Western Telematic RSM-16DC manual

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120

Go to page of

A good user manual

The rules should oblige the seller to give the purchaser an operating instrucion of Western Telematic RSM-16DC, along with an item. The lack of an instruction or false information given to customer shall constitute grounds to apply for a complaint because of nonconformity of goods with the contract. In accordance with the law, a customer can receive an instruction in non-paper form; lately graphic and electronic forms of the manuals, as well as instructional videos have been majorly used. A necessary precondition for this is the unmistakable, legible character of an instruction.

What is an instruction?

The term originates from the Latin word „instructio”, which means organizing. Therefore, in an instruction of Western Telematic RSM-16DC one could find a process description. An instruction's purpose is to teach, to ease the start-up and an item's use or performance of certain activities. An instruction is a compilation of information about an item/a service, it is a clue.

Unfortunately, only a few customers devote their time to read an instruction of Western Telematic RSM-16DC. A good user manual introduces us to a number of additional functionalities of the purchased item, and also helps us to avoid the formation of most of the defects.

What should a perfect user manual contain?

First and foremost, an user manual of Western Telematic RSM-16DC should contain:
- informations concerning technical data of Western Telematic RSM-16DC
- name of the manufacturer and a year of construction of the Western Telematic RSM-16DC item
- rules of operation, control and maintenance of the Western Telematic RSM-16DC item
- safety signs and mark certificates which confirm compatibility with appropriate standards

Why don't we read the manuals?

Usually it results from the lack of time and certainty about functionalities of purchased items. Unfortunately, networking and start-up of Western Telematic RSM-16DC alone are not enough. An instruction contains a number of clues concerning respective functionalities, safety rules, maintenance methods (what means should be used), eventual defects of Western Telematic RSM-16DC, and methods of problem resolution. Eventually, when one still can't find the answer to his problems, he will be directed to the Western Telematic service. Lately animated manuals and instructional videos are quite popular among customers. These kinds of user manuals are effective; they assure that a customer will familiarize himself with the whole material, and won't skip complicated, technical information of Western Telematic RSM-16DC.

Why one should read the manuals?

It is mostly in the manuals where we will find the details concerning construction and possibility of the Western Telematic RSM-16DC item, and its use of respective accessory, as well as information concerning all the functions and facilities.

After a successful purchase of an item one should find a moment and get to know with every part of an instruction. Currently the manuals are carefully prearranged and translated, so they could be fully understood by its users. The manuals will serve as an informational aid.

Table of contents for the manual

  • Page 1

    WTI Part No. 13662 Rev . D RSM Series Remote Site Ma nagers Models Covered: RSM-8 RSM-16 RSM-16DC RSM-32 RSM-32DC User's Guide F or Firmware Version 2.16 and Higher[...]

  • Page 2

    i Warnings and Cautions: Installation Instructions Secure Racking If Secure Racked units are installed in a closed or multi-unit rack assembly , they may require further evaluation by Certification Agencies. The following items must be considered. 1. The ambient within the rack may be greater than room ambient. Installation should be such that the [...]

  • Page 3

    ii Warnings and Cautions Disconnect Power If any of the following events are noted, immediately disconnect the unit from the outlet and contact qualified service personnel: 1. If the power cord becomes frayed or damaged. 2. If liquid has been spilled into the device or if the device has been exposed to rain or water .[...]

  • Page 4

    iii Agency Approvals FCC Part 15 R egulation This equipment has been tested and found to comply with the limits for a Class A digital device, pursuant to part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference when the equipment is operated in a commercial environment. This equipment generat[...]

  • Page 5

    iv T able of Contents 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-1 2. Unit Description . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-1 2.1. Front P anel . . . . . . . . . . . . . . [...]

  • Page 6

    T able of Contents v 5. Configuration (continued) 5.8.7. LDAP P arameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-38 5.8.7.1. Adding LDAP Groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-40 5.8.7.2 Viewing LDAP Groups . . . . . . . . . . . . . . . . . . . . . . [...]

  • Page 7

    T able of Contents vi Appendices: A. RS232 Port Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Apx - 1 B. Specifications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Apx -2 C. Customer Service . . . . . . . . . . .[...]

  • Page 8

    T able of Contents vii List of Figures 2.1. Instrument Front P anel (Model RSM-8 Shown) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-1 2.2. Instrument Back P anel (Model RSM-8) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-2 2.3. Instrument Back P anel (Model RSM-16) . . . . . . . . . . . .[...]

  • Page 9

    1-1 1. Introduction The RSM-8, RSM-16, RSM-16DC, RSM-32 and RSM-32DC Remote Site Managers provide in-band and out-of-band access to RS-232 console ports and maintenance ports on UNIX servers, routers and any other network element that includes a serial console port. System administrators can access the RSM via TCP/IP network, using SSH or T elnet, [...]

  • Page 10

    1-2 Introduction Configuration Backup Once you have configured the RSM to fit your application, parameters and options can be saved to an ASCII text file on your PC. This allows you to quickly restore user - selected parameters if unit configuration is accidentally altered or deleted. Saved parameters can also be uploaded to other RSM units. This a[...]

  • Page 11

    2-1 CLEAR SET ON RDY CONNECTIONS 1 2 3 4 5 6 7 8 www.wti.com RSM-8 Remote Site Manager 1 2 3 4 5 Figure 2.1: Instrument Front P anel (Model RSM-8 Shown) 2. Unit Description 2.1. F ront Panel  CLEAR: Restarts the RSM without changing user -selected parameter settings. Note: When Clear is pressed, all ports will be disconnected.  ON: Lights whe[...]

  • Page 12

    2-2 Unit Description O I PHONE LINE 10/100BaseT LINK ACTIVITY SYSTEM SETUP PORTS (DTE) 1 2 3 4 5 6 7 8 1 2 3 4 5 Figure 2.2: Instrument Back Panel (Model RSM-8) O I PHONE LINE 10/100BaseT LINK ACTIVITY 2 1 3 4 5 6 7 8 9 10 11 12 13 14 15 16 SYSTEM SETUP PORTS (DTE) 1 2 3 3 4 5 Figure 2.3: Instrument Back Panel (Model RSM-16) PHONE LINE 10/100BaseT [...]

  • Page 13

    2-3 Unit Description  RS232 Serial Ports: F or connection to console ports on target devices. Standard DB9 connectors configured as DTE ports. The RS232 ports are similar to a serial port on a PC. When connecting a modem, use a standard serial cable. When connecting a PC or other DTE device use a null modem cable. • RSM-8 units include 8 Seria[...]

  • Page 14

    3-1 3. Getting Started This section describes a simplified installation procedure for our RSM-8, RSM-16, RSM-16DC, RSM-32 and RSM-32DC models, which will allow you to communicate with the unit in order to demonstrate basic features and check for proper operation. Note that this Quick Start Guide does not provide a detailed description of unit confi[...]

  • Page 15

    3-2 Getting Started 3.2. Communicating with the RSM When properly installed and configured, the RSM will allow command mode access via T elnet, Web Browser , SSH client, modem, or local PC. However , in order to ensure security , both T elnet and W eb Browser access are disabled in the default state. T o enable T elnet and/or Web Browser access, pl[...]

  • Page 16

    3-3 Getting Started 3. Review Help Menu: If you are communicating with the RSM via the text interface (SSH, T elnet or Modem), type /H and press [Enter] to display the Help Menu, which lists all available RSM commands. Note that the Help Menu is not available via the Web Browser Interface. 4. Creating Connections Between Ports: The RSM can perform [...]

  • Page 17

    3-4 Getting Started b) Third Party Connection: Y our resident port (e.g. P ort 1) issues a /C command to create a connection between two other ports. i. T o connect Port 2 to P ort 3, type /C 2 3 [Enter] . ii. While Ports 2 and 3 are connected, P ort 1 will still recognize RSM commands. T ype /S [Enter] to display the P ort Status Screen. The "[...]

  • Page 18

    4-1 -48V 0.1A 0 -48V A -48V B GROUND SCREW Figure 4.1: T erminal Block Assembly (DC Units Only) 4. Hardware Installation 4.1. Connecting Power to the RSM Unit The RSM is available in both AC and DC powered versions. When connecting AC or DC power to the RSM, proceed as follows: CAUTIONS: • Before attempting to install this unit, please review the[...]

  • Page 19

    4-2 Hardware Installation 4.2. Connecting the Network Cable The Network Port is an RJ45, 10/100BaseT Ethernet Jack, for connection to a T CP/IP network. Note that the RSM features a default IP Address (192.168.168.168.) Providing that you are communicating with the unit from a node on the same subnet, this allows you to contact the RSM without firs[...]

  • Page 20

    5-1 5. Configuration 5.1. Communicating with the RSM Unit In order to configure the RSM, you must first connect to the unit, and access command mode. Note that, the RSM offers two separate configuration interfaces; the W eb Browser Interface and the T ext Interface. In addition, the RSM also offers three different methods for accessing command mode[...]

  • Page 21

    5-2 Configuration T o access command mode via the T ext Interface, proceed as follows: Note: Command mode cannot be accessed via a Buffer Mode Port, Passive Mode Port, or any port that is presently connected to another RSM port. 1. Contact the RSM Unit: a) Via Local PC: Start your communications program and press [Enter] . Wait for the connect mess[...]

  • Page 22

    5-3 Configuration 3. If a valid username and password are entered, the RSM will display the Port Status Screen, shown in Figure 5.1. Note: If the T elnet connection is refused, it is most likely due to one of the following reasons: • The IP Security feature has denied the connection. • Y ou are attempting to use an account that permits Supervis[...]

  • Page 23

    5-4 Configuration 5.2. System SetUp Ports Serial Ports 1 and 2 are reserved as SetUp P orts, and will always permit password protected access to Supervisor commands. Therefore, Ports 1 and 2 cannot be configured as Buffer Mode Port or P assive Mode Ports, because these port modes do not permit access to command mode. In addition, the Supervisor Mod[...]

  • Page 24

    5-5 Configuration SYSTEM PARAMETERS: 1. User Directory 2. Site-ID: 3. Real Time Clock: 01/09/2007 00:26:06 4. Invalid Access Lockout: On 5. Audit Log: On - Without Syslog 6. Callback Security: On - Callback (Without Password Prompt) 7. “/PW” Command: Off Enter: #<CR> to change, <ESC> exit ... Figure 5.3: The System Parameters Menu ([...]

  • Page 25

    5-6 Configuration In the T ext Interface, the System Parameters menu is also used to create and manage user accounts and passwords. Note however , that when you are communicating with the unit via the Web Browser Interface, accounts and passwords are managed and created via a separate menu that is accessed by clicking on the "Users" link [...]

  • Page 26

    5-7 Configuration 5.4.1. The Real Time Clock and Calendar The Real Time Clock menu is used to set the RSM's internal clock and calendar . T o access the Real Time Clock Menu, proceed as follows: • T ext Interface: T ype /F and press [Enter] . The System Parameters menu will appear as shown in Figure 5.3. At the System P arameters menu, type [...]

  • Page 27

    5-8 Configuration • Secondary NTP Address: Defines the IP address or domain name (up to 64 characters long) for the secondary , fallback NTP Server . (Default = undefined.) • NTP Timeout: The amount of time in seconds, that will elapse between each attempt to contact the NTP server . When the initial attempt is unsuccessful, the RSM will retry [...]

  • Page 28

    5-9 Configuration The Invalid Access menus allow you to select the following: • Lockout Enable: Enables/Disables the Invalid Access Lockout feature. (Default = On.) • Lockout Attempts: The number of invalid attempts required to activate the Invalid Access Lockout feature. (Default = 9.) • Lockout Duration: The length of time ports will remain[...]

  • Page 29

    5-10 Configuration 5.4.4. Callback Security The Callback function provides an additional layer of security when callers attempt to access command mode via modem. When this function is properly configured, modem users will not be granted immediate access to command mode upon entering a valid password; instead, the unit will disconnect, and dial a us[...]

  • Page 30

    5-11 Configuration ◆ On - Callback ONL Y (Without P assword Prompt): Callbacks will be performed for user accounts that include a Callback Number , and the username/password prompt will not be displayed when the user’s modem answers. Accounts that do not include a Callback Number will not be able to access command mode via an RSM modem port. ?[...]

  • Page 31

    5-12 Configuration 5.5. User Accounts Prior to accessing command mode or establishing a T elnet Direct Connection, you will be prompted to enter a username (login) and password. The username and password entered at login determine which port(s) you will be allowed to connect and what type of commands you will be allowed to execute. Each username / [...]

  • Page 32

    5-13 Configuration 5.6. Managing User Accounts The User Directory function is employed to create new accounts, display parameters for existing accounts, modify accounts and delete accounts. Up to 128 different user accounts can be created. The "User Directory" function is only available when you have logged into command mode using an acco[...]

  • Page 33

    5-14 Configuration 5.6.2. Adding User Accounts The "Add Username" option allows you to create new accounts and assign usernames, passwords, command level, port access rights, and Callback Numbers to each account. Note that the Add User function is only available to users who have accessed command mode using a password that permits Supervi[...]

  • Page 34

    5-15 Configuration T o create new user accounts, proceed as follows: • T ext Interface: From the User Directory menu, type 2 and press [Enter] . The Add Username menu (Figure 5.5) will be displayed. • W eb Browser Interface: From the Edit User menu, click the "Add User" link. The RSM will display the Add User menu (Figure 5.6.) The Ad[...]

  • Page 35

    5-16 Configuration 5.6.3. Modifying User Accounts The "Edit User Directory" function allows you to edit existing user accounts in order to modify passwords and usernames, or change port access or Supervisor Command capability . Note that the Edit/Modify User function is only available to users who have accessed command mode using a passwo[...]

  • Page 36

    5-17 Configuration 5.7. RS232 Port Configuration When responding to prompts, invoking commands, and selecting items from port configuration menus, note the following: • Configuration menus are only available to accounts and ports that permit Supervisor commands. • If you are configuring the RSM via modem, modem parameters will not be changed un[...]

  • Page 37

    5-18 Configuration PORT PARAMETERS #03: COMMUNICATION SETTING PORT MODE PARAMETERS 1. Baud Rate: 9600 21. Port Name: 2. Bits/Parity: 8-None 22. Port Mode: Passive 3. Stop Bits: 1 23. DTR Output: Pulse 4. Handshake: RTS/CTS 24. Buffer Params: --- 25. Modem Params: --- GENERAL PARAMETERS NETWORK SERVICES 11. Supervisor Mode: Permit 31. Direct Connect[...]

  • Page 38

    5-19 Configuration 5.7.2. RS232 Port Configuration Menus The Port Configuration Menus are used to select communications parameters and enable/disable options for each RS232 port. • T ext Interface: T ype /P n and then press [Enter] (Where n is the number or name of the desired RS232 Serial Port.) The P ort Parameters menu will be displayed as sho[...]

  • Page 39

    5-20 Configuration General P arameters: • Supervisor Mode: Permits/denies port access to supervisor commands. When enabled (Permit), the port will be allowed to invoke supervisor commands, providing the unit is accessed using an account that permits them. If disabled (Deny), the port may not invoke Supervisor commands. (Default = Permit). Note: I[...]

  • Page 40

    5-21 Configuration Port Mode P arameters: • Port Mode: The operation mode for this port. P orts 1 and 2 cannot be configured as P assive or Buffer Mode ports, and the internal modem port is always configured for Modem Mode. (Port 1 and 2, Default = Any -to-Any Mode; Serial Ports 3 and above, Default = P assive Mode; Internal Modem Port, Default =[...]

  • Page 41

    5-22 Configuration Network Services: • Direct Connect: Direct Connect allows users to access the RSM and automatically create a connection between the Network P ort and a specific RS232 port by including the appropriate T elnet port number in the connect command (e.g. Port 5 = 2105). For more information, please refer to Section 8.3. As described[...]

  • Page 42

    5-23 Configuration The Port P arameters menu also offers two additional items used to set the priority of Syslog messages generated by this port: ◆ Facility: The facility under which this port will log messages. (Default = Local_0.) ◆ Level: The severity (or priority) of messages generated by this port. (Default = Emergency .) • SNMP T rap Le[...]

  • Page 43

    5-24 Configuration NETWORK PARAMETERS: COMMUNICATION SETTING SERVERS AND CLIENTS 1. IP Address: 192.168.168.168 21. Telnet Access: On 2. Subnet Mask: 255.255.255.0 22. SSH Access: On 3. Gateway Addr: (undefined) 23. Web Access: On 4. DHCP: Off 24. SYSLOG Addr: (undefined) 5. IP Security: Off 25. SNMP Access: Off 6. Static Route: Off 26. SNMP Trap[...]

  • Page 44

    5-25 Configuration T o access the Network Parameters Menus, proceed as follows: • T ext Interface: T ype /N and press [Enter] . The Network Parameters Menu shown in Figure 5.9 will be displayed. • W eb Browser Interface: Click on the "Network Configuration" link on the left hand side of the screen. The RSM will display the Network Con[...]

  • Page 45

    5-26 Configuration 5.8.1. Network Parameters In the T ext Interface, these parameters are accessed via the Network Configuration menu (Figure 5.9.) In the W eb Browser Interface, these parameters can be found by first clicking the "Network Configuration" link, and then Clicking the "Network P arameters" link to display the Netwo[...]

  • Page 46

    5-27 Configuration 5.8.2. Network Port P arameters In the T ext Interface, these parameters are found in the main Network Configuration menu (Figure 5.9.) In the Web Browser Interface, these parameters are found by first clicking the "Network Configuration" link, and then clicking the "Network Port P arameters" link to display t[...]

  • Page 47

    5-28 Configuration • Inactivity Timeout: Enables and selects the Inactivity T imeout period for the Network Port. If enabled, and the port does not receive or transmit data for the specified time period, the port will disconnect. (Default = 5 Minutes). Note: The Inactivity Timeout value is also applied to Direct Connections. • Command Echo: Ena[...]

  • Page 48

    5-29 Configuration 5.8.3. IP Security The RSM can restrict unauthorized IP addresses from establishing an inbound T elnet connection to the unit. This allows the user to grant T elnet access to only a specific group of IP addresses, or block a particular IP address. In the default state, the RSM accepts incoming IP connections from all hosts. In th[...]

  • Page 49

    5-30 Configuration The IP Security Function employs a T CP Wrapper program which allows the use of standard, Linux operators, wild cards and net/mask pairs to create a host based access control list. As shown in Figures 5.13 and 5.14, the IP Security configuration menus include "hosts.allow" and "hosts.deny" client lists. Basica[...]

  • Page 50

    5-31 Configuration 1. Access the IP Security Configuration Menu. a) T ext Interface: T ype /N [Enter] to display the Network Configuration Menu. From the Network Configuration Menu, type 5 [Enter] to display the screen shown in Figure 5.13. b) Web Browser Interface: Click on "Network Configuration" on the left hand side of the screen. Whe[...]

  • Page 51

    5-32 Configuration 5.8.3.2. Linux Operators and Wild Cards In addition to merely entering a specific IP address or partial IP address in the Allow or Deny list, you may also use any standard Linux operator or wild card. In most cases, the only operator used is "EXCEPT" and the only wild card used is "ALL," but more experienced L[...]

  • Page 52

    5-33 Configuration 5.8.3.3. IP Security Examples 1. Mostly Closed: Access is denied by default and the only clients allowed, are those explicitly listed in the Allow list. T o deny access to all clients except 192.255.255.192 and 168.112.112.05, the Allow and Deny lists would be defined as follows: • Allow List: 1. 192.255.255.192 2. 168.112.112.[...]

  • Page 53

    5-34 Configuration 5.8.4. Static Route The Static Route menu allows you to type in Linux routing commands that will be automatically executed each time that the unit powers up or reboots. In the T ext Interface, the Static Route menu is accessed via item 6 in the Network Configuration menu. In the Web Browser Interface, the Static Route menu is acc[...]

  • Page 54

    5-35 Configuration 5.8.5. Domain Name Server The Domain Name Server menu is used to select IP addresses for the Domain Name Servers. When web and network addresses are entered, the Domain Name Server interprets the domain name (e.g., www .wti.com), and translates it into an IP address. Note that if you don't define at least one DNS server , th[...]

  • Page 55

    5-36 Configuration 5.8.6. SNMP Parameters These menus are used to select parameters that will be used when an SNMP trap is generated. T o define or change SNMP parameters, proceed as follows: • T ext Interface: T ype /N and press [Enter] to display the Network Parameters Menu (Figure 5.9.) At the Network P arameters Menu, type 25 and press [Enter[...]

  • Page 56

    5-37 Configuration In the T ext Interface SNMP parameters are defined via two separate menus, The SNMP Access Menu and the SNMP T rap Menu. In the Web Browser Interface, all SNMP parameters are defined via a single menu. Both the T ext Interface and Web Browser Interface allow the following parameters to be defined: • Enable: Enables/disables SNM[...]

  • Page 57

    5-38 Configuration 5.8.7. LDAP Parameters The RSM supports LADP (Lightweight Directory Access Protocol,) which allows authentication via the "Active Directory" network Directory Service. When LDAP is enabled and properly configured, command access rights can be granted to new users without the need to define individual new accounts at eac[...]

  • Page 58

    5-39 Configuration In order to apply the LDAP feature, you must first define User Names and associated P asswords and group membership via your LDAP server , and then access the RSM command mode to enable and configure the LDAP settings and define port access rights and command access rights for each group that you have specified at the LDAP server[...]

  • Page 59

    5-40 Configuration • User Search Base DN: Sets the directory location for user searches. (Default = undefined.) • User Search Filter: Selects the attribute that lists the user name. Note that this attribute should always end with " =%S " (no quotes.) (Default = undefined.) • Group Membership Attribute: Selects the attribute that lis[...]

  • Page 60

    5-41 Configuration The Add LDAP Group menus allow the following parameters to be defined: • LDAP Group: Note that this name must match the LDAP Group names that you have assigned to users at your LDAP server . (Default = undefined.) • Access Level: Sets the command mode and port access level. When this feature is "On", members of this[...]

  • Page 61

    5-42 Configuration 5.8.7.2 Viewing LDAP Groups If you want to examine an existing LDAP group definition on an RSM unit, the "View LDAP Groups" function can be used to review the group's Access Level and P ort Access Settings. T o view an existing LDAP group, proceed as follows: • T ext Interface: T ype /N and press [Enter] to displ[...]

  • Page 62

    5-43 Configuration 5.8.7.3. Modifying LDAP Groups If you want to modify an existing LDAP Group in order to change command access rights or port access rights, the "Modify LDAP Group" function can be used to edit group parameters. T o Modify an existing LDAP Group, proceed as follows: • T ext Interface: T ype /N and press [Enter] to disp[...]

  • Page 63

    5-44 Configuration Figure 5.31: Delete LDAP Group Menu (Web Browser Interface) 5.8.7.4. Deleting LDAP Groups The Delete LDAP Group function is used to delete LDAP Groups that are no longer in use. T o delete an existing LDAP Group, proceed as follows: • T ext Interface: T ype /N and press [Enter] to display the Network Parameters Menu (Figure 5.9[...]

  • Page 64

    5-45 Configuration 5.8.7.5. LDAP K erberos Set Up Kerberos is a network authentication protocol, which provides a secure means of identity verification for users who are communicating via an insecure network. LDAP KERBEROS SETUP 1. Port : 88 2. Realm : KDC (KDC1 - KDC5) 3. 4. 5. 6. 7. Domain Realm (Domain Realm1 - Domain Realm5) 8. 9. 10. 11. 12. E[...]

  • Page 65

    5-46 Configuration T o access the LDAP Kerberos Set Up menu, access the command mode using a port and password that permit access to Supervisor Level commands and then proceed as follows: • T ext Interface: T ype /N and press [Enter] to display the Network Parameters Menu (Figure 5.9.) At the Network P arameters Menu, type 27 and press [Enter] to[...]

  • Page 66

    5-47 Configuration 5.8.8. T ACACS Parameters T o access the TACACS Configuration Menus, proceed as follows: • T ext Interface: T ype /N and press [Enter] to access the Network Configuration Menu. From the Network Configuration Menu, type 28 and press [Enter] to display the T ACAC S Configuration Menu (Figure 5.34.) • W eb Browser Interface: Cli[...]

  • Page 67

    5-48 Configuration • Secret W ord: Defines the shared T ACAC S Secret Word for both T ACAC S servers. (Default = undefined.) • Fallback T imer: Determines how long the RSM will continue to attempt to contact the primary T ACAC S Server before falling back to the secondary T ACACS Server . (Default = 3 Seconds.) • Fallback Local: Determines wh[...]

  • Page 68

    5-49 Configuration 5.8.9. RADIUS Parameters T o access the RADIUS Configuration Menus, proceed as follows: • T ext Interface: T ype /N and press [Enter] to access the Network Configuration Menu. From the Network Configuration Menu, type 29 and press [Enter] to display the RADIUS Configuration Menu (Figure 5.36.) • W eb Browser Interface: Click [...]

  • Page 69

    5-50 Configuration • Secondary Address: Defines the IP address or domain name (up to 64 characters long) for your secondary , fallback RADIUS server (if present.) (Default = undefined.) • Secondary Secret W ord: Defines the RADIUS Secret Word for the secondary RADIUS server . (Default = undefined.) • Fallback T imer: Determines how long the R[...]

  • Page 70

    5-51 Configuration 5.9. Copying Parameters to Several RS-232 Ports (T ext Interface Only) When the /CP command (Copy Port P arameters) is invoked, the unit will display a menu which allows you to select parameters, and copy them to all or several RS-232 ports. The Copy Port P arameters menu can set all parameters for the specified port(s), or defin[...]

  • Page 71

    5-52 Configuration 2. Invoke the /CP command at the command prompt; the menu shown in Figure 5.38 will be displayed. The following options are available: a) Copy to All Ports: T ype /CP [Enter] . b) Copy to a Range of Ports: T ype /CP m-n [Enter] . Where m and n are port numbers that specify the desired range. For example, to copy parameters to por[...]

  • Page 72

    6-1 6. The Status Screens The Status Screens display connection status and communication parameters for the RS232 ports and the Network Port. There are four different status screens; The P ort Status Screen (/S), the Port Diagnostics Screen (/SD), the Network Status Screen (/SN), and the Port P arameters Screens (/W). Note: The status screens discu[...]

  • Page 73

    6-2 The Status Screens 6.1. The Port Status Screen (/S) The Port Status Screen lists the general status of the RSM’s sixteen RS-232 ports. T o display the Port Status Screen, access the T ext Interface command mode and type /S [Enter] , the screen will appear as shown in Figure 6.1. Note that the screen format will vary , depending upon whether t[...]

  • Page 74

    6-3 The Status Screens 6.2. The Port Diagnostics Screen (/SD) The Port Diagnostics Screen provides more detailed information about each port. T o display the Port Diagnostics Screen, access the T ext Interface command mode and type /SD [Enter] , the screen will appear as shown in Figure 6.2. Note that the screen format will vary , depending upon wh[...]

  • Page 75

    6-4 The Status Screens 6.3. The Network Status Screen (/SN) This screen lists current conditions for the Network Port. T o display the Network Status Screen, type /SN and press [Enter] . The Network Status Screen is only available when you have logged in using an account and port that permit Supervisor commands. Note that the RSM will allow up to s[...]

  • Page 76

    6-5 The Status Screens 6.4. The Port P arameters Screens (/W) The /W (Who) command displays more detailed information about an individual RSM port. Rather than listing general connection information for all ports, the Port P arameters screen lists all defined parameters for a specific port. The Port P arameters Screens are available to accounts tha[...]

  • Page 77

    6-6 The Status Screens The /W command uses the following format: /W xx [Enter] Where xx is the desired port number . If the /W command is invoked at a serial port, by a user with access to Supervisor Level commands, then the letter " N " can be entered as the command argument to display parameters for the Network Port. Note: When command [...]

  • Page 78

    7-1 7. Operation This section discusses the procedures for connecting and disconnecting ports, and describes the various port modes. Note: The Web Browser Interface cannot be used to connect or disconnect ports. In order to connect or disconnect ports, you must access command mode via the T ext Interface. 7.1. Any-to-Any Mode Any-to-Any Mode P orts[...]

  • Page 79

    7-2 Operation T o Connect ports, proceed as follows: 1. Access command mode via the T ext Interface. 2. Invoke the /C command to connect the desired ports. a) Resident Connect: T o connect your resident port to another port, type /C xx [Enter] . Where xx is the number or name of the port you want to connect. The RSM will display the numbers of the [...]

  • Page 80

    7-3 Operation 7.1.1.2. Disconnecting P orts There are three different methods for disconnecting ports, the Resident Disconnect, the Third P arty Disconnect, and the No Activity Timeout. Providing the T imeout feature is enabled, a No Activity Timeout will disconnect resident ports or third party ports. Note: The "DTR Output" option in the[...]

  • Page 81

    7-4 Operation c) The /D command can specify both connected ports, or either of the two ports. For example, if P ort 1 is your resident port, any of the following commands can be used to disconnect Port 3 from P ort 4: /D 3 4 [Enter] or /D 3 [Enter] or /D 4 [Enter] d) The /D command can also disconnect a remote user from the Network Port. This is us[...]

  • Page 82

    7-5 Operation 7.1.2. Defining Hunt Groups A Hunt Group creates a situation where the RSM will scan a group of similarly named ports and connect to the first available port in the group. Hunt Groups are created by assigning identical or similar names to two or more ports. Hunt Groups can be defined using Any-to-Any , Passive, Buffer , or Modem Mode [...]

  • Page 83

    7-6 Operation 7.2. Passive Mode P assive Mode Ports function the same as Any -to-Any Mode Ports, but do not allow access to command mode. A P assive Mode Port can communicate with other ports, but cannot enter command mode, and therefore cannot redefine parameters, display status, or connect or disconnect ports. The P assive Mode is the default at [...]

  • Page 84

    7-7 Operation 7.3. Buffer Mode The Buffer Mode allows collection of data from various devices without the requirement that all devices use the same communication parameters (e.g. baud rate, parity , etc.). In addition, Buffer Mode ports can also be configured to support the SYSL OG and SNMP T rap functions, as described in Sections 9 and 10. Notes:[...]

  • Page 85

    7-8 Operation T o clear data from any port buffer (with or without reading it first), access command mode via the text interface, using an account and port that permit Supervisor commands, then issue the /E (Erase Buffer) command using the following format: /E xx [Enter] Where xx is the number of the port buffer to be cleared. Note: The /E command [...]

  • Page 86

    7-9 Operation 7.4. Modem Mode The Modem Mode provides features specifically related to modem communication. A Modem Mode Port can perform all functions normally available in Any -to-Any Mode. The Modem Mode is available to all RSM ports except the Network Port, and is the default port mode at the Internal Modem port. When Modem Mode is selected, th[...]

  • Page 87

    8-1 8. T elnet & SSH F unctions 8.1. Network Port Numbers Whenever an inbound T elnet or S SH session connects to an RSM RS232 Port, the P ort Status Screen and Port Diagnostics Screen will indicate that the RS232 port is presently connected to Port " Nn " (where " N " indicates a network connection, and " n " is a[...]

  • Page 88

    8-2 T elnet & SSH Functions 8.3. The Direct Connect F eature The Direct Connect feature allows you to initiate a T elnet, S SH or Raw Socket session with the RSM and make an immediate connection to a specific RS232 Port of your choice, without first being presented with the command interface. This allows you to connect to a TCP port that is map[...]

  • Page 89

    8-3 T elnet & SSH Functions 3. Direct Connect ON - P ASSWORD: The Direct Connect feature is enabled at this port, but a password must be entered before a Direct Connection is established. a) Upon login, the RSM will prompt for a username and password. If a valid username/password is entered, the RSM will return a message which confirms the conn[...]

  • Page 90

    8-4 T elnet & SSH Functions 8.3.3. Connecting to an RS232 Port using Direct Connect Direct Connect TCP port numbers are as follows: 1. Standard T elnet Direct Connection (with Password): a) RSM-8: • Serial Ports: T CP port numbers 2101 through 2108. • Internal Modem Port: T CP port number 2109. b) RSM-16 & RSM-16DC : • Serial Ports: T[...]

  • Page 91

    8-5 T elnet & SSH Functions 4. Raw Socket Direct Connection (with P assword): a) RSM-8: • Serial Ports: T CP port numbers 3101 through 3108. • Internal Modem Port: T CP port number 3109. b) RSM-16 & RSM-16DC : • Serial Ports: T CP port numbers 3101 through 3116. • Internal Modem Port: T CP port number 3117. c) RSM-32 & RSM-32DC [...]

  • Page 92

    8-6 T elnet & SSH Functions 8.3.4. T erminating a Direct Connect Session T o terminate a Direct Connect session, use the client program’s "disconnect" feature. The following will occur immediately upon a client initiated disconnect: 1. The Network port is disconnected from the RS232 Port. 2. The Network session is terminated. 3. The[...]

  • Page 93

    9-1 9. The Syslog F eature The Syslog feature can create time-stamped log records of each buffer event. As these event records are created, they are sent to a Syslog Daemon, located at an IP address defined via the Network P arameters menu. Note: • The Syslog Function is only available to Buffer Mode ports. • This option is not available to RS2[...]

  • Page 94

    9-2 The Syslog Feature 4. Network P arameters Menu: Access the Network P arameters Menu as described in Section 5.8, then set the following parameters: a) Syslog IP Address: Determine the IP address for the device that will run the Syslog Daemon, then use the Network Port Configuration menu to define the IP Address for the Syslog Daemon. b) Syslog [...]

  • Page 95

    9-3 The Syslog Feature 9.3. T esting Syslog Configuration After you have configured the RSM as described in Section 9.1, the /TEST command can be used to make certain that the function is properly set up. T o test the Syslog function, access the RSM command mode via the text interface, then type /TEST and press [Enter] to display the T est Menu sho[...]

  • Page 96

    10-1 10. SNMP T raps SNMP is an acronym for "Simple Network Management Protocol". The SNMP T rap function allows Buffer Mode Ports to send a message to two different SNMP Managers, indicating the amount of data currently stored in buffer memory . Note: • The SNMP T rap function is only available to Buffer Mode Ports. • This option is [...]

  • Page 97

    10-2 SNMP T raps 3. Network P arameters Menu: Access the Network P arameters Menu as described in Section 5.8. Set the following: a) Enable: SNMP Access must be enabled in order for SNMP traps to function. b) SNMP Contact: (Optional.) c) SNMP Location: (Optional.) d) SNMP Community: Consult your network administrator , and then use the Network P ar[...]

  • Page 98

    10-3 SNMP T raps 10.4. T esting the SNMP T rap Function After you have finished setting up the SNMP T rap function, it is recommended to test the configuration to ensure that it is working correctly . T o test configuration of the SNMP T rap function, proceed as follows: 1. Configure the SNMP T rap function as described in Section 10.1. 2. Access t[...]

  • Page 99

    11-1 11. Saving and Restoring Configuration P arameters Once the RSM is properly configured, parameters can be downloaded and saved as an ASCII text file. Later , if the configuration is accidentally altered, the saved parameters can be uploaded to automatically reconfigure the unit without the need to manually assign each parameter . Saved paramet[...]

  • Page 100

    11-2 Saving and Restoring Configuration Parameters 11.2. Restoring Saved P arameters This section describes the procedure for using your terminal emulation program to send saved parameters to the RSM. 1. Start your terminal emulation program and access the RSM’s T ext Interface command mode using an account and port that permit Supervisor command[...]

  • Page 101

    12-1 12. Upgrading RSM Firmware When new , improved versions of the RSM firmware become available, the "Upgrade Firmware" function can be used to update the unit. Updates can be uploaded via FTP or SFTP protocols. Notes: • The FTP/SFTP servers can only be started via the T ext Interface. • All other ports will remain active during the[...]

  • Page 102

    12-2 Upgrading SCM Firmware 5. Open your FTP/SF TP application and login to the RSM unit, using a username and password that permit access to Supervisor Level commands. 6. T ransfer the binary format upgrade file to the RSM. 7. After the file transfer is complete, the RSM will install the upgrade file and then reboot itself and break all port conne[...]

  • Page 103

    13-1 13. Command Reference Guide 13.1. Command Conventions Most commands described in this section conform to the following conventions: • T ext Interface: Commands discussed in this section, can only be invoked via the T ext Interface. These commands cannot be invoked via the Web Browser Interface. • Slash Character: Most RSM commands begin wi[...]

  • Page 104

    13-2 Command Reference Guide 13.2. Command Summary Function Command Syntax Command Availability Supervisor Non-Super . Resident Disconnect  ^X X X Display Audit Log /A [search text] [Enter] X Connect /C <x> [x] [Enter] X X  Copy RS232 Port P arameters /CP [Enter] /CP [x,y,z] [Enter] /CP [x-z] [Enter] X Third Party Disconnect  /D[/Y] [...]

  • Page 105

    13-3 Command Reference Guide 13.3. Command Set This Section provides information on all T ext Interface commands, sorted alphabetically by command. ^X R esident Disconnect Sequence The Resident Disconnect Sequence is used to disconnect your resident port from another port as described in Section 5.7. Although the default Resident Disconnect Sequenc[...]

  • Page 106

    13-4 Command Reference Guide /C Connect Establishes a bidirectional connection between two ports. For more information, see Section 7.1. There are two types of connections: • Resident Connect: If the /C command specifies only one port, your resident port will be connected to the specified port. • Third P arty Connect: If the /C command specifie[...]

  • Page 107

    13-5 Command Reference Guide /D Third Party Disconnect Invoke the /D command at your resident port to disconnect two other ports. Note that the /D command cannot disconnect your resident port. Availability: Supervisor Only Format: /D[/Y] <x> [x] [Enter] Where: /Y (Optional) suppresses the "Sure?" prompt. x Is the number or name of t[...]

  • Page 108

    13-6 Command Reference Guide /F Set System Parameters Displays a menu which is used to define the Site ID message, create user accounts, set the system clock, and configure and enable the Invalid Access Lockout feature. Note that all functions provided by the /F command are also available via the Web Browser Interface in the "System P arameter[...]

  • Page 109

    13-7 Command Reference Guide /K Send SSH Key Instructs the RSM to provide you with a public SSH key for validation purposes. This public key can then be provided to your SSH client, in order to prevent the S SH client from warning you that the user is not recognized when you attempt to create an SSH connection. For more information, please refer to[...]

  • Page 110

    13-8 Command Reference Guide /PW Change Password When enabled, the /PW command can be invoked by a user/account in order to change their own password. Note that the /PW command can be enabled/disabled via the System P arameters command as described in Section 5.4, and that once a given password has been changed, accounts with Supervisor Level acces[...]

  • Page 111

    13-9 Command Reference Guide /TEST T est Network P arameters Displays a menu which is used to test configuration of the Syslog and SNMP T rap functions and can also be used to invoke a Ping Command. For more information, please refer to Section 9.3 and 10.4. Notes: • In order for the ping command to function with domain names, Domain Name Server [...]

  • Page 112

    13-10 Command Reference Guide /W Display P ort Parameters (Who) Displays configuration information for an individual port, but does not allow the user to change parameters. Accounts that do not permit Supervisor commands can only display parameters for their resident port. For more information, please refer to Section 6.4. Availability: Supervisor [...]

  • Page 113

    Apx-1 Figure A.1: RS232 Port Interface Appendix A . RS232 Port Interface DCD and DTR hardware lines function as follows: 1. When connected: a) If either port is set for Modem Mode, the DTR output at either port reflects the DCD input at the other end. b) If neither port is set for Modem Mode, DTR output is held high (active). 2. When not connected:[...]

  • Page 114

    Apx-2 Appendix B. Specifications Network Interface: 10/100Base- T Ethernet, RJ45, multi-session T elnet. RS232 Port Interface: Connectors: • Model RSM-8: Eight (8) DB9 connectors (DTE pinout.) • Models RSM-16 & RSM-16DC: Sixteen (16) DB9 connectors (DTE pinout.) • Models RSM-32 & RSM-32DC: Thirty T wo (32) DB9 connectors (DTE pinout.)[...]

  • Page 115

    Apx-3 Appendix C. Customer Service Customer Service hours are from 8:00 AM to 5:00 PM, PST , Monday through F riday . When calling, please be prepared to give the name and make of the unit, its serial number and a description of its symptoms. If the unit should need to be returned for factory repair it must be accompanied by a Return Authorization [...]

  • Page 116

    Apx-4 Appendices T rademark and Copyright Information WTI and Western T elematic are trademarks of W estern T elematic Inc.. All other product names mentioned in this publication are trademarks or registered trademarks of their respective companies. Information and descriptions contained herein are the property of Western T elematic Inc.. Such info[...]

  • Page 117

    Index-1 Inde x A Accept Break Network Port 5-28 Serial Port 5-20 Access Level 5-41 Accounting Port 5-50 Activity LEDs 2-1 AC Powered Units 4-1 Add User 5-15 Allow List 5-31 Any-to-Any Mode 5-17, 7-1 to 7-6 Audit Log 5-6, 5-9, 13-3 Authentication Port RADIUS 5-50 T ACAC S 5-48 B Back Panel 2-2 Baud Rate Serial Port 5-19 Bind T ype 5-39 Bits Serial P[...]

  • Page 118

    Index-2 Index G Gateway Address 5-26 General Parameters 5-5 to 5-7 Group Membership Attribute 5-40 Group Membership V alue T ype 5-40 H Handshake Mode Serial Port 5-19 Hang-Up String 5-21 Hardware Installation 4-1 to 4-2 Help Menu 13-6 Hunt Groups 7-5 to 7-6 I Inactivity Timeout 7-4 Network Port 5-28 Serial Port 5-20 Initialization 2-1 Initializati[...]

  • Page 119

    Index-3 Index P Parity Serial Port 5-19 Passive Mode 5-17, 7-6 Password 5-12 to 5-17, 5-15, 13-8 Password on Dialback 5-10 Periodic Reset V alue 5-21 Phone Line Port 2-2 Ping Access 5-26 Ping Command 5-26, 9-3, 13-9 Port Access 5-12, 5-15 LDAP Groups 5-41 Port Buffers 7-8 Port Configuration 5-17 to 5-40 Port Diagnostics Screen 6-3 to 6-4, 13-8 Port[...]

  • Page 120

    Index-4 Index Syslog 5-9, 5-22, 9-1 to 9-3 Configuration 9-1 to 9-2 Facility 5-23 Level 5-23 Message Criteria 9-2 Syslog IP Address 5-26 T esting Configuration 9-3 System P arameters 5-5 to 5-7, 13-6 T T ACAC S Parameters 5-47 T echnical Support Apx - 3 T elnet Access 5-26 T elnet F unctions 8-1 to 8-4 T elnet P ort 5-22 T erminal Block Assembly 4-[...]