1 | General |
1.1 | Scope |
1.2 | Acronyms and terminology |
1.3 | Notation conventions |
2 | Prerequisites |
2.1 | Hardware build-up |
2.2 | Software components |
3 | Aids |
4 | References |
5 | Procedure |
6 | Execution |
6.1 | General |
6.2 | Performance and limitations |
6.3 | Configurations |
6.4 | Security |
6.5 | File descriptions |
6.6 | The base system shell |
6.7 | tncom, transparent Telnet to V.24 communication |
6.8 | Point to Point Protocol, PPP |
6.9 | Base SNMP, the base agent MIBs |
7 | Termination |
1.1 Scope
We are using 'winfiol-md110 system' We are facing a problem when communicating or receiving international calls, the sound level is very lowوalmost can not hear anything. Please advise me to solve this issue. E WinFIOL 6.4 User's Guide. Syed Adnan Ahmad. Download Full PDF Package. A short summary of this paper. 3 Full PDFs related to this paper. E WinFIOL 6.4 User's Guide. E WinFIOL 6.4 User's Guide.
The Access Agent, without additional software, has the following facilities which are described in this document.
- Base System (BSYS) configuration and control
- Routing
- Telnet to V.24 communication (tncom)
- PPP communication
- SNMP management (Base SNMP)
Examples of additional functionality (applications) that can be added are (described in separate documents):
- SNMP Agent.
- Agent Call Account Buffer (ACAB).
1.2 Acronyms and terminology
AAU | Access Agent Unit |
ACAB | Agent Call Account Buffer application |
ASCII | American Standard Code for Information Interchange |
CHAP | Secure authentication support in the PPP protocol, compare with PAP |
CIL | Call Information Logging |
D.N.A. | Dynamic Network Administration |
FTP | File Transfer Protocol |
LAN | Local Area Network |
MIB | Management Information Base. A data base in a managed object reflecting its current configuration and status |
MML | Man Machine Language |
PAP | Simple authentication support in the PPP protocol, compare to CHAP |
PPP | Point to Point Protocol |
RFC | The Network Working Groups Request For Comments, Internet standard |
SNMP | Simple Network Management Protocol |
TCP/IP | Transmission Control Protocol/Internet Protocol. The de facto standard protocol for enterprise data network |
Telnet | Internet standard protocol for remote terminal connection service |
WAN | Wide Area Network |
1.3 Notation conventions
Bold | Text as it is written on the screen. Also file names, commands, etc., when referred to in a text. |
Bold italic | User-written text on the screen (when it is not obvious). |
Italic | Reference to another section, picture, etc. |
Without brackets | Necessary words or arguments. |
[Within brackets] | Optional words or arguments. |
<Within tag markers> | Replace with argument (variable or string) |
€ | logical or, as in alternative argument in a command. |
Example: ping [-s] <IP address> [<time-out>]
2.1 Hardware build-up
Main characteristics:
- Four V.24/V.28 ports for network element (in/out) and modem
- Two Ethernet ports (10BaseT and 10Base2)
- One Alarm input port with 6 inputs
- 4.5 MB flash memory (4.0/ in the file system)
- 4 MB DRAM, including 64 kB RAM disk (3.0/ in the file system)
- Token ring access (only sustaining)
- 5 V DC power supply
This model contains one agent and is designed to fit in an ASB 501 04 LIM magazine.
For more information on how to install it, see installation instructions for ACCESS AGENT.
Figure 2-1. The connections in the frontpanel |
- Four V.24/V.28 (COM1-COM4): Used for connections to ASB 501 04, PC, terminal, modem or other V.24 compatibles. At the delivery the ports have configuration to be used for the following:
- COM1: PPP or MML via tncom (Telnet to V.24)
- COM2: MML via tncom (Telnet to V.24)
- COM3: Not setup (when using network element specific software the port is used for
SNMP communication)
- COM4: Serial communication to PC or terminal (console) (no flow-check). May be used
for local configuration. It can be set not to print the configuration parameters,
thus being available for applications, e.g. tncom (Telnet to V.24).
- Token ring connector (only in AAU1)
- Alarm input, 1/4 connector: For connection of agent external alarms. Active alarm: +5 V (pulled up when not connected) Passive alarm: -60 V to 0 V
- Ethernet 10BaseT (ETH): Connection to the local Ethernet 10BaseT network.
- Ethernet 10Base2, BNC connection: Connection to the local Ethernet 10Base2 network.
All the connections in the front (except the alarm input and Ethernet 10Base2) are shielded RJ45. On the back there is a power inlet.
Figure 2-2. The LEDs and buttons in the frontpanel. |
- COM1-COM4: Indicates received traffic on the respective comports.
- Reset/Config, Two-way-switch:
Upwards: hardware reset.
Downwards: forcing the configuration parameters to be printed to COM4 on reset, after having disabled it. - S: LED for future use (Only used during the boot sequence).
- Alarm: Indicates that an alarm signal is received on one or more of the alarm pins (when the SNMP Agent is used).
- ETH: Indicates received Ethernet (LAN) traffic (on both 10BaseT and 10Base2).
- Power: Blinks (1 Hz) when the agent is powered and booted.
2.2 Software components
The Access Agent software (pre-installed) consists of a base system with the base application on top of it.
The Base system includes the following.
- Operating system with file system and command shell for configuration and control of the agent. Enables TCP/IP communication, FTP and Telnet servers and PPP.
Above the Base system, applications can be added. In the Access Agent, there is one application: the Base application, which includes two parts:
- tncom: Enables Telnet to V.24 connectivity. With this application, the agent can be used for connecting the ASB 501 04 to a TCP/IP network (no SNMP functionality for ASB 501 04). For example WINFIOL (terminal program for ASB 501 04 control) can be used for MML and patch downloading to external network elements.
- Base agent (Base SNMP): Enables SNMP functionality for the agent (not ASB 501 04), MIB-II support.
As mentioned before, this software can be completed with SNMP Agent application and/or ACAB.
The picture below explains how the software components are read during the booting.
Figure 2-3. Booting sequence |
At power on or reset, the Boot starts. Normally the Boot is then replaced by the Soft-image
(/bsys.img). The Soft-image is a more often upgraded copy of the Boot (the Boot is resided in the flash memory, the Soft-image on the file system).
If the Soft-image file is not found or is corrupt (or by choice is not to be loaded), no applications are loaded. The Boot, though, contains basic functionality such as support for FTP, Telnet, PPP and TCP/IP. If the Soft-image is started, all the applications listed in the /startup file are loaded. In the Access Agent, the application consists of tncom and Basesnmp. When installing network element specific software, more applications are added.
-
-
-
6.1 General
The Access Agent Unit, without additional software, has the following facilities (all thoroughly described below).
- Base System (BSYS) configuration and control: Network platform with UNIX-style shell used for configuration and control of the agent, file system operations, and so on.
- Routing. The agent is basically a simple router that can manage Ethernet, Token ring and PPP simultaneously. It provides only static routes. No routing protocols are supported.
- Telnet to V.24 communication (tncom): Application above the base system that establishes a connection in a TCP/IP network between a Telnet client and a V.24 port, via the agent. This way, the user can have a Telnet session directly to for example an ASB 501 04, without using SNMP management. This gives an opportunity to use the network element's own interface for a more detailed control, or for transferring files or other tasks.
- PPP communication which gives WAN accessibility via modem.
- SNMP management (Base SNMP): Application that enables SNMP management with the agent itself.
Examples of additional functionality (applications) that can be added are (described in separate documents):
- SNMP Agent: Enables SNMP management with ASB 501 04.
- Agent Call Account Buffer (ACAB): Enables buffering of Call Information Logging records (CIL) from ASB 501 04.
6.2 Performance and limitations
- Six Telnet sessions can be connected to the agent at a time.
- Two FTP sessions can be connected to the agent at a time.
- A routing table can contain up to 11 entries.
- Up to eight PPP units can be used.
- Eight trap destinations can be defined.
- A maximum of 10 community entries can be defined in /cnf/communit.cnf.
- A maximum of 255 users and 255 groups can be defined for the agent.
- The maximum communication speed on the comports is 38400 bit/s.
- Free flash memory space (4.0/): about 4 MB. Maximum 100 files.
- RAM: 4 MB, including a 64 kB RAM disk (3.0/) with a maximum of 25 files.
6.3 Configurations
The configurations were made at the installation, but can be changed to fit the current situation. Refer to the installation instructions for ACCESS AGENT.
The following configuration can be made:
- Network
- Routing
- Log
- tncom
- PPP
- Authentication (SNMP)
- Trap destination ( SNMP)
- MIB-II system variables (SNMP)
6.4 Security
At each log in, the agent checks if the file /etc/passwd, which contains all user and password information, is present. If it is (which should normally be the case) the agent uses that file checking for authentication of the log in. If the /etc/passwd for some reason is not present, or is corrupt, the agent has a default user name and password that can be used. At delivery the default user name and password is:
- Login: root
- Password: sysadm
Winfiol 7.4 Serial Number
This user name and password should be changed directly in the Normal network configuration mode.
Note | An SNMP trap will be sent when a user fails to log in. |
The system administrator (user of the group root) can add other users (to the /etc/passwd file) using the Base system shell command adduser, see The base system shell. A system administrator can change all the users' passwords. The users can change their own passwords.
A maximum of 255 users can be defined. A user can belong to a group (stored in the /etc/group file) with the same file access rights. A maximum of 255 groups can be defined.
Different users can have different file access permission. Each file (and directory) has attributes determining the file access permission at three levels:
- the owner of the file
- the group of the owner
- others
The attributes are printed when ls -l is entered, for example:
- readme.txt rwxrwxr--
r = read
w = write
x = execute
- = the indicated permission is not granted
The leftmost three attributes are for the owner of the file, the next three are for the group of the owner, and the last three are for others.
The algorithm used when accessing a file is as follows:
- Is the current user the owner of the file?
Yes: check the owner file access permission.
- If the answer is no:
Does the user belong to the same group as the owner of the file?
Yes: check the group file access permission.
No: check the others file access permission.
The system administration group (root) is a special case; it is the only group that has execution rights and that can change attributes on files owned by another user.
There are Base system shell commands for handling the tasks concerning users, groups and passwords: (for more information, see the Base system shell)
- add user (adduser) (only executable for the system administration group)
- change file attributes and ownership (chmod, chown, chgrp) (only executable for the system administration group)
- change user password (passwd) (a non-system administrator can of course only change his own password)
Note: | The adduser and passwd commands update the two files in the directory, /etc/passwd and /etc/group. To remove a user or a group from the system, these files have to be edited manually. |
6.5 File descriptions
/: | |
BITMAP.SYS | System file |
FLIST.SYS | System file |
bsys.img | Soft image file, base system |
readme.txt | Important information. Always read it |
startup | Automatically read at start-up. Contains calls for the applications |
/bin/: | |
tncom | Application for V.24 to Telnet |
basesnmp | Application for SNMP management |
/cnf/: | |
comport.cnf | Configuration file for the comports |
communit.cnf | Configuration file for allowed communities |
log.cnf | Configuration file for log function |
mib2sys.cnf | Configuration file for MIB-II system variables |
trapcomm.cnf | Configuration file for where to send SNMP traps |
ppp.cnf | Configuration file for PPP communication |
ppp-auth.cnf | Configuration file defining passwords for PAP and CHAP (PPP) |
/etc/: | |
route | Configuration file for routing |
passwd | Containing all users and their passwords |
group | Containing all user groups and their members |
/man/: | A number of files containing the on-line help text. |
/mib/: | |
dna.mib | The D.N.A. MIB |
6.6 The base system shell
The shell used in the base system is a UNIX-style shell used for setting up and controlling the agent. For example the shell provides commands that can modify or add files. This can be an alternative to manipulate the files in an editor and then use FTP to copy them to the agent.
Note | The file system and the command interpreter are both case sensitive. |
The shell is a simple command interpreter. It has no wildcards (?, *, $) but it has the following notations for output redirection.
x >> y | Append x to the file y or, if the file does not exist, create a file y consisting of x. X can be a command generating text, see the example below. |
x > y | Create a file y with the contents x or, if the file already exists, overwrite the previous file. |
Examples:
- cat readme.txt >> myfile
Puts the contents of readme.txt last in the file myfile or, if the file does not exist, creates myfile.
- echo appl > startup
Replaces the contents of the file startup with the text appl or, if it does not exist, creates a startup file.
6.6.1 Most common commands
Only the options described here are supported by Ericsson.
Table 6-1. The most common commands
Command | Description |
---|---|
adduser | Adds a new user to the system by performing a dialogue. (System administrator only) |
cat | Concatenates and displays the named file. For example: cat mib2sys.cnf |
cd | Changes working directory |
chgrp | Changes the group ownership of a file. (System administrator only) Example: chgrp team1 mib2sys.cnf |
chmod | Changes file access permission. Example: chmod 750 mib2sys.cnf 750 is an octal number designed from the following modes: 400 The file may be read by the owner. 200 Write by owner. 100 Execute by owner. 040 Read by group of the owner. 020 Write by group of the owner. 010 Execute by group of the owner. 004 Read by others. 002 Write by others. 001 Execute by others. The desired numbers are summarized. 750 means that the file can be read, written and executed by the owner, read and executed by the group of the owner, and others have no permission. |
chown | Changes the owner of the file. Example: chown steve mib2sys.cnf |
config | Opens the Normal network configuration menu (System administrator only). For others: list the network configurations. See section: Network configuration. |
df | Displays free disk space on flash memory (4.0/) and RAM (3.0/). |
flstat | Displays flash file system statistics. |
help | Displays help text for the named command, or if used alone, lists all the commands. For example: help cat |
imginfo | Displays the revision of an executable file in the file system. |
ls | Lists the contents of the directory. ls -l lists the contents with some file details. ls -lg lists the group of the file owner |
man | The same as help. |
netstat | Shows network status, that is which IP addresses that are connected to the agent. Should be executed before reset to check for connected users. |
readcnf | This command does not belong to the shell; it belongs to the SNMP application. Reads the configuration files /cnf/trapcomm.cnf, /cnf/communit.cnf, /cnf/mib2sys.cnf and /INTERFACE. No restart is needed. |
passwd | Changes the password for the specified user by performing a dialogue. A user not belonging to the system administration group can only change the user's own password, whereas the administrator may change anyone's password. passwd[<user>] If a user wants to change the password (a system administrator can change all passwords) the own user does not have to be specified. |
ping | Sends a test question (ICMP ECHO_REQUEST packet) to the specified network host (must be an IP address). For example: ping 10.0.0.32 |
reset | Does a soft reset. Use who and/or netstat before resetting to check that no one is logged in. |
tncom | This command does not belong to the shell; it is an application. Makes the agent transparent: enables Telnet to V.24. See section: tncom, transparent Telnet to V.24 communication. |
who | Prints logged on users (compare with netstat) who prints all logged on users who am i prints the name of the current user |
6.6.2 Other commands
These commands are mainly meant to be used for development and internal purposes. They may be changed without notice.
Table: 6-2. Other commands
Command | Description |
---|---|
arp | Displays, sets, and deletes arp table entries |
clog | Re-reads the /cnf/log.cnf file and updates the log daemon |
cmp | Performs a byte-by-byte comparison of two files |
cp | Copies files |
date | Shows and sets date and time. Will not be saved after reset. (date [yyyymmddhhmm[.s]]) |
df | Returns free disk space (in bytes) |
du | Displays disk blocks usage |
echo | Echoes arguments to the standard output |
head | Displays the beginning of the specified file. |
ifconf | Sets network interface parameters |
mkdir | Makes a directory |
mkfs | Constructs a file system |
mount | Mounts a file system. See also umount. Example: mount 4.0 |
mv | Moves or renames files |
popd | Pops the directory stack and cd to the new top directory |
ppp | Controls PPP link status (ppp on€off) |
pushd | Pushes current directory onto the directory stack (pushd [dir]) |
pwd | Displays the pathname of the current working directory |
rm | Removes (unlinks) files |
rmdir | Removes (unlinks) directories |
route | Manipulates IP routing table |
sync | Flushes changed blocks in cache to disk |
tail | Displays the end of a specified file. |
touch | Updates the modification time of a file |
umount | Unmounts a file system. See also mount. Example: umount 4.0 |
version | Prints Boot and/or base system version |
6.7 tncom, transparent Telnet to V.24 communication
Application above the base system that establishes a connection in a TCP/IP network between a Telnet client and a V.24 port, via the agent. This way, the user can have a Telnet session directly to the ASB 501 04, without using SNMP management. This gives an opportunity to use the ASB 501 04's own interface for a more detailed control, or for transferring files or other tasks.
6.7.1 Initiation and configuration
For Telnet to V.24 support the files /bin/tncom and /cnf/comport.cnf have to be present on the agent's file system. /cnf/comport.cnf is a configuration file, described in installation instructions, ACCESS AGENT.
In the /startup file the line /bin/tncom has to be present to provide the Telnet to V.24 support. Normally, this is made during installation, but if it is not, add it and reset the agent.
6.7.2 Starting
- Start a Telnet session towards the agent and log in.
- When the prompt appears, write tncomcmd, where cmd is the name of the comport specified in the configuration file. For example:
- tncom mml
All the arguments of the tncom command are described in the next chapter.
- The Telnet session will now be transparently connected to the first unused comport described as mml in /cnf/comport.cnf. With the example below it would be port COM1. If no unused comport is available or mml was not found in the file, an error message will appear.
Example of the file /cnf/comport.cnf:
mml COM1 9600 8 n 1 XON/XOFF
6.7.3 Syntax
The tncom command can be used with a number of arguments:
- The user can specify a logfile to which all given input from the Telnet client is logged (the input on the comport is not logged)
- If the agent does not get contact with the device, a time out specifies after how many seconds it will terminate.
- Binary mode can be used for truly bit transparent communication (including ctrl-d), for transferring files. This means that the break-sequence specified by the Telnet client, usually ctrl-], has to be used to terminate.
- The user can force an ongoing session to terminate. The user must then have the same IP address as the previous session had.
- The name of the port, as mentioned earlier, or the number of the comport (1-4).
The syntax is as follows.
tncom <cmd> € <-c comport> [-f filename] [-t timeout] [-b] [-q]
where
cmd | The name of the comport referring to the file comport.cnf. Use either -c comport or cmd. |
-c comport | The number of the comport (1-4). Use either -c comport or cmd. |
-f filename | Logfile name |
-t timeout | Hardware flow control time out in seconds (0 = off) |
-b | Binary mode. The used comport cannot use xon/xoff for flow control (in comport.cnf) |
-q | Force an ongoing session, according to -c comport or cmd, to terminate. This option, however, can only be used from the same IP address as the ongoing session was previously started from. |
Note | Each tncom session can only be connected to one comport at a time. A comport can only be used by one tncom session (or other application) at a time. |
For example the command can look like this:
- tncom -f log.txt -t 5 mml
This specifies that all commands from the Telnet session will be stored in the logfile log.txt. The time out for the comport named mml is set to 5 seconds.
6.7.4 Downloading files with tncom
Do the following to transfer a file with tncom.
The Telnet client has to be able to transfer a file. (For example WINFIOL.)
- Log in to the agent.
- Start tncom.
- Log in to ASB 501 04.
- Prepare ASB 501 04 for receiving data.
- Transfer the file.
6.7.5 Quitting
To close the started Telnet to V.24 session, log out from the ASB 501 04. Press ctrl-d to close the Telnet session in the agent. If binary mode is used, quit using the break-sequence specified by the Telnet client, usually ctrl-].
tncom has no inactivity time out.
6.8 Point to Point Protocol, PPP
6.8.1 Introduction
The Point-to-Point Protocol (PPP) is a data-link layer protocol that encapsulates multiple network layer packets to run over a serial connection. PPP defines a protocol for link control, various network control protocols, and authentication protocols. Additionally, the PPP communication may take place over direct (leased) lines or dial-up lines connected by modems.The PPP driver supports the following functions
- Link Control Protocol (LCP ) for PPP link establishment
- IP Control Protocol (IPCP)
- Asynchronous serial links for direct connection
- Support for operation over leased or dial-up lines connected by modems
- On-demand dialling support
- CHAP and PAP authentication support
- Multiple PPP units over the same line
6.8.2 PPP configuration
For PPP communication there are the following configuration files:
- /cnf/ppp.cnf
- /cnf/ppp-auth.cnf
They are described in installation instructions for ACCESS AGENT.
For more information on how to use PPP, see operational directions for ADVANCED HANDLING OF ACCESS AGENT.
6.9 Base SNMP, the base agent MIBs
The Base SNMP application of Access Agent provides basic SNMP management of its own SNMP agent, not any other. For SNMP support for ASB 501 04, the SNMP Agent should be used.
The MIB (Management Information Base) is the formal definition as to which data can be retrieved using SNMP commands. Before they can be accessed the management station needs to integrate (compile) the MIB into its data base. The following MIBs are supported by the Base agent SNMP configuration.
- The standard MIB II as defined by RFC 1213.
- The D.N.A. MIB, the common MIB definition for D.N.A. network elements.
The D.N.A. MIB (filename /mib/dna.mib) defined in ASN.1 format is stored on the agent. It can then be accessed and downloaded from an SNMP manager.
Before any SNMP management can be used, the following configurations have to be made.
- Authentication: Define allowed users.
- Trap destination: Define where to send trap messages.
- MIB-II system variables: Part of MIB-II, defining the basic identification data for the agent.
They are described in installation instructions for ACCESS AGENT.
Winfoil Download
6.9.1 MIB-II
The agent supports MIB II as defined in RFC 1213 extended with the ifName variable from the ifXTable in RFC 1573.
6.9.2 The D.N.A. MIB
The Ericsson position within the global registration tree is:
iso(1).org(3).dod(6).internet(1).private(4).enterprise(1).ericsson(193)
The D.N.A. MIB structure within the Ericsson tree is:
Figure 6-1. The D.N.A. MIB structure within the Ericsson tree |
Before terminating, always key the command netstat to check that no one else is connected to the agent.