9032859 Network AccessSoftware Management Guide
Contentsviii Updating Flash RAM...6-5Specifying a Delay Val
Configuring LAT Characteristics7-10ACCESS SERVER NAME CharacteristicIntroductionThe SERVER NAME characteristic is a string of 1 to 16 characters. This
7-11Configuring LAT CharacteristicsNODE LIMIT CharacteristicIntroductionThe NODE LIMIT characteristic specifies the maximum number of LAT service nodes
Configuring LAT Characteristics7-12Access SERVER NUMBER CharacteristicIntroductionEach access server has a number that uniquely identifies it.Access SER
7-13Configuring LAT CharacteristicsPASSCHECK CharacteristicIntroductionThe PASSCHECK characteristic determines whether a host is required to provide a
Configuring LAT Characteristics7-14QUEUE LIMIT CharacteristicIntroductionThe LAT QUEUE LIMIT characteristic specifies the maximum number of outstanding
7-15Configuring LAT CharacteristicsRETRANSMIT LIMIT CharacteristicIntroductionThe RETRANSMIT LIMIT characteristic specifies the number of times that the
Configuring LAT Characteristics7-16RESPONDER CharacteristicAccess Server MappingIn order to connect to other nodes on the LAN, the access server must b
7-17Configuring LAT CharacteristicsChanging the RESPONDER CharacteristicThe factory default setting for the RESPONDER characteristic is disabled. To en
Configuring LAT Characteristics7-18Service GroupsIntroductionA service group defines the access that service nodes and port users have to the network. E
8-1Chapter 8TCP/IP Network CharacteristicsOverviewIntroductionThis chapter describes the configuration characteristics for a TCP/IP network. To enable
ixContents ACCESS SERVER NAME Characteristic...7-10Introduction...
TCP/IP Network Characteristics8-2• Displaying the Internet Counters• Setting the TCP Keepalive Timer• Learning IP Information From a BOOTP Server• Lea
8-3TCP/IP Network CharacteristicsConfiguring the Internet Address and Subnet MaskTasksYou can perform the following tasks:• Set an Internet address.• S
TCP/IP Network Characteristics8-4Setting an Internet Subnet MaskThe Internet subnet mask is used to partition the host section of an Internet address
8-5TCP/IP Network CharacteristicsSupernetted IP AddressesThe CNAS software supports the use of supernetted IP addresses. Supernetting allows you to co
TCP/IP Network Characteristics8-6Configuring Domain Name System (DNS) CharacteristicsTasksThis section describes how to display and set the access serv
8-7TCP/IP Network CharacteristicsNameservers (Locally configured):99.99.99.99 Local name.acme.com (from DHCP)Nameservers (Learned):99.99.99
TCP/IP Network Characteristics8-8Displaying the DNS CountersTo display the DNS counters, use the SHOW/LIST INTERNET NAME RESOLUTION COUNTERS command.T
8-9TCP/IP Network CharacteristicsConfiguring the Default Name Resolution DomainConfiguring the default domain name characteristic enables you to abbrevi
TCP/IP Network Characteristics8-10Using Trailing DotsThe access server uses a sequence of name resolution attempts when you enter a host name without
8-11TCP/IP Network CharacteristicsChanging the Retry LimitThe domain name resolution retry limit indicates the number of times that the access server
Contentsx Changing the Time Limit...8-10Changing the Retry Limit...
TCP/IP Network Characteristics8-12Configuring a List of Commonly Used Internet HostsYou can optionally enter commonly used Internet host names and addr
8-13TCP/IP Network CharacteristicsYou can use a relative domain name if you are defining a local name server for the default domain only.Configuring a N
TCP/IP Network Characteristics8-14Assigning DNS Server Addresses AutomaticallyThe DNS autoconfigure feature on the access server allows dial-up clients
8-15TCP/IP Network CharacteristicsConfiguring a List of Internet Gateway AddressesIntroductionIf the access server users need to access hosts in differ
TCP/IP Network Characteristics8-16Default Gateway Definition ExampleThe following example shows how to define the mapping of the default gateway to the
8-17TCP/IP Network CharacteristicsConfiguring a List of Internet ARP EntriesIntroductionThe list of address resolution protocol (ARP) entries maps Inte
TCP/IP Network Characteristics8-18Setting the TCP Keepalive TimerWhat the Timer DoesThe TCP keepalive timer determines whether a TCP connection with a
8-19TCP/IP Network CharacteristicsSetting Timer RetriesUse the SET/DEFINE/CHANGE INTERNET [TCP] KEEPALIVE RETRY command to set the number of keepalive
TCP/IP Network Characteristics8-20Displaying the Internet CountersUsing the SHOW CommandUse the SHOW/LIST/MONIITOR INTERNET command to display the Int
8-21TCP/IP Network CharacteristicsInternet Counter Display FieldsThe following table describes the fields in a typical Internet counters display:Field
xiContents Chapter 9 Managing AppleTalk Overview...
TCP/IP Network Characteristics8-22Accepted: Number of incoming TCP connections accepted by Telnet. This count includes those connections accepted by T
8-23TCP/IP Network CharacteristicsLearning IP Information From a BOOTP ServerIntroductionInstead of manually configuring IP information, you can have t
TCP/IP Network Characteristics8-24Setting Up IP Configuration LearningDo the following to set up your access server to learn IP configuration informatio
8-25TCP/IP Network CharacteristicsLearning IP Information From a DHCP ServerDescriptionYou can use the Dynamic Host Configuration Protocol (DHCP) to au
TCP/IP Network Characteristics8-26BOOTP and DHCP DifferencesDHCP is an extension of BOOTP; however, using a DHCP server to obtain IP information diffe
8-27TCP/IP Network CharacteristicsFigure 8-1 shows what occurs when the access server acts as a DHCP client:Figure 8-1. Access Server as a DHCP Client
TCP/IP Network Characteristics8-28Figure 8-2. What Occurs When Access Server Uses DHCP to Assign IP Addresses to Remote ClientsIP Address RenewalsWhen
8-29TCP/IP Network CharacteristicsDisplaying the DHCP SettingUse the SHOW/LIST/MONITOR INTERNET command to display the current DHCP setting. The examp
TCP/IP Network Characteristics8-30Assigning WINS Server AddressesWhat Does WINS Do?Windows Internet Naming Service (WINS) performs NetBIOS name and IP
8-31TCP/IP Network CharacteristicsFigure 8-3. How the Remote Client Receives WINS Server Information from the Access ServerAssigning WINS AddressesIf
Contentsxii Configuring the ACCESS Characteristic...10-5Description...
TCP/IP Network Characteristics8-32WINS Display ExampleThe following shows a typical example of the WINS display:Local> SHOW INTERNET NAME RESOLUTIO
9-1Chapter 9Managing AppleTalkOverviewIntroductionThis chapter explains how to configure and manage the AppleTalk protocol suite on an access server.In
Managing AppleTalk9-2Configuring AppleTalk on an Access ServerIntroductionYou can configure an access server to act as an AppleTalk node on the network
9-3Managing AppleTalkDisabling AppleTalkIf you decide that your access server should no longer act as an AppleTalk node, all AppleTalk capabilities ca
Managing AppleTalk9-4The supported range for n is 1 to the number of asynchronous ports. The access server always attempts to keep the number of avail
9-5Managing AppleTalkDisplaying AppleTalk CharacteristicsCommandsUse the LIST APPLETALK CHARACTERISTICS command to display the AppleTalk characteristi
Managing AppleTalk9-6Displaying AppleTalk CountersCommandUse the SHOW/MONITOR APPLETALK COUNTERS command to display the AppleTalk counters on an acces
9-7Managing AppleTalkFields in the AppleTalk Counters DisplayThe following table describes the fields in the AppleTalk Counters display:Field Descripti
Managing AppleTalk9-8AARP ValuesTwo important counter values are those for AARP. Unsent AARP probes or responses can indicate network problems. This h
9-9Managing AppleTalkDisplaying AppleTalk StatusCommandUse the SHOW/MONITOR APPLETALK STATUS command to display the AppleTalk status on the access ser
xiiiContents Specifying DTRWAIT...11-10Description...
Managing AppleTalk9-10Up AppleTalk is fully operational.Address The AppleTalk address of the access server, learned from the EtherTalk network at init
9-11Managing AppleTalkDisplaying AppleTalk RoutesCommandUse the SHOW/MONITOR APPLETALK ROUTES command to display the available AppleTalk routes to an
Managing AppleTalk9-12Up The route is known to be valid.Suspect The route is thought valid, but has not been refreshed recently.Bad The route has not
9-13Managing AppleTalkDisplaying AppleTalk ARP EntriesIntroductionWhen an attached host sends a message to an unknown AppleTalk node on the access ser
Managing AppleTalk9-14Remote The entry designates an ARP entry for a remote host on the access server Ethernet. Such an entry usually means the server
10-1Chapter 10Configuring Basic Device CharacteristicsOverviewIntroductionThis chapter explains how to configure the basic characteristics for all types
Configuring Basic Device Characteristics10-2Configuring Basic Device CharacteristicsIntroductionIf you attach a standard ANSI video terminal to an acces
10-3Configuring Basic Device CharacteristicsPARITY None Even, Odd,Mark, NonePARITYSPEED 9600 75,110, 134, 150, 300, 600, 1200, 1800, 2000, 2400, 4800,
Configuring Basic Device Characteristics10-4Displaying Basic Device CharacteristicsCommandTo display basic device characteristics, use the SHOW PORT co
10-5Configuring Basic Device CharacteristicsConfiguring the ACCESS CharacteristicDescriptionThe ACCESS characteristic determines which types of devices
Contentsxiv Configuring an Interactive Device for Telnet Sessions...12-11Introduction...
Configuring Basic Device Characteristics10-6Matching the Port and Device CharacteristicsIntroductionYou must ensure that the physical characteristics o
10-7Configuring Basic Device CharacteristicsThe AUTOBAUD characteristic functions only if the input and output speeds of the port device are the same a
Configuring Basic Device Characteristics10-8The following table lists the available parity checks:Example: Changing the PARITY SettingsThe following ex
10-9Configuring Basic Device CharacteristicsSTOP BITSThe STOP BITS characteristic indicates the number of bits that mark the end of a character transmi
Configuring Basic Device Characteristics10-10Configuring the FLOW CONTROL CharacteristicIntroductionThe FLOW CONTROL characteristic allows the access se
10-11Configuring Basic Device CharacteristicsExample: Enabling XON/XOFF FLOW CONTROLThe following example shows how to enable XON/XOFF FLOW CONTROL:Loc
Configuring Basic Device Characteristics10-12Local> CHANGE PORT 7 FLOW CONTROL CTSExample: Disabling FLOW CONTROLThe following command shows how to
10-13Configuring Basic Device CharacteristicsSpecifying the Automatic Logout CharacteristicsIntroductionThis section describes the characteristics that
Configuring Basic Device Characteristics10-14Specifying INACTIVITY LOGOUTThe INACTIVITY LOGOUT characteristic allows you to enable or to disable automa
11-1Chapter 11Configuring Modem SignalsOverviewIntroductionThis chapter describes the various port characteristics that you can use to control the mode
xvContents Specifying a Key to Switch to Local Mode...12-35Specifying BROADCAST...
Configuring Modem Signals11-2DTE/DCE Device ConfigurationPort ConfigurationThe role of the access server in the communication is determined by the configu
11-3Configuring Modem SignalsDetermining the Supported Modem SignalsAccess Servers and MODEM CONTROLNot all access servers support all modem signals. T
Configuring Modem Signals11-4Access Server Types and Supported Modem SignalsThe following table lists the types of access servers and the modem signals
11-5Configuring Modem SignalsModem Signals DescriptionTypes of Modem SignalThe following table describes the various modem signals:Modem Signal Descrip
Configuring Modem Signals11-6Specifying MODEM CONTROL and SIGNAL CONTROLIntroductionThe MODEM CONTROL and SIGNAL CONTROL characteristics are identical,
11-7Configuring Modem SignalsThe MODEM CONTROL or SIGNAL CONTROL characteristic can only be configured in the permanent database; therefore, you cannot
Configuring Modem Signals11-8Specifying SIGNAL SELECTIntroductionThe SIGNAL SELECT characteristic is used only with MODEM CONTROL access servers. This
11-9Configuring Modem SignalsSpecifying SIGNAL CHECKIntroductionThe SIGNAL CHECK characteristic allows the access server to check for any modem signal
Configuring Modem Signals11-10Specifying DTRWAITDescriptionWhen functioning with modems and computer interfaces, the access server port normally assert
11-11Configuring Modem SignalsSpecifying RINGDescriptionThe RING characteristic is supported only on those access servers that support the DSRS signal.
Contentsxvi Displaying Services Status...13-19Displaying Services Summar
Configuring Modem Signals11-12Specifying ALTERNATE SPEEDDescriptionThe ALTERNATE SPEED characteristic is only used with full MODEM CONTROL access serve
11-13Configuring Modem SignalsSpecifying DIALUPDescriptionThe DIALUP characteristic is used to notify LAT service nodes that a port user connected to t
Configuring Modem Signals11-14Sample Modem ConfigurationsIntroductionThis section provides sample modem configurations for access servers that support fu
11-15Configuring Modem SignalsConfiguring a Dial-In and Dial-Out Modem on a Full MODEM CONTROL ServerThe following example provides a sample configuratio
Configuring Modem Signals11-16MODEM CONTROL SequencesIntroductionModem-controlled communication requires that the access server recognize what type of
11-17Configuring Modem Signals3. After first detecting DSR, the access server monitors the port for CTS and DCD. If it detects CTS and DCD within 30 sec
Configuring Modem Signals11-18Configuring DTR and DSR SignalsIntroductionThis section describes how to configure DTR and DSR signals for those access ser
11-19Configuring Modem SignalsSIGNAL CONTROL and DTRWAITDTR is asserted only if there is a solicited remote connection.(SIGNAL CHECK disabled) Solicite
Configuring Modem Signals11-20SIGNAL CONTROL, DTRWAIT, and DSRLOGOUTSame as SIGNAL CONTROL and DTRWAIT.SIGNAL CONTROL, SIGNAL CHECK, DTRWAIT, and DSRLO
12-1Chapter 12Configuring and Managing Interactive DevicesOverviewIntroductionThis chapter explains how to configure and manage interactive devices, suc
xviiContents Chapter 15 Configuring LPD Printers Overview...
Configuring and Managing Interactive Devices12-2• Specifying the Telnet Client Session Profile• Configuring Individual Telnet Client Session Characterist
12-3Configuring and Managing Interactive DevicesConfiguring an Interactive Device for LAT SessionsConfiguring an Interactive Device for LAT SessionsThe f
Configuring and Managing Interactive Devices12-4Sample Network ConfigurationFigure 12-1 shows the sample network configuration for LAT and Telnet session
12-5Configuring and Managing Interactive DevicesTo configure group codes on an access server, perform the following steps:Specifying AUTOCONNECTWhen you
Configuring and Managing Interactive Devices12-6Example: Enabling AUTOCONNECTThe following example shows how to enable AUTOCONNECT on port 5:Local>
12-7Configuring and Managing Interactive Devices• PPP — The access server defaults to the PPP protocol if the user does not specify a protocol with the
Configuring and Managing Interactive Devices12-8If the access server offering the service has queuing enabled and has not reached its queue limit, the
12-9Configuring and Managing Interactive DevicesThe following table lists the SHOW/MONITOR QUEUE commands:For example, to display information about the
Configuring and Managing Interactive Devices12-10No default entry exists for the REMOVE QUEUE command, and failure to specify what entry or entries are
12-11Configuring and Managing Interactive DevicesConfiguring an Interactive Device for Telnet SessionsIntroductionUser-oriented characteristics, such as
Contentsxviii Compressed SLIP...16-13Introduction.
Configuring and Managing Interactive Devices12-12Enable DSRLOGOUT or LONGBREAK LOGOUT (see Specifying DSRLOGOUT and Specifying LONGBREAK LOGOUT in Chap
12-13Configuring and Managing Interactive DevicesConfiguring a Session Management (TD/SMP) TerminalIntroductionThe MULTISESSION characteristic allows a
Configuring and Managing Interactive Devices12-14• Simultaneous data exchange with multiple service sessions.• Management of terminal sessions using te
12-15Configuring and Managing Interactive DevicesLogging In with MultisessionsThe following is a typical procedure for logging in at a session manageme
Configuring and Managing Interactive Devices12-16Configuring On-Demand Loading for Asian TerminalsIntroductionAsian terminals implementing the On-Demand
12-17Configuring and Managing Interactive DevicesConfiguring for Block-Mode TerminalsDescriptionBlock-mode terminals do not require any special setup to
Configuring and Managing Interactive Devices12-18Specifying the Telnet Client Session ProfileIntroductionYou can set various features for a Telnet clien
12-19Configuring and Managing Interactive DevicesTelnet Client Session Characteristics Predefined for Each ProfileThe following table lists the Telnet cl
Configuring and Managing Interactive Devices12-20Configuring Individual Telnet Client Session CharacteristicsModifying Telnet Session CharacteristicsYou
12-21Configuring and Managing Interactive DevicesEnabling the BINARY characteristic does some, but not all, of what a user might require to send and re
xixContents Checking LAT Service Accessibility...18-2Reducing Memory Usage...
Configuring and Managing Interactive Devices12-22Example: Mapping Keyboard CharactersThe following example shows how to map the AO function to the Dele
12-23Configuring and Managing Interactive DevicesSpecifying AUTOFLUSHThe AUTOFLUSH characteristic automatically invokes the AO function whenever you en
Configuring and Managing Interactive Devices12-24When you enter a SHOW PORT CHARACTERISTICS command, the -s and +s symbols indicate if AUTOSYNCH is dis
12-25Configuring and Managing Interactive DevicesThe access server supports the remote FLOW CONTROL feature, where the remote Telnet server can toggle
Configuring and Managing Interactive Devices12-26Specifying the SWITCH CHARACTERThe SWITCH CHARACTER characteristic determines how the access server ha
12-27Configuring and Managing Interactive DevicesManaging Access Server User AccountsMinimal Setup for Local User AccountsA limited amount of storage i
Configuring and Managing Interactive Devices12-28SHOW/LIST/MONITOR USERACCOUNT DisplayThe following table defines the values in the SHOW USSERACCOUNT di
12-29Configuring and Managing Interactive DevicesService Permissions AccessThe following table shows the type of service permissions a user can have. A
Configuring and Managing Interactive Devices12-30PASSWORD Allows modification of the password field for the specified entry. Clear the PASSWORD by setting
12-31Configuring and Managing Interactive DevicesAccess Command VariablesThe following table defines the ACCESS command parameter variables:Variable Defi
Contentsxx ASCII-to-EBCDIC and EBCDIC-to-ASCII Translation Tables...19-16Commands...
Configuring and Managing Interactive Devices12-32Managing UsersThis section describes various tasks for managing users.Providing a Contact Name and Acc
12-33Configuring and Managing Interactive DevicesExample: Enabling a Preferred LAT Service on a Specific Node and PortThe following example shows how to
Configuring and Managing Interactive Devices12-34USERNAME is designed to accommodate interactive terminals that have one permanent user. Terminals that
12-35Configuring and Managing Interactive DevicesDefining the Break KeyThe BREAK characteristic defines how the Break key is used. The Break key can be d
Configuring and Managing Interactive Devices12-36Example: Disabling a Local SwitchThe following example shows how to disable the local switch, which is
12-37Configuring and Managing Interactive DevicesA user with privileges set can use the privileged BROADCAST ALL command to send a message to all inter
Configuring and Managing Interactive Devices12-38Specifying Message CodesEach access server message has a message code. In the following example, the n
12-39Configuring and Managing Interactive DevicesExample: Configuring LOCKThe following example shows how to enable LOCK on the access server, while dis
Configuring and Managing Interactive Devices12-40SHOW/LIST/MONITOR USERS Display HeadingsThe following table provides an explanation of the information
12-41Configuring and Managing Interactive DevicesThe SHOW PORT CHARACTERISTICS command displays the user-specified groups, listing them in the field labe
xxiContents IPX Description ...21-3Introducti
Configuring and Managing Interactive Devices12-42Managing SessionsThis section shows how to initiate and terminate sessions and how to display session
12-43Configuring and Managing Interactive DevicesLocal> CONNECT TELNET SALESLocal> CONNECT TELNET SALES.MARKETING.FOO.COMLocal> CONNECT TELNET
Configuring and Managing Interactive Devices12-44• TEST INTERNET or PING - Sends an ECHO request message to the specified remote Internet host. You use
12-45Configuring and Managing Interactive DevicesFor ports with session management terminals, the kind of terminal at the port further determines the p
Configuring and Managing Interactive Devices12-46SHOW/MONITOR SESSIONS Display FieldsThe following table describes the information in the SHOW/MONITOR
12-47Configuring and Managing Interactive DevicesThere are only two lines in this display. The first line displays the port number, session number, and
Configuring and Managing Interactive Devices12-48SHOW/MONITOR PORT SESSIONS STATUS Display FieldsThe following table provides a description of the SHOW
12-49Configuring and Managing Interactive DevicesDo-Endof RecordEnabled — The access server is enabled to receive EOR commands.Disabled — The access se
Configuring and Managing Interactive Devices12-50Terminating SessionsThere are two commands you can use to terminate a session on another port:• The pr
13-1Chapter 13Configuring and Managing LAT ServicesOverviewIntroductionThis chapter explains how to configure devices attached to the access server port
Contentsxxii Displaying IPX Counters...21-27Use the SHOW IPX C
Configuring and Managing LAT Services13-2• Configuring a Printer with Unannounced Availability• Verifying the LAT Service• Managing Your Access Server A
13-3Configuring and Managing LAT ServicesConfiguring a Port to Offer a LAT ServiceConfiguration ParametersAfter you attach a device to a port and ensure
Configuring and Managing LAT Services13-4Configuring Access to a LAT ServiceAssigning a Service NameA service name is a name you assign to the LAT servi
13-5Configuring and Managing LAT ServicesExample: Clearing the Identification StringTo clear a previously set service identification string, enter the ID
Configuring and Managing LAT Services13-6Example: Assigning a Service PasswordThe following example shows two ways to assign a password to the serviceL
13-7Configuring and Managing LAT ServicesConfiguration of Specific Types of Devices As LAT ServicesIntroductionThis section provides examples of configuri
Configuring and Managing LAT Services13-8Configuring a Computer As a LAT ServiceBy using multiple terminal interfaces and access server ports, you can u
13-9Configuring and Managing LAT ServicesConfiguring a Printer As a LAT ServiceAfter you configure a printer as a LAT service, you need to set up the app
Configuring and Managing LAT Services13-10Creating a Logical Device to Access a Printer ServiceThe following example shows how to run LATCP to create a
13-11Configuring and Managing LAT Services$! This command procedure sets up the local characteristics of the$! applications devices for remote printers
xxiiiContents Chapter 23 Managing Access Server Security Overview...
Configuring and Managing LAT Services13-12Example: Configuring a LAT Remote Print Queue on an ULTRIX SystemThe following example provides a sample proce
13-13Configuring and Managing LAT ServicesConfiguring a Printer with Unannounced AvailabilityIntroductionThis section describes how to configure a printe
Configuring and Managing LAT Services13-14Example: Configuring a Printer with Unannounced Availability on a LAT Network on Port 4Local> DEFINE PORT 4
13-15Configuring and Managing LAT ServicesVerifying the LAT ServiceDo ThisTo verify whether the service is functioning, try connecting to the new servi
Configuring and Managing LAT Services13-16• Verify whether the port is properly configured by entering a SHOW PORT command and looking at the port chara
13-17Configuring and Managing LAT ServicesManaging Your Access Server As a LAT Node Offering a ServiceIntroductionBy default, once there is a service,
Configuring and Managing LAT Services13-18Displaying Services CharacteristicsThe LIST/SHOW/MONITOR SERVICES CHARACTERISTICS command generates a display
13-19Configuring and Managing LAT ServicesDisplaying Services StatusThe SHOW/LIST/MONITOR SERVICE STATUS command displays information about the operati
Configuring and Managing LAT Services13-20Example: SHOW SERVICE STATUS DisplayThe following example shows how to generate a service status display for
13-21Configuring and Managing LAT ServicesDisplaying Services SummaryThe SHOW/MONITOR SERVICES SUMMARY command displays one line of information on each
Contentsxxiv Showing the User Port Authorization Profile...23-31Showing Security Counters...
Configuring and Managing LAT Services13-22Example: SHOW SERVICE SUMMARY DisplayThe following example shows how to generate a service summary display fo
14-1Chapter 14Configuring and Managing Telnet ServersOverviewIntroductionThis chapter explains how to configure various types of devices as a Telnet or
Configuring and Managing Telnet Servers14-2• Managing Your Access Server As a Telnet Listener Node• Supplying User Location Data to Telnet Servers• Con
14-3Configuring and Managing Telnet ServersSample Device ConfigurationsIntroductionThis section provides examples of configuring the following types of d
Configuring and Managing Telnet Servers14-4The following example shows a sample configuration of a printer used for access through a Telnet listener on
14-5Configuring and Managing Telnet ServersExample: Configuring a Dial-In and Dial-Out ModemThe following example shows a sample configuration of a dial-
Configuring and Managing Telnet Servers14-6Configuring a Personal Computer As a Terminal and for Access through a Telnet ListenerSample ConfigurationTo c
14-7Configuring and Managing Telnet ServersSetting User Priority for Devices Using Dynamic AccessYou can enable interrupts if you want the owner or mai
Configuring and Managing Telnet Servers14-8To be available for file transfers, the PC must be logged out from the access server port. When a connection
14-9Configuring and Managing Telnet ServersConfiguring a Remote Print QueueIntroductionThe following sections explain how to configure a print queue on a
xxvContents Managing Accounting...25-10Introduction...
Configuring and Managing Telnet Servers14-10It is assumed that you are familiar with configuring an ULTRIX print system. For more detailed description o
14-11Configuring and Managing Telnet ServersConfiguring a Telnet ListenerIntroductionPerform the following steps to assign a Telnet listener to one or m
Configuring and Managing Telnet Servers14-12Configuring Telnet Server Session CharacteristicsIntroductionThe following sections describe how to configure
14-13Configuring and Managing Telnet ServersSpecifying Newline CharacteristicsThe NEWLINE characteristics allow the person managing the access server t
Configuring and Managing Telnet Servers14-14Erase Previous Line (EL) Occurs when the remote user of this connection issues an EL request.Example: Setti
14-15Configuring and Managing Telnet ServersManaging Your Access Server As a Telnet Listener NodeIntroductionThis section contains the procedures to di
Configuring and Managing Telnet Servers14-16Example: SHOW PORT TELNET SERVER CHARACTERISTICS DisplayThe following example shows how to display the Teln
14-17Configuring and Managing Telnet ServersReassigning a PortThis process allows you to manage a failed access server port that is configured as a Teln
Configuring and Managing Telnet Servers14-18Supplying User Location Data to Telnet ServersIntroductionWhen the access server creates a Telnet client co
14-19Configuring and Managing Telnet ServersConfiguring a Raw TCP ListenerIntroductionWhen you configure a Telnet listener to use raw TCP, the associated
Contentsxxvi
Configuring and Managing Telnet Servers14-20Displaying Raw TCP CharacteristicsUse the SHOW/LIST TELNET LISTENER command to view the raw TCP settings.Ex
15-1Chapter 15Configuring LPD PrintersOverviewIntroductionThe Line Printer Daemon (LPD) handles remote networking printing. It listens for print reques
Configuring LPD Printers15-2LPD OperationSupported File TypesThe access server’s LPD implementation supports printing of ASCII text and PostScript head
15-3Configuring LPD Printers• If the data file arrives first, the access server sends the file to the printer according to the printer setup on the port.
Configuring LPD Printers15-4Figure 15-1. What Occurs When a Host on the LAN Uses LPD to Send a Print Job to the Access ServerRemote Host(LPD Client)1.
15-5Configuring LPD PrintersConfiguring LPDConfiguring Remote HostsRemote network printing using LPR/LPD requires that you set up the host system correct
Configuring LPD Printers15-6The following table lists the print characteristics that you can configure:Setting Port CharacteristicsFor LPD to communicat
15-7Configuring LPD PrintersPrinter Configuration ExampleThe following example shows how to configure the access server to use LPD for remote network pri
Configuring LPD Printers15-8Displaying Printer CharacteristicsUse the LIST/SHOW PRINTER command to display the printer characteristics. You can specify
15-9Configuring LPD PrintersNotification, Message Codes, Output Flow Control, VerificationLocal> SHOW PRINTER SPEEDY STATUSPrinter: SPEEDYIdentifica
xxiii Preface Overview Purpose The Network Access Software Management guide is written for the person who sets up, maintains, and manages any one o
Configuring LPD Printers15-10
16-1Chapter 16Configuring and Managing SLIP PortsOverviewIntroductionThis chapter explains how to configure and manage access server ports for use with
Configuring and Managing SLIP Ports16-2• Managing the Maximum Transmission Unit• Configuring a Port So That a PC Can Function as a Terminal or SLIP Host
16-3Configuring and Managing SLIP PortsPacket Forwarding to and from SLIP HostsDescriptionDuring SLIP sessions, the access server forwards packets from
Configuring and Managing SLIP Ports16-4Displaying SLIP CharacteristicsIntroductionThe LIST/SHOW/MONITOR SLIP CHARACTERISTICS command enables you to dis
16-5Configuring and Managing SLIP PortsManaging Internet Addresses for SLIP HostsIntroductionThe Internet address for the SLIP host must be unique on t
Configuring and Managing SLIP Ports16-6How a Port Automatically Obtains the SLIP Host AddressIf you configure a port for SLIP communication and do not a
16-7Configuring and Managing SLIP PortsManaging the Maximum Transmission UnitIntroductionThe maximum transmission unit (MTU) value specifies the maximum
Configuring and Managing SLIP Ports16-8Configuring a Port So That a PC Can Function as a Terminal or SLIP HostIntroductionThis section describes how to
16-9Configuring and Managing SLIP PortsConfiguring a Dedicated SLIP PortIntroductionThe dedicated SLIP port allows a single SLIP session.Before you perf
i Notice Notice Cabletron Systems reserves the right to make changes in specifications and other information contained in this document without prior
Prefacexxiv Conventions This manual uses the following conventions:• The Return key, which you must press to execute all commands, is not shown in co
Configuring and Managing SLIP Ports16-10Configuring a Dial-In Modem for Use with a SLIP HostIntroductionBefore you perform this procedure, you must confi
16-11Configuring and Managing SLIP PortsEstablishing Terminal Sessions with a PCPrerequisitesBefore you can use a PC to establish a terminal session wi
Configuring and Managing SLIP Ports16-12Establishing a SLIP SessionEnabling a SLIP Session from the PCThe following example shows how a nonprivileged u
16-13Configuring and Managing SLIP PortsCompressed SLIPIntroductionThe access server has the ability to enable compressed SLIP (CSLIP). Enabling CSLIP
Configuring and Managing SLIP Ports16-14Displaying SLIP CountersCommandsThe SHOW/MONITOR PORT SLIP COUNTERS command displays the various SLIP counters.
16-15Configuring and Managing SLIP PortsSend Packets Lost Number of send IP packets lost due to lack of buffers.Send Packets Queued Number of IP packet
Configuring and Managing SLIP Ports16-16Disabling SLIPCommandUse the CHANGE PORT n SLIP DISABLED command to disable SLIP on a port.Disable SLIP Example
17-1Chapter 17Configuring for SNMP AccessOverviewIntroductionThis chapter describes how to configure the access server simple network management protoco
Configuring for SNMP Access17-2Supported SNMP FeaturesSupported SpecificationsThe access server supports the SNMP specifications listed in the following
17-3Configuring for SNMP AccessSupported MIBsThe access server supports the Management Information Bases (MIBs) listed in the following table. The rele
xxvPreface Associated Documents Refer to the following documentation for additional information:• Terminal Server Manager Installation and Use — Pro
Configuring for SNMP Access17-4Supported Management Information Base VariablesFigure 17-1 illustrates the access server implementation of MIB-II, the C
17-5Configuring for SNMP AccessConfiguring the Access Server for SNMP AccessEnabling and Disabling SNMPThe access server must have an Internet address t
Configuring for SNMP Access17-6When you create a community name without specifying an address the access server assigns the default address ANY. The ad
17-7Configuring for SNMP AccessExample: Configuring SNMP TRAP MessagesThe following example shows how to create the community name server. In this examp
Configuring for SNMP Access17-8Figure 17-2. Diagram of a Network ConfigurationDisabling TRAP Messages for a Community NameTo disable TRAP messages, use
17-9Configuring for SNMP AccessThe following example shows how to remove community name BUGS:Local> CLEAR SNMP COMMUNITY "BUGS"Removing an
Configuring for SNMP Access17-10Configuring the NMSProcedureTo configure an NMS to manage an access server using SNMP, do the following:Step Action1 Ente
18-1Chapter 18Managing the Access ServerOverviewIntroductionThe following lists the actions you perform to manage the access server. These actions sho
Managing the Access Server18-2Managing Your Access Server As Part of the LAT NetworkIntroductionThe network manager should coordinate the activities o
18-3Managing the Access ServerA higher node limit uses more of the access server memory. A lower node limit uses less memory. However, a lower node li
Prefacexxvi
Managing the Access Server18-4SHOW/LIST/MONITOR NODE STATUS Display FieldsThe following table describes the information in the fields and headings of t
18-5Managing the Access ServerViewing LAT Node Counters InformationThe SHOW/MONITOR NODE COUNTERS command displays the counters for messages transmitt
Managing the Access Server18-6Local> SHOW NODE PEACH COUNTERSNode: PEACHSeconds Since Zeroed: 961608 Multiple Node Addresses: 0Messages Received: 6
18-7Managing the Access ServerViewing LAT Node Summary InformationThe SHOW NODE SUMMARY command produces a line of information for each selected servi
Managing the Access Server18-8If you use the SET/DEFINE/CHANGE SERVER NAME command and you specify an access server name that is already being used by
18-9Managing the Access ServerNODE SUMMARY Display FieldsThe following table describes the information in the NODE SUMMARY display:Heading Description
Managing the Access Server18-10Displaying Information About the Access ServerIntroductionThe LIST/MONITOR/SHOW SERVER command displays information abo
18-11Managing the Access Serverthe node counters display descriptions in Viewing LAT Node Counters Information in this chapter.Displaying Information
Managing the Access Server18-12Bytes Sent Number of bytes contained in datagrams successfully transmitted by the access server, excluding Ethernet hea
18-13Managing the Access ServerSend Failure Reasons Mask providing information about the type or types of send failure encountered if the Send Failure
1-1 Chapter 1 CNAS Management Overview Introduction This chapter describes the tasks that the following types of users perform when managing the acce
Managing the Access Server18-14Unrecognized Destination Number of times a frame was passed through the hardware, but the access server did not recogni
18-15Managing the Access ServerDisplaying Access Server StatusThe SHOW/LIST/MONITOR SERVER STATUS command displays the status of the access server. Th
Managing the Access Server18-16The first line displays the access server software version number and base level, LAT software version number, ROM versi
18-17Managing the Access ServerCur column Current running value of the resource. If the Max value is lowered during the Uptime, this value can exceed
Managing the Access Server18-18Discarded Nodes Number of nodes that could not be entered into the access server database, because of the value set for
18-19Managing the Access ServerConsole User Address of the node at which the Remote Console Facility (RCF) is being used to access the access server.
Managing the Access Server18-20Displaying Access Server Summary InformationThe LIST/SHOW/MONITOR SERVER SUMMARY command displays the access server gro
18-21Managing the Access ServerExample: SHOW SERVER SUMMARY DisplayThe following example shows how to generate an access server summary display:Local&
Managing the Access Server18-22Checking Port Status and CountersIntroductionThe LIST/MONITOR/SHOW PORT command displays information about one or more
18-23Managing the Access ServerExample: SHOW PORT CHARACTERISTICS DisplayThe following example shows how to generate a port characteristics display:Lo
CNAS Management1-2 Configuration Tasks for System Administrators Configuration Tasks The following table lists the tasks that system administrators can
Managing the Access Server18-24Example: SHOW PORT COUNTERS DisplayThe following example shows how to generate a port counters display:Local> SHOW P
18-25Managing the Access ServerDisplaying Port StatusThe SHOW/MONITOR PORT STATUS command displays information about the operational condition of the
Managing the Access Server18-26Access Current setting of the ACCESS port characteristic. Access determines how a port can access a service node or how
18-27Managing the Access ServerStatus Current status of the port, which can be one of the following:• Connected — Port is connected to a service.• Con
Managing the Access Server18-28Displaying Port SummaryThe LIST/MONITOR/SHOW PORT SUMMARY command displays one line of general information for each sel
18-29Managing the Access ServerSHOW/LIST/MONITOR PORT SUMMARY Display FieldsThe following table describes the information under the headings in the SH
Managing the Access Server18-30
19-1Chapter 19Configuring and Managing 3270 Terminal Emulation (TN3270)OverviewIntroductionThis chapter explains how to configure and manage the 3270 Te
Configuring and Managing 3270 Terminal Emulation (TN3270)19-2Supported ASCII TerminalsDefinitionTN3270 supports the following models of DIGITAL ASCII te
19-3Configuring and Managing 3270 Terminal Emulation (TN3270)Definition and Description of a Keyboard Map3278 KeyboardsBecause the IBM 3278 keyboard dif
1-3CNAS Management Management Tasks for System Administrators System Management Tasks The following table lists the tasks that system administrators
Configuring and Managing 3270 Terminal Emulation (TN3270)19-4Configuring Basic 3270 Terminal EmulationOnce the IBM system administrator has configured th
19-5Configuring and Managing 3270 Terminal Emulation (TN3270)Terminal Setup ParametersThe following table provides information on terminal setup for th
Configuring and Managing 3270 Terminal Emulation (TN3270)19-6IBM Host CommunicationsIntroductionThis section describes IBM host communications with a t
19-7Configuring and Managing 3270 Terminal Emulation (TN3270)The status line is restored when:• You use the STATUS function.• You send data to the host
Configuring and Managing 3270 Terminal Emulation (TN3270)19-8Status Line Indicator DisplayFigure 19-1 shows the position of the status line indicator o
19-9Configuring and Managing 3270 Terminal Emulation (TN3270)Displaying and Customizing Keyboard MapsIntroductionAlthough the default TN3270 keyboard m
Configuring and Managing 3270 Terminal Emulation (TN3270)19-10Default Server-Wide Terminal Type and Keyboard MapsThe following table shows the default
19-11Configuring and Managing 3270 Terminal Emulation (TN3270)Local> CHANGE TN3270 TERMINAL PC_100_DCA KEYMAP VT100Local> CHANGE TN3270 TERMINAL
Configuring and Managing 3270 Terminal Emulation (TN3270)19-12• You cannot assign an ASCII key sequence that is a subset of a key sequence already assi
19-13Configuring and Managing 3270 Terminal Emulation (TN3270)Selecting and Customizing Keyboard Maps for a PortServer-wide keymapping is the recommend
CNAS Management1-4 User Tasks Introduction The access server enables end users to perform tasks such as connecting to network resources and managing
Configuring and Managing 3270 Terminal Emulation (TN3270)19-14You can list the defaults with this command:Local> SHOW TN3270 KEYMAP "KEYMAPNAME
19-15Configuring and Managing 3270 Terminal Emulation (TN3270)Example: SHOW PORT TN3270 KEYMAP CommandThe following example shows a partial display of
Configuring and Managing 3270 Terminal Emulation (TN3270)19-16ASCII-to-EBCDIC and EBCDIC-to-ASCII Translation TablesCommandsThe following table lists a
19-17Configuring and Managing 3270 Terminal Emulation (TN3270)Guidelines for Managing the Use of NVRAM for TN3270IntroductionThere is a pool of approxi
Configuring and Managing 3270 Terminal Emulation (TN3270)19-18Limiting NVRAM UsageTo limit the number of NVRAM keyboard maps that the port user can cus
19-19Configuring and Managing 3270 Terminal Emulation (TN3270)Commands to Manage TN3270 Terminal EmulationIntroductionThis section summarizes the comma
Configuring and Managing 3270 Terminal Emulation (TN3270)19-20TN3270 Port CharacteristicsThe following table provides information on port characteristi
19-21Configuring and Managing 3270 Terminal Emulation (TN3270)SHOW CommandsThe following table provides information on the SHOW Commands for port chara
Configuring and Managing 3270 Terminal Emulation (TN3270)19-22
20-1Chapter 20Configuring and Managing Point-to-Point Protocol (PPP) PortsOverviewIntroductionThis chapter explains how to configure and manage access s
1-5CNAS Management Storage of Configuration Settings and Changes in Memory Memory Types The access server stores configuration settings in two types of
Configuring and Managing Point-to-Point Protocol (PPP) Ports20-2• Displaying PPP Status• Displaying PPP Counters
20-3Configuring and Managing Point-to-Point Protocol (PPP) PortsEnabling PPP on an Access Server PortIntroductionTo check if PPP is enabled on a given
Configuring and Managing Point-to-Point Protocol (PPP) Ports20-4Enabling Dedicated PPP TrafficThe following example shows a series of commands used to d
20-5Configuring and Managing Point-to-Point Protocol (PPP) PortsEstablishing and Ending a PPP SessionUsing the CONNECT PPP CommandIf PPP is configured,
Configuring and Managing Point-to-Point Protocol (PPP) Ports20-6Displaying PPP CharacteristicsIntroductionThis section describes the commands used to d
20-7Configuring and Managing Point-to-Point Protocol (PPP) PortsFields in the LCP Characteristics DisplayThe following table explains the fields in the
Configuring and Managing Point-to-Point Protocol (PPP) Ports20-8Displaying IPCP CharacteristicsThe SHOW/LIST/MONITOR PPP IPCP CHARACTERISTICS command d
20-9Configuring and Managing Point-to-Point Protocol (PPP) Ports1 This field has a fixed value in this software release.ATCP CharacteristicsThe SHOW/LIST
Configuring and Managing Point-to-Point Protocol (PPP) Ports20-10Example: ATCP Characteristics DisplayThe following example shows a sample ATCP charact
20-11Configuring and Managing Point-to-Point Protocol (PPP) PortsDisplaying PPP StatusIntroductionThis section describes how to display the PPP LCP and
CNAS Management1-6 Commands to Display and Change Configuration Settings Introduction This section lists the type of commands that operate on the confi
Configuring and Managing Point-to-Point Protocol (PPP) Ports20-12Fields in the LCP Status DisplayThe following table describes the fields in the LCP sta
20-13Configuring and Managing Point-to-Point Protocol (PPP) PortsBecause of the nature of PPP negotiations, this display can differ from the configured
Configuring and Managing Point-to-Point Protocol (PPP) Ports20-14Displaying ATCP StatusUse the SHOW PORT n PPP ATCP STATUS command to display ATCP stat
20-15Configuring and Managing Point-to-Point Protocol (PPP) PortsExample: ATCP Status DisplayThe following example shows the ATCP status display on por
Configuring and Managing Point-to-Point Protocol (PPP) Ports20-16Routing Protocol The type of routing protocol information that may be sent across the
20-17Configuring and Managing Point-to-Point Protocol (PPP) PortsDisplaying PPP CountersIntroductionThe section describes PPP counters.Displaying LCP C
Configuring and Managing Point-to-Point Protocol (PPP) Ports20-18Fields in the LCP Counters DisplayThe following table describes the fields in the LCP c
20-19Configuring and Managing Point-to-Point Protocol (PPP) PortsDisplaying IPCP CountersUse the SHOW PORT n IPCP command to display the IPCP counters
Configuring and Managing Point-to-Point Protocol (PPP) Ports20-20Fields in the IPCP Counters DisplayThe following table describes the fields in the IPCP
20-21Configuring and Managing Point-to-Point Protocol (PPP) PortsDisplaying ATCP CountersUse the SHOW PORT n ATCP Counters command to display ATCP coun
2-1 Chapter 2 Management Tools Overview Introduction This chapter describes the tools for managing the access server. These tools are:• Access server
Configuring and Managing Point-to-Point Protocol (PPP) Ports20-22Acks out The number of ATCP configure-acks sent to the peer from the access server.Naks
21-1Chapter 21Managing IPXOverviewIntroductionThis chapter describes how to configure and manage IPX on an access server.In This ChapterThis chapter co
Managing IPX21-2• Displaying IPX Counters• Displaying IPX Routes• Resetting Counters
21-3Managing IPXIPX DescriptionIntroductionThe purpose of IPX is to allow Novell NetWare clients to dial in to (or directly attach to) the network acc
Managing IPX21-4Login ProceduresOne or more serial ports of the access server can be configured for Novell dial-up access. Depending on your requiremen
21-5Managing IPXGetting StartedChecklistThe following is a checklist for using this chapter to perform the basic steps to perform remote node access t
Managing IPX21-6Hardware and Software RequirementsIntroductionThis section describes the hardware and software necessary to run IPX.There must be at l
21-7Managing IPXSetting Up Your PCPC Remote Access SoftwareEnsure you know whether the network access server port you are dialing in to requires you t
Managing IPX21-8Setting Up the Network Access ServerEnabling IPXBy default, IPX is not enabled on the access server. A privileged user must enable IPX
21-9Managing IPX• SIGNAL SELECT should match signals used by the attached device (for example, a modem) when the SIGNAL SELECT feature is supported on
ii Notice OS/2 is a registered trademark of International Business Machines Corporation.OSF/1 is a registered trademark of Open Software Foundation,
Management Tools2-2 Access Server Commands Introduction The access server has a command line interface. You enter commands at a prompt on a terminal
Managing IPX21-10Configuring the Port Dedicated to PPPFollowing modem connection, the PC user will log in with or without password authentication. Then
21-11Managing IPXEnabling PPP/PAP Password AuthenticationTo enable the optional PPP/PAP password authentication, use the following commands:Local>
Managing IPX21-12Summary of DECserver IPX Management CommandsThe following are the network access server commands you can use to manage IPX.Port PPP I
21-13Managing IPXPort PPP IPX Commands for IPXCPThe following table explains the PORT PPP IPX commands for IPXCP:Port PPP Commands for PPP Negotiation
Managing IPX21-14Server IPX CommandsThe following table defines the server IPX commands:SHOW/LIST/MONITOR IPX DescriptionCHARACTERISTICS Display the cu
21-15Managing IPXCHANGE/SET/DEFINE IPX FRAME frametype NETWORK Descriptionipx-net Specify explicit internal network number.LEARN Learn internal networ
Managing IPX21-16Modem ConsiderationsDial-In ModemsKeep the following in mind when using dial-in modems attached to the network access server:• Flow c
21-17Managing IPXRecommended Serial Port Baud RateThe following table lists guidelines for setting the serial port baud rate:UART Type Maximum Modem S
Managing IPX21-18Novell Client/Server OperationEstablishing Remote Node Access Connection to Novell NetworkVendors of PC remote node access software f
21-19Managing IPXconnection. Refer to the remote node access software installation guide for additional information.• Use local Novell login scripts t
2-3Management Tools • SET/DEFINE/CHANGE commands• SHOW/LIST/MONITOR commandsIn the above list, the command descriptions group includes any command th
Managing IPX21-20Operational Checkout and DiagnosisVerifying ConfigurationTo verify proper configuration, at a access server management port, type SHOW
21-21Managing IPXDisabling IPXUsing the DEFINE CommandIf you decide you no longer need IPX support, you can disable IPX by using the following privile
Managing IPX21-22Frame TypesIntroductionTo support a broad base of network stations, the access server supports four different frame formats for encap
21-23Managing IPXDisplaying IPX CharacteristicsUsing the SHOW commandUse the SHOW IPX CHARACTERISTICS command to display IPX characteristics, includin
Managing IPX21-24LAN Frame LAN frame types: ETHERNET, RAW802, SAP802, or SNAP802.LAN Network Learn, Disable, or up to 8 hexadecimal numbers (no leadin
21-25Managing IPXDisplaying IPX StatusUsing the SHOW IPX CommandUse the SHOW IPX command to display IPX status. The command is nonprivileged.IPX Statu
Managing IPX21-26LAN Frame The frame type: Ethernet, RAW802, SAP802, or SNAP802.LAN Network Learning — The network number for the corresponding LAN fr
21-27Managing IPXDisplaying IPX CountersUse the SHOW IPX COUNTERS commandUse the SHOW IPX COUNTERS command to display the IPX counters. The command is
Managing IPX21-28IPX Total Packets Received Total number of data packets received.IPX Local Transmits Number of data packets transmitted, originating
21-29Managing IPXRIP/SAP Requests Received Number of RIP/SAP request packets received.RIP/SAP Requests Discarded Number of RIP/SAP request packets d
Management Tools2-4 Reference For more information about this command group and its qualifiers, please refer to the Cabletron Network Access Software
Managing IPX21-30Displaying IPX RoutesUsing the SHOW IPX ROUTES CommandUse the SHOW IPX ROUTES command to display IPX Routes. This command is nonprivi
21-31Managing IPXResetting CountersUsing the ZERO CommandUse the ZERO command to reset IPX counters.ZERO Command OptionsThe following table contains t
Managing IPX21-32
22-1Chapter 22Managing Dial ServicesOverviewIntroductionConfiguring dial services is similar in concept to configuring a LAT service or Telnet listener.
Managing Dial Services22-2Dial Services Command GroupsCommand GroupsTo configure and manage the dial services, use the SET/DEFINE/CHANGE DIALER and SHO
22-3Managing Dial ServicesChecking the Current Server SettingsIntroductionBefore you configure dialer services, determine the current server configurati
Managing Dial Services22-4Defining a Dialer ScriptIntroductionThe first step in configuring a dial service is creating a dialer script. A dialer script t
22-5Managing Dial ServicesExample: Set Dialer Script NameThe following example illustrates how to modify dialer script strings in a dialer script call
Managing Dial Services22-6Assigning the Dialer Script to a PortStepsAfter configuring the dialer strings in a dialer script, assign the script to a spe
22-7Managing Dial ServicesExample: The Show Port Command DisplayThe following example shows the resulting display for the SHOW PORT command. In this e
2-5Management ToolsHelpIntroductionThe access server provides online help about access server commands. This section describes two types of online hel
Managing Dial Services22-8Verifying Dialer Script ConfigurationUse the SHOW PORT n command to verify any changes you make to dialer script assignments
22-9Managing Dial ServicesDefining the Dialer ServiceStepsAfter you define the dialer script and assign the dialer script to a port, define the dialer se
Managing Dial Services22-10Example: Show Dialer, Port Security EnabledIn this example, a user on a port with SECURITY enabled would not have access to
22-11Managing Dial ServicesSHOW DIALER STATUS Display FieldsThe following table lists values for the status field in the SHOW DIALER display:Displaying
Managing Dial Services22-12For a detailed explanation of command keywords used to mange dialer services, see the Command Definitions section in Chapter
22-13Managing Dial ServicesUser Account CharacteristicsThe following table explains the user account characteristics:Characteristic Description Commen
Managing Dial Services22-14MODE Command VariablesThe following table explains the MODE command variables:Variable DefinitionLOCAL Interactive nondedica
22-15Managing Dial ServicesConfiguring Interactive Dial RequestsConfiguring for Interactive Dial-BackThe following example sets the access server to a p
Managing Dial Services22-16Framed Dial RequestsIntroductionDial-back requests can also be queued from a client that connects to the server using PPP.
22-17Managing Dial Services3. If you enable PPP call-back negotiation on a port, DIGITAL strongly recommends that you also enable some sort of authent
Management Tools2-6Console PortDisplaying Port ParametersThe console port receives the access server system messages. An access server can have only o
Managing Dial Services22-18
23-1Chapter 23Managing Access Server SecurityOverviewIntroductionThe Cabletron Network Access Software (CNAS) supports the following authentication se
Managing Access Server Security23-2Security Type DescriptionsIntroductionThis section describes the types of security that the access server supports.
23-3Managing Access Server SecuritySecurIDSecurID is a system of authentication from Security Dynamics Technologies, Inc. There is no authorization in
Managing Access Server Security23-4Common Terminology Across Security RealmsIntroductionThis section briefly defines the terms that are common to all of
23-5Managing Access Server SecurityOnce configured, the secret is never displayed on the access server. There are privileged access server commands to
Managing Access Server Security23-6Managing KerberosIntroductionThis section describes Kerberos security features and explains how to configure and man
23-7Managing Access Server SecurityNetwork Access Server RequirementsBefore configuring security-specific parameters, make sure that:• You have entered
Managing Access Server Security23-8Example: Definition of Kerberos SettingsThe following example shows a sample of the commands used to change these se
23-9Managing Access Server SecurityPort ConfigurationYou need to configure user authentication on the access server on a port-by-port basis. To enable t
2-7Management ToolsRemote Console PortDescriptionThe remote console port is a logical port that enables you to configure the access server from a remot
Managing Access Server Security23-10Username> [email protected]> (not echoed)Local - 450 - Attempting to authenticate user:smith
23-11Managing Access Server SecurityNetwork Access Server User Authentication CountersThe following example shows how to display the user authenticati
Managing Access Server Security23-12Managing RADIUSIntroductionA RADIUS server must be operational on the network. The RADIUS server can include accou
23-13Managing Access Server SecurityOptional Setup for RADIUSYou can use the commands in the following examples to configure additional security parame
Managing Access Server Security23-14Example: Defining Realm Default Authorization AttributesLocal> CHANGE RADIUS REALM JONAS.COM PERMISSIONS (DIALBA
23-15Managing Access Server SecurityRADIUS User AuthorizationsThe ultimate value for an authorization attribute may come from one of three sources: th
Managing Access Server Security23-16Setting User PermissionsPermissions are explicitly given by the authorizations that were in the user-name entry in
23-17Managing Access Server SecurityGeneral Session AttributesThe following table defines the general session RADIUS attributes:General Session Attribu
Managing Access Server Security23-18Framed Session AttributesThe following table defines the framed session attributes:Interactive Session AttributesTh
23-19Managing Access Server SecurityRADIUS General Non-Session AttributesThe following table defines the RADIUS general non-session attributes:Login-Po
Management Tools2-8OpenVMS Utility — Terminal Server ManagerFor OpenVMS systems, DIGITAL offers the Terminal Server manager (TSM) to facilitate managi
Managing Access Server Security23-20DIGITAL Vendor-Specific AttributesThe following table defines the vendor-specific attributes implemented in CNAS:RADI
23-21Managing Access Server SecurityThe Cabletron Network Access Software now reports a number of termination reason codes to the RADIUS Server when u
Managing Access Server Security23-22Optional RADIUS User AttributesThe RADIUS attributes that the access server supports are as follows:Session-Timeou
23-23Managing Access Server SecurityManaging SecurIDIntroductionThe Security Dynamics ACE/Server software performs dynamic two-factor SecurID authenti
Managing Access Server Security23-24SecurID PortsNormally, you do not need to change the SecurID master and slave SERVICE PORT. If the default values
23-25Managing Access Server SecurityExample: Including the Realm NameIf your realm name has to be included when the access server sends messages to Se
Managing Access Server Security23-26• One of the legal settings of the attributes in the realm is NONE. This special value connotes unspecified. In thi
23-27Managing Access Server SecurityManaging Local Access Server SecurityIntroductionThe tasks described in this section cover the configuration of the
Managing Access Server Security23-28Determining Security ConfigurationDisplaying RADIUS, SECURID, and KERBEROS CharacteristicsThe SHOW {RADIUS | SECURI
23-29Managing Access Server SecurityExample: Showing SecurIDThe following example shows the resulting display for the SHOW SECURID CHARACTERISTICS com
2-9Management ToolsExample: Using NCP to Connect to an Access Server Remote Console Port from a Load HostThe following example shows a connection from
Managing Access Server Security23-30Example: Displaying Kerberos CharacteristicsThe following example shows the resulting display for the SHOW KERBERO
23-31Managing Access Server SecurityShowing the Authentication CountersThis access server can display the counters for all realms (local, RADIUS, KERB
Managing Access Server Security23-32Example: Showing Security CountersLocal> SHOW PORT 8 SECURITY COUNTERS
23-33Managing Access Server SecurityManaging Dial-Up Access Security with AUTOLINK and AUTOLINK AuthenticationIntroductionAUTOLINK lets PC clients log
Managing Access Server Security23-34Enabling AUTOLINK AuthenticationIf you want authenticated logins, you must separately configure the port to require
23-35Managing Access Server SecurityIf you use either the PAP NOUSERNAME or CHAP NOUSERNAME options with the PORT LCP AUTHENTICATION command when you
Managing Access Server Security23-36Example: Setting AUTOLINK TimersThe following example shows how to set AUTOLINK timers:Local> DEFINE PORT AUTOL
23-37Managing Access Server Security4 The script searches for:Local -451- Authentication successful5 The script exits and allows the framed protocol t
Managing Access Server Security23-38Specifying Other Security FeaturesIntroductionThis section describes various security features on interactive port
23-39Managing Access Server SecurityThe following shows how to enable a host on the TCP/IP network, SALE.MKT.FOO.COM, as a dedicated service on port 5
Management Tools2-10Example: Using MOP to Connect to an Access Server from a DECnet/OSI OpenVMS NodeThe following example shows a connection from a DE
Managing Access Server Security23-40Login Password Definition ExampleThe following example shows how to define TOTAL as the login password:Local> CHA
23-41Managing Access Server SecurityExample: Changing the Server Password Attempt LimitThe following example shows how to change the password limit to
Managing Access Server Security23-42
24-1Chapter 24Managing Remote LoginOverviewThe remote login client (Rlogin) is supported by Cabletron Network Access Software. The Rlogin protocol, de
Managing Remote Login24-2Rlogin FeaturesThe following is a list of Rlogin features implemented in this release of the Cabletron Network Access Softwar
24-3Managing Remote LoginRlogin CharacteristicsThe following is a list of Rlogin characteristics:• Client username — The client username sent to the R
Managing Remote Login24-4Configuring a Rlogin ClientThe Rlogin component implemented in the Cabletron Access Server Network Access Software is a Rlogin
24-5Managing Remote Login4 There are two ways you can configure Rlogin for DIGITAL UNIX:1. In the user’s home directory, add an entry to the .rhosts fil
Managing Remote Login24-6
25-1Chapter 25AccountingOverviewIntroductionThis chapter describes the network access server accounting component. The basis of an accounting facility
2-11Management ToolsCharacteristics of the Telnet Remote Console PortThe following table describes the characteristics for Telnet remote console conne
Accounting25-2Accounting DescriptionIntroductionThe configuration of the accounting feature is supported using SNMP and the user interface. The account
25-3AccountingWhat Events Are Logged?Contents of Log Entry TypesThe following table shows the fields that are logged in each accounting log entry type:
Accounting25-4Event Field DescriptionsThe following table describes the fields in the accounting log entries:Field DescriptionEvent Provides the abilit
25-5AccountingPort• Session connect/disconnect: The protocol associated with the session attempt or disconnect. These values can be:-LAT- TELNET- MOP-
Accounting25-6Peer The value of this field varies depending on the protocol field, as follows:•LAT- Local Access: For nondedicated/preferred case, whate
25-7AccountingTx• Session Disconnect Event: The number of bytes of successfully transmitted user data on this session at the time of session terminati
Accounting25-8When Events Are LoggedIntroductionThis section describes when each specific event type is logged.Login EventsLogin events are logged at t
25-9AccountingPassword Modified EventsPassword modified events (Privilege, Maintenance, Login, Remote) are logged whenever the associated password is mo
Accounting25-10Managing AccountingIntroductionYou can manage the accounting feature fully by using SNMP or the user interface. You can access the acco
25-11AccountingChanging the Accounting ThresholdUse the ACCOUNTING THRESHOLD command to specify the point in the building of a log when the accounting
iiiNotice FCC Notice This device complies with Part 15 of the FCC rules. Operation is subject to the following two conditions: (1) this device may no
Management Tools2-12Access Server ManagerDescriptionThe Access Server Manager application is a management tool for access servers. It runs on 32-bit W
Accounting25-12Example: Displaying Accounting CharacteristicsThe following example shows the display that appears when you use the SHOW ACCOUNTING CHA
25-13AccountingUsing the Accounting Console Logging FeatureDescriptionWhen console logging is enabled, the accounting component displays the accountin
Accounting25-14This will cause the accounting events to be displayed on the remote screen. To log the events to a file, type the following command (rep
A-1Appendix ACable and Adapter RecommendationsCable and Adapter HardwareCable and Adapter TableThe following table lists the cable and adapter hardwar
Cable and Adapter RecommendationsA-2ReferenceRefer to the Site Preparation Guide or User’s Guide shipped with your access server hardware for further
Glossary-iGlossaryaccess serverA generic name for a family of access servers supported by Cabletron Network Access Software.access server configuration
GlossaryGlossary-iiasynchronousPertaining to a communication method in which each event occurs with no relation to a timing signal.atomicsRefers to no
Glossary-iiiGlossaryCCRConsole Carrier Request. An ULTRIX host function that allows connections to the access server remote console port.Clear To Send
GlossaryGlossary-ivdatagramSee IP datagram.Data Set ReadySee DSR.Data Terminal ReadySee Data Terminal Ready.data transparencyDuring a session, the acc
Glossary-vGlossaryThe individual sections of the name might represent sites, groups, or computers, but the domain system simply calls each section a l
3-1Chapter 3User InterfaceOverviewIntroductionThis chapter describes how to customize and manage the user interface to the access server. The access s
GlossaryGlossary-vinode. Failover is attempted only if the service is offered by two or more service nodes (as with a VAXcluster service).flow controlT
Glossary-viiGlossaryinitializationThe process of running the access server diagnostic self-test program and, optionally, downline loading the access s
GlossaryGlossary-viiiInternet ProtocolSee TCP/IP.IPInternet Protocol. See TCP/IP.IP datagramInternet. A basic unit of information transferred over the
Glossary-ixGlossaryLAT Control ProgramA control program that provides a command interface that allows system and network managers to set up and manage
GlossaryGlossary-xlocal serviceNetwork resource offered by your access server.loopback testA access server asynchronous port test during which data is
Glossary-xiGlossaryname serverSee Internet name server.NCPNetwork Control Program. The DECnet command interface used to configure, control, monitor, an
GlossaryGlossary-xiiODL Font ProtocolOn-Demand Loading Font Protocol. A protocol that enables Asian terminals connected to the access server to use th
Glossary-xiiiGlossaryqueuingLAT. The process of putting LAT connection requests for a busy printer or service on a waiting list (queue). Requests are
GlossaryGlossary-xivroot name serverA name server that is at the top level in a domain.RTSRequest To Send. A signal sent by the access server to the p
Glossary-xvGlossarysession managementA facility provided by some access servers that uses TD/SMP to communicate with a access server device so that th
User Interface3-2Command Groups and MenusDescriptionIn addition to convenience, command groups and menus provide the access server with a security fea
GlossaryGlossary-xvisynchronousPertaining to a communication method in which each event occurs in relation to a timing signal.TCP/IPTransport Control
Glossary-xviiGlossaryTime To LiveSee TTL.TFTPTrivial File Transfer Protocol. For access servers, this Internet protocol is used to downline load softw
GlossaryGlossary-xviiivirtual circuitA logical communications path between a access server and a service node. A virtual circuit provides a bidirectio
3-3User InterfaceUsing Command GroupsCreating a Command GroupTo create a command group, follow these steps:Example: Defining a Command GroupThe followi
User Interface3-4The following example executes the command group SERVICE_A defined in the previous example. When this command executes, it substitutes
3-5User InterfaceUsing MenusDisplaying a List of Enabled MenusTo display a list of the menus enabled on a port, use the SHOW MENU command. If you are
User Interface3-6Local> DEFINE PORT 2 DEFAULT MENU HOSTSMenu WindowsMenus are divided into two windows:• The menu choices window appears in lines 1
3-7User InterfaceDefining MenusIntroductionThis section describes how to define menus and provides examples.ReferenceFor complete information about the
User Interface3-8Figure 3-2. Main Menu DisplayDefining Menu ChoicesFor each menu choice line, you can define:• One line of display text• A server comman
3-9User InterfaceThe menu selection defined in this example does the following:1. The following text displays on line 5 of the menu choices window:OPEN
Noticeiv
User Interface3-10Exiting from a MenuUnless the system manager wants to set up a captive menu (refer to the following section), all menus should have
3-11User InterfaceLine 9 DisplayLogoutLine 9 LogoutLOGOUTPurging Menu Lines and Entire MenusUse the PURGE MENU command to delete a string from a menu
User Interface3-12
4-1Chapter 4Managing Load HostsOverviewIntroductionThis chapter describes the command procedures that you use to manage hosts that load the access ser
Managing Load Hosts4-2Load Host ProceduresDescriptionThe specific command procedure that you use to manage the load host depends on the network version
4-3Managing Load HostsDSV$CONFIGUREIntroductionDSV$CONFIGURE is a command procedure that runs on a DECnet Phase IV OpenVMS load host or on a DECnet/OS
Managing Load Hosts4-4$ DSV%DSV-I-IDENT, executing DSV$CONFIGURE version x.x.x-nnn -DSV-I-HELP, type ? any time for helpDSV> HELPADD - Add a se
4-5Managing Load HostsDSV> ADD SERVER_Server Name: DGD700_Ethernet Address: 08-00-2B-26-AE-32_Server Type: DS700_Service Circuit [SVA-0]:_Maintenan
Managing Load Hosts4-6DSV> DELETE DGD700Server: DGD700 Circuit: SVA-0Address: 08-00-2B-26-AE-32 Maint.
4-7Managing Load HostsDSV> USE DGD700%CCR-I-CONNEST, connection established to remote system 08-00-2B-26-AE-32Press CTRL/ \ to disconnect, CTRL/] t
v Contents Preface Overview...xxii
Managing Load Hosts4-8Using a BOOTP/TFTP ServerIntroductionA BOOTP/TFTP server is a UNIX host that downloads the access server software using the BOOT
4-9Managing Load HostsEach port enabled for remote or dynamic access, may have its remote password feature individually enabled or disabled. This feat
Managing Load Hosts4-10Upline DumpingIntroductionThe access server upline dumps its memory when:• An unexpected failure occurs.• You force a crash.The
4-11Managing Load HostsTerminal Server Manager (TSM)IntroductionTSM is a utility that runs on OpenVMS load hosts. TSM enables you to configure and mana
Managing Load Hosts4-12
5-1Chapter 5Managing Directed TFTPOverviewDirected TFTP is a feature that allows the Access Server to load from a single, pre-specified TFTP server. On
Managing Directed TFTP5-2Configuring Directed TFTP on an Access ServerDirected TFTP requires a minimum ROM code revision to be resident in the Access S
5-3Managing Directed TFTPFor an Access Server that is not already running V2.3 (or later)software, to perform a Directed TFTP image load, you must int
Managing Directed TFTP5-4To permanently disable Directed TFTP from the DNAS command line prompt, DEFINE the TFTP HOST to NONE. For example:Local> D
6-1Chapter 6Initializing the Access ServerOverviewIntroductionThis chapter describes how to initialize the access server. Initializing the access serv
Contentsvi Help...2-5In
Initializing the Access Server6-2Preparing LAT Services for InitializationDo ThisIf the access server offers LAT services, follow these steps before y
6-3Initializing the Access ServerPreparing Telnet Listeners for InitializationDo ThisIf the access server has Telnet listeners, follow these steps bef
Initializing the Access Server6-4Initializing the Access ServerUsing the INITIALIZE CommandTo use the INITIALIZE command, log in to one of the followi
6-5Initializing the Access ServerSpecifying Initialization from a Load HostTo specify initialization from a network load host, use the following comma
Initializing the Access Server6-6Using the DIAGNOSE Option with INITIALIZEUsing the DIAGNOSE option with INITIALIZE enables you to test the access ser
6-7Initializing the Access ServerUsing NCP to Initialize the Access ServerNCP Initialization CommandsThe following table shows the NCP commands used t
Initializing the Access Server6-8Booting from the NetworkLoading the Software ImageIf your network server is configured with Flash RAM, but does not ha
6-9Initializing the Access ServerBooting Using Console CommandsIntroductionConsole functions require access server ROM Version 4.0 or greater.If you p
Initializing the Access Server6-10Boot Command OptionsThe following table lists the command options you can select for the boot command:Option Definiti
6-11Initializing the Access ServerB media:nameIn this command, the media part of media:name specifies which boot media to use.FLA: — Use Flash RAM. For
viiContents Chapter 4 Managing Load Hosts Overview...
Initializing the Access Server6-12R This command resets the factory- settings and initializes the access server. This command requires verification. En
7-1Chapter 7Configuring LAT CharacteristicsOverviewIn This ChapterThis chapter describes how to configure the LAT characteristics for the access server.
Configuring LAT Characteristics7-2LAT CharacteristicsPreparing to Change LAT CharacteristicsBefore you change LAT characteristics, make sure to:• Insta
7-3Configuring LAT CharacteristicsPASSCHECK 200 0 to 200 PASSCHECK CharacteristicQUEUE LIMIT 100 0 to 200 QUEUE LIMIT CharacteristicRESPONDER Disabled
Configuring LAT Characteristics7-4Displaying LAT CharacteristicsCommand To UseTo display the current LAT characteristics, use the SHOW/LIST/MONITOR SER
7-5Configuring LAT CharacteristicsANNOUNCEMENTS CharacteristicIntroductionThe ANNOUNCEMENTS characteristic determines if the access server sends LAT mu
Configuring LAT Characteristics7-6CIRCUIT TIMER CharacteristicIntroductionThe CIRCUIT TIMER characteristic defines the interval at which the access serv
7-7Configuring LAT CharacteristicsIDENTIFICATION CharacteristicIntroductionThe IDENTIFICATION characteristic is a string that can be up to 40 character
Configuring LAT Characteristics7-8KEEPALIVE TIMER CharacteristicIntroductionThe KEEPALIVE TIMER characteristic maintains a virtual circuit between the
7-9Configuring LAT CharacteristicsMULTICAST TIMER CharacteristicIntroductionThe MULTICAST TIMER characteristic determines the interval at which a servi
Commentaires sur ces manuels