AlterPath Console Server User Manual A reference guide for users and systems administrators of Cyclades AlterPath Console Server - Web Management Service. Product Version 2.3.0 Document Revision 1.6 This document contains proprietary information of Cyclades and is not to be disclosed or used except in accordance with applicable contracts or agreements.
We believe the information in this manual is accurate and reliable. However, we assume no responsibility, financial or otherwise, for any consequences of the use of this product or manual. This manual is published by Cyclades Corporation, which reserves the right to make improvements or changes in the products described in this manual as well as to revise this publication at any time and without notice to any person of such revision or change. The operating system covered in this manual is v2.3.0.
Table of Contents Before You Begin Audience. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Document Organization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Typographical Conventions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Naming Conventions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Document Symbols. . . . . .
Chapter 4 - Configuring the Web Interface 27 Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27 Logging In . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ACS Web Interface: GUI Elements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Wizard Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Expert Mode . . . . . . . . . . . . . . . . . .
Administration > System Information . . . . . . . . . . . . . . . . . . . . . . . Administration > Notification . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Administration > Time / Date . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Administration > Boot Configuration . . . . . . . . . . . . . . . . . . . . . . . Administration > Backup Configuration . . . . . . . . . . . . . . . . . . . . . Administration > Upgrade Firmware . . . . . . . . . . . . . . . . . . . . . . . .
AlterPath Console Server User Manual iv
Before You Begin Before You Begin WELCOME to the AlterPath Console Server User Guide! This manual is designed to guide you in installing and configuring the AlterPath Console Server through the ACS web user interface, as well as other necessary information to guide you in your day-to-day operations of the ACS.
Before You Begin 4: Configuring the Web Interface Presents the procedures for configuring the ACS, using the web interface. All the procedures follows the menu structure of the entire web interface in Wizard Mode and Expert Mode. Appendix A Summarizes the Hardware Specifications of the AlterPath Console Server, and lists the PCMCIA cards that the ACS supports. Appendix B Outlines the Safety Considerations for installing and handling the ACS.
Before You Begin Untitled Data Fields Some data entry fields of the GUI windows or forms do not have titles. When this field is described in any field definition section of the manual, the field is indicated as untitled, enclosed in angled brackets. Example: [untitled] Type in the port number in this field. Untitled forms While most forms are identified by it’s menu selection, some forms do not bear the title. The manual uses initial capitals to refer to their names or titles.
Before You Begin Form names The name or title of a form may not necessarily appear on the actual form. When this is the case, the form is named after its menu selection or form function. Select To select is the same as to click your mouse. Document Symbols This manual uses graphical symbols that are associated with specific types of note or information to indicate the following: Reference to another page or document.
Chapter 1 Introduction Chapter 1 - Introduction The AlterPath Console Server (ACS) comes from Cyclades’ line of Console Access and Terminal Servers designed to allow local and dial-in access for inband and out-of-band network management. Modeled after the Cyclades-TS line of console server, the ACS adds the following advanced features: • PCMCIA slots that support standard interface cards (Ethernet, Modem, and wireless LAN). • Optional dual entry redundant power supply (AC/DC) for extra reliability.
1: Introduction • Telnet/SSH over a network You can configure ACS by using any of the following user interfaces: • Web Browser • VI Editor • Wizard • Command Line Interface (CLI) With the ACS set up as a Console Access Server, you can access a server connected to the ACS through the server’s serial console port from a workstation on the LAN or WAN.
1: Introduction The figure below shows AlterPath ACS1 through ACS48.
1: Introduction ACS Setup Diagram The diagram below shows a typical setup of the AlterPath Console Server.
Chapter 2 Installing the ACS Chapter 2 - Installing the ACS This chapter presents the procedures for installing and setting up the ACS, and is organized as follows: • Package Contents • Rack Installation • Installation and Configuration Process For configuration procedures using vi or CLI, refer to the ACS Reference Guide.
2: Installing the ACS Package Contents: ACS4 through ACS48 Typically, the product package for ACS4 through ACS48 contains the following: • ACS Box • Power Cable(s) • ADB0017 - DB25F Console Adapter • ADB0025 - DB25M Console Adapter • ADB0036 - DB9F Console Adapter • ADB0039 - Sun/Netra Adapter • CAB0018 - RJ45 CAT-5 Cable • CAB0025 - DB25M Straight-Through Cable • CON0071 - DB25F Loopback Connector • Rack-Mounting Kit • ACS User Manual and ACS QuickStart Guide • ACS Reference Manual CD 10 AlterPath Conso
2: Installing the ACS Package Contents: ACS1 The ACS1 Package contains the following: • • • • • • • • • • ACS1 Box Power Cable Power Supply +5V / 2.
2: Installing the ACS Although the ACS unit in the figures are shown with a dual power supply (A/C or -48VDC), some models may have a single power supply. The single power units will have just one power cable. (ACS48 supports -48VDC.) Rack Mounting the ACS To rack-mount and connect the ACS to your network, perform the following steps: 1. Install the brackets onto the front corners of the box using a screw driver and the screws and bolts provided with the mounting kit. brackets 2.
2: Installing the ACS System Requirements To configure the ACS, Cyclades recommends any of the following hardware specifications: • • • Workstation with a console serial port or, Workstation with Ethernet and TCP/IP topology or, Cyclades AlterPath Manager. The hardware connectivity required for each configuration method: Hardware Connectivity Workstation, Hub Ethernet Cables. Configuration Method Web browser, vi, Wizard, or CLI Console, Console Cable (constructed from RJ45 vi, Wizard, or CLI.
2: Installing the ACS Pre-Install Checklist Before you install and configure the ACS, ensure that you have the following: Root Access You will need Root Access on your local UNIX machine in order to use the serial port. HyperTerminal, Kermit, or Minicom If you are using a PC, ensure that HyperTerminal is set up on your Windows operating system. If you have a UNIX operating system, you will be using Kermit or Minicom.
2: Installing the ACS Installation and Configuration Process The installation and configuration process is divided into six distinct tasks: • • • • • • Task 1: Install ACS and connect to the network. Task 2: Configure the network settings (using the console port). Task 3: Configure ACS by using the web in Wizard Mode. Task 4: Test Configuration. Task 5: Customize configuration by using the web in Expert Mode. Task 6: Save Changes. You can configure ACS using the command line interface alone.
2: Installing the ACS The modem cable is not necessary for a standard installation and configuration. Use it when the configuration is complete and you want to access the box remotely through a serial port. 3. Connect to the Network. Connect the ACS network port to the Ethernet hub switch. Task 2: Configure network settings This step is necessary to make ACS visible on the network.
2: Installing the ACS 4. Power on the ACS. Click OK on the Properties window. You will see the ACS booting on your screen. After it finishes booting, you will see a login prompt. 5. Connect COM Port to the ACS Console. Login as root, and enter the default password, tslinux. 6. Type in: wiz As shown in the sample screen below, the system brings up the configuration wizard banner and begins running the wizard. Follow the system prompts to either accept the default values or enter them manually.
2: Installing the ACS After the initial configuration, you can configure the network further by using any of the following methods: • • • Web Interface Command Line Interface via SSH AlterPath Manager, if installed in your network To use the ACS web management interface, ask your System Administrator for the IP address. By default, ACS uses the IP address provided by the DHCP server. If your network doesn’t have DHCP, then ACS will default to 192.168.160.10.
Chapter 3 Using the Web Interface Chapter 3 - Using the This Web Interface chapter presents the methods for accessing serial ports and the basic operations for using ACS. Addressed to the ACS end user, the chapter is divided into the following topics: • • • • • Using the Web Interface Using the Command Line Interface Using Telnet Using the TS Menu Power Management Using the Web Interface Refer to Appendix B for a description of the web requirements for connecting to a serial port.
3: Using the Web Interface The system brings up the ACS Web Application Login Window: 3. To log in, type in your username and password as provided to you by your system administrator. 4. From the top menu bar, select Applications; from the left menu panel, select Connect.
3: Using the Web Interface 5. To connect to a port (by default, the radio button is already selected for connecting to a port), select from the drop down menu the port to which you wish to connect, and then click on Connect. - OR To connect to the ACS box, select the radio button for Connect to ACS Box, and then click on Connect. Depending on your selection, the system either opens a Java connection to the port selected, or launches an SSHv2 connection to the ACS box.
3: Using the Web Interface To send a break to the terminal, click on the SndBreak button. The upper right hand corner of the browser (Java window) shows two icons: Refresh and Disconnect. Select the left icon to refresh or reconnect to the server; select the right icon to end the session or disconnect from the Java window.
3: Using the Web Interface To open a ssh session to a serial port or the next free serial port from a pool, issue the command: ssh -l : Where: is the user configured to access that serial port. It is present either in the local CAS database or in a Radius/Tacacs/LDAP/Kerberos, etc database. can be just the TCP port number assigned for that serial port (7001, 7002, etc), (3000, etc), the alias for the server connected to that serial port.
3: Using the Web Interface Closing the session from ts_menu (from the console of your unit) 1. Enter the escape character. The escape character is shown when you first connect to the port. In character/text Mode, the Escape character is ^] (caret and bracket, for telnet) or ~. (tilde and period, for SSH). After entering the escape character, the following menu is shown: Console escape. Commands are: l c z b t e go to line mode go to character mode suspend telnet send break toggle binary exit telnet 2.
3: Using the Web Interface Power Management The Power Management forms (Application > Power Management > Outlets Manager or View IPDUs Info) allows you to manage the power outlets on the Cyclades AlterPath PM family of Intelligent Power Distribution Units (IPDUs) or view information about the IPDUs connected to the ACS. The Outlets Manager form is used to power remote machines on and off, check the status and lock the power outlet in the on or off state to prevent accidental changes.
3: Using the Web Interface Security The Security form allows you to change your password. 1. From the menu panel, select Security. The system brings up the Security form. 2. From the Security form enter your current password and new password (twice). 3. Select OK when done. 4. Log out and log in using your new password to verify your password change.
Chapter 4 Configuring the Web Interface Chapter 4 - Configuring the Web chapter Interface This presents the procedures for configuring ACS using the web interface.
4: Configuring the Web Interface Logging In 1. Connect your internet browser to the Console Server by typing in the Console Access Server’s IP address (e.g., http://10.0.0.0) in the browser’s address (URL) field. To determine the IP address of the ACS, switch on the ACS connected to the Ethernet where there is a DHCP server. When you inquire, based on the MAC address (the 12-digit hexadecimal number located at the bottom of the ACS unit), the server will provide the appropriate IP address.
4: Configuring the Web Interface If another administrator is using the system, the following message appears: 3. Click on the appropriate radio button and then click on the Apply button. IMPORTANT: Take note of this login procedure. All subsequent online procedures in this chapter assume that you are already logged in.
4: Configuring the Web Interface ACS Web Interface: GUI Elements The ACS web interface operates on two modes: • Wizard • Expert Wizard Mode The wizard is designed to simplify configuration by providing users the default parameter values. The system will prompt you for the necessary fields, give instructions during the process and, in some cases, populate the fields automatically.
4: Configuring the Web Interface Shown above is a typical page of the ACS web interface in Wizard Mode. The user entry panel or form varies depending on the selected menu item. The ACS uses forms and dialog boxes (i.e., pop-up windows that prompt you for an answer or command) for data entry. Expert Mode Designed for advanced users, this is the default mode when you log in the ACS.
4: Configuring the Web Interface Occasionally, an Expert Mode menu selection will comprise multiple forms (such as the one shown above). These forms are identified by their tabs. Select the tab to access the desired form. Button Functions The control buttons located on the bottom of the ACS Web Configuration window provide you the following functions for operating the interface.
4: Configuring the Web Interface Unless you do not need to save your configuration, be sure to select the Apply Changes button to ensure that your changes are saved to Flash.
4: Configuring the Web Interface Configuring in Wizard Mode As shown in the menu, the Wizard Mode configuration is composed of five steps: Step 1: Network Settings Step 2: Port Profile Step 3: Access Step 4: Data Buffering Step 5: System Log Step 1: Network Settings To configure the network settings for the ACS, follow the following steps: 1. From the main menu of the web interface, select Step 1: Network Settings. The system brings up the DHCP page (shown below).
4: Configuring the Web Interface 2. If you are using DHCP, proceed to Step 2: Port Profile; if not, click on the checkbox to deselect DHCP and enter your network settings manually. The Network Settings entry fields should appear as follows: 3. Type in the network information in the corresponding entry fields, and then select Apply Changes. If the meaning of a field is unclear, select the Help button for a definition of the field. 4. Select the Next button OR proceed to Step 2: Port Profile section.
4: Configuring the Web Interface Step 2: Port Profile The Port Profile configures your Console Access Profile (CAS), defining the protocol and type of command line interface you will use to access the ACS. The Port Profile controls the speed, data size, parity, and stop bits of all ports. It sets the flow control to hardware, software, or none; and sets the DCD signal and tty after the system establishes a socket connection to that serial port.
4: Configuring the Web Interface Field Name Definition Connection Protocol The method you will use to access the serial ports. Cyclades recommend SSH to ensure that all data and authentication information are encrypted. Other options are Telnet and Raw Data (for un-negotiated plain socket connections). Flow Control The method of flow control used by the attached devices (Hardware, Software, or None).
4: Configuring the Web Interface Step 3: Access The Wizard configuration of the Access form enables you to configure the general access rights of users and groups to the ACS or systems which ACS controls. To grant users access to specific ports, switch to the Expert Mode, then go to Security > Users and Groups. From this window, you can: • • • Change a User Password Add a user Delete a user 1. If you haven’t opened the Access Form, from the menu panel, select Step 3: Access.
4: Configuring the Web Interface Changing a User Password If you haven’t changed your root administration password, now is the time to change it using the Change User Password dialog box. 1. From the Users scrollable field box of the Access window, select the user whose password you want to change, and then select the Change Password button. The system brings up the Change User Password dialog box: 2. Type in the new password in the two entry fields of the dialog box, and then click on the OK button.
4: Configuring the Web Interface Adding a User 1. If you haven’t opened the Access form, select Step 3: Access from the menu panel. The system brings up the Access form. 2. From the Access form, select the Add button. The system brings up the Add User dialog box: 3. Enter the necessary User information into the following fields: Field Name 40 Definition User Name Name of the ACS user. Password Password to be used by the user to access ACS. Repeat Password Re-type the password.
4: Configuring the Web Interface Field Name Definition [dropdown list] Select whether the user of this group is a NonBio or a BioUser. The NonBio group, is the correct choice for regular users. The BioUser group should only be selected if authentication will be made through the Cyclades AlterPath Bio (biometric authentication). Shell Text string you wish to use as part of the shell prompt for the current user. Comments Comments about the current user.
4: Configuring the Web Interface Step 4: Data Buffering This step configures the data buffering file and mode for all ports that ACS controls. You can set data buffering to be done in local files or in remote files through NFS. When using remote files, the remote server’s disk/partition space imposes a limitation and the data is kept in linear (or sequential) files in the remote Server. When using local files, the size of the available RAMdisk also imposes a limitation.
4: Configuring the Web Interface 3. Complete the input fields as follows: Field Name Definition Destination Destination of the buffer files: Local (i.e., Ramdisk) or Remote. Mode If you selected Local destination, choose the file sort mode. Select Linear for sequential files, Circular for non-sequential files. File Size (Bytes) If you selected Local destination, the value for this field cannot be zero. Record the time stamp... Commands the system to include a time stamp in the buffer.
4: Configuring the Web Interface The system can filter messages based on their content and perform an action (e.g. to send an e-mail or pager message). To configure data buffering to send a notification alarm, you must use the Notifications form (Go to Expert Mode: Administration > Notifications). Step 5: System Log The System Log form allows you to configure one or more syslog servers to receive syslog messages that are generated by the ACS.
4: Configuring the Web Interface 3. To add a new syslog server, type in the IP address in the New Syslog Server field, and click Add. (Repeat step for as many syslog servers you need to add.) OR 4. To delete a syslog server, select the Syslog server to be deleted from the Syslog Servers scrollable list box, and then click Delete. 5. Click on the Apply Changes button at the bottom of the main panel.
4: Configuring the Web Interface Menu Selection Terminal Profile Menu Use this menu to: Create command menu for a terminal (i.e., CLI or VI). Most of the fields for each form are defined in the procedure. For a more detailed definition of these field names or terms, however, refer to the Glossary of this manual. Network Menu Selection Use this menu to: Host Settings Configure host connections, including: Ethernet Port connections, DNS Service, and Name Service Access.
4: Configuring the Web Interface Ports Menu Selection Use this menu to: Physical Ports Modify ports settings for individual or all ports. Physical Ports is composed of five configuration forms as identified by their tab names: General, Access, Data Buffering, Multi-User, Power Management and Other. Virtual Ports Add, edit or delete port slaves. Port Status Shows the current status of each port. The information provided here are: RS232 Signal Status and user connected to each port.
4: Configuring the Web Interface Applications > Connect The Connect form, which launches a Java browser, is used to: • • Connect to the ACS box. The connection type is always SSHv2. Connect to a console port based on what port you select from the drop down menu. The connection type depends on how your ACS is configured. 1. From the top menu bar, select Applications; from the left menu panel, select Connect. The system invokes the port selection form: 2.
4: Configuring the Web Interface Applications > Power Management ACS allows you to remotely manage all Intelligent Power Distribution Units (IPDUs) connected to the ACS. Power management configuration comprises five tabbed forms: Form Title Use this form to: Outlets Manager Switch on/off and lock/unlock outlets. View IPDUs Info View IPDU information by ports and slaves. The information form provides real-time, global, current monitoring of all connected devices.
4: Configuring the Web Interface Applications > Power management > Outlets Manager The Outlets Manager form allows you to check the status of all IPDUs connected to the Console Server, including their outlets. Any user who has Administration privileges can turn on, turn off, cycle, lock and unlock the outlets. 1. From the top menu bar, select Applications; from the left menu panel, select Power Management. The system invokes the following form: In the example above, the yellow bulbs (i.
4: Configuring the Web Interface In the sample form below, outlet 2 is switched off and locked. 3. To save your changes, click on the Save Outlets State button located in the form. 4. From the lower control buttons of the main window, click on the Apply Changes button. To Edit the Power Up Interval You can edit the power up interval of an outlet as follows: 1.
4: Configuring the Web Interface Applications > Power Management > View IPDUs Info The IPDU Info form allows you to view all IPDU information (e.g., number of outlets of each unit, current, temperature, alarm threshold levels, firmware, etc.) by serial port. The form stores historical values of the maximum current and the maximum temperature. To view IPDU information, perform the following steps: 1.
4: Configuring the Web Interface Applications > Power Management > Users Manager The Users Management form of Power Management allows you to assign users to selected outlets for each serial port, and vice versa. To add a user or edit an assigned user, perform the following steps: 1. From the top menu bar, select Applications; from the left menu panel, select Power Management; from the tabs, select Users Manager. The system brings up the Users Manager form: 2.
4: Configuring the Web Interface 3. From the Add/Edit User dialog box, modify or enter in the corresponding fields the user and the outlets to which the user is assigned, and then select the OK button. In the Outlets field, use the comma to separate each outlet; use the hyphen to indicate a range of outlets (e.g., 1, 3, 6, 9-12). Selecting Edit will not allow you to edit or delete the user, only the outlet assignments for that user. 4.
4: Configuring the Web Interface Applications > Power Management > Configuration To configure IPDUs to generate alarms or syslog files, perform the following steps: 1. From the top menu bar, select Applications; from the left menu panel, select Power Management; from the default Outlets Manager form select the Configuration tab. The system brings up the Configuration form: 2.
4: Configuring the Web Interface Applications > Power Management > Software Upgrade The Software Upgrade form of Power Management allows you to upgrade the Power Management software for a selected serial port. The first line of the form shows the latest software version available. The presence of an Upgrade button indicates that a new software version for that master or slave port is available. To upgrade the software for a selected port, perform the following steps: 1.
4: Configuring the Web Interface 5. Select the Apply Changes button at the bottom of the configuration window to save your configuration.
4: Configuring the Web Interface Applications > Terminal Profile Menu The Terminal Profile Menu form enables you to create a menu of commands for users to use whenever ACS is used as a terminal server with dumb terminals attached. The menu should appear when users turn on the dumb terminal and login to ACS. You can create any valid command recognized by the ACS operating system. The most common use of this feature is to launch an SSH session to a host system. 1.
4: Configuring the Web Interface The system invokes the following dialog box: 3. Type in the menu title and/or action to the corresponding entry fields and then select Apply. 4. Verify your entry or edits from the Menu Options list of the Terminal Profile Menu form. 5. To enter or edit another command, repeat steps 2 through 4. 6. Click on the Apply Changes button located at the bottom of the configuration window.
4: Configuring the Web Interface Network > Host Settings The Host Settings form allows you to configure the network settings for ACS. 1. Select Network from the top menu bar, and then select Host Settings from the left menu panel. The system brings up the Host Settings form. By default, the DHCP field is check marked. If you wish to disable DHCP and enter the host settings manually, click the checkbox to remove the check mark.
4: Configuring the Web Interface 2. From the Host Settings form, complete or edit the following fields, as necessary: Filed Name Field Definition Host Name The fully qualified domain name identifying the specific host computer within the Internet. Console Banner A text string designed to appear on the console upon logging into and exiting from a port as a way to verify or identify the particular port connection. Ethernet Port Primary IP IP address of the unit.
4: Configuring the Web Interface Network > Syslog The Syslog form allows you to configure one or more syslog servers to receive ACS-generated syslog messages. The ACS generates syslog messages related to users connecting to ports, login failures and other information that can be used for audit trailing purposes. You also use this form to delete syslog servers. 1. Select Network from the top menu bar, and then select Syslog from the left menu panel. The system brings up the Syslog form. 2.
4: Configuring the Web Interface 3. To add a new Syslog Server, type in the name of the server in the New Syslog Server field, and then select the Add button - OR To delete a Syslog Server, from the Syslog Servers list box, select the server you wish to delete, and then select Delete. 4. Select Apply Changes to save your changes to Flash. Network > PCMCIA Management The PCMCIA Management form allows you to configure the types of PCMCIA card that are installed in either one or both of the PCMCIA slots.
4: Configuring the Web Interface 2. Insert the card into the PCMCIA slot and then select the Insert button. 3. To configure the card, select the Configure button. The system brings up the PCMCIA Configuration dialog box: 4. From the pull down menu, select the type of card that you are using. 5. Complete the rest of the dialog box. (See the succeeding PCMCIA Configuration Dialog Boxes section for information about each input field.) 6. Click on the OK button when done. 7.
4: Configuring the Web Interface The dialog box for configuring the PCMCIA card will have varying sets of input fields depending on the type of PCMCIA card that you select from the drop down box: Access Method: Modem If the selected card type is Modem (default), the following fields are used: Field Name Definition [PCMCIA Card] Pull-down box to select the type of PCMCIA card that you are using. PPP Check box to enable point-to-point protocol. Local IP The local IP address of the PCMCIA card.
4: Configuring the Web Interface Access Method: ISDN If the selected Access Method is ISDN, the following fields are used: Field Name 66 Definition [PCMCIA Card] Select ISDN from the pull-down box. PPP Check box to enable point-to-point protocol. Local IP The local IP address of the PCMCIA card. Remote IP The remote IP address of the PCMCIA card. Call Back Check box to enable the callback security feature. Phone Number The phone number that the ACS uses to call back.
4: Configuring the Web Interface Access Method: GSM If the selected Access Method is GSM, the following fields are used: Field Name Definition [PCMCIA Card] Select GSM from the pull-down box. Local IP The local IP address of the PCMCIA card. Remote IP The remote IP address of the PCMCIA card. Pin Number The personal identification number associated with the GSM. Call Back Check box to enable the callback security feature.
4: Configuring the Web Interface Access Method: Ethernet If the selected Access Method is Ethernet, the following fields are used: Field Name Definition [PCMCIA Card] Select Ethernet from the Pull-down box. IP Address The local IP address of the Ethernet. Network Address The network address of the Ethernet.
4: Configuring the Web Interface Access Method > Wireless LAN If the selected Access Method is Wireless LAN, the following fields are used: Field Name Definition [Unlabeled] Pull-down box to select the type of PCMCIA card that you are using. PPP Check box to enable point-to-point protocol. Local IP The local IP address of the PCMCIA card. Remote IP The remote IP address of the PCMCIA card. Call Back Check box to enable the callback security feature.
4: Configuring the Web Interface What is VPN If you already understand how VPN works, skip this section and proceed to the next procedure, Network > VPN Connections. A VPN, or Virtual Private Network lets the Console Server and a whole network communicate securely when the only connection between them is over a third network which is not trustable. The method is to put a security gateway machine in the network and create a security tunnel between the Console Server and this gateway.
4: Configuring the Web Interface Web work and so on). The implementation of IPsec used by the AlterPath Console Server is FreeSWAN (www.freeswan.org). You can use IPsec on any machine that does IP networking. Wherever required to protect traffic, you can install dedicated IPsec gateway machines. IPsec can also run on routers, firewall machines, various application servers, and end-user desktop or laptop machines.
4: Configuring the Web Interface Network > VPN Connections The VPN configuration form allows you to configure one or more VPN connections to other systems or Cyclades ACS devices. Select one of the existing VPN connections and click the edit button or click the add button to add a new one. This launches a dialog box to prompt for the details of the connection. Complete the fields in the dialog box. The RSA keys may be entered using the Copy and Paste feature of your Browser. 1.
4: Configuring the Web Interface The system brings up the New/Modify VPN Connection dialog box: If the selected Authentication Method is RSA Public Keys, the left dialog box is used. If the Authenticatication Method is Shared Secret, the right dialog box is used. 3. Edit or complete the appropriate fields from either dialog box as follows: Field Name Definition Connection Name Name of the VPN connection. Authentication Protocol Authentication protocol used to establish a VPN connection.
4: Configuring the Web Interface Field Name RSA Key Definition You may use the copy and paste feature of your browser to enter the RSA key. Local (“Left”) ID Identification name. IP Address Local IP address. NextHop The router to which the Console Server sends packets in order to deliver them to the right. Subnet Mask As indicated. RSA Key You may use the copy and paste feature of your browser to enter the RAS key.
4: Configuring the Web Interface configurations. SNMPv1/v2 requires community, source, object ID and the type of community (read-write, read-only). V3 requires user name. Important! Check the SNMP configuration before gathering information about ACS by SNMP. There are different types of attacks an unauthorized user can implement to retrieve sensitive information contained in the MIB. By default, the SNMP configuration in ACS cannot permit the public community to read SNMP information. To configure SNMP: 1.
4: Configuring the Web Interface Field Name Definition SysContact The email of the person to contact regarding the host on which the agent is running (e.g., me@mymachine.mydomain) SysLocation The physical location of the system (e.g., mydomain). If you are using SNMPv3, skip steps 2 and 3; proceed to step 4. 3. To Add an SNMP agent using SNMPv1/SNMP2 Configuration, select the Add button located at the bottom of this view table. - OR To edit an SNMP agent, select the Edit button.
4: Configuring the Web Interface Field Name Permission Definition Select the permission type: Read Only - Read-only access to the entire MIB except for SNMP configuration objects. Read/Write - Read-write access to the entire MIB except for SNMP configuration objects. Admin - Read-write access. 5. If you are adding or editing an SNMP agent using SNMPv3, scroll down to the lower half of the SNMP Configuration form: 6.
4: Configuring the Web Interface The system invokes the New/Modify SNMP v3 Configuration dialog box: 7. Complete the form and when done, select the OK button from the dialog box. 8. Verify your entry or modification from the respective tables of the SNMP Configuration form. 9. Select the Apply Changes button to complete the procedure.
4: Configuring the Web Interface Services The Services form is used to enable or disable the daemons to use to allow different incoming connections. 1. From the top menu, select Network; from the left menu panel, select Services. The system invokes the Services form. 2. From the Services form, select the service(s) you wish to use. 3. Select the Apply Changes button to save your configuration.
4: Configuring the Web Interface Firewall Configuration Firewall configuration, also known as IP filtering, refers to the selective blocking of the passage of IP packets between global and local networks. The filtering is based on rules that describe the characteristics of the packet (e.g., the contents of the IP header, the input/output interface, or the protocol).
4: Configuring the Web Interface When a chain is analyzed, the rules of this chain are reviewed one-by-one until the packet matches one rule. If no rule is found, the default action for that chain will be taken. Network > Firewall Configuration 1. Select Network from the top menu bar, and then select Firewall Configuration from the left menu panel. The system brings up the Firewall Configuration form. As explained in the last section, this form lists the chains that make up the rules for IP filtering.
4: Configuring the Web Interface Adding a Chain 1. From the Firewall Configuration form, click on the Add button. The system brings up the Add Chain dialog box: 2. Type in the chain name in the Name Field, and then select OK. (Spaces are not allowed in the chain name.) 3. After entering a new chain name, click on the Edit Rules button to access the next dialog window to enter the rules for that chain. 4. Select OK to commit your changes. 5.
4: Configuring the Web Interface Deleting a Chain Only user-defined chains can be deleted. The system will not allow you to delete a built-in chain. 1. From the Firewall Configuration form, select the chain you wish to delete from the list, and then select the Delete button. Editing a Rule The rules define how the filtering should work.
4: Configuring the Web Interface The system brings up the Edit Rule dialog box: 3. Complete the necessary fields as follows: Field Name 84 Definition Target Indicates the action to be performed to the IP packet when it matches the rule. The kernel can be configured to ACCEPT, DROP, RETURN, LOG or REJECT the packet by sending a message, translating the source or the destination IP address/ port or sending the packet to another user-defined chain. Source IP The source IP address.
4: Configuring the Web Interface Field Name Definition Destination IP Destination IP address. Mask Destination network mask. Inverted Select box to invert the target action (i.e., the action assigned to the target will be performed to all Destination/Mask IPs except to the one just defined). Protocol The transport protocol to check. If the numeric value is available, select Numeric and type the value in the adjacent text input field; otherwise, select one of the other options.
4: Configuring the Web Interface Additional Fields If you selected Log as the Target, the following additional fields appear: Field Name Definition Log Level The log level classification to be used based on the type of error message (e.g., alert, warning, info, debug, etc.). Log Prefix The prefix that will identify the log. TCP Sequence Check box to include TCP sequence in the log. TCP Options Check box to include TCP options in the log. IP Options Check box to include IP options in the log.
4: Configuring the Web Interface 1. From the Firewall Configuration form, select the chain to which you wish to add a rule (or if you are adding a new chain, select the Add button and follow the procedure for Adding a Chain.) 2. Click on the Edit Rule button. The system brings up the Edit Rule for Chain dialog box. 3. From the Edit Rule for Chain dialog box, click on the Add button. The system brings up the Add Rule dialog box. 4. Complete the Add Rule dialog box.
4: Configuring the Web Interface Network > Host Table The Host Table form enables you to keep a table of host names and IP addresses that comprise your local network, and thus provide information about your network environment. 1. From the top menu bar, select Network; from the left menu panel, select Host Table. The system invokes the Host Tables form: 2. To edit host, select the host IP address from the Host Table and then click on the Edit button.
4: Configuring the Web Interface 3. Type in the new or modified host address in the IP Address field, and the host name in the Name field, and then select the OK button. 4. To delete a host, select the host you wish to delete from the Host Table form, and then select the Delete button from the form. 5. Select the Apply Changes button to save your configuration to Flash. Network > Static Routes The Static Routes form allows you to manually add routes.
4: Configuring the Web Interface 2. To edit a static route, select a route from the Static Routes form, and then select the Edit button. - OR To add a static route, select the Add button from the form. The system invokes the New/Modify Route dialog box: Complete the fields as follows: Field Name Definition Route Select Default, Network, or Host. Network IP This field appears only if Network is selected. The address of the destination network. Network Mask Only if Network is selected.
4: Configuring the Web Interface Security The Security configuration of the ACS, as shown by the left menu panel includes the following configuration forms: • • Users and Groups Active Ports Sessions Users and Groups Users and Groups configuration allows you to set up users to have access to the ACS web application, assign them to specific groups that share common access rights, as well as assign or re-assign passwords. Moreover, you can create new groups to add to the group list.
4: Configuring the Web Interface Adding Users and Groups to the Access List 1. From the top menu bar, select Security; from the left menu panel, select Users and Groups. The system brings up the Users and Groups form: 2. To add a user to the User list OR to add a group to the Group list, select the Add button at the bottom of the corresponding list box. The system brings up the Add Users and Groups dialog box: 3. Complete the dialog box shown above, and then select OK.
4: Configuring the Web Interface All users must be assigned to a group. 4. To edit a user or a group, from the Users and Groups form, select the user or the group you wish to edit from the appropriate listbox, and then select the Edit button located that the bottom of the corresponding listbox. 5. Repeat step 3. Deleting a User from a Group 1.
4: Configuring the Web Interface Active Ports Sessions The Active Ports Sessions window is designed to provide you a quick status, and usage information (e.g., user, tty, Login time, JCPU, etc.) pertaining to all active ports sessions. Open sessions are displayed with their identifications and statistics data for login, session and CPU usage for the specific client. JCPU relates all processes attached to that port including running background processes. PCPU relates the current processing time. 1.
4: Configuring the Web Interface Field Name Definition JCPU The duration of time used by all processes attached to the tty. It does not include past background jobs; only currently running background jobs. PCPU The time used by the current process that is named in the What column. What The current process attached to the tty.
4: Configuring the Web Interface Tab Name Other (port settings) Use this form to: Configure other port settings such as break interval, login banner, PPP options, etc. To configure the ports: 1. From the top menu, select Ports; from the left menu, select Physical Ports. The system invokes the Physical Ports Modification form: This form allows you to: • Modify all or only selected ports. • Enable or disable selected ports. 2.
4: Configuring the Web Interface Associating an Alias to a Port To specify an alias parameter to associate a name to a port, perform the following steps. 1. While in Expert Mode, go to: Ports > Physical Ports. 2. From the Physical Ports (Selection) form, select the port to configure and then click on the Modify Selected Ports button. The system displays the Modify Selected Port form: The General tabbed form varies according to what you have previously selected from the main Physical Ports form.
4: Configuring the Web Interface Ports > Physical Ports > General Port The General form is used to define the port profile for the selected port(s). 1. From the top menu, select Ports; from the left menu, select Physical Ports. The system invokes the General tabbed form: 2. Complete the form as follows: Field Name Definition Connection Protocol The connection protocol to be used by the selected port.
4: Configuring the Web Interface Power Management Access There are three ways in which the General form allows you to access Power Management: • • • SSH Telnet SSH and Telnet 1. Go to Ports > Physical Ports > General. 2. From the Connection Protocol pull down menu of the General tabbed form, select Power Management. The system invokes new fields for selecting the connection type. 3. From the invoked dropdown entry field (Allow Access by), select the desired connection type. 4. 5. 6. 7.
4: Configuring the Web Interface Ports > Physical Ports > Access The Access form of the Ports menu is used to assign users and groups to an authentication services. You also select the authentication service from this form. A summary of authentication services that you can configure from this form is as follows: Authentication Type 100 Definition None No authentication. Local Authentication is performed locally (i.e., using the / etc/passwd file). Remote This is for a terminal profile only.
4: Configuring the Web Interface Authentication Type NIS NIS Definition All authentication types but NIS follow the format all.authtype DownLocal or (e.g. all.authtype radius or radiusDownLocal or ldap or ldapDownLocal, etc). NIS requires all.authtype to be set as local, regardless if it will be "nis" or its “Downlocal" equivalent. To configure user/group authentication, perform the following steps: 1.
4: Configuring the Web Interface Entry Fields Based on Authentication Type The user entry fields that are available from the Access form depend on the authentication type that you select from the Type field.
4: Configuring the Web Interface Authentication Type: NIS, LocalNIS or NISLocal (All ACS only) Field Name Authorized Users/Groups NIS Domain Name NIS Server IP Authentication Type: Kerberos, KerberosDownLocal Kerberos KerberosDownLocal The server performing the authentication. Local authentication is tried only when the kerberos server is down.
4: Configuring the Web Interface Ports > Physical Ports > Data Buffering 1. From the top menu, select Ports; from the left menu, select Physical Ports; from the Physical Ports form, select the ports to modify; from the resulting form, select the Data Buffering tab. The system brings up the Data Buffering form. The form below shows both checkboxes (Enable Data Buffering and Buffer to Syslog) selected to reveal all the form fields: 2.
4: Configuring the Web Interface Field Name Syslog Buffer Size Definition Maximum size of the buffer. By selecting the appropriate radio button, you can configure ACS to: • Buffer Syslog at all times. • Buffer only when nobody is connected to the port. To configure data buffering to send alarm notifications, use the Notifications form (Expert Mode: Administration > Notifications). 3. When done, select the Apply Changes button located at the bottom of the ACS configuration window.
4: Configuring the Web Interface To configure ACS to allow multiple sessions: 1. Select Ports from the top menu bar; select Physical Ports from the left menu panel. The system brings up the Physical Ports list. 2. From the Physical Ports list, select the Port(s) you wish to modify (to enable multiple sessions). 3. Select the Multi User tab from the resulting form. The system invokes the Multi-User form: 4.
4: Configuring the Web Interface Ports > Physical Ports > Power Management The Power Management form of the Ports menu is used to enable power management for the current port, add and delete power management ports, and assign user and group access to these ports. 1. Select Ports from the top menu; select Physical Ports from the left menu; select Power Management from the row of tabs. The system brings up the Power Management form: 2.
4: Configuring the Web Interface Field Name Allowed Users/Groups Definition View List Box of Allowed Users or Groups. Use the Delete or Add button to maintain this listbox. 3. Select the Apply Changes button at the bottom of the ACS configuration window to save your configuration. Ports > Physical Ports > Other The Other form is used to define less commonly used port settings such as the Port IP Alias, STTY options, TCP keepalive intervals, enabling Windows EMS, and the like. 1.
4: Configuring the Web Interface Field Name Definition TCP Keep-alive Interval Specifies the time interval between the periodic polling by the system to check client processes and connectivity. Idle Timeout The maximum time (in seconds) that a session can be idle before the user is logged off. STTY Options Set terminal options. Break Interval Break interval in milliseconds. Login Banner Text entry field box. Enter the text you wish to appear as a login banner upon logging onto the terminal.
4: Configuring the Web Interface 2. To add a new slave, select the Add button - OR To edit a slave, select the slave you wish to edit from the Slave list. The system brings up the New/Modify Port dialog box: 3. Complete the dialog box as follows: Field Name Definition Number of Ports Choices are 1, 4, 8, 16, 32 and 48. First Local Port No. As indicated. Local IP Local IP address. First Local TCP Port No. As indicated. Remote IP Remote IP address. First Remote TCP Port No. As indicated.
4: Configuring the Web Interface The system brings up the Port Names dialog box: 5. For each port to be named, enter the port name in the corresponding Port Name field, and then select the Apply button. 6. Click on the Apply Changes button to save your configuration. Deleting a Slave 1. To delete a slave from the list, select the unit to be deleted from the Virtual Ports form, and then click Delete. Ports > Ports Status Show the status of each port.
4: Configuring the Web Interface 112 AlterPath Console Server User Manual
4: Configuring the Web Interface Administration Administration > System Information System information provides information about the ACS version, CPU, memory, including PCMCIA. To view system information, select Administration from the top menu bar; select System Information from the left menu panel.
4: Configuring the Web Interface Administration > Notification The Notification form is used to set up alarm notification to users through email, pager or SNMP traps. 1. From the top menu bar, select Administration; from the left menu panel, select Notifications. The system invokes the Notifications form: 2. Complete the main form as follows: Field Name Definition Notification Alarm for Data Buffering Checkmark to enable notification alarms for data buffering.
4: Configuring the Web Interface Email Notification If you selected Email as the notification method, the following dialog box is used: Field Name Alarm Trigger Definition The trigger expression used to generate an alarm. [untitled dropdown field] To/From/Subject/Body The email for the designated recipient of the alarm notification. SMTP Server IP The IP address of the SMTP server. SMTP Port The port used by the SMTP server.
4: Configuring the Web Interface Pager Notifications If you selected Pager as the notification method, the following dialog box is used: Field Name Alarm Trigger Definition The trigger expression used to generate an alarm. [untitled dropdown field] 116 Pager Number The pager number of the notification recipient. Text The text message for the pager. SMS Server IP The IP address of the SMS server. SMS Port The port used by the SMS server.
4: Configuring the Web Interface SNMP Trap Notification SNMP traps are event notifications that are sent to a list of managers configured to receive events for that managed system. The Traps provide the value of one or more instances of management information. Any SNMP enabled Device generates Fault Reports (Traps) that are defined in the MIB (which the SNMP Agent has implemented).
4: Configuring the Web Interface Field Name Alarm Trigger Definition The trigger expression used to generate an SNMP trap. [untitled dropdown field] OID Type Value The value that uniquely identifies an object to the SNMP agent. Trap Number The trap type defined in the MIB. Community The password used to authenticate the traps Server IP The address of the server running the SNMP. Body The text or content of the notification. 4.
4: Configuring the Web Interface Administration > Time / Date The Time/Date form is used to enable ACS to work as an NTP client. Network Time Protocol (NTP) is a standard for synchronizing your system clock with the true time, defined as the average of many high-accuracy clocks around the world. By default, NTP is disabled and you may enter the time and date manually using the Time/Date form. Manual Setting To set the time and date manually (i.e., locally, without NTP), perform the following steps: 1.
4: Configuring the Web Interface NTP Setting To set the time and date through NTP, perform the following steps: 1. From the Time/Date form, choose Enable from the Network Time Protocol field. 2. Type in the address of the NTP server in the NTP Server field. 3. Click on the Apply Changes button.
4: Configuring the Web Interface Administration > Boot Configuration Boot configuration defines the settings for loading the operating system. In the event that the ACS fails to boot successfully, you can use the Boot Configuration form to change the boot settings. The ACS can boot from its internal firmware or from the network. By default, the unit boots from Flash.
4: Configuring the Web Interface Field Name Definition Unit boot from Specify whether to boot unit up from Flash or from the Network. Boot Type Select from the following types of booting: bootp, tftp, or both. Boot File Name Filename of the boot program you want to use. Server’s IP Address As indicated. Console Speed Select from: 4800 through 118200. Flash Test Select this to test boot from the Flash card. You can Skip this test, or do a Full test. RAM Test Select this to test boot from RAM.
4: Configuring the Web Interface Administration > Backup Configuration The Backup Configuration form allows you to: • • Use a FTP server to save and retrieve your ACS configuration. For the backup configuration to work, the FTP server must be on the same subnet. Ensure that it is accessible from the ACS by pinging the FTP server. Use a storage device to save your configuration. To save configuration to a FTP server 1.
4: Configuring the Web Interface Read the succeeding section, Backup and Restore Procedure, for a more detailed explanation of the fields. 3. Select Save to FTP Server or Upload from FTP Server, as appropriate. Backup and Restore Procedure For backup purposes, you can give the configuration backup file a name according to your company’s naming convention. From the Backup Configuration form, fill in the fields with the server name (i.e.
4: Configuring the Web Interface To Save Configuration to a Storage Device For this feature to work, the RESTORECONF utility must be modified to enable the system to read the configuration file from the compact flash. Refer to the ACS Reference Guide for more details. 1. From the top menu, select Administration; from the left menu, select Backup Configuration. 2. From the Type dropdown field of the Backup Configuration form, select Storage Device. The system displays the following form: 3.
4: Configuring the Web Interface Administration > Upgrade Firmware The Upgrade Firmware form allows you to upload the ACS firmware from the Cyclades website to the ACS. To upgrade the ACS firmware, follow the procedure below: 1. Select Administration from the top menu, and then select Upgrade Firmware from the left menu. The system brings up the Upgrade Firmware form: 2. Complete the form as follows: Field Name Definition Type The method of upload. FTP Site The address of the FTP site.
4: Configuring the Web Interface Administration > Reboot The Reboot form allows you to reboot the system by clicking the Reboot button.
4: Configuring the Web Interface 128 AlterPath Console Server User Manual
A: Hardware Specifications A: Hardware Specifications CPU MPC855T (PowerPC Dual-CPU) Memory 128MB DIMM SDRAM / 16MB CompactFlash Interfaces 1 Ethernet 10/100BT on RJ45 1 RS232 Console on RJ45 RS232 Serial Ports on RJ45 PCMCIA slots supporting: Secondary Ethernet, Wireless networking, CDMA, GPRS, GSM, V.
Appendix A: Hardware Specifications Supported PCMCIA Cards Brand Model 10/100BT Ethernet Linksys EtherFast 10/100 PC Card Model PCM100 v3 Linksys EtherFast 10/100 PC Card ver.3 D-Link EtherFast 10/100 PC Card Model DFE-670TXD 2.1.0 or higher 2.1.5 or higher 2.1.6 or higher Fiber Optic Danpex 2.3.0 or higher 1300C FX100BT (AFC1300SC/ST models) Firmware 802.11b Wireless Ethernet Linksys WPC11 v.3 2.1.5 or higher V.90 (56k) Modem Xircom XM5600 56K PC Card Modem Adapter Zoom Modem V.
Appendix A: Hardware Specifications IDE Hard Disk Toshiba MK5002MPL 5GB AlterPath Console Server User Guide 2.1.
Appendix A: Hardware Specifications 132 AlterPath Console Server User Guide
B: Safety Guidelines B: Safety Guidelines This appendix section lists the safety guidelines for: • • RackMounting the ACS Operating the ACS Safety Guidelines for Rack-Mounting the ACS The following considerations should be taken into account when rackmounting the AlterPath Console Server. Temperature The manufacturer's maximum recommended ambient temperature for the AlterPath Console Server is 122 ºF (50 ºC).
Appendix B: Safety Guidelines Reliable Earthing Reliable earthing of rack-mounted equipment should be maintained. Particular attention should be given to supply connections other than direct connections to the branch circuit, such as power strips or extension cords. Safety Precautions for Operating the ACS Please read all the following safety guidelines to protect yourself and your AlterPath Console Server. DANGER! Do not operate your ACS with the cover removed.
Appendix B: Safety Guidelines DANGER! Do not push any objects through the openings of the ACS. Doing so can cause fire or electric shock by shorting out interior components. Important! Keep your ACS away from heat sources and do not block host’s cooling vents.
Appendix B: Safety Guidelines Replacing the Battery WARNING: There is the danger of explosion if the battery is replaced incorrectly. Replace the battery only with the same or equivalent type recommended by the manufacturer. Dispose of used batteries according to the manufacturer's instructions. WARNUNG: Bei Einsetzen einer falschen Batterie besteht Explosionsgefahr. Ersetzen Sie die Batterie nur durch den gleichen oder vom Hersteller empfohlenen Batterietyp.
Appendix B: Safety Guidelines L’AlterPath Console Server n’émete pas de bruits radioélectriques dépassant les limites applicables aux appareils numériques de la classe A prescrites dans le règlement sur le brouillage radioélectrique edicté par le Ministère des Communications du Canada. Aviso de Precaución S-Mark Argentina Por favor de leer todos los avisos de precaución como medida preventiva para el operador y el AlterPath Console Server.
Appendix B: Safety Guidelines ¡Importante! Mantenga el AlterPath Console Server Cyclades-TS fuera del alcancé de calentadores, y asegurarse de no tapar la ventilación del equipo. ¡Importante! El AlterPath Console Server con alimentación de corriente directa (CD) solo debe ser instalado en áreas con restricción y de acuerdo a los artículos 110-18, 110-26, y 110-27 del National Electrical Code, ANSI/NFPA 701, Edición 1999. Para conectar la corriente directa (CD) al sistema, utilice cable de 0.75 mm (18 AWG).
C: Supported Browsers and JRE C: Supported Browsers and JRE Supported Web Browsers The web browsers that support the AlterPath Console Server web interface are as follows: • • • Netscape 7.1 for Windows Mozilla 1.3a for Windows MS Internet Explorer 6.0 Browsers that do not support the ACS web interface: • • Netscape Communicator 4.8 Netscape Communicator 4.79 Installing JRE Tested Environment Windows XP + JREv1.4.2. Internet Explorer 6.0 Netscape 6.0 - 6.2.3 Netscape 7.0 - 7.1 Mozilla 1.1 - 1.
Appendix C: Supported Browsers and JRE If there isn't, this could either mean your browser is not activated to use the Java plug-in that came with the JRE you have installed or it just means that you don't have any JRE installed, in which case please install and repeat the check. If you have already installed JRE and you just want to activate your browser to use it, go to your system's Control Panel > Java Plug-in icon > Browser > check on the browser(s) you want to activate to use the Java Plug-in.
Glossary Glossary Authentication 141 The process by which a user’s identity is checked within the network to ensure that the user has access to the requested resources. Basic In/Out System (BIOS) Chips on the motherboard of a computer contain read only memory instructions that are used to start up a computer. The operating system of a PC also makes use of BIOS instructions and settings to access hardware components such as a disk drive.
Glossary compares this value with the one sent with the data. If the two values are the same, the receiver has some confidence that the data was received correctly. Cluster A cluster is a group of one or more computers working as a group to execute a certain task. From the user standpoint, a cluster acts as a large computer system. Console Access Server (CAS) A CAS has an Ethernet LAN connection and many RS-232 serial ports.
Glossary DNS Server Domain Name Server. The computer you use to access the DNS to allow you to contact other computers on the Internet. The server keeps a database of host computers and their IP addresses. Domain Name The unique name that identifies an Internet site. Domain Names always have 2 or more parts, separated by dots. The part on the left is the most specific, and the part on the right is the most general.
Glossary devices over a common medium. Ethernet runs at 10 Mbps; Fast Ethernet runs at 100 Mbps. Ethernet is the most common type of LAN. Flash Flash refers to a type of memory that can be erased and reprogrammed in units of memory known as blocks rather than one byte at a time; thus, making updating to memory easier. Flow Control A method of controlling the amount of data that two devices exchange. In data communications, flow control prevents one modem from "flooding" the other with data.
Glossary for routing, while the host number addresses an individual host within the network or sub network. A subnet mask is used to extract network and sub network information from the IP address. IP packet filtering This is a set of facilities in network equipment that allows the filtering of data packets based on source/destination addresses, protocol, TCP port number and other parameters. Packet filtering is one of the main functions of a firewall.
Glossary LDAP is a "lightweight" (smaller amount of code) version of DAP (Directory Access Protocol), which is part of X.500, a standard for directory services in a network. MAC Medium Access Control. Internationally unique hardware identification address that is assigned to the NIC (Network Interface Card) which interfaces the node to the LAN. Masquerading Where a system acts on behalf of other systems, such as when an ISP server accesses network services on behalf of a dial-up user.
Glossary example, a sub-network 192.168.16.64 with mask 255.255.255.224, the addresses we may assign to computers on the sub-network are 192.168.16.65 to 192.168.16.94, with a broadcast address of 192.168.16.95. A number used by software to separate the local subnet address from the rest of a given Internet protocol address Network masks divide IP addresses into two parts (network address and address of a particular host within the network). Mask have the same form as IP addresses (i.e. 255.255.255.
Glossary have one or more branches, or will terminate with a leaf node. The format of OID is a sequence of numbers with dots in between. There are two roots for Object Identifiers, namely iso and ccit. iso starts with .1 and ccit starts with .0. Most Object Identifiers start with .1.3.6.1, where 1=iso, 3=org, 6= dod, 1 = internet. The Internet sub-tree branches into mgmt and private. To understand the concept of relative and absolute Object Identifiers, let us consider the AdventNet Object Identifier .1.3.
Glossary (1) or off (0), depending on the serial communications parameters set in the UART chip. The following lists the available parity parameters and their meanings: Odd - Parity bit set so that there is an odd number of 1 bits Even - Parity bit set so that there is an even number of 1 bits None - Parity bit is ignored, value is indeterminate PCMCIA Personal Computer Memory Card International Association.
Glossary PPP has been a widely-used Internet standard for sending datagrams over a communications link. The PPP standard is described in RFC 1661 by the Point-to-Point Working Group of the Internet Engineering Task Force (IETF). PPP is commonly used when remote computers call an Internet service provider (ISP) or a corporate server that is configured to receive incoming calls. 150 Profile Usage setup of the ACS either as a Console Access Server (CAS), a Terminal Server, or a Remote Access Server.
Glossary Server Farm A collection of servers running in the same location (see Cluster). SMTP Simple Mail Transfer Protocol. Specifies the format of messages that an SMTP client on one computer can use to send electronic mail to an SMTP server on another computer. SNMP Short for Simple Network Management Protocol, a set of protocols for managing complex networks. The first versions of SNMP were developed in the early 80s.
Glossary SSH (Secure Shell) A protocol which permits secure remote access over a network from one computer to another. SSH negotiates and establishes an encrypted connection between an SSH client and an SSH server. STTY Set the options for a terminal device interface. This command prints information about your terminal settings. The information printed is the same as if you had typed stty while interacting with a shell.
Glossary been ignored by the client, the server assumes the worst and the connection is closed. The keepalive timer provides the capability to know if the client's host has either crashed and is down or crashed and rebooted. Telnet A terminal emulation program for TCP/IP networks such as the Internet. The Telnet program runs on your computer and connects your PC to a server on the network.
Glossary VPN Virtual Private Networking allows local area networks to communicate across wide area networks, typically over an encrypted channel. See also: IPsec. Watchdog Timer A watchdog timer (WDT) is a device or electronic card that performs a specific operation after a certain period of time if something goes wrong with an electronic system and the system does not recover on its own.