Winfiol 7.3 SP2 introduces support of prompts used in APG43L.In Winfiol 7.4 -the new target type is introduced ('APG43L') with possibility to use auto-completion in setup mode of Winfiol as well support of arrow keys in TTY mode.It is necessary to check 'Automatically complete command target' in Traffic Setup of Winfiol for auto-completion to.
Element Management WinFIOL and Tools is a Shareware software in the category Communications developed by Card Sony Ericsson GC75.
The latest version of Element Management WinFIOL and Tools is currently unknown. It was initially added to our database on 11/13/2008.
Element Management WinFIOL and Tools runs on the following operating systems: Windows.
Element Management WinFIOL and Tools has not been rated by our users yet.
Write a review for Element Management WinFIOL and Tools!
06/03/2021 | Fake Webcam 7.3.766 |
06/03/2021 | Kate's Video Converter (free) 5.723 |
06/03/2021 | GSA Image Spider 3.55 |
06/03/2021 | Utilu Mozilla Firefox Collection 1.2.1.5 |
04/27/2020 | GameGain 8.4.27.2020 |
05/26/2021 | Chrome 91 update fixes vulnerabilities |
05/25/2021 | Free UpdateStar Packs to setup your computer software |
05/18/2021 | How to setup a VPN on a Windows computer using PureVPN for example |
05/16/2021 | Why you should think about using a VPN to protect your privacy |
05/11/2021 | Adobe fixes 43 vulnerabilities with May updates |
1 | General |
1.1 | Scope |
1.2 | Acronyms and terminology |
1.3 | Notation conventions |
2 | Prerequisites |
2.1 | Hardware build-up |
2.2 | Software components |
3 | Aids |
4 | References |
5 | Procedure |
6 | Execution |
6.1 | General |
6.2 | Performance and limitations |
6.3 | Configurations |
6.4 | Security |
6.5 | File descriptions |
6.6 | The base system shell |
6.7 | tncom, transparent Telnet to V.24 communication |
6.8 | Point to Point Protocol, PPP |
6.9 | Base SNMP, the base agent MIBs |
7 | Termination |
The Access Agent, without additional software, has the following facilities which are described in this document.
Examples of additional functionality (applications) that can be added are (described in separate documents):
AAU | Access Agent Unit |
ACAB | Agent Call Account Buffer application |
ASCII | American Standard Code for Information Interchange |
CHAP | Secure authentication support in the PPP protocol, compare with PAP |
CIL | Call Information Logging |
D.N.A. | Dynamic Network Administration |
FTP | File Transfer Protocol |
LAN | Local Area Network |
MIB | Management Information Base. A data base in a managed object reflecting its current configuration and status |
MML | Man Machine Language |
PAP | Simple authentication support in the PPP protocol, compare to CHAP |
PPP | Point to Point Protocol |
RFC | The Network Working Groups Request For Comments, Internet standard |
SNMP | Simple Network Management Protocol |
TCP/IP | Transmission Control Protocol/Internet Protocol. The de facto standard protocol for enterprise data network |
Telnet | Internet standard protocol for remote terminal connection service |
WAN | Wide Area Network |
Bold | Text as it is written on the screen. Also file names, commands, etc., when referred to in a text. |
Bold italic | User-written text on the screen (when it is not obvious). |
Italic | Reference to another section, picture, etc. |
Without brackets | Necessary words or arguments. |
[Within brackets] | Optional words or arguments. |
<Within tag markers> | Replace with argument (variable or string) |
€ | logical or, as in alternative argument in a command. |
Example: ping [-s] <IP address> [<time-out>]
Main characteristics:
This model contains one agent and is designed to fit in an ASB 501 04 LIM magazine.
For more information on how to install it, see installation instructions for ACCESS AGENT.
Figure 2-1. The connections in the frontpanel |
SNMP communication)
for local configuration. It can be set not to print the configuration parameters,
thus being available for applications, e.g. tncom (Telnet to V.24).
All the connections in the front (except the alarm input and Ethernet 10Base2) are shielded RJ45. On the back there is a power inlet.
Figure 2-2. The LEDs and buttons in the frontpanel. |
Upwards: hardware reset.
Downwards: forcing the configuration parameters to be printed to COM4 on reset, after having disabled it.
The Access Agent software (pre-installed) consists of a base system with the base application on top of it.
The Base system includes the following.
Above the Base system, applications can be added. In the Access Agent, there is one application: the Base application, which includes two parts:
As mentioned before, this software can be completed with SNMP Agent application and/or ACAB.
The picture below explains how the software components are read during the booting.
Figure 2-3. Booting sequence |
At power on or reset, the Boot starts. Normally the Boot is then replaced by the Soft-image
(/bsys.img). The Soft-image is a more often upgraded copy of the Boot (the Boot is resided in the flash memory, the Soft-image on the file system).
If the Soft-image file is not found or is corrupt (or by choice is not to be loaded), no applications are loaded. The Boot, though, contains basic functionality such as support for FTP, Telnet, PPP and TCP/IP. If the Soft-image is started, all the applications listed in the /startup file are loaded. In the Access Agent, the application consists of tncom and Basesnmp. When installing network element specific software, more applications are added.
-
-
-
The Access Agent Unit, without additional software, has the following facilities (all thoroughly described below).
Examples of additional functionality (applications) that can be added are (described in separate documents):
The configurations were made at the installation, but can be changed to fit the current situation. Refer to the installation instructions for ACCESS AGENT.
The following configuration can be made:
At each log in, the agent checks if the file /etc/passwd, which contains all user and password information, is present. If it is (which should normally be the case) the agent uses that file checking for authentication of the log in. If the /etc/passwd for some reason is not present, or is corrupt, the agent has a default user name and password that can be used. At delivery the default user name and password is:
This user name and password should be changed directly in the Normal network configuration mode.
Note | An SNMP trap will be sent when a user fails to log in. |
The system administrator (user of the group root) can add other users (to the /etc/passwd file) using the Base system shell command adduser, see The base system shell. A system administrator can change all the users' passwords. The users can change their own passwords.
A maximum of 255 users can be defined. A user can belong to a group (stored in the /etc/group file) with the same file access rights. A maximum of 255 groups can be defined.
Different users can have different file access permission. Each file (and directory) has attributes determining the file access permission at three levels:
The attributes are printed when ls -l is entered, for example:
r = read
w = write
x = execute
- = the indicated permission is not granted
The leftmost three attributes are for the owner of the file, the next three are for the group of the owner, and the last three are for others.
The algorithm used when accessing a file is as follows:
Yes: check the owner file access permission.
Does the user belong to the same group as the owner of the file?
Yes: check the group file access permission.
No: check the others file access permission.
The system administration group (root) is a special case; it is the only group that has execution rights and that can change attributes on files owned by another user.
There are Base system shell commands for handling the tasks concerning users, groups and passwords: (for more information, see the Base system shell)
Note: | The adduser and passwd commands update the two files in the directory, /etc/passwd and /etc/group. To remove a user or a group from the system, these files have to be edited manually. |
/: | |
BITMAP.SYS | System file |
FLIST.SYS | System file |
bsys.img | Soft image file, base system |
readme.txt | Important information. Always read it |
startup | Automatically read at start-up. Contains calls for the applications |
/bin/: | |
tncom | Application for V.24 to Telnet |
basesnmp | Application for SNMP management |
/cnf/: | |
comport.cnf | Configuration file for the comports |
communit.cnf | Configuration file for allowed communities |
log.cnf | Configuration file for log function |
mib2sys.cnf | Configuration file for MIB-II system variables |
trapcomm.cnf | Configuration file for where to send SNMP traps |
ppp.cnf | Configuration file for PPP communication |
ppp-auth.cnf | Configuration file defining passwords for PAP and CHAP (PPP) |
/etc/: | |
route | Configuration file for routing |
passwd | Containing all users and their passwords |
group | Containing all user groups and their members |
/man/: | A number of files containing the on-line help text. |
/mib/: | |
dna.mib | The D.N.A. MIB |
The shell used in the base system is a UNIX-style shell used for setting up and controlling the agent. For example the shell provides commands that can modify or add files. This can be an alternative to manipulate the files in an editor and then use FTP to copy them to the agent.
Note | The file system and the command interpreter are both case sensitive. |
The shell is a simple command interpreter. It has no wildcards (?, *, $) but it has the following notations for output redirection.
x >> y | Append x to the file y or, if the file does not exist, create a file y consisting of x. X can be a command generating text, see the example below. |
x > y | Create a file y with the contents x or, if the file already exists, overwrite the previous file. |
Examples:
Puts the contents of readme.txt last in the file myfile or, if the file does not exist, creates myfile.
Replaces the contents of the file startup with the text appl or, if it does not exist, creates a startup file.
Only the options described here are supported by Ericsson.
Table 6-1. The most common commands
Command | Description |
---|---|
adduser | Adds a new user to the system by performing a dialogue. (System administrator only) |
cat | Concatenates and displays the named file. For example: cat mib2sys.cnf |
cd | Changes working directory |
chgrp | Changes the group ownership of a file. (System administrator only) Example: chgrp team1 mib2sys.cnf |
chmod | Changes file access permission. Example: chmod 750 mib2sys.cnf 750 is an octal number designed from the following modes: 400 The file may be read by the owner. 200 Write by owner. 100 Execute by owner. 040 Read by group of the owner. 020 Write by group of the owner. 010 Execute by group of the owner. 004 Read by others. 002 Write by others. 001 Execute by others. The desired numbers are summarized. 750 means that the file can be read, written and executed by the owner, read and executed by the group of the owner, and others have no permission. |
chown | Changes the owner of the file. Example: chown steve mib2sys.cnf |
config | Opens the Normal network configuration menu (System administrator only). For others: list the network configurations. See section: Network configuration. |
df | Displays free disk space on flash memory (4.0/) and RAM (3.0/). |
flstat | Displays flash file system statistics. |
help | Displays help text for the named command, or if used alone, lists all the commands. For example: help cat |
imginfo | Displays the revision of an executable file in the file system. |
ls | Lists the contents of the directory. ls -l lists the contents with some file details. ls -lg lists the group of the file owner |
man | The same as help. |
netstat | Shows network status, that is which IP addresses that are connected to the agent. Should be executed before reset to check for connected users. |
readcnf | This command does not belong to the shell; it belongs to the SNMP application. Reads the configuration files /cnf/trapcomm.cnf, /cnf/communit.cnf, /cnf/mib2sys.cnf and /INTERFACE. No restart is needed. |
passwd | Changes the password for the specified user by performing a dialogue. A user not belonging to the system administration group can only change the user's own password, whereas the administrator may change anyone's password. passwd[<user>] If a user wants to change the password (a system administrator can change all passwords) the own user does not have to be specified. |
ping | Sends a test question (ICMP ECHO_REQUEST packet) to the specified network host (must be an IP address). For example: ping 10.0.0.32 |
reset | Does a soft reset. Use who and/or netstat before resetting to check that no one is logged in. |
tncom | This command does not belong to the shell; it is an application. Makes the agent transparent: enables Telnet to V.24. See section: tncom, transparent Telnet to V.24 communication. |
who | Prints logged on users (compare with netstat) who prints all logged on users who am i prints the name of the current user |
These commands are mainly meant to be used for development and internal purposes. They may be changed without notice.
Table: 6-2. Other commands
Command | Description |
---|---|
arp | Displays, sets, and deletes arp table entries |
clog | Re-reads the /cnf/log.cnf file and updates the log daemon |
cmp | Performs a byte-by-byte comparison of two files |
cp | Copies files |
date | Shows and sets date and time. Will not be saved after reset. (date [yyyymmddhhmm[.s]]) |
df | Returns free disk space (in bytes) |
du | Displays disk blocks usage |
echo | Echoes arguments to the standard output |
head | Displays the beginning of the specified file. |
ifconf | Sets network interface parameters |
mkdir | Makes a directory |
mkfs | Constructs a file system |
mount | Mounts a file system. See also umount. Example: mount 4.0 |
mv | Moves or renames files |
popd | Pops the directory stack and cd to the new top directory |
ppp | Controls PPP link status (ppp on€off) |
pushd | Pushes current directory onto the directory stack (pushd [dir]) |
pwd | Displays the pathname of the current working directory |
rm | Removes (unlinks) files |
rmdir | Removes (unlinks) directories |
route | Manipulates IP routing table |
sync | Flushes changed blocks in cache to disk |
tail | Displays the end of a specified file. |
touch | Updates the modification time of a file |
umount | Unmounts a file system. See also mount. Example: umount 4.0 |
version | Prints Boot and/or base system version |
Application above the base system that establishes a connection in a TCP/IP network between a Telnet client and a V.24 port, via the agent. This way, the user can have a Telnet session directly to the ASB 501 04, without using SNMP management. This gives an opportunity to use the ASB 501 04's own interface for a more detailed control, or for transferring files or other tasks.
For Telnet to V.24 support the files /bin/tncom and /cnf/comport.cnf have to be present on the agent's file system. /cnf/comport.cnf is a configuration file, described in installation instructions, ACCESS AGENT.
In the /startup file the line /bin/tncom has to be present to provide the Telnet to V.24 support. Normally, this is made during installation, but if it is not, add it and reset the agent.
All the arguments of the tncom command are described in the next chapter.
Example of the file /cnf/comport.cnf:
mml COM1 9600 8 n 1 XON/XOFF
The tncom command can be used with a number of arguments:
The syntax is as follows.
tncom <cmd> € <-c comport> [-f filename] [-t timeout] [-b] [-q]
where
cmd | The name of the comport referring to the file comport.cnf. Use either -c comport or cmd. |
-c comport | The number of the comport (1-4). Use either -c comport or cmd. |
-f filename | Logfile name |
-t timeout | Hardware flow control time out in seconds (0 = off) |
-b | Binary mode. The used comport cannot use xon/xoff for flow control (in comport.cnf) |
-q | Force an ongoing session, according to -c comport or cmd, to terminate. This option, however, can only be used from the same IP address as the ongoing session was previously started from. |
Note | Each tncom session can only be connected to one comport at a time. A comport can only be used by one tncom session (or other application) at a time. |
For example the command can look like this:
This specifies that all commands from the Telnet session will be stored in the logfile log.txt. The time out for the comport named mml is set to 5 seconds.
Do the following to transfer a file with tncom.
The Telnet client has to be able to transfer a file. (For example WINFIOL.)
To close the started Telnet to V.24 session, log out from the ASB 501 04. Press ctrl-d to close the Telnet session in the agent. If binary mode is used, quit using the break-sequence specified by the Telnet client, usually ctrl-].
tncom has no inactivity time out.
The Point-to-Point Protocol (PPP) is a data-link layer protocol that encapsulates multiple network layer packets to run over a serial connection. PPP defines a protocol for link control, various network control protocols, and authentication protocols. Additionally, the PPP communication may take place over direct (leased) lines or dial-up lines connected by modems.The PPP driver supports the following functions
For PPP communication there are the following configuration files:
They are described in installation instructions for ACCESS AGENT.
For more information on how to use PPP, see operational directions for ADVANCED HANDLING OF ACCESS AGENT.
The Base SNMP application of Access Agent provides basic SNMP management of its own SNMP agent, not any other. For SNMP support for ASB 501 04, the SNMP Agent should be used.
The MIB (Management Information Base) is the formal definition as to which data can be retrieved using SNMP commands. Before they can be accessed the management station needs to integrate (compile) the MIB into its data base. The following MIBs are supported by the Base agent SNMP configuration.
The D.N.A. MIB (filename /mib/dna.mib) defined in ASN.1 format is stored on the agent. It can then be accessed and downloaded from an SNMP manager.
Before any SNMP management can be used, the following configurations have to be made.
They are described in installation instructions for ACCESS AGENT.
The agent supports MIB II as defined in RFC 1213 extended with the ifName variable from the ifXTable in RFC 1573.
The Ericsson position within the global registration tree is:
iso(1).org(3).dod(6).internet(1).private(4).enterprise(1).ericsson(193)
The D.N.A. MIB structure within the Ericsson tree is:
Figure 6-1. The D.N.A. MIB structure within the Ericsson tree |
Before terminating, always key the command netstat to check that no one else is connected to the agent.