H3C XE 200 2000 IP PBX Operation Manual(V3.01)

DownLoad Chapters Download(705 KB)

05-System Management Operation

Table of Contents

Chapter 1 System Management Overview.. 1-1

Chapter 2 Terminal Service and User Interface Configuration. 2-1

2.1 Introduction to Terminal Service and User Interface. 2-1

2.1.1 Relationships Between Terminal Service and User Interface. 2-1

2.1.2 User Interfaces Numbering. 2-1

2.2 Console and AUX Terminal Service Configuration. 2-2

2.2.1 Entering User Interface View. 2-2

2.2.2 Configuring Interface Attributes. 2-3

2.2.3 Configuring Terminal Attributes. 2-5

2.2.4 Configuring Modem Attributes. 2-6

2.2.5 Setting User Authentication and Levels. 2-7

2.3 Telnet Terminal Service Configuration. 2-9

2.3.1 Telnet Service Type. 2-9

2.3.2 Telnet Operation. 2-11

2.3.3 Displaying and Debugging Telnet 2-12

2.4 Displaying and Debugging User Interface. 2-12

2.4.1 Locking User Interface. 2-12

2.4.2 Displaying Information About User Interface. 2-13

2.4.3 Displaying Physical Attributes and Configurations of User Interface. 2-13

Chapter 3 GUI Server Configuration and Management 3-1

3.1 GUI Overview. 3-1

3.2 GUI Server Configuration and Management 3-1

3.2.1 Enabling the GUI Server 3-1

3.2.2 Displaying the User Information List 3-1

3.2.3 Clearing the User Information List 3-2

3.2.4 Enabling/Disabling Web Service. 3-2

3.2.5 Configuring Operation Rights of Normal Administrators. 3-3

Chapter 4 System Maintenance and Management 4-1

4.1 System Maintenance and Debugging. 4-1

4.1.1 Network Diagnostic Tools. 4-1

4.1.2 System Debugging. 4-3

4.1.3 Rebooting the System.. 4-4

4.2 Information Center 4-5

4.2.1 Introduction to Information Center 4-5

4.2.2 Configuring Information Center 4-5

4.2.3 Configuring Terminal Display. 4-10

4.2.4 Introduction to Syslog. 4-11

4.2.5 Displaying and Debugging Information Center 4-12

4.2.6 Information Center Configuration Example. 4-13

4.3 Digital Label Information. 4-14

Chapter 5 File System Management 5-1

5.1 File System.. 5-1

5.1.1 Introduction. 5-1

5.1.2 Directory Operation. 5-1

5.1.3 File Operation. 5-1

5.1.4 Storage Device Operation. 5-3

5.1.5 File System Prompt Mode. 5-3

5.1.6 Example of Using the File System.. 5-3

5.2 Configuration File Management 5-4

5.2.1 Introduction to File Management 5-4

5.2.2 Naming and Selection Order of the Configuration File. 5-6

5.2.3 Backing Up the Configuration File. 5-6

5.3 FTP Configuration. 5-7

5.3.1 Introduction to FTP. 5-7

5.3.2 Enabling FTP Server 5-7

5.3.3 Configuring Authentication and Authorization. 5-8

5.3.4 Configuring Operating Parameters. 5-8

5.3.5 Displaying and Debugging FTP Server 5-9

5.3.6 Introduction to FTP Client 5-10

5.3.7 Configuration Example of Upgrading the Comware Application Program (1) 5-10

5.3.8 Configuration Example of Upgrading the Comware Application Program (2) 5-11

5.4 TFTP Configuration. 5-13

5.4.1 Introduction to TFTP. 5-13

5.4.2 TFTP Protocol Configuration. 5-13

5.4.3 Configuration Example of Upgrading the Comware Main Software Using TFTP. 5-14

Chapter 6 User Management 6-1

6.1 Introduction to User Management 6-1

6.1.1 User Classification. 6-1

6.1.2 Authentication Scheme. 6-1

6.1.3 User Level 6-1

6.1.4 Planning XE IP PBX User 6-2

6.2 User Configuration. 6-2

6.2.1 Configuring User Authentication Method. 6-2

6.2.2 Configuring Password Authentication. 6-3

6.2.3 Configuring Local-Authenticated Users. 6-4

6.3 AAA Configuration. 6-5

6.3.1 Introduction to AAA. 6-5

6.3.2 Configuring AAA. 6-6

6.3.3 Displaying and Debugging AAA. 6-6

6.4 Displaying User Information. 6-6

6.5 Configuration Examples. 6-7

6.5.1 Authenticating Users with Password. 6-7

6.5.2 Authenticating Users with the Local Database. 6-7

Chapter 7 SNMP Configuration. 7-1

7.1 SNMP Overview. 7-1

7.1.1 Introduction to SNMP. 7-1

7.1.2 SNMP Versions and MIBs Supported. 7-1

7.2 SNMP Configuration. 7-3

7.2.1 Enabling/Disabling the SNMP Agent Service. 7-3

7.2.2 Enabling/Disabling the Corresponding Version of SNMP. 7-4

7.2.3 Setting Community Name. 7-4

7.2.4 Setting/Deleting an SNMP Group. 7-5

7.2.5 Adding/Deleting a User 7-5

7.2.6 Setting System Contact 7-6

7.2.7 Enable/Disable Trap Packets. 7-6

7.2.8 Setting the Engine ID of a Local Device. 7-6

7.2.9 Setting the Address of the Trap Target Host 7-7

7.2.10 Setting the Location of XE IP PBX. 7-7

7.2.11 Specifying the Source Address of Trap Packets. 7-8

7.2.12 Setting the MIB View. 7-8

7.2.13 Setting the Maximum Size of SNMP Packets. 7-8

7.2.14 Setting the Queue Length of Trap Packets. 7-9

7.2.15 Setting the Aging Time of Trap Packets. 7-9

7.3 Displaying and Debugging SNMP. 7-10

7.4 Configuration Example. 7-11

Chapter 8 Modem Management Configuration. 8-1

8.1 Introduction to Modem Management 8-1

8.1.1 Modem Management on the XE IP PBX. 8-1

8.1.2 Modem Script 8-1

8.2 Modem Management Configuration. 8-3

8.2.1 Configuring the Incoming and Outgoing Calls of the Modem.. 8-4

8.2.2 Configuring a Modem Script 8-4

8.2.3 Executing a Modem Script Manually. 8-4

8.2.4 Specifying a Modem Script Triggered by an Event 8-5

8.2.5 Configuring the Answer Mode for the Modem.. 8-5

8.2.6 Configuring Modem Callback. 8-6

8.3 Displaying and Debugging the Modem.. 8-6

8.4 Configuration Examples. 8-6

8.4.1 Using Modem Script to Manage the Modem.. 8-6

8.4.2 Using Modem Script to Make Power-on Initialization of the Modem.. 8-7

8.4.3 Using Modem Script to Dial up Directly. 8-7

8.5 Troubleshooting the Modem.. 8-8

 


Chapter 1  System Management Overview

This chapter tells you how to manage and maintain your H3C XE 200/2000 IP PBX (hereinafter referred to as the XE IP PBX).

l           Terminal service and user interface configuration

By reading this part, you can learn the terminal services that the XE IP PBX provides, such as console, AUX and telnet. These services allow you to manage the devices locally or remotely.

The XE IP PBX provides user interface view where you can manage terminal interfaces and thus control user access to the XE IP PBX.

l           System maintenance and management

This part helps you get familiar with the system debugging and maintenance tools and the info-center function available with the XE IP PBX. They are important in monitoring and troubleshooting your network.

l           GUI server configuration management

This part helps users manage the XE IP PBX via the graphical user interface (GUI) with ease.

l           File management

This part tells you how to use the file system supported by Comware to manage the files in the hard disk and Flash memory of the device, such as host software, configuration files and log files.

This part also covers the protocols of FTP, TFTP and Xmodem which are used for file transfer between the XE IP PBX and other devices.

l           User management

This part describes the user management policies that Comware offers to facilitate user and service management and thus enhance network security.

l           SNMP configuration

This part describes SNMP and how to configure it to effectively manage the operating devices on a network along with the network management system.

l           Modem management configuration

This part introduces the function and configuration of modem, with which you can flexibly manage and control the XE IP PBX.

 


Chapter 2  Terminal Service and User Interface Configuration

2.1  Introduction to Terminal Service and User Interface

2.1.1  Relationships Between Terminal Service and User Interface

Terminal services allow you (especially if you are an administrator or an operator) to access the XE IP PBX from terminals to configure, manage, browse, and debug the device.

The XE IP PBX offers multiple terminal services for you to access the CLI to perform:

l           Local configuration through the console port

l           Remote configuration through the AUX port

l           Remote configuration through Telnet

The XE IP PBX manages terminal services through user interface, in the view of which you can configure the physical and logical interface attributes of terminal service system.

The system provides the following types of user interface for terminal services:

l           Console user interface. It manages the interface attributes of the console terminal.

l           AUX user interface. It manages the interface attributes of the AUX terminal.

l           Virtual terminal line (VTY) user interface. It manages the interface attributes of the Telnet terminal.

2.1.2  User Interfaces Numbering

User interfaces are numbered in two ways: absolute numbering and relative numbering.

I. Absolute numbering

Three types of user interfaces are available with the XE IP PBX: console, AUX, and VTY. Their numbers are order dependent.

There are only one console user interface and one AUX user interface, but there can be multiple VTY user interfaces. With the absolute numbering approach, user interfaces are numbered starting at 0 in an ascending order. An absolute number can uniquely identify a user interface or a group of user interfaces.

The following are the absolute numbers for the user interfaces available with the XE 200 IP PBX and the XE 2000 IP PBX:

l           ui 0 for the console.

l           ui 1 for the AUX.

l           ui 2 to ui 6 for the VTY.

II. Relative numbering

Relative numbers take the form of user interface type + number. They are used by the user interfaces of the same type to identify each other. When multiple user interface types are involved, however, relative numbers cannot be used.

The following are the relative numbers for the user interfaces:

l           con 0 for the console.

l           aux 0 for the AUX.

l           VTY 0 for the first VTY, VTY 1 for the second VTY, and so on.

2.2  Console and AUX Terminal Service Configuration

The console port is the primary configuration interface, through which you can enter the configuration interface for initial configuration of the XE IP PBX.

The AUX port functions as the backup and remote services of the console port to provide almost the same terminal services as the console port.

Their user interface configurations include:

l           Configuring attributes of the asynchronous interface

l           Configuring attributes of the terminal

l           Configuring user authentication

2.2.1  Entering User Interface View

In system view, enter the view of a user interface by using its name and relative number or by its absolute number only. The absolute numbers of the console and AUX ports are ui 0 and ui 1 respectively.

Perform the following configuration in system view.

Table 2-1 Enter user interface view

Operation

Command

Enter the view of the console user interface with its name and relative number

user-interface console 0

Enter the view of the console user interface with its absolute number

user-interface ui 0

Enter the view of the AUX user interface with its name and relative number

user-interface aux 0

Enter the view of the AUX user interface with its absolute number on the XE 200

user-interface ui 1

 

In user interface view, you can configure and manage interface attributes, including:

l           Asynchronous attributes: speed, flow control, parity, stop bits and data bits.

l           Terminal attributes: enabling terminal service (shell), setting idle timer with the command idle-timeout, setting the screen length with the command screen-length for terminals, configuring authentication, and setting the size of the history command buffer.

You can also set the authentication mode and user privilege level at login.

2.2.2  Configuring Interface Attributes

 

&  Note:

The default communication parameters for the console port are 9600 bps, 8 data bits, 1 stop bit, no parity and no flow control.

You are recommended not to change the defaults.

 

Perform the following configuration in user interface view.

I. Configuring transmission speed

Table 2-2 Configure transmission speed

Operation

Command

Configure transmission speed

speed speed-value

Restore the default speed

undo speed

 

The following are the speeds available with the console and AUX ports:

l           300 bps

l           600 bps

l           1200 bps

l           2400 bps

l           4800 bps

l           9600 bps

l           19200 bps

l           38400 bps

l           57600 bps

l           115200 bps

 

&  Note:

The speeds of 300 bps and 600 bps are supported only on XE 200 IP PBXs.

 

II. Configuring flow control mode

Table 2-3 Configure flow control mode

Operation

Command

Configure flow control mode

flow-control { none | software | hardware }

Restore the default flow control mode

undo flow-control

 

The available flow control modes include:

none: No flow control.

software: Software flow control.

hardware: Hardware flow control, which is only applicable to the AUX port.

By default, the flow control mode of the terminal line is none, that is, no flow control.

III. Setting the parity bit

Table 2-4 Set the parity bit

Operation

Command

Set the parity bit

parity { none | even | odd | mark | space }

Restore the default parity setting

undo parity

 

The available parity options include: none, even, odd, mark, and space.

The parity defaults to none, that is, no parity check.

IV. Setting stop bits

Table 2-5 Set stop bits

Operation

Command

Set stop bits

stopbits { 1.5 | 1 | 2 }

Restore the default setting

undo stopbits

 

The stop bits setting defaults to 1. XE 2000 IP PBXs only support the setting of stop bits to 1 or 2.

V. Setting data bits

Table 2-6 Set data bits

Operation

Command

Set data bits

databits { 5 | 6 | 7 | 8 }

Restore the default setting

undo databits

 

The data bits available with an asynchronous interface are 5, 6, 7, and 8.

The data bits setting defaults to 8.

2.2.3  Configuring Terminal Attributes

Perform the following configuration in user interface view.

I. Enabling/disabling terminal service

Table 2-7 Enable/disable terminal service

Operation

Command

Enable terminal service

shell

Disable terminal service

undo shell

 

&  Note:

l      By default, terminal service is enabled on all user interfaces.

l      Console user interface does not support the undo shell command.

 

II. Setting the idle-timeout timer

The connection to the user terminal is disconnected if it is idle for a period set by the idle-timeout timer.

Table 2-8 Set the idle-timeout timer

Operation

Command

Set the idle-timeout timer

idle-timeout minutes [ seconds ]

Restore the default setting

undo idle-timeout

 

By default, the idle-timeout timer is set to 10 minutes. When it expires, the terminal connection is disconnected. Setting the timeout to 0 disables the timer and the connection is maintained regardless of whether it is idle.

III. Setting the terminal screen length

Table 2-9 Set the terminal screen length

Operation

Command

Set the terminal screen length

screen-length screen-length

Restore the default terminal screen length

undo screen-length

 

By default, 24 lines are displayed on the terminal screen.

The command screen-length 0 disables multiple-screen output.

The undo screen-length command restores the default setting.

IV. Setting the size of the history command buffer

You may use the hot key <Ctrl+P> or <Ctrl+N> to execute the commands that you have entered on the terminal. These commands are stored in the history command buffer and you can set the number of stored commands using the history-command max-size command.

Table 2-10 Set the size of the history command buffer

Operation

Command

Set the size of the history command buffer

history-command max-size size-value

Restore the default size of the history command buffer

undo history-command max-size

 

The size-value argument specifies the size of the history command buffer. It defaults to 10, meaning up to 10 commands can be stored.

2.2.4  Configuring Modem Attributes

 

&  Note:

Modem attributes configuration is applicable to the AUX port only.

 

Besides logging onto the device directly, you can choose to dial into the device with a modem from the AUX port. You may manage and configure the parameters related to the modem in user interface view. The relevant commands are applicable to AUX port only.

Table 2-11  Configure modem parameters

Operation

Command

Set the call switch that controls call-in and call-out

modem [ call-in | both ]

Disable call-in and/or call-out

undo modem [ call-in | both ]

Set the interval that the system waits for the CD_UP signal after receiving the RING signal

modem timer answer seconds

Restore the default interval that the system waits for the CD_UP signal after receiving the RING signal

undo modem timer answer

Set the answer mode to auto-answer

modem auto-answer

Set the answer mode to manual answer

undo modem auto-answer

Enable asynchronous interface redirection function (valid only for AUX user interface)

redirect

Disable asynchronous interface redirection function (valid only for AUX user interface)

undo redirect

 

2.2.5  Setting User Authentication and Levels

The user authentication and level configuration tasks are described in the following sections:

l           Setting an authentication mode. Three types of authentication modes are available: AAA, local authentication, and password, also you can set the mode to none. By default, the console and AUX user interface users do not need authentication.

l           Setting the password for password authentication. If you choose a password authentication mode, you need to set the password.

l           Setting user level. The commands that you can access are decided by the level of the user interface where you log in or by the user level. If you are not assigned a user level or you are to be authenticated by password, then the user interface level applies. If you have a user level and are to be authenticated through AAA or local authentication, then the assigned user level applies.

I.  Setting an authentication mode

Perform the following configuration in user interface view.

Table 2-12 Configure the authentication mode

Operation

Command

Set the authentication mode applied when logging into a user interface

authentication-mode { local | none | password | scheme { list | default } }

Set the password for password authentication

set authentication password { simple | cipher } password

 

II. Setting user level

1)         Setting the level of a user interface

Perform the following configuration in user interface view.

Table 2-13 Set the level of the user interface

Operation

Command

Set the level of the user interface

user privilege level level

Restore the default level

undo user privilege level

 

The privilege level of the console user interface defaults to 3; and the privilege level of other user interfaces defaults to 0.

2)         Assigning a level to a user

When the level of a user conflicts with the level of the user interface where the user logs in, the former overrides the latter.

Perform the following configuration in system view.

Table 2-14 Assign a level to a user

Operation

Command

Assign a level to a user

local-user username level level

Restore the default user level

undo local-user local-user  level

 

The level argument is in the range 0 to 3, where 3 represents the highest level. By default, no level is assigned to users.

 

&  Note:

If the authentication mode is set to none or password, the command level that a user can access is determined by the level of the user interface where the user logs in. If the authentication is set to local (username and password are required), the command level that the user can access is determined by the level of the user.

 

2.3  Telnet Terminal Service Configuration

2.3.1  Telnet Service Type

Telnet is an application layer protocol in the TCP/IP protocol suite. It provides remote logon and virtual terminal services. Both Telnet server and client services are available with the XE IP PBX.

I. Telnet server

As shown in the following figure, you can run a Telnet client on a PC to telnet to the XE IP PBX for configuration and management.

Figure 2-1 Telnet server service

When working as a Telnet server, the XE IP PBX needs to authenticate the Telnet client. The authentication configuration must be done in the VTY user interface.

1)          Enter VTY user interface view

In system view, you can enter the view of a user interface by using its name and relative number or its absolute number. The absolute numbers for VTYs are 2 to 6 for both the XE 200 IP PBX and XE 2000 IP PBX.

Table 2-15 Enter VTY user interface view

Operation

Command

Enter the view of a VTY user interface with its name and relative number

user-interface vty 0 [ 4 ]

Enter the view of a VTY user interface with its absolute number on the XE 200 IP PBX or the XE 2000 IP PBX

user-interface ui 2 [ 6 ]

 

2)         Basic configurations of the VTY user interface

The basic configurations of the VTY user interface include:

l           Setting the authentication mode. Three types of authentication modes are available: AAA, local authentication, and password. You may set it to none. By default, password authentication applies.

l           Setting the password for password authentication. If you choose a password authentication mode, you need to set the password.

l           Setting user level. The commands that you can access are decided by the level of the user interface where you log in or by the user level. If you are not assigned a user level or you are to be authenticated by password, then the user interface level applies. If you have a user level and is to be authenticated through AAA or local authentication, then the assigned user level applies.

Perform the following configuration in VTY user interface view.

Table 2-16 Basic configurations of the VTY user interface

Operation

Command

Set the authentication mode applied when receiving a Telnet connection

authentication-mode { local | none | password | scheme { list | default } }

Set the password for password authentication

set authentication password { simple | cipher } password

Set a user level

user privilege level level

 

3)         Advanced configurations of the VTY user interface

You may perform the following tasks as needed:

l           Enabling/disabling the terminal service. By default, the XE IP PBX has enabled all the terminal services, but you can disable them as needed.

l           Configuring the auto-execute command command. It makes the XE IP PBX automatically execute some commands when you telnet to it, for example, telneting to another service server.

l           Setting the idle-timeout timer. This command has two purposes: one is to prevent others from operating on the terminal when the terminal is unattended for a long time, and the other is to release VTY resources when the terminal is idle for a long time.

l           Specifying the protocols supported by the current user interface. By default, the XE IP PBX supports Telnet. You may disable some protocols as needed.

l           Setting the size of the history command buffer. By default, each Telnet terminal can store up to 10 history commands. You may change it as needed.

Perform the following configuration in VTY user interface view.

Table 2-17 Advanced configuration of the VTY user interface

Operation

Command

Enable/disable the terminal service

[ undo ] shell

Set the command to be automatically executed

auto-execute command command

Set the idle-timeout timer

idle-timeout minutes [ seconds ]

Set the size of the history command buffer

history-command max-size size-value

 

II. Telnet client service

The XE IP PBX supports the Telnet client service. As shown in the following figure, you can log onto the XE IP PBX by Telnet or by other means, and then telnet from the XE IP PBX to other devices to perform configuration and management.

Figure 2-2 Telnet client service

Normally, you can use the Telnet client service without doing any configuration.

2.3.2  Telnet Operation

I. Creating a Telnet connection

Execute the telnet command in user view to establish a Telnet connection.

Table 2-18 Create a Telnet connection

Operation

Command

Telnet to another XE IP PBX

telnet host-ip-address [ service-port ]

 

Suppose you have logged onto the XE IP PBX named XE. You can use the following command to log onto H3C (the router with an IP address of 129.102.0.1) via the XE IP PBX to perform management.

<XE> telnet 129.102.0.1

Trying  129.102.0.1 ...

Connected to 129.102.0.1 ...

<H3C>

As you can see, <XE> is changed to <H3C>.

II. Using the hot key <Ctrl+]>

When the network connection is normal, you can press <Ctrl+]> at the Telnet client to ask the Telnet server to terminate the Telnet login, just as using the quit command. If the network is down for some reasons, the command of the hot key does not work.

III. Using the hot key <Ctrl+K>

In case the client cannot tell whether the server fails and receives no reply to any command, you can enter the hot key <Ctrl+K> to abort and exit the Telnet connection.

2.3.3  Displaying and Debugging Telnet

After completing the above configurations, you can execute the display command in any view to view the Telnet operating state and verify the configuration.

Execute the debugging command in user view to debug Telnet.

Execute the idle-timeout command in user interface view.

Table 2-19 Display and debug Telnet

Operation

Command

Display the connection state of the current user interface

display users

Display the connection state of all the user interfaces

display users all

Display state of all the established TCP connections

display tcp status

 

The display users command displays only the interfaces through which the Telnet clients connect to the XE IP PBX.

To know the IP addresses of the Telnet servers, you can execute the display tcp status command. Among all the displayed TCP connections, the connections to port number 23 are Telnet connections, including connections to the client and the server.

2.4  Displaying and Debugging User Interface

2.4.1  Locking User Interface

The lock command locks the current terminal line and prompts the user to enter a password. This makes it impossible for others to operate in the interface after the user leaves.

Perform the following configuration in user view.

Table 2-20 Lock the user interface

Operation

Command

Lock the user interface

lock

 

2.4.2  Displaying Information About User Interface

Perform the following configuration in any view.

Table 2-21 Display the information about all user interfaces

Operation

Command

Display the information about all user interfaces

display users [ all ]

 

2.4.3  Displaying Physical Attributes and Configurations of User Interface

Perform the following configuration in any view.

Table 2-22 Display the physical attributes and configurations of user interfaces

Operation

Command

Display the physical attributes and configurations of user interfaces

display user-interface [ type number ] [ number ]

 


Chapter 3  GUI Server Configuration and Management

3.1  GUI Overview

XE IP PBX provides graphics user interfaces (GUIs) to enable easy configurations. GUI consists of GUI server and GUI client. The GUI server runs inside the XE IP PBX, and the GUI client runs on the PC with Microsoft Windows series operating systems.

3.2  GUI Server Configuration and Management

3.2.1  Enabling the GUI Server

Configure to enable the GUI server as follows:

Table 3-1 GUI server configuration

Item

Command

Remarks

Enter system view

system-view

Enter GUI server configuration view

gui

Configure the interface and port number for the GUI server

gui-config interface interface-type slot-number [ port port ]

Required

The port number is optional. The GUI client communicates with the GUI server through the port specified here. The port number ranges from 1 to 65535 and defaults to 10,999.

Enable the GUI Server

start

Required

 

Use the stop command to disable the GUI server.

3.2.2  Displaying the User Information List

Run the display gui-user command in any view to display the user information list.

Table 3-2 Display the user information list configuration

Item

Command

Remarks

Display the user information list

display gui-user { all | online }

Required

Argument all is to display information of all users and online is to display information of current login users.

 

3.2.3  Clearing the User Information List

Clear the user information list configuration as follows:

Table 3-3 Clear the user information list configuration

Item

Command

Remarks

Enter system view

system-view

Enter GUI server configuration view

gui

Clear the user information list

reset-ual

Required

 

  Caution:

l      This command restores the user information list to the initial state, that is, only the default account is contained.

l      If the GUI server has been started, you need to shut it down first.

l      Use this command carefully to avoid loss of important information.

 

3.2.4  Enabling/Disabling Web Service

The XE IP PBX provides Web service, facilitating you to access the XE IP PBX through the Web browser and download files with the GUI client.

After you start the Web service, you can visit http://xxx.xxx.xxx.xxx/filename to view the corresponding file under the directory flash:/web on the XE IP PBX. By default, the index.html file in this directory is obtained if you do not type in the file name. That is, visiting http://xxx.xxx.xxx.xxx is the same with visiting http://xxx.xxx.xxx.xxx/index.html.

By default, there are three files in the flash:/web directory on the XE IP PBX: g-remote_ch.exe, index.html and banner.jpg.

 

&  Note:

l      The above mentioned xxx.xxx.xxx.xxx represents the IP address of the XE IP PBX, and filename refers to the name of the file saved under the directory flash:/web on the XE IP PBX.

l      After you modify or delete a file under the flash:/web directory, restart the Web server so that your change takes effect. However, adding a file does not need the restart-up.

l      Be careful to rename or delete files under the flash:/web directory. Improper operations may cause failure of downloading GUI client software.

l      Click [XE G-Remote English Version] on the [XE G-Remote Download] Web page to download the GUI client software.

 

Enable/disable Web service as follows:

Table 3-4 Enable/disable Web service configuration

Item

Command

Remarks

Enter system view

system-view

Enter GUI server configuration view

gui

Enable/disable Web service

web { start | stop }

Required

 

3.2.5  Configuring Operation Rights of Normal Administrators

For operation rights of normal administrators, refer to H3C XE 200/2000 IP PBX G-Remote  User Manual.

I. Permit/prohibit normal administrators’ operations on a specific gateway device

This configuration takes effect after a normal administrator logs in through GUI client, thus the normal administrator can perform permitted operations.

Table 3-5 Permit/prohibit normal administrators’ operations on a specific gateway device

Item

Command

Remarks

Enter system view

system-view

Enter LS view

location-server

Enter LS-GW view

gateway gateway-id

Permit/prohibit normal administrators’ operations on a specific gateway device

access { permit | prohibit }

Required

 

II. Permit/prohibit normal administrators’ operations on a specific office device

Table 3-6 Permit/prohibit normal administrators’ operations on a specific office device

Item

Command

Remarks

Enter system view

system-view

Enter LS view

location-server

Enter LS-OFFICE view

office office-id

Permit/prohibit normal administrators’ operations on a specific office device

access { permit | prohibit }

Required

 

III. Permit/prohibit normal administrators’ right to add/delete a gateway device

Table 3-7 Permit/prohibit normal administrators’ right to add/delete a gateway device

Item

Command

Remarks

Enter system view

system-view

Enter LS view

location-server

Permit/prohibit normal administrators’ right to add/delete an office device

access list gateway { permit | prohibit }

Required

 

IV. Permit/prohibit normal administrators’ right to add/delete an office device

Table 3-8 Permit/prohibit normal administrators’ right to add/delete an office device

Item

Command

Remarks

Enter system view

system-view

Enter LS view

location-server

Permit/prohibit normal administrators’ right to add/delete an office device

access list office { permit | prohibit }

Required

 

V. Permit/prohibit normal administrators’ right to run commands in gateway view

Table 3-9 Permit/prohibit normal administrators’ right to run commands in gateway view

Item

Command

Remarks

Enter system view

system-view

Enter LS view

location-server

Permit/prohibit normal administrators’ right to run commands in gateway view

access command gateway { permit | prohibit }

Required

 

VI. Permit/prohibit normal administrators’ right to run commands in office device view

Table 3-10 Permit/prohibit normal administrators’ right to run commands in office device view

Item

Command

Remarks

Enter system view

system-view

Enter LS view

location-server

Permit/prohibit normal administrators’ right to run commands in office device view

access command office { permit | prohibit }

Required

 

VII. Permit/prohibit normal administrators’ right to configure IP addresses for gateway devices

Table 3-11 Permit/prohibit normal administrators’ right to configure IP addresses for gateway devices

Item

Command

Remarks

Enter system view

system-view

Enter LS view

location-server

Permit/prohibit normal administrators’ right to configure IP addresses for gateway devices

access command gw:ip-address { permit | prohibit }

Required

 


Chapter 4  System Maintenance and Management

This chapter introduces:

l           System maintenance and debugging tools

l           Maintenance and management of system information center

4.1  System Maintenance and Debugging

4.1.1  Network Diagnostic Tools

I. ping

Use the ping command to test network connectivity and reachability of a host.

Perform the following command in any view.

Table 4-1 The ping command

Operation

Command

Support IP ping

ping [ -a X.X.X.X ] [ -c count ] [ -d ] [ -h ttl_value ] [ -i {interface-type interface-number | interface-name } ][ ip ] [ -n ] [ -p pattern ] [ -q ] [ -r ][ -s packetsize ] [ -t timeout ] [ -v ] [ -tos value ] host

 

For description on the options and arguments, refer to H3C XE 200/2000 IP PBX Command Manual.

The output of the ping command includes:

l           Information on the response packet to each ping message: data bytes, packet sequence number, TTL, and the roundtrip time. If no response is received upon timeout, “Request time out” is displayed.

l           The statistics, including number of the transmitted packets, number of received packets, packet loss ratio, and minimum, average and maximum roundtrip times.

For example:

<XE> ping 202.38.160.244

ping 202.38.160.244 : 56 data bytes, press CTRL_C to break

Reply from 202.38.160.244 : bytes=56 sequence=1 ttl=255 time = 1ms

Reply from 202.38.160.244 : bytes=56 sequence=2 ttl=255 time = 2ms

Reply from 202.38.160.244 : bytes=56 sequence=3 ttl=255 time = 1ms

Reply from 202.38.160.244 : bytes=56 sequence=4 ttl=255 time = 3ms

Reply from 202.38.160.244 : bytes=56 sequence=5 ttl=255 time = 2ms

--202.38.160.244 ping statistics--

5 packet(s) transmitted

5 packet(s) received

0.00% packet loss

round-trip min/avg/max = 1/2/3 ms

II. tracert

Use the tracert command to trace the gateways through which a packet passes from source to destination for network connectivity test and fault location.

The following is how a tracert command operates:

1)         Tracert sends a packet with TTL value of 1.

2)         The fist hop sends back an ICMP TTL Expired message.

3)         Tracert resends the packet with TTL value of 2.

4)         The second hop sends back an ICMP TTL Expired message when the packet arrives.

This process continues till the packet reaches its destination. The route is determined by examining the ICMP Time Exceeded messages sent back by intermediate routers. 

Perform the following configuration in any view.

Table 4-2 Trace a route

Operation

Command

Trace a route

tracert [-a X.X.X.X ] [ -f first_TTL ] [ -m max_TTL ] [ -p port ] [ -q nqueries ] [ -w timeout ] host

 

For description on the options and arguments, refer to H3C XE 200/2000 IP PBX Command Manual.

The following are two examples that show you how to use the tracert command to analyze the network.

Example 1:

<XE> tracert 35.1.1.48

traceroute to nis.nsf.net (35.1.1.48), 30 hops max, 56 byte packet

1  helios.ee.lbl.gov (128.3.112.1)  19 ms  19 ms  0 ms

2  lilac-dmc.Berkeley.EDU (128.32.216.1)  39 ms  39 ms  19 ms

3  ccngw-ner-cc.Berkeley.EDU (128.32.136.23)  39 ms  40 ms  39 ms

4  ccn-nerif22.Berkeley.EDU (128.32.168.22)  39 ms  39 ms  39 ms

5  128.32.197.4 (128.32.197.4)  40 ms  59 ms  59 ms

6  131.119.2.5 (131.119.2.5)  59 ms  59 ms  59 ms

7  129.140.70.13 (129.140.70.13)  99 ms  99 ms  80 ms

8  129.140.71.6 (129.140.71.6)  139 ms  239 ms  319 ms

9  129.140.81.7 (129.140.81.7)  220 ms  199 ms  199 ms

10  nic.merit.edu (35.1.1.48)  239 ms  239 ms  239 ms

The information shows through which gateways the packet passes from source to destination. This is very important to network analysis.

Example 2:

<XE> tracert 18.26.0.115

traceroute to allspice.lcs.mit.edu (18.26.0.115), 30 hops max

1  helios.ee.lbl.gov (128.3.112.1)  0 ms  0 ms  0 ms

2  lilac-dmc.Berkeley.EDU (128.32.216.1)  19 ms  19 ms  19 ms

3  lilac-dmc.Berkeley.EDU (128.32.216.1)  39 ms  19 ms  19 ms

4  ccngw-ner-cc.Berkeley.EDU (128.32.136.23)  19 ms  39 ms  39 ms

5  ccn-nerif22.Berkeley.EDU (128.32.168.22)  20 ms  39 ms  39 ms

6  128.32.197.4 (128.32.197.4)  59 ms  119 ms  39 ms

7  131.119.2.5 (131.119.2.5)  59 ms  59 ms  39 ms

8  129.140.70.13 (129.140.70.13)  80 ms  79 ms  99 ms

9  129.140.71.6 (129.140.71.6)  139 ms  139 ms  159 ms

10  129.140.81.7 (129.140.81.7)  199 ms  180 ms  300 ms

11  129.140.72.17 (129.140.72.17)  300 ms  239 ms  239 ms

12  * * *

13  128.121.54.72 (128.121.54.72)  259 ms  499 ms  279 ms

14  * * *

15  * * *

16  * * *

17  * * *

18  ALLSPICE.LCS.MIT.EDU (18.26.0.115)  339 ms  279 ms  279 ms

The information shows through which gateways the packet passes from source to destination as well as which gateway fails.

4.1.2  System Debugging

The command line interface (CLI) of the system allows you to debug all the protocols and functions that the XE IP PBX supports for fault diagnosis and location.

Debugging information output is controlled by two switches:

l           Protocol debugging switch, controlling whether to send the debugging information of some protocol.

l           Screen output switch, controlling whether to send debugging information on a user screen.

The following figure illustrates how they work.

Figure 4-1 Send debugging information

Use the debugging command to enable/disable protocol debugging.

Perform the following configuration in user view.

Table 4-3 Enable/disable/display debugging

Operation

Command

Enable protocol debugging

debugging { all | module-name [ debug-option1 ]  [ debug-option2 ] …}

Disable protocol debugging

undo debugging { all | module-name [ debug-option1 ] [ debug-option2 ] … }

Display the enabled debugging

display debugging [ interface { interface-type interface-number| interface-name } ] [ module-name ]

 

Refer to related sections for usage and debugging information formats of the above debugging commands.

The information center controls the screen output debugging. See the section 4.2  Information Center“ for more information.

4.1.3  Rebooting the System

You need to reboot your XE IP PBX when the system file is updated. You can power off the XE IP PBX and reboot it or use the reboot command.

Perform the following configuration in user view.

Table 4-4 Reboot the system

Operation

Command

Reboot the XE IP PBX without powering it off

reboot

 

  Caution:

Use this command with cautions, for it will cause transient network unavailability.

Save the configuration file before rebooting the XE IP PBX, otherwise the configurations you just made cannot survive a reboot.

 

4.2  Information Center

4.2.1  Introduction to Information Center

Information center is important to the XE IP PBX. It manages most of the information output and screens information efficiently. Working with the debug program, it helps monitor network operation and diagnose faults.

The information center has the following features:

l           Managing three types of information: log, trap, and debug.

l           Sorting information into eight levels by severity for filtering.

l           Supporting ten channels, of which channels 0 through 5 have default channel names and are associated with six output directions. You can change the channel names and the associations using commands.

l           Sending information to the console, Telnet terminal and dumb terminal (monitor), log buffer, log host, trap buffer and SNMP.

l           Sorting and filtering information by protocol module, board driver, and configuration module.

l           Information header with fixed fields such as Timestamp, source module, severity level, source module slot, and digest.

The primary job of the information center is to send the three types of information from modules to the ten channels by severity level and then direct the channels to six directions.

4.2.2  Configuring Information Center

I. Enabling/disabling the information center

Perform the following configuration in system view.

Table 4-5 Enable/disable the information center

Operation

Command

Enable the information center

info-center enable

Disable the information center

undo info-center enable

 

&  Note:

By default, the information center is enabled.

The system performance may be affected somewhat when the information center is sorting and producing information, especially when information is enormous.

 

II. Naming the channels

Perform the following configuration in system view.

Table 4-6 Name a channel

Operation

Command

Name a channel

info-center channel channel-number name channel-name

 

The channel-number argument ranges from 0 to 9. The channel-name argument comprises up to 30 characters except for the characters of “-”, “/”, and “\”.

The system specifies the default names for channels 0 through 5 as shown in the following table:

Table 4-7 Default names for channels 0 through 5

Channel-number

Channel-name

0

console

1

monitor

2

loghost

3

trapbuffer

4

logbuffer

5

snmpagent

 

III. Information severity

The information center classifies information into eight levels by severity or emergency. If filtered by severity, the information at a severity level greater than the defined threshold is not permitted to be sent. A packet with a lower severity level is more urgent. Severity level 1 means emergency and level 8 means debugging. When the threshold is set to debugging, all information will be sent.

Table 4-8 Severity levels defined in syslog

Severity

Meaning

emergencies

The extremely emergent errors

alerts

The errors that need to be corrected immediately

critical

Critical errors

errors

The errors that need to be concerned but not critical

warnings

Warning, there might exist some kinds of errors

notifications

The information should be concerned

informational

Common prompt

debugging

Debugging information

 

For example, to send IP module log information at warning and lower levels through the SNMP channel, use the following command:

[XE] info-center source ip channel snmpagent log level warnings

IV. Defining contents of a channel

Perform the following configuration in system view.

Table 4-9 Define contents of a channel

Operation

Command

Add records to a channel

info-center source { module-name | default } { channel { channel-number | channel-name} } [ log { state { on | off } | level severity }* | trap { state { on | off } | level severity } * | debug { state { on | off } | level severity }* ]*

Remove records from a channel

undo info-center source { module-name | default } { channel { channel-number | channel-name }

 

The arguments are described as follows:

module-name: Module name.

default: Default records in channels.

level: Information severity level. The information at a level greater than severity is prohibited to be sent.

channel-number: Specifies a channel by its number.

channel-name: Specifies a channel by its name.

Each channel has a default record with a module name of default. For different channels, the record may have different default settings for log, trap, and debugging information. If a module has no explicit configuration record in the channel, the default configuration record is used.

 

If there are multiple Telnet or dumb terminal users logging onto the system at the same time, they share some configuration parameters, including filtering by module, language selection, and severity threshold. The changes that one user made on these parameters are also shown on other user terminals.

 

V. Generating information

At present, the information center of the XE IP PBX can send information in six directions:

l           To a local console through the console port.

l           To a remote Telnet terminal or a dumb terminal. This helps remote maintenance.

l           To a log buffer. You can configure a log buffer with appropriate size on the XE IP PBX.

l           To the log host. Information is saved there in files for query.

l           To a trap buffer. You may allocate a trap buffer with appropriate size on the XE IP PBX.

l           To an SNMP agent.

The information center sorts, filters, and then sends information into different channels. By associating a channel with an output direction and setting filtering conditions, you can perform information filtering and redirection.

Perform the following configuration in system view.

Table 4-10 Information output

Operation

Command

Configure to send information to the console

info-center console channel { channel-number | channel-name }

Configure to send information to the Telnet terminal or dumb terminal

info-center monitor channel { channel-number | channel-name }

Configure to send information to the SNMP agent

info-center snmp channel { channel-number | channel-name }

Configure the size of the log buffer and to send information to the log buffer

info-center logbuffer [ channel { channel-number | channel-name } | size buffersize ] *

Disable the log buffer or restore the default value

undo info-center logbuffer [ channel | size ]

Configure to send information to the log host and set related parameters

info-center loghost X.X.X.X [ channel { channel-number | channel-name } | facility local-number | language { chinese | english } ] *

Disable sending information to the log host

undo info-center loghost X.X.X.X

Configure the size of the trap buffer and to send information to the trap buffer

info-center trapbuffer [ channel { channel-number | channel-name } | size buffersize ] *

Disable the trap buffer or restore the default value

undo info-center trapbuffer [ channel | size ]

 

The system allocates a default channel to every output direction as shown in the Table 4-11:

Table 4-11 Default information output channels allocated to each direction

Output direction

Information channel No.

Default channel name

Console

0

console

Monitor terminal

1

monitor

Log host

2

loghost

Trap buffer

3

trapbuffer

Log buffer

4

logbuffer

SNMP

5

snmpagent

 

&  Note:

Settings of the six output directions are independent and you need to enable the information center to validate them.

 

VI. Configuring the source address in log information

Perform the following configuration in system view.

Table 4-12 Configure the source address in log information

Operation

Command

Set the source address in log information

info-center loghost source { interface-type interface-number | interface-name } [ subinterface-type ]

Cancel the current configuration

undo info-center loghost source

 

4.2.3  Configuring Terminal Display

Configuring terminal display is to control on user screens whether to display the debug/log/trap information from the information center.

Perform the following configuration in user view.

Table 4-13 Configure terminal display

Operation

Command

Enable the terminal to display information

terminal monitor

Enable the terminal to display log information

terminal logging

Enable the terminal to display trap information

terminal trapping

Enable the terminal to display the debugging

terminal debugging

Disable the terminal from displaying information

undo terminal monitor

Disable the terminal from displaying log information

undo terminal logging

Disable the terminal from displaying trap information

undo terminal trapping

Disable the terminal from displaying debugging information

undo terminal debugging

 

These commands only affect the display on the current terminal where the commands are executed.

The undo terminal monitor command has the same function as the combination of undo terminal debugging, undo terminal logging, and undo terminal trapping commands. When the undo terminal monitor command is enabled, debugging/log/trap information will not be sent to the current terminal.

When the terminal monitor command is used, you can use the terminal debugging/undo terminal debugging, terminal logging/undo terminal logging, and terminal trapping/undo terminal trapping commands to enable/disable debugging/log/trap information output.

4.2.4  Introduction to Syslog

The syslog function is a sub-function provided by the information center. This section describes the format of the log sent to log hosts. Port 514 is used for the output to log hosts.

The format of log information is specified in the BSD syslog protocol (RFC 3164) with extension to the header, shown as follows:

<priority> timestamp sysname module/level/digest:content

Where, “< >”, space, “/” and “:” are valid and mandatory.

For example:

<189> Jun 7 05:22:03 2003 XE IFNET/6/UPDOWN:Line protocol on interface Ethernet0/0, changed state to UP

The following is the description on fields in the log information.

I. Severity

The severity level is computed using this formula: facility x 8 + severity - 1. For Comware, facility defaults to 23, severity defaults to a value in the range 1 to 8, as shown in Table 4-8.

No characters are allowed between severity and timestamp.

II. Timestamp

The time field of the log information sent to a log host is expressed in date notation.

The timestamp is in the format of Mmm dd hh:mm:ss yyyy.

Mmm is the abbreviated form of the month: Jan, Feb, Mar, Apr, May, Jun, Jul, Aug, Sep, Oct, Nov, or Dec.

dd is the abbreviated form of the day. If it is less than 10, one space must be inserted before the number, for example, “ 7”.

“hh:mm:ss is the time of day, where hh is an hour value in 24-hour notation (00 to 23), and mm and ss are minute and second values from 00 to 59.

“yyyy” is the year.

The timestamp and host names are separated by a space.

III. Host name

The host is named using its host name, which is XE by default.

You can use the sysname command to modify it.

The host name and the module name are separated by a space.

IV. Module name

The module name field indicates which module sends the log information. You can view the module list by executing the info-center source ? command in system view.

The module name and the severity level are separated by a slash (/).

V. Severity

Log information is sorted into eight levels identified with 0 through 7. See Table 4-8.

The severity level and the digest are separated by a slash (/).

VI. Digest

Digest is a phase that abstracts the information.

The digest and the content are separated by a colon (:).

VII. Log host

You can set log hosts, up to four, for the system using the info-center loghost command. By default, logs are sent to the log hosts through channel 2, that is, the loghost channel.

You can set the source IP address in the log to the address of a fixed interface. This allows log hosts to classify and manage log information by source address. For example, you can use the info-center loghost source loopback0 command to set the source address of the log information sent by the system to the address of the loopback0 interface.

4.2.5  Displaying and Debugging Information Center

After completing the above configurations, you can perform the display command in any view to verify the configuration, or execute the debugging command in user view to debug the information center.

Table 4-14 Display and debug information about the information center

Operation

Command

Display information about the information center

display info-center

Display information about the log buffer

display logbuffer [ size sizeval ]

Display information about the trap buffer

display trapbuffer

 

4.2.6  Information Center Configuration Example

I. Sending information to the console

1)         Enable the information center.

[XE] info-center enable

2)         Configure to send log information of AAA module to the console; set the severity level to be in the range from emergencies to debugging.

[XE] info-center console channel console

[XE] info-center source aaa channel console log level debugging

3)         Enable AAA debugging.

<XE> debugging aaa event

II. Sending log information to the log host (UNIX workstation)

Step 1: Configure the XE IP PBX.

1)         Enable the information center.

[XE] info-center enable

2)         Use the UNIX workstation at 202.38.1.10 as the log host; set severity threshold to informational and output language to English; allow PPP and IP modules to send information using the UNIX facility Local4.

[XE] info-center loghost 202.38.1.10 language english

[XE] info-center loghost 202.38.1.10 facility local4

[XE] info-center source ppp channel loghost log level informational

[XE] info-center source ip channel loghost log level informational

Step 2: Configure the log host.

Take the configuration on SunOS 4.0 for example. You may configure the UNIX OSs of other vendors in the same way.

3)         Execute the following commands with a user identification of root.

#mkdir           /var/log/XE

#touch           /var/log/XE/information

4)         Edit the file etc/syslog.conf and add the selector/action pairs with a user identification of root.

# XE configuration messages

local4.info    /var/log/XE/information

 

&  Note:

When editing the file /etc/syslog.conf, note that:

l      Remarks must be in separate lines and begin with the character #.

l      Use tabs rather than spaces to separate selector/action pairs.

l      Do not leave unwanted space behind a file name.

l      To ensure correct output of log information to the log host, the device name and the allowed log information level specified in /etc/syslog.conf must be the same as those configured by the info-center loghost and info-center loghost a.b.c.d facility commands on the XE IP PBX.

 

After the log file config is created and the /etc/syslog.conf file is updated, execute the following command to send a HUP signal to have the system daemon syslog reread its configuration file /etc/syslog.conf.

#ps -ae | grep syslogd

147

#kill -HUP 147

Upon completion of the operation, information about the XE IP PBX is sent to the corresponding log file.

At this point, the system can send information at informational or higher severity levels (identified with 0 to 6) to the host.

If the log level is debugging (the lowest level) all log information is sent to the log host. This may affect system performance, so it is recommended not to set log level to debugging.

 

&  Note:

You can sort information by combinations of facility name, severity threshold, module name, and the syslog.conf file for filtering purpose.

 

4.3  Digital Label Information

Digital label information, also known as permanent configuration data or archived information, is written into the storage area of a device by using test commands during manufacturing process. It is used to record the information of a device such as device name, OEM serial number, MAC address, manufacturing date, and vendor name.

You can view the digital label information by using the display device manuinfo command in any view.

 

Table 4-15 Description on the digital label information

Field

Description

Maximum length

(in bytes)

DEVICE_NAME

Device name

30

DEVICE_SERIAL_NUMBER

OEM serial number

40

MAC_ADDRESS

Starting MAC address

30

MANUFACTURING_DATE

Manufacturing date

20

VENDOR_NAME

Vendor name

25

 


Chapter 5  File System Management

5.1  File System

5.1.1  Introduction

The main function of the file management is to manage the storage device where files are saved. The storage device supported by the XE IP PBX is Flash.

The file system is used to manage files and directories in the storage device, such as to create the file system, to create, delete, modify, rename a file and a directory, and to display the contents of a file. All these operations are performed in user view. Note that a full file name can be up to 64 characters long and the ultra-long file name will affect file operations.

5.1.2  Directory Operation

With the file system, you can create and delete a directory, display the current directory, and display the file or directory information of a specified directory.

Perform the following configuration in user view.

Table 5-1 Directory operations

Operation

Command

Create a directory

mkdir directory

Remove a directory

rmdir directory

Display the current directory

pwd

Display the information of a file or directory

dir [ /all | /h ] [ file-url ]

Change the current directory

cd directory

 

5.1.3  File Operation

I. General Operation

With the file system, you can also delete a file, restore a deleted file, delete a file in the recycle bin permanently, display the contents of a file, rename, copy and move a file, execute batch file, display the information of a specified file and a private file, as displayed in Table 5-2.

Perform the following operations in user view, except for the execute command which is performed in system view.

Table 5-2 File operation

Operation

Command

Delete a file

delete [ /unreserved ] file-url

Restore a deleted file

undelete file-url

Delete the files in the recycle bin permanently

reset recycle-bin [ file-url ]

Display the contents of a file

more file-url

Rename a file

rename fileurl_source fileurl_dest

Copy a file

copy fileurl_source fileurl_dest

Move a file

move fileurl_source fileurl_dest

Display the information of a directory or file

dir [ / all | flash: /h ] [| file-url ]

Execute a batch file

execute filename

 

II. Configuring dual image

The XE 200 IP PBX provides dual image function and has defined three boot files in the system by default: main boot file, backup boot file, and secure boot file. If they are loaded into the Flash, the system uses them in order to boot the IP PBX as follows:

l           Main boot file, with the default name being main.bin and file type being M, is the default file for system boot;

l           Backup boot file, with the default name being backup.bin and file type being B, is the boot file used in case of the boot failure using the main boot file;

l           Secure boot file, with the default name being secure.bin and file type being S, is the boot file used in case of the boot failure using the backup boot file. If the boot attempts using all these files fail, the system prompts the boot failure.

You can use the following commands to view files in the Flash and specify the main and backup boot files.

Perform the following configuration in system view.

Table 5-3 Configure dual image

Operation

Command

Display all the boot files in the Flash.

bootfile dir

Specify the main boot file used when booting the XE IP PBX.

bootfile main { main-bootfile-name }

Specify the backup boot file used when booting the XE IP PBX.

bootfile backup { backup-bootfile-name }

 

&  Note:

Secure boot file is the last system boot resort. You can download it in the Boot ROM menu and must name it secure.bin. However, you cannot modify this file or change the type of another file to S. If you change the name of the secure boot file with the rename command after the system boots, no secure boot file exists in Flash memory. To use the secure boot file after that, you need to download it again.

 

You can also perform these operations in the Boot ROM menu, with reference to the H3C XE 200/2000 IP PBX  Installation Manual.

5.1.4  Storage Device Operation

Operations on the storage device mainly involves formatting.

Perform the following configuration in user view.

Table 5-4 Storage device operation

Operation

Command

Format a storage device

format device-name

 

5.1.5  File System Prompt Mode

You can use the file prompt command to modify the prompt mode of the current file system.

Perform the following configuration in system view.

Table 5-5 Set the prompt mode of the file system

Operation

Command

Set the prompt mode of the file system

file prompt { alert | quiet }

 

5.1.6  Example of Using the File System

# Copy the file from flash:/sample.txt to flash:/backup/sample.txt.

Copy flash:/sample.txt to flash:/backup/sample.txt ? [Y/N]:y

100%  complete

% Copyed file flash:/sample.txt flash:/backup/sample.txt ...Done..

# Display the file information under the current directory, where the file has been copied to.

<XE> dir flash:/backup/

Directory of flash:/backup/

 

   0   -rw-       957  Mar 17 2005 15:24:55   sample.txt

 

7542784 KB total (2797568 KB free)

5.2  Configuration File Management

5.2.1  Introduction to File Management

I. Contents and format of configuration file

The configuration file is saved in a text file, and has the following characteristics:

l           Saved as command format.

l           Only non-default parameters are saved to save space (For the default values of the configuration parameters, refer to following chapters).

l           Command view is the basic framework of the commands organization; the commands belonging to the same command view are grouped into a section which are divided by one or multiple blank lines or comment lines beginning with “#”.

l           In general, these sections are arranged in the sequence of system configuration, physical interface configuration and logical interface configuration.

l           Ended with the word “return”.

II. Displaying configurations of the XE IP PBX

The XE IP PBX configuration saved with save command is stored as file format in the Flash. When the XE IP PBX boots, the initialization is made based on the configuration file read from the Flash. So the configuration in the file is called initial configuration. During the operation, the configuration used by the XE IP PBX is called current configuration which is stored in the memory of the XE IP PBX and will be lost when the XE IP PBX reboots.

Perform the following configuration in any view.

Table 5-6 Display configurations of the XE IP PBX

Operation

Command

Display the initial configuration of the XE IP PBX

display saved-configuration

Display the configuration of the current view

display this

Display the current configuration of the XE IP PBX

display current-configuration

 

&  Note:

The displayed format and saved format of the configuration file are the same.

 

III. Saving the current configuration

Via the command lines interface, you can modify the current configuration of the XE IP PBX. In order to make the current configuration as the initial configuration at next power-on of the XE IP PBX, you need to save the current configuration to the Flash with the save or save-now command to form a configuration file.

Perform the following configuration in user view.

Table 5-7 Save the current configuration

Operation

Command

Save the current configuration (confirmation is required)

save

Save the current configuration without confirmation

save-now

 

&  Note:

You are recommended to save the configuration using the save or save-now command before reboot, so that the XE IP PBX can keep exactly the same configuration after reboot.

 

IV. Erasing the configuration files

You can use the reset saved-configuration command to erase the configuration file in the Flash of the XE IP PBX. After the configuration file is erased, default configuration parameters will be used for the initialization at the next power-on. The configuration file in the storage device can be erased in the following cases:

l           XE IP PBX software update may cause the mismatch between the software and the configuration file.

l           Configuration file is corrupt, for example, due to load of a wrong configuration file.

After erasing the configuration files, use the save command to save the current configuration file as a new one.

Perform the following configuration in user view.

Table 5-8 Erase the configuration files in the storage device

Operation

Command

Erase the configuration file in the storage device

reset saved-configuration

 

5.2.2  Naming and Selection Order of the Configuration File

I. Naming the configuration file

The configuration file is named as follows:

config.cfg: Default filename of the configuration file. The name is specified by the manufacturer, but the contents of this file can be changed by the user.

II. Selection order of the configuration file

There are three cases in which the system selects the configuration file after startup.

1)         If you have set to start with skipping the configuration file, the system starts with null configuration.

2)         If you have specified the start configuration file, the system:

l           Selects the specified file as the start configuration file if the file exists.

l           Starts with null configuration if the specified file does not exist.

3)         If you have not specified the start configuration file, the system searches for the config.cfg file and:

l           Selects the config.cfg file as the start configuration file if it exists.

l           Starts with null configuration if the config.cfg file does not exist.

5.2.3  Backing Up the Configuration File

You can back up the configuration by backing up the information displayed using the display current-configuration command or by using FTP.

I. Backing up the information displayed using the display current-configuration command

You can execute the display current-configuration command to display all the configuration information in the XE IP PBX except for the defaults. In the HyperTerminal, you can copy all the displayed configuration information into a text file to back up the configuration file.

II. Using FTP

The way of loading the configuration file using FTP is the same with that of loading host program using FTP, except for the file to be loaded. For details, refer to Configuration Example of Upgrading the Comware Application Program (1), where, the fifth configuration step is different: Under the “[ftp]” prompt, use the get RemoteFile [LocalFile] command to upload the specified file to the XE IP PBX. The file name must be the same with the configuration file name of the XE IP PBX (config.cfg).

<ftp> get config.cfg config.bak

200 Port command okay.

150 Server okay , now transmit file.

226 file transmit success.

ftp: 735 bytes received in 0.06Seconds 12.25Kbytes/sec.

By making the XE IP PBX as FTP client, you can transfer the configuration file in the XE IP PBX to the server.

5.3  FTP Configuration

5.3.1  Introduction to FTP

FTP is an application layer protocol in the TCP/IP protocol suite and provides file transfer service between a local host and a remote host. The implementation of FTP relies on the corresponding file system.

FTP services provided by system include:

l           FTP Server service. You can run the FTP client program to log into the XE IP PBX to access the files in the XE IP PBX.

l           FTP Client service. You can establish a connection with XE IP PBX using terminal emulation program or Telnet program, then input the FTP commands to establish a connection with a remote FTP Server to access the files in the remote host.

The configuration of the FTP server includes:

l           Enabling FTP server.

l           Configuring the authentication and authorization of FTP server.

l           Configuring the operation parameters of FTP server.

l           Displaying and debugging the FTP server.

5.3.2  Enabling FTP Server

Only when the FTP server function is enabled, can the FTP client log into the server and access the files in the remote host.

Perform the following configuration in system view.

Table 5-9 Enable/disable FTP server

Operation

Command

Enable FTP server

ftp server enable

Disable FTP server

undo ftp server

 

Multiple users can access the FTP server simultaneously. When a remote FTP user client sends a request to the FTP server, the server will execute corresponding commands and return the results of the execution to the user.

5.3.3  Configuring Authentication and Authorization

The authorization information of the FTP server includes the configuration of the operating directory provided for the FTP user. Only those who have passed the authentication and have been authorized successfully can enjoy the FTP services. Before using the FTP services, you can configure the user type and FTP operating directory on the XE IP PBX.

Perform the following configuration in system view.

Table 5-10 Configure the authentication and authorization of the FTP server

Operation

Command

Configure local username and authentication password

local-user local-user password { simple | cipher } password

Authorize to use FTP

local-user local-user service-type ftp

Set the initial directory

local-user local-user ftp-directory directory

Remove the FTP user

undo local-user username

 

The following is an example of configuring the authentication and authorization of the FTP server.

Example: Set the FTP user name as XE and the password as XE (simple text), the authorized operating directory is flash:/ftp/XE ( which is supported by the XE IP PBX file system)

# Configure the authentication information of the FTP users in system view.

[XE] local-user XE

[XE] local-user XE service-type ftp

[XE] local-user XE password simple XE

# Configure the authorization information of the FTP users in system view.

[XE] local-user XE ftp-directory flash:/ftp/XE

5.3.4  Configuring Operating Parameters

I. Setting the update mode of FTP

When users log into FTP Server and upload files with the put command, there are two modes to upgrade the FTP Server: fast update mode and normal update mode.

l           In fast update mode, the FTP Server starts to write a user’s uploaded file into the Flash after the file has been uploaded and received by the server. The existing files in the XE IP PBX will not be damaged although the abnormal case (such as power off) happens during the transmission.

l           In normal update mode, the FTP Server receives the user files and writes them in the Flash at the same time. The current XE IP PBX files might be damaged due to exceptions such as power off. Compared with fast update mode, the normal update mode needs less memory in the XE IP PBX.

Perform the following configuration in system view.

Table 5-11 Set the FTP update mode

Operation

Command

Set the FTP update mode

ftp update { fast | normal }

Restore the default FTP update mode

undo ftp update

 

By default, FTP server uses fast update mode.

II. Setting the connection time limit of the FTP server

In order to prevent the access of unauthorized user, the FTP server disconnects connection with the FTP client if there is no service request from FTP user in a period of time.

Perform the following configuration in system view.

Table 5-12 Configure the timeout time of FTP server

Operation

Command

Configure the timeout time of FTP server

ftp timeout minutes

Restore the default timeout time of FTP server

undo ftp timeout

 

The default timeout time is 30 minutes.

5.3.5  Displaying and Debugging FTP Server

After completing the above configurations, execute the display command in any view to display the operation of the configured FTP, so as to verify the configuration.

Table 5-13 Display and debug FTP server

Operation

Command

Display the FTP server

display ftp-server

 Display logged FTP users

display ftp-user

 

You can use the display ftp-server command to display the configuration of current FTP server, which includes the maximum number of users supported by the FTP server and the timeout time. Use the display ftp-user command to display the details of the logged FTP users.

5.3.6  Introduction to FTP Client

FTP Client is an additional function of the XE IP PBX system. It provides no configuration function and is an application module only. You can connect to a remote server as an FTP client and enter FTP client commands to perform corresponding operations, for example, to create or delete a directory. At present, only one FTP client is supported. For the use of specific commands, refer to the H3C XE 200/2000 IP PBX  Command Manual.

5.3.7  Configuration Example of Upgrading the Comware Application Program (1)

I. Network requirements

Use FTP to upgrade the Comware main software and take the XE IP PBX as the client. The IP address of the FTP server is 172.16.104.110; the FTP username is xe and the password is h3c.

II. Network diagram

Figure 5-1 Upgrade using FTP client

III. Configuration procedure

Perform the following operations:

# Remove unused files in the XE IP PBX file system to keep sufficient space available for new system files.

<XE> dir

Directory of flash:/

 

   0   -rw-       932  Apr 21 2009 17:04:55   config.cfg

   1   -rw-   8375145  Oct 10 2002 10:10:10   system

   2   -rw-   5918042  Apr 21 2009 17:09:57   vgd011.bin

<XE> delete /unreserved vgd011.bin

The contents cannot be restored!!! Delete flash:/vgd011.bin?[Y/N]:y

Deleting a file permanently will take a long time. Please wait...done.

%Delete file flash:/vgd011.bin...Done.

# Log into the server in FTP mode to retrieve the system files, and to save them to the root directory in the storage device of XE IP PBX.

 

  Caution:

You must save the system files to the root directory (flash:) with the name "system".

 

<XE> ftp 192.168.80.100

Trying 192.168.80.100 ...

Connected to 192.168.80.100.

220 WFTPD 2.0 service (by Texas Imperial Software) ready for new user

User(192.168.80.100:(none)):xe

331 Give me your password, please

Password:xxxxxxx

230 Logged in successfully

[ftp] binary

[ftp] get xe200.bin system

200 PORT command okay

150 "D:\xe\system\xe200.bin" file ready to send (58051

00 bytes) in IMAGE / Binary mode

226 Transfer finished successfully.

FTP: 5805100 byte(s) received in 19.898 second(s) 291.74Kbyte(s)/sec.

[ftp] bye

After upgrading successfully, restart the XE IP PBX to run the new version.

5.3.8  Configuration Example of Upgrading the Comware Application Program (2)

I. Network requirements

Use the XE IP PBX as a server to upgrade the Comware main software on the XE IP PBX using FTP. The IP address of the Ethernet interface of the XE IP PBX is 192.168.80.50/24; the FTP username is xe and the password is h3c.

II. Network diagram

Figure 5-2 Upgrade using FTP server

III. Configuration procedure

1)         Configure the XE IP PBX.

# Add an FTP authorized user with the following name and password.

[XE] local-user xe password simple h3c

[XE] local-user xe service-type ftp

[XE] local-user xe ftp-directory

# Enable the FTP service.

[XE] ftp server enable

# Remove unused files in the XE IP PBX file system to keep sufficient space available for new system files.

<XE> dir

Directory of flash:/

 

   0   -rw-       932  Apr 21 2009 17:04:55   config.cfg

   1   -rw-   8375145  Oct 10 2002 10:10:10   system

   2   -rw-   5918042  Apr 21 2009 17:09:57   vgd011.bin

<XE> delete /unreserved vgd011.bin

The contents cannot be restored!!! Delete flash:/vgd011.bin?[Y/N]:y

Deleting a file permanently will take a long time. Please wait...done.

%Delete file flash:/vgd011.bin...Done.

2)         Perform the following operation on the PC.

# Log into the XE IP PBX in FTP mode to upload and save the Comware software to the root directory in the storage device of XE IP PBX.

ftp> binary

ftp> put xe200.bin system

After upgrading successfully, restart the XE IP PBX to run the new version.

 

&  Note:

The operation procedure for upgrading configuration file using FTP is identical to the above procedure. Note that you must save the new config.cfg configuration file to the root directory (flash:) in the XE IP PBX.

When upgrading the Boot ROM program using FTP, you must name the file as bootromfull (for firm file) or bootrom (for upgrading file) before executing the upgrade command.

 

5.4  TFTP Configuration

5.4.1  Introduction to TFTP

Compared with FTP, TFTP (Trivial File Transfer Protocol) has no complex interactive access interface and authentication control, so it is applicable in the environment in which no complex interaction is needed between the client and the server. For example, the TFTP protocol is used to obtain the memory mirror of the system when the system is started. In general, TFTP protocol is UDP dependent.

The transfer of the TFTP is originated by the client end. When the client downloads files, it sends a reading request packet to the TFTP server, receives the data packet from the server, and then sends acknowledgement to the server. When the client uploads files, it sends writing request packet and data packets to the TFTP server, and receives acknowledgement from the server. The XE IP PBX provides the function of TFTP client.

5.4.2  TFTP Protocol Configuration

I. Downloading files

Perform the following configuration in user view.

Table 5-14 Download files using TFTP

Operation

Command

Download files using TFTP

tftp X.X.X.X get source-filename [ destination-filename ]

Download files by security mode

tftp X.X.X.X sget source-filename [ destination-filename ]

 

  Caution:

If you choose the security mode, the current system must have adequate memory to save the files to be downloaded.

 

II. Uploading files

Perform the following configuration in user view.

Table 5-15 Upload files using TFTP

Operation

Command

Upload files using TFTP

tftp X.X.X.X put source-filename [ destination-filename ]

 

5.4.3  Configuration Example of Upgrading the Comware Main Software Using TFTP

I. Network requirements

Use TFTP to upgrade the Comware main software. IP address of TFTP server is 10.110.10.10.

II. Network diagram

Figure 5-3 Upgrade using TFTP

III. Configuration procedure

1)         Starting up TFTP server program

Step 1: Start up the TFTP server program. Choose a PC with Ethernet card and Windows operation system. Start up the TFTP server program on the PC (XE IP PBX has no TFTP server program). Now take TFTPD32 under Windows 98 as example to explain the operation details. The following figure shows TFTPD32 interface.

Figure 5-4 TFTPD32 interface

Step 2: Set TFTP server file directory. After starting up the TFTP server, reset the TFTP server file directory, and copy the Comware main program file to be loaded to the directory. Or set the directory of the Comware main program file to TFTP server. Click <Settings> button, and the TFTPD32 settings interface appears as follows:

Figure 5-5 TFTPD32 settings interface

Input the file directory in the “Base Directory” and click <OK>.

 

&  Note:

The setting interface varies with the TFTP server program software.

 

2)         Execute the TFTP operation in the configuration interface of the XE IP PBX.

<XE> tftp 10.110.10.10 get xe.bin system

 


Chapter 6  User Management

6.1  Introduction to User Management

6.1.1  User Classification

From the perspective of the terminal services for the users, the XE IP PBX users can be classified as follows:

l           Terminal users: Users logging into an XE IP PBX via the Console or AUX port;

l           Telnet users: Users logging into an XE IP PBX via a Telnet connection;

l           FTP users: Users establishing FTP connection with an XE IP PBX to transfer files.

A user can use multiple services at the same time.

6.1.2  Authentication Scheme

The system authenticates the terminal users logging in with two methods: non-authentication and local authentication. The non-authentication means the user can log in once connected to the XE IP PBX. This method is not recommended for the sake of security. The local authentication requires both user name and password, which must be consistent with those configured on the XE IP PBX.

The local authentication is commonly used for Telnet users and Terminal users.

6.1.3  User Level

The system can manage users of HyperTerminal and Telnet by their levels. The user levels are classified as Visit, Monitor, System, and Manage with level identifier ranging from 0 to 3, which is the same as that of the command level. The commands a user can access depend on the user’s level. The commands which a login user can access are determined by the level of the user interface through which the user logs in if non-authentication or password authentication is specified. .

A login user can use the commands at the current and all the lower levels.. For example, if the user level is 2, the users can access commands of level 0, 1, and 2. Users of level 3 can access all commands. Table 6-1 lists the commands that users of different levels can access.

Table 6-1 User level

Level identifier

Level

Commands

0

Visit

ping, tracert, telnet

1

Monitor

ping, tracert, telnet, display, debugging

2

System

All configuration commands (except those of Manage level) and commands of level 0 and 1

3

Manage

All commands

 

&  Note:

Commands of Manage level include commands of file system, FTP, TFTP, and XModem.

 

In case of non-authentication for user interface, the level of the commands a login user can access is determined by the level of the user interface. If the user name and the password are required for the user interface authentication (local authentication), the level of the commands a login user can access is determined by the level of the user.

6.1.4  Planning XE IP PBX User

An XE IP PBX must have at least one HyperTerminal user – Terminal user. If you want to remotely log into an XE IP PBX using Telnet, you need to configure a Telnet user. To enable a remote user to upload or download files from an XE IP PBX, you must configure an FTP user.

This chapter describes how to configure a Telnet user and a terminal user. Refer to FTP Configuration for information on how to configure a FTP user.

6.2  User Configuration

The following sections describe user configuration tasks:

l           Configure methods of user authentication

l           Configure a local user

The purpose of user authentication is to enable valid users to log in, operate, and manage the XE IP PBX, and to disable invalid users.

6.2.1  Configuring User Authentication Method

Configuring the method of the user authentication is to set the authentication method to be used when a terminal (Console, Aux, and VTY) user logs into an XE IP PBX.

Perform the following configuration in user interface view.

Table 6-2 Configure the method of user authentication

Operation

Command

Set to perform user authentication

authentication-mode { password | local | scheme }

Set not to perform user authentication

authentication-mode none

 

The keyword none specifies no authentication. The keyword password specifies to perform the password authentication without the user name. You can set the password by the set authentication password command. The keyword local specifies to perform local authentication, requiring both the user name and the password.

User interface of VTY type (Telnet) defaults to adopt password authentication. User interface of Console and AUX do not perform terminal authentication by default.

The keyword local is commonly used to perform local authentication when configuring the authentication method for Telnet and terminal users.

6.2.2  Configuring Password Authentication

I. Configuring the password for password authentication

If you choose to perform the password authentication, you must set the password.

Perform the following configuration in user interface view.

Table 6-3 Set the password for password authentication

Operation

Command

Set the password for password authentication

set authentication password { cipher | simple } password

Delete the password for password authentication

undo set authentication password

 

Cipher: Means to configure an encrypted text password.

Simple: Means to configure a plain text password.

II. Configuring Privilege level of user interface

In case of password authentication, the user level is determined by the privilege level of the user interface.

Perform the following configuration in user interface view.

Table 6-4 Set the privilege level of user interface

Operation

Command

Set the privilege level of user interface

user privilege level level

Restore the default privilege level of user interface

undo user privilege level

 

By default, the privilege level of user interface for CON port is 3, and the privilege level of other user interfaces is 0.

6.2.3  Configuring Local-Authenticated Users

I. Configuring the user name

Use the local-user command to configure a local user for local authentication. You must configure a user name first, then the user type and the privilege level. When configuring a user, a password is not mandatory, in which case you can log in by simply pressing <Enter>.

Perform the following configuration in system view.

Table 6-5 Set the user name and the password for local authentication

Operation

Command

Set a user name and a password

local-user local-user [ password { cipher | simple } password ]

Delete a user

undo local-user local-user

 

simple: Represents a plain text password, that is, the password is displayed in plain text when using the display command to view the information about the user.

cipher: Represents an encrypted text password, that is, the password is displayed in encrypted text when using the display command to view the information about the user.

 

&  Note:

When you press <Enter> immediately after typing the local-user local-user command, if there is no such existing user, the system will create a new user, otherwise, it will not create a new user, nor makes changes to the original one with the same name.

 

II. Authorizing the User to use a Type of Service

Use the local-user command to authorize the local user to use a type of service.

Perform the following configuration in system view.

Table 6-6 Authorize the user to use a type of service

Operation

Command

Authorize the user to use a type of service

local-user local-user service-type { ftp | terminal | telnet }*

Restore the default service type of the user

undo local-user local-user service-type

 

By default, the user is authorized to use all types of services.

III. Setting the user level

The user level is prior to the privilege level of user interface. This means that when both levels are set, and the user logs in via the user interface terminal, the level is determined by the user level.

Perform the following configuration in system view.

Table 6-7 Set the user level

Operation

Command

Set the user level

local-user username level level

Restore the default user level

undo local-user local-user level

 

The user level is determined by the parameter level, which ranging from 0 to 3. Level 0 is the lowest level and level 3 is the highest. The user level is not set by default.

6.3  AAA Configuration

6.3.1  Introduction to AAA

I. Functions

Authentication, Authorization, and Accounting (AAA) provides users with security functions of AAA described as follows:

l           Authentication: To authenticate users to access the network.

l           Authorization: To authorize a user to use specific services.

l           Accounting: To record the utility of the network resources.

AAA generally adopts the client/server architecture. The client runs on the managed resource side, and the user information is centralized on the server. This kind of structure is easy to extend, and the user information is easy to manage centrally.

 

&  Note:

An XE IP PBX usually authenticates users using the authentication function of AAA.

 

6.3.2  Configuring AAA

AAA configuration is mainly applied in authentication scheme, namely, the authentication method is configured in GUI view. For detailed information refer to Configuring User Authentication.

6.3.3  Displaying and Debugging AAA

After the above configuration, you can execute the display command in any view to view the operation of the AAA and verify the configuration.

Use the debugging command to enable debugging for AAA.

Table 6-8 Display and debug AAA

Operation

Command

Display local user database

display local-user

Enable debugging for AAA events

debugging aaa event

Disable debugging for AAA events

undo debugging aaa event

Enable debugging for AAA primitive

debugging aaa primitive

Disable debugging for AAA primitive

undo debugging aaa primitive

 

6.4  Displaying User Information

After configuring the user account, you can use the following commands to display information about the user interfaces, local users, and login users.

Perform the following configuration in any view.

Table 6-9 Display user information

Operation

Command

Display the information of user interfaces

display users [ all ]

Display local users

display local-user

 

6.5  Configuration Examples

6.5.1  Authenticating Users with Password

Perform password authentication to users that log in via VTY 0. The users must enter h3c as the password for a successful login. The configuration procedure is as follows:

<XE> system-view

[XE] user-interface vty 0

[XE-ui-vty0] authentication-mode password

[XE-ui-vty0] set authentication password simple h3c

6.5.2  Authenticating Users with the Local Database

I. Network requirements

Configure three users locally: admin, operator, and guest, whose level is 3, 2, and 0 respectively. The admin enjoys all the terminal services while the operator and guest have access to Telnet terminal service.

II. Network diagram

Figure 6-1 Distribution of user terminals

III. Configuration procedure

# Configure local users and their terminal service type.

[XE] local-user admin password cipher pass1

[XE] local-user admin service-type terminal telnet ftp

[XE] local-user admin level 3

[XE] local-user opera password simple pass2

[XE] local-user opera service-type telnet

[XE] local-user opera level 2

[XE] local-user guest password simple pass2

[XE] local-user guest service-type telnet

[XE] local-user guest level 0

# Configure the default scheme for login users.

[XE] aaa authentication-scheme login default local

# Configure the authentication scheme of Console user interface.

[XE] user-interface console 0

[XE-ui-console0] authentication-mode scheme default

# Configure the authentication scheme of AUX user interface.

[XE] user-interface aux 0

[XE-ui-aux0] authentication-mode scheme default

# Configure the authentication scheme of VTY 0 to 4 user interfaces.

[XE] user-interface vty 0 4

[XE-ui-vty0-4] authentication-mode scheme default

 


Chapter 7  SNMP Configuration

7.1  SNMP Overview

7.1.1  Introduction to SNMP

Simple network management protocol (SNMP) is a widely used industry standard. Its purpose is to ensure the transmission of management information between any two points so that the network administrator can retrieve the information at any point on the network and perform appropriate modification, troubleshooting, fault diagnosis, and capacity planning and reporting. It adopts polling mechanism and offers the most essential functionality set, so it is appropriate for networks of high speed and low cost. The only requirement of unacknowledged transport layer protocol UDP makes it widely supported.

Structurally, SNMP is divided into two parts: NMS (network management station) and Agent. The NMS is a workstation running the client programs. The commonly used network management platforms are Sun NetManager and IBM NetView. The Agent is server-side software running on network devices. The information exchange between NMS and Agent is performed by the following way: The NMS sends packets of GetRequest, GetNextRequest, GetBulkRequest, and SetRequest to the Agent. Once the Agent receives request packets from the NMS, it performs Read or Write operation on management variables according to the type of the packets and generate Response packets and return it to the NMS. On the other hand, if any exception happens to the device, like a warm/cold restart, the Agent also sends a trap packet to the NMS on its own initiative for an event report.

7.1.2  SNMP Versions and MIBs Supported

The managed objects in the device are described with management variables in SNMP packets. In order to identify a managed object uniquely in the device, SNMP uses a hierarchical naming convention to distinguish different managed objects. The hierarchical structure is like a tree with its nodes representing managed objects. Each node is identified uniquely by the path from the root. See Figure 7-1.

Figure 7-1 MIB tree structure

In Figure 7-1, the managed object B is uniquely determined by a string of digits {1.2.1.1}, which is the object identifier of the managed object. The MIB (management information base) is used to describe the hierarchical structure of the tree and is a collection of the definitions of standard variables on monitored network devices.

The SNMP Agent in XE IP PBX system supports SNMP v3 and is compatible with SNMP v1 and SNMP v2c. The MIB supported is displayed in the table below.

Table 7-1 Types of the MIB supported

MIB property

Contents of MIB

Standard or specification

Public MIB

MIB II based on TCP/IP network devices

RFC1213

Ethernet MIB

RFC 2665, RFC2668

IF MIB

RFC1573

SNMPV2 MIB

RFC1907

Framework MIB

RFC2571

Usm MIB

RFC2573

Mpd MIB

RFC2572

Vacm MIB

RFC2275

Target MIB

RFC2273

Notification MIB

RFC2273

Private MIB

HUAWEI-3COM-OID-MIB

Definition of private MIB root node

H3C-CONFIG-MAN-MIB

Configuration management

H3C-FLASH-MAN-MIB

Flash management

H3C-SYS-MAN-MIB

System management

H3C-ENTITY-VENDORTYPE-OID-MIB

Definition of entity device vendor nodes

H3C-ENTITY-EXT-MIB

Entity management extension

H3C-IPPBX-MIB

XE IP PBX information query

 

7.2  SNMP Configuration

The following sections describe SNMP configuration tasks:

l           Enabling/Disabling the SNMP Agent Service

l           Enabling/Disabling the Corresponding Version of SNMP

l           Setting Community Name

l           Setting/Deleting an SNMP Group

l           Adding/Deleting a User

l           Setting System Contact

l           Enable/Disable Trap Packets

l           Setting the Engine ID of a Local Device

l           Setting the Address of the Trap Target Host

l           Setting the Location of XE IP PBX

l           Specifying the Source Address of Trap Packets

l           Setting the MIB View

l           Setting the Maximum Size of SNMP Packets

l           Setting the Queue Length of Trap Packets

l           Setting the Aging Time of Trap Packets

7.2.1  Enabling/Disabling the SNMP Agent Service

Use the configuration to enable the SNMP Agent service, which is disabled by default.

Perform the following configuration in system view.

Table 7-2 Enable/disable the SNMP Agent service

Operation

Command

Enable the SNMP Agent service

snmp-agent

Disable the SNMP Agent service

undo snmp-agent

 

7.2.2  Enabling/Disabling the Corresponding Version of SNMP

Use the configuration to enable the corresponding version of SNMP and the SNMP v3 is enabled by default. Use the snmp-agent sys-info version command to enable SNMP v1 and SNMP v2c when necessary.

Perform the following configuration in system view.

Table 7-3 Enable/disable the corresponding version of SNMP

Operation

Command

Enable the corresponding version of SNMP

snmp-agent sys-info version { { v1 | v2c | v3 } * | all }

Disable the corresponding version of SNMP

undo snmp-agent sys-info version { { v1 | v2c | v3 } * | all }

 

"*" indicates to select several versions from v1, v2c and v3, with one at least and all the three at most.

# Enable the versions of SNMP v2c and SNMP v3.

[XE] snmp-agent sys-info version v3 v2c

# Disable the versions of SNMP v2c and SNMP v1.

[XE] undo snmp-agent sys-info version v1 v2c

7.2.3  Setting Community Name

SNMPv1 and SNMPv2c use community names for authentication and SNMP packets that do not match the authenticated community name of the device are dropped. An SNMP community is named with a character string called Community Name. Different communities can have the read-only or read/write access mode. A community with read-only privilege can only perform queries on device information and a community with the read/write privilege can configure the devices additionally.

Perform the following configuration in system view.

Table 7-4 Set/delete a community name.

Operation

Command

Set a community name and its access privilege

snmp-agent community { read | write } community-name [ mib-view view-name ]

Delete a community name previously set

undo snmp-agent community community-name

 

If you perform configuration on a community repeatedly, the last configured attribute takes effect.

# Set the public community to read-only privilege.

[XE] snmp-agent community read public

# Set the private community to read/write privilege.

[XE] snmp-agent community write private

7.2.4  Setting/Deleting an SNMP Group

Use the configuration to set or delete an SNMP group.

Perform the following configuration in system view.

Table 7-5 Set/delete an SNMP group.

Operation

Command

Set an SNMP group.

snmp-agent group { v1 | v2c } group-name [ read read-view ] [ write write-view ] [ notify-view notify-view ]

snmp-agent group v3 group-name [ authentication | privacy ] [ read read-view ] [ write write-view ] [ notify-view notify-view ]

Delete an SNMP group.

undo snmp-agent group { v1 | v2c } group-name

undo snmp-agent group v3 group-name [ authentication | privacy ]

 

7.2.5  Adding/Deleting a User

Use the configuration to add or delete a user for an SNMP group.

Perform the following configuration in system view.

Table 7-6 Add/delete a user for an SNMP group.

Operation

Command

Add a new user to an SNMP group.

snmp-agent usm-user { v1 | v2c } user-name group-name

[ [ authentication-mode { md5 | sha } auth-password ] [ privacy-mode des56 priv-password ] ]

Delete a user from an SNMP group.

undo snmp-agent user { v1 | v2c } user-name group-name

undo snmp-agent user v3 user-name group-name [ engineid engine-id | local ]

 

# Add the user “John” to the SNMP group “Johngroup”, with security level as authentication required, the specified authentication protocol as “HMAC-MD5-96”, and the authentication password as “hello”.

[XE] snmp-agent usm-user v3 John Johngroup authentication-mode md5 hello

7.2.6  Setting System Contact

System contact of the administrator is a management variable of the system group in MIB II and it contains the ID and contact of relevant administrator of the managed devices (XE IP PBX). Store the important information in the XE IP PBX through configuring this parameter and you can query when emergency occurs.

Perform the following configuration in system view.

Table 7-7 Set/restore system contact

Operation

Command

Set the ID and contact of the administrator

snmp-agent sys-info contact sysContact

Restore the default ID and contact of the administrator

undo snmp-agent sys-info contact

 

Example:

[XE] snmp-agent sys-info contact Mr.zhang 13800138002

7.2.7  Enable/Disable Trap Packets

Traps packets are messages sent to the NMS without solicitation by the managed device on its own initiatives, reporting some emergent and significant events.

Perform the following configuration in system view.

Table 7-8 Allow/forbid Trap packets

Operation

Command

Enable the trap packets

snmp-agent trap enable [ trap-type [ trap-list ] ]

Disable the trap packets

undo snmp-agent trap enable [ trap-type [ trap-list ] ]

 

By default, trap packets are disabled.

The command snmp-agent trap enable without any parameter indicates to enable all types of trap packets in all modules.

7.2.8  Setting the Engine ID of a Local Device

Use the configuration to set the engine ID of a local device. The engine ID is a hexadecimal string consisting of 10 to 64 characters and is the number of the characters must be an even number. By default, the engine ID of the device is "enterprise number + device information" of the company. It can be either the IP address, MAC address or the user-defined hexadecimal digit string.

Perform the following configuration in system view.

Table 7-9 Set the engine ID of a local device

Operation

Command

Set the engine ID of a device

snmp-agent local-engineid engineid

Restore the engine ID of a device .

undo snmp-agent local-engineid

 

7.2.9  Setting the Address of the Trap Target Host

Perform the following configuration in system view.

Table 7-10 Set/delete the address of the destination host for Trap packets

Operation

Command

Set the address of the trap target host

snmp-agent target-host trap address udp-domain X.X.X.X [ udp-port port-number ] params securityname security-string [ v1 | v2c | v3 { authentication | privacy } ]

Delete the address of the trap target host

undo snmp-agent target-host X.X.X.X securityname security-string

 

# Enable the trap packet destined for the address 202.38.160.6, using the community name public.

[XE] snmp-agent target-host trap address udp-domain 202.38.160.6 udp-port 5000 params securityname public

7.2.10  Setting the Location of XE IP PBX

The location of XE IP PBX is a management variable of the system group in MIB and represents the location of a managed device.

Perform the following configuration in system view.

Table 7-11 Set the location information of XE IP PBX

Operation

Command

Set the location of XE IP PBX

snmp-agent sys-info location sysLocation

Restore the location of XE IP PBX to default value

undo snmp-agent sys-info location

 

# Set the location of the XE IP PBX to h3c.

[XE] snmp-agent sys-info location h3c

7.2.11  Specifying the Source Address of Trap Packets

Use the configuration to set or delete the source address of the trap packets.

Perform the following configuration in system view.

Table 7-12 Specify/delete the source address of the trap packets

Operation

Command

Specify the source address of trap packets

snmp-agent trap source { interface-type interface-number | interface-name } [ subinterface-type ]

Delete the source address of trap packets

undo snmp-agent trap source

 

# Take the IP address of the Ethernet interface 1/0 as the source address of the trap packets.

[XE] snmp-agent trap source ethernet 1/0

7.2.12  Setting the MIB View

Use the configuration to establish, update or delete the view.

Perform the following configuration in system view.

Table 7-13 Establish/update/delete a view

Operation

Command

Establish or update a view

snmp-agent mib-view { included | excluded } view-name oid-tree

Delete a view

undo snmp-agent mib-view view-name

 

# Create a view including all the objects of internet (1.3.6.1).

[XE] snmp-agent mib-view included myview 1.3.6.1

7.2.13  Setting the Maximum Size of SNMP Packets

Use the configuration to set the maximum size of SNMP packets to and from Agent.

Perform the following configuration in system view.

Table 7-14 Set the maximum size of SNMP packets

Operation

Command

Set the maximum size of SNMP packets to and from Agent

snmp-agent packet max-size byte-count

Restore the default maximum size of SNMP packets

undo snmp-agent packet max-size

 

The maximum size of SNMP packets to and from an Agent ranges from 484 to 17940 in bytes and the default size is 2000 bytes.

# Set the maximum size of SNMP packets to and from an Agent to 1042 bytes.

[XE] snmp-agent packet max-size 1042

7.2.14  Setting the Queue Length of Trap Packets

Use the configuration to set the queue length of the trap packets sent to the destination host.

Perform the following configuration in system view.

Table 7-15 Set the queue length of trap packets

Operation

Command

Set the queue length of the trap packets sent to the destination host

snmp-agent trap queue-size size

Restore the default queue length of the trap packets

undo snmp-agent trap queue-size

 

The queue length of trap packets ranges from 1 to 1000 with the default value as 100.

# Set the queue length of trap packets  to 200.

[XE] snmp-agent trap queue-size 200

7.2.15  Setting the Aging Time of Trap Packets

Use the configuration to set the aging time of trap packets. The trap packets exceeding this time are dropped.

Perform the following configuration in system view.

Table 7-16 Set the aging time of trap packets

Operation

Command

Set the aging time of trap packets

snmp-agent trap life seconds

Restore the default trap packets aging time

undo snmp-agent trap life

 

The range of seconds is from 1 to 2592000, with the default value as 120 seconds.

# Set the aging time of trap packets to 60 seconds.

[XE] snmp-agent trap life 60

7.3  Displaying and Debugging SNMP

Execute the display commands in any view to display the running information of the SNMP configured and verify the configuration.

Use the debugging command to enable debugging for SNMP in user view.

Table 7-17 Display and debug SNMP

Operation

Command

Display the version enabled by SNMP

display snmp-agent sys-info version

Display the statistics of SNMP packets

display snmp-agent statistics

Display the engine ID of the current device

display snmp-agent { local-engineid }

Display the group name, security mode, status of views, and storage modes of groups

display snmp-agent group [ group-name ]

Display all the SNMP user names in a group user name list

display snmp-agent usm-user [ engineid engineid | username user-name | group group-name ] *

Display the community name of the current configuration

display snmp-agent community [ read | write ]*

Display the MIB view of the current configuration

display snmp-agent mib-view [ exclude | include | viewname view-name ]

Display the character string of system maintenance contact

display snmp-agent sys-info contact

Display the character string of system location

display snmp-agent sys-info location

Enable debugging for SNMP

debugging snmp-agent { header | packets | trap | process }

 

7.4  Configuration Example

I. Network requirements

Take the diagram below for example. A network management station (NMS) with the IP address of 192.168.80.100/24 is connected to an XE IP PBX with the IP address of 192.168.80.50/24 via the Ethernet port.

II. Network diagram

Figure 7-2 Network diagram for SNMP configuration

III. Configuration procedure

# Enter system view.

<XE> system-view

System View: return to User View with Ctrl+Z.

Press <Enter> to enter system view.

# Configure community name and access privilege level.

[XE] snmp-agent community read public

[XE] snmp-agent community write private

# Set the ID and contact of the administrator, and the physical location of XE IP PBX.

[XE] snmp-agent sys-info contact Mr.Wang-Tel:3306

[XE] snmp-agent sys-info location telephone-closet,3rd-floor

# Enable the trap packets destined for NMS 129.102.149.23, with the community name public.

[XE] snmp-agent trap enable

[XE] snmp-agent target-host trap address udp-domain 192.168.80.100 udp-port 5000 params securityname public

IV. Configuring NMS

Take IBM xnmbrowser for example. Set the Name of IP Address to 192.168.80.50 and the Community Name to private. Then use the NMS client program to perform queries and configuration on the XE IP PBX.

In MIB Object ID, input the instance "iso.org.dod.internet.mgnt.mib-2.system", click <Start Query> and you can get the following results:

SysDescr.0 : STRING: HUA WEI CORP. SNMP agent for XE

SysUpTime.0 :    (105300) 00:17:33:00

SysContact.0 :   Mr.Wang-Tel:3306

SysName.0 :      sysadm

SysLocation.0 :  telephone-closet,3rd-floor

SysServices.0 :  79

If you cannot understand the meanings of these management variables in the MIB, click <Describe> to get the related description.

 


Chapter 8  Modem Management Configuration

8.1  Introduction to Modem Management

8.1.1  Modem Management on the XE IP PBX

Modem is a widely used network device nowadays. It is vital for the XE IP PBX to properly manage and control its Modem.

Now, numerous Modem manufacturers produce various models of Modem. Though all of them support the industry-standard AT command set, they somewhat differ in actual implementations and command details.

To properly and flexibly manage the Modem connected to the XE IP PBX, the XE IP PBX provides the following Modem management functionality:

1)         The script language for Modem management for a good control of the Modem connecting to the XE IP PBX. A Modem script written with this language can be:

l           Executed directly through the script-string command to initialize or configure the Modem.

l           Triggered by particular events, such as XE IP PBX startup, Modem connection establishment, the start-script command, and so on.

2)         The use of Modem script cooperating with related commands can enhance the remote configuration function of the XE IP PBX. When the AUX port works in flow mode, you can establish a remote connection to the port through dumb terminal or Modem dialup, and further configure or manage the XE IP PBX.

3)         Through the Modem management, the XE IP PBX can intercommunicate with a device of other vendor when both AUX ports of the two parties are in flow mode.

4)         In addition, the Modem management on the XE IP PBX provides rich debugging information for you to easily monitor and maintain the Modem.

8.1.2  Modem Script

I. Purpose of Modem script

Using the Modem scripts written with the script language provided by the XE IP PBX, you can make the system:

l           Flexibly control different models of Modem. Through executing different initialization AT command strings, the XE IP PBX can well cooperate with a variety of Modems by different manufacturers with different models.

l           Log into a remote system in interactive mode. Interactive negotiation of script can turn the system into different connection states. For example, after the AUX port on the XE IP PBX set up a connection with the remote device through the Modem, it negotiates the protocol to be encapsulated on the physical link and the operating parameters of the protocol with the remote device.

II. Syntax of Modem script

The general format of Modem script is as follow:

send-string1 receive-string1 send-string2 receive-string2 ......

Among which:

l           send-string represents the character string to be sent.

l           receive-string represents the character string to be received.

l           send-string and receive-string appear in pairs and a script must begin with a send-string, such as “send-string1 receive-string1 ......”. This represents the execution flow: First, the system sends the string send-string1 to the Modem and expects to receive the string receive-string1. If it receives a string matching receive-string1 before timeout, it executes the following script, otherwise, it terminates the execution of this script.

l           If the last string is a send-string, it indicates that, once this string is sent, the execution of the script is terminated without waiting for any other receive-string.

l           If it is unnecessary to send a string at the beginning of a script execution, and the system directly waits for a receive-string, you can set the first send-string to "". The following section will cover the details on the quotation mark.

l           Except for the send-string ended with “\c”, the send-string will be automatically appended with a carriage return when it is sent.

l           The received content does not need to exactly match the receive-string. That is, the match is considered successful as long as the received content contains the expected string.

l           One receive-string can includes many character strings separated by "-". The match is considered successful as long as the received content contains one of these character strings.

l           By default, the timeout time of waiting for a receive-string is five seconds. You can insert the TIMEOUT seconds anywhere in a script to adjust the timeout time, which is valid till a new TIMEOUT is set in the same script.

l           All the strings and keywords in a script are case sensitive.

l           Use spaces to separate strings or keywords. So a space contained in a string must be enclosed in double quotation marks (" "). A pair of empty quotation marks (that is, "") has two meanings: Being a leading "" in a script, it means that no string needs to be sent and the system directly waits for a receive-string. If "" is in any other location in the script, it is regarded as the content of a string.

l           You can insert ABORT receive-string anywhere in a script to change the execution flow of this script. Its presence in the script indicates that the script execution will be terminated if a received string exactly matches the receive-string set by ABORT receive-string. You can set more than one ABORT receive-string in a script, all of they will take effect; that is, once a received string matches any one of them, the script execution is terminated. Wherever an ABORT receive-string is placed, it takes effect in the whole script execution flow.

l           You can insert escape characters in a script to further control the script and increase its flexibility. In addition, all the escape characters play the role of delimiters in string as well.

Table 8-1 Script keywords

Keyword

Description

ABORT receive-string

The string following ABORT will be compared with the strings sent from the Modem or remote DTE device in exact matching mode. One script can includes multiple ABORT settings, and all of them take effect in the whole script execution process.

TIMEOUT seconds

The digit following TIMEOUT is used to set the timeout time that allows the system to wait for a receive-string. If no expected string is received within this time, the execution of the script fails. Once set, the settings will be valid till a new TIMEOUT is configured.

 

Here seconds is in the range of 0 second to 180 seconds and defaults to 180.

Table 8-2 Escape characters used in script

Escape character

Description

\c

Represents that the system does not automatically append a carriage return to the string; it sends only the specified characters in the string. The "\c" character is valid only when it is located at the end of the send-string.

\d

Represents a two-second pause.

\n

Represents the new line character.

\r

Represents the carriage return character.

\s

Represents the space character.

\t

Represents the Tab character.

\\

Represents the backslash ("\") character.

\T

Represents telephone number.

 

8.2  Modem Management Configuration

The following sections describe the Modem management configuration tasks:

l           Configuring the Incoming and Outgoing Calls of the Modem

l           Configuring a Modem Script

l           Executing a Modem Script Manually

l           Specifying a Modem Script Triggered by an Event

l           Configuring the Answer Mode for the Modem

8.2.1  Configuring the Incoming and Outgoing Calls of the Modem

Perform the following configuration in user-interface view.

Table 8-3 Configure the incoming and outgoing access of the Modem

Operation

Command

Allow only incoming calls of the Modem

modem call-in

Allow both incoming and outgoing calls of the Modem

modem both

Inhibit both incoming and outgoing calls of the Modem

undo modem both

Inhibit incoming calls of the Modem

undo modem call-in

 

By default, the Modem is inhibited from both incoming and outgoing calls.

8.2.2  Configuring a Modem Script

Perform the following configuration in system view.

Table 8-4 Configure a Modem script

Operation

Command

Define a Modem script

script-string script-name script-content

Delete a Modem script

undo script-string script-name

 

For the format of script, refer to Syntax of Modem script.

8.2.3  Executing a Modem Script Manually

When necessary, you can use the start-script command to execute a specific Modem script to manage the Modem connected to the port.

Perform the following configuration in user view.

Table 8-5 Execute a Modem script manually

Operation

Command

Execute a Modem script manually

start-script script-name number

 

8.2.4  Specifying a Modem Script Triggered by an Event

You can associate an event with a Modem script so that occurrence of this event can trigger the automatic execution of the script. The XE 200/2000 supports the following events to trigger a script:

l           Successful establishment of an outgoing connection: The system executes the specified script when an outgoing connection of the Modem is set up.

l           Successful establishment of an incoming connection: The system executes the specified script when an incoming connection of the Modem is set up.

l           DCC dialup: The system executes the specified script when a DCC dialup is made.

l           Line reset: The system executes the specified script when a line is disconnected.

l           System power-on or reboot: The system executes the specified script on the AUX port when the system is powered on or initialized.

For any event above, you can use the script command to specify a Modem script triggered by the event.

Perform the following configuration in user-interface view.

Table 8-6 Specify a Modem script triggered by an event

Operation

Command

Specify the automatically executed Modem script when an outgoing connection is set up successfully.

script trigger login script-name

Specify the automatically executed Modem script when an incoming connection is set up successfully.

script trigger connect script-name

Specify the automatically executed Modem script when a DCC dialup is made.

script trigger dial script-name

Specify the automatically executed Modem script when a line is reset.

script trigger logout script-name

Specify the automatically executed Modem script when the system is powered on or rebooted.

script trigger init script-name

 

8.2.5  Configuring the Answer Mode for the Modem

You should perform this configuration based on the state (answer mode) of the connected Modem. If the Modem is in auto-answer mode (AA LED of the Modem illuminates), you should execute the modem auto-answer command before dialing up. If the Modem is in non-auto answer mode, you should execute the undo modem auto-answer command. If this configuration is not consistent with the state of the Modem, the system may loss some of the incoming calls from the Modem.

Perform the following configuration in user-interface view.

Table 8-7 Configure the answer mode for the Modem

Operation

Command

Set the auto-answer mode for the Modem

modem auto-answer

Set the non-auto answer mode for the Modem

undo modem auto-answer

 

By default, the answer mode for the Modem is non-auto.

8.2.6  Configuring Modem Callback

Perform the following configuration in system view.

Table 8-8 Configure Modem callback

Operation

Command

Configure the Modem callback

service modem-callback

Disable the Modem callback

undo service modem-callback

 

By default, the Modem callback is disabled.

8.3  Displaying and Debugging the Modem

To monitor and maintain the Modem, you can use the debugging command in user view to enable debugging for Modem or display the state parameters.

Table 8-9 Display and debug Modem

Operation

Command

Enable debugging for Modem

debugging modem

 

8.4  Configuration Examples

8.4.1  Using Modem Script to Manage the Modem

I. Configuring a Modem to adapt the baudrate

1)         Network requirements

The AUX port of the XE IP PBX is connected to a Modem. The system uses standard AT commands to negotiate a baudrate with the Modem. It sends the "AT" command through the port to the Modem. If an “OK” is received from the Modem, the system considers that the Modem can automatically adapt to the corresponding baudrate. Then, the system writes and saves the rate configuration to the Modem with the AT command “AT&W”.

2)         Network diagram

Figure 8-1 Network Diagram for the Modem management of the XE IP PBX

3)         Configuration procedure

# Define a Modem script.

[XE] script-string baud "" AT OK AT&W OK

# Execute the script on the AUX port connecting the Modem in user view.

<XE> start-script baud 1

II. Restoring the factory-default settings of Modem

1)         Configuration requirements

To restore the factory-default settings of Modem, use the “AT&F” command.

2)         Configuration procedure

# Define a Modem script.

[XE] script-string factory "" AT OK AT&F OK

# Execute the script on the AUX port connecting the Modem in user view.

<XE> start-script factory 1

8.4.2  Using Modem Script to Make Power-on Initialization of the Modem

I. Configuration requirements

Make appropriate configuration to allow the XE IP PBX to initialize the Modem connected to the AUX port when the XE IP PBX is powered on or rebooted.

II. Configuration procedure

[XE] script-string init "" AT OK AT&B1&C1&D2&S0=1 OK AT&W OK

[XE] user-interface aux 0

[XE-ui-aux0] modem

[XE-ui-aux0] script trigger init init

8.4.3  Using Modem Script to Dial up Directly

I. Configuration requirements

Define a Modem script to dial up directly.

II. Configuration procedure

# Define a Modem script

[XE] script-string dial "" AT OK ATDT8810058 CONNECT

# Execute the script on the AUX port connecting the Modem in user view

<XE> start-script dial 1

8.5  Troubleshooting the Modem

Symptom: The Modem is in abnormal state (for example, the busy tone keeps being played or the dial tone keeps whistling for a long time).

Solution:

l           Execute the shutdown and undo shutdown commands on the physical interface connected to the Modem, and then check whether the Modem restore the normal state.

l           If the Modem is still in abnormal state, re-power the Modem.

 

H3C reserves the right to modify its collaterals without any prior notice. For the latest information of the collaterals, please consult H3C sales or call 400 hotline.