with  network management principles concerning the MIB  SNMP  system event  messaging  file system and configuration management  The guide also assumes a  working knowledge of hardware elements commonly used in Bay Networks  routers  for example PROMs  Flash memory cards  and network cables        Note  In this guide  the term system refers to the router system software        Be
44.  Using Technician Interface Software    This section describes    e The asynchronous terminal program available on UNIX and  386 486 DOS remote workstations    e The Technician Interface xmodem command  its parameters  and its options    e How you use the asynchronous terminal program and xmodem commands  together in procedures for transferring files to and from Bay Networks routers    About xmodem    Bay Networks routers support xmodem as a Technician Interface command and a  set of protocols for moving files between the Technician Interface console port of  a router and a remote workstation  xmodem is based on the Christensen protocol  file transfer utility  V3 9  November 1990     You determine the protocol for the task you need to perform by selecting the  appropriate syntax  parameters and options  for each xmodem command  You  enter xmodem commands directly at the command line prompt of either a UNIX  workstation or a 386 486 DOS workstation   The procedural information you  need to enter and use xmodem commands follows later in this appendix      AS a Set of protocols  xmodem includes the  e XMODEM CRC protocol   e MODEM7 batch protocol   e XMODEM  1K block protocol   e YMODEM batch protocol    Of the four protocols available through xmodem commands  you need to use only  the YMODEM batch protocol to transfer Bay Networks files between a remote  workstation and a router  For this reason  this section covers information on the  YMODEM protocol only   For information on 
45.  Wfterm  Communications Settings window  You access this window by selecting the  Settings option of the Modem pull down menu in the Wfterm startup window  as  shown in Figure B 4  This menu selection invokes the window shown in    Figure B 5        114088 Rev  A    B 19    Using Technician Interface Software       Wellfleet Communication Terminal Program  l l      File ESELA Phone File Transfers Help    Settings  gt     Connect Ctrl C          Figure B 4  Accessing the Modem Settings Window      Communications Settings    Baud rate    300   2400   9600    38400    1200    4800    19200                      Data bits                _ M Parity   Oa O6  8    even    mark    none   O85 OF    odd    space   Stop bits Flush Time   Seconds    1 015 C2     Break Time   Hundredths   O xXonpxoft DTRTime     Hundredths  O Yield          Figure B 5  Verifying or Modifying Modem Interface Settings       B 20 114088 Rev  A    Using Out of Band Access to Transfer Files    You access this window by means of the Modem Settings pull down menu in the  Wfterm base program window     The settings shown in Figure B 5 reflect default operational values for any Hayes  compatible modem  However  if you are sure that current interface settings for the  modem locally attached to your Site Manager workstation are correct  proceed to     Initializing the Local Modem        If you are unsure of the current modem interface settings  refer to the user manual  supplied with the modem  make the required chan
46.  against message  stream modification  an intruder cannot reorder a sequence of set requests  because the requests    counters would not match the next sequence expected by the  agent     The following sections describe the Technician Interface commands you use to  manage the security feature     Setting the Router to Operate in Secure Mode    The wfsnmpmode command allows you to specify whether or not you want the  router to operate in snmp secure mode     Enter the wfsnmpmode command in the following format   wfsnmpmode  1   3     1  trivial  indicates that the router should provide no additional security beyond a  simple community name     3  proprietary  indicates that the router should operate using our proprietary  security mechanism        Note  Do not use the default  Public  community and wildcard manager   0 0 0 0  with the router in snmp secure mode  Instead  configure a specific  SNMP community and manager address  For more information on how to  configure SNMP communities  refer to Configuring SNMP  BOOTP  DHCP   and RARP Services           114088 Rev  A    8 53    Using Technician Interface Software    Setting the Encryption Key    Use the wfsnmpkey command to specify the key that the encryption algorithm  uses when it encrypts the security counters  The encryption algorithm uses the  attributes of the key  size  range  and value  as integral parts of its encryption  process     Also  when Site Manager issues the first set request within an application  it  prom
47.  can remove these protections     Hexadecimal values with a Ox prefix determine the set of attributes associated  with DOS files  Determine which hex value is associated with the set of attributes  you want for a file  Then enter the attr command  along with the hex value and the  name of the file s  whose attributes you are assigning     Enter the following to assign one or more attributes to a file in the present working  directory     attr  lt hex_value gt   lt filename ext gt   Enter the following to assign one or more attributes to a file in another directory   attr  lt hex_value gt    lt pathname gt   lt filename ext gt     You can use the wildcard characters   and   when naming files  Table 5 3 lists the  DOS file attributes  their meanings  and their hex values                          Table 5 3  DOS File Attribute Hex Values   Attribute Flag   Meaning Hex Value   a Archive needed 0x20   d Subdirectory 0x10    not user modifiable  v Volume ID 0x08    not user modifiable  s System file 0x04   h Hidden 0x02   r Read only file 0x01                   To assign a single attribute to a file  use the hex value associated with the attribute  you want in the attribute command  For example  enter the following command to  assign the read only file attribute to a file named config located in the present  working directory        114088 Rev  A    5 19    Using Technician Interface Software    attr 0x01 config    To assign multiple attributes to a file  add the hex values associat
48.  change the name of the manager   s login script file  accept  the default  Otherwise  enter the name of your manager   s login script file   This name can have up to eight characters followed by up to a  three character extension     If the login script file does not contain a volume specification  the system  searches the volumes you specify with the Login Script Search Path  parameter     set wfSerialPortEntry 29  lt port_no  gt      lt option gt      1 3 6 1 4 1 18 3 3 2 11 1 1 29       114088 Rev  A    2 15    Using Technician Interface Software    Parameter   Attribute Name   Attribute Number   Default    Options     Function     Instructions     Command   MIB Object ID     User   s Login Script  wfSerialPortUserAutoScript  30   None    None or autouser bat  A script named autouser bat exists within the  Technician Interface software  You can use the script as is  or you can  modify it to suit your requirements     Executes the user   s login script file automatically at login     If you did not change the name of the user   s login script file  accept the  default  Otherwise  enter the name of your user   s login script file  This  name can have up to eight characters followed by up to a three character  extension     If the login script file does not contain a volume specification  the system  searches the volumes you specify with the Login Script Search Path  parameter     set wfSerialPortEntry 30  lt port_no  gt      lt option gt      1 3 6 1 4 1 18 3 3 2 11 1 1 30 
49.  delayed boot entries     7  Log out of the Technician Interface session   BN  3   logout    For more information on how to close a Technician Interface session with a Bay  Networks router  refer to Chapter 1        114088 Rev  A 8 19    Using Technician Interface Software    Managing Delayed Boot Services    This section describes how to    Disable or re enable delayed boot services on the router     Disable or re enable a delayed boot event scheduled at an earlier time on the  router     Change the name of the router software image and or configuration file you  want the router to boot with at a later time     Delete entries from the RUIBOOT table of delayed boot events     Delete delayed boot services from the router     Disabling or Re enabling Delayed Boot Services on a Router    You can  if necessary  disable the delayed boot service anytime after enabling it on  a router  Enter the following command     BN  3   set wfRuiBoot wfRuiBootBaseDisable 0 2 commit    Enter the following command to re enable the delayed boot service after disabling  it on a router     BN  3   set wfRuiBoot wfRuiBootDisable 0 1 commit    Disabling or Re enabling a Delayed Boot Event    Disable or re enable a delayed boot event on the router  as follows     1     Enter the following command line to disable a delayed boot event  anytime after adding it to the router configuration     BN  3   set wfRuiBootEntry wfRuiBootDisable  lt wfRuiBootDateAndTime gt   2 commit    Enter the following command l
50.  dici gt           Lists all MIB attributes for the virtual circuit table of the  specified Frame Relay PVC              114088 Rev  A    9 13    Using Technician Interface Software          Table 9 1  Aliases for Debugging Network Problems  continued   If you enter  The system   hwmods Displays slots and their associated hardware module    IDs                                   hwnode Displays the serial number and revision level of router    ipfwd Displays the age of each entry in the IP forwarding  table    ipfwdage Displays the age of each entry in the IP forwarding  table    ipfwdas Displays the next hop AS of each entry in the IP  forwarding table    ipfwdmetric Displays the metric of each entry in the IP forwarding  table    iproutes Displays all IP networks that are known and the next  hop    iphops Displays all IP networks that are known and their  associated hop counts    iphosts Displays all configured adjacent IP hosts    iparp Displays all MAC addresses and associated ARP  addresses in the router   s ARP cache    ipifs Displays all IP interfaces and their associated indexes        ipif  lt address index gt     Displays all IP information for the IP interface address  you enter  For example  enter the following where  192 32 10 10 is the first interface     ipif 192 32 10 10 1    You can obtain the  lt address index gt  by using the ipifs  alias              ipsroutes Displays all IP static routes configured in the node   ipstats Displays all IP receive and IP tran
51.  different router software image     A copy of the combined bootstrap PROM and diagnostics PROM  image for an AFN router     A copy of the bootstrap image resident on the bootstrap PROM  of an AN series router  You cannot read or change this file     A copy of the diagnostics image resident on the diagnostics  PROM of an AN series router  You cannot read or change this  file     A copy of the bootstrap image resident on the bootstrap PROM  of an ASN router  You cannot read or change this file     A copy of the diagnostics image resident on an ASN router  You  cannot read or change this file     The default configuration file     The system refers to this binary file for configuration data when  booting  You can change the configuration by copying an  alternative configuration file to config  You can also use the boot  command to specify a different configuration file     This file must have the config filename for the system to  configure automatically after booting  We recommend that you  copy config to a new backup filename before overwriting it        114088 Rev  A    4 9    Using Technician Interface Software    debug al An ASCII file containing aliases  commands that abbreviate long  or multiple commands  that you can use to debug common  network problems   Refer to    Debugging with Predefined  Aliases    in Chapter 9 to use the aliases in this file         frediag exe A copy of the diagnostics image resident on the diagnostics  PROM of a BLN  BLN 2  or BCN router  You 
52.  exe  afn exe  asn exe  bn exe  or config  after every boot  To  change the default boot or configuration file  overwrite the old default file with the  new default file  using the copy command  But be sure to back up the old default  file  using the copy command  before overwriting it        114088 Rev  A 8 11    Using Technician Interface Software             Examples   If you enter  The system boots with   boot The default router software image  for example  bn exe   and the configuration file  config  on the volume to  come up with the valid boot name   boot 2   2   e The  default  router software image on Volume 2  or The  default  configuration file  config  on Volume 2    boot 2 bn exe 2 config       boot 2 net1 exe 3      e The netl exe router software image on Volume 2  e The  default  configuration file  config  on Volume 3       boot 3   2 Trident cfg    e The default router software image on Volume 3    e The user   s customized configuration file Trident cfg  on Volume 2          boot 2 net1 exe 2 Trident cfg       e    The net1 exe router software image on Volume 2  e The user   s customized configuration file Trident cfg  on Volume 2          Using the PCMCIA Floppy Switch    The PCMCIA Floppy switch on the Flash System Controller board of an FN  LN   or CN determines where the router looks for the image and configuration file  when booting  The PCMCIA  Personal Computer Memory Card International    Association  position is for memory card boot access  and the 
53.  exe PROM image file  4 9  asndiag exe PROM image file  4 9  atmarp command  3 27  attr command  5 19 to 5 20  attributes  See parameters  audience for this guide  xx    autosave  log  6 10       114088 Rev  A    Index 1    Using Technician Interface Software    Autoscript parameters  Force User Logout  2 17  Login Script Search Path  2 15  Manager   s Login Script  2 15  User   s Login Script  2 16  autoscripts  at manager login  2 20  at user login  2 20  automer bat  2 19 to 2 20  autouser bat  2 19 to 2 20  customizing  2 21  samples  2 20    backplane  command  8 46  setting the  8 46    baud rate  setting  2 8    Bay Networks  CompuServe forum  xxx  Customer Service FTP  xxix  home page on World Wide Web  xxix  InfoFACTS service  xxxi  publications  ordering  xxiii  support programs  xxviii  Support Source CD  xxx  Technical Response Center  xxvii  Xxxi  technical support  xxvii   bconfig command  8 3 to 8 4   bn exe image  4 4  4 9   boot  after graceful shutdown  8 13  command  8 9 to 8 12  delayed  8 14  router  8 9 to 8 13   BOOTP server  8 7  8 8    broadcast addresses  3 8    C  cd command  4 10  5 7  clearlog command  6 14  CLNP echo request  3 15  clocking  8 6  commands  aborting  3 3  access levels  8 78 to 8 81  alias management  alias  9 2  echo  9 5  save aliases  9 8  source aliases  9 9  unalias  9 7  verbose  9 7  atmarp  3 27  bconfig  8 3 to 8 4  DOS  attr  5 19 to 5 20  cd  5 7  copy  5 14  delete  5 21  dir  5 8  label  5 11  mkdir  5 12  mount  5 4 
54.  fddift  lt circuit_no  gt     Displays the number of FDDI frames transmitted for the  specified circuit        fddi_stats    Displays all FDDI receive and transmit packet statistics        fddistat  lt circuit_no  gt     Displays the state of the FDDI circuit        fddistats  lt circuit_no  gt     Displays all FDDI receive and transmit packet statistics  for the specified circuit        hwslot  lt s ot_no  gt     Displays hardware information for the associated slot   This includes the serial number and revision level        fr_dicmi  lt line  lindex gt     Lists all MIB attributes for the DLCMI entry of the  specified Frame Relay interface        fr_enable_ad  lt  ine  lindex gt     Enables the Annex D Data Link Control Management  interface on the specified Frame Relay interface        fr_enable_Imi  lt  ine  lindex gt     Enables the LMI Data Link Control Management  interface on the specified Frame Relay interface        fr_enable_none  lt  ine  lindex gt     Disables all DLCMI functions for the specified Frame  Relay interface        fr_info    Lists all configured Frame Relay interfaces and their  instance IDs  line   lindex         fr_mgttype  lt  ine  lindex gt     Displays the management type selected for the  specified Frame Relay interface        fr_status  lt  ine  lindex gt     Displays the status of the specified Frame Relay  interface        fr_vcs    Lists all instances  configured PVCs  in the Frame  Relay virtual circuit table        fr_ve  lt line llindex
55.  file to 100  You  can store as many alias files in your file system as space allows        9 2    114088 Rev  A    Managing Aliases    Examples   If you enter  The system   alias Displays all aliases residing in RAM     alias ebridge    set wfBrTp 2 0 1  Creates an alias named ebridge that  set wfBrStp 2 0 1 commit    invokes the listed commands     ebridge e Enables the Translating Bridge and  the Spanning Tree Bridge   e Notifies all relevant software  modules of set changes to the MIB     alias gbridge    get wfBrTp 2 0  Creates an alias named gbridge that  get wfBrStp 2 0    gets the Translating Bridge and  Spanning Tree Bridge Enable values     alias sbridge    ebridge gbridge    Creates an alias named sbridge that  invokes the aliases ebridge and  gbridge     Inserting Parameters in an Alias    You can insert one or more parameters in an  lt alias_value gt  when creating an  alias  You can insert a parameter in an  lt alias_value gt  in two ways     Parameter concatenation  You can insert a dollar sign     in the last character  position of the  lt alias_value gt   Then  when a user enters the alias name and  follows it with the value of the parameter  the system executes the alias with  the value the user entered     Parameter reference  You can embed one or more parameters anywhere  inside the  lt alias_value gt   For each parameter you embed when creating the  alias  you insert a percentage sign     and a parameter number  The parameter   1 in an  lt alias_value gt 
56.  format  precede each address  with the Ox prefix          t lt timeout gt     r lt repeat_count gt     s lt size gt   are optional  These parameters are as  follows      lt timeout gt  is the number of seconds for each ping to time out  If the system  receives a response to a ping after it has timed out  the system does not send an     alive    message to the console  The default is 5      lt repeat_count gt  is the number of ping messages to send  The system does not  wait for the timeout before sending the next ping  Enter a value between 0 and 10   inclusive   The default is 1      lt size gt  is the number of bytes of data to send with each ping  The default is 16     The console displays one of the following messages when you issue a ping  command   If you enter a value in the  lt repeat_count gt  argument  the system  displays one of the following messages for the default ping  plus one for each  additional ping         114088 Rev  A 3 21    Using Technician Interface Software    e Analive message  This message appears if the system receives a response  from the target device within the  lt timeout gt  allowed  The message also  indicates the size of the test packet  A sample message follows     AT ping  100 5 is alive  size   16 bytes     e A does not respond message  This message appears if the address of the  target device is resolved  but the system does not receive a response from the  target device within the  lt timeout gt  allowed  A sample message follows     
57.  history list   The router retrieves the list from the command history table     The history list contains up to 20 commands by default  You can increase the  number of commands in the history list to a maximum of 40 by setting new values  for the console  serial port  attribute wfSerialPortHistoryDepth  and the Telnet  attribute wfTelnetHistoryDepth     Example    From a Technician Interface session       set wfSerialPortEntry wfSerialPortHistoryDepth   40     set wiTelnet wfTelnetHistoryDepth   40      commit    By running the history command  you can recall and run any one of the last 40  commands you entered at the Technician Interface prompt        3 4    114088 Rev  A    Using Operating Commands    Example       gt  dinfo  Command 1                                                     VOL STATE TOTAL SIZE FREE SPACE CONTIG FREE SPACE  23 FORMATTED 4194304 745101 697153  4  FORMATTED 4194304 2106021 2106021               gt  dir 2   Command 2     Volume in drive 2  is    Directory of 2           File Name Size Date Day Time   bn exe 3271441 06 12 95 Mon  16 35 07  debug al 12568 06 12 95 Mon  16 38 57  install bat 152524 06 12 95 Mon  16 39 00  ti cfg 128 06 12 95 Mon  16 39 08  mk_foo cfg 4516 06 14 95 Wed  14 18 39  config 2044 06 18 95 Sun  13 5735  syslog cfg 2628 06 18 95 Sun  15 58 09  osi cfg 3048 07 19 95 Wed  16 55 40             4194304 bytes   Total size  745101 bytes   Available free space    697153 bytes   Contiguous free space       114088 Rev  A 3 5    Usin
58.  in router Slot 2        B 28    114088 Rev  A    Using Out of Band Access to Transfer Files    At the Technician Interface command line prompt  enter the xmodem  receive binary command  as follows     xmodem rbye  rb is a receive binary file   y is the YMODEM file transfer option     e disables the EOT verification        Note  To ensure that files are transferred properly  do not issue the xmodem  command with the  lt wait gt  parameter when you perform out of band file  transfers to or from a Windows workstation that has Wfterm running on it        Set the sending Wfterm utility into send mode by selecting the  YMODEM Send option from the File Transfers pull down menu   Selecting this option invokes the File to Transfer window  as shown in  Figure B 10    Select highlight the drive  directory  and file you want to send to the  router    Use the cursor to press the OK button in the File to Transfer window     Pressing the OK button initiates the file transfer to the router     You verify that the file transfer was successful when you see the File  Transfer Completed message in the Wfterm base program window     If the transfer was unsuccessful  you should see the message File Transfer  Aborted     You can optionally enter a dir command at the Technician Interface  command line prompt in order to verify that the file you sent now exists  in the router disk or memory card volume you set in Step 4     If you are finished transferring files from the workstation to the router   
59.  ip cache  lt interface_address gt      lt interface_address gt  is the IP address of the logical interface associated with the  interface cache you want to examine     Multicast Cache    If you enable a multicast protocol on a circuit  the system allocates and maintains  one multicast cache for that circuit  Each entry in a multicast cache entry identifies  the hosts  sources  and multicast groups from which the local circuit is receiving  multicast traffic     With the ip command  you can examine the entire contents of the multicast cache  for a specific physical circuit  To view the multicast cache for any circuit  configured on the router  enter the ip command using the following syntax     ip cache  M  lt interface_address gt      lt interface_address gt  is the IP address of the logical interface associated with the  multicast cache you want to examine        8 74 114088 Rev  A    System Administration    Slot Internal Cache    The router operating system maintains an    internal    cache storage space on  and  for  each slot in the router  This slot level  internal cache stores routing  information captured from traffic originated on the router  For example  the PING  protocol  the IP protocols  and TFTP can each generate their own traffic destined  for IP address locations internal or external to the router     The internal cache provides to such protocols a local  high speed database of best  routes from that slot to any other IP destination address in your network  
60.  lt dir_name gt  is the new directory name you are creating  and   lt pathname gt  is the name of the path to that directory     mkdir   lt pathname gt   lt dir_name gt     Examples   If you enter  The system   mkdir logs Creates a new subdirectory called logs     mkdir  logs L_6_23 Creates a new subdirectory called L_6_23 in the path  called logs     Removing a Directory    Use the rmdir command to remove an existing directory  The directory must be  empty before it can be removed  Enter the following to remove a directory  where     lt dir_name gt  is the directory name you are removing  and  lt pathname gt  is the name  of the path to that directory     rmdir   lt pathname gt   lt dir_name gt        5 12    114088 Rev  A    Managing a DOS File System    Examples    If you enter  The system    rmdir  logs L_6_23 Deletes the subdirectory called L_6_23 in the logs  path    rmdir logs Deletes the subdirectory called logs     Renaming a File or Directory    Use the rename command to change a filename or directory name     If you specify a path to the file or directory  the file is moved to the new directory   The new file or directory must reside on the same diskette as the original  You can  use the wildcard characters   and   to rename files and directories with the  character strings you specify  Enter the following to rename a file or directory     rename  lt o ld_name gt   lt new_name gt        Note  You cannot rename a file whose attributes are h  for hidden  or    s  for
61.  lt wfSyslogEntFitrHostindex gt   lt wfSyslogEntFltrNum gt     lt wfSyslogEntFitrindex gt  2 commit    Disabling a filter    e Transitions the operational state of that filter   wfSyslogEntrFltrOperState  to INACTIVE    e Stops Syslog from forwarding event messages through that filter       C 24    114088 Rev  A    Using Syslog Messaging to Monitor Router    b  Re enable an entity filter by entering the following command line        set wfSyslogEntFlitrEntry wfSyslogEntFltrDisable    lt wfSyslogEntFitrHostindex gt   lt wfSyslogEntFltrNum gt     lt wfSyslogEntFitrindex gt  1 commit    Re enabling a filter    e Transitions the operational state of that filter   wfSyslogHostOperState  to ACTIVE    e Allows Syslog to resume forwarding event messages through that  filter    Deleting Remote Hosts or Entity Filters from the Syslog Configuration  You can delete a remote host from the Syslog host table  or delete a filter from the  Syslog filter table  as follows     1  If you want to delete a remote host entry from the Syslog host table  enter  the following command line        set wfSyslogHostEntry wfSyslogHostDelete   lt wfSysiogHostDest gt   2 commit    2  If you want to delete a filter from the Syslog Entity Filter table  enter the  following command line        set  wfSyslogEntFltrEntry wfSyslogEntFltrDelete  lt wfSysiogEntFitrHostindex gt     lt wfSyslogEntFitrNum gt   lt wfSyslogEntFitrindex gt  2 commit    3  Save the changes to your configuration   Refer to Task 8  earlier i
62.  managing  8 52 to 8 55       Index 8    114088 Rev  A    SecurID  access  1 3  login and PIN assignment  1 6  security counter  resetting  8 54  set command  2 3  7 6  show command  1 13  Site Manager  1 2  slot  number  displaying the  2 7  resetting  8 24  restarting  8 22  Technician Interface running on  1 3  software  displaying version  8 32  upgrading  8 33  verifying  8 33  source aliases command  9 9  Spanning Tree  7 7  SRM L board  2 1 to 2 2  stamp command  8 32  Standard Point to Point protocol  8 6  state of a console port  displaying the  2 6  stop bits  setting  2 10  stop command  8 33  Support Source CD  xxx  SYS I O board  2 1 to 2 2  Syslog  configuring the router for  C 15  deleting from router  C 25  deleting remote hosts or filters  C 25  disabling or re enabling  C 23  disabling or re enabling remote hosts or filters   C 24  entity filter parameters  C 37  example configuration  C 26  global parameters attributes  C 30  IP header  C 9  mapping router events to Syslog format  C 8  message filtering diagram  C 5  parameter descriptions  C 28    Index    parameters  Debug Map  C 46  Delete  C 30  Enable  C 30  Entity Filter Delete  C 37  Entity Filter Enable  C 37  Fault Map  C 44  Filter Operational State  C 38  Host Delete  C 33  Host Log Facility  C 34  Host Operational State  C 36  Host Time Seq Enable  C 35  Host UDP Port  C 34  Info Map  C 45  Log Evt Lower Bound  C 39  Log Evt Upper Bound  C 40  Log Poll  C 32  Maximum Hosts  C 32  Messaging Enabl
63.  must notify Bay Networks in writing of any such  intended examination of the Software and Bay Networks may provide review and assistance       Notwithstanding any foregoing terms to the contrary  if licensee licenses the Bay Networks product    Site  Manager     licensee may duplicate and install the Site Manager product as specified in the Documentation  This  right is granted solely as necessary for use of Site Manager on hardware installed with licensee   s network     This license will automatically terminate upon improper handling of Software  such as by disclosure  or Bay  Networks may terminate this license by written notice to licensee if licensee fails to comply with any of the  material provisions of this license and fails to cure such failure within thirty  30  days after the receipt of written  notice from Bay Networks  Upon termination of this license  licensee shall discontinue all use of the Software  and return the Software and Documentation  including all copies  to Bay Networks     Licensee   s obligations under this license shall survive expiration or termination of this license        114088 Rev  A    Contents    Using Technician Interface Software    About This Guide  P NEI ana tab dunndh dnttinages adabdichacstactar saa tanceseattnedi A N XX  Bane GUBEN mansir eiia iaa XX  COWON ONE cana xxi  E a T E E E A Tenet E T e E T rar erry xxii  Ordenna Bay Networks PUDIICAUONG eierniie aa n aai XXV    Technical Support and Online Services    Bay Networks Custom
64.  next hop to  each of these areas        decarinf  lt area gt     Displays DECnet area information for the area you  enter              decbase Displays DECnet global configuration parameters  base  record     decdr Displays the designated router address for each  DECnet interface    decnrts Displays DECnet Level 1 routing node information        decninf  lt area node gt     Displays DECnet information about the node whose  area and node number you enter        decifs    Displays node and area configuration  and interface  indexes for all interfaces running DECnet        decif  lt index gt     Displays DECnet information for the interface index you  enter  You can obtain the  lt index gt  by using the decifs  alias        decpri    Displays DECnet circuit priorities for all interfaces        deccost             Displays DECnet circuit costs for all interfaces           9 12    114088 Rev  A    Managing Aliases             Table 9 1  Aliases for Debugging Network Problems  continued    If you enter  The system    decstats Displays all DECnet receive  transmit  and dropped  statistics    enetstats Displays all Ethernet receive and transmit statistics        fddior  lt circuit_no  gt     Displays the number of FDDI octets received for the  specified circuit        fddifr  lt circuit_no  gt     Displays the number of FDDI frames received for the  specified circuit        fddiot  lt circuit_no  gt     Displays the number of FDDI octets transmitted for the  specified circuit       
65.  or Entity Filters      ccccssececcsecesascocesssiascsneetteenceeeantanccees C 22  Task 8  Saving Your Syslog Configuration on the Router              cccceeseeeeseeeseeeees C 22  Task 8  Log Outot the Technician Menace croises C 22   Managing Syslog Ona ROET soddasi a aaa rane C 23  Disabling or Re enabling Syslog on the Router               deve Nagase E E A C 23    xii 114088 Rev  A       Disabling or Re enabling Syslog Hosts or Filters            cceccceceeeeeeeneeeeeeeeeseeeeeeneees C 24    Deleting Remote Hosts or Entity Filters from the Syslog Configuration                  C 25  Deleting Syslog tom the ROUTEN scasarcnansisteun asinine ainsi C 25  Example Syslog Co niere ont cd iscecek secrets eects aaa tnands C 26  Syslog Parameter Descriptions        EAT E EET E EET E C 28  Gibal Group PAP TONS  cipem a aae iia C 30  FAS LIN VE oina aaa CUA aaa aE EA Arda C 33  ies Fika Patter Sc cscetsasd dears oy seco bahacaage a C 37  PO Marc ROTI siiri ice ATEA tee adie aan sets C 47    Index    114088 Rev  A    xiii       Figures    Figure 1 1  SecurlD Login Procedure and Interface Dialog               ccssceeeeeeeneeeeee 1 8  Figure 1 2    SecurlD PIN Assignment Procedure and Interface Dialog              2 05 1 9  Figure 1 3  Technician Interface Welcome SCIreen           cccceecceseneeseeeeeeeseeeteeeereeeeenees 1 10  Figure  4 1    Sample Dinto DIS play canica a a i 4 6  Figure 4 2   Sample NYFS Directory LISTING  ssiriiseiaae anke 4 8  Figure S i  Mounting a Vom ssrcnstnrii
66.  receive and transmit packet  statistics for the specified circuit        trs  lt circuit_no  gt     Displays the state of the Token Ring circuit        vines_info  lt router_ D gt     Displays the information contained in the VINES  database record for the specified router        vines_ID  lt router_ID gt     Displays the VINES network number of the router        vines_nbrs    Displays the contents of the VINES Table of Neighbors        vines_nets    Displays the contents of the VINES Table of Networks        vines_nexthops    Displays the contents of the VINES Table of Next Hops        vines_cctstats  lt circuit_no  gt     Displays VINES statistics for a specified circuit           vines_client_en       Enables VINES clients              9 18    114088 Rev  A    Appendix A  Using the Bay Networks Router MIB    This appendix describes how to use the Bay Networks router Management  Information Base  MIB   The Bay Networks router MIB is a proprietary database  that contains configuration parameters and statistics  You use the Bay Networks  router MIB to obtain and change configuration parameters and statistics through  the Technician Interface or through network management software  This appendix  provides    e An overview of the structure of the Bay Networks router MIB  e A description of the Bay Networks router MIB files  e Specifications with which the Bay Networks router MIB complies    e Implementation notes       114088 Rev  A    A 1    Using Technician Interface Softwar
67.  receive packets        8 24    114088 Rev  A    System Administration    4  The resetting processor module completes the boot process and requests a  configuration  The first available processor module forwards the configuration  resident in its memory     5  The resetting processor module loads the configuration image and initiates the  services provided by the slot  connectivity is thus reestablished  The resetting  processor module alerts the other processor modules that it can receive    packets     6  The other processor modules resynchronize their routing tables accordingly     To reboot the entire system  enter only reset at the command line prompt     To reset only the processor module or modules you specify by  lt slot_no  gt   enter  the reset command as follows     If you enter     reset   lt s ot_no  gt      The system resets     Reset one slot    reset   lt s ot_no  gt   lt slot_no  gt   Reset a range of slots  reset   lt s ot_no  gt   lt slot_no  gt         Reset a list of slots  Examples     If you enter   reset   reset 1  reset 1 5    reset 4  6    The system reboots   The entire system   Slot 1    Slots 1  2  3  4  and 5   Slots 4 and 6        114088 Rev  A    8 25    Using Technician Interface Software    When you issue the reset or reset slot commands from a local console rather  than from a Telnet session  the results depend on    The slot number you designate in the command line    The slot number from which you issue the command    The model of Bay Netw
68.  remote router  select the  Dial Phone function of the Wfterm pull down menu  The Dial Command window  appears  as shown in Figure B 8        B 22 114088 Rev  A    Using Out of Band Access to Transfer Files       Wellfleet Communication Terminal Program  File Modem Phone File Transfers Help         Dial Command          Phone Number to Dial    B7i GES PRY                          Figure B 8  The Wfterm Dial Command Window    Enter in the Dial Command window the telephone number of a router that has a  configuration file you want to retrieve  Using the cursor to press the OK button  initiates the dialing sequence        Note  This release of the Wfterm utility allows you to enter and store one  telephone number in the Dial Command window  Each time you need to call a  different router  enter the telephone number of that router in the Dial  Command window  It may be helpful for you to maintain a list of the telephone  numbers for every router you need to access by means of out of band  dial in  connection     The Wfterm utility always retains the last number you enter  Closing and  reopening Wfterm does not clear the number last stored        If the call in progress is successful  Wfterm opens a connection between your Site  Manager workstation and the Technician Interface port of the called router  The  Technician Interface login prompt appears in the Wfterm base program window   but you may have to press return to invoke the Technician Interface prompt     If the call in prog
69.  rename  5 13  rmdir  5 12  tftp  5 16  type  5 20  unmount  5 6  history  3 4  ifconfig  8 5 to 8 8  issuing  3 1       Index 2    114088 Rev  A    MIB  commit  2 4  7 8  get  7 4  list  7 2  save config  7 9  set  7 6  wfsnmpkey  8 54  wfsnmpmode  8 53  wfsnmpseed  8 54  NVFS  cd  4 10  compact  4 19  copy  4 11  delete  4 18  dinfo  4 6  dir  4 7  format  4 20  partition  4 21  tftp  4 14  type  4 17  out of band file transfer  tip  B 1  B 10  xmodem  B 1  B 4  Technician Interface operating  backplane  8 46  boot  8 9  clearlog  6 14  date  8 46  diags  8 29  exec  3 7  help  3 2  history  3 4  ifconfig  8 5  loadmap  8 44  log  6 6  6 13  logout  1 12  more  3 2  password  8 49  ping AppleTalk  3 21 to 3 23  ping APPN  3 24 to 3 26  ping IP  3 8 to 3 11  ping IPX  3 12 to 3 14  ping OSI  3 15 to 3 17  ping VINES  3 18 to 3 20    Index    prom  8 33  8 38   readexe  8 33 to 8 35   record  8 60   repeat      3 3   reset  8 24   restart  8 22   save log  6 8   stamp  8 32   stop  8 33   system  1 13   timeout condition  2 14   commit command  2 4  7 8  compact command  4 19    compression  file  8 37  hardware  8 55  CompuServe  Bay Networks forum on  xxx  config file  4 9  8 10  configuring  AN ASN boot and config file source  8 8  for Telnet access  1 12  log autosave  6 10  the console port  1 12    configuring Syslog on a router  C 15    connection  dial in to router  1 1  telnet to router  1 1    console port parameters  2 4  Autosave Volume  2 18  Baud Rate  2 8  Comm
70.  router software image     The router software image for the AFN   The router software image for the BLN  BLN 2  and BCN     You cannot read or change this file  The system automatically  refers to this binary file for booting instructions unless you use  the boot command to specify a different router software image     A copy of the combined bootstrap PROM and diagnostics PROM  image for an AFN router     The default configuration file     The system refers to this binary file for configuration data when  booting  You can change the configuration by copying an  alternative configuration file to config  You can also use the boot  command to specify a different configuration file     This file must have the config filename for the system to  configure automatically after booting  We recommend copying  config to a new backup filename before overwriting it     An ASCII file containing aliases  commands that abbreviate long  or multiple commands  that you can use to debug common  network problems   Refer to    Debugging with Predefined  Aliases    in Chapter 9 to use the aliases in this file         A copy of the diagnostics image resident on the diagnostics  PROM of a BLN  BLN 2  or BCN router  You cannot read or  change this file     A copy of the bootstrap image resident on the bootstrap PROM  of a BLN  BLN 2  or BCN router  You cannot read or change this  file        5 10    114088 Rev  A    Managing a DOS File System    install  bat A script file that you use during the init
71.  sent    OSI ping  49000400000a12121200 is alive  OSI ping  49000400000a12121200 does not  respond   OSI ping  49000400000a12121200 is  unreachable   The console also displays the following type  of message after reporting the progress of  each ping    OSI ping  49000400000a12121200  responded to 8 out of 8  100  success       114088 Rev  A    3 17    Using Technician Interface Software    VINES Ping    When you issue the ping command for VINES to a remote VINES device  it  responds if it can be reached  and the console displays the response or the result of  the request     Enter the following to ping a remote device running VINES     ping  vines  lt network_address gt   lt host_address gt    t lt timeout gt       r lt repeat_count gt     s lt size gt     p      lt network_address gt   lt host_address gt  is the required VINES address of the  remote device  This address consists of a 32 bit serial number identifying the  server node and a 16 bit subnetwork number identifying the node within the  server node   s logical grouping        Note  You can enter the network and host addresses in decimal or hexadecimal  format  If you use hexadecimal format  precede each address with the 0x  prefix          t lt timeout gt     r lt repeat_count gt     s lt size gt     p  are optional  These parameters  are as follows      lt timeout gt  is the number of seconds for each ping to time out  If the system  receives a response to a ping after it has timed out  the system does not send an 
72.  software image and or  configuration file reside     e The full pathname of the software image and configuration file     You must use the bconfig command once to specify the location of the software  image  and again to specify the location of the configuration file     Use one of the following formats for the bconfig command   bconfig  image   config   local   network   lt TFTP_host gt   lt TFTP_pathname gt       bconfig  d  image   config        Note  After making the change  enter the following command to save it to the  configuration file in the router   s file system  as follows     save config 1 config    config is the name of the configuration file        Table 8 1 describes command settings for the bconfig command                    Table 8 1  bconfig Command Settings  Option Description  image Specifies information about the router   s software image   config Specifies information about the router s configuration file   local Indicates that the specified file  image or config  resides in the  router   s local file system   network Indicates that the specified file resides on a network server                    114088 Rev  A    8 3    Using Technician Interface Software          Table 8 1  bconfig Command Settings  continued   Option Description   lt TFTP_host gt  Specifies the IP address of the host where the image or    configuration file resides     If both the software image and configuration file reside on the  network  the files must reside on the same host  I
73.  specify                 Ibbase Displays all  Learning  bridge global configuration  parameters  base record     Ibfwd Displays all node MAC addresses in the bridge   s  forwarding table    Ibif  lt index gt  Displays bridge information for the interface index you       enter  You can obtain the  lt index gt  by using the Ibstate  alias              114088 Rev  A    9 15    Using Technician Interface Software          Table 9 1  Aliases for Debugging Network Problems  continued   If you enter  The system   Ibstate Displays bridge interfaces and their current states  The    following example shows one line in the list of  interfaces  where 1 is the index and 2 is the state        wfBrTpInterfaceEntry wfBrTpinterfaceState 1   2    The states are    1   Up  2   Down  3   Init    4   Not present       Ibstats    Displays bridge receive  transmit  and dropped packet  statistics        mem_info  lt s ot_no  gt     Displays the specified slot   s total physical memory and  the memory allocation for the local and global memory  pools  in KB  For example  if you enter mem_info 2  the  system displays information similar to the following     Memory information for slot 2    wfKernParamEntry wfKernParamTotMem  2 8192  wfKernParamEntry wfKernParamLocMem  2 6144  wfKernParamEntry wfKernParamGlobMem  2 2048                                  osiadjs Displays the adj ID    osililsp Displays the LSP ID for Level 1    osil2Isp Displays the LSP ID for Level 2    osiliroutes Displays the path or 
74.  stored on its own volume  if one is  available  The processor module then boots     The processor module requests a copy of the configuration currently in use after it  boots  The first processor module to respond to the request forwards a copy of the  configuration from its memory  If none is in use  the processor module uses the  default configuration file  config  stored on its own volume  if one is available   The processor module then loads the configuration and initiates software services     Use the boot command to boot the entire system              Caution  If you do not specify the router software image and configuration  file when entering the boot command  the system boots from the default image   for example  bn exe  and configuration file  config   We recommend that you  have only one version of the config file on the router  You can comply with this  recommendation by assigning new names to alternative versions of the  configuration file  It is possible that the processor modules can simultaneously  load different configurations if you have alternative versions of the config file  and you enter the boot command without specifying the volume and  configuration file with which to boot        Enter the following command to boot the entire system with the default software  image  for example  bn exe  and default configuration file  config      boot       8 10    114088 Rev  A    System Administration    You can also boot the entire system by naming a specific imag
75.  system   Refer to the    Changing File Attributes    section  later in this  chapter  for instructions on changing these protections        Examples     If you enter  The system     rename new cfg old cfg Changes the file named new cfg in the present  working directory to old cfg     rename   cfg   arc Changes all filenames with a  cfg extension to  have a arc extension in the present working direc   tory    rename  logs I6_22 log Moves the  6_22  og file in the logs directory to    inv span log the inv directory and renames the file to span log        114088 Rev  A    5 13    Using Technician Interface Software    Copying a File    Use the copy command to make a copy of a file  You can use the wildcard  characters   and   when issuing the copy command to copy multiple files  The  new file must reside on the same diskette as the original   Use a PC to copy a file  from one diskette to another         Caution  The system automatically overwrites any file in the directory that  has the same filename as the file you are copying  To avoid overwriting an  existing file  display the directory and determine the filenames that are already  in use        Enter the following command to copy a single file in the present working  directory and rename the new version of the file     copy  lt old_name ext gt   lt new_name ext gt     Enter the following command to copy a file from one directory to another  and use  the same filename     copy   lt dir_1 gt   lt old_name ext gt    lt dir_2 g
76.  takes the value of the first parameter the user enters  at the command line after the alias name  the parameter  2 in an   lt alias_value gt  takes the value of the second parameter the user enters  and so  on        114088 Rev  A    9 3    Using Technician Interface Software       Note  You cannot combine the two methods of inserting parameters within an    alias        The parameter number indicates the position of the value in the user entry  This  feature allows you to use the same value for more than one parameter   Refer to    the last two examples      Examples     If you enter     alias scroll    more         scroll on  alias cp    copy 2  1 3  2       cp config2 cfg alt cfg    alias backup    copy 2  1  3  1       backup config    The system     Creates an alias named scroll that invokes the  more command and inserts the value the user  enters when using the alias  as shown in the next  example      Invokes the command more on     Creates an alias named cp that accepts two  values and inserts them in parameter positions   1 and  2  respectively  as shown in the next  example      Invokes the copy command associated with the  alias cp  inserts the config2 cfg value in the first  parameter position   1  and inserts the alt cfg  value in the second parameter   2   The system  then invokes the command  it copies the  config2 cfg file on Slot 2 to a new file alt cfg on  Slot 3     Creates an alias named backup that takes the  first value the user enters when using the al
77.  the show ip script command  which retrieves from the router   s active MIB  an aggregated view of data from IP routing tables and internal caches across all  slots  the Technician Interface ip command retrieves the contents of the routing  table on a single slot that you specify  For this reason  the ip command retrieves  information significantly faster than the show ip command     With the ip command  you can examine   e The entire contents of the routing table on any slot   e A subset of the total contents of the routing table on any slot   You limit the view of a routing table by applying filters    subcommand options    and flags    to the ip command syntax  For example  you can enter ip routes   lt s gt    where   lt s gt  is a slot number you specify        Note  RIP and EGP routes are refreshed only on a slot that receives a routes  update  Route ages may be different on each slot for this reason        Interface Cache    The router operating system allocates a cache storage space to each  protocol specific logical interface that you define on any physical circuit of the  router  The interface cache stores routing information relevant only to itself and its  own view of the networks external to the router     This cache provides an initial source for an interface to retrieve at high speed the  best routes to any other IP destination address in your network  Upon receiving a  packet  the interface checks its local cache  then specifies processing for the  packet     e
78.  the status of the specified circuit        stid    Displays the Spanning Tree node identifier        stif  lt index gt     Displays all Spanning Tree bridge information for the   Learning  bridge interface index you enter  You can  obtain the  lt index gt  by using the Ibstate alias        stroot          Displays the Spanning Tree designated root node  identifier           114088 Rev  A    9 17       Using Technician Interface Software          Table 9 1  Aliases for Debugging Network Problems  continued   If you enter  The system   ststate Displays the current state of each link running the    Spanning Tree protocol in the node  The states are    1   Disabled   2   Blocking   3   Listening   4   Learning   5   Forwarding  6   Broken       todec  lt hex_no  gt     Converts the specified hexadecimal number to decimal   A hexadecimal number begins with Ox  for example   0x1234         tohex  lt decimal_no  gt     Converts the specified decimal number to hexadecimal        trrxo  lt circuit_no  gt     Displays the number of Token Ring octets received for  the specified circuit        trrxf  lt circuit_no  gt     Displays the number of Token Ring frames received for  the specified circuit        trtxo  lt circuit_no  gt     Displays the number of Token Ring octets transmitted  for the specified circuit        trtxf  lt circuit_no  gt     Displays the number of Token Ring frames transmitted  for the specified circuit        tr_stats  lt circuit_no  gt     Displays all Token Ring
79.  the type to the screen   backplane LN Sets the backplane type to LN  Use for LN or ALN   backplane CN Sets the backplane type to CN   backplane FN Sets the backplane type to FN     the Date and Time    The date command allows you to display or change the system date  time  or time  zone offset  The time is based on the 24 hour clock  The offset is the time  difference between the current time and Greenwich Mean Time  GMT      Enter the following to display the system date  time  and GMT offset     date       8 46    114088 Rev  A    System Administration    The date  time  and GMT offset are displayed in mm dd yy hh mm ss  l  hh mm  format  For example     Jan 16  1995 15 26 23  GMT 12     The GMT offset is stored as a direction    or    and a value in hours and minutes   Most time zone offset values are in hours  and do not include minutes  For  example  the eastern standard time  EST  zone is 5 hours behind GMT    or GMT 5      Enter the following to change the date  time  and GMT offset   date   lt mm dd yy hh mm ss gt    l  hh mm    The console displays the new date  time  and time zone offset     If you do not enter a parameter  for example  the date   the system uses the current  system setting        Note  When you change the date  time  and GMT offset  the GAME operating  system distributes the new date and time to all processor modules        Changing the GMT offset changes the timestamps of messages in the event log   For example  the GMT offset was 0 at 2 00 p m  
80.  this section to  avoid corrupting the config file        We recommend that you first rename or copy the file at the source to a new   temporary filename if the name is the same as an existing file at the destination     Enter the following command to initiate a file transfer from the Technician  Interface     tftp  get   put   lt remote IP address gt   lt filename gt    lt filename gt       get   put  is put if you are transferring the file to the remote node and get if you  are transferring the file to the local router      lt remote_IP_address gt  is the address of the remote node    lt filename gt  is the name of the file to be transferred       lt filename gt   is the name to which you want to transfer the file  If you do not  enter a name  the system defaults to the  lt filename gt  you specified for the source  file          Caution  The local system erases the file if you enter its address in the   lt remote_IP_address gt  field of the tftp command        The system executes one TFTP request at a time for the duration of the file  transfer  The destination system stores the file under the name you specify  If you  do not enter a destination filename  the system defaults to the source filename        114088 Rev  A 5 17    Using Technician Interface Software    Examples    If you enter  The local system    tftp put 192 32 1 62 config2 cfg Sends a copy of config2 cfg to newconf on   newconf the remote node at the IP address  192 32 1 62     tftp get 192 32 1 62 config2 c
81.  to the most current  technical and support information through a choice of access retrieval means   These include the World Wide Web  CompuServe  Support Source CD  Customer  Support FTP  and InfoFACTS document fax service        114088 Rev  A xxvii    Using Technician Interface Software    Bay Networks Customer Service    If you purchased your Bay Networks product from a distributor or authorized  reseller  contact that distributor   s or reseller   s technical support staff for assistance  with installation  configuration  troubleshooting  or integration issues     Customers can also purchase direct support from Bay Networks through a variety  of service programs  As part of our PhonePlus    program  Bay Networks Service  sets the industry standard  with 24 hour  7 days a week telephone support  available worldwide at no extra cost  Our complete range of contract and  noncontract services also includes equipment staging and integration  installation  support  on site services  and replacement parts delivery    within approximately  4 hours     To purchase any of the Bay Networks support programs  or if you have questions  on program features  use the following numbers                    Region Telephone Number Fax Number  United States and 1 800 2LANWAN  enter Express Routing  508  670 8766  Canada Code  ERC  290 when prompted    508  436 8880  direct   Europe  33  92 968 300  33  92 968 301  Asia Pacific Region  612  9927 8800  612  9927 8811  Latin America  407  997 1713
82.  y Selects the YMODEM batch protocol for sending files  Sends in sequence  any list of files you specify in the Technician Interface command line     Selects the MODEM7 batch protocol for sending files           Uses 1 kB packets on transmit        Selects CRC mode on receive        z       3    Causes the Technician Interface to wait 15 seconds before initiating the  startup handshake  which in turn commences the specified file transfer  operation     If you are using a 386 486 DOS PC as a workstation  you trigger the initial  handshake by selecting Ymodem Send or Ymodem Receive from the File  Transfers pull down menu        l When specified in the command line    inhibits the logging of YMODEM  events in the system log   Automatic logging is a default mechanism of the  XMODEM YMODEM protocols      When you enable logging  by not specifying the   flag in the command line    log messages for significant events  errors  and retries are sent to the  system log  The log messages can be useful for troubleshooting        p Prints  displays  information and events pertaining to the YMODEM batch  file transfer in progress  UNIX only      n Allows CAN CAN   x x  aborts during midtransfer  Otherwise  the  YMODEM protocol allows CAN CAN aborts only at the beginning of a file  transfer operation                    e Disables EOT verification when transferring files to the router  DOS only            B 6 114088 Rev  A    Using Out of Band Access to Transfer Files    Filenames    The conv
83.  you transfer between a  remote workstation and a Bay Networks router     e The YMODEM protocol truncates binary files received in a batch transfer  operation  The YMODEM header specifies the truncated size     e YMODEM sets the file modification timestamp field in the header of all  transmitted binary files  Note  however  that the timestamp is subject to a  specific time zone reference     Error Checking    YMODEM performs the following error checks on file transfers between remote  workstations and Bay Networks routers     e IfYMODEM detects 10 or more errors during the transmission or reception  of any one packet  it cancels the transfer in progress     e If an unexpected error occurs before a file is completely received  Y MODEM  deletes the incomplete file     Canceling a File Transfer    While waiting for the beginning of a file transfer  YMODEM treats two CAN   control x  characters received within 3 seconds of each other as a request to  cancel the operation  CAN characters do not cancel the operation if received while  a transfer is in progress  unless you specify the n option flag in the Technician  Interface xmodem command line     Modem Interface Differences    If you are not using a Hayes compatible modem locally attached to your  workstation  you may need to follow interface line control procedures appropriate  for that modem  Such procedures may be necessary if  for example  quitting the  terminal interface program  for example  tip or Wfterm  fails to switch 
84. 088 Rev  A    9 7    Using Technician Interface Software    Examples    If you enter  The system    unalias scroll Deletes the alias named scroll   unalias   Deletes all aliases from memory     Saving Aliases to a File    You can copy all aliases residing in RAM to a file on a volume for later retrieval   Enter the following to create an alias file    save aliases  lt vol gt   lt filename gt     lt vol gt  is the volume that will store the alias file      lt filename gt  is the name of the alias file     Example   If you enter  The system   save aliases 2 aliases 1 Creates a file named aliases   on volume 2 and    copies the aliases from RAM to this file        Note  The command alias precedes the alias name and alias text for each  entry in the file  allowing you to run the file as a script file           9 8    114088 Rev  A    Managing Aliases    Loading Aliases from a File    You can use the source aliases command to load the aliases from a file residing  on the volume to active RAM  The aliases already residing in memory remain in  memory  however  the system overwrites any aliases in memory that have  duplicate names  Use the unalias   command if you want to delete all aliases from  memory before entering the source aliases command     Enter the following to load aliases   source aliases  lt vol gt   lt filename gt    lt vol gt  is the volume storing the alias file      lt filename gt  is the name of the file that contains aliases     Example    If you enter  The system
85. 1   For the ASN  use xevr lt network_module_no  gt  lt port_no  gt             continued        114088 Rev  A    8 7    Using Technician Interface Software    Table 8 3  ifconfig Settings for an Ethernet Interface  continued        Setting    Description       IP address settings         lt  P_address gt     Specifies the IP address of the interface you set with  lt interface gt   Provide this  address in dotted decimal notation         lt subnet_mask gt     Specifies the IP subnet mask of the interface you selected with the  lt interface gt   setting  Provide this address in dotted decimal notation         lt next_hop_address gt           Specifies the IP address of the next hop router  Provide this address in dotted  decimal notation  You only need to specify this address if there are intermediate  routers between the router and the BOOTP server        Enabling and Disabling Interfaces with ifconfig    To enable an AN or ANH interface for the network boot process or to disable an  interface from the network boot process  use the following command formats     ifconfig  disable  lt interface gt     ifconfig  enable  lt interface gt     To enable an ASN interface for the network boot process or to disable an interface  from the network boot process  use the following command formats     ifconfig   s lt s ot_no  gt    disable  lt interface gt     ifconfig   s lt s ot_no  gt    enable  lt interface gt      lt slot_no  gt  Specifies the slot containing the interface you want to e
86. 11 1 1 4       2 6    114088 Rev  A    Parameter   Attribute Name   Attribute Number   Default    Options     Function     Instructions   Command   MIB Object ID     Parameter   Attribute Name   Attribute Number   Default    Options     Function     Instructions   Command   MIB Object ID     Configuring the Console Port    Port Name  wfSerialPortName  5   None   Set by the system     The name that the system has assigned to the port  Users may not specify  a name  You can use this name to correlate the port number to the name  printed on the hardware next to the physical port connection     You cannot change this parameter   get wfSerialPortEntry 5  lt port_no  gt   1 3 6 1 4 1 18 3 3 2 11 1 1 5    Port Slot  wfSerialPortSlot  6   None   Set by the system     The slot on which the login session for the console port is running  The  system sets this number     You cannot change this parameter   get wfSerialPortEntry 6  lt port_no  gt   1 3 6 1 4 1 18 3 3 2 11 1 1 6       114088 Rev  A    2 7    Using Technician Interface Software    Parameter   Attribute Name   Attribute Number   Default    Options     Function     Instructions   Command   MIB Object ID     Parameter   Attribute Name   Attribute Number   Default    Options   Function   Instructions   Command    MIB Object ID     Port Type   wfSerialPortType   7   1  Technician Interface    1  Technician Interface    2  Printer     Configures the port for either Technician Interface  Console or Modem   or Printer   The Printer 
87. 14 255 1 2       set wfSyslogEntFlitrEntry wfSyslogEntFltrSlotLowUpp   192 32 6 14 255 1 4       commit       114088 Rev  A    C 27    Using Technician Interface Software       Note  If you add another filter for a specific entity  that filter takes precedence  over the wildcard filter for the host you specified  At such time  the wildcard  filter transitions to the INACTIVE state  the new filter transitions to the  ACTIVE state  and the remote host receives messages only through the  entity specific filter        Syslog Parameter Descriptions    Syslog objects and key parameters  attributes  that you can set on the router or  get from the router by means of Technician Interface commands exist in the router  MIB in the following hierarchy     wfSyslog  group or global parameters pertaining to Syslog operation    wiSyslogDelete  wiSyslogDisable  wiSyslogOperState  wiSyslogMaxHosts  wfSyslogPollTimer    wfSyslogHostTable  table or list of remote host destinations for Syslog    wfSyslogHostEntry  individual remote host entry in the host table    wiSyslogHostDelete  wifSyslogHostDisable  wiSyslogHostDest  wifSyslogHostUDPPort  wiSyslogHostLogFacility  wiSyslogTimeSeqEnable  wifSyslogHostOperState       C 28    114088 Rev  A    Using Syslog Messaging to Monitor Router    wfSyslogEntityFilterTable  table of entity filters for one host    wfSyslogEntFltrEntry  individual entity filter entry in the entity filter table    wifSyslogEntFltrDelete  wfSyslogEntFltrDisable  wifSyslogEntFlt
88. 14088 Rev  A    Configuring the Console Port    Using Autoscript Files    You can configure the Technician Interface to use the autoscript files automgr bat  and autouser bat  so that the Technician Interface executes certain commands  every time you log in as either a Manager or User     To configure the Technician Interface to use these autoscript files  you must  modify the following serial port parameters     e Login Script Search Path  e Manager   s Login Script  e User   s Login Script   e Force User Logout    Use the Login Script Search Path parameter to specify the list of file system  volumes to be searched  You can set up separate autoscript files to be run for the  Manager login and the User login by configuring the Manager   s Login Script and  User   s Login Script parameters  You can set the Force User Logout parameter  when the User autoscript is in effect  This parameter locks the user into the User  autoscript  When this parameter is enabled  any attempt to abort the script results  in the user being logged out     The Technician Interface configuration file  ti cfg  looks for the automgr bat script  when the Manager logs in  or for the autouser bat script when the User logs in  If  the autoscript is not present  login proceeds normally without any error messages   The ti cfg file has a default search path of slots 1 to 14 and a volume A  This works  for any platform        114088 Rev  A 2 19    Using Technician Interface Software    Sample Autoscript Files  
89. 3 Octet4 Octet5 Octet6 Octet 7 Octet 8 Octet 9 Octet 10 Octet 11    26 i 13     lt month gt      lt day gt              lt hour gt    lt minute gt    lt second gt    lt deci seconds gt    lt direction_offset_from_UTC gt    lt hours_offset_from_UTC gt      lt minutes_offset_from_UTC gt     Figure 8 2  RUIBOOT Date and Time Example    3  Specify a boot image name     Specify a router software image name for that entry  as follows     BN  3   set wfRuiBootTable wfRuiBootImageName  lt wfRuiBootDateAndTime gt      bn exe       BN  3   commit    The name you specify belongs to the RUIBOOT table entry that has the same  instance ID        8 18 114088 Rev  A    System Administration    4  Specify a configuration file name  as follows     BN  3   set wfRuiBootTable wfRuiBootConfigName  lt wfRuiBootDateAndTime gt      config2       BN  3   commit    The name you specify belongs to the RUIBOOT table entry that has the same  instance ID     5  Schedule additional delayed boot events     If you want to add more delayed boot events to the router configuration  return to  step 2  otherwise  continue with step 6     6  Save the current configuration file on the router  as follows     BN  3   save config  lt vol gt   lt filename gt        Note  This is an optional step         lt vol gt  is the NVFS Flash volume on which you want to store a copy of the current   modified  configuration file on the router      lt filename gt  is the name you assign to the configuration file that contains your 
90. 4 eight successive times and  waits up to 3 seconds for a response to each ping   The console displays one of the following for  each ping sent    IPX ping  O0xAB12 0xCD1234 is alive   IPX ping  O0xAB12 0xCD1234 does not respond  IPX ping  0xAB12 0xCD1234 is unreachable    The console also displays the following type of  message after reporting the progress of each  ping    IPX ping  OxAB12 0xCD1234 responded to 8  out of 8  100  success       3 14    114088 Rev  A    OSI Ping    Using Operating Commands    When you issue the ping command for OSI  the router sends a Connectionless  Network Protocol  CLNP  echo request to the remote Network Service Access  Point  NSAP  address you specify  The remote device responds with a CLNP echo  response if it can be reached  and the console displays the response or the result of  the request     Enter the following to ping a remote device running OSI   ping  osi  lt NSAP_address gt    t lt timeout gt     r lt repeat_count gt       lt NSAP_address gt  is the required NSAP address  in hexadecimal notation  0 9   A F   of the remote device   A leading Ox is not required when entering the NSAP  address        t lt timeout gt     r lt repeat_count gt   are optional  These parameters are as follows      lt timeout gt  is the number of seconds for each ping to time out  If the system  receives a response to a ping after it has timed out  the system does not send an     alive    message to the console  The default is 5      lt repeat_count gt  i
91. 8     All events in wide format  as follows        114088 Rev  A    6 7    Using Technician Interface Software    Example  log  w      1  08 13 95 16 32 20 011 INFO SLOT 2 GAME Code 11 Starting image int 9 00 52 Mon Jul 31 22 20 19 EDT     2  08 13 95   3  08 13 95   4  08 13 95   5  08 13 95   6  08 13 95   7  08 13 95    16   16   16   16   16   L63    32 21 031 INFO SLOT 2 GAME Code 9 BackBone 0 became re connected  323 21  511 INFO SLOT 2 GAME Code 10 slot 4 became re connected  32721554 INFO SLOT 2 GAME Code 10 slot 3 became re connected  32 229 238 INFO SLOT 2 NVFS Code 42 Volume 2  Service initializing   32 33 347 INFO SLOT 2 MIB Code 4 Using configuration file  2 config   32 33 480 INFO SLOT 2 MIB Code 3 Service initializing     Saving the Events Log    You can save the events in the current event buffer to a file for later retrieval              Caution  The system automatically overwrites any file on the volume that has  the same filename  To avoid overwriting an existing file  display a list of the  volume   s contents  with the dir  lt vo  gt   command  and determine the filenames  already in use        Enter the following    save log  lt vol gt   lt  og_file gt     lt vol gt  is the volume on which to store the file    lt log_file gt  is the name of the file you are creating to store the events    We recommend that you use the  log file extension when creating log files   You can verify that the log file is saved by entering the dir  lt vo  gt   command     You c
92. 8  20     gt  ftp exe 0x30418310        gt  tcp exe 0x30422770     gt  tftp exe 0x304b9c90     gt  snmp exe 0x30430650        gt  tn exe 0x304bed70       gt  ip exe 0x3048e350       gt  ilacc exe 0x304cb670     gt  genet exe 0x30523f10    on SLOT 4    0118168  0060288  0089652  0055608  0004052    0026760  0055608  0004008    0008816  0087680  0105916  0118168  0042060  057040  020680  030344    178468  011872          0  0  0  0038424  0  0  0    004072    System Administration       114088 Rev  A    8 45    Using Technician Interface Software    Setting the ACE Backplane Type    Resetting    The backplane command allows you to set or display the ACE backplane type in  nonvolatile RAM  You issue the backplane command during the initial startup of  your VME based Bay Networks router  You need only enter the backplane  command once during the life of the system controller installed in Slot 1 of the  router  unless you insert the system controller in another type of VME router  For  instructions on using the backplane command  see Quick Starting Routers and  BNX Platforms     Enter the following command to set the ACE backplane type in nonvolatile RAM    lt type gt  is the VME based router type  ALN  LN  CN  or FN      backplane  lt type gt     If you issue the backplane command without specifying a type  the system  displays the router   s backplane type to the screen     Examples   If you enter  The system   backplane Reads the backplane type from the hardware and    displays
93. A    8 55    Using Technician Interface Software    Testing Compression and Throughput    Perform the following tests before and after making any change to the set values  of the line and circuit WCP search depth attributes     e Measure end to end throughput for several file transfer operations across the  circuit s  or line for which you are changing the search depth value  Select  files that contain data representative of the type of information your  organization needs to send and receive daily     e Measure the percentage of bandwidth utilization required to send your test  file s  over the synchronous line     e Calculate the compression ratio s  resulting from the file transfer operations    Compare your compression ratios and line utilization figures taken before and  after your changes  Determine from these results whether you have improved the  configuration for data compression on the desired line and or circuit s      The best settings for the search depth attributes result in the best trade offs  between end to end throughput  compression ratios  and line costs for the type of  data you want to send over a synchronous line        8 56 114088 Rev  A    System Administration    WCP Search Depth Attributes    The modifiable search depth attributes for the WCP entity have the following  characteristics     Parameter   Attribute Name   Attribute Number   Default    Options     Function     Instructions     Command   MIB Object ID     WCP Line Search Depth  wfWcpLineSe
94. A    C 39    Using Technician Interface Software    Parameter   Attribute Name   Attribute Number   Default    Range    Function     Instructions     Command     MIB Object ID     Log Evt Upper Bound  wfSyslogEntFltrLogEvtUppBnd  8   255   0 to 255    Along with the Log Evt Lower Bound  this parameter attribute specifies  an event number  code  or range of event numbers  The number s   correspond to event messages you want to forward to the remote host  associated with this filter     For a complete list of event codes for each entity  refer to Event Messages  for Routers and BNX Platforms for this version of the router software     To specify a range of event numbers that identify messages you want to  forward to a remote host  set the value of this parameter attribute to the  high number of the range  Set the value of the  wfSyslogEntFltrLogEvtLowBnd  Log Event Upper Bound  parameter to  the low number of the range     Any range you specify includes the values for the lower and upper bound  parameters attributes  For example  if you specify a lower bound of 2 and  an upper bound of 7  Syslog forwards all messages with event codes of 2  through 7  inclusive   logged by the entity defined under  wfSyslogEntFltrNum  Filter Entity Name   Syslog ignores all other event  messages     To filter  select only  a specific event  set the value of  wfSyslogEntFltrLogEvtUppBnd to the code number for that event  Set  the value of wfSyslogEntFltrLogEvtLowBnd  Log Event Lower Bound   to th
95. AT ping  100 5 does not respond    e A  lt target_address gt  is unreachable message  This message appears if the  local Bay Networks router cannot find the specified address in its routing  table  A sample message follows     AT ping  100 5 is Unreachable    e A resource error message  This message appears if the local Bay Networks  router cannot allocate a buffer for the request because none is available  A  sample message follows     AT ping  resource error    e An Invalid AppleTalk option message  This message appears if you specify  an invalid parameter  for example   p   A sample message follows     AT ping  Invalid AppleTalk option    e An Invalid AppleTalk address message  This message appears if you  specify an invalid address  for example  1 2 3 4   A sample message follows     AT ping  Invalid AppleTalk address    e A Specified size too large message  This message appears if you specify  a  lt size gt  that is larger than 585  The system uses the maximum of 585 bytes  A  sample message follows     AT ping  Specified size too large  using maximum of 585 bytes    e AMAT service is not running message  This message appears if the  AppleTalk service is not enabled on the router  A sample message follows     AT ping  AT service is not running       3 22 114088 Rev  A    Examples     If you enter     ping  at 100 5    ping  at 100 5  t3  r8    Using Operating Commands    The system     Pings the device at the AppleTalk address 100 5  and waits up to 5 seconds  default  f
96. At 10 00 p m   you access the  event log to check the messages that came in between 2 00 and 10 00  If you then  change the GMT offset to  2  the timestamp of each message in the event log is  offset by  2 hours  that is  if the timestamp was 2 00 p m   it changes to 12 00    p m          114088 Rev  A 8 47    Using Technician Interface Software    Examples   If you enter  The following occurs   date The console displays the current system date  time     and time zone offset     Jan 25  1995 16 00  GMT 4     date 01 25 95 16 02 The system date and time change to   Jan 25  1995 16 02    date 01 25 95 16 02  5 The system date  time  and time zone offset change  to   Jan 25  1995 16 02  GMT 5     Assigning Passwords    This section describes how to assign or reassign the Manager and User access  passwords     The Technician Interface runs on a single processor module  When you assign a  password  the GAME operating system distributes the new password to  nonvolatile RAM in all processor modules   For this reason  the system retains  passwords if the Technician Interface runs subsequently on a different processor  module  after you booted the router  reset a slot  or replaced a board         Note  If you insert a new processor module  you must reassign the Manager  and User passwords  otherwise  the Technician Interface will not require  passwords when it runs on that slot        You can assign the User access password when you are logged in as User or  Manager  You can assign th
97. Avtomatically sirieni danaa bidata aaa 6 10  Log Autosave Plater DiferehcES as sce  ctcicassetecisgiecaselaau seeaiuaueteaaleesesaaleoneenaned 6 11  Gonfiguring the Log Autosave Feature  i ccscsesdcagiaiecectutiontaliccciavanteditncde 6 12  Displaying an Events Log File Previously Saved           2  ccccceecceeeeeeeeeceeeeseeeeeeeeseeeeeeeees 6 13  CIGARRO E VEE siani ines pecs Gtasemnaedgacateaccegeetesdeaaasand dessdeuennses oesatesansaactaamscavaunitensess 6 14  Chapter 7  Accessing the MIB  Ret pear MID ODOC arsar 7 2  CEOE VAOS giair a decade va OE 7 4  Se erie NIB YUCE    aa  Nous tienda n aena a a a Ea 7 6  Cammin ME SOLS risign E R a 7 8  Sao IG COTAN sainia AEA A 7 9  Using imne MIB  OO0mET corsnnnnesene a ieeetacdunidle tales amea on demtaaetieace 7 9  Chapter 8  System Administration  AN ANH ASN Administration  siinid a aa daa aaa aaa aa adana 8 2  COTA ihe Bool SOUPE esnie nana aa iaa Siae 8 3  Configuring Initial Interfaces and Netboot Operation          0  ccccceceeeeeeeeeeeeteeeeeneeeees 8 5  Configuring the Initial IP Synchronous Interface              ccccceeeeeeeeeeseeeeeeeneeeeees 8 5  Configuring an Ethernet Interface for Network Booting          0   ccccsccceeessteeeeees 8 7  Enabling and Disabling Interfaces with ifconfig              c cecceeeeeeeeceeeeeeteeeeeeeeaee 8 8  Booting the Router sssrinin E E E E T AVEA eR ipao 8 9    viii 114088 Rev  A       How TE Router ES ceca ccwcreriirsaccccte ve asederirasaawadcrei andes duacneceete sencstes taumeedeit
98. B Object ID     Parameter   Attribute Name   Attribute Number   Default    Range     Function     Instructions     Command   MIB Object ID     Maximum Hosts  wfSyslogMaxHosts  4   5   1 to 10    Specifies the maximum number of remote hosts considered    active    and  able to receive messages from the Syslog service on the router  The  number includes Syslog hosts configured to receive time sequenced  messages  as well as hosts configured to receive messages  nonsequentially     Enter the maximum number of active hosts allowed to receive messages  from Syslog on the router  The actual number of entries in the host table  can exceed the value of wfSyslogMaxHosts  but Syslog will forward  messages only to the first    n    active hosts  where n equals the current  setting of wfSyslogMaxHosts  Increasing the value of  wfSyslogMaxHosts increases the overhead processing requirements for    Syslog on the router   set wfSyslog wfSyslogMaxHosts 0  lt 1   10 gt     1 3 6 1 4 1 18 3 3 2 15 1 4    Log Poll Timer  WfSyslogPollTimer  5   5 seconds   5 to 610000    Determines the amount of time Syslog waits before initiating another  cycle to poll all slots for event messages logged since the previous polling  cycle     Enter the number of seconds that you want Syslog to wait between polling  cycles     set wfSyslog wfSyslogPollTimer 0  lt 5  610000 gt     1 3 6 1 4 1 18 3 3 2 15 1 5       C 32    114088 Rev  A    Host Parameters    Using Syslog Messaging to Monitor Router    This section 
99. BCN FRE 1  FRE 2                      Caution  It is possible that the FRE modules can simultaneously load  different images or configurations if you have alternate versions of the boot or  configuration file  We recommend that you have only one version of each on  the router  Assign new names to alternate versions           114088 Rev  A    Managing a NonVolatile File System    Naming Files  Rules and Conventions    The rules for naming files are as follows     You must specify the volume location  slot number  of any file you reference  and of any file you create  The sections that follow detail the syntax  requirements  including the slot number specification  for each command     Filenames must start with an alphabetical character  The remaining characters  must be alphanumeric  and may also include the underscore  _  character and  dot     character  Spaces are not allowed     Filenames can consist of one to 15 characters  We recommend a limit of 8  characters  however  to ensure that all operating systems that we support can  recognize the names     File extensions are optional  and must be preceded by a filename and a dot   The total Technician Interface limit for the filename and file extension is 15  characters  including the dot      We also recommend the following conventions when naming files so that you can  easily distinguish files by type     Use the  exe file extension for router software images for the FRE   and  Motorola modules  BLN  BLN 2  BCN  AFN  AN  AN
100. CSMACD connector on module 1 of slot 2        A 12    114088 Rev  A    Overview    Appendix B    Using Out of Band Access to Transfer Files    This appendix describes how to use the xmodem command to perform  out of band file transfers  The xmodem command enables you to transfer files  between remote workstations and Bay Networks routers when all IP routing paths  between them are down  You cannot use the xmodem command to transfer files  between Bay Networks routers     Both UNIX and 386 486 DOS remote workstations allow you to log in to the  Technician Interface port of a router and enter xmodem commands  However   each type of workstation uses a different utility program for opening and closing  out of band  dial  connections between workstation and router     With a Sun workstation  you initially establish a connection by configuring and  running the Terminal Interface Program  TIP   The program has two associated  files   etc phones and  etc remote  in which you can enter setup information such  as the telephone number of a remote router   etc phones  and modem interface  settings   etc remote   You run the program by entering a tip command with  appropriate syntax at the UNIX command line prompt     With a 386 486 DOS workstation  you initially establish a connection by  configuring and running the Bay Networks Terminal Program  filename wfterm    To run the program  click on the Wfterm icon in the display of your Site Manager  workstation        114088 Rev  A    B 1   
101. Disable 0  get 1 3 6 1 4 1 18 3 5 3 5 1 1  get 1 3 6 1 4 1 18 3 5 3 5 1 1 0  get 1 3 6 1 4 1 18 3 5 3 5 1 1    get wfSnmp 1 0   get wfSnmp 1      get wfSnmp      0    get wfSnmp        The console displays     wfSnmp wfSnmpDisable 0   1   The object name  the base record  0    and the value      Appending the base  0  to the object name  is optional when issuing a get  command     Likewise  appending the base  0 or    to the  instance identifier is optional when issuing  a get command     wfSnmp wfSnmpDisable 0 1  wfSnmp wfSnmpUseLock 0   1  wfSnmp wfSnmpLockAddress 0    get  Invalid obj attr inst  specified       7 5    Using Technician Interface Software    Setting MIB Values    The set command modifies the value of an instance  You set an instance by  specifying its object attribute instance  You may use names or identifiers to  specify object groups and attributes  use only an appropriate identifier or index  value to specify the instance        Note  When you enter the set command  the attribute is set on each running  processor module        Enter the following to change the value of an object instance   set  lt object gt   lt attribute gt   lt instance gt   lt value gt    or   s  lt object gt   lt attribute gt   lt instance gt   lt value gt     lt object gt  is the required name or identifier of the object    lt attribute gt  is the required name or identifier of the attribute      lt instance gt  is the required unique identifier of a nontabular object  or the     IND
102. E processor module  4 2  4 4  freboot exe PROM image file  4 10  frediag exe PROM image file  4 10    G    get command  7 4   getting help  from a Bay Networks Technical Response   Center  xxx1   from the Support Source CD  xxx  through CompuServe  xxx  through Customer Service FTP  xxix  through InfoFACTS service  xxxi  through World Wide Web  xxix    graceful shutdown  BNX   8 13  8 23  8 28    H    hardware compression  8 55    hardware configuration  for out of band file  transfers  B 9  HDLC encapsulation  8 6  help  command  3 2  displaying online  3 2  history  command  3 4  list  changing the size of the  3 4       114088 Rev  A    Index 5    Using Technician Interface Software    l   ICMP echo request  3 8   ifconfig command  8 5 to 8 8   images  4 4  ace out  4 4  4 9  5 4  afn exe  4 9  afnboot exe  4 9  anboot exe  4 9  andiag exe  4 9  asnboot exe  4 9  asndiag exe  4 9  bn exe  5 4  freboot exe  4 10  frediag exe  4 10  list  4 4  4 9   in band file transfers  DOS  5 16 to 5 18  NVFS  4 14 to 4 16    InfoFACTS service  xxxi   initializing the Technician Interface  1 3  install bat file  4 10  5 11   interface configuration  8 5 to 8 8  internal clock mode  enabling  8 62    IP  address settings  8 7  8 8  connector setting  8 6  8 7  default setting  8 6  8 7  ping command  3 8 to 3 11    IPX ping command  3 12 to 3 14    L    label command  5 11  lines per screen  setting  2 11  list command  2 2  7 2    loadmap command  8 44    log  automatically saving the  6
103. EX    value of a tabular object        Note  The MIB uses the value of the    INDEX    in the    Entry      1  attribute of  a table object to define the  lt instance_id gt  of any entry belonging to that table   The INDEX typically defines the  lt instance_id gt  by means of one attribute  or  by means of multiple attributes that together define the  lt instance_id gt  of a  table entry           7 6    114088 Rev  A    Accessing the MIB     lt value gt  is the required new value of an instance of an object  This value may be  one of the following  depending on the data type     e Integer  unsigned integer types  decimal number  e IP addresses  dotted decimal format  for example  192 32 0 0   e Octet strings  hexadecimal number starting with Ox    e Display strings  string enclosed in double quotes    Refer to the Bay Networks MIB to determine the data type        Caution  If you are running Spanning Tree  always follow any Technician     Interface set command to the Bridge with the corresponding Technician   Interface set command to the Spanning Tree  Otherwise  you may lose   connectivity to LANs  Refer to the last two examples that follow        Also  make sure the values you set are legal  Illegal or incompatible MIB values  can disrupt software or network services after you enter the commit command   Refer to the Bay Networks MIB for the legal values     You can use the list command or refer to the Bay Networks MIB to determine the  symbolic names and identifiers for ob
104. FS  4 5    O    online help  3 2    operational state  of a Syslog filter  C 38  of a Syslog host  C 36  of the Syslog entity  C 31    OSI ping command  3 15 to 3 17    Index    out of band file transfers    from a UNIX workstation  B 10 to B 16  from a Windows workstation  B 17 to B 31  hardware configuration  B 9   overview of  B 1 to B 2    overwriting files  5 14  5 17    P    packet transfer  halting between slots  8 33    parameters    Console  Baud Rate  2 8  Command Timeout  2 14  Data Bits  2 9  Force User Logout  2 17  Lines Per Screen  2 11  Login Retries  2 14  Login Script Search Path  2 15  Login Timeout  2 13  Manager   s Login Script  2 15  Modem Enable  2 10  More Enable  2 11  Password Timeout  2 13  Port Delete  2 5  Port Disable  2 5  Port Name  2 7  Port Number  2 6  Port Parity  2 9  Port Slot  2 7  Port State  2 6  Port Type  2 8  Stop Bits  2 10  User   s Login Script  2 16  Syslog  Debug Map  C 46  Entity Filter Delete  C 37  Entity Filter Enable  C 37  Fault Map  C 44  Filter Operational State  C 38  Host Delete  C 33  Host Log Facility  C 34  Host Operational State  C 36  Host Time Seq Enable  C 35       114088 Rev  A    Index 7    Using Technician Interface Software    Host UDP Port  C 34   Info Map  C 45   Log Evt Lower Bound  C 39  Log Evt Upper Bound  C 40  Maximum Hosts  C 32  Messaging Enable  C 33  Operational State  C 31  Severity Mask  C 41   Slot Lower Bound  C 42  Slot Upper Bound  C 43  Syslog Delete  C 30   Syslog Enable  C 30   Syslog 
105. FddiSmtGroup  wfFddiGroup  1   wfFddiMacGroup  wfFddiGroup 2   wfFddiPathGroup  wfFddiGroup 3   wfFddiPortGroup  wfFddiGroup 4    wfCSMACDAutoNegGroup  wfLine 16    wfPktCaptureGroup  wfLine 21    wfCompressionGroup  wfLine 22    wfAtmInterfaceGroup  wfLine 23   wfAtmCommonGroup  wfAtmInterfaceGroup  1   wfAtmLinkModuleGroup  wfAtmInterfaceGroup 2   wfAtmCellSwitchGroup  wfAtmInterfaceGroup 3    wfSonetGroup  wfLine 24    wfDsx3Group  wfLine 26    wfBisyncGroup  wfLine 27     Sample Top Level Hierarchy of the Bay Networks Router MIB   continued        A 4    114088 Rev  A    Using the Bay Networks Router MIB    wfApplication  wfSwSeries7 5   wfDataLink  wfApplication 1   wfBridgeGroup  wfDataLink 1   wfBrLearning  wfBridgeGroup  1   wfBrSourceRouting  wfBridgeGroup 2   wfBrTplnterface  wfBridgeGroup 3   wfBrTrafficFilterTable  wfBridgeGroup 4   wfBrNativeModeLan  wfBridgeGroup 5   wfSpanningTree  wfDataLink 2   wflfGroup  wfDataLink 3   wfCircuitOptsGroup  wfDataLink 4   wfDlsGroup  wfDataLink 5   wfLIcGroup  wfDataLink 6   wfSdlicGroup  wfDataLink 7   wfLapbTable  wfDataLink 8   wfProtocolPriorityGroup  wfDataLink 9   wflRedundGroup  wfDataLink 10   wfDecGroup  wfApplication 2   wfiInternet  wfApplication 3   wfArpGroup  wflnternet 1   wflpRouting  wflnternet 2   wflpGroup  wflpRouting 1   wfRipGroup  wflpRouting 2   wfOspfGroup  wflpRouting 3   wfEgpGroup  wflpRouting 4   wfBgpGroup  wflpRouting 5   wfBgpGeneralGroup  wfBgpGroup 1   wfBgp3Group  wfBgpGroup 2   wfBgp4Group  
106. Filtering Dy Event Severity Lavel scciiscecsdcnccasstesesgreeteese lidswsacsionarasansideatsisarsicessacniasces C 7  Fienna Dy Soi NUM DET aissar AEA C 7  Mapping Router Event Messages into Syslog Message Format sasse C 8   IP Heada ca tteeey arta sees ctaredes entrar aNioladicaant Gee ess at ee lade aul eerapeitaes C 9  UDE DEI 2  antennae nee armor a ormrreroen ne creree prin lueaer mnnre oem neta er C 10  UDF DA nson P E eta E E OET REN C 10  Pont CNS cass crater iaianraieiwanenaue EE EA C 10  Time Sequencing Syslog MeSSaQES              ccccceeceeneeececeeeesaeeceeaeeeeaaeeeeeeeeeaaeeneaes C 12  Syslog Message Handling  on a Workstation            ccccccceseeeeeeeeeeeteeeeeeeeeseeeseneees C 12   Contiguring Syslogd ona UNIX Workstation oi czccessedccesssaseeetiatiaccaddeeauergesvsancesnadaateads C 13   Configuring Syslog on the Router                cseeeeeeeeetteeeeeeeeee EE deus EE ET series C 15  Task 1  Logging In to the Router   s Technician Interface               csseeeeeteeeeeeeees C 16  Task 2  Defining a Slot Mask for Syslog on the Router              ccccesceeeseeesteeeeees C 16  Task 3  Creating Syslog OM the ROUtOM sosser iaeiaiai C 16  Task 4  Configuring Syslog Global Attributes 2 0 0 0    cece eeceeeeceeeeeeeseeeeeeeeeeeteaeeneaes C 16  Task 5  Adding a Remote Host to the Syslog Host Table                ccceeeeeeeeeeeeeees C 17  Task 6  Adding ah Enty Filter for a Remote HOSE cisccccicecisacecenctermiccestsssacicctestnvions C 18  Task 7  Adding More Hosts
107. Floppy position is  for diskette boot access     You can use Site Manager and the Technician Interface to access both the memory  card and diskette files  regardless of the position of this switch  However  you  cannot override the switch setting when booting  For example  you cannot boot  from a diskette if the switch is set in the PCMCIA position     When you use Site Manager to boot the router  or specify an image and  configuration file in a Technician Interface boot command  the software verifies  the file   s existence before allowing the boot to take place        8 12    114088 Rev  A    System Administration    If the PCMCIA Floppy switch is in the PCMCIA setting  and you boot the router   the following occurs     1  The router boots from 1 ace out if it is available  If not  it boots from  2 ace out if it is available  If both are unavailable  a boot error occurs     2  The router configures from 1 config if it is available  If not  it configures from  2 config if it is available  If both are unavailable  a configuration error occurs     Booting after Crossnet Shutdown Notification  BNX Only     On BNX platforms only  you can use the  shutdown option of the boot command  to boot the BNX following a    graceful crossnet shutdown     With this option  the  system notifies the remote end of any configured Frame Relay Switch  frsw   PVCs to expect a loss of connectivity   The BNX sends to the remote end of each  PVC an update message packet with the A bit set to   inacti
108. H  and ASN    The  default router software images are bn exe  afn exe  an exe  and asn exe      Use the  out file extension for router software images for the ACE modules  FN  LN  CN  and ALN    The default router software image is ace out      Use the  cfg file extension for alternate configuration files    The default configuration file is config      Use the  al file extension for alias files   U    se the  log file extension for log files        Use the  bat file extension for script files        114088 Rev  A    4 5    Using Technician Interface Software    Displaying the Status of All Memory Cards    Enter dinfo to display the status of all memory cards currently installed in the    router  Figure 4 1 shows a sample dinfo display of a system with memory cards  installed in Slots 2 and 5        T N      dinfo   VOL STATE TOTAL SIZE FREE SPACE CONTIG FREE SPACE   C2  FORMATTED 2097152 228663 220209  5  FORMATTED 4194304 1356883 1356883              S P    Figure 4 1  Sample Dinfo Display       The dinfo command displays the following data     Vol  Slot number where the memory card is currently installed   Vol is short for  volume      State  Either formatted or corrupted  If you purchase a card from another  supplier  the dinfo display may list it as corrupted  If a card is corrupted  format  it   Refer to    Formatting a Memory Card    later in this chapter for instructions         Total Size  Total number of bytes  used and unused  in the memory card   Free Space  Numbe
109. ID client  software  Whenever you enter information that the SecurID client considers  incorrect  you receive more prompts until you log in successfully  or until the  SecurID client denies you further access to the router     Figure 1 2 shows the complete new PIN assignment procedure and interface  dialog you encounter during your initial login attempt  if you do not already have  a valid assigned SecurID PIN     To configure the SecurID client software on the router  refer to    Enabling and  Disabling SecurID Authentication    in Chapter 8           114088 Rev  A 1 7    Using Technician Interface Software    Open a Telnet connection  to the router      gt telnet  lt router_name gt     Trying  lt router_ip_address gt    Connected to  lt router_name gt   Escape character is                SecurlD authentication  enabled on the router        BEGIN HERE                 Your first login  attempt using SecurlD  authentication     Is your card in   Set PIN to next  cardcode  mode     See A    Figure 1 2    Enter a passcode after the Fourth login  Enter Passcode prompt attempt   from the router                 Login   lt User   Manager gt   Password   lt password gt   Enter Passcode   lt passcode gt     Enter only your Login  level  User Manager   and  if enabled  enter  a password     Access denied   password bad     Login   lt User   Manager gt    Password   lt password gt   Access denied   cardcode bad             Fourth attempt to  authenticate            Valid  password      
110. II   Receive  ASCII   Send             Kermit   Receive  Kermit   Send    MODEM   Receive  MODEM   Send    XMODEMC   Receive  XMODEMC   Send       YMODEM   Receive PgDn  YMODEM   Send PgUp    ZMODEM   Receive  ZMODEM   Send    ZMODEMD   Receive  7MONFMD   Send          Figure B 9  The Wfterm File Transfer Operation Selection Window       Note  Because the Wfterm utility provides more functionality than is required  to support YMODEM file transfers  the File Transfers pull down menu  contains options for up to fourteen different file transfer operations  However   to transfer files between a workstation and a Bay Networks router  you need  only the ymodem send and  receive options  This section provides only the  information you need for the YMODEM options     Transferring Files from Router to DOS Workstation    To transfer one or more files from a router to your Site Manager workstation  you  must    e Be logged in to the Technician Interface of the desired router   Refer to the  earlier section     Logging In to the Router   s Technician Interface               e Select the disk volume or memory card    volume    that contains the files you  want to transfer to your workstation     e Set the receiving Wfterm utility into receive mode     e Trigger or initiate the file transfer from router to workstation        114088 Rev  A    B 25    Using Technician Interface Software    Proceed as follows to transfer one or more files from router to workstation     1  Enter a cd command t
111. IVE  Syslog  is filtering against the criteria specified for this filter  When the state is  INACTIVE  Syslog is not using this filter to select and forward messages  to a remote host for one or more of the following reasons          Filter   s host is not ACTIVE       Filter does not have a configured event number or range       Filter does not have a configured severity mask         Filter slot number s  do not correspond to actual slot numbers on this  model of router     Instructions  Retrieve the value of this attribute when you want to check the status of a  filter for a specific entity     Command  get wfSyslogEntFltrEniry wfSyslogEntFltrOperState  MIB Object ID  1 3 6 1 4 1 18 3 3 2 15 3 1 6       C 38 114088 Rev  A    Parameter   Attribute Name   Attribute Number   Default    Range     Function     Instructions     Command     MIB Object ID     Using Syslog Messaging to Monitor Router    Log Evt Lower Bound  wfSyslogEntFltrLogEvtLowBnd  7   0   0 to 255    Along with the Log Evt Upper Bound  this parameter attribute specifies  an event number  code  or range of event numbers  The number s   correspond to event messages you want to forward to the remote host  associated with this filter     For a complete list of event codes for each entity  refer to Event Messages  for Routers and BNX Platforms for this version of the router software     To specify a range of event numbers that identify messages you want to  forward to a remote host  set the value of this parameter a
112. Interface Access Levels       Command User Manager    Vv          alias       arrayenv  refer to Writing Technician Interface Scripts        atmarp       KIRIS    attr  DOS only        backplane       bconfig       boot    cd Y    clearlog                      KISIS SISIN SISS          8 78    114088 Rev  A    System Administration          Table 8 4  Technician Interface Access Levels  continued   Command User Manager  commit Y       compact  NVFS only                                                                                   Y  copy Vv  cutenv  refer to Writing Technician Interface Scripts  VY VY  date Vv Vv  delete Y  diags Vv  dinfo  NVFS only  Vv Vv  dir VY VY  disable  refer to Using Technician Interface Scripts  VY  echo  refer to Writing Technician Interface Scripts  VY VY  enable  refer to Using Technician Interface Scripts  VY  enumenv  refer to Writing Technician Interface Scripts   A  A  exec Y  export  refer to Writing Technician Interface Scripts  Y  A  format  NVFS only   A  get Y Y  getenv  refer to Writing Technician Interface Scripts  Y  A  gosub  refer to Writing Technician Interface Scripts  Y  A  goto  refer to Writing Technician Interface Scripts  VY VY  help Vv Y  history Y Y  if  refer to Writing Technician Interface Scripts   A  A  ifconfig Vv  instenv  refer to Writing Technician Interface Scripts   A  A  ip Y Y   Y    label  DOS only                    114088 Rev  A    8 79    Using Technician Interface Software                               
113. Log Poll  C 32   Trace Map  C 46   Warning Map  C 45    partition command  4 21    password  access  1 3  assigning a  8 48  command  8 49  for new systems  1 4  setting timeout for  2 13    path trace report  3 8  pausing and scrolling the screen  3 2  PCMCIA Floppy switch  8 12 to 8 13    ping command  AppleTalk  3 21 to 3 23  APPN  3 24 to 3 26  IP  3 8 to 3 11  IPX  3 12 to 3 14  IPX  NLSP response  3 12  OSI  3 15 to 3 17  VINES  3 18 to 3 20    pinging a remote device  3 7 to 3 26  platform key  8 37    port  name  displaying the  2 7  number  displaying the  2 6  parity setting  2 9  type  displaying the  2 8    processor modules  4 4    prom  command  8 33  8 38  verifying and upgrading software on  8 38    protected access  via password  1 3  via SecureID  1 3    Q    QENET underflow errors  8 62    R    readexe command  8 33 to 8 38   record command  8 60   recording console messages to a file  8 60   rename command  5 13   repeat command      3 3   repeating a Technician Interface command  3 3   3 4   reset after graceful shutdown  8 28   reset command  8 9 to 8 10  8 24   restart after graceful shutdown  8 23   restart command  8 22   rmdir command  5 12    router software images  4 4    S    save aliases command  9 8   save command  2 4   save config command  7 9  8 3   save log command  6 8   saving the log automatically  6 10   screen pauses  setting  2 11   scripts  Technician Interface  1 2  1 13  scrolling the Technician Interface screen  3 2    secure mode 
114. OM images you want to use as source files for upgrading boot or  diagnostic PROMs on one or more slots     To determine the amount of contiguous free space  display the directory of the  Flash volume by entering the following command from the Technician  Interface prompt     dir  lt volume_no  gt         114088 Rev  A    8 41    Using Technician Interface Software    If you need more contiguous free space for the image   e Delete unnecessary or obsolete files   e Compact the contents of the Flash card     Transfer the PROM image files  for example  freboot exe and frediag exe   to the Flash card     From the Technician Interface  use the tftp command   Refer to    In Band File  Transfers    in Chapter 4 if you need more information      Establish a Technician Interface session with the router     Refer to Chapter 1 if you need more information on how to open a Technician  Interface session with the router     If you are updating a Boot PROM  enter    prom  w  lt volume_no  gt   lt Boot_PROM_source_file gt   lt slot_ID  gt        For example     prom  w 2 freboot exe 3       Note  Once you enter the prom command  it must run to completion  The  control c  abort  command is disabled for the duration of the prom command  execution to allow it to run to completion  Upgrading takes from 2 to 10  minutes per PROM  Verifying takes up to 2 minutes per PROM        If you are updating a Diagnostic PROM  enter    prom  w  lt volume_no  gt   lt Diag_PROM_source_file gt   lt slot_ID  gt  
115. OMs           114088 Rev  A 8 39    Using Technician Interface Software    Determining the Version of the Current Boot PROM Image    To determine the version number of Boot PROM images residing in a router  start  a Telnet session with the router and enter the following command at the  Technician Interface prompt     get wfHwEntry 19      With a Model BLN router  for example  information similar to the following  appears  with one wfHwEntry  wfHwBootPromSource line for each slot                                wfHwEntry wfHwBootPromSource 1    nil    wfHwEntry wfHwBootPromSource 2    rel 8 10 freboot  exe   wfHwEntry wfHwBootPromSource 3    rel 8 10 freboot  exe   wfHwEntry wfHwBootPromSource 4    rel 8 10 freboot  exe   wfHwEntry wfHwBootPromSource 5    rel 8 10 freboot  exe     Each line of response to the command specifies    e A slot number  for example     wfHwEntry wfHwBootPromSource 2    identifies  Slot 2         e A pathname that contains the version number of the image stored in the Boot  PROM  for example     re1 8 10 freboot  exe    identifies the Version 8 10  Boot PROM image freboot exe in Slot 2         Note  The command does not return a Boot PROM version number for slot 1  because slot 1 contains a System Resource Module  SRM   This applies to all  models of router except AN and ASN routers        Determining the Version of the Current Diagnostics PROM Image    To determine the version number of DIAG PROM images residing in a router   start a Telnet session wi
116. OT BIG  riranin aea joertecedsieatiacageegenateniiece 8 33  yalidaing an Executable FWE crisisen iiaia a Een Moreen en erry pene pnc rr ee rererner  8 35  Upgrading and  Ver tying a PROM sssascesssiiecctotssdenetacs ickcderi ai 8 38  Upgrading PROMS Remoto siisii inaa 8 39  Determining Current PROM Image Versions  siiisaeisinisiiinninniinnnei aii 8 39  Determining the Version of the Current Boot PROM Image                sseeeeeee 8 40  Determining the Version of the Current Diagnostics PROM Image                  8 40   Using the prom Command ccciseeadscs isasei chassaacaiess duaigtoeiaamubioueeee en diciebaaliemieaan 8 41  Viewing the Load Addresses and Sizes of Applications             c cccceeeeeeseeeeteeeeeeneeeeees 8 44  Seting Me AGE Backolane NPE scissa einai A ai 8 46  Resetting the Date and Time            PE E ATE A E T ank 8 46  hee e ela oe A E EIEE E A A E E E A 8 48  Enabling and Disabling SecurlD Authentication s sissisisidsiinorsansadnninaiuniiin iiinn andains 8 50  Enabling SecuriD AUTNeniEaNON sssrini ane 8 50    114088 Rev  A ix       Disabling SecurelD Authentication senina a 8 52    Managing SNMP Sepure MOE aiiussidoinnsidann kaeida aiaa aaia 8 52  Setting the Router to Operate in Secure Mode               ccsceceeeeeeeeeeeeeeeeeeeetaeeeeeneeees 8 53  Seting 0e ENYD KOY srira iosian AE NE 8 54  Resetting the Security Counter    a   se E E T ernia    8 54   Customizing Hardware Compression Search Depth assenissisirsnirinissminarniss 8 55  Testing Compress
117. Ox  indicates that the address is in hexadecimal notation        3 12    114088 Rev  A    Using Operating Commands    An IPX address in decimal notation consists of a 4 byte network address and a  6 byte host address  where    e Each byte is a number between 0 and 255  inclusive     e A period separates successive address bytes  for example   0 1 23 47 0 0 0 1 2 55         Note  If you issue an IPX ping to an entity on a Token Ring network  you must  enter the host portion of the IPX address in byte swapped form  noncanonical  form           t lt timeout gt     r lt repeat_count gt   are optional  These parameters are as follows      lt timeout gt  is the number of seconds for each ping to time out  If the system  receives a response to a ping after it has timed out  the system does not send an     alive    message to the console  The default is 5      lt repeat_count gt  is the number of ping messages to send  The system does not  wait for the timeout before sending the next ping  Enter a value between 0 and 10   inclusive   The default is 1     The console displays one of the following messages when you issue a ping  ipx  command   If you enter a value other than 0 in the  lt repeat_count gt  argument  the  system displays one of the following messages for the default ping  plus one for  each additional ping      e Analive message  This message appears if the system receives an IPX reply  packet from the target device within the  lt timeout gt  allowed  A sample  message fo
118. PC to determine which files are corrupt  and  delete those files     File size is wrong shows the number of File Allocation Table  FAT  entries  and directory table entries that do not match     Use a PC to reformat the diskette     Missing EOF shows the number of files in the FAT that are missing an End of  File  EOF  marker        Use a PC to reformat the diskette   Directory errors shows the number of errors in the directory     Refer to the log  Use a PC to reformat the diskette if necessary     Unmounting a Volume    Use the unmount command to make the diskette drive unavailable before you  remove a diskette  reboot the router  or reset Slot 2  When you issue the unmount  command without using a  f argument  the system reports an error if files are in  use at the moment you issue the command        5 6    114088 Rev  A    Managing a DOS File System    To unmount the currently active volume  make sure the diskette drive LED is off   and enter the command as follows     unmount    The system reports an error if a file is in use at the moment you issued the  command  Otherwise  you can assume that the unmount was executed  If the  system reports an error  make sure the diskette drive LED is off and retry until no  error is reported     You can use the  f argument to force an unmount  regardless of whether a file is in  use        Caution  Use the  f argument to force an unmount only in emergencies  File     corruption errors may occur when you force an unmount while DOS is 
119. P_address gt     lt entity_code gt   lt filter_index gt   lt 1l2 3l4l5lel7ia gt     1 3 6 1 4 1 18 3 3 2 15 4 1 16       C 46    114088 Rev  A    Using Syslog Messaging to Monitor Router    For More Information    Refer to the instructions provided in the UNIX man ual  pages on your  workstation for more information on syslog  syslogd  and syslog conf        114088 Rev  A C 47    Symbols     command  3 3    wildcard  5 2    wildcard  5 2    A    aborting a command  3 3    access  levels  manager  8 78 to 8 81  user  8 78 to 8 81  password protection  1 3  via SecurelID  1 3  ACE  backplane  8 46  processor module  4 4  ace out image  4 4  ace out image file  4 9  afn exe image  4 4  afn exe image file  4 9  afnboot exe PROM image file  4 9  alias command  9 2  aliases  creating  9 2  debugging  9 7  debugging network problems with predefined   9 10  definition of  9 1  deleting from memory  9 7  displaying  9 2  file  4 10  in debug al file  9 10 to 9 18    Index    inserting character strings in  9 5  inserting parameters in  9 3  loading from a file  9 9  managing  9 1 to 9 18   saving to a file  9 8    an exe image  4 9  an exe image file  4 4  AN ASN  configuring boot and config file source  8 2 to  8 8  anboot exe PROM image file  4 9  andiag exe PROM image file  4 9  APING  3 24  AppleTalk ping command  3 21 to 3 23  applications  viewing addresses and sizes of  8 44  APPN ping command  3 24 to 3 26  asn exe image  4 9  asn exe image file  4 4  asnboot exe  4 9  asnboot
120. SWS Switched Services   TCP Transport Control Protocol   TFTP Trivial File Transfer Protocol   TIP Terminal Interface Program   TP Transaction Program   VC Virtual Circuit   VINES Virtual Networking System   WAN Wide Area Network   XB Translation Bridge   XNS Xerox Networking Systems       XXiV 114088 Rev  A    About This Guide    Ordering Bay Networks Publications    To purchase additional copies of this document or other Bay Networks  publications  order by part number from the Bay Networks Press    at the  following telephone or fax numbers     e Telephone   U S  Canada 1 888 4BAYPRESS    e Telephone   International 1 510 490 4752  e Fax 1 510 498 2609    You can also use these numbers to request a free catalog of Bay Networks Press  product publications        114088 Rev  A XXV    Technical Support and Online Services    To ensure comprehensive network support to our customers and partners  worldwide  Bay Networks Customer Service has Technical Response Centers  in key locations around the globe     e Billerica  Massachusetts  e Santa Clara  California  e Sydney  Australia   e Tokyo  Japan   e Valbonne  France    The Technical Response Centers are connected via a redundant Frame Relay  Network to a Common Problem Resolution system  enabling them to transmit and  share information  and to provide live  around the clock support 365 days a year     Bay Networks Information Services complement the Bay Networks Service  program portfolio by giving customers and partners access
121. Syslog host table     set wfSyslogHostEntry wfSyslogHostDisable  lt host_ P_address gt    lt 1 2 gt     1 3 6 1 4 1 18 3 3 2 15 2 1 2       114088 Rev  A    C 33    Using Technician Interface Software    Parameter   Attribute Name   Attribute Number   Default    Range    Function     Instructions     Command     MIB Object ID     Parameter   Attribute Name   Attribute Number   Default    Options     Function     Instructions     Command     MIB Object ID     Host UDP Port   wfSyslogHostUDPPort   4   514   514 to 530   Identifies the UDP port of the remote host associated with this host entry     Set  designate  the UDP port at which the remote host associated with this  host entry will receive Syslog  event  messages from the router     set wfSyslogHostEntry wfSyslogHostUDPPort  lt host_IP_address gt    lt 514   530 gt     1 3 6 1 4 1 18 3 3 2 15 2 1 4    Host Log Facility  wfSyslogHostLogFacility  5   184  LOCAL7   128  LOCALO  136  LOCAL 1   144  LOCAL2   152  LOCAL3   160  LOCAL4   168  LOCALS   176  LOCAL6   184  LOCAL7     Specifies the UNIX system facility that receives and dispatches Syslog   event  messages from the router     Set  designate  the facility that you want the remote host to use for  receiving and dispatching Syslog  event  messages from the router   Designate the same facility in the syslog conf file on the remote host   set wfSyslogHostEntry wfSyslogHostLogFacility    lt host_IP_address gt   lt 128   136  144  152  1601 168  176  184 gt   1 3 6 1 4 1 18
122. Then save the configuration with these changes to the configuration file     When you set the wf CSMACDAlignmentMode attribute to 1  ALIGN_ALL   the  router realigns the nonoptimally aligned frames before transmitting them     When you set the wfCSMACDAlignmentMode attribute to 3  DISABLED   the  router transmits the nonoptimally aligned frames without realigning them first           When you set the wfCSMACDAlignmentMode attribute to 2   ALIGN_OVER_128_BYTES   the router realigns the nonoptimally aligned  frames exceeding 128 bytes before transmitting them  and transmits the  nonoptimally aligned frames of 128 bytes or less without realigning them first     Monitoring ip Routes    The ip command allows you to display IP data from any of the following sources   e The main routing table for any slot   e The internal cache for any slot   e The routing cache for a specific logical interface   e The multicast routes cache   e The BGP routes table for any BGP peer   e The OSPF Link State Data Base  LSDB     You choose the source by specifying a  lt subcommand gt  in the command line  You  can also selectively filter the data by specifying one or more option  lt flags gt  in the  command line     Enter the ip command as follows     ip  lt subcommand gt   lt flags gt      lt subcommand gt     lt routes  bgp_routes   cache   ospf_Isdb gt        114088 Rev  A 8 63    Using Technician Interface Software    The subcommands have the following meanings                       If you enter t
123. VGA  aisi a a ASEA 5 6  Changina the Working DUI ONY itis sas canes viasczna pica lea nation sabsated ass tauugisatedd aR i anaia 5 7  Hemana a Drecioiy sareei i A 5 8  ee VS ISRO  srair i NEA enaeneit aed 5 11  Creare a DECI oorr d 5 12  Removing a DISCO sirain i a R AS 5 12  Reramng a Pleat DECOY siaa N 5 13  CORI a PUA aaa tanadacn vark dsdontistuatese nauseam asi cae 5 14   Copying Files fom DOS 16 NVF G niente enniasenieen ads 5 15  Mie     11d ate Gl ell    pereegem erence rer searnett emer ricreeereen corre tel E eur itTreneyrr    5 15   In Band File Transfers                er PEE E E ERT P PEER 5 16    114088 Rev  A vii       Out of Band File WaNSi rs cscs cseccccccssaeccccensasessnessenadacesa vanesvecsasanccsessevnaecuevessaencees 5 18    Chanana Fie NIRE crinis daka n adia une nct btauduss aain tating 5 19  Bie ey ety ira lg he C onena o Oa     aare 5 20  Dee  eh iote bei FIE Wrpeeeer Peeeeeee reper er rereer Peet rret crs tere rrrrerer ct reyrecr N 5 21  Chapter 6  Managing Events  RE RONE A ia ania acct teen OAE T E EE VAA AT E 6 2  Logging and Displaying Event Messages                ccccceececeeeceeeeeeeeseeeeeeeeseeeeeeeeeeeseieetaees 6 2  Appling Write Filters to the Events LOO sicesccssedengcccileeastesiceneraiecdencercesiieasess 6 3  Displaying Actve Write FINETS siuisiad tiirsa nnn NE E 6 5  Applying Read  Display  Filters to the Events Log             cccceceeeeeeeseeeeeeeeeeeneeeeeees 6 6  Saving Me Evene LOO arinina a E R Aa 6 8  Saving ihe Events LOG 
124. _index gt   lt 1   8 gt     The default value of wfSyslogEntFltrDebugMap is 8  mapping router  DEBUG level messages to UNIX system level DEBUG messages        114088 Rev  A C 21    Using Technician Interface Software    Task 7  Adding More Hosts or Entity Filters    You can add more hosts or entity filters to your Syslog configuration  as follows     1  If you have finished adding entity filters for this remote host  and you do  not want to add another remote host at this time  go to Task 8  Otherwise   continue with Step 2     2  If you want to add another entity filter for the same remote host  return  to    Adding an Entity Filter for a Remote Host     Otherwise  continue with  Step 3     3  If you want to add another remote host to receive Syslog messages from  the router  return to    Adding a Remote Host to the Syslog Host Table        Task 8  Saving Your Syslog Configuration on the Router    Save to a file on an NVFS volume the Syslog additions to your configuration  as  follows     save config  lt vol gt   lt filename gt     Task 9  Log Out of the Technician Interface  Enter at the Technician Interface command line interface the following command      logout    For more information on how to close a Technician Interface session with a Bay  Networks router  refer to Chapter 1        C 22 114088 Rev  A    Using Syslog Messaging to Monitor Router    Managing Syslog on a Router    Once you finish configuring Syslog on a router  you may occasionally need to    Disable or r
125. _notice txt on your UNIX workstation or  PC     2  Enter the text of a greeting or notice message that meets your  requirements     Format the message with appropriate spacing and return characters        Note  The router software imposes no limit on the size of the message  in kB    However  the file system volume  Flash card  where the ti_notice txt file  resides must have contiguous free space sufficient to accommodate your  message  Depending on the setup of a user   s console device or Telnet  application  the topmost lines of a long pre login message may scroll out of  view  For this reason  we recommend that you limit the length of your message  to less than 20 lines        3  Save ti_notice txt on your workstation or PC     4  Use TFTP to copy ti_msg txt to the router   s default file system volume     Whenever someone attempts to log in to the router  the message appears on the  router   s local console display or the remote user   s Telnet screen     Customizing the Technician Interface Welcome Message       You can modify or replace the login message Welcome to the  lt router_model gt   Technician Interface according to the needs of your organization or network  site  The Technician Interface software invokes the message from an ASCII text  file named ti_msg  txt        114088 Rev  A    8 59    Using Technician Interface Software    To replace or customize the Welcome message on a particular router     1  Back up or copy ti_msg txt to another filename  such as fi_m
126. a file   By default  the  system writes messages to both the terminal and the file        8 60    114088 Rev  A    System Administration      pause  immediately places the system in pause mode  Use this option with the   fileonly option      lt vol gt  is the slot number containing the volume used to store the file    lt filename gt  is the name of the file used to store the output   You can suspend recording temporarily by using the pause option     You can determine the state of recording by testing the global variable  RECORD_STATE from a script  ON indicates the system is recording  OFF  indicates recording is turned off  and PAUSED indicates that recording is  temporarily suspended  To display the pause state of the record command  enter  the following     record pause   To change the pause state  enter  record pause  on   off    on disables recording    off re enables recording     To close the record file and save it  enter the following command     record close       Note  When you specify a record file on a Flash  NVFS  volume  remember   that only one record file at a time can be open on that volume  If you attempt to  concurrently write other Technician Interface commands to another open  record file on the same volume  those commands will fail           114088 Rev  A 8 61    Using Technician Interface Software    Enabling Internal Clocking Mode    Within test environments and when using the HSSI Crossover Cable  Order No   7832   you may need to configure Bay Netw
127. an Interface   5 2 to 5 22  naming files and directories  5 3    E    echo command  9 5   enable command  1 13   enabling internal clock mode  8 62  encryption key  setting  8 54   End of File marker  5 6    entity filters  for Syslog remote hosts  C 5    events  via Events Manager   clearing  6 14  displaying filters  6 5  displaying log for  6 2  6 13  filtering log input  6 3  filtering log output  6 6  managing  6 2 to 6 14  saving log for  6 8       Index 4    114088 Rev  A    events  via Syslog   See Syslog  exec command  3 7  executable files  4 4  8 34    F    FIFO memory buffer  6 2   File Allocation Table  5 6   file attributes  5 19   File System Check Report  5 5 to 5 6    files  ace out  4 9  afn exe  4 9  afnboot exe  4 9  an exe  4 9  anboot exe  4 9  andiag exe  4 9  asn exe  4 9  asndiag exe  4 9  bn exe  4 9  changing attributes of  5 19  compacting space  4 19  config  4 9  copying  4 11  5 14  from DOS to NVFS  5 15  from NVFS to DOS  4 11  debug al  4 10  default names of  4 9  deleting  4 18  5 21  displaying the contents of  4 17  5 20  freboot exe  4 10  install bat  4 10  names  4 5  renaming  5 13  syslog conf  C 47  ti cfg  4 10  transferring  4 13  5 15  to full memory card  4 20  validating an executable  8 35    Index    filters  events log input  6 3  events log input filters  displaying  6 5  events log output  6 6  Syslog  C 4  Flash System Controller  4 2  Force User Logout parameter  2 17  format command  4 20  Frame Relay  settings  8 6  FR
128. an use the same optional arguments when displaying a log file you  previously saved  as you can to display a current log  refer to the section that  follows for instructions      Another option is to limit the event types you save to a log file  When you display  the log file after saving it  only those event types you saved are displayed  Enter  the following command to limit the event types you save to a log file     save log  lt vol gt   lt log_file gt    d lt date gt     t lt time gt     e lt entity gt     f lt severity gt      s lt s ot_ID gt      Refer to the previous section for a description of the optional arguments        6 8    114088 Rev  A    Managing Events       Note  The save log command does not clear events from memory  Refer to     Clearing Events     later in this chapter        Examples    If you enter  The system saves    save log 2 10_12 log All events to a file named  0_ 2 log in Slot 2    save log 2 10_12 log  d10  Events logged since October 12  1995 to a file   12 95 named  0_12 log in Slot 2    save log 2 temp log Events logged since 9 02 today to a file named    t09 02 00 temp log in Slot 2  If it is earlier than 9 02  the  system saves all events logged since 9 02 yes   terday     save log 3 tftp log  eTFTP Events logged by the TFTP driver to a file  named tftp log in Slot 3     save log 3 snmp log Trace and fault events logged by the SNMP    eSNMP  ftf driver to a file named snmp log and stores the  file in Slot 3    save log 2 slot3 log  s3 Eve
129. and Timeout  2 14  Data Bits  2 9  Delete  2 5  Disable  2 5  Force User Logout  2 17  History Depth  2 17  Lines Per Screen  2 11  Login Retries  2 14  Login Script Search Path  2 15  Login Timeout  2 13  Manager   s Login Script  2 15  Maximum Autosaved Files  2 18       114088 Rev  A    Index 3    Using Technician Interface Software    Modem Enable  2 10   More  2 11   Password Timeout  2 13   Port Name  2 7   Port Number  2 6   Port Parity  2 9   Port Type  2 8   Slot Number  2 7   State  2 6   Stop Bits  2 10   User   s Login Script  2 16  Control Point name  3 24  copy command  4 11  5 14  Customer Service FTP  xxix    customer support  See getting help    D    data bits  setting  2 9   date command  8 46   debug aliases  9 10 to 9 18  debug al file  4 10   default filenames  4 9   default settings  IP interface  8 7  delayed boot  8 14   delete command  4 18  5 21  deleting a console port instance  2 5  diagnostics  running  8 29   diags command  8 9 to 8 10  8 29  dial connection to router  1 1  dinfo command  4 6   dir command  4 7  5 8   directed boot  8 11    Directed Netboot  configuring with bconfig command  8 4    directories  changing  5 7  creating  5 12  displaying  5 8  removing  5 12  renaming  5 13  disable command  1 13  disabling  a console port  2 5  Syslog hosts or filters  C 24  the Syslog entity  C 23  display filters  events log  6 6  DLCMI settings  8 6  DOS  file attributes  5 19  file system  labeling a diskette  5 11  managing using the Technici
130. ansfer Protocol   Feeder Node   Frame Relay   Fast Routing Engine   Gate Access Management Entity  Greenwich Mean Time  High level Data Link Control  High Speed Serial Interface  Internet Control Message Protocol  Internet Group Membership Protocol  Integrated Node   Internet Protocol   Internet Packet Exchange  Integrated Services Digital Network  Local Area Network   Link Access Procedure Balanced  Light Emitting Diode   Logical Link Control   Local Management Interface  Link Node   LAN Network Manager   Link State Packet   Media Access Control  Multichannel T1   Management Information Base  Managed Object Syntax   Native Mode LAN       114088 Rev  A    xxiii    Using Technician Interface Software    NSAP Network Service Access Point  NVFS Non  Volatile File System   OSI Open Systems Interconnection  OSPF Open Shortest Path First   PCMCIA Personal Computer Memory Card International Association  PPP Point to Point Protocol   PPX Parallel Packet Express   PROM Programmable Read Only Memory  QENET Quad Ethernet   RAM Random Access Memory   RARP Reverse Address Resolution Protocol  RIF Routing Information Field   RFC Request for Comment   SAP Service Access Point   SDLC Synchronous Data Link Control  SIMM Single In line Memory Module  SMDS Switched Multimegabit Data Services  SNAP SubNetwork Access Protocol   SNMP Simple Network Management Protocol  SR Source Routing   SRM L System Resources Link Module   STA Statistics  Thresholds  and Alarms  SYSCON System Controller board   
131. aps filtered event messages into Syslog message  format  For example  the following system log message     1  02 07 95 16 03 18 679 INFO SLOT2 FTP Code 5  FTP is initializing     looks as follows in Syslog format           Bia   lt           ENT_CODE 88 5        lt AE gt FTP  SLOT 2 SEVERITY Info ENTITY_CODE E  FTP is initializing                          Figure C 3 shows how Syslog encapsulates a message into a UDP packet        C 8    114088 Rev  A         lt  Facility     Level  gt       IP header     UDP header  UDP Data    Using Syslog Messaging to Monitor Router         Syslog Message              lt priority code gt    Tee ee      Entity    Description  SLOT  Slot Number  SEVERITY  Severity Level   ENTITY_CODE EVENT_CODE   Entity_code Event_code      TSO003A    Figure C 3  Syslog Message Encapsulation    Syslog retrieves the variables shown in brackets       from the router   s system log  message or from the host table  The following paragraphs describe the variables  for    e IP header  e UDP header  e UDP data    e Priority code    IP Header    Syslog adds to any event message that passes all filtering criteria the destination  IP address for a specific remote host        114088 Rev  A    C 9    Using Technician Interface Software    UDP Header    Syslog adds to any event message that passes all filtering criteria the destination  UDP port number on the remote host identified in the IP header     UDP Data    The UDP data field in the Syslog packet contains a reforma
132. archDepth   9   3    0  no compression on this line  to  255  maximum compression on this line     Defines the depth of searching for repetitive patterns in the data you want  to send over a synchronous line  Unless you also configure search depth at  the circuit level independently  using wfWcpCircuitSearchDepth   any  virtual circuit you configure on this line inherits the setting for line search  depth     Compression ratios may improve with settings higher than the default  value of 3  however  throughput may actually decrease for settings higher  than 12 or 13   The compression engine yields higher compression ratios   but takes longer to find token matches for the data being sent over the  line   Bay Networks does not recommend settings higher than 13     Accept the default value or choose a customized search depth value that  provides the best trade off between compression ratio and throughput on  this line     Test end to end throughput and line utilization before and after modifying  the WCP search depth attributes     set wiWcpLineEntry wfWcpLineSearchDepth  lt 0   255 gt   1 3 6 1 4 1 18 3 4 22 1 1 9       114088 Rev  A    8 57    Using Technician Interface Software    Parameter   Attribute Name   Attribute Number   Default    Options     Function     Instructions     Command   MIB Object ID     WCP Circuit Search Depth  wfWepCircuitSearchDepth   7   256    0  no compression on this circuit  to  255  maximum compression on this circuit   or  256  inherit wfWcpLineS
133. ard increases the  contiguous free space           Caution  Back up the files by copying them to a second memory card before  issuing the compact command        Enter the following to erase the memory card contents and rewrite its files  where   lt vol gt  is the slot number of the card     compact  lt vol gt         114088 Rev  A 4 19    Using Technician Interface Software    The following message appears     Compacting file system on volume  lt vol gt       This may take several minutes   Please wait       100  Complete    Compaction completed    The space is compacted when the Technician Interface prompt reappears     Formatting a Memory Card    Use the format command to erase all files on a memory card and format it  where   lt vol gt  is the slot number of the card     format  lt vol gt      Use the format command to format new memory cards if you do not obtain them  from Bay Networks     Enter dinfo to ensure that the file system formatted the card successfully        G    Caution  You cannot recover your files after entering the format command   We recommend that you copy them to a second volume before issuing the  format command        Transferring a File to a Full Memory Card    If you attempt to transfer a file to a memory card that does not have enough space   the name of the file with a length of 0 bytes appears in the memory card   s  directory  Before you transfer another file to the memory card  you should  optimize the available space by completing the followi
134. ark 2 install bat Volume 2 on the router known as    dark        Out of Band File Transfers    Appendix B in this guide describes how to transfer files out of band  via the dial  telephone network   by means of the xmodem command     Displaying the Contents of a File    Use the type command to display the contents of a file  Before displaying a file   enter more on to display the file one screen at a time     Enter the following to display a file   type   x   lt vol gt    lt filename gt      X is an optional argument to display the file in hexadecimal format  This allows  files containing nonprintable information to be viewed      lt vol gt  specifies the slot number of the volume containing the file    lt filename gt  is the name of the file you are displaying     The file is displayed in the same format in which it is stored  provided that you do  not enter the  x argument   binary for log files and ASCII for alias files  Log files  are stored in binary format  use the log command described in    Logging and  Displaying Event Messages    in Chapter 6 to display a log file in ASCII format        114088 Rev  A    4 17    Using Technician Interface Software    Examples     If you enter  The console     type 2 install bat Displays the contents of the install bat file  which is  stored on the volume in Slot 2     type  x 3 config Displays the config file  which is stored on the volume in  Slot 3  This file is displayed in hexadecimal format     Deleting a File    Use the delete 
135. bnet mask of the interface you selected  with the  lt interface gt  setting  Provide this address in dotted  decimal notation    lt next_hop_address gt  Specifies the IP address of the next hop router  Provide this       address in dotted decimal notation  You only need to specify  this address if there are intermediate routers between the  router and the BOOTP server              Configuring an Ethernet Interface for Network Booting    To configure an Ethernet interface for network booting of a router  use the  following command format     ifconfig   s lt s ot_no  gt      d   lt interface gt    lt  P_address gt   lt subnet_mask gt     lt next_hop_address gt       Table 8     3 describes the ifconfig command arguments for configuring the router   s    Ethernet interface              Table 8 3  ifconfig Settings for an Ethernet Interface  Setting Description  Slot setting    s lt slot_no  gt  Specifies the slot containing the interface you want to configure  The slot    corresponds to the ASN slot ID  which can be 1 through 4  If you omit this  argument  ifconfig uses the current slot        Default setting         d    Resets the router s IP interface settings to the default values  Resetting an  Ethernet interface makes it inactive in the network booting process   The output of  the getcfg command shows the default as    None            IP connector setting         lt interface gt           Specifies the type of IP connector you are configuring   For the AN and ANH  use xevr
136. bootstrap PROM matches  the freboot exe file  use the prom  v command     bn exe is the router software image for the BLN  BLN 2  and BCN  an exe is  the router software image for the AN and ANH  afn exe is the router software  image for the AFN  asn exe is the router software image for the ASN  ace out  is the router software image for the FN  LN  CN  and ALN  When the system  boots  it automatically loads the default router software image  unless you  specify another router software image  from another slot into memory on the  processor module or  if another slot is unavailable  from the file system to  memory  To upgrade with a new image  transfer it to the file system and reset  the system  do not use the prom  w command when upgrading with a new  router software image        Note  You cannot edit executable files        The sections that follow describe how to use the readexe  prom  w  and prom  v  commands to validate  upgrade  and verify executable software        8 34    114088 Rev  A    System Administration    Validating an Executable File    You validate executable files before upgrading by using the readexe command   This command calculates file header and image checksums on executable files on  the file system  verifies that the checksums match those within the files  and  displays the results and all file header information     Enter the following command and parameter to validate an executable file on the  active volume   lt  filename gt  is the name of the exe
137. cannot read or  change this file     freboot exe A copy of the bootstrap image resident on the bootstrap PROM  of a BLN  BLN 2  or BCN router  You cannot read or change this  file     install bat A script file that you use during the initial startup     ti cfg A configuration file containing the MIB variables associated with  the default Technician Interface console operating parameters   This file contains the minimal configuration necessary to operate  the router  This file is stored in binary format     The Total size  Available free space  and Contiguous free space fields that appear  below the dir display show the same information as the Total Size  Free Space   and Contig Free Space in the dinfo display  Refer to the earlier section     Displaying the Status of All Memory Cards    for a description of these fields     Changing the Active Volume    Use the cd command to change the active volume  as follows   cd  lt vol gt      lt vol gt  is the slot number of the volume    The system displays the new active volume     If you enter the cd command without specifying a volume  the system displays the  present working directory  as follows     cd    Present Working Directory  2        4 10    114088 Rev  A    Managing a NonVolatile File System    Copying a File    Use the copy command to make a copy of a file  You can use the wildcard  characters   and   when issuing the copy command to copy multiple files              Caution  The system automatically overwrites any file al
138. cation of Abstract Syntax Notation One  ISO 8824        114088 Rev  A    A 7    Using Technician Interface Software    Also  the latest editions of the following textbooks provide information about    these standards     e Comer  Douglas E  Internetworking with TCP IP  Vol  1  Englewood Cliffs   New Jersey  Prentice Hall     e Rose  Marshall T  The Simple Book  Englewood Cliffs  New Jersey  Prentice     Hall     e Stevens  Richard W  TCP IP Illustrated  Vol  1  Reading  Massachusetts   Addison Wesley     Implementation Notes    The following notes list the assumptions made about MIB II object definitions   supported traps  unsupported objects  and unsupported operations     MIB II Object Definitions    The assumptions about MIB II object definitions are as follows     ifNumber    ifIndex    Represents the total number of rows in the interface table     Represents a unique integer corresponding to a data link layer  entity  ifIndex values are derived from Bay Networks circuit  numbers  A single interface or a group of interfaces  multiline   can be a member of a single circuit  With a single interface  a  single ifIndex value matching the circuit number is allocated  and the ifTable statistics correspond to the single interface  With  a group of interfaces  a single ifIndex value is still allocated   however the ifTable statistics are aggregated for all interfaces in  the circuit group     Four statistics require special consideration when using  multiline  ifAdminStatus  ifOp
139. ch PVC an update message  packet with the A bit set to   inactive         To initiate graceful shutdown followed by a system or slot restart  enter the  appropriate command at the Technician Interface prompt     The system performs  If you enter  a graceful shutdown  and restarts    restart  shutdown All slots  restart  shutdown   lt s ot_no  gt   One slot  restart  shutdown   lt s ot_no  gt   lt s ot_no  gt   A range of slots  restart  shutdown   lt s ot_no  gt   lt slot_no  gt        5  A list of slots    The console displays the following message during shutdown   Shutdown in progress    If shutdown succeeds  the console displays the message   Shutdown is complete    Upon issuing this message  the system performs a restart operation   If shutdown fails  the console displays the message   Continue shutdown   Y N     If you choose    N     no  at this time  the system terminates shutdown and displays  the following message on the console device     Shutdown aborted     Upon issuing this message  the system performs a restart operation        114088 Rev  A    8 23    Using Technician Interface Software    If you choose instead to    Continue            Y         the system continues the shutdown  attempt  We recommend that you terminate this procedure after no more than one  additional shutdown attempt     Resetting a System or Slot    The reset command allows you to reboot one or more slots with a new router  software image  You reset one or more slots by entering the slot n
140. ch file versions of scripts in  an identical manner  using the script commands described in Using Technician  Interface Scripts  The embedded scripts run more efficiently than scripts based on  loadable batch files        114088 Rev  A    Using Technician Interface Software    The router software currently includes embedded scripts for the following router  software entities     e CSMACD e TCP   e IP     TFTP   e IPX e SNMP   e FR e SYNC       FTP e  TELNET    You can also use menus  described in Using Technician Interface Scripts  as an  alternative way of accessing the full set of scripts        114088 Rev  A    Chapter 2  Configuring the Console Port    To configure a router   s console port parameters using the Technician Interface   you have to change the default parameter settings associated with the console port  on the back of the router  You can change the default parameter settings for the  console port associated with the following boards     e System Resources Link Module  SRM L  board found in the BLN  BLN 2   and BCN routers    e System Input Output  SYS I O  board found in the FN    LN  CN  and ALN  routers    e Motherboard found in the AFN oe AN  and ASN routers    The autoscript feature allows you to automatically execute certain Technician  Interface commands when you log in as either a Manager or User        Note  You can use the console port to connect either a console or modem to  the router           114088 Rev  A 2 1    Using Technician Interface Softwa
141. cian Interface commands to configure a console    port parameter     set wfSerialPort Entry   lt attribute_name gt   lt port_no  gt   lt option gt     set wfSerialPort Entry  lt attribute_no  gt   lt port_no  gt   lt option gt     set    wfSerialPortEntry     lt attribute_name gt      lt attribute_no  gt      lt port_no  gt      lt option gt     Example     Refers to the Technician Interface set command  You  must have Manager access to issue a set command     Refers to the MIB attribute name associated with all  serial port parameters     Is the MIB attribute name associated with one of the  serial port parameters     Is the MIB attribute number associated with one of  the serial port parameters     Is the number of the serial port you are configuring     Is the new setting taken from the Options or Range  list     The following commands set the Parity parameter to Odd     set wfSerialPortEntry wfSerialPortParity 1 2    or    set wfSerialPortEntry 10 1 2       Note  You can use s instead of set           114088 Rev  A    2 3    Using Technician Interface Software    Using the commit Command    Enter the following command after issuing one or more set commands     commit    The commit command causes the changes you made to the configuration to take  effect in active memory  but not in Flash memory  You must use the save  command subsequently to save changes to a configuration file  config  and Flash  volume on the router     The Technician Interface software service resets wh
142. cify a filter for an individual message by setting the upper and lower  boundaries of the event number range equal to the same message number     If you configure an event number range of 0 to 255  Syslog ignores the range as a  filtering parameter and checks instead to see if a Message Severity Mask exists  for the same entity filter     Filtering by Event Severity Level    Each event message generated by the router software has a unique severity level    To determine the severity level of any router event message  refer to the guide  Event Messages for Routers and BNX Platforms      As an alternative to specifying event numbers as filtering criteria  you can specify  in an entity filter one or more event message severity levels  that is  you define a  severity mask for the filter         Note  Syslog checks the message severity mask only when you accept the  default event message number range of 0 to 255 for the same filter  This causes  Syslog to ignore event numbers as criteria for selecting and forwarding  messages to a remote host        Syslog uses the severity levels as criteria for selecting and forwarding only the  types of messages you want a remote host to receive     An entity filter passes only messages that have a severity level equal to any you  specified in the message severity mask  You define severity levels by setting a  value for the wfSyslogEntFltrSevMask filter attribute in the router   s active MIB     For example  if an entity filter for FTP has a Mes
143. cility defaults to a value of 184   Local7            C 26    114088 Rev  A    Using Syslog Messaging to Monitor Router    4  Create a wildcard filter to forward events of type fault  warning  and  debug  and on Slots 2 3 4 5     a     Create the filter as follows        set wfSyslogEntFlitrEntry wfSyslogEntFltrDelete    lt Host_IP_Address gt  255 1 1 commit     lt Host_IP_Address gt  is the address of the remote host associated with this  filter     255 is the wildcard entity number    1 represents the index number of the filter    commit commits router system resources to the filter you are creating   Define the wildcard setting for filtering by event numbers     The setting causes Syslog to ignore event numbers as a filtering criteria   and to use instead message severity levels as a filtering criteria        set wfSyslogEniFlitrEntry wfSyslogEntFltr_ogEvtLowBnd   192 32 6 14 255 1 0       set wfSyslogEniFlitrEntry wfSyslogEntFltr_ogEvtUppBnd   192 32 6 14 255 1 255    Define a set of message severity levels  a    severity mask        that causes  Syslog to select and forward only messages that have a severity level  of fault  warning  or debug        set wfSyslogEntFlitrEntry wfSyslogEntFltrSevMask   192 32 6 14 255 1  fwd     The next two commands define the range of Slots 2 to 4  inclusive  as an  additional filtering criterion  The commands cause Syslog to select only  messages logged on Slots 2 to 5        set wfSyslogEniFitrEntry wfSyslogEntFltrSlotLowBnd   192 32 6 
144. command to delete files that you specify  You can use the wildcard  characters   and   when issuing the delete command              Caution  You cannot recover a file after it is deleted  The delete command  does not prompt you to verify a deletion        Enter the following to delete a file on the active volume     delete  lt filename gt    Enter the following to delete a file on a different volume   delete  lt vol gt    lt filename gt     lt vol gt  is the slot number of the volume containing the file    lt filename gt  is the name of the file     You can enter del or delete when deleting a file        4 18    114088 Rev  A    Managing a NonVolatile File System    Examples     If you enter  The system     delete alt cfg Deletes the alt cfg file on the active volume     delete Deletes the  6_22 log file on Volume 2   2 16_22 log  delete 3   log Deletes all files with the log filename extension on  Volume 3   delete Deletes all files with a three character filename and a log file   4 222 log name extension on Volume 4     Compacting File Space    When you delete a file from a memory card  the file and its data become  inaccessible and eventually occupy all remaining storage space on that card  Use  the compact command to    e Copy active files to memory   e Erase the card   s contents   e Copy the active files back to the memory card   If responses to the dir or dinfo commands reveal more free space than contiguous    free space on a memory card  compacting the space on the c
145. curlD Authentication    This section describes how to enable or disable SecureID services from a  Technician Interface session        Note  You enable disable SecureID services only from a router console  an  ASCII terminal or terminal emulator connected directly to the router console  port   You cannot enable disable SecureID services through a Technician  Interface session supported by means of Telnet connection to the router        To enable or disable SecureID services  you answer questions from the  securelogin configuration utility running on the router  Press Return after each  entry  If you press Return without entering a response to a question  securelogin  repeats the last question     Enabling SecurlD Authentication    Once you log in to the Technician Interface and the   prompt appears on the  console display  proceed as follows to enable SecureID authentication services on  the router     1  Enter the following at the Technician Interface prompt      securelogin    2  Respond to each question that appears on your console display    The sequence shows responses as bold text within brackets    Do you wish telnet login to require SecurID   yes no   yes     What is the IP address of the router being secured   a b c d     lt IP_Address gt         What is the IP address of the SecurID server   a b c d     lt IP_Address gt      What is the TCP port number for SecurID services   default 755     lt TCP_Port_Number gt         You have designated  lt IP_Decimal_Address gt  
146. cutable file     readexe  lt filename gt     Enter the following command and parameters to validate an executable file on  another volume     readexe  lt vol gt   lt filename gt    lt vol gt  is the volume storing the file    lt filename gt  is the name of the executable file     Figure 8 3 shows a sample system response to the readexe command        114088 Rev  A    8 35    Using Technician Interface Software         readexe 5 bn exe  Processing contents of  5 bn exe        Validating header checksum    OK  Validating image checksum    OK    Program execution address space     Load Address  0x30300000 Size  767449 Bytes Entry point     PROM storage address space     PROM Load address  0x00000000    Input file information              Workspace  int 8 10 40   Compression  ON   Revision  8 10   Last Modifed  Friday December 30 18 44 14 1994  File type  Executable file    use name  Oasys Linker    Platform Key   0101000B  BB M68000 MotherBoard  FRE FRE2 FRE2_60        P       Figure 8 3  Sample Response to readexe Command    The system response to the readexe command contains the following    information     e Validating header checksum  The system calculates a checksum on the file   s  header and compares the checksum to the data in the checksum field of the  file   s header  The system reports that the header checksum is OK if it matches    or BAD if it does not match     e Validating image checksum  The system calculates a checksum on the file   s  image data and compares th
147. d  15 25 48  mfg log 172052 11 03 94 Thurs  16 24 28  config Tse    WAPI oA Etis 15242  01  bn exe 2635353 01 05 95 Thurs  09 08 55    4194304 bytes   Total size  1356883 bytes   Available free space  1356883 bytes   Contiguous free space         a P    Figure 4 2  Sample NVFS Directory Listing             Examples     If you enter  The console     dir Displays the list of files on the active volume    dir   cfg Displays the list of files with a  cfg extension on the active vol   ume    dir 3  Displays the list of files on Volume 3     dir 4     log Displays the list of files with a three character filename and a   log extension on Volume 4        4 8    114088 Rev  A    Managing a NonVolatile File System    The factory default filenames are as follows     ace out    ajn exe  an exe  asn exe  bn exe    afnboot exe    anboot exe    andiag exe    asnboot exe    asndiag exe    config    The router software image for the FN  LN  CN  and ALN     You cannot read or change this file  The system automatically  refers to this binary file for booting instructions unless you use  the boot command to specify a different router software image     The router software image for the AFN    The router software image for the AN and ANH    The router software image for the ASN    The router software image for the BLN  BLN 2  and BCN     You cannot read or change this file  The system automatically  refers to this binary file for booting instructions unless you use  the boot command to specify a
148. d  external to the workstation  For example  Syslogd on a UNIX workstation  concurrently handles messages received from applications running on the  workstation  as well as messages received from Bay Networks routers running in a  network accessible to the workstation     Figure C 1 illustrates the following Syslog and Syslogd functionality     Syslog running on each slot    Polls the local events log buffer to retrieve new event messages     Selects from the local events log messages that meet the requirements of  entity filters you configure on the router     Maps into Syslog message format any messages retrieved from the local  events log     Inserts a priority code into each reformatted message     Time sequences messages if you first enabled the message sequencing  feature     Forwards messages to IP on the router  which in turn forwards messages to  remote hosts identified in the Syslog host table     At a remote UNIX management workstation  Syslogd    Receives Syslog messages from Bay Networks routers   Examines the priority code in each message     Uses the priority code to determine appropriate system handling for each  message     Based on the priority code in each message  Syslog dispatches each message  to any or all of the following destinations        Workstation display     A local log file     A designated printer       One or more remote hosts       C 2    114088 Rev  A    Router    e Retrieves  event messages    e Filters retrieved  Messages    e Maps retrie
149. d forward to a specific remote host  enter the following        set wfSyslogEntFlitrEntry wfSyslogEntFltrSevMask    lt host_IP_address gt   lt entity_code gt   lt filter_index gt      lt fwitd gt           commit  To also define by slot number s  the event messages you want Syslog  to select and forward to a specific remote host  enter the following        set wfSyslogEntFlitrEntry wfSyslogEntFltrSlotLowBnd    lt host_IP_address gt   lt entity_code gt   lt filter_index gt   lt 0   14 gt        set wfSyslogEntFlitrEntry wfSyslogEntFltrSlotLowUpp    lt host_IP_address gt   lt entity_code gt   lt filter_index gt   lt 0   14 gt        commit       Note  Although the valid range for the slot lower and upper boundaries is 0 to  14  specify only values within the range of actual slot numbers for the model  of router you are configuring  Otherwise  the filter will not transition to an  active state        3  Define how router event message severity levels and UNIX system error  levels map to one another     In most cases  you accept the default mapping and go to Task 7  Otherwise   continue with the following instructions to customize the message mapping     Enter at the Technician Interface prompt the command line s  appropriate for  the message mapping s  you want to change     a     Change router FAULT message mapping  as follows        set wiSyslogEniFlitrEntry wfSyslogEntFltrFaultMap    lt host_IP_address gt   lt entity_code gt   lt filter_index gt   lt 1   8 gt     The default 
150. d to the DOS events in the log to determine the  cause  The most common cause of file corruption is that DOS was interrupted  while writing to the diskette and was unable to complete its operation  This can  occur when the power resets  the router reboots  or Slot 2 is reset  You can avoid  corrupting files when performing these tasks by first entering the unmount  command  described next   and making sure the system does not respond with an  error message indicating that a file is in use        114088 Rev  A    5 5    Using Technician Interface Software    The File System Check Report entries are as follows     Allocated but unused clusters shows the number of reserved sectors not  allocated to files     The router may in some cases be able to recover from this error when  mounting the volume  The Technician Interface displays a message indicating  success or failure after a recovery attempt  Enter the unmount a  and mount  a  commands to determine whether DOS fixes the error  If the file system  comes up clean  the error is fixed  If an error is detected again  use the check  disk  chkdsk  command with the fix   F  switch on a PC to free the allocated  but unused sectors     Used but unallocated clusters shows the number of unreserved sectors  allocated to files  The directory is corrupt     Use a PC to reformat the diskette     Cluster chains shared between files shows the number of sector chains  that are allocated to more than one file        Use the chkdsk command on a 
151. d value for this attribute     Entity Filters    Each protocol and system service in the router software has a unique entity  number   For a complete list of entity numbers  refer to the guide Event Messages  for Routers and BNX Platforms   The router software uses an entity number plus  the IP address of a specific remote host to identify each entity filter you configure  on the router     For example  if you configure a filter that selects only messages logged by entity  number 2  IP  on a router  Syslog forwards those messages only to the host IP  address associated with that filter     You must also assign a filter index number  wfSyslogEntFltrIndex  to each filter  you configure for the same entity and remote host pair  Assign a value of 1 to the  first filter you configure for a specific entity and remote host pair  To each  subsequent filter that you configure for the same entity and remote host pair   assign an index number  increased by  1        114088 Rev  A    C 5    Using Technician Interface Software       Note  Although you assign each filter an index number manually through the  Technician Interface  Site Manager automatically assigns an index number to  each new filter you add to the configuration        When you want Syslog to select and forward from all entities event messages that  satisfy severity and slot criteria that you specify  configure a filter for the wildcard  entity number  255         Note  The wildcard filter is active for a host  only if ther
152. describes parameters you can configure for each host you add to the  Syslog host table  list of remote UNIX hosts      Parameter   Attribute Name   Attribute Number   Default    Options     Function     Instructions     Command     Parameter   Attribute Name   Attribute Number   Default    Options     Function     Instructions     Command     MIB Object ID     Host Delete  wfSyslogHostDelete  1   1  Create    1  Create    2  Delete     Adds or deletes a remote host entry in the Syslog host table  Parameters  associated with this entry collectively define a remote host that will  receive Syslog  event  messages from the router     Set to 1 to add a host to the Syslog host table  Set to 2 to delete a host  from the Syslog host table     set wfSyslogHostEntry wfSyslogHostDelete  lt host_ P_address gt    lt 1 2 gt     Messaging Enable  wfSyslogHostDisable  2   1  Enable    1  Enable    2  Disable     Enables or disables message forwarding from Syslog to the remote host  associated with this host entry     Set to 1 to enable message forwarding from Syslog to the remote host  associated with this host entry  Set to 2 to disable message forwarding  from Syslog to the remote host associated with this host entry     You can also stop forwarding router events to the host by deleting the  host   Refer to the Host Delete parameter  wfSyslogHostDelete   If you  delete a remote host and later decide you want to forward router events to  that host  you must add the remote host again to the 
153. dure before acquiring access  to the router   s Technician Interface     Managing SNMP Secure Mode    Bay Networks implements an optional security mechanism for all SNMP set  requests  This proprietary mechanism is an interim solution to solve some of  SNMP   s security problems until a stable  widely accepted industry standard  security solution is available     Our security system uses counters to synchronize management operations  between manager and agent  In secure mode  when Site Manager sends a set  request to the router  the request includes the encrypted value of a counter plus 1  as the first variable binding in the PDU        8 52    114088 Rev  A    System Administration    When the agent on the router receives the set request  it compares the decrypted  value with the value of its own counter plus 1  If the two values match  the agent  considers the set request to be authentic and increments the counter by 2  The  agent stores the new value of the counter in an encrypted form in the MIB and  sends it back to Site Manager as the first variable binding in the response     The manager receiving the response validates that the received counter matches  the manager   s counter plus 2  If the two values match  the response is declared  authentic     The use of counters guards against masquerade security violations because an  intruder would have to know the encryption key and the correct counter to send as  the first variable binding  The security mechanism also guards
154. e     The following sections describe each use of the ifconfig command     Configuring the Initial IP Synchronous Interface    To Netboot the router  you must first configure the router   s initial IP synchronous  interface to the network  using the following interface configuration command     ifconfig   s lt s ot_no  gt     lt synchronous_options gt   lt interface gt    lt  P_address gt    lt subnet_mask gt    lt next_hop_address gt        lt synchronous_options gt  indicates some combination of the following settings       d  fr   annexd    Imi    annexa      int_clk        Note  You must insert a space to separate each command option from the next        You can use the same command format to configure other synchronous interfaces  on the router for network booting     Table 8 2 describes the ifconfig command arguments for configuring a router   s  synchronous interface        114088 Rev  A    8 5    Using Technician Interface Software             Table 8 2  ifconfig Command Settings   Setting Description   Slot setting     s lt slot_no  gt  Specifies the slot containing the interface you want to    configure  The slot corresponds to the ASN slot ID  which can  be 1 through 4  If you omit this argument  ifconfig uses the  current slot        Default setting         d    Resets the router s IP interface settings to the default values   This setting tries four WAN configurations in the following  order until it finds the correct type for the router   s connection  to the ne
155. e    Overview    This section examines the structure of the Bay Networks router MIB  The object  tree assigned to the Bay Networks router MIB is as follows     iso org dod internet private enterprises  wellfleet    The corresponding numeric identifier assigned to the Bay Networks router MIB  subtree is as follows     1 3 6 1 4 1 18    Figure A 1 shows an example of the hierarchy of objects  The prefix that precedes  each object name identifies a Bay Networks enterprise specific object     The wfSwSeries7  wellfleet 3  object names and identifies the Bay Networks  router MIB for the Series 7 and later software  The nodes in the first level below  wfSwsSeries7 are as follows     e wfHardwareConfig  wfSwSeries7 1  contains the objects that pertain to the  hardware configuration     e wfSoftwareConfig  wfSwSeries7 2  contains the objects that pertain to  software that is loaded  such as protocols and drivers  and information  required for loading  such as where in memory a driver gets loaded     e wfSystem  wfSwSeries7 3  contains the objects that pertain to the system  record  console  remote console  and the circuit name table     e wfLine  wfSwSeries7 4  contains the objects that determine the functioning  of the drivers that control the data link layer media     e wfApplication  wfSwSeries7 5  contains the protocol applications        A 2 114088 Rev  A    Using the Bay Networks Router MIB    wellfleet  enterprises  18   wfSwSeries7  wellfleet 3   wfHardwareConfig  wfSwSeries7
156. e   2  LSID   the IP interface address of the network s  Designated Router   If LS Type   3  LSID   the destination network s IP address    If LS Type   4  LSID   the Router ID of the AS boundary router   If LS Type   5   LSID   the destination network s IP address     A discretionary attribute used by a BGP speaker to inform other  BGP speakers in its own autonomous system of the originating  speaker s degree of preference for an advertised route     Indicates the type of OSPF Link State advertisement  as follows   0   stub advertisement   1   router links advertisement   2   network links advertisement   3   summary link  IP network  advertisement   4   summary link  ASBR  advertisement   5   external link advertisement   Refer to RFC 1583 for more information on LS Type        114088 Rev  A    8 71    Using Technician Interface Software    Mask Subnet mask to be combined with the destination address and then  compared with the value in Destination  If the value of Destination  is 0 0 0 0  a default route   then the mask is 0 0 0 0  Prefix   0      Metric Indicates the costs of the various interfaces described in a router LS  Type advertisement  Also indicates the cost of each path described  in summary link and AS external link advertisements     Network Destination IP address for this route  where 0 0 0 0 indicates a  default route     NextHopAddr   AS IP address of the next hop and next Autonomous System of this  route  If the next hop is an unnumbered interface  the com
157. e   Attribute Number   Default    Options   Function     Instructions     Command     MIB Object ID     Entity Filter Delete  wfSyslogEntFltrDelete  1   1  Create    1  Create    2  Delete     Creates or deletes an entity filter for the remote host at the location  defined by wfSyslogEntFltrHostIndex for this filter table entry     Set to 1 to create an entity filter for the remote host at the IP address  defined by wfSyslogEntFltrHostIndex for this filter table entry  Set to 2 to  delete this entity filter     set wfSyslogEntFltrEntry wfSyslogEntFltrDelete    lt host_IP_address gt   lt entity_code gt   lt filter_index gt   lt 1  2 gt     1 3 6 1 4 1 18 3 3 2 15 3 1 1    Entity Filter Enable   wfSyslogEntFltrDisable   2    1  Enable    1  Enable    2  Disable   Enables or disables the entity filter associated with this filter table entry   Set to 1 to enable the entity filter associated with this filter table entry   Set to 2 to disable the entity filter associated with this filter table entry     set wfSyslogHostEntry wfSyslogEntFltrDisable  lt host_ P_address gt     lt entity_code gt   lt filter_index gt   lt 1  2 gt     1 3 6 1 4 1 18 3 3 2 15 3 1 2       114088 Rev  A    C 37    Using Technician Interface Software    Parameter  Filter Operational State  Attribute Name    wfSyslogEntFltrOperState  Attribute Number  6  Default  2  inactive filter   Options  1  active filter    2  inactive filter     Function  Indicates the actual status of the filter  When the status is ACT
158. e  1   Up  2   Down  3   Init  4   Invalid  5   NotPresent  bgpconnstate Displays the BGP FSM state of all configured BGP  connections  Valid values are  1   Idle  2   Connect  3   Active  4   OpenSent  5   OpenConfirm  6   Established  bgp3origin Displays the ORIGIN attribute of each network  advertisement received via BGP 3  Valid values are  1 IGP  2  EGP  3   Incomplete  bgp3aspath Displays the AS_ PATH attribute of each network  advertisement received via BGP 3   bgp3nexthop Displays the NEXT_HOP attribute of each network          advertisement received via BGP 3              114088 Rev  A    Using Technician Interface Software          Table 9 1  Aliases for Debugging Network Problems  continued   If you enter  The system   bgp3metric Displays the INTER_AS_METRIC attribute of each    network advertisement received via BGP 3              cctnames Displays all circuit names   ccttypes Displays all circuits and their types  The types are as  follows   10   CSMACD  20   SYNC  30  T1  40  E1  50   Token  60   FDDI  decadjs Displays all DECnet adjacent nodes and their    respective adjacency table indexes  The following  example shows one line in the display  where 6145 is  the index  2 is the area  and 3 is the node        wfivAdjEntry wfivAdjNodeAddr 6145    2 3        decadj  lt index gt     Displays DECnet adjacency information about the index  you enter  You can obtain the  lt index gt  by using the  decadjs alias        decarts    Displays all known DECnet areas and the
159. e  C 33  Operational State  C 31  Severity Mask  C 41  Slot Lower Bound  C 42  Slot Upper Bound  C 43  Trace Map  C 46  Warning Map  C 45  remote host address  C 9  Remote Host Parameters  C 33    syslog conf file  on UNIX workstation   C 13    system command  1 13    T    Technician Interface  accessing via ASCII terminal  1 2  accessing via Telnet connection  1 2  establishing multiple sessions  2 2  initializing  1 3  logging out  1 12  Site Manager  differences between  1 2  telnet  command  3 7  connection to router  1 1       114088 Rev  A    Index 9    Using Technician Interface Software    Terminal Interface Program  tip   B 10  TFTP  4 14  4 15  5 16   tftp command  4 14  5 16   ti cfg file  2 19  4 10   time  setting the  8 46    timeout  command entry  2 14  login  1 11  password  1 11  2 13  Secure ID  1 11    tip command  B 10  Transaction Program  3 24    type command  4 17  5 20    U    unalias command  9 7  underflow errors  QENET  8 62  unmount command  5 6    user session  command access levels  8 78 to 8 81  starting manager session from within  1 13  terminating  1 12   User   s Login Script parameter  2 16    user   s login script  setting  2 16    V    verbose command  for debugging aliases   9 7  verbose option  ping command   3 8  3 11  VINES ping command  3 18 to 3 20   VME routers  4 2  8 46    volume  changing the active  4 10  displaying directory on  4 7  displaying the active  4 10  mounting  5 4  unmounting  5 6    W    Welcome screen  customizi
160. e Manager access password only when you are logged  in as Manager     Note  Passwords  as well as Technician Interface commands and filenames   are case sensitive           8 48    114088 Rev  A    System Administration    Proceed as follows to assign a password     1     Enter the following to display or assign a password   password  Manager  User   The console displays one of the following messages     Changing password for User    Changing password for Manager    Proceed to Step 3 if you are logged in as Manager and you are changing  the User password  Otherwise  enter the old password at the following  prompt     Old password    If there is no old password  press the return key   Enter the new password after the following prompt   New Password     The password may have 0 to 16 alphanumeric characters  If you want to  remove password protection  press the return key     Repeat Step 3 after the following prompt   Retype new password  The console displays one of the following messages     User password changed    Manager password changed   If you enter the wrong password  the console displays the following message   User password not changed   The   prompt reappears     If you do not reply to password prompts within about 30 seconds  the system  cancels the password command and displays the following messages        Input timed out        Command aborted    The   prompt reappears        114088 Rev  A    8 49    Using Technician Interface Software    Enabling and Disabling Se
161. e are no other entity  filters active for that host  If you configure and activate a filter for any entity  number other than 255  that filter takes precedence over the wildcard filter  The  wildcard filter transitions to the inactive state  The setting of the attribute  wifSyslogEntFltrOperState indicates the current operational state of any filter  instance you configure for a given host   If wfSyslogEntFltrOperState   1  the  filter is active  if wfSyslogEntFltrOperState   2  the filter is inactive         Filtering by Event Number    Each event message generated by the router software has a unique message  number   For a complete list of event message numbers  refer to the guide Event  Messages for Routers and BNX Platforms      You can use event message numbers to specify an entity filter that selects only the  types of messages you want a remote host to receive     You define a range of event message numbers for a router software entity by  specifying    e An upper boundary number  MIB object wfSyslogFltrLogEvtUppBnd   e A lower boundary number  MIB object wfSyslogFltrLogEvtLowBnd     Syslog considers the upper and lower boundary values as part of the range     For example  an entity filter for FTP has an Event Number Range with a lower  boundary of 5 and an upper boundary of 27  With this filter  Syslog forwards to a  remote host FTP log messages with event numbers 5 to 27  inclusive        C 6    114088 Rev  A    Using Syslog Messaging to Monitor Router    You can spe
162. e checksum to the data in the checksum field of  the image  The system reports that the image checksum is OK if it matches or    BAD if it does not match        8 36    114088 Rev  A    System Administration    e Program execution address space provides information about where the file  is located in memory        Load Address indicates the memory location        Size indicates the size of the file           Entry point indicates the location in memory of the first software  instruction when the file is loaded into memory  This field is 0 if the file is  compressed     e PROM storage address space Indicates the location in the PROM for the  frediag exe and freboot exe software  This field is 0 if the file is not stored in a  PROM     e Input file information contains the following information about the file      Platform Key indicates the platform that the file is intended to run on        Workspace indicates the software release and software integration  numbers        Compression indicates whether the file is compressed  The executable files  are normally compressed        Revision indicates the software release      Last Modified indicates day  date  and time of the software release      File type indicates that the file is executable        Tool name is for Bay Networks use only        114088 Rev  A 8 37    Using Technician Interface Software    Examples     If you enter  The system     readexe frediag exe Calculates file header and image checksums on the  frediag exe fil
163. e enable the entire Syslog entity on the router   Refer in this  section to    Disabling or Re enabling Syslog on the Router            Disable or re enable a Syslog host or filter on the router   Refer in this section  to    Disabling or Re enabling Syslog Hosts or Filters             Delete remote hosts or entity filters from the current Syslog configuration      Refer in this section to    Deleting Remote Hosts or Entity Filters from the  Syslog Configuration            Delete Syslog from the router   Refer in this section to    Deleting Syslog from       the Router            Disabling or Re enabling Syslog on the Router    You can  if necessary  disable the Syslog service anytime after enabling it on a  router  Enter the following command line to disable Syslog        set wfSyslog wfSyslogDisable 0 2 commit    Disabling Syslog on the router    Transitions all Syslog hosts and their filters to an INACTIVE operational state  in the router configuration    Halts all message forwarding from Syslog to any Syslog hosts configured on  the router    You can also re enable Syslog after disabling it on a router  Enter the following  command line to re enable Syslog        set wfSyslog wfSyslogDisable 0 1 commit    Re enabling Syslog on the router    Transitions Syslog hosts and their filters to an ACTIVE operational state in  the router configuration   Only n Syslog host entries transition to the ACTIVE  state  where n   the value of wfSyslogMaxHosts      Resumes all message forwa
164. e following commands to initiate a file transfer from the Technician  Interface     tftp get  lt host_address gt   lt remote_vol gt   lt remote_file gt     lt local_vol gt      lt local_file gt    tftp put  lt host_address gt   lt remote_vol gt   lt remote_file gt    lt local_vol gt     lt local_file gt      get means you are transferring the file to the local Bay Networks router and put  means you are transferring the file to the remote node      lt host_address gt  is the address of the host for transfers      lt remote_vol gt  is the volume number containing the volume to which you want to  transfer the file      lt remote_file gt  is the name to which you want to transfer the file  If you do not  enter a destination name  the system defaults to the  lt  ocal file gt  you specified for  the source file      lt local_vol gt  is the volume number containing the volume in the local Bay  Networks router      lt local_file gt  is the name of the file used on the local router        114088 Rev  A    4 15    Using Technician Interface Software       Caution  The local system erases the file if you enter its address in the   lt host_address gt  field of the tftp command        The system executes one TFTP request at a time for the duration of the file  transfer  The destination system stores the file under the name you specify  If you  do not enter a destination name  the system defaults to the source filename     Examples    If you enter  on one line   The local system    tftp pu
165. e located on the active volume  verifies  that the header and image checksums match those  within the file  and displays the results and all file  header information     readexe 3 freboot exe Calculates file header and image checksums on the  freboot exe file located on Volume 3  verifies that the  header and image checksums match those within the  file  and displays the results and all file header infor   mation     Upgrading and Verifying a PROM    You use the prom command to upgrade or verify the software on a diagnostics or  bootstrap PROM in a Bay Networks router or BNX platform  Only users who  login as    Manager    can access the prom command              Caution  If a software release includes a PROM software upgrade  see the  upgrade documentation shipped with the software for instructions on upgrading  the PROMs on your router  The instructions describe    How to determine the models of router that need a PROM update   How to determine whether you must upgrade the PROM s  in a specific  model of router by using the Technician Interface prom command  or by  physically replacing the existing PROM device with a new PROM device  How the PROM upgrade process works   How to determine the current versions of PROM images residing in a router  What you need to know about upgrading PROMs in a remote router   How to specify the commands necessary to upgrade and verify a PROM    If you do not follow these instructions  you may disable the router you are  trying to upgrade     
166. e on an NVFS volume the Syslog additions to your configuration     9  Log out of the Technician Interface session     The paragraphs following in this section describe the Syslog configuration  sequence in greater detail  to the task and step level         114088 Rev  A    Using Technician Interface Software    Following the configuration procedure  this appendix provides an example of  Syslog configuration  plus definitions of Syslog attributes you use during  configuration     Task 1  Logging In to the Router   s Technician Interface    For information on how to open a Technician Interface session with a Bay  Networks router  refer to Chapter 1     Task 2  Defining a Slot Mask for Syslog on the Router    Before creating the Syslog entity on the router  define a slot mask for Syslog  The  slot mask identifies the slots on which the system will load and run the Syslog  entity  At the Technician Interface prompt  enter       set wfProtocols wfSYSLLoad 0 0x7FFE0000 commit  This command enables Syslog to run on all slots  regardless of router model     Next  create the Syslog entity on the router     Task 3  Creating Syslog on the Router    Create the Syslog entity in the router configuration  as follows   set wfSyslog wfSyslogDelete 0 1 commit    This also enables Syslog on the router   The system sets the attribute  wfSyslogDisable  OID   1 3 6 1 4 1 18 3 3 2 15 1 2  in the Syslog base record to a  value of 1      Next  configure the Syslog global attributes     Task 4  Config
167. e or configuration  file  With this    named boot    operation  the system uses the image or config file  name that you specify instead of the default image or config file  Use the  following syntax to perform a named boot operation     boot  lt vol gt   lt image_name gt   lt vol gt   lt config_name gt   boot  lt vol gt     lt vol gt   lt config_name gt   boot  lt vol gt   lt image_name gt   lt vol gt        lt vol gt  identifies the volume that contains the  lt image_name gt    lt image_name gt   identifies the filename of the router software image  or           identifies the default  router software image      lt vol gt  identifies the volume that contains the  lt config_name gt    lt config_name gt   identifies the name of the configuration file  or         identifies the default  configuration file  config         Note  If you enter one argument in the boot command  you must enter the   other  If you want to use the default router software image with a named  configuration file  you must enter a dash      as the image argument  Similarly   to use a named router software image with the default configuration file  you  must enter a dash       as the configuration argument  When the source is  network  enter only a dash       to indicate no volume for the router software  image or config  If you enter anything else  the Technician Interface displays  an error message        The software image and configuration files revert to their respective default  filenames  ace out  an
168. e same code number  For example  to forward only log messages that  have an event code of 10  enter 10 as the value of  wfSyslogEntFltrLogEvtUppBnd and as the value of the  wfSyslogEntFltrLogEvtLowBnd  Log Event Lower Bound     If you do not want to filter by event code  accept the upper and lower  boundary default values of 0 and 255  In this case  Syslog checks for  filtering criteria based on a message severity mask   wfSyslogEntFltrSevMask     If you specify lower and upper boundary values of 255  the wildcard  entity number   Syslog ignores this attribute as filtering criterion    set wfSyslogEntFltrEntry wfSyslogEntFltrLogEvtUppBnd    lt host_IP_address gt   lt entity_code gt   lt filter_index gt   lt 0   255 gt     1 3 6 1 4 1 18 3 3 2 15 3 1 8       C 40    114088 Rev  A    Parameter     Attribute Name   Attribute Number   Default    Options     Function     Instructions     Command     MIB Object ID     Using Syslog Messaging to Monitor Router    Severity Mask   wfSyslogEntFltrSevMask   9   None   w  warning    i  information    t  trace    f  fault    d  debug    Use individually  such as f or d  or combined  such as fwitd      Identifies the severity levels  warning  informational  trace  fault  debug   of events you want to forward  Syslog uses this severity mask as filtering  criteria only if you specify the wildcard event number range  0   255  as  the values for wfSyslogEntFltrLogEvtLowBnd and  wfSyslogEntFltrLogEvtUppBnd  Syslog looks only for events that have
169. earchDepth value on this circuit     Defines the depth of searching for repetitive patterns in the data you want  to send over a specific  virtual  circuit  Whenever you choose a  customized value  within the range 0 to 255  for  wfWcpCircuitSearchDepth  you automatically choose not to inherit the  wfWcpLineSearchDepth value     Compression ratios may improve with settings higher than 3  the value  inherited from the wfWcpLineSearchDepth attribute   however   throughput may actually decrease for settings higher than 12 or 13   The  compression engine yields higher compression ratios  but takes longer to  find token matches for the data being sent over the circuit   Bay Networks  does not recommend settings higher than 13     Accept the default value to inherit the wfWcpLineSearchDepth value on  this circuit  or choose a customized value that provides the best trade off  between compression ratio and throughput on this circuit     Test end to end throughput on this circuit before and after modifying the  WCP circuit search depth value     set wfWepCircuitEntry wfWepCircuitSearchDepth  lt 0   255   256 gt   1 3 6 1 4 1 18 3 4 22 2 1 7       8 58    114088 Rev  A    System Administration    Displaying a Greeting or Notice Before the Login Prompt    You can create a greeting  notice  caution  or warning message that displays  before the Technician Interface Login  prompt  To create and initialize this  message on the router  proceed as follows     1  Create an ASCII file named fi
170. eate a MIB record with system defaults for a console  port  Set to 2  Delete  to delete a MIB record for a console port     set wfSerialPortEntry 1  lt port_no  gt   lt option gt   1 3 6 1 4 1 18 3 3 2 11 1 1 1    Port Disable   wfSerialPortDisable   2   1  Enable    1  Enable    2  Disable    Enables or disables the console port    Select the status of the console port    set wfSerialPortEntry 2  lt port_no  gt   lt option gt   1 3 6 1 4 1 18 3 3 2 11 1 1 2       114088 Rev  A    2 5    Using Technician Interface Software    Parameter   Attribute Name   Attribute Number   Default    Options     Function   Instructions   Command   MIB Object ID     Parameter   Attribute Name   Attribute Number   Default    Options     Function     Instructions   Command   MIB Object ID     Port State   wfSerialPortS tate   3   4  Not present    1  Up    2  Down    3 init    4  Not present   Up   enabled   Down   disabled   Init   initializing  for new instances    Not present   the port does not physically exist  Shows the current state of the port    You cannot change this parameter    get wfSerialPortEntry 3  lt port_no  gt   1 3 6 1 4 1 18 3 3 2 11 1 1 3    Port Number  wfSerialPortNumber  4   None   1121314    The port number for the information being displayed  Not all routers have  four physical ports  The system places a configured port that doesn   t exist  into the Not present state     You cannot change this parameter   get wfSerialPortEntry 4  lt port_no  gt   1 3 6 1 4 1 18 3 3 2 
171. ed                   4 0 0 0 8 ELES ORS ER 3 233362 IGP 8183 BEST USED  As Path  SEQ 200   5 0 0 0 8 2 2 23 2232 53  IGP 8183  As Path  SEQ 300          SLOT 2  Total Nets 2  SLOT 5  Total Nets 7             When you specify the  i   p  or ip_address options for the ip bgp_routes  command  the resulting display specifies the total number of networks  plus the  following additional information     e Multi exit disc  Multiple exit discriminator     RFC1771 defines this as an  optional  nontransitive attribute that is a four octet  nonnegative integer  A  BGP speaker uses the value of this attribute to help discriminate among  multiple exits to a neighboring autonomous system  AS      e Aggregator    RFC1771 defines this as an optional transitive attribute of  length 6  The attribute contains the last AS number that formed the aggregate  route  encoded as 2 octets   followed by the IP address of the BGP speaker  that formed the aggregate route  encoded as 4 octets         8 68 114088 Rev  A    System Administration    Example  bgp routes     Enter the following command to display routes announced to the peer with a local  address of 3 3 3 1 and a remote address of 3 3 3 2     ip bgp_routes  N  p3 3 3 1 3 3 3 2       Network Mask Peer Rem Addr NextHop Address Org Loc Pref  1 0 0 0 8 Sa 3032 343331 IGP     As Path  SEQ 100  Multi exit disc  1 Aggregator 100 192 32 140 40  2 0 0 0 8 Susie t2 3 36031 IGP  1    As  Mul    SLOT 5     256 Routes To 3 3 3 1 3 3 3 2       Path  SEQ 100  
172. ed a password for Manager access  Enter the password after the prompt   The Technician Interface prompt appears when the system logs you in     Enter logout to terminate the Manager session  You return to the User session  when the Technician Interface prompt reappears     Using Technician Interface Scripts    The Technician Interface scripts are programs that let you manage the router using  information stored in the Management Information Base  MIB   You can use the  scripts to display information about protocols and network services and to enable  or disable protocols  circuits  lines  and services     You access the Technician Interface scripts using the following commands     e show displays system configuration  state  and statistical information  This  command helps you isolate problems such as circuits that are not working   packets that are not being forwarded  and so on     e monitor displays the same information as the show command but refreshes  the display periodically so you can examine trends and changes     e enable disable enables or disables system features  protocols  drivers  or  individual circuits     e menu provides a menu interface to the other scripts  You can also use the  menu building features of this script to create custom menus     A number of Technician Interface scripts exist as programs embedded within the  router software image  rather than as individually loadable batch files  filename   lt entity_name gt  bat   You run the embedded and bat
173. ed by the local Syslogd software module  For Syslogd to  properly dispatch router event messages to a file  display  printer  and or another  remote host  you must edit the contents of the  etc syslog conf file   Configure Syslogd on your UNIX workstation  as follows   1  Log in as superuser  as follows    su root    2  Open  etc syslog conf and examine the  lt facility level gt  indicators   local lt 0   7 gt   lt fault   warning   info   trace   debug gt      3  Edit  etc syslog conf as needed to achieve message handling appropriate  for your management workstation requirements        114088 Rev  A C 13    Using Technician Interface Software    Example     Messages dispatched to console  display     local7 debug  local7 info  local7 notice  local7 err  local7 crit  local7 alert    local7 emerg    or      dev console   dev console   dev console   dev console   dev console   dev console     dev console    local7 debug local7 info local  local7 notice   local7 err local7 crit local7 alert local7 emerg  dev console    Messages dispatched to a file   local7 info  local7 debug    local7 warning    Messages dispatched to a host     local7 notice    Messages dispatched to a printer     local7 trace     var log syslog file   dev log debug_file     var log warning_file      lt host_name gt       lt printer_name gt     In this example  the path specified next to each    local    facility indicator in the file  shows a unique destination for each severity level of router event message 
174. ed with the  attributes you want and enter the total in the attribute command  For example  to  assign the attributes archive needed  hidden  and read only to the config file  add  their associated hex values     0x20   0x02   0x01   0x23    Then enter the following command to assign these file attributes     attr 0x23 config    You can also assign attributes to a file in another directory by specifying the  pathname  For example  enter the following command to change the file attributes  of a file named  6_23 log in the logs path     attr 0x23  logs I6_23 log    Examples     If you enter  The system     attr 0X01 config Sets the attribute of the file config to read only     attr 0X03 config Sets the attributes of the file config to hidden and  read only     attr 0X23 config Sets the attribute of the file config to hidden  read only   and archive needed     Displaying the Contents of a File    Use the type command to display the contents of a file  Before displaying a file   enter more on to display the file one screen at a time     Enter the following to display a file   type   x   lt filename gt      X is an optional command to display the file in hexadecimal format  This allows  files containing nonprintable information to be viewed      lt filename gt  is the name of the file you are displaying        5 20    114088 Rev  A    Managing a DOS File System    The file is displayed in the same format in which it is stored  provided that you do  not enter the  x argument   bina
175. eeeeeeeeeeseeeeeneeeneaees 3 27    vi 114088 Rev  A       Chapter 4  Managing a NonVolatile File System    ENEA e e E E jones cack iaguesdanes E E ieaabjacuesdacunacet 4 2  Weing Muhe Memory GWS ssni en ee a er aaa ada aaa 4 3  Naming Files  Rules and Comventiona sirsie ai iE A 4 5  Displaying the Status of All Memory Cards ssiginnuiiininintainodiaiiien ated 4 6  Dispenn a ca     eae eee tine ee ee Pr ere a Uren ereter ser tr 4 7  Changing the PAC GING cabs csiciecceddunicacnsiad tonsa ranahineiadananeomediaiaqan iaeiaiaateddaaeeeehdacsianey 4 10  al PAN coc Se vancuceterue citadel viedeeainsasoney aaaddudasaeden yadda einen manana 4 11  Copying Fikes Tom VRS ta DOS arranoari 4 11  Teee A ml meee rree een rere cerre Toit ee Tee ere Crr ree rere marr Terre  tener ee 4 13   MEg File Wem S snes aa 4 14   Out of Band File Transfers         E AE EEEE E PAET E T TAT 4 17  Displaying the Contents of a FIG  cc ccsvsncerctssorsseietanrddenesennvinsiasniaamaineaineas 4 17  DEUDA Ws ca tec ceree raat anced cysts paeaaneaen T EEA TA E AEEA EATA 4 18  COGRVID CIC TINNY FING SPACE erco esi tlia et ieee eel all 4 19  Formatoa Memory oat aiarra a aiian ete nua dauutatarane 4 20  Transferring a File to a Full Memory Card sassen E PEET PA 4 20  Paritonina a Memory Cador SIMM airain 4 21   Chapter 5  Managing a DOS File System   OTEN anie E a Qeeuei ences  5 2  Nammo Files and Directorios MacieAtaccd dete EA NAERAN 5 3  Mounting a Volume        E T sepeli EAE T piiescides sateen E E 5 4  onnaa 
176. eful  method  for example  for router diagnosis and management     You use this method most beneficially when    You can dial in to the Technician Interface port of a router you choose as the  source or destination for a file transfer operation    All IP routing paths between the file source and the file destination are down   nonoperational     You can use either a UNIX or a 386 486 DOS remote workstation to transfer files  in band or out of band using Technician Interface xmodem commands  as  operating conditions within your network allow        114088 Rev  A    4 13    Using Technician Interface Software    In Band File Transfers    The tftp command invokes the Trivial File Transfer Protocol  TFTP  software to  transfer a file between a Bay Networks router and another router or host capable  of serving tftp file transfer requests     The TFTP software resides within the IP router  Consequently  you must load  TFTP on the router and enable it  refer to Quick Starting Routers and BNX  Platforms for instructions      When you transfer a file to a Bay Networks router  unless you specify the target  volume  the TFTP server of the receiving  client  router uses the value of the  wfTftp 2 0 MIB attribute to determine the target volume     For example  if you enter  tftp put 192 xx x xx 2 config    where 192 xx x xx is a valid IP address  the file config will be called config on the  router at the specified IP address and will go to the volume specified in  wifTftp 2 0  The same w
177. en you enter the commit  command     Using the save Command    After you set and commit changes to the current configuration running in active  memory on the router  use the save command to store that configuration to a file  on a Flash memory volume  as follows     save config  lt vol gt   lt filename gt        Note  You can also use the save command to save the current contents of the  router   s Event log  environment variable list  or alias list  Refer to Chapters 6   7  and 9 for more information on these applications of the save command        Console Port Parameters    This section describes parameters for configuring the serial  console  port on the  router     e Parameter   e Attribute name   e Attribute number   e Bay Networks default setting   e Options or range of valid settings   e Parameter   s function   e Instructions for setting the parameter    e Command you enter to configure or monitor the parameter       114088 Rev  A    Configuring the Console Port       Note  You cannot configure the following console port parameters  State   Number  Name  and Slot        Parameter   Attribute Name   Attribute Number   Default    Options   Function     Instructions     Command   MIB Object ID     Parameter   Attribute Name   Attribute Number   Default    Options   Function   Instructions   Command    MIB Object ID     Port Delete   wfSerialPortDelete   1   1  Create    1  Create    2  Delete    Creates or deletes an instance of a console port     Set to 1  Create  to cr
178. encounter  the SecureID login procedure  securelogin replies with    Securelogin information remains unchanged    Are you sure you want to turn off secure ID   yes no   yes     If you entered yes  securelogin replies with       SecurID no longer required on Telnet login     You have completed the procedure  and you have not changed any  configuration information for the SecureID client software on the router        114088 Rev  A    8 51    Using Technician Interface Software    Disabling SecurelD Authentication    Once the Technician Interface login prompt appears     or whatever your network  administrator has set up for a prompt   proceed as follows to disable SecureID  authentication services already enabled and active on the router     1  Run the securelogin configuration utility      securelogin    2  Respond to each of the questions that appear in your Telnet or console  display  Press Return after each entry  beginning with    Do you wish to secure telnet login   yes no   yes   Entering yes invokes an additional verification   Are you sure you want to turn off secure ID   yes no   yes     If you entered yes  securelogin replies with       SecurID no longer required on Telnet login   If you entered no  securelogin replies with  Secure login information remains unchanged     If you entered no and received the reply Secure login information remains  unchanged   the SecureID client is still enabled on the router  Telnet users  continue to encounter the SecureID login proce
179. ense whatsoever  either  explicitly or implicitly  except by acceptance of an order for either Software or for a Bay Networks product      Equipment     that is packaged with Software  Each such license is subject to the following restrictions     1     Upon delivery of the Software  Bay Networks grants to licensee a personal  nontransferable  nonexclusive license  to use the Software with the Equipment with which or for which it was originally acquired  including use at any  of licensee   s facilities to which the Equipment may be transferred  for the useful life of the Equipment unless  earlier terminated by default or cancellation  Use of the Software shall be limited to such Equipment and to such  facility  Software which is licensed for use on hardware not offered by Bay Networks is not subject to restricted  use on any Equipment  however  unless otherwise specified on the Documentation  each licensed copy of such  Software may only be installed on one hardware item at any time     Licensee may use the Software with backup Equipment only if the Equipment with which or for which it was  acquired is inoperative     Licensee may make a single copy of the Software  but not firmware  for safekeeping  archives  or backup  purposes     Licensee may modify Software  but not firmware   or combine it with other software  subject to the provision  that those portions of the resulting software which incorporate Software are subject to the restrictions of this  license  Licensee shal
180. enter logout at the Technician Interface command line prompt in the  Wfterm base program window     At the conclusion of file transfer operations  you can close the connection between  the workstation and the router   Refer to    Closing the Connection            114088 Rev  A    B 29    Using Technician Interface Software    Closing the Connection    You can    gracefully    close the connection between your workstation and a target  router after you    e Finish transferring  downloading or uploading  files between the remote  router and your workstation    e Log off the Technician Interface of the target router  To close a connection  select the Hangup function in the Wfterm File pull down    menu  as shown in Figure B 7  When the connection closes  the Wfterm  Connection Closed window appears  as shown in Figure B 11        Wellfleet Communication Terminal Program  File Modem Phone File Transfers Help      WiTerm                      Figure B 11  The Wfterm Connection Closed Window    At any time you can also close a connection simply by quitting the Wfterm utility   Once you close the connection between your workstation and the target router   you can quit the Wfterm program  as described in the next section        B 30    114088 Rev  A    Using Out of Band Access to Transfer Files    Quitting Wfterm    You can quit the Wfterm utility after you   e Finish transferring files   e Log out of the Technician Interface of the target router   e Close the connection between your 
181. entions for the treatment of filenames by the YMODEM protocol are    The source router or the remote workstation sends files with path names  stripped and limited to eight characters plus a three character extension  The  router or workstation converts all filename characters to lower case    and all         characters to         characters     The target router or workstation stores received files under their transmitted  names  However  YMODEM converts   characters in the received filename  back into   characters  YMODEM also translates all uppercase characters into  lowercase  and eliminates any trailing dots in the filename     If you want to specify multiple filenames in a single xmodem command  that  is  a YMODEM batch file transfer operation   insert a space after every  filename except for the last name you specify in the command line  You can  also use wildcards in a filename  for example    bat      For More Information    The following book provides additional information about xmodem protocols     Forsberg  Charles  Ed  XMODEM YMODEM Protocol Reference     Implementation Notes    This section provides implementation notes on    How xmodem handles files and checks for errors in files  How xmodem responds when you cancel a file transfer operation  How to manage modem hardware incompatibilities    How to view xmodem log events       114088 Rev  A    B 7    Using Technician Interface Software    File Handling    The following information applies to configuration files
182. eproduction  and disclosure are as set forth in  the Commercial Computer Software Restricted Rights clause at FAR 52 227 19     Trademarks of Bay Networks  Inc     ACE  AFN  AN  BCN  BLN  BN  BNX  CN  FN  FRE  GAME  LN  Optivity  PPX  SynOptics  SynOptics  Communications  Wellfleet and the Wellfleet logo are registered trademarks and ANH  ASN  BayeSIS  BCNX   BLNX  EZ Install  EZ Internetwork  EZ LAN  PathMan  PhonePlus  Quick2Config  RouterMan  SPEX    Bay Networks  Bay Networks Press  the Bay Networks logo and the SynOptics logo are trademarks of   Bay Networks  Inc     Third Party Trademarks    All other trademarks and registered trademarks are the property of their respective owners     Statement of Conditions    In the interest of improving internal design  operational function  and or reliability  Bay Networks  Inc  reserves the  right to make changes to the products described in this document without notice     Bay Networks  Inc  does not assume any liability that may occur due to the use or application of the product s  or  circuit layout s  described herein     Portions of the code in this software product are Copyright    1988  Regents of the University of California  All rights  reserved  Redistribution and use in source and binary forms of such portions are permitted  provided that the above  copyright notice and this paragraph are duplicated in all such forms and that any documentation  advertising materials   and other materials related to such distribution and 
183. er SeINICe occ cantatas cia ts ate aedeea esate ieee xxviii   Bay Networks Information Services               ceccsceeeeeeeeeees PAE ET anonn Xxix   Word Wide ABE  sipna ieachiacterauneveleteuacaienieadeaidoentdaninnaes Xxix   RUS ER ete OU F IP oaninoar dad E Aaa Xxix   Cl PION QUT  OD  coe se 5 cctetcead sean asd essen a aad een seme XXX   NES RMU VS tessa sachs NE AEN teseeiiens adele XXX   MORS TS a a a S xxxi   How to Get HE oiai a ERA XXXi   Chapter 1   Introducing the Technician Interface   Ginerencess Tom ste Marae anieri iaiia 1 2   Running bine  teemaan Were caniae na NAE AERA 1 3   BO n a nr REDS a trey later orueeeri te 1 3   Uervinager COT sicrie A AEA 1 3   Eare aE EEEo e I T VE A EA E AET A A AE ET 1 4   LUPINE SO CUIMILY raa edad adeeuoeadlenetatatew ie talaiidicmaadieminisenes 1 4   Technician Interface Welcome Screen              cccceccceseeceeesseeeeeseeeeeeeeeeesaeeeeeeeenes 1 10   Login Timeout BOMBINGS arrsa rinnan aa 1 11   Login Gonigutatoh surrainn E T AET rda 1 12    114088 Rev  A v       NT I sn E E EE 1 12    Starting a Manager Session from within a User Session            cccecceeseeeesteeeeeeeeees 1 13  Using Technician lolsrface Str seciono i ia aiia na ices 1 13  Chapter 2  Configuring the Console Port  EVO WOW aoira PEE T EAEE PE EE E E R 2 2  Coniiguring Console Port Parameters scsccssiaacacisarcedaaise ctseeucrnniis edn uaa 2 2  Usmo the Smt 2  71 cas lg  ete epee Raremene ear Rete Seer hee adena iaa iaa crn nee tnr cree 2 2  Using he ser C
184. er configuration  as follows     BN  3   set wfRuiBoot wfRuiBootBaseDelete 0 1 commit    This also enables delayed boot services on the router   The system sets the  attribute wfRuiBootBaseDisable  OID   1 3 6 1 4 1 18 3 3 2 14 1 1  in the  RUIBOOT base record to its default value of 1 or enabled      Scheduling Delayed Boot Events    You can schedule a delayed boot event on a router as follows     1  Log in to the router   s Technician Interface     Log in to the Technician Interface of the router you want to configure with a  delayed boot event  If you need instructions on how to perform a login via local  console or remote Telnet session  refer to Chapter 1  then resume the procedure  for scheduling a delayed boot event     2  Schedule a delayed boot event     To schedule a delayed boot event  you must first create  add  an entry in the  RUIBOOT table of delayed boot events  as follows     BN  3   set wfRuiBootTable wfRuiBootDelete  lt wfRuiBootDateAndTime gt   1    BN  3   commit  Note that the instance ID  lt wfRuiBootDateAndTime gt   e Specifies when the delayed boot event will occur    e Comprises 11 octets  each of which contain in decimal notation one element  of the date and time you want to specify for the boot event  see Figure 8 1        114088 Rev  A 8 15    Using Technician Interface Software       Octet 1       Octet 2    Octet 4 Octet 5    Octet 3 Octet 6   Octet7   Octet8   Octet9   Octet 10  Octet 11           lt year gt     Figure 8 1      lt month gt     
185. er in an ASN chassis as a  numbered slot      Instructions  To specify a range of slots  set the value of this parameter attribute to the  high number in the range  Also set the value of  wfSyslogEntFltrSlotLowBnd  Slot Lower Bound  to the low number of  the range     Any range you specify includes the values for the lower and upper bound  parameters attributes  For example  if you specify a lower bound of 1 and  an upper bound of 4  Syslog forwards all event messages logged on Slots  1 through 4  inclusive   Syslog ignores all other event messages     To filter events for a specific slot  set the value of  wfSyslogEntFltrSlotLowBnd to the desired slot number  Set the value of  wfSyslogEntFltrSlotUppBnd to the same number  For example  to  forward only event messages logged on Slot 2  set the value of  wfSyslogEntFltrSlotLowBnd and wfSyslogEntFltrSlotUppBnd to 2     If you do not want to filter messages by slot number s   accept the lower  and upper bound default values of 0     Command  set wfSyslogEntFltrEntry wfSyslogEntFltrSlotUppBnd    lt host_IP_address gt   lt entity_code gt   lt filter_index gt   lt 0   14 gt     MIB Object ID     1 3 6 1 4 1 18 3 3 2 15 3 1 11       114088 Rev  A C 43    Using Technician Interface Software    Parameter  Fault Map  Attribute Name    wfSyslogEntFltrFaultMap  Attribute Number  12  Default  3  CRIT     Options  1  EMERG    2  ALERT    3  CRIT    4  ERR    5  WARNING     6  NOTICE    7  INFO    8  DEBUG     Function  Maps router event mes
186. er the xmodem send binary command  as follows   xmodem sby  lt source_vol gt    lt filename gt      lt filename gt   sb is a send binary file    y is the YMODEM file transfer option      lt source_vol gt  is either a slot number of a memory card or the letter of the  disk drive volume that contains the files you want to send to the workstation      lt filename gt  is the name of the file you want to send from the router to the  workstation  If you want to enter multiple filenames as part of aYMODEM  batch file transfer operation  insert a space character between the filenames    For more information on Technician Interface filename specifications  refer  to Chapters 4 and 5      Type  c  tilde c  to escape momentarily from the Technician Interface  command line prompt to the UNIX workstation command line prompt   The workstation responds    Local command     Enter an xmodem receive binary command with the print  display   transfer events and information option flag  p  set in the command line   as follows     xmodem rbyp  lt  ilename gt       lt filename gt   rb is a receive binary file   y is the YMODEM file transfer option     p prints  displays  important information and events pertaining to the file  transfer s  you are about to initiate      lt filename gt        lt filename gt    The  optional  filenames you want to assign to  files when they reach the workstation     Pressing return to execute the xmodem command triggers the necessary  handshakes between the YMODEM pro
187. erStatus  ifMTU  and  ifPhysAddress  ifAdminStatus and ifOperStatus return UP if at  least one interface is up  All interfaces must be down before  DOWN is returned  The ifMTU value returned is the minimum  MTU for the circuit group and the ifPhysAddress is the physical  address of the first interface in the circuit to initialize        A 8    114088 Rev  A    ifSpecific    ipAddrEntry    ipRouteEntry    Supported Traps    Using the Bay Networks Router MIB    The object identifier that points to an instance of the first  conceptual column in the appropriate proprietary media MIB     In certain circumstances  the index to this table  ip AdEntAddr   may not be sufficient to uniquely identify a particular instance   In these situations  the attribute ipAdEntIfIndex is appended to  the instance identifier for subsequent entries with the same  index     The instance identifier for the MIB II routing table   ipRouteDest  is insufficient to uniquely identify all possible  routes to a given destination  The MIB II routing table   therefore  contains only a representative sample of the total  routing table  For a more accurate description of the system   s IP  routes  see wflpForward Entry  1 3 6 1 4 1 18 3 5 3 2 1 16 1    which is indexed by destination address  destination subnet  mask  route source  policy  and next hop address     The following generic traps are supported by the software     coldStart    warmsStart    linkUp    linkDown    Issued when the network management entity
188. erface Software    Parameter   Attribute Name   Attribute Number   Default    Options     Function     Instructions   Command   MIB Object ID     Parameter   Attribute Name   Attribute Number   Default    Options     Function     Instructions     Command   MIB Object ID     Stop Bits  wfSerialPortStopBits  11   1 1    1 1 12  1 5  13 2     Specifies the number of bits that follow each ASCII character received or  transmitted by the router  Selecting option 2  1 5 stop bits  for any  AN ANH series router defaults to option 3  2 stop bits      Set according to your console requirements   set wfSerialPortEntry 11  lt port_no  gt   lt option gt   1 3 6 1 4 1 18 3 3 2 11 1 1 11    Modem Enable  wfSerialPortModemEnable  12   2  Disable    1  Enable    2  Disable     Specifies whether the terminal connects directly or via a modem to the  Technician Interface     Use the 1  Enable  setting to configure the terminal for connection via a  modem to the Technician Interface  Use the 2  Disable  setting to  configure the terminal for connection directly to the Technician Interface     set wfSerialPortEntry 12  lt port_no  gt   lt option gt   1 3 6 1 4 1 18 3 3 2 11 1 1 12       2 10    114088 Rev  A    Parameter   Attribute Name   Attribute Number   Default    Range     Function     Instructions   Command     MIB Object ID     Parameter   Attribute Name   Attribute Number   Default    Options     Function     Instructions     Command     MIB Object ID     Configuring the Console Port    L
189. esents the syntax of the xmodem command     xmodem  sb   st   rb   rt   lt y m k c   w p e  n  gt   lt voldir gt    lt filename gt   lt filename gt             Command    ee OOR    Subcommands Options Source Volume Files to send  and Source Directory or  Files to receive  or  Files to receive as       Note  You can enter the xmodem command line parameters and option flag  characters in upper  or lower case  Do not insert spaces between parameter  characters  between option flag characters  or between a parameter and an  option flag character  Do insert a space character after the last option flag and  between filenames  for YMODEM batch file transfers         For out of band file transfer operations  use only the xmodem command  parameters and options that are appropriate for    e The YMODEM protocol  e The type of file you need to transfer    The relevant xmodem command parameters are sb  send binary  and rb  receive  binary   The relevant option flags are y  ymodem   I  logging   w  wait before  initiating transfer   p  print display xmodem information and events   n  allow  midtransfer cancel   and e  disable EOT verification    DOS only      The y and w option flags are required in the xmodem commands  to select  YMODEM  and for proper handshaking with the YMODEM protocol program  running on the remote workstation   You should use the p option to monitor the  progress of any out of band file transfer in progress  UNIX only      You can enable or disable logging of xmodem 
190. ete 0 2 commit       114088 Rev  A 8 21    Using Technician Interface Software    Restarting a Slot    The restart command allows you to restart the GAME image currently in use on a  specified slot or slots  Restarting a slot does not reboot with a new router software  image  You restart a slot or slots by entering the slot number or numbers after the  restart command  If you do not enter a slot number when issuing the restart  command  all slots are restarted     Enter the following to restart the entire system     restart    Enter the restart command with one of the following parameters to restart a  processor module or modules   lt slot_no  gt  is the number of the slot where the  processor module is located     restart   lt s ot_no  gt    restart   lt s ot_no  gt   lt slot_no  gt      restart   lt s ot_no  gt   lt slot_no  gt            Examples    If you enter  The system restarts   restart The entire system   restart 1 Slot 1    restart 1 5 Slots 1  2  3  4  and 5   restart 4 6 Slots 4 and 6        8 22 114088 Rev  A    System Administration    Restarting After Crossnet Shutdown Notification  BNX Only     On BNX platforms only  you can use the  shutdown option of the restart  command to restart the GAME image on one or more slots  following a    graceful  crossnet shutdown      on the same slots  With this option  the system notifies the  remote end of any associated Frame Relay Switch  frsw  PVCs to expect a loss of  connectivity   The BNX sends to the remote end of ea
191. euanceeeens 8 9    NG NNT ET A EE ATT E rae eae nach ate Bai A Aces an asec adnan ead shown TA 8 10  Using the PCMCIA Floppy SIWNCN usciranno iia 8 12  Booting after Crossnet Shutdown Notification  BNX Only     8 13  Configuring Delayed Boot Services              006 ET P E T seventies  8 14  Adding Delayed Boot Services to a Router           ceccccecccteeeeeeeseteeeeeeeseeeeeessseeeeeees 8 14  Scheduling Delayed Boot Eves sciiccicacedes niet sinitcandnisareadbceonsntarsiweraneue 8 15  Managing Delayed Boor Servicos ainmide a 8 20  Disabling or Re enabling Delayed Boot Services on a Router    sessen 8 20  Disabling or Re enabling a Delayed Boot Event               ccccceeeeeeeeeeeeeeetteeeeeees 8 20  Modifying Attributes for Scheduled Delayed Boot Events                ccssceceeeee 8 21  Deleting Delayed Boot Events sssisssersisssiisreirssniorserdsadini iannis 8 21  Deleting Delayed Boot Services from the Router             ccccceeeseteeeeeeetteeeeeeeees 8 21  Reskrim a SOl onae S errs errr rr ere Teer 8 22  Restarting After Crossnet Shutdown Notification  BNX Only  s   8 23  Resetting a System or Slot               E agus sd dees E nada P ET TNS 8 24  Resetting After Crossnet Shutdown Notification  BNX Only  nesses 8 28  R  nno CSUN iynin aaa a aaa A a aED AE ATA 8 29  Tumia oi the DIAG Mdicator LED priii EE 8 32  Dispaymno he Sate VERSION seriiriioriint snika OANA NNR 8 32  Halting Packet Transfer between Slots              csceeeeeeeeeees E PA 8 33  MEPIS  and Upgrading  S
192. events by means of the I flag  or  cancel a particular file transfer by entering control x        B 4    114088 Rev  A    Command Parameters    Using Out of Band Access to Transfer Files    When you enter an xmodem command at the Technician Interface command line  prompt  follow the entry with only one of the following parameters     Parameter Name    sb Send Binary   st Send Text   rb Receive Binary  rt Receive Text    Command Options    Meaning or Action    Sends files as they exist on disk or in  Flash memory  without conversion     Sends ASCII text files     Places files on disk or in Flash  memory  without conversion   YMODEM silently destroys existing  files of the same name     Receives ASCII text files     After you enter the xmodem command parameter that is appropriate for the  operation you need to perform  sb rb   enter    e They option flag for any send binary or send receive operation    e The w option flag for any send binary operation    e The p option flag for any xmodem command you use to set the UNIX  workstation in either send binary or receive binary mode    e Thee option flag for any xmodem command you use to transfer files to the  router using the Windows Terminal program    The xmodem option flags relevant to the use of the YMODEM single  or  batch file transfer protocol have the meanings shown in Table B 1        114088 Rev  A    B 5    Using Technician Interface Software    Table B 1  Xmodem Option Flags       Option    Flag Meaning or Action         
193. ever an alias executes                 Examples   Table 9 1  Aliases for Debugging Network Problems  If you enter  The system   at_intf  lt circuit gt   1   2  Enables or disables a circuit  Valid values are  1   Enable circuit  2   Disable circuit  at_if  lt circuit_no gt  Retrieves configuration information and statistics for the  selected circuit   at_addr Lists the AppleTalk addresses for the AppleTalk  interfaces on the router   at_cfg Displays the configured network start  network end  and  default zone for all AppleTalk interfaces                    9 10    114088 Rev  A    Managing Aliases                                           Table 9 1  Aliases for Debugging Network Problems  continued   If you enter  The system   at_cur Displays the current network start  network end  and  default zone for all AppleTalk interfaces   at_it Displays the status of all AppleTalk interfaces   at_rt Displays the entries in the routing table  including the  node and network IDs of the next hops in the network   the number of hops  and the status of the network   at_zones Lists the zones in the router   s zone table   at_arp Lists the AARP entries in the router   s address mapping  table   bgpenabled Displays the state of all configured BGP connections   Valid values are  1   Enabled  2   Disabled  bgppeers Displays the BGP IDs  for the connections that are  established  of all BGP peers   bgppeerstate Displays the administrative state of all configured BGP  connections  Valid values ar
194. ext gt     Figure 5 2 shows a sample response to the dir command  The screen shows an  entry for each file on the volume  Each entry consists of a filename  size   modification date weekday time  and attributes        5 8    114088 Rev  A    Managing a DOS File System       a      dir a     File Name    ACE   OUT  TI CFG  CONFIG  TOMACIP  TOMAC   CFG  AURP   CFG       G    Performing mount check       Volume in drive A  is  Directory of A      0 01 01 92   0 01 01 92  1302081 01 04 95  184 09 13 94   184 06 15 94  1760 06 16 94  3544 08 16 94  4264 10 04 94    1474560 bytes   Total size  143872 bytes   Available free space    Attributes     gt           Figure 5 2     Examples     If you enter     dir  dir   cfg    dir     log    Sample DOS Directory Listing    The system     Displays the list of files in the present working directory     Displays the list of files with a  cfg extension in the present    working directory     Displays the list of files with a three character filename and a   log extension in the present working directory        114088 Rev  A    5 9    Using Technician Interface Software    The factory default filenames are as follows     ace out    ajn exe    bn exe    afnboot exe    config    debug al    frediag exe    freboot exe    The router software image for the FN  LN  CN  and ALN     You cannot read or change this file  The system automatically  refers to this binary file for booting instructions unless you use  the boot command to specify a different
195. fg Gets a copy of config2 cfg from the remote  node at the IP address 192 32 1 62     After transferring the file  you can rename or copy it at the source to its original  name  If the new file at the destination is a configuration file or an executable file   verify its integrity by booting with it  If the system boots and loads the  configuration without problems  you can rename or copy the filename at the  destination to its original name     You can also load a file onto the router by specifying the router host name and  volume  using the following command     tftp put  lt remote_file gt   lt host_name gt   lt local_vol gt   lt local_file gt     This method is useful if the wfTftp 2 0 attribute for the default volume was not set  during the Quick Start procedure     Example   If you enter  The local system   tftp dark Transfers a copy of the install bat file to    put install bat dark 2 install bat Volume 2 on the router known as    dark        Out of Band File Transfers    Appendix B in this guide describes how to transfer files out of band  using  facilities outside the IP network   using the xmodem command        5 18 114088 Rev  A    Managing a DOS File System    Changing File Attributes    The attr command changes the DOS file attributes  These attributes are displayed  when you enter the dir command  You cannot delete or rename a file whose  attributes are s  for system  or h  for hidden   This section describes how to  reassign attributes to such files  so that you
196. following syntax   ip cache ospf_Isdb   lt A   a gt   s  t     A invokes the complete OSPF LSDB  for all OSPF areas known to the router  20  lines maximum per advertisement       a is the address of the OSPF area associated with the LSDB you want to view    s is the slot number associated with the LSDB you want to view      t is the OSPF LS Type indicator  stub  router  network  summary link  or  external      Determining Circuit Numbers    Whenever you create a new circuit via the Technician Interface or the  Configuration Manager tool  the router operating system software  GAME  maps  the circuit name you assign  such as    E21     to a circuit number  such as    4        in  the router   s active MIB     When you use the Technician Interface ip command to display data pertaining  only to a specific circuit on a router  you must enter the circuit number after the  c  option flag for that command     Example     The following ip command displays all IP routes accessible via circuit 4 on the  router   The command shows the contents of the cache for an unnumbered IP  interface on circuit 4      ip cache 0 0 0 0  c4       8 76    114088 Rev  A    System Administration    You can determine the circuit number from the router   s active MIB by using the  Technician Interface get command in a variety of ways     Example     The following command retrieves the circuit number  attribute 6  for every entry  in the FDDI Line_ Table       g wfFddiEniry 6      wfFddiEntry wfFDDICct 5 1  
197. fore You Begin    Before using this guide to run Technician Interface commands on a router or BNX  platform  you must    e Install the router or BNX platform    e Use one of the following methods to establish a connection to the router or  BNX platform        Connect the serial port of an ASCII terminal device  for example  a DEC  VT100  directly to the console port of the router or BNX platform        Connect the serial port of a workstation or PC directly to the console port  of the router or BNX platform   Run ASCII terminal emulation software  on the workstation or PC         Dial in to the console port of the router or BNX platform from a  workstation or PC running ASCII terminal emulation software   This  alternative requires one modem locally attached to your workstation or  PC  and another modem locally attached to the console port of the router  or BNX platform you want to access         Establish a Telnet  in band  connection to the router or BNX platform        Note  Before you can access the Technician Interface using Telnet  the router  or BNX platform must have at least one assigned IP address  Although there is  no limit to the number of Telnet connections that you can make to the  Technician Interface  we recommend that you establish no more than one  Telnet session per router or BNX platform           XX    114088 Rev  A    Conventions    angle brackets   lt   gt      bold text    brackets        ellipsis points    italic text    quotation marks              
198. from the router     2  Enter a tip command on the workstation to open a dial connection  between the workstation and the desired router  For example     tip modem0    modem0 designates the workstation port that accommodates the dial modem  attached to the workstation  The system displays the following message     Connected       B 10    114088 Rev  A    Using Out of Band Access to Transfer Files    3  Press return to invoke the Technician Interface login prompt from the  target router  The system displays the following prompt   Login     4  Enter Manager and a password  if necessary  to log in to the router   s  Technician Interface  The system displays the following message and  prompt        Welcome to the  lt node type gt  Technician Interface        5  Enter a cd command to designate the disk volume or memory card     volume    that contains the files you want to transfer to your UNIX  workstation  For example     cd a   designates diskette Volume a   or  cd 2   designates a memory card volume in router Slot 2     6  Enter a dir command  if necessary  to view the list of files in the volume   memory card  The system displays a screen similar to the following table        File Name Size Date Day Time   abc cfg 1814 10 28 94 Thurs  10 29 06  def cfg 2293 11 03 94 Wed  17 16 29  ghi cfg 4197 11 15 94 Mon  08 34 04    7  Determine which files you need to transfer from the router to the  workstation        114088 Rev  A B 11    Using Technician Interface Software    10     Ent
199. g Technician Interface Software      gt  stamp  Command 3     Image  beta 9 00 1    Created  Tue Jun 6 13 08 17 EDT 1995         gt  history  Displays the history list   1 dinfo  2 dir 2     3 stamp      gt  history 2  Repeats the second command currently in the history list     dir 2     Volume in drive 2  is    Directory of 2        File Name Size Date Day Time   bn exe 3271441 06 12 95 Mon  2 35 07  debug al 12568 06 12 95 Mon  238257  install bat 152524 06 12 95 Mon  2 39 00  ti cfg 128 06 12 95 Mon  2 39 08  mk_foo cfg 4516 06 14 95 Wed  2 18 39  config 2044 06 18 95 Sun  254235   syslog cfg 2628 06 18 95 Sun  2 58 09  osi cfg 3048 07 19 95 Wed  2 55 40                3 6    114088 Rev  A    Using Operating Commands    Loading a Command into Memory    Use the exec command to load or unload dynamically loadable Technician  Interface commands to and from memory     Currently  you can load only the telnet command into memory  The exec telnet  command is useful when booting a Bay Networks router over a network using  BOOTP  Using exec telnet locks the telnet command into memory  in case the  connection to the BOOTP server fails     Enter the following to load a command into memory or unload a command from  memory     exec   load    unload   lt command_name gt     Once you load a command into memory  it remains there until you issue an exec   unload command  or until you restart the Technician Interface     Pinging a Remote Device    Use the ping command to test the reachabil
200. ges to the modem interface  settings  then proceed to the next section     Initializing the Local Modem        Initializing the Local Modem    Before attempting to open a dial connection between your workstation and a  remote target router  you need to initialize and    wake up    the modem locally  attached to the PC  You initialize the modem by selecting the Connect option of  the Wfterm Modem pull down menu  You verify that the local modem has  initialized successfully when you observe and respond to the message window  shown in Figure B 6        d Modem Initialized    Figure B 6  Verifying Successful Modem Initialization       Use the cursor to press the OK button  The following message appears below the  Modem Initialized window        114088 Rev  A    B 21    Using Technician Interface Software    ATSO   0  OK    With the local modem online and initialized  you can access and use the telephone  call functions supported by the Wfterm utility  as described in the next section      Using Wfterm Telephone Call Functions        Using Wfterm Telephone Call Functions    You can access two telephone call functions from the Phone pull down menu of  the Wfterm base program window  as shown in Figure B 7        Wellfleet Communication Terminal Program    File Modem   aituitag File Transfers Help    Dial Phone Ctrl D    Hangup Ctrl H          Figure B 7  Accessing Wfterm Telephone Call Functions    Dialing a Remote Router    To dial and connect to the Technician Interface port of a
201. gging with Predefined AliaS s scscconiacniiininnia e 9 10   Appendix A    Using the Bay Networks Router MIB  OR aoe ar aa a a a aaa A 2    X 114088 Rev  A       Bay Networke Rouvier MIB FiOS seasons a A 7    LONNIE EAS wih SISOS AON S aiieieo anaia AE ANENA EAE A 7  mpemenianan NOES sicaire a A 8  MBOR se E IUE eiit A 8  Supported Taps ciccdscstassscenensczes garag EA E PET ET E A 9  Lmsupborted OPRAO NE scnasena AE Eiaa A 10  Lie AAS ANODE cscs est autee ica casaeiedatada re ara AA aaa dE A 10    Appendix B  Using Out of Band Access to Transfer Files    LS Ph ops 14 MOE CTRECTEEPIE CT TCPTETPE TE ETTTCEC TECETPETCLTER TEE ETT ee TTTTTOTTCrT ae Ce VPrevre ETT Tree TT rrr tree B 1  ABOUT RIMBOSNY arenitos veah EE ET yenas PRT Avena enai undi B 2  The AVION C Oma sirain a AA B 4  Carmena PIE TETS ainiai adyenda D debita danai aeai B 5   AORTA ENG OPIO riain Sind eis sma sel ugantteee aie ee aoenenidaane B 5   PUB RANG oa B 7   ot More INGIMAION sen aaNet B 7  TETAS INPUT ATION OTE ssrin aa Ai B 7  PS PANIES  arinaa EEN B 8  Eror EVO UMASS saine aaa B 8  Canceling a Fik TANSIET aeectarecs cent atigee nua dsiNQin aadealalorpaenegracclanns B 8  Modem Interiace DIfSrenees   sicris sees cece catag sade aiani ainaani ances B 8  Viewing xmodem Log Events              EERE EE E A T peneda B 9   PUA Aiea Connora suorine a E SANES B 9  Out of Band File Transfers from a UNIX Workstation         seesseessseeesseessesssrsssrresrnresrnnes B 10  Openinga CONMOCHOR  sasecdadrneoin ia a aE B 10
202. gure the log autosave feature  based on  descriptions of       wfSerialPortEntry attributes wfSerialPortaAutoSaveNumFiles and  wfSerialPortAutoSave Volume    e Log autosave platform differences  see previous section   2  Open a Technician Interface session with the router     3  Enter with appropriate arguments the command shown for each  attribute  followed by a commit command    4  Close the Technician Interface session when you finish configuring the log  autosave feature     Repeat this procedure for any Bay Networks router on which you need to enable  the log autosave feature     For more explanation of the Technician Interface set and commit commands   refer to    Using the Set Command    and    Using the Commit Command    in  Chapter 2        6 12    114088 Rev  A    Managing Events    Displaying an Events Log File Previously Saved    You can use the log command to display a log file you previously saved  Enter the  following to display a log file  where  lt vol gt  identifies the volume and  lt log_file gt   is the name of the log file you want to display     log   lt vol gt   lt  log_file gt      The system reads the log file  which is stored in binary  and forwards an ASCII  representation to the console     The event format is identical to the format of the current log display     You can use the same optional arguments when displaying a log file as you can to  display or save the current log  Enter the following command to limit the event  types to display     log
203. he    Th m displ   subcommand  e System displays   routes The routing table you select by specifying appropriate command  flags  RIP and EGP routes refresh only on slots that receive  route updates  Route ages may be different on each slot for this  reason    bgp_routes The BGP routing table you select by specifying appropriate  command flags  Lists routes announced to various configured  BGP peers    cache The routing cache you select by specifying appropriate  command flags  The cache subcommand requires an interface  address  For unnumbered interfaces  use 0 0 0 0 with the circuit  option    ospf_Isdb The contents of the ospf_Isdb you select by specifying  appropriate command flags            lt flags gt      lt IP_address gt     lt  P_address prefix gt     a lt area_address gt   A     c lt circuit_no  gt     i  lt BGP_router_ID gt   M    N    p   lt  ocal_peer_adaress    remote peer address gt      S lt source_address gt     s lt slot_number gt        t lt type_number gt      The  lt flags gt  apply to subcommands  as follows        8 64    114088 Rev  A    System Administration             gees Applicable  Flag Filtering Effect Subcommand s    lt address gt  Retrieves data for IP addresses that match your address   routes   bgp_routes    entry in dotted decimal notation cache   ospf_Isdb   lt address prefix gt  Retrieves data for IP addresses with an address mask   routes   bgp_routes      that matches your entry  Specify an IP address in dotted  decimal notation  Specif
204. he maximum  number of times you specify  or until the memory card or diskette drive on  the router becomes full     Accept the default value  0  disabled  or specify the number of times you  want to save the log to a new file     set wfSerialPortEntry 33  lt instance_no  gt   lt option gt   1 3 6 1 4 1 18 3 3 2 11 1 1 33       6 10    114088 Rev  A    Managing Events    Parameter  Autosave Volume    Attribute Name  wfSerialPortAutoSave Volume  Attribute Name  34  Default  None    Options  Any valid memory card volume  slot  number from 1 to 14  or  the    diskette drive designation   a    Function  Specifies the target volume where the system stores new log files saved    through the log autosave feature     Instructions  Specify the memory card or diskette file system volume where the system    will save log files automatically through the log autosave feature     Command  set wfSerialPortEntry 34   lt instance_no  gt   lt option gt   MIB Object ID  1 3 6 1 4 1 18 3 3 2 11 1 1 34    Log Autosave Platform Differences    This section describes platform specific differences you need to consider before  attempting to configure the log autosave feature on any Bay Networks router     Models AFN  ALN  AN  ANH  BLN  BLN 2  BCN  and BNX    Each model  supports only one instance of the wfSerialPortEntry object  For that instance  you  can configure the log autosave attributes wfSerialPortAutoSaveNumFiles and  wfSerialPortAutoSave Volume     Models CN  FN  and LN    Each model supports
205. her or to the same  directory    cd Changes the present working directory    delete Y Deletes a file    dir Y Displays all files in a directory    label Changes the internal label of the diskette    mkdir Creates a directory    mount Makes the diskette drive available    rename Y Renames file and directories    rmdir Removes a directory    save Saves the current software configuration  aliases  or  events to a file  Refer to Chapter 6  7  or 9 for instructions  on the save command    tftp Transfers a file to or from the router    type Y Displays the contents of a file in ASCII or hexadecimal  format    unmount Makes the diskette drive unavailable        The sections that follow describe the commands in detail  They also show how to  use the wildcards     Naming Files and Directories    The rules for naming files and directories are as follows     e Filenames and directory names must start with an alphabetical character  The  remaining characters must be alphanumeric  and may also include the  underscore  _  character  Spaces are not allowed     e DOS directory names and filenames can consist of one to eight characters        114088 Rev  A       Using Technician Interface Software    e You can specify a directory or filename in upper  or lowercase letters   however  in directory listings and other displays  DOS shows all directory and  filenames in upper case     e File extensions are optional  and must be preceded by a dot  They can be from  one to three characters     Also  
206. ial startup     ti cfg A configuration file containing the MIB variables associated with  the default Technician Interface console operating parameters   This file contains the minimal configuration necessary to operate  the router  This file is stored in binary format     Table 5 2 identifies the DOS file attributes that can appear in a DOS directory  display  and their meanings  Refer to    Changing File Attributes    later in this  chapter for more information about file attributes        Table 5 2  DOS File Attributes       Attribute Flag   Meaning                   a Archive needed  d Subdirectory   v Volume ID   s System file   h Hidden                     Read only file       Labeling a Diskette    Use the label command to change or display a diskette   s internal label  Enter the  following to display the internal label     label    Enter the following to change the internal label  where  lt diskette_name gt  is the  new label     label  lt diskette_name gt        114088 Rev  A 5 11    Using Technician Interface Software    The name you enter may be from one to 11 characters  You can use letters   numbers  symbols  or spaces  But you cannot enter the following characters     A a eae Ore    Examples    If you enter  The system    label Displays the internal label of the diskette   label disk1 Writes the internal label disk1 to the diskette     Creating a Directory    Use the mkdir command to create a new directory  Enter the following to create a  new directory  where 
207. ias  and inserts it in both parameter positions  indicated by  1  as shown in the next example      Invokes the copy command associated with the  alias backup  inserts the config value in the  parameter positions indicated by  1 in the   lt alias_value gt   and copies the config file from  Slot 2 to Slot 3        9 4    114088 Rev  A    Managing Aliases    Inserting Character Strings in an Alias    The echo command prints one or more strings of characters to the Technician  Interface console  When the Technician Interface receives the echo request  it  sends the accompanying string or strings back to the console  This command is  used primarily to accompany system responses to alias commands with  meaningful text  This section describes how to issue an echo command and how  to insert the echo command in an alias     Enter the following command with one or more of the following parameters to  submit an echo request     echo       lt siring gt         lt string gt  is any string of characters   echo       lt string gt           l lt string gt              Double quotes are required only when the string contains one or more spaces or  semicolons         Examples    If you enter  The console displays   echo hi hi   echo    IP Input Statistics     IP Input Statistics   echo Hi hello    How are you     Hi hello How are you     To command the system to display a string of characters when responding to an  alias command  you insert an echo command within the  lt alias_value gt      S
208. ication   Manage Secure Mode   Configure search depth for hardware compression  Display a greeting or message before the login prompt  Customize the Technician Interface Welcome message  Record console messages to a file   Enable Internal Clocking Mode   Respond to QENET Underflow Errors   Monitor IP routes  for IP  OSPF  BGP     A table of all the Technician Interface commands and their associated access  levels appears at the end of this chapter  Table 8 4      AN ANH ASN Administration    The following sections apply to the Access Node  AN   Access Node Hub  ANH    and Access Stack Node  ASN  routers  The following guides collectively provide  complete instructions for setting up Netboot and Directed Netboot on an AN   ANH  or ASN router     Installing and Operating BayStack AN and ANH Systems  Installing and Maintaining ASN Routers and BNX Platforms  Connecting BayStack AN and ANH Systems to a Network  Connecting ASN Routers and BNX Platforms to a Network    You need to use the ifconfig and bconfig commands to configure the AN  ANH   and ASN     Use the ifconfig command to configure the router   s initial IP interface to the  network     Use the bconfig command to specify the location and name of the router   s  software image and configuration file        8 2    114088 Rev  A    System Administration    Configuring the Boot Source    To use Directed Netboot  you must use the bconfig command to specify the  following     e The IP address of the server where the router   s
209. ices by also defining at least one remote host entry in  the Syslog table  list  of hosts  and at least one entity filter for the remote  host you define    Set to 2  Disable  if you want to disable Syslog services on the router   set wfSyslog wfSyslogDisable 0  lt 1   2 gt     1 3 6 1 4 1 18 3 3 2 15 1 2       C 30    114088 Rev  A    Parameter   Attribute Name   Attribute Number   Default    Options     Function     Instructions     Command   MIB Object ID     Using Syslog Messaging to Monitor Router    Syslog Operational State  wfSyslogOperState   3   1  active    1  active     2  inactive    Indicates the operational state of the Syslog service on the router  If the  state is active  syslog has been enabled  and is filtering and forwarding  messages to designated hosts  If the state is inactive  Syslog is not filtering  or forwarding messages for any of the following reasons         Syslog has been disabled  wfSyslogDisable   2        No entries exist in the Syslog host table       Noentries in the Syslog host table have been enabled         Noentries enabled in the Syslog host table have any filters that have  been enabled     Examine the value of this attribute to determine the operational state of  Syslog services on the router     get wiSyslog wfSyslogOperState  1 3 6 1 4 1 18 3 3 2 15 1 3       114088 Rev  A    C 31    Using Technician Interface Software    Parameter   Attribute Name   Attribute Number   Default    Range     Function     Instructions     Command   MI
210. ifferences between the Technician Interface and Site Manager  e How to log in and out of the Technician Interface    e Technician Interface scripts  brief overview        114088 Rev  A 1 1    Using Technician Interface Software    Differences from Site Manager    The Technician Interface running on the router  and the Site Manager application  running on a PC or UNIX workstation  both manage the router software  The  Technician Interface differs from Site Manager as follows     e The Technician Interface resides in the router   s operating system kernel and  automatically loads when you boot the router  You do not need to install the  Technician Interface software from a separate medium first  all you need is an  ASCII terminal or Telnet connection to the router  Site Manager  however   resides on a workstation and runs independently of router software     e You establish a Technician Interface session through the router   s console port   using a local ASCII terminal or dialup connection  You establish a Site  Manager session independently and establish a connection in band over the  network     e The Technician Interface scripts let you display information about various  protocols and network services and enable or disable protocols  circuits  lines   and services     e The Technician Interface is a command line interface  it assumes that you are  a network manager who knows the Technician Interface command syntax  the  MIB  and SNMP   The Technician Interface does provide 
211. ignated slot                114088 Rev  A    8 31    Using Technician Interface Software    When you issue the Technician Interface diags command to test and reboot a  specific module  the test and reboot process may take anywhere from 2 1 2  minutes to 10 minutes to complete  depending on the memory configuration of the  board  For example  when you issue the diags command for a FRE 2 processor  module with 8 MB of DRAM  the process takes approximately 3 minutes to  complete  When you issue the diags command for a FRE 2 processor module  with 32 MB of DRAM  the process takes approximately 10 minutes to complete     Turning off the DIAG Indicator LED    The DIAG LED lights during diagnostics and goes out after diagnostics have  determined that the processor module and its associated link module are  functional  If they are not functional  the DIAG LED on the front panel and LED 8  on the FRE processor module daughterboard remain on  If this occurs  make sure  the modules are seated properly in the router and issue the diags command again   Call your Bay Networks Technical Response Center if the DIAG LED does not go  out     If you hot swap a Link Module  the diagnostics do not automatically run and the  Fail LED on that module may remain ON  In this case  you can enter the  following command to switch off the Fail LED     diag  l  lt s ot_number gt   If you do not specify a slot number  the command switches off the Fail LED on all    slots     Displaying the Software Version 
212. ile source and the file destination are down   nonoperational     You can use either a UNIX or a 386 486 DOS remote workstation to transfer files  in band or out of band using Technician Interface xmodem commands  as  operating conditions within your network allow     In Band File Transfers    The tftp command invokes the TFTP software to transfer a file between a Bay  Networks router and another router or host capable of serving tftp file transfer  requests     The TFTP software resides within the IP router  Consequently  you must load the  TFTP software on the router and enable it  refer to Quick Starting Routers and  BNX Platforms for instructions   Also  when you transfer a file to a Bay Networks  router  the TFTP driver of the receiving  client  router uses the value of the  wifTftp 2 0 MIB attribute to determine the target volume  This attribute is set  during the Quick Start procedure  using the debug al alias setvol 65 to target the  DOS volume        5 16 114088 Rev  A    Managing a DOS File System       Caution  The destination system in a file transfer automatically overwrites      any file already on its volume that has the same filename  If enough space does  not exist on the file system for the new file  and the new file has the same name  as an old file  the old file will be destroyed and the new file will be corrupted   This is because TFTP copies the new file over the old and runs out of space  before completing the copy  Be sure to follow the instructions in
213. ill happen if you enter    tftp put 192 xx x xx 2 config new_config  except that the file will be called new_config   However  if you enter   tftp put 192 xx x xx 2 config 3 test_config    the file config will now be called test_config and reside on Volume 3  overriding  whatever is in wfTftp 2 0     The wfTftp 2 0 attribute is set during the Quick Start procedure  using the  debug al alias setvol  lt slot no  gt  to target an NVFS volume or setvol 65 to target a  DOS volume        4 14 114088 Rev  A    Managing a NonVolatile File System             Caution  The destination system in a file transfer automatically overwrites  any file already on its volume that has the same filename  If enough space does  not exist on the file system for the new file  and the new file has the same name  as an old file  the old file will be destroyed and the new file will be corrupted   This is because TFTP copies the new file over the old and runs out of space  before completing the copy  Be sure to follow the instructions in this section to  avoid corrupting the config file        If the destination system has a memory card to which you are transferring a file   we recommend that you compact it first to optimize the space available for the  file  Refer to    Compacting File Space     later in this chapter  for instructions        We recommend that you first copy the file at the source to a new  temporary  filename if the name is the same as an existing filename at the destination     Enter th
214. imeout gt  allowed  A sample message follows     VINES ping  2705682 8003 does not respond       A  lt target address gt  is unreachable message  This message appears if the  local Bay Networks router cannot find the specified address in its routing  table  A sample message follows     VINES ping  2705682 8003 is unreachable       An invalid parameter specified message  This message appears if you  specify an invalid parameter when you issue a ping  vines command  A  sample message follows        VINES ping  invalid parameter specified    A resource error message  This message appears if the local Bay Networks  router cannot allocate a buffer for the request because none is available  A  sample message follows        VINES ping  resource error    A VINES service is not running message  This message appears if the  VINES service is not enabled on the router  A sample message follows              VINES ping  VINES service is not running       114088 Rev  A    3 19    Using Technician Interface Software    Examples     If you enter   ping  vines 2705682 8003    ping  vines 2705682 8003  p    ping  vines 2705682 8003   t3  r8    The system     Pings the device at the VINES address  2705682 8003 and waits up to 5 seconds  default   for a response  The console displays one of the fol   lowing messages    VINES ping  2705682 8003 is alive   VINES ping  2705682 8003 does not respond  VINES ping  2705682 8003 is unreachable       All of the above  but displays the intervening hop  add
215. in privileges   The network administrator must first  enable the feature on the router      We recommend SecurID authentication for routers that require the highest level of  protection from unauthorized Telnet access to the Technician Interface  To support  Technician Interface login via SecurID  you must have a Security Dynamics  SecurID ACE   server system installed on your IP network  Routers with the  SecurID ACE client enabled communicate with the SecurID server during each  user authentication sequence     For more information about SecurID server systems  contact your Bay Networks  sales representative     SecurlD Login and PIN Assignment Dialog    This section describes more fully the interface dialog you may encounter when  attempting a login to a router configured with SecurID client software  Normally  you can open a Technician Interface session as long as you enter a valid  PASSCODE  your PIN  followed by the current card code   If you do not have a  valid SecurID PIN when you attempt the login  you may receive another series of  prompts for automated PIN assignment        Note  The SecurID administrator for your network must first configure the  SecurID system to allow you to receive a PIN through the SecurID client  software on the router           1 6    114088 Rev  A    Introducing the Technician Interface    Figure 1 1 shows the complete authentication procedure and interface dialog you  may encounter when attempting a login to a router configured with Secur
216. in upper case  For example  if you enter    copy a b  exe 2     the system copies all files that begin with the letter b and end with the file  extension  exe to NVFS in the format BXXXXXXX EXE  where XXXXXXX  represents the missing characters in the filename     Transferring a File    Depending on conditions existing within your network  you can use either of two  methods of performing file transfers to and from Bay Networks routers and  remote workstations     The methods are    e In band  using Technician Interface tftp commands and a route through your  high speed IP network     e Out of band  using Technician Interface xmodem commands and a route  through a lower speed  dial network        114088 Rev  A    5 15    Using Technician Interface Software    You can transfer a file in band whenever    e You can dial in to the Technician Interface port of a router you choose as the  source or destination for a file transfer operation    e An operational IP routing path exists through your network  between the file  source  a router or a remote workstation  and the file destination  also a router  or a remote workstation     Out of band file transfers are typically a less efficient but sometimes useful  method  for example  for router diagnosis and management     You use this method most beneficially when    e You can dial in to the Technician Interface port of a router you choose as the  source or destination for a file transfer operation    e All IP routing paths between the f
217. ine to re enable a delayed boot event  anytime after disabling it in the router configuration     BN  3   set wfRuiBootEntry wfRuiBootDisable  lt wfRuiBootDateAndTime gt   1 commit       8 20    114088 Rev  A    System Administration    Modifying Attributes for Scheduled Delayed Boot Events  You can modify    e The name of the router software image file    e The name of the router configuration file    You cannot directly modify the date  time  or UTC offset  attribute  wfRuiBootDateAndTime  for a scheduled boot event  If you need to change any  of these for an existing entry in the RUIBOOT table of delayed boot events   proceed as follows     e Delete the entry from the RUIBOOT table of delayed boot events    e Create a replacement entry    Deleting Delayed Boot Events    Delete a delayed boot event as follows     BN  3   set wfRuiBootEntry wfRuiBootDelete  lt wfRuiBootDateAndTime gt  2 commit    You can save your change s  to the current configuration file  as follows     BN  3   save config  lt vol gt   lt filename gt      lt vol gt  is the NVFS Flash volume on which you want to store a copy of the current   modified  configuration file on the router      lt filename gt  is the name you assign to the router   s current configuration file     Deleting Delayed Boot Services from the Router    If you want to delete delayed boot services from the router  change the setting for  wfRuiBootDelete  a global parameter attribute  as follows     BN  3   set wfRuiBoot wfRuiBootBaseDel
218. ines Per Screen  wfSerialPortLinesPerScreen  13   24 lines   1 to 512 lines    Specifies the maximum number of lines displayed on the console screen   before the system displays the More prompt  The screen may override the  number of lines you specify if Telnet can negotiate the window size with  the remote client     Set according to your console requirements   set wfSerialPortEntry 13  lt port_no  gt   lt option gt   1 3 6 1 4 1 18 3 3 2 11 1 1 13    More Enable  wfSerialPortMoreEnable  14   1  Enable    1  Enable    2  Disable     Specifies whether the Technician Interface pauses after each screen fills  with data     Select 1  Enable  to configure the Technician Interface to pause after each  screen fills with data  Select 2  Disable  to configure the Technician  Interface not to pause after each screen fills with data     set wfSerialPortEntry 14  lt port_no  gt   lt option gt   1 3 6 1 4 1 18 3 3 2 11 1 1 14       114088 Rev  A    Using Technician Interface Software    Parameter   Attribute Name   Attribute Number   Default    Options     Function     Instructions     Command   MIB Object ID     Prompt  wfSerialPortPrompt  15        Any string of up to 19 keyboard characters except for control key  sequences     Specifies the character string used as the Login prompt on the Technician  Interface console screen     Accept the default     or specify a different character string  If you  include spaces  enclose this string in quotes     set wfSerialPortEntry 15  lt port_no
219. infinity     Specifies the maximum number of login attempts you can make before  the Technician Interface disconnects the Telnet session  This parameter is  valid only when Modem Enable is set to 1  Enable      Accept the default value  3  or specify a different value   set wfSerialPortEntry 19  lt port_no  gt   lt option gt   1 3 6 1 4 1 18 3 3 2 11 1 1 19    Login Script Search Path   wfSerialPortInitialSearchPath   28   2    A string of valid volume numbers  depending on your login ID  Manager  or User     Specifies a list of file system volumes for the system to search if the  manager   s login script file or the user   s login script file does not contain a  volume specification  The environment variable PATH is set to this string     Accept the default value  2   to search for the Technician Interface  autoscript files on Volume 2  Otherwise  enter a text string that uses the  format      lt vol gt      lt vol gt            For example  enter    A  1  2     or     2  4  6  9       set wfSerialPortEntry 28  lt port_no  gt      lt option gt        1 3 6 1 4 1 18 3 3 2 11 1 1 28       2 14    114088 Rev  A    Parameter   Attribute Name   Attribute Number   Default    Options   Function     Instructions     Command   MIB Object ID     Configuring the Console Port    Manager   s Login Script   wfSerialPortManagerAutoScript   29   automgr bat   The name of the manager   s login script file    Executes the manager   s login script file automatically at login     If you did not
220. ion and Throughput  sirsiran iaaa an 8 56  WOP Search Deptt ANTONIS cornet sceussancty siaaa a ni raiat 8 57   Displaying a Greeting or Notice Before the Login Prompt    sssssrssresrsrreressisressrrsrrrens 8 59   Customizing the Technician Interface Welcome Message          2   cccceeeeeeeeeeteeeeeeneeteees 8 59   Recording Console Messages to a FIE sisiraan aaa 8 60   Enabling Intetival Clocking Mode occ seccasssdocteriauccdermaseaviusneeea landaaacinacess 8 62   Responding to GENET Underilow PRORS  1s cciciisscietcad wittesadiismiatotizceerieadigieleaideneeaiieds 8 62   NCTM Tei ROES arine E ema ae ee iaalis  8 63  Pontio TNES eae renee en een eee eee meery rrr cee rc ret emt rrereny epoca ye metere terse reser ace te  8 72  Interface Cache    ssassn yanai EA EE E E E jarning niarra URNS 8 73  DNS ST CANE raae ENa AE ESR 8 74  NUT KE e its A NE A N E A TENT  8 75  OPF GHk State DanS Oana N nena eee 8 76  Determining Gipson Numbers rinioiiirniini ai niaan EA RRA 8 76   Technician Interface Commands and Access Levels              E Sad EE T 8 78   Chapter 9  Managing Aliases   Creating and Displaying am AWAS oireissa aa iiaeia daia a 9 2  neering Parameters MANATI arcena aai AE 9 3  Inserting Character Strings man ANAS   cccisriens Godan danse 9 5   Debugging Aliases             cceeeee coated TEE AE ncaa E E T Aidaan iieiea ee 9 7   DSHS TING ty Alas Korm MEMON cessie a Ra 9 7   Sanna Aineesta a FE iaa anadai A lawn da anaa 9 8   kasd Aldses TOn A FIE sarina a n a 9 9   Debu
221. ity of a remote device running the IP   IPX  OSI  VINES  AppleTalk  or APPN protocol  Although we use the term     ping    to refer to the action of testing the reachability of a remote device  our  implementation of ping is different for each protocol  The following sections  describe    e The procedure the router uses to ping a remote device running a given  protocol    e The syntax of the ping command for each protocol    e The possible messages displayed when you issue the ping command       Note  The ping command is not case sensitive           114088 Rev  A 3 7    Using Technician Interface Software    IP Ping    When you issue the ping command for IP  the ping program sends an Internet  Control Message Protocol  ICMP  echo request to the remote IP address you  specify  The remote device responds if it can be reached  and the console displays  the response or the result of the request     Enter the following to ping a remote device running IP     ping  ip  lt  P_address gt    t lt timeout gt     r lt repeat_count gt     s lt size gt     p     a lt address gt     v      lt IP_address gt  is the required IP address  in dotted decimal notation  of the remote  device       t lt timeout gt     r lt repeat_count gt     s lt size gt     p    a lt address gt     v  are  optional  These parameters are as follows      lt timeout gt  is the number of seconds for each ping to time out  If the system  receives a response to a ping after it has timed out  the system does not send an 
222. ject groups and attributes     Use the commit command  described in the next section  to notify the software  services of the MIB changes accomplished with the set command  Then  to copy  the changes you make to a configuration file  use the save command  described in       Saving the Configuration            Note  Be sure to enter commit after entering the set command  see the next  section for instructions            114088 Rev  A 7 7    Using Technician Interface Software    Examples     If you enter     Any one of the following     set wiSnmp wfSnmpDisable 0 1  set 1 3 6 1 4 1 18 3 5 3 5 1 1 0 1  set wfSnmp 1 0 1    set  wflpInterfaceEntry 2 192 32 13 99 32    Both of the following   set wfBrTp 2 0 1  set wfBrStp 2 0 1    Both of the following   set wfBrTp 2 0 2  set wfiBrStp 2 0 2    Committing MIB Sets    The system     Changes the value of wfSnmp wfSnmpDisable 0   1 3 6 1 4 1 18 3 5 3 5 1 1 0  to 1 to enable SNMP     Changes the value of wflIpInterfaceEntry WflpInter   faceEnable 192 32 13 99 to 2  This disables IP for  the interface whose IP address is 192 32 13 99 and  whose circuit is 3     Changes the values wfBrTp wfBrTpBaseEnable 0  and wfBrStp wfBrStpBaseEnable 0 to 1 to enable  the Translating Bridge and Spanning Tree     Disables the Translating Bridge and Spanning Tree     The commit command causes all previously entered set commands to take effect   When you enter commit  the system notifies all software services whose  configuration parameters have changed 
223. kstation  Wfterm enables you to    e Dial in to the Technician Interface port of a router     e Log in to the Technician Interface for that router  start a Technician Interface  session      e Initiate Technician Interface commands   For out of band file transfers to and  from a router  you run the xmodem commands described in the section     About xmodem         e Close the connection between the workstation and the router     Before you use Wfterm and enter any xmodem command  you must  e Open Wfterm  from its icon in the Site Manager program group     e Enter Wfterm setup information  local modem settings and the phone number  of a target router        114088 Rev  A B 17    Using Technician Interface Software    Opening Wfterm    You can open Wfterm by double clicking on its icon in the Site Manager icon  group  as shown in Figure B 2     site Manager    ley       Figure B 2  Wfterm Icon    Wfterm opens the window shown in Figure B 3        Wellfleet Communication Terminal Program  File Modem Phone File Transfers Help             Figure B 3  The Wfterm Base Program Window       B 18 114088 Rev  A    Using Out of Band Access to Transfer Files    From this window  you can    e Check current settings or enter new settings for the interface to the modem  locally attached to your workstation     e Initialize the locally attached modem with the current settings     e Enter a telephone number  initiate autodialing  and open a connection to a  remote target router     e Log in to 
224. l not make the resulting software available for use by any third party     Neither title nor ownership to Software passes to licensee     Licensee shall not provide  or otherwise make available  any Software  in whole or in part  in any form  to any  third party  Third parties do not include consultants  subcontractors  or agents of licensee who have licensee   s  permission to use the Software at licensee   s facility  and who have agreed in writing to use the Software only in  accordance with the restrictions of this license     Third party owners from whom Bay Networks has acquired license rights to software that is incorporated into  Bay Networks products shall have the right to enforce the provisions of this license against licensee     Licensee shall not remove or obscure any copyright  patent  trademark  trade secret  or similar intellectual  property or restricted rights notice within or affixed to any Software and shall reproduce and affix such notice on  any backup copy of Software or copies of software resulting from modification or combination performed by  licensee as permitted by this license        114088 Rev  A iil       Bay Networks Software License  continued     10     11     12     Licensee shall not reverse assemble  reverse compile  or in any way reverse engineer the Software   Note  For  licensees in the European Community  the Software Directive dated 14 May 1991  as may be amended from time  to time  shall apply for interoperability purposes  Licensee
225. ld see the message    File Transfer Aborted     If you are finished transferring files from the router to the Site Manager  workstation  enter logout at the Technician Interface command line  prompt in the Wfterm base program window     At the conclusion of file transfer operations  you can close the connection between  the workstation and the router   Refer to the later section     Closing the  Connection         Transferring Files from DOS Workstation to Router    To transfer one or more files from your Site Manager workstation to a router  you  must    Log in to the Technician Interface of the desired router   Refer if necessary to  the earlier section     Logging In to the Router   s Technician Interface               Select the disk volume or memory card    volume    that should receive the file  you want to transfer from your workstation     Set the receiving Technician Interface into binary receive mode   Set the sending Wfterm utility into binary send mode   Select the disk volume  directory  and file you want to send to the router     Trigger or initiate the file transfer from workstation to router     Proceed as follows to transfer one or more files from workstation to router     1     At the Technician Interface command line prompt  enter a cd command  to designate the disk volume or memory card    volume    that should  receive the desired file from the workstation     For example   cd a   designates diskette Volume a   or    cd 2   designates a memory card volume
226. le No  77850 only for BLN  BLN 2  and BCN routers         114088 Rev  A B 9    Using Technician Interface Software    Out of Band File Transfers from a UNIX Workstation    This section provides the procedures you need to  e Open a dial connection between your workstation and a specific router  e Transfer files to or from a router    e Close  hang up  the connection between the workstation and router    Opening a Connection    On a SunOS platform  you can use the Terminal Interface Program or tip  command to    e Establish a connection to the Technician Interface port of a router  e Initiate file transfers to and from the router    e Close the connection between the remote workstation and the router    For detailed information on how to set up and use tip and its related files   etc   phones and  etc remote  on a Sun workstation  enter man tip at the UNIX  command line prompt  The workstation should respond by displaying all of the  information that is available on tip in the UNIX online command reference  manual  You enter modem interface settings into the  etc remote file  You enter  dial information  a telephone number  in the  etc phones file     Transferring Files from Router to UNIX Workstation    To transfer one or more files from a Bay Networks router to your UNIX  workstation  use the following procedure     1  At the UNIX command line prompt  enter a cd command to change from  the current directory to the directory that should receive the files you  want to transfer 
227. llows     IPX ping  O0OxAB12 0xCD1234 is alive    e A does not respond message  This message appears if the IPX address of the  target device is resolved  but the system does not receive an IPX reply packet  from the target device within the  lt timeout gt  allowed  A sample message  follows     IPX ping  O0xAB12 0xCD1234 does not respond    e    target address is unreachable message  This message appears if the  local Bay Networks router cannot find the specified network address in its  table of IPX networks     IPX ping  O0xAB12 0xCD1234 is unreachable       114088 Rev  A    3 13    Using Technician Interface Software    e An invalid parameter specified message  This message appears if the  network or host address is all Os  all Fs  or not a valid IPX address  A sample    message follows     IPX ping  invalid parameter specified    e A resource error message  This message appears if the router cannot  allocate a buffer for the request because none are available  A sample message    follows     IPX ping  resource error    Examples     If you enter  on one line    ping  ipx 0xAB12 0xCD1234    ping  ipx 0xAB12 0xCD1234  t3  r8    The system     Pings the device at the IPX address  OxAB12 0xCD1234 and waits up to 5 seconds   default  for a response  The console displays  one of the following messages    IPX ping  O0xAB12 0xCD1234 is alive   IPX ping  OxAB12 0xCD1234 does not respond  IPX ping  OxAB12 0xCD1234 is unreachable    Pings the device at the IPX address  OxAB12 0xCD123
228. logEntFltrWarningMap  13   5  WARNING     1  EMERG    2  ALERT    3  CRIT    4  ERR    5  WARNING     6  NOTICE    7  INFO    8  DEBUG     Maps router event messages with a severity level of warning to a UNIX  system error level that Syslogd recognizes  Table C 1 describes each of  these error levels     We recommend accepting the default UNIX system error level for this  severity level  To map this severity level to a different UNIX error level   set wfSyslogEntFltrWarningMap to the error level you want     set wfSyslogEntFlitrEntry wfSyslogEntFltrWarningMap    lt host_IP_address gt    lt entity_code gt   lt filter_index gt   lt 1 2 3l4l5l  l7 8 gt     1 3 6 1 4 1 18 3 3 2 15 4 1 13    Info Map  wfSyslogEntFltrInfoMap  14   7  INFO     1  EMERG    2  ALERT    3  CRIT    4  ERR    5  WARNING     6  NOTICE    7  INFO    8  DEBUG     Maps router event messages with a severity level of info to a UNIX  system error level that Syslogd recognizes  Table C 1 describes each of  these error levels     We recommend accepting the default UNIX system error level for this  severity level  To map this severity level to a different UNIX error level   set wfSyslogEntFltrInfoMap to the error level you want     set  wfSyslogEntFitrEntry wfSyslogEntFlitrinfoMap  lt host_ P_address gt     lt entity_code gt   lt filter_index gt   lt 1l2 3l4l5l  l 78 gt     1 3 6 1 4 1 18 3 3 2 15 4 1 14       114088 Rev  A    C 45    Using Technician Interface Software    Parameter   Attribute Name   Attribute Nu
229. m  v 2 frediag exe 3    prom  w 2 freboot exe 3    Any one of the following    prom  w 2 frediag exe 2  3  4 5  prom  w 2 frediag exe 2345  prom  w 2 frediag exe 2  3 5  prom  w 2 frediag exe 2 5    The system     Verifies the contents of the diagnostics  PROM on Slot 3 against the contents of the  frediag exe file on Volume 2     Erases the bootstrap PROM on Slot 3 and  copies the contents of the freboot exe file  on Volume 2 to the PROM on Slot 3     Erases the diagnostics PROMs on Slots 2   3  4  and 5 and copies the contents of the  frediag exe file on Volume 2 to the PROMs  on Slots 2  3  4  and 5        114088 Rev  A    8 43    Using Technician Interface Software    Viewing the Load Addresses and Sizes of Applications    The loadmap command allows you to view the load address and size of each  dynamically loadable application     Enter the loadmap command with one or more of the following optional  parameters to view the addresses and sizes of the applications located on a  specified slot or slots   lt s ot_no  gt  is the number of the slot where the applications  are located  you can also enter the keyword all to view the applications for all  slots    lt filename gt  is the name of the file to which you want to direct the output     loadmap   lt s ot_no  gt     lt filename gt    loadmap   lt s ot_no  gt   lt slot_no  gt     lt filename gt    loadmap   lt s ot_no  gt   lt slot_no  gt          lt filename gt      If you enter the loadmap command without entering a slot 
230. mand  displays un  IP cct  lt n gt   where n is the number of the circuit on  which the interface has been configured     Org Origin of the path information  EGP  IGP  or INCOMPLETE     Peer Rem Addr The remote address of a BGP peer    Proto Routing method through which the router learned this route  Other   Local  Netmgmt  ICMP  EGP  BGP  Hello  RIP  IS IS  OSPF  or  BGP    Seq Nbr A signed 32 bit integer used to detect old and duplicate link state    advertisements  The larger the sequence number  when compared  as signed 32 bit integers  the more recent the advertisement     SI  or  Slot Number of the slot on which the network address mask is  configured   Weight Weight value assigned to the route  displayed only if you specify all  routes   A    Routing Tables    Each slot on the router maintains an independent routing table  or    routing pool       The table is the default  but not initial  source for a slot to look up routing  information necessary to forward locally received packets     Each routing table continuously receives  from IP and all other nonmulticast IP  protocols configured on the router  updates on routes added  changed  or deleted  in your network  By means of this continuous  high speed  internal update  mechanism  the system synchronizes the contents of routing tables on all slots    The only exceptions to this rule occur during the first 10 seconds of a router boot  or slot reset operation         8 72 114088 Rev  A    System Administration    Unlike
231. mber   Default    Options     Function     Instructions     Command     MIB Object ID     Parameter   Attribute Name   Attribute Number   Default    Options     Function     Instructions     Command     MIB Object ID     Trace Map  wfSyslogEntFltrTraceMap  15   8  DEBUG     1  EMERG    2  ALERT    3  CRIT    4  ERR    5  WARNING     6  NOTICE    7  INFO    8  DEBUG     Maps router event messages with a severity level of trace to a UNIX  system error level that Syslogd recognizes  Table C 1 describes each of  these error levels     We recommend accepting the default UNIX error level for this severity  level  To map this severity level to a different UNIX error level  set  wfSyslogEntFltrTraceMap to the error level you want     set  wfSyslogEntFitrEntry wfSyslogEntFltrTraceMap  lt host_ P_address gt     lt entity_code gt   lt filter_index gt   lt 1l 2 3l4l5l  l 78 gt     1 3 6 1 4 1 18 3 3 2 15 4 1 15    Debug Map  wfSyslogEntFltrDebugMap  16   8  DEBUG     1  EMERG    2  ALERT    3  CRIT    4  ERR    5  WARNING     6  NOTICE    7  INFO    8  DEBUG     Maps router event messages with a severity level of debug to an error  level that UNIX Syslogd recognizes  Table C 1 describes each of these  error levels     We recommend accepting the default UNIX system error level for this  severity level  To map this severity level to a different UNIX system error  level  set wfSyslogEntFltrDebugMap to the error level you want     set  wfSyslogEntFitrEntry wfSyslogEntFlitrDebugMap  lt host_ 
232. messages from Syslog on the router        Next  add an entity filter for the host entry you just added     Task 6  Adding an Entity Filter for a Remote Host    Once you define a host in the Syslog host table  add  define  an entity specific  message filter for the host     If this is not the first filter for a given entity and remote host pair  first obtain a  list of filter instances  as follows     list  i wfSyslogEntFltrEntry    From the resulting list of instance IDs  of the form   lt host_IP_address gt   lt entity_code gt   lt filter_index gt    determine the next   lt filter_index gt  number available to assign to a new filter  for a given   lt host_IP_address gt   lt entity_code gt  pair  The number you assign to the new  filter will have a value of  1 higher than the highest  lt filter_index gt  in the list     Now proceed to Step 1        114088 Rev  A    Using Syslog Messaging to Monitor Router    Create a new filter for the desired entity and remote host pair by first  creating an entry in the Syslog Entity Filter Table  as follows        set WfSyslogEntityFilterTable WfSyslogEntFltrDelete    lt host_IP_address gt   lt entity_code gt   lt filter_index gt  1 commit     lt host_IP_address gt  is the IP address of the desired remote host  a  management workstation       lt entity_code gt  identifies the software entity for which you want Syslog to  forward event messages to the remote host at the  lt host_IP_address gt       lt filter_index gt  is the next available i
233. mmand to reset one or more slots  following a    graceful crossnet shutdown    on  the same slots  With this option  the system notifies the remote end of any  associated Frame Relay Switch PVCs to expect a loss of connectivity   The BNX  sends to the remote end of each PVC an update message packet with the A bit set  to   inactive            To initiate a graceful shutdown followed by a system or slot reset  enter the  appropriate command at the Technician Interface prompt     The system performs    If you enter  a graceful shutdown  and reset   reset  shutdown On all slots   reset  shutdown   lt s ot_no  gt   One one slot   reset  shutdown   lt s ot_no  gt   lt slot_no  gt   On a range of slots   reset  shutdown   lt s ot_no  gt   lt slot_no  gt          On a list of slots    The console displays the following message during shutdown   Shutdown in progress    If shutdown succeeds  the console displays the message   Shutdown is complete    Upon issuing this message  the system performs the reset operation   If shutdown fails  the console displays the message   Continue shutdown   Y N     If you choose    N     no  at this time  the system terminates shutdown and displays  the following message on the console device     Shutdown aborted     Upon issuing this message  the system performs the reset operation        8 28    114088 Rev  A    System Administration    If you choose instead to    Continue            Y      the system continues the shutdown  attempt  We recommend tha
234. n  you  encounter up to three levels of router access security     e User Manager Login  Telnet and console access   e Password Authentication  Telnet and console access     e SecurID Authentication  Telnet access only     User Manager Login    To access the Technician Interface on a Bay Networks router  you must enter one  of the following commands at the Login prompt that appears in your Telnet or  console display     Login  User  or    Login  Manager       114088 Rev  A    Using Technician Interface Software       Note  You must press the return key after every Technician Interface  command  Technician Interface commands and passwords are case sensitive   Use upper  and lowercase as indicated        The User login entry allows you to enter read only commands  These only read  information from the router     The Manager login entry allows you to enter any Technician Interface commands   Certain commands read information from the router and or write information to  the router     We recommend limiting Manager access to network managers and the Bay  Networks Technical Response Center  The section    Technician Interface  Commands and Access Levels    in Chapter 8 lists all of the Technician Interface  commands and their associated access requirements        Login with Password    If you enable password authentication on a router  you must also enter a password  after the Password prompt that appears following your login entry     Login   lt User  Manager gt   Password   lt pa
235. n Interface Scripts guide for information on aliases and  script files  Use vi or another text editor to edit automgr bat or autouser bat on  your workstation  Then transfer the files via TFTP or XMODEM to the router  where the scripts are located     For instructions on using TFTP on a non volatile file system  see Chapter 4  For  instructions on using TFTP on a DOS file system  see Chapter 5  For instructions  on using XMODEM  see Appendix B        114088 Rev  A 2 21    Overview    Chapter 3  Using Operating Commands    The basic Technician Interface operating commands allow you to   e Display online help   e Pause and scroll text on a screen   e Abort a command   e Repeat the command last entered   e Repeat a command recently entered   e Load a command into memory   e Ping a remote IP  IPX  OSI  VINES  AppleTalk  or APPN address  e Display the ATM ARP table for a specific IP interface address    Technician Interface commands  passwords  and filenames are case sensitive  You  must press the return key to issue a Technician Interface command     If you issue a command using an incorrect syntax  the Technician Interface  displays the term usage  and the correct syntax to help you     Refer to    Conventions    in the preface for conventions used in this documentation  and the Technician Interface online help for information on Technician Interface  commands        114088 Rev  A    3 1    Using Technician Interface Software   Displaying Online Help  Use the help command to dis
236. n other words   you must specify the same IP address for the TFTP host for both  files         lt TFTP_pathnames gt  _   Specifies the complete pathname of the software image or  configuration file on the host         d Resets the default values for the software image or configuration  file     The command bconfig  d image tells the router to look for the  image file locally  and nullifies the IP address and pathname for  the file     The command bconfig  d config tells the router to obtain the  configuration file over the network  and nullifies the IP address  and pathname for the file     Without the IP address and pathnames  the router resorts to  using Netboot rather than Directed Netboot  However  if you want  to get one file locally while using Directed Netboot for the other  file  you can use the bconfig commands as the following  examples show     bconfig image local  bconfig config network 21 3 5 62  usr anstartup config    or    bconfig image network 21 3 5 62  usr mykernel exe  bconfig config local                   8 4 114088 Rev  A    System Administration    Configuring Initial Interfaces and Netboot Operation    You can use the ifconfig command to do the following     e Configure the router   s initial IP interface to the network  You also use the  same procedure to configure other synchronous interfaces for the network  booting procedure     e Configure Ethernet interfaces for the network booting procedure     e Enable or disable network booting on an interfac
237. n this  appendix    Deleting Syslog from the Router    If you want to delete Syslog from the router  change the setting for  wfSyslogDelete  a global parameter attribute  as follows       set wiSyslog wfSyslogDelete 0 2 commit       114088 Rev  A C 25    Using Technician Interface Software    Example Syslog Configuration    The following is an example of a Syslog configuration procedure when    Your management workstation has an IP address of 192 32 6 14     You want to receive at your management workstation messages for all  software entities running on a particular Bay Networks router   This is a  wildcard configuration scenario      You want to create and enable Syslog on a model BLN router     You want to capture all fault  warning  and debug level messages from the  router     You want to capture only messages logged on Slots 2 to 4 of the router     Proceed as follows     1     Define a slot mask for Syslog on the router      set wfProtocols wfSYSLLoad 0 0x7FFE0000 commit    The hexadecimal number 7FFE0000 converts to the binary number  0111 1111 1111 1110 0000 0000 0000 0000  The most significant bit  position of the binary number represents Slot 1  The bit positions in  descending order of significance represent Slots 2  3  4  etc     Create the Syslog base record on the router       set wfSyslog 1 0 1 commit   Create a host record for 192 32 6 14       set wfSyslogHostTable wfSyslogHostEntry 1 192 32 6 14 1 commit       Note  When you create a host record  the log fa
238. nable or disable  The  slot corresponds to the ASN slot ID  which can be 1 through 4  If you omit this  argument  ifconfig uses the current slot      lt interface gt  Specifies the type of IP connector you are enabling or disabling  For the AN  and ANH  use com1 or com2  for synchronous media  or xevr1  for Ethernet  media      For the ASN  use    xevr  lt network_module_no  gt   lt port_no  gt     or    com  lt network_module_no  gt   lt port_no  gt        8 8    114088 Rev  A       System Administration    Booting the Router    The Technician Interface provides the following commands for booting     The boot command warm starts the entire system  Pressing the Reset button  on the front panel of the router initiates the same procedure     You can override the default router software image and configuration by  specifying an alternative router software image and an alternative  configuration file when entering the boot command     The reset command warm starts a single processor module or the entire  system with the router software image and configuration currently in use   Resetting the entire system is equivalent to booting it     The diags command cold starts a single processor module or the entire  system  The cold start consists of CPU  backbone  and link diagnostics  and a  reboot  If you do not enter a slot number  the system tests and reboots all slots     How the Router Boots    This section describes how each processor module in the router obtains its router  softwa
239. nction     Instructions     Command   MIB Object ID     Host Operational State  wfSyslogHostOperState  7   2  inactive host    1  active    2  inactive     Indicates the operational state of this Syslog host entry on the router  If  the state is active  Syslog is filtering and forwarding messages to the host  at the IP address for this entry   lt wfSyslogHostDest gt    If the state is  inactive  Syslog is not filtering or forwarding messages for any of the  following reasons         Syslog has been disabled  wfSyslogDisable   2         This entry in the Syslog host table has been disabled       This entry has no configured filters        No filter entries for this host are active         Too many Syslog host entries are already active   The number of  configured hosts is greater than the value of wfSyslogMaxHosts      Examine the value of wfSyslogHostOperState to determine whether or  not Syslog is forwarding any messages to the host associated with this  wifSyslogHostEntry   lt instance_id gt      get wiSyslogHostEniry wfSyslogHostOperState  lt wfSyslogHostDest gt   1 3 6 1 4 1 18 3 3 2 15 2 1 7       C 36    114088 Rev  A    Using Syslog Messaging to Monitor Router    Entity Filter Parameters    This section describes the parameters you can configure for each filter  entry  you  add to the Syslog entity filter table     Parameter   Attribute Name   Attribute Number   Default    Options     Function     Instructions     Command     MIB Object ID     Parameter   Attribute Nam
240. nd  gt    reset reset  lt S ot_no  gt  reset  lt Slot_no  gt   l  Router V  ALN Warm boot all slots  Warm bootthe designated   Cold boot the designated  CN e No diagnostics slot  slot   FN e Load new image   No diagnostics e Run diagnostics on the  LN e Initialize new image e Load new image on designated slot   multislot e Retain log info on all local slot e Load new image on the  routers  Slots e Initialize new image on designated slot  local slot e Initialize new image on  e Retain log info on the designated slot  designated slot e Lose log info on the  designated slot  BLN Warm boot all slots  Warm bootthe designated   Warm boot the designated  BLN 2 e No diagnostics slot  slot   BCN e Load new image   No diagnostics e No diagnostics   multislot e Initialize new image    Load new image on e Load new image on the  routers  e Retain log info on all designated slot designated slot  slots e Initialize new image on     Initialize new image on  designated slot the designated slot  e Retain log info on e Retain log info on the  designated slot designated slot             or with the same slot on a single slot system     Note  If you reset the slot in which the Technician Interface is running  the  Technician Interface resets with the next available slot on a multi slot system           114088 Rev  A    8 27    Using Technician Interface Software    Resetting After Crossnet Shutdown Notification  BNX Only     On BNX platforms only  you can use the  shutdown option of the reset  co
241. ndex number you can assign to a filter for  the desired entity and remote host pair     After you create an entity filter for a specific host  define  e Anevent number  or range  and a slot number  or range   or     e A severity mask and a slot number  or range        Note  The filter remains inactive until you define the event and slot number s    or the severity mask and slot number s         Set entity filter attributes  as follows     a  To define by event number s  the event messages you want Syslog to  select and forward to a specific remote host        set wfSyslogEniFlitrEntry wfSyslogEntFlitr_ogEvtLowBnd    lt host_IP_address gt   lt entity_code gt   lt filter_index gt   lt 0   255 gt        set wfSyslogEniFlitrEntry wfSyslogEntFltrLogEvtUppBnd    lt host_IP_address gt   lt entity_code gt   lt filter_index gt   lt 0   255 gt        commit    If you do not want to define filtering by event number s   accept the  default values for event number lower bound  0  and upper bound  255     Go to Step 2b   Accepting these default values causes Syslog to use only  the severity and slot mask criteria for selecting and forwarding messages     b  Define a severity mask only if you did not already define an event  number  or event number range   If you defined an event number or  number range  Syslog ignores any severity mask for this filter        114088 Rev  A    Using Technician Interface Software    To define by severity levels the event messages you want Syslog to select  an
242. ndexes multiple lines over one connector  such as on the MCT1  board  This is equivalent to    channel    for MIB objects using     slot conn chan       format  For boards that support only 1 line per  connector  chan   0    type  0 99  The interface type identifier  for example  CSMACD and SYNC     These are the same as the constants defined in the CCT_NAME  portion of the MIB  For example   CIRCUIT_TYPE_CSMACD  1 10   CIRCUIT_TYPE_SYNC  2 20   CIRCUIT_TYPE_T1  3 30   CIRCUIT_TYPE_E1  4 40   CIRCUIT_TYPE_TOKEN  5 50   CIRCUIT_TYPE_FDDI  6 60   CIRCUIT_TYPE_HSSI  7 70    slot  1 99  For most Bay Networks routers  each numbered slot holds a CPU  module and a link module  For model ASN routers  this number  represents the chassis unit identifier  which contains a CPU and  drives up to four link modules   You set the ASN slot number by  means of a thumbwheel on the chassis  The thumbwheel has  settings that range from 1 to 4    mod  1 9  The module number has a default value of 1 on most Bay Networks  routers  which corresponds to the first  only  module on a slot  The     mod    can be any number from 1 to 9 for a model ASN router  where  one CPU supports up to four link modules    conn  1 16  Connector number for a given media  It is given 2 digits to          accommodate 16 port boards              114088 Rev  A    Using Technician Interface Software    Example     Line number   102101    chan   1  type  0  slot   2  mod   1    conn   01    This is the only line on the first 
243. ng Quitting the Wfterm Program   0          ccsscceeeeeeeeseeeeeeeeeeseaeeeeeneees B 31  Figure C 1  Syslog and Syslogd Operation               0 6 A E lt eracaa e C 3  Figure C 2  Router Event Message Filtering for One Host              cccceeeeeeeeeeeeeseeee C 5  Figure C 3  Syslog Message Encapsulation               ccccccceseeeeseeeeeeseeseeneeeseeeeeeneeeens C 9  Figure CA   Syslog Message COmmostion ciixccecicdssercscticecsendinietsntetieaaleesainieas C 10    114088 Rev  A XV       Tables    Table 4 1  Nyro S751  Toys hs ogpeeetey Peepererr rere ear rurrpre ry prerrere rem t Tt rer rere epee Tyee nT 4 3  Table 4 2  Ro  ter Sonware  MAJEE saienisi aaa aae aa aii 4 4  Table 5 1  DOS File  Mananement COMMAS orses 5 3  Table 5 2  DOS Fe AERIS cst sss ccxssevaansiceevvaxeecdsatenaccesteisancrs AE 5 11  Table 5 3  DOS File Alribute Hex Values sorrisi 5 19  Table 8 1  peonia Command Senge sscscicavecciseteee cnsricad ses ster ideeeen Repeeeiiaaseas 8 3  Table 8 2  contig Command Senings cccancncenascinunnia musician 8 6  Table 8 3  ifconfig Settings for an Ethernet Interface        E E E E EE 8 7  Table 8 4  Technician Interface Access Levels             ccccssceeeeeeeeeeeeeeeeeeeeteaeeeeeaeeeeees 8 78  Table 9 1  Aliases for Debugging Network Problems                 cccccceeseeeeseeeeeeeesees 9 10  TeBe i  Xmodem Opion Faga csiisecsictetnie digs cers cient vied sieent aes eriadees B 6  ladei  ysl Error Levele rieien ienien C 44    114088 Rev  A xvii       About This Guide   
244. ng steps     1  Delete the file from the memory card  using the delete command     2  Compact the file system  using the compact command        4 20    114088 Rev  A    Managing a NonVolatile File System    Partitioning a Memory Card or SIMM    Memory partitioning enables you to use commands such as the compact  command on one partitioned volume at a time  Partitioning also enables you to  store copies of boot images and configuration files on each partition to provide  redundancy     The partition command only works with a 4 MB or greater memory card or  SIMM used with an AN or ASN loaded with Version 8 10 or later router software   The command creates or deletes a partition on a specified volume  or on the  present working volume if a volume is not specified  Such partitioning provides  two independent file systems on two independent volumes     Enter the following commands to partition the memory card or SIMM or delete a  memory partition     partition create   lt vol gt     partition delete   lt vol gt       When creating a partition  the current file system cannot exceed one half the total  media size  For example  if you are using a 4 MB memory card that contains files  totaling more than 2 MB  you need to remove or edit some of those files until they  total 2 MB or less     Once the partition has been created  the new volume is referred to as  lt vol gt b  and  the existing volume is referred to as either  lt vol gt a or  lt vol gt         Caution  Be careful when dele
245. ng the  1 10  wfsnmpkey command  8 54  wisnmpmode command  8 53  wfsnmpseed command  8 54    Wfterm  accessing from Site Manager  B 18  dialing a remote router  B 22  file transfer functions  B 24  initializing local modem  B 21  logging into the Technician Interface  B 24  modem interface settings  B 19  opening  B 18  overview of  B 17  telephone call functions  B 22    wildcards  4 2  4 3    World Wide Web  Bay Networks home page on   XXiX    X    xmodem  command option flags  B 5  command parameters  B 5  command syntax  B 4  filename conventions  B 7  implementation notes  B 7 to B 9  overview of  B 2  YMODEM protocol  B 2    xmodem command  4 13       Index 10    114088 Rev  A    
246. nk module        6 6    114088 Rev  A    Managing Events     lt rate gt  is an option that enables continuous polling of the system   s events log and  display of new event messages   p uses a default rate of 5 seconds  You can change    this by entering a  lt rate gt  in seconds  The system displays the events that occur    between polling intervals      lt code_no  gt  is an event code number or a range of event code numbers  The  system displays the events associated with the specified event code      w enables the log command to provide console output in wide format     Examples     If you enter   log  log 3 ftp log    log  d12 12 94  log  t09 02 00  log  eTFTP   log  eGAME  eTl  log  ffw    log  s3  log  eTFTP  ffw  s3    log  eTCP  eTELNET  fiw  log  p10    log  c8    log  w    The console displays     All fault  warning  and info events in memory     All events saved to the ftp log file stored on Vol   ume 3     Displays all events logged since December 12   1994     All events logged since 9 02 today  If it is earlier  than 9 02  the console displays all events logged  since 9 02 yesterday     All events logged by the TFTP service    All events logged by the GAME and TI services   All fault and warning events    All events logged in Slot 3     All fault and warning events logged by the TFTP  service in Slot 3     All fault and warning events logged by the TEL   NET and TCP services     All events logged in the past 10 seconds     All events associated with Event Code 
247. nt workstation uses the priority code in each locally  received Syslog message to    e Determine that the message came from an external source  a Bay Networks  router in an IP network accessible to the workstation   rather than from an  internal source  such as the workstation   s email system or line printer  spooling system     e Determine whether to redispatch the message to a local log file  to the  workstation display  to a printer  or to another remote UNIX host    Syslogd makes these determinations by examining the two parts of the priority  code  facility error  in each message        114088 Rev  A    Using Syslog Messaging to Monitor Router    Refer to    Configuring Syslog on the Router    for instructions on how to enable the  Syslog time sequencing feature        Note  Enable time sequencing only when it   s important for your management   workstation to receive router event messages in time stamped order  rather  than in order of retrieval from each slot   When you enable the  time sequencing feature  Syslog requires more processing resources from the  router         Configuring Syslogd on a UNIX Workstation    Before you configure and activate Syslog on any routers  configure Syslogd on  UNIX network management workstations in your network  This helps to prevent  the loss of event messages you may want to capture as you begin to enable Syslog  on each router     UNIX workstations have a syslog conf file in which you define destinations for  event messages receiv
248. nts logged in Slot 3 to a file named s lot3 log    and stores the file in Slot 2        114088 Rev  A 6 9    Using Technician Interface Software    Saving the Events Log Automatically    Attribute Name   Attribute Name   Default        Note  Use this feature only for the purpose of troubleshooting a Bay Networks  router  Leave the feature disabled  by default  at all other times        You can configure any model of Bay Networks router to save the entire events log  automatically  The system saves the file just prior to overwriting the oldest  messages in the log  This feature helps to prevent the loss of event message  information accumulated in the log over time     The system    Parameter     Options     Function     Instructions     Command   MIB Object ID     Saves the log the number of times you designate in MIB attribute  wfSerialPortEntry wfSerialPortAutoSaveNumFiles  or until the memory card  or diskette drive becomes full     Saves the log to the memory card or diskette file system volume you designate  in MIB attribute wfSerialPortEntry wfSerialPortAutoSave Volume    Saves the log to the filename auto lt x gt  log  where  lt x gt  is a value  from 1 to the maximum value you set for MIB attribute  wfSerialPortEntry  wfSerialPortAutoSaveNumFiles    Maximum Autosaved Files  wfSerialPortAutoSaveNumFiles  33   0  log autosave off    0 to 99    Specifies the number of times the system automatically saves the events  log to a file system volume  The system saves the log t
249. nued        A 6 114088 Rev  A    Using the Bay Networks Router MIB    Bay Networks Router MIB Files    A collection of ASCII files  one per router entity  together describe the Bay  Networks router MIB  These files load automatically onto the Site Manager  workstation or PC when you install the Site Manager software  The Site Manager  software modules read these files during startup     Site Manager installs these files at  wf nibs on PCs  and at  usr wf mibs on UNIX  workstations  For example  the path to the PPP mib definition file on a UNIX  workstation is  usr wf mibs ppp mib     If you want to load these MIB files into a local MIB browser tool  first load the file  wfcommon mib  otherwise  you may experience errors using the browser tool              Caution  If you want to open any MIB file with an ASCII text editor  do so  with read only protection enabled  This should eliminate the possibility of  corrupting  over writing  the contents of that file        Compliance with Specifications    The Bay Networks router MIB complies with the standards described in the  following documents  with the exceptions noted in the    Implementation Notes     section     e Concise MIB Definitions  RFC 1212     e Management Information Base for Network Management of  TCPAP based Internets  MIB IT  RFC 1213     e Structure and Identification of Management Information for  TCP IP Based Internets  SMI  RFC 1155        Information Processing Systems   Open Systems Interconnection    Specifi
250. number  the system  dumps the addresses and sizes of all applications on all slots to the specified  filename  If you do not specify a destination filename  the system displays the  addresses and sizes of the applications on the screen     Examples    If you enter  The system    loadmap Displays the load addresses and sizes for all  applications on all slots on the screen    loadmap 3 45 Displays the load addresses and sizes for all  applications on Slots 3  4  and 5 on the screen    loadmap 3 8 Displays the load addresses and sizes for all  applications on Slots 3  4  5  6  7  and 8 on the  screen    loadmap all 2 map dump Dumps the load addresses and sizes for all appli    or cations on all slots to the specified file     loadmap 2 map dump    The following example shows a sample screen display when you issue the  loadmap command without any optional parameters   If no applications reside on  a slot  the message No dynamically loadable modules on SLOT   appears         8 44    114088 Rev  A    No dynamically loadable modules       Loadmap from SLOT 2             gt  vines exe 0x304a5c60     gt  drs exe 0x30467550       gt  tms380 exe 0x304760e0       gt  hdlc exe 0x304caaf0       gt  dst exe 0x30526400       Loadmap from SLOT 5                gt  fr exe 0x310b9f  00       gt  hdlc exe 0x310c67d0     gt  qsync exe 0x3111c630       Loadmap from SLOT 3                      gt  arp exe 0x3048c0d0       gt  ipx exe 0x303fec60        gt  at exe 0x303e4e90     gt  vines exe 0x3044
251. o designate the disk volume or memory card     volume    that contains the files you want to transfer to your UNIX  workstation     For example   cd a   designates diskette Volume a   or  cd 2   designates a memory card volume in router Slot 2   2  Enter a dir command to view the list of files in the volume memory card     The system displays a screen similar to the following table        File Name Size Date Day Time   abc cfg 1814 10 28 94 Thurs  10 29 06  def cfg 2293 11 03 94 Wed  LT2162 29  ghi cfg 4197 11 15 94 Mon  08 34 04    3  Determine which files you need to transfer from the router to the  workstation     4  Enter the xmodem send binary command  as follows   xmodem sby  lt source_vol gt   lt filename gt   sb is a send binary file   y is the YMODEM file transfer option      lt source_vol gt  is either a slot number of a memory card or the letter of the  disk drive volume that contains the files you want to send to the workstation      lt filename gt  is the name of the file you want to send from the router to the  workstation  If you want to enter multiple filenames as part of aYMODEM  batch file transfer operation  insert a space character between the filenames    For more information on Technician Interface filename specifications  refer  to Chapters 4 and 5         B 26 114088 Rev  A    Using Out of Band Access to Transfer Files       Note  To ensure that files are transferred properly  do not issue the xmodem  command with the  lt wait gt  parameter when you pe
252. oes not respond    e An ICMP host unreachable from y y y y message  This message appears if the  local Bay Networks router or remote router whose address is y y y y cannot  forward the ping request any further along the path to the target device  A  sample message follows  where y y y y is the address of the ICMP host        ping  ICMP host unreachable from 192 32 243 1             e A target address is unreachable message  The local Bay Networks router  previously issued an ICMP host unreachable from y y y y message  Within 40  seconds  the local Bay Networks router received a subsequent ICMP echo  request addressed to the same target device  The ARP timed out or the address  could not be resolved  A sample message follows     ping  192 32 1 151 is unreachable       114088 Rev  A 3 9    Using Technician Interface Software    Examples     If you enter  on one line      ping  ip 192 32 1 151    ping  ip 192 32 1 151  p    The system     Pings the device at the IP address  192 32 1 151 and waits up to 5 seconds   default  for a response  The console dis   plays one of the following messages    ping  192 32 1 151 is alive  size   16  bytes    ping  193 32 1 151 does not respond  ping  ICMP host unreachable from  192 32 243 1   ping  192 32 1 151 is unreachable    All of the above  but displays the intervening  hop addresses to the destination before dis   playing the response message for each ping   For example  the console displays the fol   lowing messages    ping   192 32 243
253. og  as follows     e To display the unfiltered contents of the events log  enter the log command  without any command arguments     e To select the types of messages you want the router to include in  or exclude  from  the events log  add write filter arguments to the log command  You can  select or specify event types by       Entity code     Message severity levels     Router slot numbers    e To display all write filters currently in effect  enter the log command with the   z subcommand option        6 2    114088 Rev  A    Managing Events    e To enable the router to read only certain messages from the events log to the  console display  add read filter arguments to the log command  You can select  or specify event types by       Entity code     Severity level     Slot number     Event date      Event time       Event number or number range    Applying Write Filters to the Events Log    During normal operation  the events log captures all event messages generated  internally by the router  However  for troubleshooting purposes only  use the log  command to    e Include specific event messages in the events log     e Exclude specific event messages from the events log   Specify the log command as follows    log   i    X     e lt entity gt     f lt severity gt     s lt slot_ID gt      i   Include the  e   f  and or  s options that follow      x   Exclude the  e   f  and or  s options that follow        Note  You can add the  e   f  and  s arguments to the log command in any
254. olume and names the  copy alt cfg    The alt cfg file on Volume 3 and stores the copy  also  named alt cfg  on the active volume    The  6_22 log file on Volume 2 and names the copy  sp log    The config file on Volume 2 and stores the copy  also  named config  on Volume 3     All files from the active volume to  Volume 3     All executable files from Volume 2 to  Volume 4     All files with a filename of three characters from Vol   ume 3 to Volume 4        Note  You cannot copy from NVFS to DOS on an AFN  which allows only  one file system  NVFS  to be available after a system boot           4 12    114088 Rev  A    Managing a NonVolatile File System    Transferring a File    Depending on conditions existing within your network  you can transfer files  between Bay Networks routers and remote workstations using either of two  methods     In band  using Technician Interface tftp commands and a route through your  high speed  IP network     Out of band  using Technician Interface xmodem commands and a route  through a lower speed  dial network     You can transfer a file in band whenever    You can dial in to the Technician Interface port of a router you choose as  source or destination for a file transfer operation    An operational IP routing path exists through your network  between the file  source  a router or a remote workstation  and the file destination  also a router  or a remote workstation     Out of band file transfers are typically a less efficient but sometimes us
255. ommand beemeneee eoeerre te retrre eT erareen tert T tre torn entrar or mere etree TS 2 3  Ueno Blat ws el  uimero  palate  lyre perenne yrereet Per err ee treet ree revere st rererr Terre ee ye trerrer terry rr 2 4  Using the save Command          yerai E EEE E T EE T E 2 4   OONIGOIS Pot Parame leig onina ES 2 4  WEEE Tio e droda  E EA E E NTA A TET A AA E  2 19  Sampie AWSE FIIS sagaia A auiw ee dceee ace 2 20  Gustomzna Antos cript PIGS nanosite nain 2 21  Chapter 3  Using Operating Commands  EEA e E EEE T T A E A E E E T 3 1  De NC Onine TIE iaaa kadai ESE EES 3 2  Pasig and Scrolling ihe SOReei sariini a E 3 2  Painga O75 salar  le siran A AEEA LENA OAN 3 3  Repeating the Command Last Entered               cceccccesseeeeeeeeeeeeeseeneeesaaeseeeeeeeeeaeeeeaaeeenee 3 3  Repeating a Command Mecently  Entered  ociera aian iarainn 3 4  Loading a command mio PTGS arinena ANS 3 7  Proma a Remol 0 asa sch tincs saacaste tees ce badtdeienacaisdbet asi eaetaiada ald te teed adore ema 3 7  ag  0 ner ere peg Uhre E E E tr tear tere rere net ere error ee ee ree err re tater 3 8  Lee  MG live  meeaereecenet te metten tener a teremmmneet crema teehee acer or 3 12  OS FNO peereeet ene een mere cet erree ana PE Dena E EE 3 15  VIDNE SIFI ssp sha eesnncactinccten neritic gicy taaaency eid ad R NANEN 3 18  ela TU PNG  E E NT T PATTE ATEA IAT E T AEE TT 3 21  APERIRI o e E meee eee meer eee rer ee ee eee rere 3 24  Displaying the ATM ARP Table for an Interface           eccecceceeeeeeeeeec
256. on  Use  this command to validate executable files before upgrading     e The prom  w command erases the PROM and copies the contents of the  PROM update file to the PROM  Use this command to update  write  a PROM  with new software     e The prom  v command compares the contents of a PROM file on the file  system to the contents of a PROM  Use this command to verify that the  software installed in the file system matches the software loaded on a PROM        114088 Rev  A    8 33    Using Technician Interface Software    The executable software consists of the following binary files     frediag exe is the diagnostics image file  To upgrade with a new diagnostics  image  transfer the new frediag exe file to the file system  issue the readexe  command to validate it  and issue the prom  w command to load  write  it  onto the diagnostics PROM  The diagnostics PROM device supplies the FRE  processor module with diagnostic instructions during a cold start     If you want to verify that the image resident on the diagnostics PROM  matches the frediag exe file  use the prom  v command     freboot exe is the bootstrap image file  To upgrade with a new bootstrap  image  transfer the new freboot exe file to the file system  issue the readexe  command to validate it  and issue the prom  w command to load  write  it  onto the bootstrap PROM  The bootstrap PROM supplies the FRE module  with bootstrap instructions during a cold start     If you want to verify that the image resident on the 
257. on file during a cold  start   A cold start occurs after a power cycle or after you enter the diags  command      Each FRE module  BLN  BLN 2  BCN  in a router can host one memory card  A  Flash System Controller  VME based routers only  in a router can host one or two  memory cards  Multiple memory cards are optional in the router  The section that  follows suggests how to manage multiple memory cards     A volume number is the same number as the slot that hosts the memory card  For  example  Volume 2 resides on Slot 2     Table 4 1 outlines the NVFS commands  The Wildcard column indicates whether  you can use wildcards    and    when entering the commands  You use wildcards  to display multiple filenames  and to copy or delete multiple files  The wildcards   have the same meaning as those in UNIX     e The   wildcard matches any number of characters  including zero characters     e The   wildcard matches any single character  A match occurs only when a  character is present in the position indicated by the wildcard     The sections that follow describe the commands in detail  They also show how to  use the wildcards        4 2    114088 Rev  A    Managing a NonVolatile File System                                        Table 4 1  NVFS Commands  Command Wildcard   Function  compact Reallocates file space on a memory card   cd Changes the active volume   copy Y Copies a file from one volume to another or to the same  volume   delete  a Deletes a file from a volume   dinfo Dis
258. online help   however      In contrast  Site Manager is menu driven  when you display screens and select  options from Site Manager   s pop up menus  it automatically sends the  appropriate SNMP commands to the router  Site Manager also provides help  text        or verification that Site Manager   s static configuration feature provides   Technician Interface users can set erroneous values  commit the values to  memory  and save the values to configuration files  thereby possibly disrupting  router functionality and network activity        Caution  The Technician Interface does not provide the consistency checking          1 2 114088 Rev  A    Introducing the Technician Interface    Running the Technician Interface    Logging In    The Technician Interface software entity normally runs on one slot only  except as  noted otherwise in the following table              Router Model  Technician Interface runs on   AN   Slot 1 only  ASN    Slots 1 to 4  individually or simultaneously     depending on the number of ASN routers  stacked and the setup of the back panel for each          router  BN  BLN    BLN 2  BCN    Slot 2  LN   or CN   with SYSCON II Any slot  one slot only     Flash system controller                If you reset the slot on which the Technician Interface is running  the Technician  Interface resets to another available slot on a multislot system  or to the same slot  on a single slot system     When you access the Technician Interface via Telnet or console sessio
259. option is not supported at this time      Set according to your console requirements   set wfSerialPortEntry 7  lt port_no  gt   lt option gt   1 3 6 1 4 1 18 3 3 2 11 1 1 7    Baud Rate   wfSerialPortBaudRate   8   9600   9600   4800   1200   600   300   Specifies the rate of data transfer between the console and the router   Set according to your console requirements    set wfSerialPortEntry 8  lt port_no  gt   lt option gt   1 3 6 1 4 1 18 3 3 2 11 1 1 8       2 8    114088 Rev  A    Parameter   Attribute Name   Attribute Number   Default    Options     Function     Instructions   Command   MIB Object ID     Parameter   Attribute Name   Attribute Number   Default    Options     Function     Instructions     Command   MIB Object ID     Configuring the Console Port    Data Bits  wfSerialPortDataBits  9   8   718    Specifies the number of bits in each ASCII character received or  transmitted by the router     Set according to your console requirements   set wfSerialPortEntry 9  lt port_no  gt   lt option gt   1 3 6 1 4 1 18 3 3 2 11 1 1 9    Port Parity  wfSerialPortParity   10   1  None    1  None    2  Odd    3  Even     Enables or disables data error detection for each character transmitted or  received     Use the 2  Odd  or 3  Even  setting to enable data error detection  Use the  1  None  setting to disable data error detection     set wfSerialPortEntry 10  lt port_no  gt   lt option gt   1 3 6 1 4 1 18 3 3 2 11 1 1 10       114088 Rev  A    2 9    Using Technician Int
260. or a response   The console displays one of the following mes   sages    AT ping  100 5 is alive   AT ping  100 5 does not respond   AT ping  100 5 is unreachable    Pings the device at the AppleTalk address 100 5  eight successive times and waits up to 3 seconds  for a response to each ping  The console displays  one of the following for each ping sent    AT ping  100 5 is alive   AT ping  100 5 does not respond   AT ping  100 5 is unreachable   The console also displays the following type of  message after reporting the progress of each ping   AT ping  100 5 responded to 8 out of 8  100   Success             114088 Rev  A    3 23    Using Technician Interface Software    APPN Ping    When you issue the ping command for APPN to a remote APPN device  it  responds if it can be reached  and the console displays the response or the result of  the request  APPN ping uses the APING  APPN Ping  Transaction Program  TP   to send an APING request to the APINGD TP running on the remote device     Enter the following to ping a remote device running APPN     ping  appn  lt CP_name gt    t lt timeout gt     r lt repeat_count gt     s lt size gt      m lt mode gt       lt CP_name gt  is the required APPN address  in the format of a Control Point name   of the remote device  Use the format  lt network_ID gt   lt CP_name gt  if the remote  device is not on the same network as the system you are pinging from       t lt timeout gt     r lt repeat_count gt     s lt size gt     m lt mode gt   a
261. or slots you indicate     Examples    If you enter  The system clears all events from   clearlog Memory    clearlog 2 The Slot 2 event buffer    clearlog 5 7 The Slot 5  6  and 7 event buffers     clearlog 2 5 8 The Slot 2  5  and 8 event buffers        6 14    114088 Rev  A    Chapter 7  Accessing the MIB    You can use the Technician Interface to access and manage the Bay Networks  Management Information Base  MIB   This chapter assumes you already know  how to manage the MIB  but you need instructions on entering MIB management  commands at the Technician Interface console  Refer to Appendix A for more  information     You can manage the Bay Networks MIB as follows     Display MIB object names  identifiers  and values   Change MIB values   Commit MIB value changes   Save the configuration in RAM to a file for later retrieval when booting    Use the MIB II counter       114088 Rev  A    7 1    Using Technician Interface Software    Listing MIB Objects    You can display MIB object names and their associated identifiers using the list  command  When you want to display or change a MIB value but don   t know its  object or attribute name  use this command     Enter the following to display a list of all MIB object names and identifiers   list    You can also enter the following to display a list of attributes and their associated  identifiers  where   lt object_name gt   is the name of the object at the level above the  attributes     list   lt object_name gt      Finally  yo
262. orks router    The type of router  single slot or multislot     Based on these variables  the router system or slot performs a restart  a  warm boot  or cold boot operation  The following table describes the different  responses        You issued a reset command from a Technician Interface session  console or  Telnet  on one slot  and the target  lt S ot_no  gt  you specified was        The same slot the    A slot other than the slot  the session is running                          None  session is running on   on   Command  gt    reset reset  lt S ot_no  gt  reset  lt Slot_no  gt   l  Router V  AN Warm boot Slot 1  Warm boot Slot 1  N A  ANH e No diagnostics   No diagnostics   single slot e Load new image on Slot    Load new image on Slot  routers  1 1  e Initialize new image on     Initialize new image on  Slot 1 Slot 1  e Retain log info e Retain log info  AFN Warm boot Slot 2  Restart Slot 2  N A   single slot e No diagnostics e No diagnostics  router  e Load new image on Slot    No image reload on Slot  2 2  e Initialize new image on      Re initialize current  Slot 2 image on Slot 2  e Retain log info e Retain log info             8 26    114088 Rev  A    System Administration       You issued a reset command from a Technician Interface session  console or  Telnet  on one slot  and the target  lt S ot_no  gt  you specified was        The same slot the    A slot other than the slot  the session is running                          None  session is running on    on   Comma
263. orks routers from the Technician  Interface to enable internal clocking mode  Enter the following at the Technician  Interface prompt     set wfHssiEnitry wfHssilnternalClkTestMode 4 1 1 commit    The default value  2  enables external clocking  The new value  1  enables internal  clocking     Enter the following to display the new value   get wfHssiEniry wfHssilnternalClkTestMode 4 1    The Technician Interface displays    wfHssiEntry wfHssiInternalClkTestMode 4 1   1       Be sure to enter the following to set the variable back to external clocking to use  the external clock source     set wfHssiEniry wfHssilnternalClkTestMode 4 1 2 commit    Responding to QENET Underflow Errors    Transmit underflow errors can occur when a QENET link module is connected to  a FRE module and all four ports are transmitting  This often occurs when  non SNAP encapsulated frames received from an FDDI ring are routed out the  interface of a QENET  An example of such a frame is a Novell proprietary  encapsulated frame on FDDI     The wfCSMACDUfloTx attribute in the wfCSMACDEntry MIB object shows the  number of transmit underflow errors  These errors result in other stations  detecting CRC errors     Enter the following Technician Interface command for each of the four connectors  only if you are experiencing transmit underflow errors as described above     set wiCSMACDEntry wfCSMACDAlignmentMode  lt slot no  gt   lt connector gt   1 commit       8 62    114088 Rev  A    System Administration    
264. orwDatagrams 192 32 6 4 3   149189  wfIpInterfaceEntry wfIpInterfaceForwDatagrams 192 32 15 21 4   28400  wfIpInterfaceEntry wfIpInterfaceForwDatagrams 192 32 16 1 2   1086  wfIpInterfaceEntry wfIpInterfaceForwDatagrams 192 32 243 2 1   120635          9 6 114088 Rev  A    Managing Aliases    Debugging Aliases    The verbose command allows you to display the commands within an   lt alias_value gt  as an alias executes  This command is useful for locating syntax  errors within the  lt alias_value gt      Enter the following to display the verbose mode   verbose    If the verbose mode is on  the system displays the commands as they execute  If  the verbose mode is off  the system does not display the commands     Enter the following to change the setting of the verbose mode  where  on loff  is  on to display alias commands or off to turn off the display     verbose  on   off     Examples    If you enter  The system    verbose Displays Verbose mode on or Verbose mode off   verbose on Displays alias commands when they execute   verbose off Does not display alias commands when they execute     Deleting an Alias from Memory    The unalias command removes the specified alias from memory  If you substitute  the wildcard character     for the alias name  the system removes all aliases from  memory  Enter the following to delete aliases from RAM     unalias   lt alias name gt         lt alias name gt  is the name of the command you want to delete       represents all aliases        114
265. ostics on Slot 1   single slot Slot 1 e Load new image on Slot 1  routers  e Load new image on      Initialize new image on Slot 1  Slot 1 e Lose log info  e Initialize new image  on Slot 1  e Lose log info  AFN Warm boot Slot 2  Restart Slot 2  N A   single slot e No diagnostics e No diagnostics  router  e Load new image on     No image reload  Slot 2 e Re initialize current image on  e Initialize new image Slot  on Slot 2 e Retain log info  e Retain log info  ALN Cold boot all slots  Cold boot the designated slot    Cold boot the designated slot   CN e Run diagnostics e Run diagnostics on local slot     Run diagnostics on the  FN e Load new image    Load new image on local slot designated slot  LN e Initialize new image     Initialize new image on local    Load new image on the   multislot e Lose log info on all slot designated slot  routers  slots e Lose log info on local slot e Initialize new image on the  designated slot  e Lose log info on the  designated slot  BLN Cold boot all slots  Cold boot the designated slot    Cold boot the designated slot   BLN 2 e Run diagnostics e Run diagnostics on e Run diagnostics on the  BCN e Load new image designated slot designated slot   multislot e Initialize new image    Load new image on e Load new image on the  routers  e Lose log info on all designated slot designated slot  slots e Initialize new image on e Initialize new image on the  designated slot designated slot  e Lose log info on designated e Lose log info on the  slot des
266. play online help text for any Technician Interface  command  as follows   help   lt commana gt      When you enter help  followed by a space and the name of a command  the  console displays a detailed description of the command along with its syntax  requirements  For example  when you enter help date  the console displays a  detailed description of the date command     To display all Technician Interface commands in a brief table  enter  help help    To display all Technician Interface commands and their associated syntax  requirements  enter    help    Use this command as an online quick reference card when you know the  command   s function  but don   t know the command name or its syntax  The screen  may scroll automatically  refer to the next section to control scrolling     Pausing and Scrolling the Screen    Use the more command to view output before it scrolls out of view     If the more mode is on  the system forwards the number of lines you specify to the  screen and displays the following prompt at the bottom of the screen     Type   lt space gt  to page   lt return gt  advance 1 line  Q to quit    If the more mode is off  the screen automatically scrolls when it fills        3 2 114088 Rev  A    Using Operating Commands    Enter the following command to set or display the more mode     more   s   on   off   lt  _of_lines gt      S Prevents the console from displaying output   on Enables the more mode   off Disables the more mode   Examples    If you enter  The sys
267. plays the volume number  status  and space for each  volume   dir Vv Displays all files on a volume   format Erases any existing files on a volume and formats the  volume   partition Partitions file system media into two volumes   save Saves the current software configuration  aliases  or  events to a file  Refer to Chapter 6  7  or 9 for  instructions on the Save command   tftp Transfers a file to or from the router   type VY Displays the contents of a file in ASCII or hexadecimal  format                    Using Multiple Memory Cards    This section describes how to manage multiple memory cards on the router  You  may want to allocate them as follows     e Keep one card as the primary card used for booting   e Use another card for redundancy     If you are providing redundancy  be sure to copy files that you modify to the  redundant volumes     e Use another card as temporary storage for log files and test configuration files        114088 Rev  A    Using Technician Interface Software    The system boots from the default router software image  Table 4 2  and  configuration file  config  if you do not specify the boot image and configuration  file when booting  Refer to Table 4 2 for a list of router software images  associated with particular routers and processor modules                       Table 4 2  Router Software Images  Image Router Processor Module  ace out FN  LN  CN  ALN ACE  afn exe AFN Motorola  an exe AN  ANH Motorola  asn exe ASN Motorola  bn exe BLN  BLN 2  
268. pts the user to enter this key as a password that enables Site Manager to  operate in secure mode     Enter the command in the following format   wfsnmpkey  lt key gt      lt key gt  is the string of ACSII characters that make up the encryption key for this  router  The key can be no longer than six characters        Note  If you replace a board in a BCN  BLN  or BLN 2 router  you should  re enter the wfsnmpkey command to ensure that the key is updated for all  slots        Resetting the Security Counter    The wfsnmpseed command allows you to reset the counter used by the security  mechanism  Under normal operating conditions  it is not necessary to reset the  counter  this command is mainly for debugging purposes     To reset the seed counter  enter the wfsnmpseed command in the following  format     wfsnmpseed  lt comm_name gt   lt mgr_address gt    l lt value gt     l lt value gt     l lt value gt      l lt value gt       lt value gt       lt comm_name gt  is the name of the SNMP community for which you want to reset  the counter      lt mgr_address gt  is the address of the manager for which you want to reset the  counter         lt value gt   is either a dash     to indicate no change to a specific counter value  or  the value to which you want to reset the counter        8 54    114088 Rev  A    System Administration    Example     The manager with address 192 32 1 20    If you enter  in community    public        wifsnmpseed public 192 32 1 20 Sets the second counter 
269. r a slot number  the  command retrieves only data pertaining to the slot where  the Technician Interface is running         t  lt type_number gt  Retrieves data for the OSPF LS type  type of Link State   ospf_Isdb  advertisement  that you specify after the  t flag  as  follows    0   stub advertisement   1   router links advertisement   2   network links advertisement   3   summary link  IP network  advertisement   4   summary link  ASBR  advertisement   5   external link advertisement   For more information on LS Types  refer to RFC 1583                    Example  ip routes     Enter the following command to display the table of IP    best     used or active        routes    ip routes   Network Mask Proto Age Slot Cost NextHop Address AS  2 0 0 0 8 RIP 30 192 168 125 33  10 0 0 0 8 RIP 30 192 168 125 33  122 0 0 0 8 RIP 30 192 168  125 33    131 192 0 0 16 RIP 30  132 245 0 0 16 RIP 30  134 177 0 0 16 RIP 30  140 200 0 0 16 RIP 30  162 78 0 0 16 RIP 30    192 168 125 33  192  168   125 33  192 168 125 33  192 168 125 33  192  168 125 33    NNN NNN DN NY             WWWWW UW UI    Total Networks on Slot 2   268    Data from the ip routes command excludes inactive or unused routes that exist in  the complete table of IP routes  To view the complete table  including inactive   unused routes  use the ip routes  A command        8 66 114088 Rev  A    System Administration    Example  IP routes     Enter the following command to display the entire table of routes  including  inac
270. r of unused bytes in the memory card     Contig Free Space  Number of unused bytes in the largest block of available  space in the memory card        4 6    114088 Rev  A    Managing a NonVolatile File System    When you delete a file on a memory card  the file becomes inaccessible  but the  data remains on the card  Eventually  all space is used  The compact command  copies the active files to memory  erases the memory card  and copies the files  back to the memory card  Refer to the section    Compacting File Space    to free up  space to prevent or respond to a file allocation failure     Displaying a Directory    Use the dir command to display a list of the files on a particular volume  You can  enter the wildcard characters   and   to display filenames with the character  strings you specify     Enter the following to list the files stored on the active volume    dir   Enter the following to list the files stored on a different volume  where  lt vol gt  is  the slot number containing the volume     dir  lt vol gt      The directory display shows an entry for each file on the volume  Each entry  consists of a filename  size  and modification date weekday time  Figure 4 2  shows a sample response to the dir command on a BLN        114088 Rev  A    4 7    Using Technician Interface Software         dir    Volume in drive 5  is  Directory of 5     File Name Size Date Day Time   pvc0 cfg 6872 10 14 94 Fri  13751212  fr al 5616 09 16 94 Fri  08 04 26  fr VIII 10158 09 28 94 We
271. rHostIndex  wfSyslogEntFltrNum  wfSyslogEntFltrIndex  wifSyslogEntFltrOperS tate  wifSyslogEntFltrLogEvtLowBnd  wifSyslogEntFltrLogEvtUppBnd  wifSyslogEntFltrSevMask  wifSyslogEntFltrSlotLowBnd  wifSyslogEntFltrSlotUppBnd  wifSyslogEntFltrFaultMap  wifSyslogEntFltrWarningMap  wifSyslogEntFltrInfoMap  wifSyslogEntFltrTraceMap  wifSyslogEntFltrDebugMap  For each attribute or parameter  this appendix provides information about default    settings  valid options  function  instructions for setting  and the Management  Information Base  MIB  object ID        114088 Rev  A C 29    Using Technician Interface Software    Global Group Parameters    This section describes the Syslog group global parameters     Parameter   Attribute Name   Attribute Number   Default    Options   Function     Instructions     Command   MIB Object ID     Parameter   Attribute Name   Attribute Number   Default    Options   Function     Instructions     Command   MIB Object ID     Syslog Delete   wfSyslogDelete   1   1  Create    1  Create    2  Delete    Creates or deletes the Syslog service on the router     Set to 1  Create  to create a MIB record with system defaults for the  Syslog service on the router  Set to 2  Delete  to delete the Syslog service    from the router configuration   set wfSyslog wfSyslogDelete 0  lt 1   2 gt     1 3 6 1 4 1 18 3 3 2 15 1 1    Enable   wfSyslogDisable   2    1  Enable    1  Enable    2  Disable   Enables or disables Syslog services on the router     Enable Syslog serv
272. rding from Syslog to Syslog hosts configured on  the router   Syslog forwards messages to n hosts only  where n   the value of  wiSyslogMaxHosts         114088 Rev  A    C 23    Using Technician Interface Software    Disabling or Re enabling Syslog Hosts or Filters    You can disable or re enable host or filter entries already defined in your Syslog  configuration as follows     1  Disable or re enable message forwarding to a Syslog host  as follows     a     Disable a Syslog host anytime after adding it to the router  configuration by entering the following command line        set  wfSyslogHostEntry wfSyslogHostDisable   lt wfSysiogHostDest gt   2 commit    Disabling a host    e Transitions the operational state of that Syslog host entry and its  corresponding filters to INACTIVE    e Stops Syslog from forwarding event messages to the host    Re enable message forwarding to a specific Syslog host by entering  the following command line        set  wfSyslogHostEntry wfSyslogHostDisable   lt wfSysiogHostDest gt   1 commit    Re enabling a host    e Transitions the operational state of that Syslog host entry and its  corresponding filters to ACTIVE    e Allows Syslog to resume forwarding event messages to the host    2  Disable or re enable an entity filter for a specific Syslog host  as follows     a     Disable an entity filter anytime after adding it to the router  configuration by entering the following command line        set wfSyslogEntFlitrEntry wfSyslogEntFltrDisable   
273. re    Overview    You access the Technician Interface software through a console or modem  attached to a router serial port  The number of Technician Interface sessions you  can establish for a router depends on the number of serial ports available on that  router     The SRM L board has one serial port  labeled    Console         allowing you to  establish 1 session     The SYS I O board has 3 serial ports  labeled    Console         Modem 1    and    Modem 2      allowing you to establish up to 3 sessions     The AFN motherboard has two serial ports  labeled    Console    and     Modem      allowing you to establish 1 or 2 sessions     The AN motherboard has 1 serial port  labeled    Console      allowing you to  establish 1 session     The ASN motherboard has one serial port per router  with up to 4 routers  stacked  allowing you to establish up to 4 sessions with the interconnected  stack     Refer to Configuring Routers if you prefer to user Site Manager to configure the  serial port parameters for the router console     Configuring Console Port Parameters    The following sections describe how to use the following Technician Interface  commands     list   set  commit  save    Using the list Command    You can list and review all serial port attributes by entering the following  command line at the Technician Interface prompt     list wfSerialPortEntry       2 2    114088 Rev  A    Using the set Command    Configuring the Console Port    Enter one of the following Techni
274. re image and configuration when you do not override the default router  software image  for example  bn exe  and configuration file  config      You do not override these files when you    Power cycle the router  Issue the diags command  Hot swap a module   Issue the reset command    Issue the boot command without specifying defaults    A cold start occurs when you power cycle the router or issue the Technician  Interface diags command  The processor module executes CPU and backbone  diagnostics  and if a link module is present  link diagnostics  When CPU and  backbone diagnostics terminate successfully  and link diagnostics terminate   successfully or unsuccessfully   the processor module boots        114088 Rev  A    8 9    Using Technician Interface Software    Booting    A warm start occurs when you hot swap a module  press the Reset button  or issue  the boot or reset command  The processor module boots without running  diagnostics  When you hot swap a module  the DIAG LED on the front panel and  LED 8 on the FRE module daughterboard behind the RFI shield remain on   indicating that diagnostics have not been run   We recommend that you issue the  diags command when you hot swap a board      When a processor module boots  it requests a copy of the router software image  currently in use  The first processor module to respond to the request forwards a  copy of the router software image from its memory  If none is in use  the processor  module uses the router software image
275. re optional  These  parameters are as follows      lt timeout gt  is the number of seconds for each ping to time out  If the system  receives a response to a ping after it has timed out  the system does not send an     alive    message to the console  The default is 15      lt repeat_count gt  is the number of ping messages to send  The system does not  wait for the timeout before sending the next ping  The default is 1      lt size gt  is the number of bytes of data to send with each ping  The default is 100      lt mode gt  is the mode name  Choices include  INTER   BATCH   INTERSC  and   BATCHSC   INTER refers to the interactive mode  that is  where not much data  is involved and response time is very important    BATCH refers to a mode where  a lot of data is involved  and response time is not important   INTERSC and   BATCHSC are secure versions of INTER and  BATCH  If you do not specify a  mode  the mode defaults to a blank value        3 24 114088 Rev  A    Using Operating Commands    The console displays one of the following messages when you issue a ping  command     An alive message  This message appears if the system receives a response  from the target device within the  lt timeout gt  allowed  A sample message  follows     APPN ping  bay is alive    A did not complete in the time allowed message  This message appears if  the node is alive but congested  the data transfer time exceeded the timeout  or  the directory search is not complete  A sample message follows
276. ready on the volume  that has the same filename as the file you are creating  To avoid overwriting an  existing file  display a directory of the volume   s contents and determine the  filenames that are already in use        Enter the following to copy a file on the active volume    copy  lt old_file gt   lt new_file gt    Enter the following to copy a file to a different volume    copy  lt vol gt   lt old_file gt   lt vol gt   lt new_file gt     lt vol gt  in  lt vol gt   lt old_file gt  is the slot number of the source volume      lt vol gt  in  lt vol gt   lt new_file gt  is the slot number of the target volume     Copying Files from NVFS to DOS    When copying files from NVFS to DOS on EN  LN  or CN routers equipped with  Flash System Controllers  make sure that the NVFS filename contains no more  than eight characters with an optional extension of no more than three characters  preceded by a dot  xxxxxxxx xxx   NVFS filenames can consist of one to 15  characters  DOS filenames can consist of one to eight characters with an optional  one  to three character extension  When the DOS operating system receives a  filename that contains more than eight characters  it truncates the filename        114088 Rev  A    Using Technician Interface Software    Examples     If you enter     copy config alt cfg  copy 3 alt cfg  copy 2 16_22 log    2 sp log   copy 2 config  3 config  copy     3     copy 2   exe 4     copy 3       4     The system copies     The config file on the active v
277. resiiienesi aa 5 5  Figure 5 2    Sample DOS Directory LISHAQ  isirsiruiaioniuoiersniinarouinne i 5 9  Figure 8 1  RUIBOOT Date and Time Entry         E gut E EAE E E 8 16  Figure 8 2  RUIBOOT Date and Time Example crnsirrsnoiissniirissnniiaiiiesn 8 18  Figure 8 3    Sample Response to readexe COMMANA             ccccceeeeeeeeeeeeeteeeeeeneees 8 36  Figure A 1  Sample Top Level Hierarchy of the Bay Networks Router MIB                 A 3  Figure B  Modem Caneco iu iiidumetisicentsdatioahaiiannuqaainiiaa B 9  Figure B 2  Wterm Icon            4  P E E ecca dinate caer  venetian B 18  Figure B 3  The Wfterm Base Program Window              ccccssecseeseeeeeeeeseeeeeeneeeeeeees B 18  Figure B 4  Accessing the Modem Settings Window                cccceceseeeeeeeeestteeeeeneees B 20  Figure B 5  Verifying or Modifying Modem Interface Settings                 cceeeeeeeeees B 20  Figure B 6  Verifying Successful Modem Initialization              cecceceeeeeeeeeeeeeeteeeeeneees B 21  Figure B 7  Accessing Wfterm Telephone Call Functions                cceceeeeeeeeeeeeneees B 22  Figure B 8  The Wfterm Dial Command WINdOW               ccceceeeeeeeeeeteeeeeeeeeteaeeeeeneees B 23  Figure B 9  The Wfterm File Transfer Operation Selection Window              0 cce B 25  Figure B 10  The Wfterm File to Transfer Window                   ceeeeeeeeeeeeeeeeeeeteeneeneneees B 27  Figure B 11  The Wfterm Connection Closed Window               csseseeeecrseeeeeceeeeeenes B 30  Figure B 12  Exiti
278. ress is unsuccessful  Wfterm displays an appropriate message in  the base program window        114088 Rev  A    B 23    Using Technician Interface Software    Once Wfterm connects to the Technician Interface port of a router  you must log in  to that Technician Interface     Logging In to the Router   s Technician Interface  Once Wfterm connects to the Technician Interface port of a router  log in to the  router   s Technician Interface as follows     1  Press return  if necessary  to invoke the Technician Interface login  prompt from the target router  Watch for the prompt in the Wfterm base  program window     The system displays the following prompt   Login   2  At the login prompt  enter Manager     The system displays the following message and prompt        Welcome to the  lt node_type gt  Technician Interface             Note  Your network administrator may have customized the Welcome     message and login prompt for the router on which you are attempting a login  procedure        Once you are logged in to the router   s Technician Interface  you can transfer files  to and from that router     File Transfer Functions    Once you are logged in to the router   s Technician Interface  you can access and  use the file transfer functions of the Wfterm utility by means of the File Transfers  pull down menu  Figure B 9         B 24 114088 Rev  A       Using Out of Band Access to Transfer Files       Wellfleet Communication Terminal Program  File Modem Phone QgiGaienpiadg  ASC
279. resses to the destination before displaying the  response message for each ping  For example  the  console displays the following messages    VINES ping  809637039 1   VINES ping  809847041 1   VINES ping  2705682 8003 is alive  size   16  bytes     Pings the device at the VINES address  2705682 8003 eight successive times and waits up  to 3 seconds for a response to each ping  The con   sole displays one of the following for each ping  sent    VINES ping  2705682 8003 is alive   VINES ping  2705682 8003 does not respond  VINES ping  2705682 8003 is unreachable   The console also displays the following type of  message after reporting the progress of each ping   VINES ping  2705682 8003 responded to 8 out  of 8  100  success             3 20    114088 Rev  A    Using Operating Commands    AppleTalk Ping    When you issue the ping command for AppleTalk to a remote AppleTalk device   it responds if it can be reached  and the console displays the response or the result  of the request  AppleTalk ping uses the AppleTalk Echo Protocol     Enter the following to ping a remote device running AppleTalk     ping  at  lt network_ID gt   lt node_ID gt    t lt timeout gt     r lt repeat_count gt       s lt size gt       lt network_ID gt   lt node_ID gt  is the required AppleTalk address of the remote  device  in the format of a 16 bit network number and an 8 bit node number        Note  You can enter the network and node addresses in decimal or  hexadecimal format  If you use hexadecimal
280. rform out of band file  transfers to or from a Windows workstation that has Wfterm running on it        5  To set the receiving Wfterm utility into receive mode  select the  YMODEM Receive option from the File Transfers pull down menu     Selecting this option invokes the File to Transfer window  as shown in  Figure B 10        Wellfleet Communication Terminal Program  File Modem Phone File Transfers Help      File to Transfer  File Name Directories    _win did  asn2stf_exe  ccomm ico  convert exe  install_exe  install ins 3  kds cfg wfscms  kermit dll    List Files of Type  ALL Files                      Figure B 10  The Wfterm File to Transfer Window    6  Select highlight the drive and directory that should receive the file from  the router     If you want to rename the file upon receipt at the workstation  you can also  type a filename into the File Name line of the File to Transfer window     7  Use the cursor to press the OK button in the File to Transfer window     Pressing the OK button notifies the sending Technician Interface to terminate  its wait before transmit state  and to send the file you specified in the File to  Transfer window        114088 Rev  A B 27    Using Technician Interface Software    You verify that the file transfer was successful when you see the File  Transfer Completed message in the Wfterm base program window     You should also see the filename appear in the receiving directory on the  workstation  If the transfer was unsuccessful  you shou
281. ribute Number   Default    Options     Instructions     Command   MIB Object ID     MIB II Counters Enable  wfSysMibCounterEnable  12   1  Enable    1  Enable    2  Disable     Enables or disables the following five counters in the MIB for Version  8 10 and later router software          ifInUcastPkts       ifInNUCastPkts       IfINUnknownProtos      ifOutUcastPkts       ifOutNUcastPkts    Set to 1  Enable  to enable the five counters on all circuits and slots  Set to  2  Disable  to disable the counters on all circuits and slots     set wfiSys 12 0  lt option gt   1 3 6 1 4 1 18 3 3 1 12       7 10    114088 Rev  A    Chapter 8  System Administration    You can use the Technician Interface to perform the following system  administration tasks     Configure the Access Node  AN  or Access Stack Node  ASN  router   s boot  or configuration sources when booting    Configure AN or ASN initial interfaces   Boot the router   Configure and manage delayed boot services   Restart a slot   Reset a slot   Run diagnostics   Display the version number of the Bay Networks router software  Halt the transfer of packets between slots   Verify and upgrade the software   Validate an executable file   Upgrade and verify a PROM   View the address and size of a dynamically loadable application  Set the Bay Networks ACE backplane type   Reset the date and time    Assign Technician Interface passwords       114088 Rev  A    8 1    Using Technician Interface Software    Enable disable SecurID authent
282. rograms each card with a Personal  Identification Number  PIN  to uniquely identify its prospective owner  then  assigns the card for exclusive use by that person only     If you do not have an assigned PIN  the SecurID client on the router also prompts  you through a routine for PIN assignment   The SecurID administrator for your  network must first configure the ID system to allow you access to the PIN  assignment feature   The SecurID administrator can enable you either to select  your own PIN  or to accept a system generated PIN     The SecurID card uses an internal algorithm to electronically generate temporary     card codes     Before allowing you access to the Technician Interface of a router   the SecurID client requires you to enter your PIN  followed by the current card  code from your SecurID card     The SecurID server on your network either    e Recognizes your PASSCODE and grants access to the router   s Technician  Interface    e Does not recognize your PASSCODE and denies access to the router   s  Technician Interface       114088 Rev  A    Using Technician Interface Software       Note  If the SecurID system denies you access to a router after four login  attempts  the system then removes your PIN from the current list of valid  SecurID users  To reactivate your SecurID PIN  you must request reactivation  from the SecurID administrator of your network        Newly installed routers initially do not require SecurID authentication for  Technician Interface log
283. router ID for Level 1    osil2routes Displays the path or router ID for Level 2    ospf_drs Reports the designated router and backup designated  router for each of the router   s attached OSPF networks    ospf_intf Reports the state of all the router s OSPF interfaces     including virtual links  The states are    1   Down  2   Loopback  3   Waiting    4   Point to point   5   Designated router   6   Backup designated router  7   Other designated router          9 16    114088 Rev  A       Table 9 1     Managing Aliases    Aliases for Debugging Network Problems  continued        If you enter     The system        ospf_Isdb    Lists all interfaces in the link state database        ospf_nbrs    Reports the state of every OSPF neighbor that the  router knows about  The states are    1   Down   2   Attempt   3   Init   4   Two way   5   Exchange start  6   Exchange   7   Loading   8   Full       protocols    Displays bit map in decimal form representing all  protocols running and their associated slots        setvol  lt s ot_no  gt     Sets the active volume for TFTP  puts and gets            shovol Displays the current active volume for TFTP  puts and  gets    snmpbase Displays all SNMP configuration parameters  base    record         sr_intf  lt instance_ID gt     Enables or disables Source Routing for a specific  interface     1   Enable  2   Disable       sr_info    Displays the contents of the Source Routing database  record        sr_cctstats  lt circuit_no  gt     Displays
284. rth byte indicates  the event number or the particular event type unique  to each entity  The specific traps contain one variable  binding    a display string with the name  1 3 6 1 4 1 18 3 5 3 5 4 1 0  The string contains the  actual log message that was recorded in the system  event log     The SNMP set operation is not supported for MIB II objects  All set operations  must be performed through the Bay Networks private MIB  1 3 6 1 4 1 18 3      Line Number Attributes    Line number attributes exist in all line records  for example  SYNC HSSI   CSMACD  and TOKEN  in the Bay Networks router MIB for Version 9 00 router  software  These attributes have the name wfXyzLineNumber  where Xyz is the  prefix for the appropriate line record  Site Manager generates a line number  attribute to uniquely identify each port in the router configuration  The router uses  line numbers to accommodate more than one line per port  and to reference WAN  protocols configured on those lines        A 10    114088 Rev  A    Using the Bay Networks Router MIB    The line number encodes several attributes of the line it represents  You can use  Technician Interface list and get commands to examine and decode a line number   The individual fields of the number correspond to different attributes of a line  as                         follows   0 00 00 00 0 00                resv chan type slot mod conn   Field Purpose   resv   0 1  Reserved for future expansion  with a default value of 0    chan  0 99  I
285. ry for log files and ASCII for alias files  Log files  are stored in binary format  use the log command described in    Logging and  Displaying Event Messages    in Chapter 6 to display a log file in ASCII format     Examples     If you enter  The console displays   type install bat The contents of the install  bat file     type  x config The config file in hexadecimal format     Deleting a File    Use the delete command to delete files that you specify  You can use the wildcard  characters   and   when issuing the delete command           Caution  You cannot recover a file after it is deleted  The delete command  does not prompt you to verify a deletion        Enter the following to delete a file in the present working directory     delete  lt filename gt     You can enter del or delete when deleting a file        Note  You cannot delete a file whose attributes are h  for hidden  or s  for  system   Refer to    Changing File Attributes     earlier in this chapter  for  instructions on changing these protections              114088 Rev  A 5 21    Using Technician Interface Software    Examples    If you enter  The system    delete alt cfg Deletes the alt cfg file in the present working directory   delete   log Deletes all files with the Jog filename extension in the    present working directory     delete     log Deletes all files with a three character filename and a log  filename extension        5 22 114088 Rev  A    Chapter 6  Managing Events    You can use the Technician
286. s  Bay Networks Information  Services maintain an active forum on CompuServe  a global bulletin board  system  This forum provides file services  technology conferences  and a message  section to get assistance from other users     The message section is monitored by Bay Networks engineers  who provide  assistance wherever possible  Customers and resellers holding Bay Networks  service contracts also have access to special libraries for advanced levels of  support documentation and software  To take advantage of CompuServe   s recently  enhanced menu options  the Bay Networks Forum has been re engineered to allow  links to our Web sites and FTP sites     We recommend the use of CompuServe Information Manager software to access  these Bay Networks Information Services resources  To open an account and  receive a local dial up number in the United States  call CompuServe at  1 800 524 3388  Outside the United States  call 1 614 529 1349  or your nearest  CompuServe office  Ask for Representative No  591  When you are on line with  your CompuServe account  you can reach us with the command GO BAYNET        XXX    114088 Rev  A    InfoFACTS    Technical Support and Online Services    InfoFACTS is the Bay Networks free 24 hour fax on demand service  This  automated system has libraries of technical and product documents designed to  help you manage and troubleshoot your Bay Networks products  The system  responds to a fax from the caller or to a third party within minutes of being
287. s that you use to manage the files  and directories on the diskette   For a list of these commands  refer to Table 5 1      To alert the system that the diskette is available for access  issue the mount a   command  DOS performs an implied mount if you issue any of the DOS file  management commands listed in Table 5 1  except  of course  the unmount  command         Caution  Be sure to issue the unmount command as described in this chapter  before you remove a diskette  reboot the router  or reset Slot 2  File corruption  errors can occur when you perform these tasks without first issuing the  unmount command        The Wildcard column indicates whether you can use wildcards    and    when  entering the commands  You use wildcards to display multiple filenames  and to  copy or delete multiple files  The wildcards have the same meaning as those in  UNIX     e The   wildcard matches any number of characters  including zero characters     e The  wildcard matches any single character  A match occurs only when a  character is present in the position indicated by the wildcard        Note  The DOS file system in the router does not format diskettes  however   you can format them on a PC and use them in the router           5 2    114088 Rev  A    Managing a DOS File System                                                          Table 5 1  DOS File Management Commands   Command  Wildcard   Function   attr Vv Changes file attributes    copy Vv Copies a file from one directory to anot
288. s the number of ping messages to send  The system does not  wait for the timeout before sending the next ping  Enter a value between 0 and 10   inclusive   The default is 1     The console displays one of the following messages when you issue a ping  osi  command   If you enter a value other than 0 in the  lt repeat_count gt  argument  the  system displays one of the following messages for the default ping  plus one for  each additional ping      e An alive message  This message appears if the system receives a CLNP  echo response from the target device within the  lt timeout gt  allowed  A sample  message follows     OSI ping  49000400000a12121200 is alive    e A does not respond message  This message appears if the NSAP address of  the target device is resolved  but the system does not receive a CLNP echo  response from the target device within the  lt timeout gt  allowed  A sample  message follows     OSI ping  49000400000a12121200 does not respond       114088 Rev  A    3 15    Using Technician Interface Software    A  lt target address gt  is unreachable message  This message appears if the  local Bay Networks router cannot find the specified address in its routing  table     OSI ping  49000400000a12121200 is unreachable    An NSAP address is too short message  This message appears if the NSAP  address is too short  The minimum allowed NSAP address length is 20  hexadecimal characters  10 bytes   A sample message follows     OSI ping  NSAP address is too short    An OSI 
289. sage Severity Mask of       wfi     the  filter passes only FTP event messages that have a severity level of warning  w    fault  f   or information  i      Filtering by Slot Number    The router stores event messages in the log buffer associated with each slot  You  can configure an entity filter to select for forwarding only event messages logged  on the slots you specify   You must specify at least one slot in the range 1 to 14   where the slot numbers depend on the model of router         114088 Rev  A    C 7    Using Technician Interface Software    You define a range of slot numbers for an entity filter by specifying  e An upper boundary number  MIB object wfSyslogFltrSlotUppBnd   e A lower boundary number  MIB object wfSyslogFltrSlotLowBnd     Syslog considers the upper and lower boundary numbers as part of the range  For  example  you can configure an entity filter for FTP with an event number range of  5 to 27 and a slot number range of 2 to 5  In this case  Syslog forwards to the  associated remote host FTP log messages numbered 5 to 27 logged on Slots 2 to 5  only     You can configure a filter to select messages logged on a specific slot by setting  the upper and lower slot boundary values to the same number        Note  With both the upper and lower boundary attributes set to 0  the default  value for those attributes   the filter cannot transition to the active state        Mapping Router Event Messages into Syslog Message Format    Syslog running on each slot m
290. sages with a severity level of fault to a UNIX  system error level that Syslogd recognizes  Table C 1 describes each of  these error levels     Instructions    We recommend accepting the default UNIX system error level for this  severity level  To map this severity level to a different UNIX system error  level  set wfSyslogEntFltrFaultMap to the error level you want     Command  set  wfSyslogEntFitrEntry wfSyslogEntFlitrFaultMap  lt host_ P_address gt     lt entity_code gt   lt filter_index gt   lt 1  213141516171  8 gt     MIB Object ID  1 3 6 1 4 1 18 3 3 2 15 4 1 12                               Table C 1  Syslogd Error Levels   Error Level Description   EMERG A panic condition that syslogd normally broadcasts to all users   ALERT A condition that you should correct immediately  such as a corrupted   system database    CRIT Critical conditions  such as hard device errors    ERR Errors    WARNING Warning messages    NOTICE Conditions that are not errors but may require special handling   INFO Informational messages    DEBUG Messages that contain information you can use when debugging or          troubleshooting your network           C 44 114088 Rev  A    Parameter   Attribute Name   Attribute Number   Default    Options     Function     Instructions     Command     MIB Object ID     Parameter   Attribute Name   Attribute Number   Default    Options     Function     Instructions     Command     MIB Object ID     Using Syslog Messaging to Monitor Router    Warning Map  wfSys
291. sary  to view the list of files in the directory     Determine which files you need to transfer from the workstation to the  router     Enter a tip command on the workstation to open a dial connection  between the workstation and the desired router  For example     tip modem0    modem0 designates the workstation port that accommodates the dial modem  attached to the workstation  The system displays the following message     Connected       114088 Rev  A    Using Technician Interface Software    5  Press return to invoke the Technician Interface login prompt from the  target router     The system displays the following prompt   Login     6  Enter Manager and a password  if necessary  to log in to the router   s  Technician Interface     The system displays the following message and prompt        Welcome to the  lt Node_Type gt  Technician Interface        7  Enter a cd command to designate the disk volume or memory card     volume    that should receive the files you want to transfer from your  UNIX workstation     For example    cd a   designates diskette Volume a    or   cd 2   designates a memory card volume in router Slot 2   8  Enter the xmodem receive binary command  as follows    xmodem rby   rb is a receive binary file    y is the YMODEM file transfer option     9  Type  c  tilde c  to escape momentarily from the Technician Interface  command line prompt to the UNIX workstation command line prompt     The workstation responds    Local command        B 14 114088 Rev  A 
292. screen text    separator   gt       vertical line  I     About This Guide    Indicate that you choose the text to enter based on the  description inside the brackets  Do not type the  brackets when entering the command    Example  if command syntax is ping  lt  p_address gt    you enter ping 192 32 10 12    Indicates text that you need to enter  command names   and buttons in menu paths   Example  Enter wism  amp     Example  Use the dinfo command     Example  ATM DXI  gt  Interfaces  gt  PVCs identifies the  PVCs button in the window that appears when you  select the Interfaces option from the ATM DXI menu     Indicate optional elements  You can choose none  one   or all of the options     Horizontal         and vertical     ellipsis points indicate  omitted information     Indicates variable values in command syntax  descriptions  new terms  file and directory names  and  book titles     Indicate the title of a chapter or section within a book     Indicates data that appears on the screen   Example  Set Bay Networks Trap Monitor Filters    Separates menu and option names in instructions and  internal pin to pin wire connections    Example  Protocols  gt  AppleTalk identifies the  AppleTalk option in the Protocols menu     Example  Pin 7  gt  19  gt  20    Indicates that you enter only one of the parts of the  command  The vertical line separates choices  Do not  type the vertical line when entering the command   Example  If the command syntax is    show at routes   nets  yo
293. service is not running message  This message appears if the OSI  service is not enabled on the router  A sample message follows     OSI ping  OSI service is not running    A resource error message  This message appears if the router cannot  allocate a buffer for the request because none is available  A sample message  follows     OSI ping  resource error    A system error message  The message appears if the Technician Interface  has failed  A sample message follows     OSI ping  system error    A  lt y  Y Y  Y Y  Y Y  Y Y  Y Y  Y Y  Y  Y Y  Y Y  Y  y gt  is a bad NSAP address  message  The message appears if the NSAP address is more than 20  hexadecimal characters or contains nonhexadecimal characters  A sample  message follows     OSI ping  4900040000a1121212000 is a bad NSAP address       3 16    114088 Rev  A    Examples     If you enter  on one line      ping  osi  49000400000a1 2121200    ping  osi  49000400000a1 2121200   t3  r8    Using Operating Commands    The system     Pings the device at the NSAP address  49000400000a12121200 and waits up to 5   default  seconds for a response  The con   sole displays one of the following messages   OSI ping  49000400000a12121200 is alive  OSI ping  49000400000a12121200 does not  respond   OSI ping  49000400000a12121200 is  unreachable    Pings the device at the NSAP address  49000400000a12121200 eight successive  times and waits up to 3 seconds for a  response to each ping  The console displays  one of the following for each ping
294. sg txt orig  on  the router     You may want to restore the default Welcome message at some later time     2  Use TFTP to copy ti_msg txt from the router to your UNIX workstation  or PC     3  Open ti_msg txt on your workstation or PC     4  Edit the default Welcome message  or enter a replacement message up to  256 characters in length     Format the message with appropriate spacing and return characters   5  Save your new version of ti_msg txt   6  Use TFTP to copy ti_msg txt back to the router     The new version of the file replaces the original version on the router     Recording Console Messages to a File    Use the record command to record to a file all messages the system sends to the  console terminal  In this way  you can save the output of Technician Interface  commands and  if necessary  forward the results to Bay Networks customer  support personnel     Open the record file before recording  then close the file when you finish  recording  You can lose the file if it is not closed before you unmount the file  system or reset the router     Enter the following command to open the record file and record messages to that  file     record open   fileonly    pause   lt vo  gt   lt filename gt     open creates and opens a record file  The system sends command output and  messages to both the console terminal and the file       fileonly  writes messages only to the file  not to the terminal  Use this option  only within a script   This option allows a script to write to 
295. situations     e Communicate directly via e mail with the specific technical resources  assigned to your case     The Bay Networks URL is http   www  baynetworks com  Customer Service is a  menu item on that home page     Customer Service FTP    Accessible via URL ftp   support baynetworks com  134 177 3 26   this site  combines and organizes support files and documentation from across the   Bay Networks product suite  including switching products from our Centillion     and Xylogics   business units  Central management and sponsorship of this FTP  site lets you quickly locate information on any of your Bay Networks products        114088 Rev  A    xX  X    Using Technician Interface Software    Support Source CD    This CD ROM    sent quarterly to all contracted customers    is a complete Bay  Networks Service troubleshooting knowledge database with an intelligent text  search engine     The Support Source CD contains extracts from our problem tracking database   information from the Bay Networks Forum on CompuServe  comprehensive  technical documentation  such as Customer Support Bulletins  Release Notes   software patches and fixes  and complete information on all Bay Networks  Service programs     You can run a single version on Macintosh Windows 3 1  Windows 95   Windows NT  DOS  or UNIX computing platforms  A Web links feature enables  you to go directly from the CD to various Bay Networks Web pages     CompuServe    For assistance with noncritical network support issue
296. smit packet statistics   ipx_intf Enables or disables a specific IPX interface     1   Enable  2   Disable       ipx_if  lt interface_ID gt           Displays the IPX interface record for the specified  interface ID              9 14    114088 Rev  A    Table 9 1     Managing Aliases    Aliases for Debugging Network Problems  continued        If you enter     The system        ipx_route  lt  nstance_ID gt     Displays the IPX route record for the instance ID of the  particular route you specify        ipx_server  lt instance_ID gt     Displays the IPX server table for the instance ID of the  particular server you specify              ipx_it Displays the IPX interface table  including the state of  the interfaces  The states are  1 Up  2   Down   ipx_rt Displays the metrics of all routes    ipx_st Displays the names of all servers        ipxinr  lt interface_ID gt     Displays the number of packets received on a specific  interface        ipxind  lt  nterface_ID gt     Displays the number of packets  RIP or SAP  received  on a specific interface        ipxforwd  lt interface_ID gt     Displays the number of packets forwarded on a specific  interface        ipxoutr  lt interface_ID gt     Displays the number of out requests  RIPs and SAPs  originated from the router  for the interface you specify        ipx_stat  lt interface_ID gt     Displays the last four aliases on the interface you  specify        ipx_nexthop  lt instance_ D gt     Displays the next hop for the network you
297. ssword gt     New routers initially have no password login requirements  If your network  administrator enables password access on a router  the Password prompt appears  when you attempt a login to that router  We recommend password access to help  establish access and data security for routers in your network  For instructions on  how to enable or disable password authentication on a router  see    Assigning  Passwords    in Chapter 8     Login with SecurlD    SecurID is a feature for barring unauthorized users from accessing the Technician  Interface on a Bay Networks router through a Telnet session        114088 Rev  A    Introducing the Technician Interface    If you enable this feature on a router  you enter in addition to a login entry a  SecurID PASSCODE    after the Passcode prompt  as follows     Login   lt User  Manager gt   Password   lt password gt   if enabled   Passcode   lt passcode gt     If your SecurID administrator enables the SecurID client on a router you need to  access  you see the Passcode prompt at login time  When you enter a valid  PASSCODE  you receive Technician Interface login privileges to the router  You  receive on your Telnet access screen the Technician Interface login prompt      or  whatever your network administrator selects for the Telnet login prompt      Each User or Manager authorized to access a router configured with an active  SecurID client must have an electronic SecurID card issued by Security  Dynamics  Inc  Security Dynamics p
298. stance gt     lt object gt  is the required object name or identifier      lt attribute gt  is the required name  identifier  or wildcard character of the object  attribute s   The wildcard character   displays all attributes of the object and their  associated values      lt instance gt  is the optional name or identifier of the instance  An asterisk     in  place of the instance displays all instances of the object and their associated  values  You can also indicate an asterisk as part of the instance identifier to display  all instances that begin with the partial instance you specify  For example  if you  enter the following command  the system returns all instances of Attribute 1   wherever the instance ID also begins with 192 32     get wflpBaseRtEntry 1 192 32         Note  You cannot use more than one wildcard in a get command           7 4    114088 Rev  A    Accessing the MIB    The following examples demonstrate ways to display the value of an attribute  The  attribute in these examples is named wfSnmpDisable  Its instance ID is 1  Its  object name is wfSnmp and object identifier is 1 3 6 1 4 1 18 3 5 3 5 1     The instance ID of 0 is reserved for base record objects  Specifying the base  record instance ID in the get command is optional   Refer to the second example      The last example demonstrates how to obtain a group of values associated with an    object     Examples     If you enter     Any one of the following    get wfSnmp wfSnmpDisable  get wfSnmp wfSnmp
299. sting alias  when you want to display its associated  commands      lt alias_value gt  is a string of Technician Interface commands  The following rules  apply to inserting characters in the  lt alias_value gt      e Separate commands with a space and a semicolon         66 99    e Use double quotes           outside the  lt alias_value gt  if it includes a space or a  semicolon      The quotes are otherwise optional     e Enter a backslash     before every quote character inside the  lt alias_value gt    This includes the quotes in an echo command embedded within the   lt alias_value gt      e Enter a backslash     before the following characters when you use them  literally  another backslash      a percentage sign      or a dollar sign     at  the last character position of the  lt alias_value gt      e Limit the  lt alias_value gt  to 255 bytes of data  just over three 80 character  lines      You can create an alias that invokes other aliases by entering the alias command  and nesting up to 15 other aliases in the  lt alias_value gt  argument  Separate the  aliases with a space and a semicolon       Refer to the last example in the  examples that follow      When you create an alias  the system stores it in memory  Use the save command   described in a later section  to save the aliases in RAM to a file for later retrieval   The system can store up to 100 aliases in memory  provided that memory isn   t  dedicated to other tasks  so limit the number of aliases in an alias
300. t     Enter the following command to copy a file from one directory to another  and use  a new filename     copy   lt dir_1 gt   lt old_name ext gt    lt dir_2 gt   lt new_name ext gt     Examples     If you enter  The system   copy config alt cfg Copies the config file in the present working directory  and names the new copy alt cfg     copy      newfiles Copies all files in the present working directory to the  directory new files     copy  logf l6_22 log Copies the  6_22 log file from the logf directory to the   inv span log inv directory and names the new file span log        5 14    114088 Rev  A    Managing a DOS File System    Copying Files from DOS to NVFS    When copying files from DOS diskettes to NVFS memory cards  you must  specify the destination filename in the command  DOS filenames are in upper  case  The NVFS filenames for the router software image and the configuration file  must be in lower case        Caution  The router will fail to boot from a memory card whose image and  configuration file have uppercase names        If you copy files from DOS diskettes to NVFS memory cards and you do not  specify the destination filename  the system copies the filename in upper case  For  example  if you enter copy a ace out 1   the system copies the file to NVFS as  ACE  OUT  If you enter copy a ace out 1 ace out  the system copies the file to  NVES as ace out     Do not use wildcards  If you copy files from DOS to NVFS using a wildcard  the  filenames will be copied 
301. t 192 32 1 62 Sends a copy of config2 cfg from Volume 2   2 config2 cfg 3 newconf to newconf in Volume 3 on the remote node at  the IP address 192 32 1 62    tftp get 192 32 1 62 Requests a copy of config2 cfg from Volume 2   2 config2 cfg of the remote node at the IP address  192 32 1 62 and stores the copy in the current  working directory    tftp put 192 32 1 62 Sends a copy of config2 cfg to config2 cfg in   2 config2 cfg Volume wfTftp 2 0 on the remote node at the IP  address 192 32 1 62    tftp put 192 32 1 62 Sends a copy of 2 config2 cfg but puts it on    2 config2 cfg 3 config3 cfg Volume 3 and calls it config3 cfg     After transferring the file  you can copy it at the source to its original name  If the  new file at the destination is a configuration file or an executable file  verify its  integrity by booting with it  If the system boots and loads the configuration  without problems  you can rename or copy the filename at the destination to its  original     You can also load a file onto the router by specifying the router host name and  volume  using the following command     tftp put  lt remote_file gt   lt host_name gt   lt local_vol gt   lt local_file gt        4 16    114088 Rev  A    Managing a NonVolatile File System    This method is useful if the wfTftp 2 0 attribute for the default volume was not set  during the Quick Start procedure     Example   If you enter  The local system   tftp dark Transfers a copy of the install  bat file to    put install bat d
302. t you terminate this procedure after no more than one  additional shutdown attempt     Running Diagnostics    The diags command cold starts one or more specified slots or the entire system   The cold start consists of CPU  backbone  and link diagnostics  and a reboot  If  you do not enter a slot number  the system tests and reboots all slots     Enter the following to run diagnostics on the entire system     diags  The system returns the following message     Perform diags on all slots   y n     If you still want to run diagnostics on all slots  enter    y     yes   Entering    n     no   aborts the command     Enter the diags command with one of the following parameters to run diagnostics  and reboot one or more ILIs     diags   lt s ot_no  gt    diags   lt s ot_no  gt   lt slot_no  gt      diags   lt s ot_no  gt   lt slot_no  gt                114088 Rev  A 8 29    Using Technician Interface Software    Examples    If you enter  The system    diags Runs diagnostics and reboots the entire system    diags 1 Runs diagnostics for Slot 1 and reboots Slot 1    diags 1 5 Runs diagnostics for Slots 1  2  3  4  and 5 and reboots Slots  1  2  3  4  and 5    diags 4 6 Runs diagnostics for Slots 4 and 6  and reboots Slots 4  and 6     The system runs diagnostics on the associated slot or slots  loads the router  software image  loads the configuration  and initiates the router software services     We recommend that you issue the diags command to the associated slot  immediately after 
303. tem    more Displays more mode on or more mode off     more on  more  s on 24    more on  lt no  gt     more off    Halting a Command    Enables the more mode  pauses the system and prompts you  to continue when a screen fills     Enables the more mode  sets screen size to 24 lines  no  output displayed     Displays the number of lines that you specify before pausing     Disables the more mode  The screen scrolls automatically  without prompting you     Press control c  hold down the control key and press c  to halt processing of a  command you just issued  This escape sequence returns Technician Interface  prompt to your console or Telnet screen     Repeating the Command Last Entered    Use the repeat command     to repeat execution of the last command you entered   You can specify an optional repetition count to repeat the command        114088 Rev  A    3 3    Using Technician Interface Software    Enter the following to execute the last command you entered  where   lt repeat_count gt  is the optional number of times you want to execute the  command   The default is 1 time          lt repeat_count gt       Examples   If you enter  The system     Executes the last command you entered   15 Executes the last command you entered five times     Repeating a Command Recently Entered    Use the history command to    e View a list of the Technician Interface commands most recently entered  during the current console or Telnet session     e Recall and run a specific command from the
304. ter 2        For instructions on changing the default values associated with Telnet access to  the Technician Interface  refer to Configuring IP Utilities     For information on changing the default values associated with SecurID services   see    Enabling and Disabling SecurID Authentication    in Chapter 8        Logging Out    To exit a Technician Interface session  enter the following command after the  Technician Interface prompt     logout   For a console connected directly to the router  the Login prompt reappears   Login   lt User   Manager gt    Password   lt password gt   if enabled    Passcode   lt passcode gt   if enabled     For a remote terminal program on a PC or workstation connected to the router by  means of modems  the following messages appear  and the Technician Interface  hangs up the telephone     TI session logged out        Goodbye           Note  To use the Technician Interface with a modem  see Chapter 2        If the Modem Enable parameter has a setting of Disable  default  and the session  terminates unexpectedly  the router does not automatically log you out  You must  re establish a connection to the router and log out using the logout command        114088 Rev  A    Introducing the Technician Interface    Starting a Manager Session from within a User Session    You can initiate a Manager session within a User session by entering the following  command     system    The Password prompt appears at this time if your network administrator  configur
305. th the router and enter the following command at the  Technician Interface prompt     get wfHweEntry  16         8 40    114088 Rev  A    System Administration    With a Model BLN router  for example  information similar to the following  appears  with one wfHwEntry wfHwDiagPromSource line for each slot     wf  my    wf  wy  wf  wy    wf  wy       HwEntry wfHwDiagPromSource 2    harpdiag rel v4 00 wf pj harpoon ss image p frediag exe        HwEntry wfHwDiagPromSource 3      harpdiag rel v4 00 wf pj harpoon ss image p frediag exe        HwEntry wfHwDiagPromSource 4    harpdiag rel v4 00 wf pj harpoon ss image p frediag exe                    HwEntry wfHwDiagPromSource 5      harpdiag rel v4 00 wf pj harpoon ss image p frediag exe                                Each line of response to the command specifies    A slot number  for example     wfHwEntry  wfHwDiagPromSource 2    identifies  Slot 2         A pathname that contains the version number of the image stored in a  diagnostics PROM  for example    harpdiag rel v4 00 wf pj harpoon ss   image p frediag exe  identifies the    v4 00     Version 4 0  diagnostics PROM  image frediag exe in Slot 2         Using the prom Command       Note  Before upgrading any router software  always save a copy of the  original configuration file and boot image as a safeguard  in case you  encounter problems during the procedure        To upgrade the PROMs     1     Insert a Flash card with contiguous free space sufficient to accommodate  the PR
306. the Technician Interface of the remote router     e Transfer files between the router and your workstation   You can initiate other  Technician Interface commands as well at the Technician Interface prompt  inside the Wfterm program window  However  this section does not provide  information on Technician Interface procedures other than those required to  support xmodem out of band file transfers      e Log off the target router  terminate the Technician Interface session      e Disconnect terminate the connection between the workstation and the target  router     If you are opening Wfterm for the first time  proceed to the next section      Checking and Verifying Current Modem Interface Settings           If you are sure that the current interface settings for the modem locally attached to  your workstation are already correct  and you have determined the types of file  transfer operations you need to perform  proceed to    Initializing the Local  Modem        Checking and Verifying Current Modem Interface Settings    You must ensure that the modem locally attached to your workstation can  establish a connection with a modem attached to the Technician Interface port of a  remote target router  To satisfy this requirement  you need to check current  settings for the physical layer interface to that modem  If the settings you observe  are inappropriate for the type of data link and modem attached to the remote target  router  you can enter new settings dynamically  through the
307. the following  command at the Technician Interface prompt     list  i wfSyslogHostEniry    The list includes the instance IDs  in this case  the IP addresses  of all remote  hosts currently defined in the Syslog host table     1     Add a new host entry to the Syslog Host Table  as follows      set wfSyslogHostTable wfSyslogHostDelete  lt host_ P_address gt  1     commit    This entry informs Syslog of a remote host at the destination IP address that  you specified     If you want to accept the default settings for host attributes  wfSyslogHostLogFacility  184   Local7  and wfSyslogHostTimeSeqEnable   2   disabled   go to Task 6  Otherwise  continue with Step 2 to configure a  customized setting for either attribute        114088 Rev  A    Using Technician Interface Software    2  To define the UNIX system facility you want to receive Syslog messages  from the router  enter the following        set wfSyslogHostTable wfSyslogHostLogFacility  lt host_ P_address gt    lt 128  1361 144  1521 1601 168  1761 184 gt  commit    128   local0 160   local4  136   locall 168   local5  144   local2 176   local6  152   local3 184   local7    3  To optionally enable Syslog message time sequencing for the remote host   enter the following        set wfSyslogHostTable wfSyslogHostTIlmeSeqEnable    lt host_IP_address gt  1 commit       Note  Only hosts represented by entries that are ENABLED   wfSyslogHostDisable  1  and have an operational state of ACTIVE   wfSyslogHostOperState   1  receive 
308. the modem  to an on hook state  Going on hook should cause the dialed connection between  the local and the remote modems to be dropped     You may also encounter differences in modem interface cabling requirements        B 8    114088 Rev  A    Using Out of Band Access to Transfer Files    For more detailed information on these and other modem related issues  refer to  the user manual for the modem you want to use for Technician Interface access     Viewing xmodem Log Events    To view the log information for xmodem  YMODEM  file transfers  enter the  following command at the Technician Interface command line prompt     log  eXMODEM  fdi    Hardware Configuration    To transfer files out of band between any Bay Networks router and a remote  workstation  you use the hardware configuration shown in Figure B 1     Figure B 1 shows how to connect a Bay Networks router and workstation to a dial  network using two Hayes compatible modems  With this configuration  you use a  remote PC or UNIX workstation  The configuration supports a remote connection  to the router   s Technician Interface                                                                      Modem Dial Network Modem                      TS0005A    Figure B 1  Modem Connection    Note  Use a network interface cable to connect a modem to the dial network   Use an RS 232 C modem cable to connect a workstation or Bay Networks   router to a modem   Use cable No  7825 for all except BLN  BLN 2  and BCN   routers  Use cab
309. the other protocols supported by  xmodem commands  refer to    For More Information     later in this appendix         B 2 114088 Rev  A    Using Out of Band Access to Transfer Files    In support of Bay Networks router file management tasks  the YMODEM batch  protocol has the following capabilities     Supports batch file transfers  moving one or more files specified in a single  xmodem command     Automatically converts filenames received during batch file transfer  operations    Transfers binary files with error detection    Marks every transferred file with a time stamp  which indicates the most  recent modification date of a file    Automatically deletes a file unsuccessfully transferred between a router and a  workstation    Allows you to cancel a file transfer operation while that operation is still in  progress    Y MODEM transfers binary files intact  with no padding  and using a default  packet size of 128 bytes  To use the YMODEM protocol  a Bay Networks router  does not require access  in band  to the IP network on which a source destination  remote workstation also resides  Instead  you use out of band  dial network   access from the UNIX or 386 486 DOS workstation to run Technician Interface  xmodem commands and conduct file transfers through a modem  You are most  likely to use the YMODEM protocol to move files when your IP network is down  or impaired        114088 Rev  A    B 3    Using Technician Interface Software    The xmodem Command    The following repr
310. the range  Also set the value of  wfSyslogEntFltrSlotUppBnd  Slot Upper Bound  to the higher number of  the range     Any range you specify includes the values for the lower and upper bound  parameters attributes  For example  if you specify a lower bound of 1 and  an upper bound of 4  Syslog forwards all event messages logged on Slots  1 through 4  inclusive   Syslog ignores all other event messages     To filter events for a specific slot  set the value of  wfSyslogEntFltrSlotLowBnd to the desired slot number  Set the value of  wfSyslogEntFltrSlotUppBnd to the same number  For example  to  forward only event messages logged on Slot 2  enter 2 as the value of  wfSyslogEntFltrSlotLowBnd and as the value of  wfSyslogEntFltrSlotUppBnd     If you do not want to filter messages by slot number s   accept the lower  and upper bound default values of 0     set wiSyslogEntFltrEntry wfSyslogEntFltrSlotLowBnd    lt host_IP_address gt   lt entity_code gt   lt filter_index gt   lt 0   14 gt     1 3 6 1 4 1 18 3 3 2 15 3 1 10       C 42    114088 Rev  A    Using Syslog Messaging to Monitor Router    Parameter  Slot Upper Bound  Attribute Name    wfSyslogEntFltrSlotUppBnd  Attribute Number  11    Default  0  Range  Otol4  Function  Along with the Slot Lower Bound  this parameter attribute specifies a slot    number or range of slot numbers  Syslog forwards to the remote host  associated with this filter messages logged only on the slot s  you  specified   Consider the location of each rout
311. ti exit disc  1       Total Peers 1 Total Nets 256    For ip bgp_routes  N  the display specifies    e Total number of peers    e Total number of networks    IGP 5 EGP 0 INC 251        e Total number of routes announced to the first 5 peers on each slot       114088 Rev  A    8 69    Using Technician Interface Software    Example  bgp routes     Enter the following command to display routes announced to BGP peers known to  the local router     ip bgp_routes  N                                        Network Mask Peer Rem Addr NextHop Address Org Loc Pref   192 32 174 4 30 192   32 175 6130 192 323 175129  IGR  As Path  SEQ 2   192 32 174 8 30 192 32 175 130 192 32 175 129 IGP  As Path  SEQ 2   192 32 174 32 27 192 32 175 130 192 32 175 129 IGP  As Path  SEQ 2   192 32 174 96 27 192 32 175 130 192 32 175 129 IGP  As Path  SEQ 2   192 32 174 128 27 192 32 175 130 192 32 175 129 IGP  As Path  SEQ 2   192 32 174 160 27 192 32 175 130 192 32 175 129 INC  As Path  SEQ 2   192 32 174 192 27 192 32 175 130 192 32 175 129 INC  As Path  SEQ 2   SLOT 4  Total Peers 1 Total Nets 7       7 Routes To 192 32 175 129 192 32 175 130 IGP 5 EGP 0 INC 2        Example  ospf_Isdb     Define a command to display the OSPF Link State Database for Type 1 link states  in area 0 0 0 0     ip ospf_Isdb  t1  a0 0 0 0    The following is a typical response from the router        LS Type Link State ID Adv Router Metric ASE Fwd Addr Age Seq Nbr       Router 192 32 174 62 192 32 174 62 100 1904 80000009    Ro
312. ting a partition  When you issue the partition  delete command without specifying a subvolume  all files on  lt vol gt b are lost           114088 Rev  A 4 21    Using Technician Interface Software    Examples   If you enter  The system   partition create 1  Divides memory card or SIMM Volume 1 into two vol     umes  storing all existing files in Volume 1a and creat   ing and formatting a new Volume 1b     partition delete 1b  Removes Volume 1b  files included    or  partition delete 1        4 22 114088 Rev  A    Chapter 5  Managing a DOS File System    You can use the Technician Interface to manage DOS files on a Bay Networks  router  This chapter is intended only for users whose routers are equipped with a  diskette drive     To manage a DOS file system  you do the following     Name files   Mount and unmount a volume  Change the present working directory  Display a directory   Label a diskette   Create and remove a directory  Rename a file or directory    Copy files to different filenames on the same directory  or to a different  directory    Transfer a file   Change a file   s attributes  Display the contents of a file  Delete a file       114088 Rev  A    5 1    Using Technician Interface Software    Overview    The DOS file system on the router reads and writes to the diskette  The diskette  gives the system access to the software image and configuration file during a cold  start   A cold start occurs after a power cycle      The DOS file system accepts the DOS command
313. tive unused and best routes                    ip routes  A  Network Mask Proto Age Sl Cost NextHop Address   AS Weight         0 0 0 0 0 RIP 20 2 2  19232  174433 7p9e0002  0 0 0 0 0 Direct 385 0 131071 Unreachable ffffffff  0 0 0 0 32 Host N A 0 O un  IP cct 0 00000000    6 0 0 0 8 Direct 385 2 0 6 6 6 6 00000000  6 0 0 0 32 Host N A 2 0 Broadcast 00000000  6 6 6 6 32 Host N A 2 0 This Router 00000000  6 255 255 255 32 Host N A 2 0 Broadcast 00000000    128 128 0 0 16 RIP 20  2 2 192 32 174 33 7b9e0002    129 128 0 0 16 RIP 20 2 29252327 UTA 33 7b9e0002    130 128 0 0 16 RIP 20  2 2 192 32 174 33 7b9e0002    131 119 0 0 16 RIP 20 2 2e  VOR  32 0 fA 33  7b9e0002    134 177 0 0 16 RIP 20 2 2 192 32 174 33 7b9e0002    141 251 0 0 16 RIP 20 2 2 192 32 174 33 7b9e0002    146 240 0 0 16 RIP 20   lt 2 2 192 32 174 33 7b9e0002    170 41 0 0 16 RIP 20 2 2 192 32 174 33 7b9e0002    172 14 0 0 16 RIP 20 2 21 92 322174533 7o9e0002    172 15 0 0 16 RIP 20 2 2192 32217433  7b9e0002    192 1 1 0 24 RIP 20 2 2  192732174733 7b9e0002    192 1 2 0 24 RIP 20 2 2  192  32 1 745333 7b9e0002    192 32 1 0 24 RIP 20 2 2 192 32 174 33 769e0002          Total Networks on Slot 2   268    The asterisk indicates best routes  or routes currently being used by IP        114088 Rev  A 8 67    Using Technician Interface Software    Example  bgp routes   Enter the following command to display the entire BGP table of routes     ip bgp_routes    Network Mask Peer Rem Addr NextHop Address Org Loc Pref Best Us
314. to  the NLSP based ping   However  NLSP based ping is not currently an option of the ping  ipx  command on the router        IPX configuration request packets typically obtain configuration information from  other devices on a NetWare network  However  the router only uses these packets  to test the reachability of a remote device that listens for and responds to IPX  configuration request packets        Note  The Bay Networks IPX router will neither send nor acknowledge IPX  configuration request packets addressed to network 0x00000000  local  network destination  or network OxFFFFFFFF  or host 0xO00000000000 or  host OXFFFFFFFFFFFF  broadcast host destination   The IPX router responds  only to request packets sent directly to one of its interface addresses        If you send a request packet from a router to an IPX interface on that same router   the router does not send the request packet out onto the line  Instead  the router  sends the packet internally to the specified interface  which then responds  internally     Enter the following to ping a remote device running IPX   ping  ipx  lt  PX_address gt    t lt timeout gt     r lt repeat_count gt        lt IPX_address gt  is the required IPX address  in hexadecimal or decimal notation   of the remote device     An IPX address in hexadecimal notation consists of a 4 byte network address and  a 6 byte host address  separated by a period  for example    Ox0000AB 12 0x000000CD 1234  leading zero padding is not required    The 
315. to 23 and the   23   44  fourth counter to 44  The first  third  and  fifth counters are not changed     Customizing Hardware Compression Search Depth    If you have model BLN  BLN 2  and BCN routers configured to run frame relay  on circuits of an Octal Sync link module  you can customize the depth of search  for tokens to replace data patterns sent and received by the optional Octal Sync  Hardware Compression daughterboard        Note  For more information on hardware and software compression services   refer to the Configuring Data Compression Services guide        By increasing the search depth  you may enable the daughterboard to attain  compression ratios higher than are possible using default or inherited search depth  values   The results you achieve depend greatly on the type of data you want to  compress over a circuit or line   Note  however  that increasing the compression  ratio beyond a certain value on a circuit or line may also lower the throughput on  that circuit or line  Configure search depth attributes for the best trade off between  compression ratio and end to end  for example  workstation to workstation   throughput on the circuit or line     Use Technician Interface commands to customize  e wfWcpLineSearchDepth  e wfWcpCircuitSearchDepth       Note  Only expert network technicians or administrators should attempt to  modify the set value of these WCP attributes  You cannot modify these  attributes from a Site Manager workstation           114088 Rev  
316. to Managing Routers and BNX Platforms         Each entity filter selects only event messages that    e Originate from a router software entity that you specify by entity number  AND    e Have an event message number OR severity level that matches one of the  values you configured AND    e Originate from a router slot you specify    Figure C 2 illustrates how an entity filter limits the number of event messages  forwarded by Syslog from a router to a specific remote host  Each filter attribute  or parameter  entity number  event numbers or severity levels  and slot numbers   that you specify increases the selectivity of a filter        114088 Rev  A    New unfiltered    the events log    Using Syslog Messaging to Monitor Router    Entity Filter for One Host        Select by Event    Number Range Filtered  i   event  i    Select by Select by Slot messages     gt  fora                               messages from              gt   Entity _  OR  a  Number Range  i Number  5   designated  S   Select by Event      i remote             host    Polling the    Identifying    Severity Levels             TSO002A    Figure C 2  Router Event Message Filtering for One Host    Events Log    Syslog polls the events log buffer on the local slot to retrieve any new messages  logged since the previous polling attempt  Syslog polls the local slot at an interval  determined by the set value of the wfSyslogPollTimer  poll timer  attribute  You  can accept the system default value or set a customize
317. tocol program running on the  workstation and the YMODEM program running on the router  This  handshaking in turn triggers the start of the file transfers you specified in the  xmodem command entered at the Technician Interface command line prompt        B 12    114088 Rev  A    11     12     Using Out of Band Access to Transfer Files    Workstation and router response   typical        XMODEM File Receive Function  CRC mode requested on command line    YMODEM Batch Protocol          YMODEM Batch Receive Complet    away for 37 seconds  the amount of time the router   s Technician Interface  relinquished control to the router   s YMODEM protocol program  i e   the    duration of the file transfer operation             If you are finished transferring files from the router to the remote  workstation  enter logout at the Technician Interface command line  prompt     This action returns control to the UNIX workstation command line prompt     Enter the Is command to list the contents of the current  receiving   directory  to verify that the file transfer operation completed successfully     Transferring Files from UNIX Workstation to Router    To transfer one or more files from your UNIX remote workstation to a Bay  Networks router  use the following procedure     1     At the UNIX command line prompt  enter a cd command to change  if  necessary  from the current directory to the directory that contains the  files you want to transfer to the router     Enter a dir command  if neces
318. transmission time 9 seconds    Receiver invoked CRC mode       on ACK on sector 1   Sector 0 sent   Sector 32 sent   Send Complete   56 Sectors Transferred in 31 seconds  Transfer Rate   231 Characters per Second  Closing down Batch Transmission   Non ACK on Sector 1   Sector 0 sent   Batch Send Complete   away for 40 seconds  the amount of time the workstation   s command line    relinquished control to the workstation   s YMODEM protocol program  i e    the duration of the file transfer operation     f       Enter the dir command to list the contents of the receiving volume in  order to verify that the file transfer operation completed successfully     If you are finished transferring files from the router to the workstation   enter logout     This action returns control to the UNIX workstation command line prompt        B 16    114088 Rev  A    Using Out of Band Access to Transfer Files    Out of Band File Transfers from a Windows Workstation    This section describes the Bay Networks Communications Terminal Program and  its applications for logging in to the Technician Interface of a remote router and  for transferring files to and from a router     xmodem and the Bay Networks Communications Terminal Program    The Bay Networks Communications Terminal Program  filename wfterm exe  is  an ASCII terminal emulation utility included with your Site Manager  for  Windows 3 1  PC software  Nearly identical in purpose to the tip  Terminal  Interface Program  command on a UNIX wor
319. tted router event  message  plus a priority code required by the remote host  The remote host uses  this information to make decisions on how to handle messages received from a  router     Priority Code    The example of a priority code and its text  Figure C 4  consists of a facility code  plus an error level code  in the form facility error      Facility Code   2340 Error Level Code   740          TSO004A    Figure C 4  Syslog Message Composition    The facility code identifies a standard UNIX system facility that receives a  message from an internal or external software entity  The    Local  lt 0 7 gt     UNIX  system facilities receive event messages  in Syslog format  from routers in your  network  The following table relates UNIX system facility names to their  respective facility codes on a workstation        C 10 114088 Rev  A    Using Syslog Messaging to Monitor Router       UNIX System  Facility Name    Facility Code     equivalent decimal value        Local 0    1       Local 1       Local 2       Local 3       Local 4       Local 5       Local 6          Local 7    ooINIDDJA J AJOJN          The error level code identifies the severity level  level of urgency  of a received    message for UNIX system handling decisions  such as logging  displaying     printing  or forwarding the message   The following table shows one way to map  UNIX system error codes and error levels to the severity levels of event messages  from Bay Networks routers        Suggested Mapping to
320. ttribute to the  low number of the range  Set the value of the  wfSyslogEntFltrLogEvtUppBnd  Log Event Upper Bound  parameter to  the high number of the range     Any range you specify includes the values for the lower and upper bound  parameters attributes  For example  if you specify a lower bound of 2 and  an upper bound of 7  Syslog forwards all messages with event codes of 2  through 7  inclusive   logged by the entity defined under  wfSyslogEntFltrNum  Filter Entity Name   Syslog ignores all other event  messages     To filter  select only  a specific event  set the value of  wfSyslogEntFltrLogEvtLowBnd to the code number for that event  Set  the value of wfSyslogEntFltrLogEvtUppBnd  Log Evt Upper Bound  to  the same code number  For example  to forward only log messages that  have an event code of 10  enter 10 as the value of  wfSyslogEntFltrLogEvtLowBnd and as the value of the  wfSyslogEntFltrLogEvtUppBnd  Log Evt Upper Bound      If you do not want to filter by event code  accept the lower and upper  bound default values of 0 to 255  In this case  Syslog checks for filtering  criteria based on a message severity mask  wfSyslogEntFltrSevMask   If  you specify lower and upper boundary values of 255  the wildcard entity  number   Syslog ignores this attribute as filtering criterion     set wfSyslogEntFltrEntry wfSyslogEntFltrLogEvtLowBnd    lt host_IP_address gt   lt entity_code gt   lt filter_index gt   lt 0   255 gt     1 3 6 1 4 1 18 3 3 2 15 3 1 7       114088 Rev  
321. twork     1  Bay Networks HDLC encapsulation  also referred to as  Bay Networks Standard Point to Point  with external  clocking   2  Frame Relay Annex D   Frame Relay LMI   Frame Relay Annex A    Pro       Frame Relay settings         fr    Configures the router s synchronous port as a Frame Relay  connection  With this setting  use one of the following options  to specify a DLCMI setting   annexd   annexa  or  Imi         annexd   annexa   Imi    When one of these options is used with the  fr setting  it  specifies a DLCMI setting  Use the same setting as the  network to which the router   s Frame Relay interface is  connected  The default setting for Frame Relay is  annexd        Internal clocking setting         int_clk    Sets the router   s synchronous port to internal clocking at 1 25  MB s  If you do not specify the  int_clk setting  the router  defaults to external clocking        IP connector setting         lt interface gt           Specifies the type of IP connector you are configuring  For the  AN and ANH  use com or com2 for synchronous media  For  the ASN  use com lt network_module_no  gt  lt port_no  gt             continued        114088 Rev  A    System Administration                   Table 8 2  ifconfig Command Settings  continued   Setting Description  IP address settings    lt I P_address gt  Specifies the IP address of the interface you set with   lt interface gt   Provide this address in dotted decimal notation    lt subnet_mask gt  Specifies the IP su
322. twork administrator sets on the router  for console or Telnet access to the router     You can also customize the Technician Interface Welcome screen with a message  appropriate for the requirements of your organization or network site  Refer to     Customizing the Technician Interface Welcome Message    in Chapter 8 for  instructions        Login Timeout Guidelines    Keep the following in mind when you enter your login name  User or Manager   and password     e If you do not make an entry at the Login prompt for 1 minute  default   the  Technician Interface disconnects from the router     e Ifyou do not make an entry at the Password prompt for 1 minute  default   the  Technician Interface returns you to the Login prompt     e If you enter the login name or password incorrectly 3 times  default   the  Technician Interface disconnects you from the router     e Ifyou do not make an entry at the SecurID prompt for 1 minute  default   the  Technician Interface returns you to the Login prompt     e Ifyou enter the SecurID PASSCODE incorrectly 4 times  default  the  SecurID client software disconnects you from the router and initiates  deactivation of your SecurID card account   You must request reactivation  from the SecurID administrator for your network         114088 Rev  A 1 14    Using Technician Interface Software    Login Configuration    For instructions on changing the default values associated with the console port   see    Configuring Console Port Parameters    in Chap
323. types you want to display   Enter the log command as follows  to limit the display of events     log   lt vol gt   lt  log_file gt     d lt date gt     t lt time gt     e lt entity gt     f lt severity gt      s lt s ot_ID gt     p lt rate gt     c lt code_no  gt     w     You can enter any combination of the following optional parameters      lt vol gt   lt log_file gt  is the volume number or letter where a log file is located  and  the name of the log file  The system displays the events saved to this file      lt date gt  is the date in mm dd yy format  The system displays the events logged on  and after that date      lt time gt  is the time in hh mm ss format  The time you can enter ranges from  00 00 00 to 23 59 59  The system displays the events logged at and after that time      lt entity gt  is a software service that logs events  Quotes are required when the   lt entity gt  contains spaces  Use uppercase letters when specifying the  lt entity gt    See Event Messages for Routers and BNX Platforms for a list of the entities      lt severity gt  is one or more letter codes for an event type  The system displays the  events by type  The severity codes are f or F for fault  i or I for informational  t or  T for trace  w or W for warning  and d or D for debug   Debug events are intended  only for Bay Networks Technical Response Center personnel       lt slot_ID gt  is the number of the slot containing a link module  The system  displays the events associated with the li
324. u can display a list of instance identifiers using the list command  Enter  the list command with the following parameters to display a list of instance  identifiers     list   instances    lt object_name gt      or   list    i    lt object_name gt       instances  or   i  represents the optional key word instances       lt object_name gt   is the name of the object at the level above the attributes        7 2 114088 Rev  A    Examples     If you enter     list    list wKCSMACDEntry    list instances  wfCSMACDEniry  list  i wfCSMACDEntry    Accessing the MIB    The console displays     All object names and their associated object  identifiers   wfCSMACDEntry   1  wfFddiEntry   1 3   wfFddiSmtEntry    1 36141183419121             All attribute names and associated attribute  identifiers of the wfCSMACDEntry object   wfCSMACDDelete   1   wfCSMACDEnable   2   w  CSMACDState   3       All instance identifiers of the wfCSMACDEntry  object configured on your system    inst_ids   2 1   2 2   4 1   4 2       114088 Rev  A    7 3    Using Technician Interface Software    Getting MIB Values    The get command displays the value of a MIB object  You can also insert a  wildcard character     into the attribute name or into the instance identifier to  display the values of multiple objects     Enter the following to display one or more object identifiers and their associated  values     get  lt object gt   lt attribute gt   lt instance gt    or   g  lt object gt    lt attribute gt   lt in
325. u enter either  show at routes or show at nets  but not both        114088 Rev  A    xxi    Using Technician Interface Software    Acronyms  ACE Advanced Communications Engine  AFN Access Feeder Node  ALN Access Link Node  AN Access Node  ANH Access Node Hub  APING APPN Ping  APPN Advanced Peer to Peer Routing  ARP Address Resolution Protocol  ASCII American Standard Code for Information Interchange  ASN Access Stack Node  ASN 1 Abstract Syntax Notation  AT AppleTalk Protocol  ATM Asynchronous Transfer Mode  AURP Appletalk Update based Routing Protocol  BCN Backbone Concentrator Node  BGP Border Gateway Protocol  BLN Backbone Link Node  BLN 2 Backbone Link Node  2 power supplies   BOOTP Bootstrap Protocol  CLNP Connectionless Network Protocol  CN Concentrator Node  CPU Central Processing Unit  CRC Cyclic Redundancy Check  CSMA CD Carrier Sense Multiple Access with Collision Detection  DCM Data Collection Module  DLCMI Data Link Control Management Interface  DLSw Data Link Switch  DOS Disk Operating System  DRAM Dynamic RAM  DSAP Destination Service Access Point  DVMRP Distance Vector Multicast Routing Protocol       xxii 114088 Rev  A    EOF  EGP  FAT  FDDI  FIFO  FRSW  FTP  FN  FR  FRE  GAME  GMT  HDLC  HSSI  ICMP  IGMP  IN   IP  IPX  ISDN  LAN  LAPB  LED  LLC  LMI  LN  LNM  LSP  MAC  MCTI  MIB  MOSY  NML    About This Guide    End of File   Exterior Gateway Protocol   File Allocation Table   Fiber Distributed Data Interface  First In First Out   Frame Relay Switch   File Tr
326. umber or  numbers after the reset command  If you do not enter a slot number when issuing  the reset command  the entire system reboots with the default router software  image and configuration  Entering the reset command without entering at least  one slot number is equivalent to entering the boot command     Enter the following to reset the entire system   reset  The system returns the following message     Reset all slots   y n     If you still want to reset all slots  enter    y     yes   Entering    n     no  aborts the  command        Note  With multiple slot routers  such as the BLN and BLN 2   a local Flash  volume serves as a backup source for files required by any slot you want to  reset  For this reason  multiple slot routers running Version 7 60 or later  with  the dynamic loading feature  must contain a Flash volume that contains a copy  of the router   s software image        The following events occur when you reset a processor module     1  The GAME operating system software running on the processor module  forwards a boot request to the other processor modules     2  The first processor module to respond to the boot request forwards the router  software image resident in its memory     3  The resetting processor module receives and executes the router software  image  At this instant  connectivity to the associated slot and the services  provided in the slot are disrupted  The other processor modules resynchronize  their routing tables after the slot fails to
327. uring Syslog Global Attributes    Once you create and enable Syslog on the router  you can accept the default values  for the wfSyslogMaxHosts and wfSyslogPollTimer attributes  or you can  configure a customized value for either attribute  If you want to accept default  values for the Syslog global attributes  go to Task 5  otherwise  perform the  following steps        114088 Rev  A    1     Using Syslog Messaging to Monitor Router    Configure the maximum number of active hosts served by Syslog on the  router        set wfSyslog wfSyslogMaxHosts 0  lt 1   10 gt  commit    The default setting for wfSyslogMaxHosts is 5 hosts  You can add to the  Syslog Host Table more entries than the configured maximum  but Syslog  forwards messages only to the first    n    active hosts  where n   the current  value of wfSyslogMaxHosts     Configure the interval  in seconds  between Syslog polling cycles on the  router        set wfSyslog wfSyslogPollTimer 0  lt 5   6 0000 gt  commit  The default setting for wfSyslogPollTimer is 5 seconds     Next  add a remote host to the Syslog Host Table     Task 5  Adding a Remote Host to the Syslog Host Table    You must define any remote hosts that you want to receive Syslog  event   messages from routers in your network     If this is the first host you are adding to the Syslog host table  go to Step 1   Otherwise  you may want to first obtain a list of hosts already configured on the  router  To list existing entries in the Syslog host table  enter 
328. urround each  lt string gt  within the echo command with double quotes if the   lt string gt  contains one or more spaces or semicolons      Precede each of the  double quotes surrounding the  lt string gt  with a backslash      If you do not use  double quotes  insert a backslash before the semicolon that separates the echo  command from the next command     Insert echo    to command the system to display blank lines between commands  within an  lt alias_value gt         114088 Rev  A    9 5    Using Technician Interface Software    You can also embed parameter references within an echo command  Refer to the  first example to see how this is done     Examples     If you enter     alias ipstats    echo    echo     IP Input Statistics       echo    get  WfipInterfaceEntry 21     echo    echo     IP Output Statistics       echo    get  WfipinterfaceEntry 24         The system creates an alias named ipstats that invokes the commands shown in  quotes     The text wraps as you enter text past column 80  Do not press the return key  until you have entered the entire command     ipstats  The system displays the following     IP Input Statistics                 wfIpInterfaceEntry wfIpInterfaceInReceives 192 32 6 4 3   141501  wfIpInterfaceEntry wfIpInterfaceInReceives 192 32 15 21 4   41304  wfIpInterfaceEntry wfIpInterfaceInReceives 192 32 16 1 2   538  wfIpInterfaceEntry wfIpInterfaceInReceives 192 32 243 2 1   130137       IP Output Statistics     wfIpInterfaceEntry wfIpInterfaceF
329. use acknowledge that such portions of the software were  developed by the University of California  Berkeley  The name of the University may not be used to endorse or  promote products derived from such portions of the software without specific prior written permission     SUCH PORTIONS OF THE SOFTWARE ARE PROVIDED    AS IS    AND WITHOUT ANY EXPRESS OR  IMPLIED WARRANTIES  INCLUDING  WITHOUT LIMITATION  THE IMPLIED WARRANTIES OF  MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE     In addition  the program and information contained herein are licensed only pursuant to a license agreement that  contains restrictions on use and disclosure  that may incorporate by reference certain limitations and notices imposed  by third parties         ji 114088 Rev  A       Bay Networks Software License    Note  This is Bay Networks basic license document  In the absence of a   software license agreement specifying varying terms  this license    or the  license included with the particular product    shall govern licensee   s use of  Bay Networks software     This Software License shall govern the licensing of all software provided to licensee by Bay Networks     Software       Bay Networks will provide licensee with Software in machine readable form and related documentation      Documentation      The Software provided under this license is proprietary to Bay Networks and to third parties from  whom Bay Networks has acquired license rights  Bay Networks will not grant any Software lic
330. uter 192 32 174 65 192 32 174 65 1 1773 8000000b  Router 192 32 174 66 192 32 174 66 1 1707 8000000c       8 70 114088 Rev  A    System Administration    The column headings in screens invoked by the ip command have the following    meanings        asterisk     Adv Router    Age    ASE Fwd Addr    Cost  Link State ID  LSID     Loc Pref    LS Type    Indicates routes actively used by IP  versus routes not currently  used   The asterisk appears only when you specify the all routes    A  flag      Indicates the OSPF Router ID of the advertisement s originator   For router links advertisements  this field is identical to the Link  State ID field  The network   s Designated Router originates  Network Link advertisements  Area border routers originate  Summary Link advertisements  AS boundary routers originate AS  External Link advertisements     Number of seconds since this route was last updated or verified to  be correct  The meaning of    too old    depends on the routing  protocol specified under Proto  Note that RIP and EGP routes are  refreshed only on a slot that receives a routes update  Route ages  may be different on each slot for this reason     An address for forwarding packets to a destination external to the  AS  but not accessible through an AS boundary router     Number of hops to reach the destination     Indicates the piece of the routing domain that the advertisement  describes  as follows    If LS Type   1  LSID   the originating router s Router ID    If LS Typ
331. value of wfSyslogEntFltrFaultMap is 3  mapping router  FAULT level messages to UNIX system level CRIT messages        C 20    114088 Rev  A    Using Syslog Messaging to Monitor Router    b  Change router WARNING message mapping  as follows        set wfSyslogEntFlitrEntry wfSyslogEntFlirWarningMap    lt host_IP_address gt   lt entity_code gt   lt filter_index gt   lt 1   8 gt     The default value of wfSyslogEntFltrWarningMap is 5  mapping router  WARNING level messages to UNIX system level WARNING messages     Example      set wfSyslogEntFlitrEntry wfSyslogEntFlirWarningMap 5    The example command maps each Warning level router event message to  a Warning level UNIX system error message    c  Change router INFO message mapping  as follows        set wfSyslogEntFlitrEntry wfSyslogEntFltrinfoMap    lt host_IP_address gt   lt entity_code gt   lt filter_index gt   lt 1   8 gt     The default value of wfSyslogEntFltrInfoMap is 7  mapping router INFO  level messages to UNIX system level INFO messages     d  Change router TRACE message mapping  as follows        set wfSyslogEniFlitrEntry wfSyslogEntFlirTraceMap    lt host_IP_address gt   lt entity_code gt   lt filter_index gt   lt 1   8 gt     The default value of wfSyslogEntFltrTraceMap is 3  mapping router  TRACE level messages to UNIX system level CRIT messages     e  Change router DEBUG message mapping  as follows        set wfSyslogEntFlitrEntry wfSyslogEntFlitrDebugMap    lt host_IP_address gt   lt entity_code gt   lt filter
332. ve         To initiate graceful shutdown followed by a system boot  enter the following  command at the Technician Interface prompt     boot  shutdown  lt vol gt   lt image_name gt   lt vol gt   lt config_name gt   The console displays the following message during shutdown   Shutdown in progress    If shutdown succeeds  the console displays the message  Shutdown is complete     Upon issuing this message  the system performs a boot operation using the image  and configuration files you specified originally     If shutdown fails  the console displays the message  Continue shutdown   Y N     If you choose    N     no  at this time  the system terminates shutdown and displays  the following message on the console device     Shutdown aborted     Upon issuing this message  the system performs a boot operation using the image  and configuration files you specified originally        114088 Rev  A    8 13    Using Technician Interface Software    If you choose instead to    Continue            Y         the system continues the shutdown  attempt  We recommend that you terminate this procedure after no more than one  additional shutdown attempt     Configuring Delayed Boot Services    You can configure the router to boot at a date and time that you specify  With  Technician Interface commands  you    Add delayed boot services to a router  Schedule one or more nonrepeatable  delayed boot events on a router    Name the router software image file and the router configuration file you want
333. ved  messages into  Syslog message  format    e Forwards  Syslog messages  to remote hosts    Outgoing wW  Syslog  Messages 7  a  IP Network      Log   Slot       Using Syslog Messaging to Monitor Router    1  1  J        Message  Forwarded                   te  ee        gt     Remote Host   Unix Workstation              Identifies message sources         e Determines message priorities       e Logs  displays  prints  and or  forwards messages    Figure C 1                                               i   UNIX  Workstation         Message         Printed      Message  Disk Logged  Message  Displayed  TSOOOLA    Syslog and Syslogd Operation       114088 Rev  A    C 3    Using Technician Interface Software    Remote Hosts and Filters    You use a management workstation to monitor event messages generated by  specific software entities on each router in your network  To receive at a  management workstation event messages from a router  you must    e Enable Syslog on the router     e Define in the Syslog host table any remote hosts you want to receive  messages     e Configure entity specific message filters for each host   You can configure entity filters by means of the Configuration Manager tool under    Site Manager  or by means of set and commit commands you enter at the  Technician Interface of the router        Note  This appendix covers Syslog configuration via Technician Interface  commands only   For information on how to configure Syslog through Site  Manager  refer 
334. we recommend that you use the following conventions when naming files so  that you can distinguish files by type     e Use the  exe file extension for software images for the FRE and other modules   BLN  BLN 2  BCN  AFN  AN  ANH  and ASN    The default software  images are bn exe  afn exe  an exe  and asn exe      Use the  out file extension for software images for the ACE modules  FN  LN   CN  and ALN    The default software image is ace out      e Use the  cfg file extension for alternate configuration files   The default configuration file is config      se the  al file extension for alias files        U  e Use the  log file extension for log files   U    se the  bat file extension for script files     Mounting a Volume    Use the mount command to make the diskette drive available  Issue the following  command when you install a diskette     mount a     The screen displays a File System Check Report  Figure 5 1         5 4 114088 Rev  A    Managing a DOS File System       K A      mount a   Device label   Directory  A         File System Check Report   Allocated but unused clusters  Used but unallocated clusters    Cluster chains shared between files   File size is wrong    Missing EOF  Directory errors          e a a a e N e a E a f            Ss x    Figure 5 1  Mounting a Volume       The File System Check Report indicates the number of errors on a diskette  All  values should be zero  Nonzero values indicate file corruption  Refer to the  description of these values an
335. wfBgpGroup 3   wflpPolicyGroup  wflpRouting 6   wfTcpGroup  wflnternet 3   wfUdpGroup  wflnternet 4   wfSnmpGroup  wflnternet 5   wiTftp  wflnternet 6   wfTelnetGroup  wflnternet 7     Figure A 1  Sample Top Level Hierarchy of the Bay Networks Router MIB   continued        114088 Rev  A A 5    Using Technician Interface Software    wflnternet  continued   wfBootpGroup  wfinternet 8   wfBootpClientGroup  wfBootpGroup 1   wfBootpServerGroup  wfBootpGroup 2   wfBootpRelayAgentGroup  wfBootpGroup 3   wfRarpGroup  wflnternet 9   wfFtpGroup  wflnternet 10   wfNetBlOSIpGroup  wflnternet 11   wfDvmrpGroup  wflnternet 12   wflgmpGroup  wflnternet 13   wfPimGroup  wflInternet 14   wflpv6Group  wflInternet  16   wfAppletalkGroup  wfApplication 4   wflpxGroup  wfApplication 5   wfOsiGroup  wfApplication 6   wfVinesGroup  wfApplication 8   wfWanGroup  wfApplication 9   wfFrameRelayGroup  wfWanGroup 1   wfPppGroup  wfWanGroup 2   wfX25Group  wfWanGroup 4   wfAtmGroup  wfWanGroup 5   wfAtmLeGroup  wfAtmGroup 20   wfFrswGroup  wfWanGroup 6   wfSmdsSwGroup  wfWanGroup 7   wflsdnGroup  wfWanGroup 8   wfFrameRelay2Group  wfWanGroup 9   wfXnsGroup  wfApplication 10   wfLanManagerGroup  wfApplication  12   wfAppnGroup  wfApplication 14   wflpexGroup  wfApplication  15   wflntegratedServicesGroup  wfApplication 16   wfRRedGroup  wfApplication 17   wfBotGroup  wfApplication 18   wfAccountingGroup  wfApplication 20     Figure A 1  Sample Top Level Hierarchy of Bay Networks Router MIB  Objects  conti
336. workstation and the target router    Quit Wfterm by selecting the Exit option under the File pull down menu  as shown  in Figure B 12     Wellfleet Communication Terminal Program   gt       AG Modem Phone File Transfers Help    Exit Alt F4       Figure B 12  Exiting Quitting the Wfterm Program       114088 Rev  A B 31    Overview    Appendix C  Using Syslog Messaging to  Monitor Router Events    This appendix provides    An overview of Syslog services on a Bay Networks router and counterpart  Syslogd services on a UNIX workstation    Procedures for      Configuring Syslogd on a UNIX workstation     Configuring Syslog services on a router      Managing Syslog services on a router   An example Syslog configuration    Descriptions of Syslog MIB attributes  parameters     To use the information in this appendix  you should have experience with UNIX  system commands and facilities  and also with the Technician Interface for Bay  Networks routers     You can use the Syslog messaging feature of the Bay Networks router software to  manage router event messages on any UNIX based network management    platform  The Syslog software supports this functionality by communicating with    a counterpart software component named Syslogd on your management  workstation        114088 Rev  A    C 1    Using Technician Interface Software    Syslogd is a UNIX daemon software component that receives and locally logs   displays  prints  and or forwards messages that originate from sources internal an
337. writing  to the diskette        Enter the command as follows to force an unmount     unmount  f    Changing the Working Directory    Use the cd command to change the present working directory  You can also use  this command to display the present working directory  Enter the following  command to display the present working directory     cd  Enter the following command to change to another working directory     cd   lt dir_name gt        114088 Rev  A 5 7    Using Technician Interface Software    Examples    If you enter  The system    cd Displays the present working directory    cd  old Changes the present working directory to the subdirectory  old    cd  old logs Changes the present working directory to the  subdirectory oldVlogs    cd   Changes the present working directory to the parent direc   tory    cd   Changes the present working directory to the root directory     Displaying a Directory    Use the dir command to display a list of the files in a directory  You can enter the  wildcard characters   and   to display filenames with the character strings you  specify  You cannot use wildcard characters in the directory portion of the  pathname     Enter the following command to list the files stored in the default directory   dir  Enter the following command to display selected contents of another directory     where  lt dir_name gt  is the path to the directory and  lt filename ext gt  is the file  specification you want to display     dir   lt pathname gt   lt filename 
338. x  fd  log  x  fdfitw  elP  log  x    log  x  fdfitw    Managing Events    The events log   Includes only debug  fault  and trace events  Includes only debug and info events on slot 2    Includes only fault events for the router operating  system entity     Includes only debug events for OSPF running on  Slot 2    Includes no events  since none are specified     Includes all events  since all severity levels are  specified     Excludes only debug events  Excludes all except IP events  Excludes no events  since none are specified     Excludes all events  since all severity levels are  specified     Displaying Active Write Filters    Display a list of all write  log input  filters currently in effect across the router  as    follows   If you enter  The Technician Interface   log  z Displays write filters currently in effect across all slots     log  z   S lt s ot gt   Displays write filters currently in effect for the slot you specify        114088 Rev  A 6 5    Using Technician Interface Software    Applying Read  Display  Filters to the Events Log    Enter the following command to display the events stored in all event buffers   log    The system sorts the events and displays them in chronological order  For  information about the event display format or about specific events  refer to the  guide Managing Routers and BNX Platforms        Note  To abort the command  press control c  hold the control key and  press c         Add arguments to the log command to select the event 
339. y the number of bits in the  address mask by entering a decimal number  1 to 24   starting with the msb  in the  prefix portion of your entry     ospf_Isdb          a  lt area_address gt     Retrieves data for the OSPF area you specify after the   a flag     ospf_Isdb        A    Retrieves   e The entire table of routes  including best routes and  routes not used   or    e The entire OSPF LSDB  20 lines max  per route  advertisement     routes   ospf_Isdb                          c  lt circuit_no  gt  Retrieves data for the circuit number you specify after cache  the  c flag   See    Determining Circuit Numbers    later in  this chapter     i  lt BGP_router_ID gt  Retrieves routes to or from a BGP peer that you specify  bgp_routes  after the  i flag    M Retrieves only the contents of the multicast cache cache   N Retrieves the BGP ANNOUNCE table of routes  bgp_routes   p   lt  ocal_peer_address   Retrieves routes announced to a BGP peer you specify  remote_peer_address gt     by its local or remote address    S  lt source_address gt  Retrieves data pertaining only to the advertising source   ospf_Isdb       you specify after the  S flag                 114088 Rev  A    8 65    Using Technician Interface Software        S  lt slot_number gt  Retrieves data for the slot you specify after the  s flag  routes   bgp_routes    If you also specify an address of 255 255 255 255 fora   cache   given slot  the command displays only the internal cache  for that slot  If you do not ente
340. you hot swap a board  Otherwise  the DIAG LED on the front  panel and LED 8 on the FRE module remain on  indicating that diagnostics have  not been run on the ILI   Refer to the Installing and Maintaining BN Routers  manual for more information   If the board is functional  and you do not issue the  diags command  the processor module automatically boots  loads the  configuration  starts the router software services  and operates normally  although  the DIAGS LED remains lit     When you issue the diags or diags  lt s ot_no  gt  commands from a local console  rather than from a Telnet session  the results depend on    e The slot number you designate in the command line   e The slot number from which you issue the command   e The model of Bay Networks router   e The type of router  single slot or multislot    Based on these variables  the router system or slot performs a restart  a    warm boot  or a cold boot operation  The following table describes the different  responses        8 30    114088 Rev  A    System Administration       You issued a diag command from a Technician Interface session  console or Telnet   on one slot  and the target  lt S ot_no  gt  you specified was        The same slot the session is    A slot other than the slot the  session is running on                                   None  running on   Command  gt    diag diag  lt S ot_no  gt  diag  lt S ot_no  gt      Router V  AN Cold boot Slot 1  Cold boot Slot 1  N A  ANH e Run diagnostics on    Run diagn
    
Download Pdf Manuals
 
 
    
Related Search
    
Related Contents
MG-6060 / MG-6030 (Magellan) : User Guide  INS248-2 Premier 24 Installation Manual  continued - Lochinvar  Sure Trac® Ultra  QUIZ FOR NEW MRI USERS  取扱説明書 お客さまへ    Copyright © All rights reserved. 
   Failed to retrieve file