Академический Документы
Профессиональный Документы
Культура Документы
Copyright 2013 by Kentrox, Inc. All Rights Reserved. The material discussed in this publication
is the proprietary property of Kentrox, Inc. Kentrox retains all rights to reproduction and
distribution of this publication.
Kentrox is a registered trademark of Kentrox, Inc. Kentrox, the Kentrox logo, Applied Innovation,
Applied Innovation Inc., the AI logo, and other names are the intellectual property of Kentrox. All
other product names are trademarks or registered trademarks of their respective owners.
Information published here is current as of this documents date of publication, but is subject to
change without notice. You may verify product information by contacting our headquarters.
Kentrox is an Equal Opportunity/Affirmative Action employer.
Kentrox, Inc.
5800 Innovation Dr.
Dublin, Ohio USA 43016-3271
Toll Free: (800) 247-9482
International: +1 (614) 798-2000
Fax: +1 (614) 798-1770
FTP tools
SNMP
DHCP
IP tables
Document Conventions
Table 1 describes the text conventions used in this document.
Table 1 Document Conventions
ii
Convention
Meaning
Variable Command
Text
...
[ ]
[ | ]
{ | }
KEYS
Note:
Important:
Tip:
CAUTION:
iii
Do not remove cards from their antistatic plastic bags until you are
ready to install them into the chassis.
Immediately after you remove a card from the chassis, you must
insert it into its antistatic bag.
When the cards are not in use, keep them in their antistatic plastic
bags.
Ground Caution
CAUTION: For Kentrox equipment to operate safely and correctly, there must be a
safety ground strap between the equipment ground bolts and the office
ground.
FCC Warning
The Federal Communications Commission has set limits for emitted radio
interference and Remote RMM-1400 is constructed with this electromagnetic
interference (EMI) limitation in mind. Remote RMM-1400 is classified under FCC
regulations as a Class A device, that is, a device for use in commercial environments
and not in residential areas. This device has been tested and shown to comply with
the following FCC rule: Part 15 Subpart J. Operation of this equipment in a residential
area may cause interference to radio and TV reception, requiring the user to take
whatever steps are necessary to correct the interference.
Information is available from the FCC describing possible corrective actions. To
maintain low EMI levels, we suggest that you use only metal connectors and shielded
cable grounded to the frame.
Specifications are subject to change without notice.
iv
Customer Assistance
All customers, partners and resellers who have a valid Kentrox Support and Services
Agreement have complete access to the technical support resources.
Kentrox offers technical support from 8 a.m. to 8 p.m. Eastern time, Monday - Friday.
Before you contact Kentrox for assistance, please have the following information
available:
The error number and exact wording of any messages that appeared on your
screen
What happened and what you were doing when the problem occurred
Email Support
Email support is available. You may send email at any time during the day; however,
responses will be only be provided during normal business hours, in accordance with
your Service and Support Agreement.
To contact Technical Support, send email to:
support@kentrox.com
Telephone Support
Pre-sales support
Available, at no charge, to anyone who needs technical assistance in determining
how Kentrox products or solutions can help solve your technical needs.
Phone number: 800-733-5511, option 2
Hours of Operation: 8 a.m. 8 p.m. Eastern Time
Post-sales support
Available to qualified Kentrox customers or partners who have not been able to
resolve their technical issue by using our online services. To qualify for support, you
must have a valid Support and Services Agreement.
v
Product Documentation
You can also access and view the most current versions of Kentrox product
documentation on our Web site at:
http://www.kentrox.com
vi
Table of Contents
Chapter 1: Remote RMM-1400 Product Overview .................................1-1
Remote Product Overview ........................................................................................... 1-2
Summary of Remote RMM-1400 Functions ..................................................... 1-2
Remote Features .............................................................................................. 1-3
Remote RMM-1400 Hardware Configuration ............................................................... 1-4
RMB Peripheral Units ................................................................................................... 1-5
RMB-1 Peripheral Unit ..................................................................................... 1-5
RMB-2 Peripheral Unit ..................................................................................... 1-6
Table of Contents
Table of Contents
Chapter 13: Configuring Alarm Entries in the Central Alarm Table ......13-1
Overview .................................................................................................................... 13-2
Alarm Protocol Formats ............................................................................................. 13-3
Raw ................................................................................................................ 13-3
SNMP ............................................................................................................. 13-3
Configuring an Alarm Entry for a Temperature Sensor .............................................. 13-4
Configuring Analog Input Values .................................................................... 13-6
Configuring an Alarm Entry for a Discrete Input ......................................................... 13-9
Configuring an Alarm Entry for a Serial Connection Failure .................................... 13-11
Configuring an Alarm Entry for a TCP Connection that Goes Down ........................ 13-13
Configuring an Alarm Entry for a Telnet Connection that Comes Up ....................... 13-15
Testing Alarm Table Configurations ......................................................................... 13-17
Table of Contents
Table of Contents
TOC-5
Table of Contents
TOC-6
1
Remote RMM-1400 Product
Overview
This chapter provides a high level overview of Remote product features and functionality. In
addition, the hardware architecture and components of the Remote RMM-1400 and RMB
peripheral units are described.
1-1
Figure 1-1 Remote and Optima Integration for Remote Site Management
1-2
Remote Features
All Remote products include the following features:
1-3
Four Ethernet ports provide for connections to your network. Ports 1 and 2 can be
used as standard ports and can also provide 48V PoE to 802.3af-compliant
devices.
Four serial ports provide connectivity to any asynchronous device and can be
used as part of the Telnet to asynchronous protocol mediation application. Serial
ports 1 and 2 operate only in RS-232 mode. Serial ports 3 and 4 operate in RS422 mode or RS-485 mode. Serial port 4 can serve as a console port to provide
local asynchronous access for configuration and diagnostics from a laptop or PC.
Tx/Rx and Diversity antenna connections for the optional wireless modem.
1-4
A four-terminal SiteBus
Four sets of auxiliary terminals, which are not electrically connected to other
RMB-1 I/O terminals
For details on physically connecting to RMB-1 terminals, see the Remote RMM-1400
Installation Guide.
1-5
1-6
2
Getting Started
This chapter provides information on getting started with Remote RMM-1400. It includes step-bystep scenarios on how to access the CLI, set up the initial configuration and access the Web
interface.
2-1
Note: When a new Remote RMM-1400 is booted for the first time, it does not have
a configured IP address. As a result, the initial configuration for Remote
RMM-1400 must be performed onsite. For information about configuring an
IP address for remote logins, refer to Setting Up the Initial Remote RMM1400 Configuration on page 2-4.
To access the CLI using a local connection:
1. If you havent already done so, install Kentrox Redirect software on your laptop or
PC. When the installation is complete, Kentrox Redirect and Kentrox Kickstart
icons appear on your desktop.
2. Use a standard CAT5 Ethernet cable (such as Kentrox part number CAB182-10)
to connect the PC or laptop to an Ethernet port on Remote RMM-1400.
3. Launch Kentrox Kickstart. Kickstart discovers the Remote RMM-1400 device, as
shown below.
Note: If the Remote RMM-1400 device is not discovered within one minute,
select Help > About in Kentrox Kickstart, then click the Network
Troubleshooting Guide link for instructions.
4. Click Telnet Terminal (or select Tools > Telnet Terminal). A Telnet window
opens, displaying the Remote RMM-1400 login prompt.
5. At the login prompt, enter your user name:
admin
2-2
admin is the default user name and password is the default password.
Remote RMM-1400 allows you to log in only five times using the default
password. On your sixth login, Remote RMM-1400 will prompt you to
change the default password to a new password.
The main CLI prompt appears.
_
__
| | / /
| |/ /
|
(
| |\ \
|_| \_\
_____ _
_ _______ _____
____ __
__
| ___|| \ | ||___ ___|| _ \ /
\ \ \ / /
| |___ | \ \| |
| |
| (_) || -- | \ \/ /
| ___|| |\ \ |
| |
| _ / | ( ) | ) (
| |___ | | \ |
| |
| | \ \ | -- | / /\ \
|_____||_| \_|
|_|
|_| \_\ \____/ /_/ \_\
RMM-1400
login: admin
Password:
You have 4 grace logins remaining using the default user password.
(Kentrox)>
or
?
Note: For more information on using the CLI, refer to section CLI Overview in the
Remote RMM-1400 Command Reference Guide.
2-3
Configure a hostname
Configure the remote access protocol to accept Telnet and FTP connections
2. At the password prompt, enter the password mypassword. For security purposes,
the characters that you enter do not display, but appear as asterisks as shown
below:
**********
3. When prompted to confirm, re-enter the password. Again, the characters that you
enter appear as asterisks:
**********
5. Configure the banner with display text This is my banner and the current date
and time:
This is my banner.
\d
\t
#
2-4
8. Configure IP address.
Note: The Remote RMM-1400 supports IPv4 and IPv6 and provides the ability to
configure both IP protocols at the same time. Refer to Chapter 5: Configuring
Network Setup Parameters for more information on how to configure an IPv6
address.
For this scenario, use IP address 10.40.57.90 and subnet mask 255.255.0.0:
config interface bridge switch ip address 10.40.57.90 255.255.0.0
Note: The bridge switch interface forwards IP packets to the switched Ethernet
ports. You must assign an IP address to allow remote access to Remote
RMM-1400. This IP address is the primary Remote RMM-1400 IP
address.
9. Add a default route with gateway address 10.40.0.1:
config ip route default 10.40.0.1
2-5
11. (optional) Verify that the user environment has been set up properly:
running-config
Notes: The preceding example was obtained using a supervisor profile, which
displays the entire configuration; users with management and status
profiles can view limited configuration data.
The -e preceding the encrypted text indicates that the password and
password confirmation have been encrypted.
12. Save the configuration. (Refer to Saving the Running Configuration on page 4-2.)
2-6
Note: You can also connect remotely to Remote RMM-1400 using the HTTP or
HTTPS protocols.
To access the CLI using a remote connection:
1. Use a PC or laptop with terminal emulation software to connect to Remote RMM1400. For information on operating your particular terminal emulation software,
refer to the documentation provided with the program.
2. Set up your terminal emulation software to connect using either a Telnet or an
SSH connection.
Notes: Individual procedures for making this connection will vary based on the
type of software you are using.
To log into Remote RMM-1400 via SSH, you must execute command
config remote-access ssh-sftp enable
3. Enter the IP address of the Remote RMM-1400 to which you want to connect.
4. At the login prompt, enter your user name:
janedoe
admin is the default user name and password is the default password.
Remote RMM-1400 lets you log in only five times using the default
password. On your sixth login, Remote RMM-1400 will prompt you to
change the default password to a new password.
2-7
Before you can access the Remote RMM-1400 Web interface you must:
Configure the IP address. For more information, refer to Setting Up the Initial
Remote RMM-1400 Configuration on page 2-4.
Important: If using the HTTPS protocol and accessing the Web interface for the first
time, an error page will display indicating that there is a problem with the
website's security certificate. Click Continue to this website to accept
the security certificate and continue with the acceptance options as
prompted.
In this scenario, you will:
2-8
The Web interface opens to the Home page as shown in Figure 2-1.
5. To display the system information, click the System button on the left side of the
screen, or click the System Info link.
2-9
2-10
3
Configuring Users in the CLI
This chapter provides step-by-step scenarios on how to configure users.
3-1
2. At the password prompt, enter the new password. Note that the characters that
you enter do not display, but appear as asterisks:
**********
3. When prompted to confirm, enter the same password. Again, the characters that
you enter appear as asterisks:
**********
4. (optional) Verify that the new user has been added properly:
show users
3-2
Profile
supervisor
status
supervisor
1.
2.
3.
4.
5.
(Dub)>
Login Name
bob
ebh
jeff
tech
test
Profile
restricted
restricted
status
management
supervisor
3. Change the existing password for user ebh. The following example shows the
additional restrictions of the strong password feature.
(Dub)>config users password ebh
Please enter the new password. ********
Please confirm the new password. ********
[ATHM0029] Password must contain at least one character from three of the
following types: upper-case, lower-case, numerical and special
punctuation.
(Dub)>config users password ebh
Please enter the new password. *********
Please confirm the new password. *********
(Dub)>
3-3
Note: Passwords are case-sensitive and appear as asterisks (*) on the screen
as you type them.
The following message displays:
Please confirm the new password.
3-4
Deleting a User
In this scenario, you will delete a user.
To delete a user:
1. At the main prompt, delete user johndoe:
config users delete johndoe
Profile
supervisor
supervisor
Note: If the user has been deleted, it will no longer appear in the list of users.
3. Save the configuration.
3-5
2. Configure the base type for the new tech profile as status:
config profile tech copy status
5. Add user ebh to the newly created tech profile with password technician:
config users add ebh tech technician technician
6. (optional) Verify that the custom profile has been configured properly:
show profile tech
tech
tech
status
5
Command ID
/config/controller/eth
/config/interface/eth
/show/resource-tracking
(Dub)>
Action
include
include
exclude
4
Saving and Applying
Configurations
This chapter provides information on saving and applying configurations.
4-1
Note: You should save the configuration each time you make a change that you
want to keep. If you reset Remote RMM-1400 without first saving the
configuration, any unsaved changes will be lost.
To save the configuration, copy the running configuration to the startup configuration:
copy running-config startup-config
You can also save the running configuration from the Remote RMM-1400 Web
interface as follows:
1. Click the Configuration button on the left side of the screen or Configuration
from the Main Menu.
2. In the Save section of the screen, click one of the three options and make the
appropriate selection or entry as required.
3. Click the Save link. The screen refreshes and confirms your selection.
See Accessing the Web Interface on page 2-8 for details.
4-2
Note: Patches are separated into supervisor and non-supervisor groups. A user
with a supervisor profile can read, upload and apply supervisor patches
only. Non-supervisor users have a separate set of patches to read, upload
and apply. Remote checks user permissions to ensure appropriate
safeguards for uploading and applying all patch files.
Important: Before you begin this procedure, you must obtain or create a
configuration patch file with a .pat extension. Files without this
extension cannot be saved in the patch file directory. The patch file
cannot have the same name as any configuration file already loaded on
Remote RMM-1400.
To apply a configuration fragment to an existing configuration file:
1. Using an FTP utility, transfer the patch file (patch1.pat) to Remote RMM-1400
directory /config/patches.
2. At the CLI prompt, apply patch file patch1 to file running-config:
config apply-patch patch1 running-config
The individual command lines are displayed as the patch file is applied:
(Dub)>config apply-patch patch1 running-config
config users add manager1 manage test test
config no timeout
config ntp disable
config clock daylight-savings DST
(Dub)>
4-3
4-4
Note: For more information on the initsetup wizard, refer to Using the initsetup
Wizard on page 21-3.
To restore the basic network settings, copy the network recovery file to the running
configuration:
copy network-recovery running-config
You can also restore the network settings from the Remote Web interface as follows:
1. Click the Configuration button on the left side of the screen or Configuration
from the Main Menu.
2. In the Restore section of the screen, click From backup file:, then select
network-recovery from the drop-down menu.
3. Click the Restore link. The screen refreshes and confirms your selection.
See Accessing the Web Interface on page 2-8 for details.
4-5
4-6
5
Configuring Network Setup
Parameters
This chapter provides step-by-step scenarios on how to configure network setup parameters for
Remote RMM-1400.
5-1
Enable IP forwarding
4. Enable IP forwarding:
config ip forward
5-2
Tip: You can also use the show ip domain-name, show ip forward and show
ip name-server commands to verify the individual IP configurations.
6. Save the configuration.
5-3
Note: If an IPv6 router is advertising itself on the network and IPv6 is enabled on
the interface, the Remote RMM-1400 may acquire an IPv6 address from
the router in addition to the address configured.
2. (Optional) Verify that the interface bridge switch has been configured properly
with the IPv6 address:
show interfaces bridge
Note: The command response will also contain the link-local IPv6 address.
The command response similar to the following displays:
(Dub)>show interfaces bridge
bridge switch system-name=br_switch status=enabled link-state=up
address=10.39.50.10/16
link-local-address=169.254.166.87/16
ipv6 admin-state=enabled oper-state=enabled
address=fc10::39:240:72ff:fe0e:678d/64
valid=2591993sec preferred=604793sec dynamic
address=fd10::39:0:0:100/64
valid=forever preferred=forever
address=fd::39:0:0:100/64
valid=forever preferred=forever
address=fe80::240:72ff:fe0e:678d/64
valid=forever preferred=forever
(Dub)>
5-4
Configuring NTP
In this scenario, you will:
Enable NTP
To configure system clock parameters using the common clock time maintained by
the Remote RMM-1400 NTP server:
1. At the main prompt, configure the preferred NTP server with IP address
10.50.18.32:
config ntp server 10.50.18.32
Tip: The first server configured becomes the preferred server and the second
server configured becomes the secondary server, unless indicated
otherwise by entering prefer as in step 2.
2. Configure the second NTP server with IP address 10.50.18.33 and set it as the
preferred server:
config ntp server 10.50.18.33 prefer
3. Define the minimum NTP polling interval as 7 (128 seconds) and maximum NTP
polling interval as 12 (4096 seconds):
config ntp poll-interval 7 12
Tip: The value for the interval is 2 raised to the power of the value entered.
4. Enable NTP on Remote RMM-1400:
config ntp enable
5-5
5. (optional) Verify that the clock parameters have been configured properly:
running-config
Tip: You can also use the show ntp command to verify the NTP configuration.
6. Save the configuration.
5-6
Configure a timezone and use the default daylight savings settings. See
Configuring Default Settings for details.
Apply daylight savings rules from a timezone definition file. See Configuring a
Timezone Definition File for details.
Each method has a specific format for configuring a timezone. Depending upon the
format used, the daylight savings command will have different usages.
Important: You must disable NTP before you can configure the Remote RMM-1400
system clock locally.
1. At the config clock prompt, configure the timezone as EST with an offset of
-5:00. This puts the daylight savings configuration into default mode:
config clock timezone EST -5:00
2. Enable U.S. daylight savings rules and configure the name that displays when
daylight savings time is in effect:
config clock daylight-savings EDT
3. Configure the local time as 11:22:30 and the local date as 01/20/2010:
config clock local-time 11:22:30 01/20/2010
5-7
4. (optional) Verify that the clock parameters have been configured properly:
show clock
Tip: In the command response for show clock, the name assigned to indicate
that daylight savings is enabled will appear in the timestamp during daylight
savings. After daylight savings, the name of the configured timezone will
appear in the timestamp.
5. Save the configuration.
Important: You must disable NTP before you can configure the Remote RMM-1400
system clock locally.
1. At the config clock prompt, configure the timezone as EST with an offset of
-5:00 and set the daylight savings configuration in the custom mode:
config clock timezone custom EST -5:00
5-8
3. (optional) Verify that the clock parameters have been configured properly:
show clock
5-9
Zone entries, which identify the available timezones with their GMT offsets
and any applicable rules
Rules, which define valid date and time ranges and the amount of time saved.
1. To install a timezone definition file, establish an FTP connection into the system
and upload the definition file from your local workstation. A new directory will be
added under the config directory with a single file named timezones.def.
2. At the config clock prompt, apply the installed timezone definition file:
config clock timezone from-file EST
3. (optional) Verify that the clock parameters have been configured properly:
show clock
5-10
Note: A message displays indicating that the shell type configuration will not
take effect until the server is configured.
2. Configure the primary RAS server with the following settings:
IP address 10.50.18.32
Port 100
Secret tserver1
Note: RAS accounting and authorization take effect only when TACACS+ is
configured as the server type.
5-11
6. Configure how long Remote RMM-1400 waits for a response from the RAS server
before falling back on local authentication:
config ras timeout 30
7. (optional) Verify that the remote authentication settings have been configured
properly:
show ras
Port
100
(Dub)>
5-12
Secret
tserver1
Phases
authen author account
Configuring SNMP
In this scenario, you will:
Note: This scenario applies only when an SNMP management system is used to
manage Remote RMM-1400.
Note: The following management information bases (MIBs) are available for Remote
RMM-1400:
aiiDefs.mib
aiMediationV2.mib
aiPeriphDiscrete.mib
aiPeripheral.mib
aiSysCfg.mib
aiSysCfgConfig.mib
aiSystem.mib
aiSystemInv.mib
aiRosetta.mib
ktxMeasurement.mib
5-13
Notes: The queuing state occurs on an SNMP host when a ping fails and traps are
waiting to be sent. The sending state occurs on an SNMP host for all other
conditions related to trap queuing.
Trap queuing is always enabled for v2-inform type hosts, however ping is
not used. Instead, the oldest request in the queue is retried until a response
is received.
The command response similar to the following displays: verify the response
(Dub)>show snmp summary
Authentication traps: enabled
Trap queue: enabled
Communities:
Name
User
administrator
public
V3 Users:
Username
Auth
Hosts:
IP Address
Port Type
10.34.3.84
162
v1
fd10::39:0:0:200
162
v2-inform
Priority:
Trap OID
.1.3.6.1.6.3.1.1.5.3
(Dub)>
5-14
Type
v1
v1
Auth
noauth
noauth
Mode
readwrite
readonly
Priv
Auth
Community/User
noauth public
Queue
sending
noauth public
sending
Priority
high
3. Configure a host with the ip address of 12.34.56.78, port number 2, user name
eric, community type v3, with authentication (auth) but no encryption:
config snmp host 12.34.56.78 2 eric v3 auth
Auth
noauth
priv
noauth
priv
Mode
readwrite
readwrite
readonly
readwrite
Queue
sending
sending
5-15
5-16
6
Understanding Controllers and
Interfaces
This chapter provides information about controllers and interfaces and how they operate on
Remote RMM-1400.
6-1
Controller Descriptions
A controller is a software object on Remote RMM-1400 that serves as a destination
for a data bit stream. There are four types of controllers that can be configured in the
Remote RMM-1400 CLI:
Bridge Controllers
Ethernet Controllers
OpenVPN Controllers
Serial Controllers
Bridge Controllers
There is only one bridge controller on Remote RMM-1400. The controller is named
bridge switch because it is a bridge that (by default) includes all four of the Ethernet
switch ports. Controller bridge switch can be configured to include or exclude
individual Ethernet ports.
This and the next section imply that Ethernet controllers are always on the bridge.
Ethernet Controllers
There are four Ethernet controllers on every Remote RMM-1400 model. They
represent the four local switched Ethernet ports and can be included or excluded on
the bridge controller.
The Remote RMM-1400 supports up to 12 optional RME-E8 expansion cards. The
RME-E8 ports are automatically included on the bridge controller with the on-board
Ethernet ports. The RME-E8 ports cannot be excluded from the bridge controller but
they can be disabled.
Each individual controller on the RME-E8 can be enabled or disabled. Disabled ports
are unable to carry traffic preventing unauthorized access to the network. Each
controller is set to enable by default and can be managed separately. The controllers
are created when the RME-E8 peripheral type is configured on a unit and removed
when the type is removed. The controllers have a limited set of configuration options
compared to on-board Ethernet controllers.
OpenVPN Controllers
OpenVPN controllers use the OpenVPN software package to manage VPN
connections. The Remote RMM-1400 OpenVPN controllers can be configured for
either client mode or site-server mode.
An OpenVPN controller in the client mode is used to establish a VPN connection
between a Remote RMM-1400 client and the Connect SCS server. This VPN
connection provides a secure link between remote sites and the protected customer
management network.
6-2
Serial Controllers
Remote RMM-1400 has four asynchronous serial controllers. In addition, Remote
RMM-1400 can be equipped with an EvDO or UMTS phone module. The phone is
identified as serial modem.
Interface Descriptions
An interface is an entity to which you can route IP packets. Interfaces must be
associated with controllers, which may be underlying physical ports. There are four
types of interfaces that can be configured in the Remote RMM-1400 CLI:
Bridge Interfaces
Ethernet Interfaces
OpenVPN Interfaces
Serial Interfaces
Bridge Interfaces
The bridge interface works in conjunction with the bridge controller switch. It is used
to bridge Ethernet ports and initially includes the four switched Ethernet ports. An IP
address can be assigned to the bridge switch interface, providing a mechanism to
route IP packets to the four switched Ethernet ports on Remote RMM-1400. The IP
address assigned to the bridge interface is Remote RMM-1400s primary IP address.
For more information, refer to Setting Up the Initial Remote RMM-1400 Configuration
on page 2-4.
Ethernet Interfaces
Ethernet interfaces are individually configurable on Remote RMM-1400, allowing you
to set them up with static routes. By default, Ethernet interfaces are part of the bridge
switch. To configure an Ethernet interface with its own IP address, you must first
remove it from the bridge switch with the command:
config controller ethernet port no bridge
Refer to the Remote RMM-1400 Command Reference Guide for details on using this
command.
6-3
OpenVPN Interfaces
Like Ethernet interfaces, OpenVPN interfaces are individually configurable on
Remote RMM-1400. This capability lets users set them up with static routes.
The OpenVPN interface can be associated with two types of OpenVPN controller
modes, client and site-server.
Serial Interfaces
Interfaces are not configurable for Remote RMM-1400s four asynchronous serial
ports. However, an interface can be configured for the wireless phone module
(serial modem).
The modem interface works in conjunction with the serial controller connected to the
wireless modem. By configuring an IP address for the modem interface, IP packets
can be routed through the modem.
6-4
7
Configuring Static Routes
This chapter provides step-by-step scenarios on how to configure static routes in the IP routing
table.
7-1
2. (optional) Verify that the IPv4 static route has been added properly:
show ip route
7-2
Interface
bridge switch
*
lo
bridge switch
Flags
Up
Reject Up
Host Up
Up
2. (optional) Verify the default static route has been added properly:
show ip route
Gateway
10.40.0.1
0.0.0.0
0.0.0.0
0.0.0.0
10.40.2.18
0.0.0.0
Interface
openvpn client
bridge switch
*
lo
bridge switch
serial wan/1
Flags
Up
Up
Reject Up
Up Host
Up
Up Host
7-3
2. (optional) Verify that the IPv6 static route has been added properly:
show ip route
7-4
Gateway
10.39.0.1
0.0.0.0
0.0.0.0
0.0.0.0
0.0.0.0
Interface
bridge switch
bridge switch
*
lo
bridge switch
::
::
fd10::39:0:0:1:1
::
::
ff02::fb
ff02::1:ffcb:4e8b
bridge
bridge
bridge
bridge
bridge
bridge
bridge
switch
switch
switch
switch
switch
switch
switch
Flags
Up
Up
Up Reject
Up Host
Up
Up
Up
Up
Up
Up
Up
Up
2. (optional) Verify the default IPv6 static route has been properly added:
show ip route
Gateway
10.39.0.1
0.0.0.0
0.0.0.0
0.0.0.0
0.0.0.0
0.0.0.0
0.0.0.0
127.0.0.1
Interface
bridge switch
bridge switch
*
lo
bridge switch
openvpn site
openvpn site
lo
fe80::e611:5bff:fecb:4e8b
bridge
fd10::39:0:0:1
bridge
::
bridge
::
bridge
::
bridge
::
bridge
ff02::1
bridge
switch
switch
switch
switch
switch
switch
switch
Flags
Up
Up
Up Reject
Up Host
Up
Up Host
Up
Up Host
Up
Up
Up
Up
Up
Up
Up
Note: If an IPv6 router is advertising itself on the network and IPv6 is enabled on
the interface, the Remote RMM-1400 route table may include a route
which uses the routers link-local IPV6 address as the default IPv6 static
route.
3. Save the configuration.
7-5
7-6
8
Configuring a Wireless Network
with Remote RMM-1400
This chapter provides information about configuring a wireless network with Remote RMM-1400.
8-1
Getting Started
This section discusses the following topics:
Required Components
Initial Setup
Required Components
When operating in a wireless network, Remote RMM-1400 works in conjunction with
the following Kentrox products:
Connect SCS
Connect SCS acts as the VPN server for Remote RMM-1400. For more information
about Connect SCS, refer to the Connect SCS Configuration Guide.
Director SCD
Director SCD manages VPN clients and servers. It uses Director models and
protocols to identify NEs as VPN clients or servers and manages associations
between the clients and servers. Additionally, Director SCD manages client and
server tokens.
Note: A token is created by the SCD for each VPN client or server. The token must
be installed on the client or server before it can connect to the VPN. The token
is contained in a configuration bundle with a patch file for configuring the VPN.
8-2
The Client OpenVPN controller on the Remote RMM-1400 uses OpenVPN software
to establish the VPN between Connect SCS and Remote RMM-1400. SSL is used to
manage the VPN connection and encrypted UDP packets are used for data
transmission. Both the management and data traffic are passed as UDP packets on a
single port and are able to travel through the customers firewalls. The customers
external firewall needs to open one port to the Connect SCS for all connected client
network elements.
Keep-alive packets are sent by both the Remote RMM-1400 and Connect SCS to
detect connection failures and to keep an active firewall state.
Initial Setup
Users must set up the following configurations for Remote RMM-1400 to operate in a
wireless network.
To set up the initial configurations:
1. Connect to Remote RMM-1400, log into the CLI and run the initsetup wizard using
command config use-wizard initsetup.
2. Configure the standard configuration parameters (such as users, SNMP,
networking and time).
3. (optional) If the management network is available, then connect to it and run the
Director SCD client application. Once the Director SCD client application is
running, the technician must:
Access the SCD client from a location that has network access.
8-3
Sample Configuration
Figure 8-1 displays Remote RMM-1400 being used in a wireless network with
Connect SCS, which acts as the VPN server and Director SCD, which manages the
VPN client and server.
8-4
Note: This procedure configures a UMTS wireless modem. The same procedure can
be used to configure an EvDO wireless modem with the addition of the
activation step (see note below).
In this scenario, you will:
8-5
A default route that uses the same subnet as the corresponding interface
Notes: This command overrides the default route assigned to Remote RMM1400 via command config ip route default. PPP configured with
the default route option and command config ip route default are
mutually exclusive. You should not have both configured.
PPP username and password may vary by wireless carrier. Consult your
network provider for the proper identification information.
5. (optional) Verify that the UMTS serial controller has been configured properly:
show controllers serial modem
7. (optional) Verify that the UMTS serial interface has been configured properly:
show interfaces serial modem
Overrun
0
0
Framing
0
0
8-7
Note: The cipher configured for Remote RMM-1400 must match what is
configured on the Connect SCS. If there's a mismatch, the VPN will not be
established.
3. Configure server IP address 205.245.180.48 and port number 1194 for
OpenVPN controller client:
config controller openvpn client server 205.245.180.48 1194
4. (optional) Verify that the OpenVPN controller has been configured properly:
show controllers openvpn
8-8
8-9
8-10
9
Configuring a Site VPN Connection
This chapter provides a detailed site VPN configuration example. Also included in this chapter
are step-by-step scenarios on how to configure the site LAN, the site VPN and how to establish
the VPN from the client using the Remote RMM-1400.
9-1
Getting Started
A major feature of the Remote RMM-1400 is the ability to provide secure remote
access to site network elements.
A site VPN connection can be temporarily established between a client and the
Remote RMM-1400. The Remote RMM-1400 uses the OpenVPN software package
to establish the VPN connection. A VPN connection from the client to the site allows
IP connectivity without the problems of using port based NAT.
A firewall is implemented on the Remote RMM-1400 to restrict the traffic to approved
IP addresses and ports at the site.
Configuration Requirements
The Remote RMM-1400 uses an OpenVPN controller instance configured in the
site-server mode to establish the site VPN connection from the client. An
OpenVPN controller instance in the site-server mode can be used in addition to an
OpenVPN controller instance in the client mode for secure wireless backhaul.
Optima
Optima is a web-based software application that provides complete visibility and
control of network infrastructure sites, such as cell sites, substations and remote
communication huts and all its systems including power, environmental, security and
networking.
Optima provides a Remote RMM-1400 connectivity page that displays detailed
information (protocol, port and cipher) about the site VPN. Redirect uses the site VPN
information passed by Optima to establish the site VPN connection before launching
applications to the site network elements.
Redirect
The Redirect software manages the site VPN connection to the Remote RMM-1400
that enables access to the network elements on the site's private LAN. Redirect
bundles OpenVPN client and supporting Kentrox data (e.g. server authentication
certificates) to perform the site VPN connection.
Redirect supports one VPN connection at a time. To establish a new VPN connection
to a different site, Redirect automatically disconnects the previous connection and
establishes the new connection.
9-2
Configuration Example
Figure 9-1 provides a detailed example of how the site VPN connection between
Client 1 and Remote RMM-1400 is configured.
In the following example, both Client 1 and Remote RMM-1400 are connected to the
Intranet. Redirect on Client 1 uses the IP address on the Remote RMM-1400 on the
Intranet to establish the site VPN connection to access Site NE 1 and Site NE 2.
Figure 9-1 Site VPN Connection between Client 1 and the Remote RMM-1400
The site LAN network in this example is 192.168.111.0/24. The IP address of Site
NE 1 is 192.168.111.100/24 and the IP address of Site NE 2 is
192.168.111.101/24.
The IP address of the site VPN interface on the Remote RMM-1400 is
192.168.101.1/24.
9-3
After the site VPN connection is established between Client 1 and the Remote RMM1400, the client is assigned a point-to-point (site VPN) IP address
192.168.101.6/30.
The peers IP address is 192.168.101.5/30 on the Remote RMM-1400. The routes
to the site LAN network are pushed to Client 1. These routes are listed in the Routes
added box at the top of the diagram. The firewall rules are added based on the allowaccess configurations on the Remote RMM-1400 defined by the user.
The Remote RMM-1400 must be configured with the IP address, protocol and port
number that will be used when making connections from the clients to the site network
elements. All other traffic will be blocked by the firewall on the Remote RMM-1400.
9-4
Note: The type of interface to be used for the site LAN must be decided upon before
a site VPN connection can be configured. In the following scenario, ethernet
port 3 interface is used.
In this scenario, you will:
Enable IP forwarding
Note: In order to configure the site LAN, first remove the ethernet controller from the
bridge group.
To configure the site LAN:
1. Remove controller ethernet 3 from bridge group:
config controller ethernet 3 no bridge
3. Enable IP forwarding:
config ip forward
9-5
Configure the IP address and ports to access over the site VPN
3. Configure the routes for the site VPN clients to reach the site LAN:
config controller openvpn site client-route ethernet 3
4. Configure the IP addresses and ports of the site NEs to be accessed over the site
VPN:
config controller openvpn allow-access 192.168.111.100 tcp 20-80
tcp 443 udp 161
config controller openvpn allow-access 192.168.111.101 tcp 20-80
tcp 443 udp 161
Notes: By default, the Remote RMM-1400 blocks all traffic to the site LAN.
9-6
ICMP ping requests and replies are automatically allowed for each IP
address specified.
6. Show the number of clients that are currently connected to the site VPN:
show controllers openvpn site client-count
9-7
Note: Refer to the Optima and Redirect documentation for additional information on
how to establish VPN connections.
In this scenario, you will:
Note: A connection from the client to the Remote RMM-1400 using Optima or
Redirect must first be opened before performing the following procedure.
To verify that a client is connected:
show controllers openvpn site clients
Note: From the client, site NE 1 (IP address 192.168.111.100) and site NE 2
(192.168.111.101) can be accessed using ping, telnet, ssh, http, https or
snmp.
9-8
10
Configuring Actions, Events and
Responses
This chapter provides information about actions, events and responses.
10-1
Overview
Actions are rules in Remote RMM-1400 that provide a flexible mechanism for
managing system mediation by letting users associate events and responses. Actions
provide the ability to configure an extensive range of behavior in response to external
or internal events. Actions consist of three components:
During normal Remote RMM-1400 operation, internal event messages are generated.
A subsystem called the Action Manager keeps a list of actions and monitors all the
event messages. When an event message matches an event configured in an action,
the Action Manager generates the corresponding response message. Each
responder in the system monitors the response messages and executes responses
directed to it.
Note: Several commands exist in the Remote RMM-1400 CLI that display diagnostic
information related to actions: show actions, show events, show
responses, show audit actions, show audit events, show audit
responses and diag mmdisplay. For more information about display and
diagnostic commands, refer to the Remote RMM-1400 Command Reference
Guide.
10-2
Event Components
Figure 10-1 illustrates a sample event configuration:
event name
originator
event type
An event type, which is a system occurrence that signifies the event. Options for
the event type vary based on the event originator.
Note: For more information about event configuration commands and parameters,
refer to the Remote RMM-1400 Command Reference Guide.
10-3
Response Components
Figure 10-2 illustrates a sample response configuration:
response name
responder
response type
A response type, which defines what the response does when the associated
event occurs. Options for the response type vary based on the responder.
10-4
Action Components
Figure 10-3 illustrates a sample action configuration:
action name
event name
response name
Note: For more information about this command, refer to the Remote RMM-1400
Command Reference Guide.
10-5
Configure an event that occurs when the temperature on RMB goes above a
high threshold
Note: For information about specific event originators and event types, refer to
command config event content in the Remote RMM-1400 Command
Reference Guide.
2. Configure response Output1_3 with responder output 1/3 and response type
open:
config response Output1_3 content output 1/3 open
Note: For information about specific responders and response types, refer to the
response configuration commands in the Remote RMM-1400 Command
Reference Guide.
3. Configure action Chassis_Temp_High with event High_Temp and response
Output1_3:
config action Chassis_Temp_High event High_Temp response Output1_3
10-6
Name
Description
Originator
Type
: High_Temp
:
: analog 1/temperature
: high
Response Name
: Output1_3
Response Description :
Response Responder
: output 1/3
Response Type
: open
Response Parameters :
No parameters configured for this response.
(Dub)>
10-7
10-8
11
Configuring Technician Laptop
Access for Remote RMM-1400
This chapter provides information on configuring Remote RMM-1400 network access to locallyconnected technician laptops.
11-1
Configuration Overview
Figure 11-1 displays what happens when a technicians laptop accesses the network
by connecting to Remote RMM-1400.
64.152.3.27
(Public Address)
IP Network
Server
IPTables rules allow laptops
on the private network to
send packets to the WAN with
Remote RMM-1400s public address.
(184.155.22.36)
DHCP Server
IPTables
Remote RMM-1400
11-2
When the technicians laptop is connected to one of the Ethernet ports on Remote
RMM-1400, the DHCP server automatically assigns an IP address to the laptop. IP
addresses that may be assigned to the technicians laptop are configured using
DHCP server configuration commands in the Remote RMM-1400 CLI. For more
information on configuring the DHCP server, refer to section Assigning IP Addresses
to Technician Laptops on page 11-4.
IPTables is configured for Network Address Translation (NAT) to allow multiple
laptops to use private IP addresses on the local network and a single public IP
address on the WAN. For more information on configuring IPTables and NAT, refer to
section Configuring IPTables for Network Address Translation on page 11-6.
Tip: If you have available public IP addresses, DHCP can assign them to connected
laptops, which lets you skip the IPTables configuration.
11-3
Configure the default time that a network device can keep a DHCP
server-assigned IP address
Configure the maximum time that a network device can keep a DHCP
server-assigned IP address.
Important: This step is important because an interface must exist on the same
subnet that the DHCP server will be servicing. If this interface does
not exist, the DHCP server will not start up.
3. Configure the DHCP server interface as bridge switch:
config dhcp-server interface bridge switch
11-4
8. Configure the maximum time that a network device can keep an IP address
assigned by the DHCP server as 6000 seconds:
config dhcp-server subnet 10.10.10.0/24 max-lease 6000
9. (optional) Verify that the DHCP server has been configured properly:
show dhcp-server
11-5
Note: For more information on IPTables, refer to an IPTables man page (version
1.2.7a).
In this scenario, you will:
Configure a rule in the PREROUTING chain that accepts all packets from a
source subnet that go to a specified destination address
Set the default action for the PREROUTING chain to drop all packets
2. Configure a rule in the PREROUTING chain in the mangle table that accepts all
packets from source subnet 10.10.10.0/24 and to destination address
184.155.22.36:
config iptables -t mangle -A PREROUTING -s 10.10.10.0/24 -d
184.155.22.36 -j ACCEPT
3. Set the default action for the PREROUTING chain to drop all packets:
config iptables t mangle P PREROUTING DROP
11-6
4. Configure a rule in the POSTROUTING chain that masquerades all tcp packets from
source subnet 10.10.10.0/24:
config iptables -t nat -A POSTROUTING -s 10.10.10.0/24 -p tcp -j
MASQUERADE
5. (optional) Verify that the IPTables commands have been configured properly:
show iptables configuration
Table filter
------------------------------------------------------Chain INPUT (policy ACCEPT)
-i lo -j ACCEPT
Chain FORWARD (policy ACCEPT)
Chain OUTPUT (policy ACCEPT)
-d 127.0.0.0/8 -j ACCEPT
Table mangle
------------------------------------------------------Chain PREROUTING (policy DROP)
-i lo -j ACCEPT
-s 10.10.10.0/24 -d 184.155.22.36 -j ACCEPT
Chain INPUT (policy ACCEPT)
-i lo -j ACCEPT
Chain FORWARD (policy ACCEPT)
Chain OUTPUT (policy ACCEPT)
-d 127.0.0.0/8 -j ACCEPT
Chain POSTROUTING (policy ACCEPT)
-d 127.0.0.0/8 -j ACCEPT
(Dub)>
11-7
11-8
12
Configuring Event Correlations
This chapter provides information about configuring event correlations.
12-1
Overview
Event correlation is the ability to identify a unique condition by comparing the states of
multiple events and aggregating into a single event.
The goals of Remote RMM-1400 event correlation are to:
12-2
Operator
and
Term
Instance value, which is one of the valid instances for the specified type, for
example, 1/1, 2.
State, which is a valid state for the originator. In the case of a measurement, the
state may be a relational operator and a numeric value (for example, < 48 or
> 95).
Multi Support
analog
input
close, open
output
close, open
correlation
false, true
no
measurement
12-3
Examples
Examples of these components combined are shown below:
analog 1/1 high
correlation examplecorr false
measurement ExtTemp1 > 90
Operators
The valid operators that can be used in a correlation expression are listed in the
following table, along with possible usages and example results for each.
Table 12-2 Operators and Usage
Operator
Usage
Example Result
and
or
not
all
any
Expression Evaluation
In an expression, the precedence order for evaluation is as follows:
1. Term
2. not
3. and
4. or
If a Term is a nested expression, it is fully evaluated as the evaluation of the Term, as
is typical with most programming languages. Nested expressions in parentheses are
supported, allowing complex expressions to be contained in a single correlation
expression. The use of parentheses can improve the readability of expressions which
mix and, not and or operators.
12-4
Example Expressions
The examples below show various forms of Terms in nested expressions.
all input
1/1 low )
not ( any
false )
all input
all input
12-5
Configure the time (duration) for which the expression must remain true or false
before the correlation matches the expressions state
Create two alarm table entries for the open door events.
2. Configure the true duration time in the expression for 900 seconds, meaning an
alarm will be sent if the door is open for 15 minutes; set the false duration time to
0 seconds (immediate), meaning an alarm will be sent immediately upon closure:
config correlation DoorAlarms duration 900 0
3. Configure the correlation expression for the two doors as input 1/1 open and
input 1/2 open:
config correlation DoorAlarms expression input 1/1 open and input
1/2 open
12-6
To configure the alarm table entry for the open door correlation:
1. At the main prompt, configure the alarm entry name dooropen:
config alarm-entry dooropen
12-7
12-8
13
Configuring Alarm Entries in the
Central Alarm Table
This chapter provides an overview of the central alarm table along with step-by-step scenarios
for configuring and using alarm entries in the central alarm table.
13-1
Overview
The central alarm table collects and communicates the state of all alarms reported by
Remote RMM-1400. It is a table of alarm entries that contains information for each
attainable severity level and has the following features:
Alarm reporting in a variety of formatsThe central alarm table can report alarm
statuses in raw format, or in SNMP format. For more information on these
formats, refer to section Alarm Protocol Formats on page 13-3.
For information about commands that configure central alarm table entries and data,
refer to the Remote RMM-1400 Command Reference Guide.
13-2
Raw
SNMP
You can enable and disable each alarm protocol format independently of the other
(meaning that you can have both formats enabled).
Raw
The central alarm table supports raw alarm output that can be used for alarm formats
that are not directly supported by Remote RMM-1400. A script or application can take
the alarm information from the raw output and translate it into any type of alarm
message.
SNMP
The central alarm table supports SNMP through alarm traps in the aiMediationV2.mib.
Alarm traps are sent to all enabled SNMP management hosts. In order to receive
alarm traps, at least one SNMP management host must be configured.
13-3
Configure the interval at which the alarm will send its state
Configure the alarm actions that signal when the detected temperature has
exceeded a maximum threshold, passed below a minimum threshold, or
entered into an acceptable range.
Important: This scenario does not show how to configure the analog input that is
associated with the alarm entry. For information on configuring analog
inputs, refer to command config discrete analog in the Remote
RMM-1400 Command Reference Guide.
To configure the temperature sensor alarm entry:
1. At the main prompt, configure description Temperature sensor:
config alarm-entry tempSensor description Temperature sensor
5. Configure the interval at which the alarm entry sends its state information to 5
seconds when the alarm state is critical:
config alarm-entry tempSensor nagging 5 critical
13-4
7. Configure an event for alarm entry tempSensor with the following settings:
Note: Keyword $(value) is replaced with the current value of the analog input. If the
event associated with the analog input does not contain an event message
value, no substitution takes place.
8. Configure a second event for alarm entry tempSensor with the following settings:
Important: All events configured for an alarm entry must have the same event
originator.
9. Configure a third event for alarm entry tempSensor with the following settings:
13-5
10. (optional) Verify that the alarm entry has been configured properly:
show alarm-entries name tempSensor
13-6
Analog Averaging
Users can specify the level at which Remote will average measurement values. The
goal is for a reasonable, steady-state value to measure consistently with both the
Remote and an external meter. Summarized in Table 13-1 are the valid averaging
values with typical examples of when they may be applied to a measurement.
Table 13-1 Analog Averaging Values
Measurement
Example
Value
Description
high
Temperature/Humidity
medium
Fuel Level
low
Battery Voltage
none
The following example shows how to configure discrete analog 1/1 with medium
level averaging:
config discrete analog 1/1 averaging medium
Analog Adjustment
A fixed adjustment can be applied to an analog input value to raise or lower the value
to match a reference value. By adjusting both the minimum and maximum sensor
readings by the same amount, the offset can be applied without changing the scaling
factor of the analog input. Note that these values affect only the current conditions.
13-7
For example, to configure a voltage sensor for 0-10V scaling to 0-100 gallons of fuel,
an offset of +7 gallons can be applied by scaling the 0-10V to 7-107 gallons. This
scenario is configured as follows:
config discrete analog 1/1 minimum 0 7
config discrete analog 1/1 maximum 10 107
13-8
Configure an alarm action that occurs when a light turns off, which opens an
input
Configure an alarm action that occurs when a light turns on, which closes an
input.
Important: This scenario does not show how to configure the discrete input that is
associated with the alarm entry. For information on configuring
discrete inputs, refer to command config discrete input in the
Remote RMM-1400 Command Reference Guide.
To configure the open input alarm entry:
1. At the main prompt, configure description Light switch:
config alarm-entry input1_1 description Light Switch
3. Configure an event for alarm entry input1_1 with the following settings:
config alarm-entry input1_1 event input 1/1 open major Light off
4. Configure an event for alarm entry input1_1 with the following settings:
13-9
5. (optional) Verify that the alarm entry has been configured properly:
show alarm-entries name input1_1
13-10
Configure an alarm action that signals that a serial connection failure has
occurred.
Important: This scenario does not show how to configure the serial port that is
associated with the alarm entry. For information on configuring serial
ports, refer to command config controller serial in the Remote
RMM-1400 Command Reference Guide.
To configure an alarm entry for a serial connection failure:
1. At the main prompt, configure description Serial connection failure:
config alarm-entry SerConnFail description Serial connection
failure
3. Configure an event for alarm entry SerConnFail with the following settings:
13-11
4. (optional) Verify that the alarm entry has been configured properly:
show alarm-entries name SerConnFail
13-12
Configure an alarm action that signals that a TCP connection has gone down.
3. Configure an event for alarm entry TCPConnDown with the following settings:
config alarm-entry TCPConnDown event tcp 192.168.0.12:5001 conndown major TCP connection down
13-13
4. (optional) Verify that the alarm entry has been configured properly:
show alarm-entries name TCPConnDown
13-14
Configure an alarm action that signals that a Telnet connection has come up.
3. Configure an event for alarm entry TelnetConnUp with the following settings:
Tip: This same scenario can be followed to configure a connection up alarm entry for
SSH. Simply substitute SSH for Telnet.
13-15
4. (optional) Verify that the alarm entry has been configured properly:
show alarm-entries name TelnetConnUp
13-16
This command response displays the alarm entries that are currently being
simulated (in test mode).
(Dub)>show
(Dub) show>test
(Dub) show test> alarm-entries
Name
State
Current alarm message
---------------------------------------------------------------------Explosive_Gas
normal
Explosive Gas Not Detected
GPS_Failure
normal
GPS Normal
Generator_OilPressur normal
--NewTest
normal
--Toxic_Gas
normal
--(Dub) show test
13-17
13-18
14
Configuring Measurements and the
Measurement Table
This chapter provides an overview of Remote RMM-1400s measurement table along with stepby-step scenarios for configuring a measurement table entry, an alarm entry for a measurement
and an event correlation for a measurement.
14-1
Overview
In addition to its central alarm table, Remote RMM-1400 provides a measurement
table that collects analog measurement values and reports these values to a central
management station, such as Optima. These measurement values can be sourced
from an analog input monitored by Remote RMM-1400, from a script running on
Remote RMM-1400 that monitors an attached network element, or via SNMP from a
network element that is monitored by SNMP proxy. The Remote RMM-1400
measurement table stores a 24-hour history of collected values.
14-2
You can configure a measurement table entry such that the state of the measurement
will change based on the current value of the measurement. These states include:
LowThe value has passed below the minimum value that is considered normal
In-bandThe value falls between the minimum normal value and the maximum
normal value
HighThe value has passed above the maximum value that is considered normal
OfflineThe originator of the value has gone offline and is not reporting a value
14-3
10. (optional) Verify that the measurement table entry has been configured properly:
show meas-table entries ExtTemp1
76
76
76
76
76
14-5
Configure the network element name associated with this alarm entry
5. Configure an event for alarm entry ExtTemp with the following settings:
14-6
6. Configure an event for alarm entry ExtTemp with the following settings:
7. Configure an event for alarm entry ExtTemp with the following settings:
8. Configure an event for alarm entry ExtTemp with the following settings:
config alarm-entry ExtTemp event measurement ExtTemp1 inputsaturated critical Input saturated
9. Configure an event for alarm entry ExtTemp with the following settings:
config alarm-entry ExtTemp event measurement ExtTemp1 loss-ofsignal critical Signal loss
14-7
10. (optional) Verify that the alarm entry has been configured properly:
show alarm-entries name ExtTemp
14-8
Configure the time (duration) for which the expression must remain true or false
before the correlation matches the expressions state
3. Configure the true duration time in the expression for 120 seconds, meaning an
alarm will be sent if these conditions persist for two minutes; set the false duration
time to 0 seconds (immediate), meaning an alarm will be sent immediately when
either condition no longer exists:
config correlation FireDanger duration 90 0
14-9
To configure the alarm table entry for the fire danger correlation:
1. At the main prompt, configure the alarm entry name dooropen:
config alarm-entry fireDanger
14-10
15
Configuring Mediation Connections
This chapter provides information about how to configure mediation connections, events,
responses and actions.
15-1
Overview
Mediation connections allow you to connect different protocols. Examples of
mediation connections include:
15-2
15-3
Note: The TCP originator IP address is optional if it is the same as the Remote
RMM-1400 bridge switch interface IP address.
2. Configure response tcp40010ToSerial2 with responder tcp 10.40.57.5:40010
and response type dest serial 2:
config response tcp40010ToSerial2 content tcp 10.40.57.5:40010
connect dest serial 2
4. (optional) Verify that the TCP to asynchronous connection has been configured
properly:
show actions tcpToSerial2
Name
Description
Originator
Type
Response
Response
Response
Response
Response
(Dub)>
15-4
Name
Description
Responder
Type
Parameters
: tcp40010
:
: tcp 10.40.57.5:40010
: incoming-connection
: tcp40010ToSerial2
:
: tcp 10.40.57.5:40010
: connect
:
dest=serial 2
5. Configure controller serial 2 to connect and disconnect as DCD goes active and
inactive:
config controller serial 2 connect mode dcd
config controller serial 2 disconnect mode dcd
Note: The 4 that comes after the TCP port number is an internal reference
number generated by Remote RMM-1400.
8. Save the configuration.
15-5
15-6
5. (optional) Verify that the Telnet to asynchronous connection has been configured
properly:
show actions telnetToSerial
Name
Description
Originator
Type
Response
Response
Response
Response
Response
Name
Description
Responder
Type
Parameters
: IncTelnetConn
:
: telnet 10.40.57.5:60002
: incoming-connection
: telnet60002toSerial3
:
: telnet 10.40.57.5:60002
: connect
:
dest=serial 3
options=-b
(Dub)>
6. Configure controller serial 5 to connect and disconnect as DCD goes active and
inactive:
config controller serial 3 connect mode dcd
config controller serial 3 disconnect mode dcd
Note: The 4 that comes after the TCP port number is an internal reference
number generated by Remote RMM-1400.
9. Save the configuration.
15-7
4. (optional) Verify that the SSH to asynchronous connection has been configured
properly:
show actions SSHToSerial
Name
Description
Originator
Type
Response
Response
Response
Response
Response
(Dub)>
15-8
Name
Description
Responder
Type
Parameters
: IncSSHConn
:
: ssh 10.40.57.5:20001
: incoming-connection
: SSH20001ToSerial4
:
: ssh 10.40.57.5:20001
: connect
:
dest=serial 4
5. Configure controller serial 4 to connect and disconnect as DCD goes active and
inactive:
config controller serial 4 connect mode dcd
config controller serial 4 disconnect mode dcd
Note: The 4 that comes after the TCP port number is an internal reference
number generated by Remote RMM-1400.
8. Save the configuration.
15-9
Name
Description
Originator
Type
Response
Response
Response
Response
Response
(Dub)>
15-10
Name
Description
Responder
Type
Parameters
: serial2Up
:
: serial 2
: up
: serial2Connect
:
: serial 2
: connect
:
dest=serial 1
15-11
9. (optional) Verify that the serial controllers have been configured properly:
show controllers serial 1
10. (optional) Manually connect a device to controller serial 2 and send data.
11. (optional) Verify that a connection is established:
show connections
4. (optional) Verify that the asynchronous to TCP connection has been configured
properly:
show actions serial3ToNOC
Name
Description
Originator
Type
Response
Response
Response
Response
Response
Name
Description
Responder
Type
Parameters
: serial3Up
:
: serial 3
: up
: serial3ConnectToNOC
:
: serial 3
: connect
:
dest=tcp 10.40.57.5:5001
(Dub)>
15-13
15-14
16
Configuring the DHCP Server
This chapter provides information on configuring the DHCP server with an associated host and
subnet.
16-1
16-2
The following example displays how the DHCP server distributes an IP address to a
requesting client:
16-3
Configure the DHCP server subnet with an IP address and subnet mask.
4. Configure the DHCP server subnet with IP address 234.55.83.0 and subnet
mask 255.255.0.0:
config dhcp-server subnet 234.55.83.0 255.255.0.0
16-4
5. (optional) Verify that the DHCP server has been configured properly:
show dhcp-server
Tip: Remote RMM-1400 lets you specify a DHCP server configuration file. This file
overrides any DHCP server settings configured in the Remote RMM-1400 CLI.
If you do not specify the correct DHCP server configuration file, Remote RMM1400 generates an error. The following command specifies file
dhcpconfig1.txt as the DHCP configuration file:
config dhcp-server config-file dhcpconfig1.txt
The DHCP server configuration file must exist in Remote RMM-1400 directory
/config/dhcp before you can specify it as the configuration file in the Remote
RMM-1400 CLI. For information about creating a DHCP server configuration
file, refer to the dhcpd.conf man page.
16-5
16-6
6. (optional) Verify that the DHCP server has been configured properly:
show dhcp-server
16-7
Note: The host IP address must be within one of the subnetworks being served
by the DHCP server. For more information, refer to section Configuring a
DHCP Server Subnet on page 16-6.
3. (optional) Verify that the DHCP server has been configured properly:
show dhcp-server
16-8
3. (optional) Verify that the BOOTP/DHCP relay settings have been configured
properly:
show dhcp-relay
16-9
Note: DHCP client support cannot be enabled on the bridge group switch if a
static IP address has already been configured. You must remove the static
IP address before enabling DHCP client support.
To enable DHCP client support and configure the retry-timeout interval:
1. Enable DHCP client support:
config interface bridge switch ip dhcp enable
3. (optional) Verify that the DHCP client settings have been configured properly:
show interface bridge switch
Bytes
2587084
2618834
(Dub)>
16-10
Packets
12964
19175
Errors
0
0
Dropped
0
0
Overrun
0
0
Framing
0
0
Framing
0
0
17
Configuring the Peripheral
Management Subsystem
This chapter provides information on the expansion peripheral management subsystem and
gives examples of how to configure RMB peripheral units. This subsystem provides
communication, coordination, auto-discovery and state maintenance for Remote RMM-1400
peripheral management.
17-1
A four-terminal SiteBus
Four sets of auxiliary terminals, which are not electrically connected to other
RMB-1 I/O terminals
17-2
17-3
17-4
Description
Managed
Unmanaged
The Operation State is the actual, operational state of a discovered peripheral. Table
17-2 lists the potential operation states.
Table 17-2 Potential Expansion Peripheral Operation States
Operation State
Description
Unmanaged
AdminManaged
17-5
17-6
Operation State
Description
Initializing
IncompatibleManaged
Downloading
Managed
Online
Note: The peripheral type is inferred from the peripheral name prefix (for
example, RMB1 = RMB-1 or RMB-2). If desired, you can explicitly configure
the peripheral type with command config peripheral type.
2. Configure Remote RMM-1400 peripheral unit 1 to manage peripheral device
RMB1-0E68FD:
config peripheral 1 manage RMB1-0E68FD
Notes: Configuring the peripheral name associated with a unit number causes
Remote RMM-1400 to attempt active management of the specified
device. If the device has been discovered, Remote RMM-1400 connects
to it and starts managing it immediately. If the device has not been
discovered, Remote RMM-1400 begins actively managing it as soon as it
is discovered.
17-7
3. (optional) Verify that the expansion peripheral has been configured properly:
show peripherals unit 1
Note: The output above shows the expansion peripheral in online mode, which
indicates that the peripheral is fully operational. Remote RMM-1400 has
established a management connection to it and it is fully functioning as
part of Remote RMM-1400. For more information on management states,
refer to section Expansion Peripheral States on page 17-5.
4. Save the configuration.
17-8
Configure a default alarm entry for a discrete input point on a peripheral unit
Note: For more information on discrete analog input settings, refer to section
Configuring an Alarm Entry for a Temperature Sensor on page 13-4.
17-9
5. (optional) Verify that the discrete I/O points have been configured properly:
show discrete inputs 1/2
The display will look similar to the following for the discrete input:
(Dub)>show discrete inputs 1/2
ID
- 1/2
Description
State
- enable
Resource State
- unassigned
Value
- offline
(Dub)>
The display will look similar to the following for the discrete output:
(Dub)>show discrete outputs 1/1
ID
- 1/1
Description
- Output 1
Resource State
- unassigned
Value
- offline
(Dub)>
The display will look similar to the following for the analog input:
(Dub)>show discrete analogs 1/3
ID
- 1/3
Description
State
- enable
Resource State
- unassigned
Low Band
- 0
High Band
- 0
Hysteresis
- 0
Interval
- 0
Max Loop Value
- 10
Min Loop Value
- 0
Max Sensor Reading - -100000
Min Sensor Reading - 0
Units
- U
Mode
- voltage
Averaging
- none
Value
- offline
(Dub)>
17-10
Configure an alarm entry that signals when a discrete input on RMB is closed
Configure an alarm entry that signals when the discrete input is open
2. Configure alarm entry Input5_open as a normal alarm that signals when discrete
input 1/5 comes up:
config alarm-entry Input5_open event input 1/5 open normal Input 5
is open
17-11
3. (optional) Verify that the alarm entries have been configured properly:
show alarm-entries name Input5_closed
The display will look similar to the following for alarm entry Input5_closed:
(Dub)>show alarm-entries name Input5_closed
Name
- Input5_closed
State
- normal
Current Message Description
Nagging Interval - 0
Nagging Level
- major
Trap
- enabled
Trap Priority
- disabled
Raw
- disabled
Category
NE Name
Originator
- input 1/5
Alarm Actions:
Severity
Trigger
Message
-----------------------------------------------------------------major
close
Input 5 is closed
(Dub)>
The display will look similar to the following for alarm entry serConnUp:
(Dub)>show alarm-entries name Input5_open
Name
- Input5_open
State
- normal
Current Message - Input 5 is open
Description
Nagging Interval - 0
Nagging Level
- major
Trap
- enabled
Trap Priority
- disabled
Raw
- disabled
Category
NE Name
Originator
- input 1/5
Alarm Actions:
Severity
Trigger
Message
-----------------------------------------------------------------normal
open
Input 5 is open
(Dub)>
17-12
17-13
Name
Description
Originator
Type
: snmpClose
:
: snmp
: manager-set output4_close
Response Name
: switchClose
Response Description :
Response Responder
: output 1/4
Response Type
: close
Response Parameters :
No parameters configured for this response.
(Dub)>
Name
Description
Originator
Type
: snmpOpen
:
: snmp
: manager-set output4_open
Response Name
: switchOpen
Response Description :
Response Responder
: output 1/4
Response Type
: open
Response Parameters :
No parameters configured for this response.
(Dub)>
17-14
17-15
Note: For more information, see section Connecting Wires to RMB Punchdown
Terminals in the Remote RMM-1400 Installation Guide.
3. Power up the RMB peripheral by reconnecting its Ethernet connection to Remote
RMM-1400. RMB discovers the newly connected SiteBus device.
4. Obtain the hexadecimal ID for the newly connected SiteBus device:
show sitebus
In the following example, device 28004564AE05A5 has been discovered, but is not
yet managed by Remote RMM-1400.
(Dub)>show
(Dub) show>sitebus
ID
Periph:Bus
State
Managed Name
-----------------------------------------------------------------------------28004564AE05A5 1:1
Unmanaged
Name
ID
State
Type
Description
----------------------------------------------------------------------------(Dub) show>
17-16
Note: Each SiteBus device should be assigned a unique name in order to track
and store its reported values in the measurement table.
6. Configure device temp1 with hexadecimal ID 28004564AE05A5:
config sitebus temp1 id 28004564AE05A5
Note: The device type determines how data from the device will be interpreted
and what points will be created for the device. The only device type
supported for Remote RMM-1400 version 4.0x is sbTemp, which includes
points for Celsius and Fahrenheit temperatures. The device in this
example would have two logical points: sitebus temp1/temperatureC
and sitebus temp1/temperatureF.
8. Add description Temperature Sensor 1 to device temp1:
config sitebus temp1 description Temperature Sensor 1
9. (optional) Verify that the SiteBus device has been configured properly:
show sitebus
17-17
17-18
Output state changes that occurred during the disconnection are applied to the
outputs points.
Events are generated that report on the current state of enabled expansion
peripheral inputs. This includes changes that occurred and persisted during the
disconnection.
18
Configuring the SNMP Proxy
This chapter provides information about how to configure the Remote RMM-1400 SNMP Proxy
feature.
18-1
18-2
SNMP Templates
The mapping of incoming SNMP traps to mediation events utilizes a template
mechanism which allows for a common mapping to be shared among multiple
mediation SNMP NEs or multiple instances within the same NE. The templates define
how the proxied devices SNMP MIB is used by the proxy SNMP NE.
There are two types of mappings: events and points, thus two types of templates that
are user-definable.
Point Template
The point template defines how a stateful item on the proxied device is managed by
Remote RMM-1400. For each state, the following information is configurable:
severity; message; varbind; offline state message and severity; and trap OID. The
varbind and trap OID are used to match incoming traps.
Event Template
Events are simple stateless mappings between an SNMP trap and a mediation event.
Events are not mapped to the Remote RMM-1400 alarm table. An event template
consists, at a minimum, of a trap-oid and a message parameter.
NE Template
The NE template contains device model definitions for a proxied SNMP network
element. This template can then be referenced by other NEs of that model. The
templates can be stored and applied as individual patch configurations for easy
distribution to multiple Remote RMM-1400 units.
Measurement Template
The measurement template describes parameters such as poll OID, trap OID and
varbind value used to obtain the value for a point on a proxied NE. This template can
then be applied to other proxied NEs.
18-3
The predefined variables that are available for use in these templates are described in
Table 18-1.
Table 18-1 Predefined Template Variables
Variable
Description
$(point)
$(event)
$(measurement)
$(snmpne)
SNMP NE
The mediation SNMP NE is a mediation event originator. The originator type is
snmpne and the originator instance is the name of the mediation NE. The snmpne
contains site-specific information and can be linked with a previously created event
template or a point template for part of its definition.
The name of the NE is used as the NE name value for mediation alarm table entries
and responses.
SNMP Manager
The configurable information for the SNMP manager is the port on which the SNMP
manager listens for incoming SNMP notifications. The default port is 162.
18-4
5. (optional) Verify that the event template has been configured properly:
show mediation snmp event-templates coldStartDef
18-5
trap OID
varbind match
severity
message
Note: If you configure a dynamic poll table (Step 3), you will not configure a poll ID
(Step 4) and vice versa.
4. Configure the poll OID .1.3.6.1.2.1.2.2.1.8.$(ifIndex)for template
ifEntryDef:
config mediation snmp point-template ifEntryDef poll-oid
.1.3.6.1.2.1.2.2.1.8.$(ifIndex)
You will now configure similar parameters for the down state using the same point
template, ifEntryDef.
11. Configure the down state for point template ifEntryDef:
config mediation snmp point-template ifEntryDef state down
14. Configure the varbind match .1.3.6.1.2.1.2.2.1.1 $(ifIndex) for the down
state:
config mediation snmp point-template ifEntryDef state down
varbind-match .1.3.6.1.2.1.2.2.1.1 $(ifIndex)
18-7
17. Configure the default polling state for points in this template as up.
config mediation snmp point-template ifEntryDef poll-default-state
up
18. (optional) Verify that the point template has been configured properly:
show mediation snmp point-templates ifEntryDef
18-8
description
event, which refers to an the existing event template and associated values
parameter ifDesc
value serial_modem
parameter file
value running-config
18-9
parameter num
value 1
18-10
4. Configure the template alDef to consider as significant the second numeric value
in a string response:
config mediation snmp measurement-template alDef value-match 2
8. Configure the template alDef to consider as significant the second numeric value
in a string response for critical traps:
config mediation snmp measurement-template alDef trap critical
value-match 2
9. (optional) Verify that the point template has been configured properly:
show mediation snmp measurement-templates alDef
18-12
18-13
9. (optional) Verify that the point template has been configured properly:
show mediation snmp measurement-template alTableDef
18-14
18-15
9. (optional) Verify that the ProxyNE SNMP NE has been configured properly:
show mediation snmpne ProxyNE
18-16
Configuration Results
The following is a partial example of a running-config, which shows the results of
the template points and events used to construct a mediation SNMP NE containing a
port with two states (up and down), Ethernet ports 1 and 2 and a reboot notification.
config mediation snmp
event-template coldStartDef
description Reboot event
message $(event) event on NE $(snmpne)
trap-oid .1.3.6.1.6.3.1.1.5.1
exit
config mediation snmp
measurement-template a1TableDef
description Measurement group
poll-table .1.3.6.1.4.1.539.42.2.2 7 5
value-match 2
trap critical
trap-oid .1.3.6.1.4.1.539.42.2.0.5
varbind-id .1.3.6.1.4.1.539.42.2.2.1.7
value-match 2
exit
trap critcal
varbind-value .1.3.6.1.4.1.539.42.2.2.1.5
exit
exit
config mediation snmp
point-template ifEntryDef
description Entry in IfTable
poll-oid .1.3.6.1.2.1.2.2.1.8.$(ifIndex)
state up
message $(point) is up
poll-value 1
trap-oid .1.3.6.1.6.3.1.1.5.4
varbind-match .1.3.6.1.2.1.2.2.1.1 $(ifIndex)
exit
state down
message $(point) is down
poll-value 2
severity major
trap-oid .1.3.6.1.6.3.1.1.5.3
varbind-match .1.3.6.1.2.1.2.2.1.1 $(ifIndex)
exit
poll-default-state up
exit
config mediation snmp
ne-template Template1
description Sample template
event runningConfigChange configChangeDef file running-config
point modem ifEntryDef ifDesc serial_modem
ne-template alarm1 alarms num 1
exit
config mediation snmpne ProxyNE
category NECategory
ne-name ProxyNE
host 10.40.65.90 161 administrator v1
event reboot coldStartDef
measurement analog a1TableDef
point ethernet1 ifEntryDef ifIndex 1
point ethernet2 ifEntryDef ifIndex 2
(Dub)>
18-17
Note: Alarms, events, actions and responses for SNMP proxy will not display in
running-config as they are implicitly added to the configuration. Only if the
user makes a change to one of the entities will these four items display in
running-config. This applies only to new SNMP proxy configurations, not
those loaded from saved configurations.
The configuration will add the following alarm entries and actions automatically.
config alarm-entry ProxyNE_ethernet1_snmpne
event snmpne ProxyNE point ethernet1 trap up event $(message)
event snmpne ProxyNE point ethernet1 trap down event $(message)
ne-name MyNE
category some-category
config alarm-entry ProxyNE_ethernet2_snmpne
event snmpne ProxyNE point ethernet2 trap up event $(message)
event snmpne ProxyNE point ethernet2 trap down event $(message)
ne-name ProxyNE
category some-category
config event ProxyNE_reboot_snmpne content snmpne ProxyNE trap reboot
config response ProxyNE_trap_snmpne content snmp trap
message $(message)
ne-name ProxyNE
category some-category
config action ProxyNE_reboot_snmpne
event ProxyNE_reboot_snmpne
response ProxyNE_trap_snmpne
18-18
19
Configuring Jobs
This chapter includes scenarios that contain step-by-step procedures on how to configure jobs
for Remote RMM-1400.
19-1
Note: All job configuration examples in this document are set up in the CLI; however,
similar functions can also be performed from the Remote Web interface. See
Accessing the Web Interface on page 2-8 for details.
Python modules
Python Modules
A script package can contain one or more Python modules (.py or .pyc files). Each
Python module can contain one or more scripts or it can be empty. A script is a Python
class that defines a run and stop method, which implements the scripting interface on
Remote RMM-1400. A script can define job properties, which pass runtime
parameters and/or settings (such as, connection information for a network element,
baud rates, TIDs, phone numbers, software version and user name and password
information) to Remote RMM-1400 when a job is executed. In addition, a script can
define job tasks and the properties required to request IP configuration for a device or
open a server socket connection to receive and transmit data.
In addition to Python modules, the script package can also contain Python packages.
A Python package is a way to store Python modules in a hierarchical directory
structure.
19-2
19-3
Note: The user name and password must match the user name and password
configured on the central FTP package server.
4. Enable remote access to the central FTP package server:
config pkgs server enable
5. (optional) Verify that the central FTP package server has been configured
properly:
show pkgs server
Tip: For more information on how to configure a central FTP package server,
refer to procedure Configuring Access to a Central FTP Package Server
on page 19-4.
Continue to step 4.
3. At the main CLI prompt, install script package exampleScript-1.0.0.pkg to
Remote RMM-1400 from the central FTP package server:
config pkgs install name exampleScript-1.0.0 fromserver
Important: To install a script package from a central FTP package server, you
need to configure a static route. For more information, refer to
Configuring Static Routes on page 7-1.
19-5
4. (optional) Verify that the script package has been installed properly:
show pkgs summary
Version
1.0.0
Note: Some jobs need to be restarted when the configuration changes, including:
19-6
Analog Monitor
3. (optional) Verify that the job has been configured with the proper script package
and script:
show jobs name printlog status
19-7
2. Configure job printlog with job property capture_text and assign it the
property value of Hello World:
config jobs name printlog property capture_text Hello World
A run ID is assigned.
19-8
Exit state
normal
7. (optional) FTP to Remote RMM-1400 to verify that the output of the job has been
recorded to the stdout.log and stderr.log files located in the jobs data directory
(jobdata/printlog).
19-9
5. (optional) Verify that the task new_ip has been configured properly:
show jobs name echodata task new_ip
19-10
7. Assign the task property port as 50008, ifconfig as new_ip, type as STREAM
and listen as 5 to task server_sock:
config jobs name echodata task server_sock property port 50008
config jobs name echodata task server_sock property ifconfig
new_ip
config jobs name echodata task server_sock property type STREAM
config jobs name echodata task server_sock property listen 5
8. (optional) Verify that the task server_sock has been configured properly:
show jobs name echodata task server_sock
10. Configure job echodata with the job property upper_case and assign it with the
value of yes:
config jobs name echodata property upper_case yes
11. (optional) Verify that job echodata has been configured with the proper job
properly:
show jobs name echodata properties
A run ID is assigned.
19-11
19-12
2. (optional) Verify that the dynamic memory has been configured properly for job
printlog:
show jobs name printlog status
19-13
19-14
20
Configuring Modules
This chapter includes scenarios that contain step-by-step procedures on how to configure
modules for Remote RMM-1400.
20-1
20-2
Installing Modules
In this scenario, you will:
To install a module:
1. Using an FTP/SFTP utility, transfer the Environmental-1.0.0.tgz module file
from the local workstation to the modules directory on Remote RMM-1400.
2. At the main CLI prompt, install all module files in the staging area:
exec site install
Tip: To display the applications and details of module Environmental, enter show
site modules Environmental
20-3
2. In this example, the RMB at this site has already been configured as peripheral 2.
To customize the module with this data, set the value of parameter
peripheralNumber to 2:
config site network-element indoorTemperature param
peripheralNumber 2
3. Configure thresholds for the high temperature alarm and the low temperature
alarm by setting the values of the parameters highTemperature and
lowTemperature:
config site network-element indoorTemperature param
highTemperature 100
config site network-element indoorTemperature param lowTemperature
50
5. In this example, the fan has been wired to the Remote RMM-1400 on discrete
output 2/4. To customize the module with this data, set the value of parameter
outputPoint to 4:
config site network-element fan param outputPoint output 2/4
20-4
7. (optional) Display the details of the NE that includes the list of parameters:
show site network-elements indoorTemperature
Parameters
-----------------------------------------------------------------------------Name
- REF_temperatureUnits
Value
- F
Type
- reference
Description
- Referenced from temperatureUnits. Per-NE configuration of units
is not supported.
Name
Value
Type
Description
highTemperature
100 (configured)
reference
High Temperature Alarming Point
Name
Value
Type
Description
lowTemperature
50
reference
Low Temperature Alarming Point
Name
Value
Type
Description
peripheralNumber
2 (configured)
integer (1 - 12)
Peripheral number for RMB
20-5
Configuring an NE Set
In this scenario, you will:
To configure an NE set:
1. At the main prompt, configure NE (instance) Tenant1Power in NE set
TenantPowerMeter:
config site network-element-set TenantPowerMeter instance
Tenant1Power
Note: NE (instance) display names, which are used within the Optima
application, must be unique within the site.
4. Configure NE (instance) Tenant2Power in NE set TenantPowerMeter:
config site network-element-set TenantPowerMeter instance
Tenant2Power
Instances
-----------------------------------------------------------------------------Name
- Tenant1Power
Description
- This is Tenant1Power.
Display Name
- Tenant1PowerMeter
Activity State - Active
Name
Description
Display Name
Activity State
Tenant2Power
This is Tenant2Power.
Tenant2PowerMeter
Active
(Dub)>
20-7
Note: In this example, the fan network element provides the fan-controller
control. Controls will automatically go to the online state once the host
network element is online and all the controls required parameters that do
not have default values have been configured.
To initiate a control action:
1. Select the run action for control fan-controller:
exec site control-action fan-controller run
Tip: To display the details for control fan-controller, enter show site controls
fan-controller
20-8
21
Using Configuration Wizards
This chapter provides information on the three available configuration wizards.
21-1
21-2
21-3
Enter the desired login name and password. If strong passwords are required,
the password must be from 8 to 20 characters and contain at one upper-case,
lower-case and special punctuation character.
If yes, select the IP address for the DHCP router. Enter 1 to not use the device
IP address (default) or 2 to use the device IP address.
Enter the desired DHCP server settings when prompted. The following settings
are configurable:
8. (optional) Enter the desired clock settings when prompted. The following settings
are configurable:
9. (optional) Enter the desired NTP settings when prompted. The wizard asks you
for the primary and secondary server IP addresses.
10. (optional) Enter the desired SNMP v3 user settings when prompted. The following
settings are configurable:
21-4
User name
Authentication protocol
Privacy protocol
Privacy passphrase
11. (optional) Enter the desired SNMP community settings when prompted. The
following settings are configurable:
SNMP v3 is selected, you will be prompted for the SNMP v3 user name.
You will then select the v3 desired authentication.
12. (optional) Enter the desired SNMP manager information when prompted. The
following settings are configurable:
An IP address
13. (optional) Enter the application package server information when prompted. The
following settings are configurable:
An IP address
14. For the final step, select one of the following options when prompted:
(c) Cancel
21-5
Note: This wizard also allows you to configure bistate points on expansion units.
To configure bistate points:
1. From the main prompt, access the bistate-alarms wizard:
config use-wizard bistate-alarms
8. Enter a new normal state message or accept the default normal state message
when prompted.
9. (optional) Enter the desired nagging interval when prompted.
10. (optional) Enter the desired network element name for the alarm entry when
prompted.
11. (optional) Enter an alarm category for the alarm entry when prompted.
The wizard takes you back to the initial bistate point prompt (configured in step 2).
12. If desired, follow this procedure again to configure another bistate point.
13. When you are finished configuring points, select one of the following options when
prompted:
(c) Cancel.
21-7
21-8
5. (optional) Enter the desired line settings. The following settings are configurable:
The parity
The wizard asks you to select an application for the serial port. Application options
include terminal server, serial-to-IP, or none (basic async port).
6. Select an application for the serial port.
Note: The remaining prompts for the serial port configuration will vary based
upon the application you select.
7. Enter the desired values for the application as prompted.
8. If desired, follow this procedure again to configure another serial port.
9. When you are finished configuring the ports, select one of the following options
when prompted:
(c) Cancel.
21-9
21-10
A
Command Identifications
Command identifications are used when including and excluding commands for a
user-defined profile. The IDs are contained in the supervisor command tree. For
information on configuring user-defined profiles, see Creating a Custom Profile on
page 3-6.
The following are some of the valid command identifications for Remote RMM-1400:
Commands
Identifications
config
/config
config action
/config/action
config alarm-entry
/config/alarm-entry
config apply-patch
/config/apply-patch
config banner
/config/banner
config clock
/config/clock
/config/clock/daylight-savings
/config/clock/local-time
/config/clock/timezone
config controller
/config/controller
/config/controller/bridge
/config/controller/eth
/config/controller/eth/assign
/config/controller/eth/bridge
/config/controller/eth/description
/config/controller/eth/disable
/config/controller/eth/enable
/config/controller/eth/hwaddr
A-1
A-2
Commands
Identifications (Continued)
/config/controller/eth/mac-security
/config/controller/eth/proxy-arp
/config/controller/eth/speed
/config/controller/eth/unassign
/config/controller/openvpn/
/config/controller/wan
config correlation
/config/correlation
config dhcp-relay
/config/dhcp-relay
config dhcp-server
/config/dhcp-server
config discrete
/config/discrete
config event
/config/event
config hostname
/config/hostname
config interface
/config/interface
/config/interface/bridge
/config/interface/eth
/config/interface/eth/description
/config/interface/eth/disable
/config/interface/eth/enable
/config/interface/eth/ip
/config/interface/openvpn
/config/interface/wan
config ip
/config/ip
config ip arp
/config/ip/arp
config ip domain-name
/config/ip/domain-name
config ip name-server
/config/ip/name-server
config ip route
/config/ip/route
Commands
Identifications (Continued)
config route-v6
/config/ip/route-v6
config iptables
/config/iptables
config jobs
/config/jobs
config meas-table
/config/meas-table
config mediation
/config/mediation
config ntp
/config/ntp
/config/ntp/disable
/config/ntp/enable
/config/ntp/poll-interval
/config/ntp/server
config peripheral
/config/peripheral
config pkgs
/config/pkgs
config profile
/config/profile
/config/profile/copy
/config/profile/exclude
/config/profile/include
/config/profile/priv-lvl
config ras
/config/ras
/config/ras/accounting
/config/ras/authorization
/config/ras/retry
/config/ras/server
/config/ras/shell
/config/ras/timeout
config remote-access
/config/remote-access
config response
/config/response
A-3
A-4
Commands
Identifications (Continued)
config snmp
/config/snmp
/config/site/control
/config/site/module
/config/site/network-element
/config/site/network-element-set
/config/site/network-element/statuspoints
/config/site/param
/config/snmp/auth-trap
/config/snmp/community
/config/snmp/host
config tbos
/config/tbos
config timeout
/config/timeout
config use-wizard
/config/use-wizard
config users
/config/users
/config/users/add
/config/users/delete
/config/users/password
copy
/copy
debug
/debug
debug ethernet
/debug/ethernet
/debug/ethernet/all
/debug/ethernet/controller
/debug/ethernet/interface
debug level
/debug/level
debug mediation
/debug/mediation
Commands
Identifications (Continued)
debug serial
/debug/serial/
diag
/diag
diag break
/diag/break
diag clear
/diag/clear
diag controller
/diag/controller
diag fan
/diag/fan
/diag/ip/route/show
diag/ip/route-v6/show
diag line-monitor
/diag/line-monitor
diag line-status
/diag/line-status
diag mediation
/diag/mediation
diag mmdisplay
/diag/mmdisplay
diag output
/diag/output
diag peripheral
/diag/peripheral
diag ps
/diag/ps
diag snapshot
/diag/snapshot
diag tcpdump
/diag/tcpdump
diag test
/diag/test
diag top
/diag/top
diag who
/diag/who
diag whoami
/diag/whoami
erase
/erase
/exec/site/control-action
/exec/site/install
/exec/site/uninstall
exec-job
/exec-job
A-5
A-6
Commands
Identifications (Continued)
exit
/exit
halt
/halt
help
/help
password
/password
ping
/ping
reload
/reload
running-config
/running-config
show
/show
show actions
/show/actions
show alarm-entries
/show/alarm-entries
show audit
/show/audit
show banner
/show/banner
show bootp
/show/bootp
show clock
/show/clock
show compact-flash
/show/compact-flash
show config-file
/show/config-file
show connections
/show/connections
show controllers
/show/controllers
show correlations
/show/correlations
show debugging
/show/debugging
show dhcp-relay
/show/dhcp-relay
show dhcp-server
/show/dhcp-server
show discrete
/show/discrete
show events
/show/events
show expansion-images
/show/expansion-images
show interfaces
/show/interfaces
Commands
Identifications (Continued)
show inventory
/show/inventory
show ip
/show/ip
show iptables
/show/iptables
show jobs
/show/jobs
show listeners
/show/listeners
show log-file
/show/log-file
show meas-table
/show/meas-table
show mediation
/show/mediation
show ntp
/show/ntp
show peripherals
/show/peripherals
show pkgs
/show/pkgs
show product
/show/product
show profiles
/show/profiles
show pydoc
/show/pydoc
show ras
/show/ras
show remote-access
/show/remote-access
show resource-tracking
/show/resource-tracking
show responses
/show/responses
show running-config
/show/running-config
/show/site/controls
/show/site/modules
/show/site/network-elements
/show/site/network-elements-sets
/show/site/network-elements/statuspoints
/show/site/params
A-7
A-8
Commands
Identifications (Continued)
show snmp
/show/snmp
show tbos
/show/tbos
show test
/show/test
show timeout
/show/timeout
show users
/show/users
show version
/show/version
ssh
/ssh
telnet
/telnet
trace-route
/trace-route
Glossary
Symbols
__init__.py
The __init__.py file is required in the script package for each module directory so that
Python will recognize and search the directory for Python code. Content is not
required in the file; however, it generally contains a Python document string. If Python
module subdirectories are not used, this file does not need to exist.
A
action
An action is a correlation between an event and response that controls system
alarming, logging and connection behavior on Remote RMM-1400.
AID
AID is an acronym for access-identifier. It identifies the NE system component to
which an alarm applies.
alarm affect
The alarm affect designates an alarm as service-affecting or non-service-affecting.
Glossary-1
Glossary
alarm class
An alarm class is a designation of an alarm as environmental or equipment-related.
Alarms designated as environmental signal the occurrence of events such as
temperature or pressure changes. Alarms designated as equipment-related signal the
occurrence of events such as device failures or malfunctions.
alarm code
The alarm code identifies the severity of an automatic alarm message based on a
condition. The alarm conditions are critical (CR), major (MJ), minor (MN) and
nonalarmed (NA).
alarm message
The alarm message is the text displayed for an alarm when a specified environmental
event occurs.
alarm type
The alarm type is the value for an environmental alarm response. For valid alarm type
values, refer to the Bellcore GR-833-CORE documentation.
analog input
Analog inputs monitor input current and support five different events that represent
input current transitions.
application mode
The application mode sets up a serial controller as a destination for internal
connections or gives the controller the ability to initiate internal connections when a
system event occurs.
Glossary-2
Glossary
asynchronous
Asynchronous transmission (or async) refers to a simple protocol where the
transmitting device does not need to be synchronized with the receiving device. The
transmitter can send data when data is ready to be sent. Each character of this data
contains start and stop bits, which indicate the beginning and end of each character.
B
band
The band sets the high and low threshold values for analog input event generation.
banner
The banner is the initial text that appears when the user logs into Remote RMM-1400.
baud rate
The baud rate is the speed of a connection in bits per second.
bit-level encoding
Bit-level encoding is the method by which binary codes represent characters of data.
T1 lines have available linecode options Binary 8 Zeros Substitution (B8ZS) and
Alternate Mark Inversion (AMI). E1 lines have available linecode options High Density
Bipolar Three (HDB3) and Alternate Mark Inversion (AMI).
boolean
An expression whose value can be either true or false.
Glossary-3
Glossary
bridge controller
A bridge controller groups controllers into an Ethernet bridge group. The controller is
named bridge switch because it is a bridge that (by default) includes all eight of the
Ethernet switch ports. Controller bridge switch can be configured to include or
exclude Ethernet, serial and WAN ports.
bridge group
A bridge group is a set of controllers assigned to a single bridge unit and network
interface. Each bridge group runs a separate Spanning Tree and is addressable using
a unique IP address.
bridge interface
The bridge interface routes packets to and from the bridge controller.
C
CDMA
Code Division Multiple Access (CDMA) is a digital technology that uses spread
spectrum techniques for transmitting voice or data over the air. Spread spectrum
technology separates users by assigning digital codes within the same broad
spectrum. The benefit of CDMA is that it provides higher user capacity and immunity
from interfering signals. CDMA is available in 800 megahertz or 1900 megahertz
frequencies.
Glossary-4
Glossary
channel group
A channel group consists of one or more channels in a T1/E1 link grouped together as
a high-speed virtual path. A channel group treats all 24 channels of the T1 and all 32
channels of an E1 as a single data stream. A user can create one channel group for
each serial controller.
chat file
A chat file contains the connection initialization string for ports that are configured for
PPP encapsulation. It is stored in the /config/chat directory on Remote RMM-1400.
The user must FTP the chat file to the /config/chat directory on Remote RMM-1400
prior to configuring the file as the connection initialization string.
CLI
Command line interface. A user interface whereby the user types one line of
instructions at a time at a command prompt.
clock source
The clock source determines how a serial controllers clock is set. The two options are
loop and internal. The loop option frames Remote RMM-1400 controller packets
based on the line timing from the incoming T1 link. The internal option frames Remote
RMM-1400 controller packets based on the Remote RMM-1400 generated clock.
community string
A community string is a password used with the SNMP protocol that is used for both
read-only and read-write privileges.
condition type
A condition type refers to an alarm type that is based on standards listed in the
Bellcore GR-833-CORE documentation.
Glossary-5
Glossary
configuration wizard
A configuration wizard is a user-friendly utility accessed from the CLI that prompts the
user for configuration information, then generates and applies the associated
commands in the running configuration.
connection mode
The connection mode specifies how an asynchronous serial controller determines
that it is up (for example, has an asynchronous connection).
connection string
The connection string is a string of characters sent to the attached device at
initialization by an Remote RMM-1400 asynchronous serial controller. Depending on
the connection settings, this string may or may not be sent to the attached device.
controller
A controller is a concept that is applied throughout the CLI. It is a software object on
Remote RMM-1400 that sends and receives a stream of bytes. A controller can be a
physical device, such as an Ethernet transceiver or a T1 framer, or it can be a virtual
entity, such as a T1 channel group.
cost
Cost is a metric used in spanning tree calculations to determine the best path for
reaching a destination. The higher a path's cost, the less desirable it is to use that
path and the more likely the spanning tree algorithm is to disable the port if a network
loop occurs.
cut-through
Cut-through support lets users connect directly to a serial port and issue commands
directly to network elements.
Glossary-6
Glossary
D
data bits
Data bits are the number of bits per character transmitted or received by an
asynchronous serial controller.
daylight savings
Daylight savings time is when clocks are set ahead one hour the first Sunday in April
and back one hour the last Sunday in October to provide an extra hour of daylight
during summer.
delimiting character
The delimiting character defines the beginning and ending of the banner. Most
characters, such as (, @, #, ~, %, * and ), can be applied as the delimiting character.
destination address
In a static route, the destination address is the IP address of the network.
Glossary
DHCP protocol
The DHCP protocol lets a host that is unknown to the network administrator
automatically access a new IP address for its network. The network administrator
allocates address pools in each subnet and enters them into the DHCP configuration
file.
DHCP server
The DHCP server provides automatic IP address and network configurations to
remote devices. For example, the DHCP server can provide dynamic IP address
information to a technicians laptop.
digital input
Digital inputs generate two events that reflect the state of the input: open and close.
disconnect mode
The disconnect mode is a handshake from a device attached to Remote RMM-1400
that terminates or accepts termination of an asynchronous connection.
discrete alarm
Digital discrete alarms are basic open or closed circuits where no data communication
is involved. Monitored devices have either a set of dry or wet contact closure outputs.
The outputs from the monitored devices are relay switches that close or open upon a
given alarm condition. They are called dry when the monitored device (a network
element) does not apply voltage to the alarm connection. They are called wet when
the monitored device applies voltage to the alarm connection.
Glossary-8
Glossary
domain name
Domain names are used to represent IP addresses on a network and are formatted
as a series of alphanumeric characters separated by periods (for example,
www.domainname.com).
DNS server
A DNS server translates alphanumeric addresses into corresponding IP addresses.
DTR signal
DTR is a control signal on an Remote RMM-1400 asynchronous RS-232 serial port.
E
encapsulation
Communications encapsulation is a method for transmitting multiple protocols within
the same network. The frames of one type of protocol are carried within the frames of
another. The available communications encapsulation formats for Remote RMM-1400
are HDLC and PPP.
Glossary-9
Glossary
EvDO
EvDO (Evolution-Data Only) is an upgraded version of the cdma2000 system. The
1xEvDO system uses the bandwidth of one or more 1.23 MHz radio channels as the
existing cdma2000 system. It provides for multiple voice channels and medium rate
data services. The EvDO version changes the modulation technology to allow for a
maximum data transmission rate of approximately 2.4 Mbps on the forward channel.
The EvDO system uses the same reverse channel, which limits the uplink data
transmission rate to approximately 200 kbps. The EvDO system has an upgraded
packet data transmission control system that allows for bursty data transmission
rather than for more continuous voice data transmission. The industry standard for
EvDO is IS-856.
event
An event is an incident that is triggered by an external or internal event. An event can
be anything from a discrete input opening or closing, a serial controller going up or
down, a TCP connection request, or a power supply failure.
event correlation
Event correlation provides the ability to define a unique condition by comparing the
states of multiple events and aggregating them into a single event.
event originator
An event originator is the system component that generates an event.
event type
An event type identifies the cause of the generated event.
Glossary-10
Glossary
F
filter
A filter is an intermediate connection point that performs a processing operation on
data passing through a mediation connection. A telnet filter is a telnet session to a
device that does not support Telnet, such as a craft port on an NE, to function
smoothly.
flow control
Flow control allows a receiving device to tell a sending device to stop sending data
when the data comes in faster than the receiver can process it and to start sending it
when the receiver is ready.
framing
Framing is an error control procedure with multiplexed digital channels, such as T1,
where bits are inserted so that the receiver can identify the timeslots that are allocated
to each subchannel. Refer to the Remote RMM-1400 Command Reference Guide for
information on the framing formats Remote RMM-1400 utilizes.
FTP
FTP (File Transfer Protocol) is a communications protocol that governs the transfer of
files from one computer to another over a network.
G
gateway address
The gateway address is the IP address of the next node location in a route.
Glossary-11
Glossary
GPRS
GPRS (General Packet Radio Service) is a packet-switched mobile datacom service
that is widely expected to be the next major step forward in the evolution of GSM
technology. It enables high-speed mobile datacom and is most useful for data
applications such as mobile internet browsing, e-mail and push technologies. It has
demonstrated transmission rates as fast as 115Kbps.
H
hello time
The hello time is the interval between the generation of configuration bridge PDUs
when the bridge is either the root bridge or when it is trying to become the root bridge.
history runs
The history runs is the number of history entries kept for a job.
HSPA
High Speed Packet Access (HSPA) is a collection of mobile telephony protocols that
extend and improve the performance of existing UMTS (Universal Mobile
Telecommunications System) protocols.
HTTP
HTTP (Hypertext Transfer Protocol) provides a standard for Web browsers and
servers to communicate. It provides less security for sensitive information than
HTTPS.
HTTPS
HTTPS (Hyper Text Transfer Protocol Secure) provides the necessary security to
protect sensitive data. On Remote RMM-1400, HTTPS is implemented by
incorporating an SSL layer that encrypts the HTTP packets between the web server
and client/browser.
Glossary-12
Glossary
hysteresis
Hysteresis is a guard region around high and low thresholds on an analog input that
prevents rapid generation of events when input current oscillates rapidly across the
threshold.
I
inactivity timeout
The inactivity timeout sets the frequency (in minutes) that RX statistics will be
checked on a link in the event that a wireless service provider does not provide lcprequests (keep alives) in their network, or imposes time limitations on the network
connections.
interface
An interface is another concept that is applied throughout the CLI. It is an entity to
which you can route IP packets. An interface must be associated with a controller,
which may be an underlying physical port.
IP forwarding
IP forwarding allows IP packets received on an interface to be forwarded to other
interfaces.
IP routing table
The IP routing table is a database in a router that keeps track of paths to particular
networks and network destinations. More specifically, it associates network
addresses with gateway addresses.
Iptables
Iptables is the method by which IP packets are filtered or manipulated for Remote
RMM-1400. IP packets are filtered or manipulated using three iptables: filter, which
filters IP packets, mangle, which manipulates IP packets and NAT, which routes IP
packets.
Glossary-13
Glossary
J
job
A job contains the specifications for running an instance of a script. It refers to a script
defined within a package and specifies the parameters for execution on Remote
RMM-1400.
job property
A job property is a runtime parameter for a job on Remote RMM-1400. These
properties are used within a Python script.
job task
A job task is an optional initialization step for a job before it runs a script. Tasks are
used when a super user is required for job configuration, since scripts cannot be run
by a privileged user on Remote RMM-1400.
K
keep-alive disconnect time
The keep-alive disconnect time defines the number of seconds that a peer receives
no packets before it is considered to be disconnected. Valid values are 20 to 3600.
Glossary-14
Glossary
keep-alive packets
Keep-alive packets are sent from both the client and server when no user data is
being transmitted. When one side of the connection fails to receive packets, a
notification is sent to indicate a disconnected peer. These packets also maintain an
active firewall state.
L
LCP echo request
An LCP echo request is a packet sent from a client-side controller to a server-side
controller to signal if a PPP link is still available. PPPD stops if LCP echo requests are
not received by the server. LCP echo requests are sent only if LCP is enabled.
line buildout
Line buildout refers to the length of the cable (in feet) that is connecting the devices
on each end of a T1 line or the level of attenuation (in decibels) required for the
devices on each end of a T1 line to communicate. Buildout is usually specified by
cable length for shorter connections and by level of attenuation for longer
connections.
linemode
Linemode is the type of hardware connection of an asynchronous link. There are two
values for linemode: RS232 and RS422. RS232 is a set of standards that specify the
type of interfaces connected to an asynchronous controller. The three types of
interfaces are electrical, functional and mechanical, which are used for
communicating to computers, terminals and modems. RS422 is a standard that
defines a balanced interface that does not accompany a physical connector.
local identity
The local identity is supplied by the local site and sent to a remote device. The identity
is similar to a user name for CHAP and PAP authentication on a point-to-point
connection.
Glossary-15
Glossary
local method
The local method specifies the protocol Remote RMM-1400 uses to authenticate a
peer device on a serial controller PPP link. The two available methods are challenge
handshake authentication protocol (CHAP) and password authentication protocol
(PAP).
local secret
The local secret is supplied by the local site and sent to a remote device. The secret is
similar to a password for CHAP and PAP authentication on a point-to-point
connection.
M
MAC address
A MAC address is the address for a device as it is identified at the Media Access
Control layer in the network architecture.
Glossary-16
Glossary
maximum current
The maximum current is the highest valid current allowed on a specified analog input
and the sensor value associated with that current.
mediation connection
Mediation connections are connections that allow the interconnection of different
protocols. The protocols on each side are terminated in the middle so that the
interconnection can occur.
minimum current
The minimum current is the lowest valid current that will be present on the specified
analog input and the sensor value associated with that current.
MRU
The MRU sets the maximum number of data bytes that can be received in a single
PPP frame on a WAN port.
MTU
The MTU sets the maximum number of data bytes that can be transmitted in a single
PPP frame on a WAN port.
Glossary-17
Glossary
N
nagging
Nagging is the process of repeatedly generating an alarm message at fixed intervals
even in the absence of an alarm state change. This is particularly useful for SNMP
traps which do not provide guaranteed delivery.
nagging interval
The nagging interval configures the number of seconds between instances of an
alarm sending its state to all enabled protocols.
nagging level
The nagging level defines the severity level at which an alarm will repeatedly send its
state to all enabled protocols.
network element
A network element is a processor controlled entity on the telecommunications
network that provides switching and transport network functions and contains network
operations functions.
Glossary-18
Glossary
notification code
The notification code provides an indication of the severity of an alarm.
NTP server
An NTP server maintains a common clock time among hosts within a network.
O
OID
OID (Object Identifier) points to a specific parameter in the SNMP agent.
offset
When configuring the timezone for Remote RMM-1400, offset is the number of hours
and minutes difference between the desired time zone and the default time zone,
which is standard GMT +0.00.
OpenVPN
OpenVPN is a software package that establishes a VPN between an AI VPN server
and AI network element clients. SSL is used to manage the VPN connection and
encrypted UDP packets for data transmission. Both the management and data traffic
are passed as UDP packets on a single port. The customers external firewall needs
to open one UDP port for all connected client network elements.
Glossary-19
Glossary
originator
An originator is a physical and visible component within Remote RMM-1400 that
generates the event, such as an analog input or digital input, serial controller, or
Ethernet controller.
output signal
There are two types of output signals on Remote RMM-1400 asynchronous serial
ports: DTR and RTS. DTR and RTS may be used as part of the connect and
disconnect handshake. RTS may be used for hardware flow control.
P
package manifest
The package manifest is an XML file that serves as a table of contents for the
attributes of a script package.
packet framing
Packet framing refers to the method by which packets are sent over a serial line.
Framing options for T1 serial lines are D4 and ESF. Framing options for E1 serial lines
are CRC4, no-CRC4, multiframe-CRC4 and multiframe-no-CRC4.
parity
Bit parity is the process for detecting whether or not bits of data have been altered
during data transmission.
peripheral device
A peripheral device is a system component that expands Remote RMM-1400s
functionality. The only peripheral device currently available for Remote RMM-1400 is
the discrete expansion peripheral, which adds additional I/O points that are controlled
by Remote RMM-1400.
Glossary-20
Glossary
PID
A PID is a password.
position
A position indicates where in the list order a task should appear and when it should be
executed.
PPP
PPP (Point to Point Protocol) is a data link level protocol typically used to encapsulate
network level packets over an asynchronous serial line.
PPPoE
PPPoE (Point-to-Point Protocol over Ethernet) is a protocol for encapsulating PPP
frames in Ethernet frames. PPPoE is used to virtually dial to another Ethernet
machine, making a point to point connection. This connection can then be used to
transport IP packets, based upon the features of PPP.
priority level
The priority level determines which interface within a standby group will become the
master router. The higher the priority level, the more likely an interface will become
the master router. A priority level of 255 specifies that an interface will become the
master router.
Glossary-21
Glossary
profile
A profile gives a user designated permissions for operating commands in Remote
RMM-1400. User profiles can be status, management, supervisor, or restricted.
Python package
A Python package is a directory used to store Python modules. The package can
contain subpackages, resulting in a hierarchical directory structure. Each package
directory must include a file named __init__.py to indicate to Python that this is a
package. However, the file can be empty.
R
raw alarm output
Raw alarm output is an Remote RMM-1400 alarm format that contains all information
about the alarm and the event that caused it. It can be used for alarm formats that are
not directly supported by Remote RMM-1400. A script or application can take the
alarm information from the raw output and translate it into any type of alarm message.
relay output
Relay outputs can close or open an external circuit to cause connected devices to
respond.
remote identity
The remote identity is supplied by a remote device and sent to the local device.
Glossary-22
Glossary
remote method
The remote method specifies the protocol a peer device uses to authenticate Remote
RMM-1400 for a controller PPP link.
remote secret
The remote identity secret is supplied by a remote device and sent to the local device.
responder
A responder is a visible component within Remote RMM-1400, such as a serial or
Ethernet controller, that implements responses.
response
A response is an executed result associated with a system event by configuration of
an action rule on Remote RMM-1400.
response type
A response type defines the activity that can be executed by the responder, such as
disable, enable, or close.
restart attempts
The number of times Remote RMM-1400 will attempt to restart a job if it stops
abnormally.
RTS signal
The RTS signal is a control signal that may be used as part of the connect and
disconnect handshake or for hardware flow control. The RTS signal is ignored if flow
control is enabled.
Glossary-23
Glossary
running configuration
The running configuration (current Remote RMM-1400 configuration) displays the
current user modifications to the configuration.
S
script
A script is a Python class that defines a run and stop method, which implements the
scripting interface on Remote RMM-1400. A script can define job properties, which
pass runtime parameters and/or settings (such as, connection information for a
network element, baud rates, TIDs, phone numbers, software version and user name
and password information) to Remote RMM-1400 when a job is executed. In addition,
a script can define job tasks and the properties required to request IP configuration for
a device or open a server socket connection to receive and transmit data.
script package
A script package is a compressed file that stores Python modules, Python packages
and the Package Manifest file. The modules included in the script package will be
referenced by jobs, which are configured to run on Remote RMM-1400.
secret
A secret is a shared encryption key that matches the encryption key configured on the
server to provide secure access.
Glossary-24
Glossary
service effect
The service effect is the effect on customer telephone service of the condition
reported by an alarm.
SNMP
Simple Network Management Protocol (SNMP) is a standard specification for
exchanging information between Remote RMM-1400 and a monitoring system.
SNMP trap
SNMP traps are SNMP alarm messages.
Glossary-25
Glossary
SSH
Secure Shell Protocol. An encrypting data transmission protocol used particularly for
encryption of terminal connections. SSH permits secure remote access over a
network from one computer to another.
staging area
The staging area is the pkgstage directory on Remote RMM-1400 that stores script
packages prior to their installation.
stop bits
A stop bit is a zero bit appended to a character transmitted on an asynchronous port.
T
TACACS+
TACACS+ is a protocol that provides remote user authentication.
task position
A task position is the order in which a task will be executed within Remote RMM-1400.
The position indicates where in the list a task should appear. Unless a user specifies a
new position for a task, Remote RMM-1400 adds new tasks to the end of the list.
task property
A task property is a required or optional parameter for a task. These parameters differ
depending on the task type (ifconfig or serversocket) configured for a task.
task type
There are two types that can be assigned to a task. The task type ifconfig creates a
subinterface for the job, which lasts for the lifetime of the job. The task type
serversocket binds a socket for the lifetime of the job.
Glossary-26
Glossary
text block
A text block is a field of an alarm response. The text block is a quoted text line in the
response block of an autonomous message. The exact format of a text block varies
based on the type of autonomous message being created. For more information
about the exact text block formats for different types of autonomous messages, refer
to the Bellcore GR-833-CORE documentation.
TID
The TID is the target identifier.
trap
A trap is an SNMP alarm message.
U
UID
The UID is the user name.
UMTS
UMTS (Universal Mobile Telecommunications System) is one of the third-generation
(3G) cell phone technologies, which is also being developed into a 4G technology.
units
Units is the unit name for measurements associated with analog inputs.
Glossary-27
Glossary
V
Varbind
In an SNMP message, a varbind consists of a sequence of two fields: an Object ID
and the value for/from that Object ID.
VLAN
The term VLAN is specified by IEEE 802.1Q. It defines a method of differentiating
traffic on a LAN by tagging the Ethernet frames. By extension, VLAN is used to mean
the traffic separated by Ethernet frame tagging or similar mechanisms.
VPN client
The VPN client is the device that requests for a VPN session to be established on the
VPN network.
VPN server
The VPN server is a device that provides a VPN session to clients on the VPN
network.
W
WAN
Wide Area Network (WAN) is a computer network that covers a broad area (i.e., any
network whose communications links cross metropolitan, regional, or national
boundaries).
Glossary-28
Glossary
wireless backhaul
Wireless backhaul is the wireless connection from an individual base station (tower)
to the central network (backbone). The Kentrox wireless backhaul solution layers a
VPN on top of the wireless network. The VPN network is a logical extension of the
overall private management network.
Glossary-29
Glossary
Glossary-30
Index
A
accessing
CLI locally 2-2
help 2-2
web interface 2-8
accessing the CLI
using local connection 2-2
action
command example 10-5
components 10-5
configuring 10-6
description 10-2
alarm
nagging 13-2
reporting 13-2
simulation 13-17
alarm table
central 13-2
description 13-2
features 13-2
test mode 13-17
analog
adjustment 13-7
averaging 13-7
B
banner
configuring 2-4
bi-state points
configuring 21-6
BOOTP/DHCP relay
configuring 16-9
C
central alarm table
protocol formats 13-3
raw alarm support 13-3
SNMP support 13-3
CHAP 1-16
CLI
accessing with remote connection 2-7
commands
excluding 3-6
including 3-6
configuration
factory 4-4
file 4-3
fragment 4-3
running 4-2, 4-5
configuring
alarm entry 13-4, 13-9, 13-11
definition 6-2
Ethernet 6-2
OpenVPN 6-2
serial 6-3
types 6-2
copy
network recovery file 4-5
correlation expression
configuring a time period 12-5
evaluation 12-4
operators 12-4
originator types and states 12-3
term 12-3
D
DHCP server
configuring 16-4
configuring a host 16-8
configuring subnet 16-6
example 16-3
Director SCD 8-2, 8-3
E
Ethernet 6-3
controllers 6-2
interfaces 6-3, 6-4
ports 1-4, 6-2, 6-3, 1-4
event
alarm associations 13-2
command example 10-3
components 10-3
configuring 10-6
correlation 12-2
description 10-2
event correlation
components 12-2
configuring 12-6
description 12-2
expression components 12-3
expression example 12-3
H
help
accessing 2-2
HTTP 2-7
HTTPS 2-7
I
interface
Index-1
Index
bridge 6-3
definition 6-3
description 6-3
Ethernet 6-3
modem 6-4
OpenVPN 6-4
serial 6-4
J
job
configuring dynamic memory 19-13
configuring start times 19-12
configuring with a job property 19-8
configuring with a job task 19-10
description 19-2
script package and script 19-7
K
Kentrox Kickstart 2-2
L
laptop
access for Remote 11-1
assigning IP addresses 11-4
M
measurement table
entries
configuration examples 14-4
states 14-3
use with alarm table 14-3
use with event correlations 14-3
overview 14-2
mediation connections
description 15-2
N
Network Address Translation
configuring IPTables 11-6
enabling for laptop 11-6
network element sets
configuring 20-2, 20-6
description of 20-2
instance 20-2, 20-6
NTP 5-5
P
Package Manifest file 19-2
PAP 1-16
password
changing 3-4
entering 2-3
strong 3-3
peripherals
administrative states 17-5
configuring alarms 17-11
Index-2
R
relay output
configuring SNMP 17-13
open and close 17-15
Remote RMM-1400
features 1-2
front panel connectors 1-4
responder 10-4
response
components 10-4
configuring 10-6
description 10-2
restore
network settings 4-5
RMB peripheral units
features 1-5
RMM Overview 1-4
running configuration 4-2
running-config 2-6
S
script
components 19-2
Package Manifest file 19-2
Python modules 19-2
script package
configuring a job 19-7
creating and installing 19-5
SiteBus devices 17-16
SNMP
event template 18-5
manager 18-4
measurement template 18-11
mediation event originator 18-4
NE template 18-9
network element 18-15
point template 18-6
SNMP proxy
configuration 18-2
configuration information 18-3
description 18-2
strong password 3-3
T
templates
NE 18-9
U
users
adding 3-2
deleting 3-5
V
verify user environment 2-6
VPN
configuring 8-8
server 8-2, 8-3, 8-4
W
WAN
interfaces 16-2
web interface
accessing 2-8
functions 2-8
Home page 2-9
job configuration 19-2
restore network settings 4-5
save running configuration 4-2
wireless network
configurations 8-3, 8-4
configuring for Remote 8-2
example 8-4
overview 8-2
required components 8-2
with Connect SCS 8-4
wizards
bistate-alarms 21-6
description 21-2
initsetup 21-3
serial-port 21-8
types 21-2
Copyrights-1
Copyrights-2