Tandem-Systems, Ltd. Rhino Terminal. User s Manual

Size: px
Start display at page:

Download "Tandem-Systems, Ltd. Rhino Terminal. User s Manual"

Transcription

1 Tandem-Systems, Ltd. Rhino Terminal User s Manual Tandem Systems, Ltd.,

2 Table of Contents Overview... 4 Features... 5 Getting Started... 6 The Main Window... 6 Establishing a Connection... 6 Using RouterTweak Extensions... 7 How do I Connect to a Host with TELNET/SSHv1/SSHv2 Protocol... 8 Establish a Raw Connection to a Host to Use POP3/SMTP or Similar Text-based Protocol... 8 Automate Login Procedure... 9 Transfer a File with X/Y/Z-modem Protocol... 9 Edit a Configuration of a Cisco Device Using RouterTweak Extensions Record and Play a Script Use a Command-Line Arguments When Running Rhino Terminal Managing Connections Connections Overview Using Quick Connect Creating, Editing and Deleting a Connection Connection Properties Generating Keys for a SSH Connection Organizing Connections Specifying Default Connection Properties RouterTweak Extensions Retrieving the Running and Startup Configurations Built-in Configuration File Editor Adding a Command Editing a Command Negating and Reverting Commands to Default Saving the Configuration to NVRAM Additional Editing Features Scripting What Is a Script? Script Recording and Execution P a g e

3 Scripting API Program Options Command Line Arguments P a g e

4 Overview WinAgents Rhino Terminal is a full-featured, convenient, and easy-to-use terminal emulation client. With WinAgents Rhino Terminal you receive a flexible tool for accessing remote hosts and network devices via the TELNET and SSH protocols. Clear user interface, scripting technology and ability to connect and log on to a remote host with a single mouse click make your work productive and comfortable. WinAgents Rhino Terminal advantages: Support of multiple simultaneous sessions in tabs. Quick access to a remote host. Support of SSH, TELNET and Serial communication protocols. Emulation of different terminal types: ANSI, VT52, VT100, VT220, Linux, XTerm. RouterTweak technology visual editing for configuration files of network devices manufactured by Cisco Systems. 4 P a g e

5 Features Protocols and standards support in WinAgents Rhino Terminal: Network Protocols SSH Versions: SSHv1 and SSHv2 Encryption algorithms: AES, Blowfish, 3DES, DES Authentication: password, DSA/RSA key, keyboard interactive Terminal Emulation File Transfer RouterTweak Technology TELNET Data compression TELNET options VT52, VT100, VT220, XTerm, Linux, ANSI ANSI colors National languages character encodings and UNICODE Advanced keyboard and mouse configuration X/Y/Z-Modem protocols for file transfers Visual editing for configurations of network devices manufactured by Cisco Systems Support of Cisco IOS, Cisco CATOS, and Cisco PIXOS Command completion and context hints in configuration editor Syntax highlighting both in CLI and in editor Embedded Scripting Automation of routine operations using JScript Script recording Convenient use Multiple active sessions organized in tabbed interface Connecting and logging on to a remote host with a single mouse click 5 P a g e

6 Getting Started The Main Window This topic describes WinAgents Rhino Terminal main window. The main window of the program appears on the screen after a connection to the remote host is established. The way this window looks like depends on the program settings and the current connection status. The main area of the window is occupied by terminal emulator. WinAgents Rhino Terminal allows working with multiple remote hosts at the same time, opening many connections and terminal emulators and organizing them in tabs. Each tab corresponds to a single established connection. By default, WinAgents Rhino Terminal window doesn t contain the menu bar, and all commands are accessible via the toolbar. You can show the menu at any time by clicking Tools Show Menu Bar command. Figure 1 Rhino Terminal Main Window Establishing a Connection WinAgents Rhino Terminal is full-featured terminal emulation software that provides you with all functions of standard ANSI, Linux, or VT-type terminals as well as extended functions which simplify work with remote hosts. To establish a connection to a remote host, click Connect command in the toolbar. You will see Connect to window with two tabs: New Host and Saved Connections. 6 P a g e

7 The first tab New Host can be used to establish a connection to the remote host by specifying only several important parameters. Refer to Using Quick Connect section on page 12 for more details on using Quick Connect feature. The second tab Saved Connections can be used to organize a catalog of connection parameters for different remote hosts, and then connect to them simply by selecting pre-configured connection. Refer to Creating, editing and deleting a connection on page 13 for more details. After the remote host is selected, press Connect button to initiate a session. Using RouterTweak Extensions WinAgents RouterTweak is a technology that makes your work with Cisco routers and switches more visual and effective. Knowing the principles of working with the command line interface of Cisco devices, you can use WinAgents Rhino Terminal to automate the most common tasks of network device administration. WinAgents Rhino Terminal offers you two ways to work with devices. You can use the terminal shell to work with the command line interface directly. In this case you will have a standard set of command line tools enhanced by syntax highlighting. Syntax highlighting makes it easier to find what you need in the results of executed commands, which makes your work more effective. A more effective and faster method of editing the configuration of a device is using the built-in editor. In this case the program requests the configuration file from the device and allows you to edit it. Instead of you, the application will do everything necessary in the command line. And you will be able to focus on the device configuration using context help. The entire process of command exchange between the devices being configured and WinAgents Rhino Terminal is displayed in the terminal window. WinAgents RouterTweak Extensions are designed especially for Cisco IOS, CATOS and PIXOS-based devices, and available for a connection if Vendor and Model fields are set to any supported Cisco device. Please note, that you can control RouterTweak Extensions availability on a global program level by turning them on or off in Program Options. Refer to the following sections for more details: RouterTweak Extensions on page 26 Built-in Configuration File Editor on page 27 Program Options on page 33 7 P a g e

8 How do I... Connect to a Host with TELNET/SSHv1/SSHv2 Protocol WinAgents Rhino Terminal is full-featured terminal emulation software which provides easy and convenient way to connect to remote hosts via TELNET, SSH, or Serial protocols. To quickly establish a connection to a remote host perform the following steps: Press the Connect button in the main Rhino Terminal window or in the toolbar; Use Quick Connect feature. In the Connect To window, make sure that the New Host tab is active, and enter a remote host s DNS-name or IP-address in the Address field; Select a protocol you want to use for the connection; Select a terminal type you want to use for the connection; Select a vendor and a model of the remote host, if you don t need RouterTweak Extensions for the connection, you can set Vendor to Others, Model to Generic Network Device; Press the Connect button. You can save the settings you configure for the connection for future use in the connections catalog by pressing the Save Connection button. You can also configure advanced parameters of the selected protocol and terminal emulation by pressing the corresponding Configure button. Establish a Raw Connection to a Host to Use POP3/SMTP or Similar Text-based Protocol WinAgents Rhino Terminal can be used to establish connections to remote hosts that use simple textbase protocols such as POP3 or SMTP. This section describes how to configure the connection in this scenario. Press the Connect button in the main Rhino Terminal window or in the toolbar; Use Quick Connect feature. In the Connect To window, make sure that the New Host tab is active, and enter a remote host s DNS-name or IP-address in the Address field; Select the TELNET protocol to use for the connection, specify correct port number which is used by the protocol you want to use (e.g. POP3 uses port 110, SMTP uses port 25, etc.), and check the Don t negotiate options option; Set the terminal type to XTerm and press the Configure button to configure terminal emulation extended properties; In the Connection Properties window select the Keyboard/Mouse options and set Local Echo and Local Edit to Force On, press OK to save the settings; Select vendor and model of the remote host, set Vendor to Others, Model to Generic Network Device; Press the Connect button. This will connect to the remote host and open a terminal window where you can enter protocol commands and see protocol replies. 8 P a g e

9 Automate Login Procedure WinAgents Rhino Terminal simplifies routine operations that are needed to establish a connection to the remote host and perform a logon. It introduces an automatic logon feature, which, when is turned on for the connection, automates logon process as much as possible. This section describes how to set up an automatic logon procedure for a connection. Press the Connect button in the main Rhino Terminal window or in the toolbar; Use Quick Connect feature. In the Connect To window, make sure that the New Host tab is active, and enter a remote host s DNS-name or IP-address in the Address field; Select a protocol you want to use for the connection; Press the Configure button, in the Connection Properties window click the Logon node in the tree on the left; Check the Automatically Logon to host option; in the corresponding fields enter the username and password to use during automatic logon; Select one of the supported logon methods. If the remote host requires a username and password only, which is the most common case, choose Default Logon Script. Default logon script awaits prompts to enter either a username or a password from the remote host, and replies with the values you entered in the Username and Password fields. Configure prompts that are sent by the remote host and should be recognized by WinAgents Rhino Terminal in Username Prompt and Password Prompt; Press OK to save the settings and return to the Connect To window; Select a terminal type you want to use for the connection; Select a vendor and a model of the remote host, if you don t need RouterTweak Extensions for the connection, you can set Vendor to Others, Model to Generic Network Device; Press the Connect button. After the connection is configured, you can save for the future use by pressing Save Connection button. See also Connections Overview on page 12. If the remote host you are going to connect to uses more complex login procedure than requesting a username and password, you can select another method of implementing a logon procedure. See also Connection Properties on page 14. Transfer a File with X/Y/Z-modem Protocol WinAgents Rhino Terminal allows you to transfer files between the local and remote hosts using one of the widely supported X-modem, Y-modem, or Z-modem protocols. This section describes how to send and receive a file using the Z-modem protocol. To download a file from the remote host, while logged on the host, click the Transfer Receive ZModem command. In the Receive ZMODEM window enter a transfer command and a name of file to transfer, select a folder, where the file should be stored on the local machine. Press the Transfer button to initiate the transfer. To upload a file to the remote host, while logged on the host, click the Transfer Send ZModem command. Select file to transfer and press the Open button. In the Send ZMODEM window check the 9 P a g e

10 command which will be sent to the remote host to start the transfer. You can add additional file to the transfer list if needed. Press the Transfer button to initiate the transfer. Figure 2. Send ZMODEM Window. Edit a Configuration of a Cisco Device Using RouterTweak Extensions WinAgents Rhino Terminal includes RouterTweak technology, which provides a powerful and convenient way to edit configurations of network devices running under Cisco IOS, Cisco CATOS and Cisco PIXOS. This technology incorporates syntax highlighting, code completion, tools for ACL editing in a grid-style visual configuration editor. This section describes how to set up a connection to use RouterTweak Extensions. Press the Connect button in the main Rhino Terminal window or in the toolbar; Use Quick Connect feature. In the Connect To window, make sure that the New Host tab is active, and enter a remote host s DNS-name or IP-address in the Address field; Select a protocol you want to use for the connection; Set Vendor to Cisco, and select a model of your Cisco device; Press the Configure button, in the Connection Properties window click the Logon node in the tree on the left; Check the Automatically Logon to Host option; in the corresponding fields enter the username and password to use during the automatic logon; Select one of the supported logon methods. If the remote host requires a username and password only, which is the most common case, choose Default Logon Script. Default logon script awaits prompts to enter either a username or a password from the remote host, and replies with the values you entered in the Username and Password fields. Configure prompts that are sent by the remote host and should be recognized by WinAgents Rhino Terminal in Username Prompt and Password Prompt; 10 P a g e

11 Click the RouterTweak node in the tree on the left; Check the Enter Enable Mode and Show Running Configuration options, enter the Enable Password which should be used to enter the privileged command mode; Press OK to save the settings and return to the Connect To window; Press the Connect button. Please note that RouterTweak Extensions are designed especially to work with Cisco devices, and they are not available for other types of hosts. You can disable use of RouterTweak Extensions on the global level in program options. See also RouterTweak Extensions on page 26. Record and Play a Script WinAgents Rhino Terminal can record commands that you enter in the terminal window while working with the remote host, store them as a script, and then play the recorded script every time you need to repeat the recorded command sequence. To record a script click the Script Start Recording command, and perform actions in the terminal window you want to be recorded in the script. Then click the Script Stop Recording command. WinAgents Rhino Terminal prompts for a file name to save the script. To execute a script click the Script Execute Script command, and select the file containing the script to execute. Use a Command-Line Arguments When Running Rhino Terminal WinAgents Rhino Terminal could be launched from the Windows command prompt with various command line arguments. This section describes how to run WinAgents Rhino Terminal from the command prompt and open a connection to a remote host. The following command launches WinAgents Rhino Terminal and establishes a connection to the remote host with the IP-address , using default connection settings: rterm The following command launches WinAgents Rhino Terminal and establishes uses connection settings of the connection Border GW from the catalog of connections: rterm o Border GW See Command Line Arguments on page 37 for more information. 11 P a g e

12 Managing Connections Connections Overview WinAgents Rhino Terminal stores all settings it requires to communicate with the remote host as a connection. The connection stores the target host address, communication protocol parameters and terminal emulation settings that should be applied. To establish the communication to a host you need to specify connection parameters that WinAgents Rhino Terminal should use. You can either specify only a basic set of important options such as address of the remote host and which communication protocol should be used or you can set up every detail for a connection: select and configure communication protocol, terminal and keyboard emulation properties and specify settings for RouterTweak Extensions. WinAgents Rhino Terminal provides two ways of creating and establishing connection to a host. Quick Connect. You only need to specify the address of the remote host, select one of the supported protocols and terminal types. Then you can either save connection for the future use or connect to the host immediately without saving. Creating and configuring a new connection. You can create a new connection and configure all communication settings and then store it in the WinAgents Rhino Terminal connections database. After this you can use your connection at any time. Using Quick Connect By using Quick Connect feature you can easily establish a connection to the remote host. To initiate the session you need to enter only the IP-address or DNS-name of the remote host, choose the protocol and the type of terminal to use during the session. Start Quick Connect by pressing the Connect button or by clicking the Host Connect command in the program main menu. In the Connect To window select the New Host tab. You can specify the following parameters: Address IP-address or DNS-name of the remote host to connect to; Protocol one of the supported by Rhino Terminal protocols to use: TELNET, SSH or Serial connection; Port port number to use; Terminal terminal type that should be emulated; Vendor vendor of the device you are going to connect to; Device type of the device you are going to connect to. The last two fields (Vendor and Device) are primarily used to support RouterTweak Extensions, to work with configuration grid and support syntax highlighting in the terminal window. If you don t need such features for the session or you are not sure which device type to choose or your device is no in the list of supported devices you can set Vendor to Others and Device to Generic Network Device. This setup doesn t allow using RouterTweak Extensions and should work with all types of devices. It is possible to save session setting for the future use by pressing the Save Connection button. 12 P a g e

13 Figure 3. Using Quick Connect Creating, Editing and Deleting a Connection WinAgents Rhino Terminal maintains a catalog of connections which provides a convenient way of organizing large amount of connection parameters for different remote hosts. The catalog of connections allows user to store connection parameters and then quickly establish the connection the remote host by selecting previously configured connection parameters instead of entering them again. The catalog of connections can be displayed by pressing the Connect button or by clicking the Host Connect command in the program main menu. In the Connect To window select the Saved Connections tab. All connections in the catalog are organized in a tree. The following commands are provided to manage the tree of connections: New Connection creates a new connection and displays connection properties dialog where you can specify connection parameters; New Folder creates a new folder in the tree. You will be prompted for a name for the new folder and it location in the tree; Properties invokes properties editing window for the current selected element in the catalog of connections; Move to moves selected connection or folder into the specified folder. You will be prompted to point the folder where to move the element to; Delete deletes current selected connection or folder from the catalog. 13 P a g e

14 Figure 4. Connections Catalog. Connection Properties This section describes the Connection Properties window and how to configure connection parameters. The Connection Properties window organizes parameters in tabs, which are presented in a tree-like structure on the left. The General tab contains a basic set of parameters: Address IP-address or DNS name of the remote host to connect to; Title readable name for the connection which is displayed in the device catalog; Vendor vendor of the remote device, this option is important if RouterTweak Extensions are used for the connection, otherwise it is acceptable to select Others; Device type or model of the device. This field works in conjunction with the previous field, Vendor. If model of the remote host is unknown or not listed, and there is no need in using RouterTweak Extensions is acceptable to select Generic Network Device. 14 P a g e

15 Figure 5. The General Tab of Connection Properties Window. The Protocol tab allows specifying a protocol for the session and configuring protocol parameters: Protocol one of the three protocols can be selected: TELENET, SSH or Serial connection via the COM port. For each protocol several additional settings can be configured. For the TELNET protocol the following options are supported: Port port number for the TELENET protocol to use, 23 by default; Don t Negotiate Telnet Options if this option is checked, WinAgents Rhino Terminal won t attempt to send or respond to TELNET options requests. This may be useful when establishing connection to the remote host which requires raw text-based connection, e.g. POP3 or SMTP server. 15 P a g e

16 Figure 6. The Protocol Tab of Connection Properties Window. For the SSH protocol the following options can be specified: Port port number for the SSH protocol to use, 22 by default; Version version of the SSH protocol, you can choose from SSH version 1 (SSHv1), SSH version 2 (SSHv2) and auto detection. In the last case, WinAgents Rhino Terminal tries to decide correct protocol version based on the identification string sent by the remote host; Authentication methods which authentication methods should be used. WinAgents Rhino Terminal supports SSH authentication based on Password, DSA/RSA keys, and Keyboard Interactive authentication. If the Password and/or Keyboard Interactive options are checked, the program will ask for password during the session initiation. If the DSA/RSA Key option is checked, you should provide a private key file in OpenSSH, IETF, or PuTTY format and Passphrase for the key, if any. The program will try to use the supplied key for authentication. You can also generate public/private keys pair by pressing the Generate key button. Encryption algorithms which encryption algorithms should be used. WinAgents Rhino terminal supports AES, Blowfish, 3DES, and DES algorithms. You can specify which algorithms should be used for the session and configure their priorities by moving up and down in the list by pressing the Up and Down buttons. 16 P a g e

17 Compression whether data compression should be used. If the Enable Compression option is checked, WinAgents Rhino Terminal will try to compress all data transmitted over the network. It is also possible to specify the level of compression, the higher the level the higher is the compression. Higher levels of compression require more processing power and may cause significant performance penalty on the remote host. For the Serial connection the following options can be configured: Communication port COM port that will be used for connection; Bits per second baud rate at which the communications device operates; Data bits number of bits in the bytes transmitted and received; Parity parity scheme to be used. The following parity schemes are supported: None, Even, Odd, Space, and Mark; Stop bits number of stop bits to be used; Flow control type of flow control. The following types are supported: Software, Xon/Xoff, and Hardware. Figure 7. The Logon Tab of Connection Properties Window. The Logon tab contains parameters which are used by Rhino Terminal to automatically logon to the remote host. Rhino Terminal supports three different procedures of automatic logon. Default logon script Built-in procedure implementing standard logon, when remote host asks for username and password. When connection to the remote host is 17 P a g e

18 established, Rhino Terminal waits for username or password prompt from the device and replies with username or password configured for the connection based on the prompt received. This is the least flexible procedure which is suitable for simple logon scenarios that are used on the most network devices. Command sequence This procedure allows you to specify a sequence of prompts received from the remote host and replies that should be sent. After connection to the remote host is established Rhino Terminal waits for the prompt, then compares received prompt against the configured sequence, indentifies which reply it should send back to the remote host and sends it. Logon procedure completes when Rhino Terminal receives the prompt which is the last in the sequence. You can also specify whether initial Carriage Return should be sent before any prompt is received. Custom script in JScript After connection is established Rhino Terminal executes specified script written in JScript scripting language. This script performs logon as needed. This is the most flexible way to specify and configure logon procedure. The following options could be configured: Automatically logon on host if option is checked, WinAgents Rhino Terminal will attempt execution of automatic logon procedure; Username username to use for logon; Password password to use for logon; Logon method type of procedure to use to implement logon steps, can be one of the following values: Default logon script, Command sequence, Custom script in JScript. For different logon methods a different set of options can be specified. Default logon script requires: Username prompt prompt that the remote hosts sends when it requests a username, this value is a regular expression and can contain special regular expression operators; Password prompt prompt that the remote hosts sends when it requests a password, this value is a regular expression and can contain special regular expression operators. Command sequence requires: Send initial carriage return if this options is checked, WinAgents Rhino Terminal will send carriage return before implementing logon sequence, this may be useful for certain types of remote hosts or for connection via Console (COM port) interface; Logon sequence a set of prompts that can be received from the remote host during logon, with reply strings that will be sent to the remote host when the corresponding prompt is received. You can add, edit and delete prompt-reply pairs and move them up and down in the list. Please note, that order of prompt-reply pairs matters, WinAgents Rhino Terminal implements logon by awaiting for prompts and sending replies from the first to the last as specified in the list; Custom script in JScript requires: Logon script full path to the file with script in the JScript programming language, implementing custom login procedure. After automatic logon is completed, WinAgents Rhino Terminal can execute a custom script. 18 P a g e

19 Execute custom script after logon if this option is checked, WinAgents Rhino Terminal will execute a specified script in JScript programming language after automatic logon procedure is completed. Figure 8. The RouterTweak Extention Properties. The RouterTweak tab contains a set of options for RouterTweak Extensions. Enter Enable Mode if this option is checked, after automatic logon procedure is completed, WinAgents Rhino Terminal will enter privileged command mode, on Cisco devices default privilege level will be used, and specified enable-mode password is sent when requested; Show Running Configuration if this option is checked, after entering privileged command mode WinAgents Rhino Terminal will automatically download running configuration from Cisco device and show it in the editor grid; Enable Password password to use to enter privileged command mode; Command Prompt prompt that is configured on the remote host in user (nonprivileged mode), this value is a regular expression and can contain special regular expression operators; Enable Prompt prompt that is configured on the remote host in privileged mode, this value is a regular expression and can contain special regular expression operators. Please note, values specified in Command Prompt and Enable Prompt are also used by default automatic logon procedure, so you may need to specify them even if RouterTweak Extensions are turned off for the connection. 19 P a g e

20 Please note, values specified in Username Prompt, Password Prompt, Command Prompt, and Enable Prompt are regular expressions, and several characters are reserved and used as operator symbols. If these characters are present in prompts, they should be escaped, refer to regular expressions syntax for more details. Figure 9. The Terminal Emulation Tab of Connection Properties Window. The Terminal Emulation tab contains options that describe terminal emulation behavior. Terminal Type type of terminal to emulate, the following terminal types are supported: ANSI, XTerm, VT100; Allow ANSI Colors turns on color support for terminal emulation; Use system Colors if this option is checked the colors configured in Windows would be used for the terminal window instead of built-in colors; Window Size Columns, Rows, and Scrollback size of the terminal window; Resize Behavior specifies which action is performed when the terminal window is resized. WinAgents Rhino Terminal can Change number of rows and columns automatically depending on the terminal window size, making more rows and columns for larger window and less rows and columns for smaller window; Scale the font changing the font size and preserving number of rows and columns; or Retain number of rows and columns automatically displaying vertical and horizontal scroll bars when window is resized; Encoding codepage of terminal window; 20 P a g e

21 Passthru Printing printer to redirect print output. WinAgents Rhino Terminal supports Passthru printing technology, allowing redirecting print output to a locally connected printer. All printing processing should occur on the remote host, and prepared page may be sent to the local printer using ANSI passthru print codes. Figure 10. The Keyboard and Mouse Properties. Terminal emulation options for input devices can be set on the Keyboard/Mouse tab. Functional Keys&Keypad specified what escape sequences will be set to the remote host when a functional key is pressed. The following functional keys emulation schemes are supported: ESC+~, Linux, XTerm, VT400, VT100+, SCO; Backspace Sends DEL if the option is checked, the code for DEL key will be sent to the remote host when Backspace key is pressed; Home & End Keys RXVT Mode if the option is checked, the rxvt-compatible codes will be sent to the remote host when Home or End is pressed, instead standard code; Add CR to Incoming LF if the option is checked, carriage return code will be added to incoming line feed characters; Local Echo local echo mode that is used in terminal emulation, can be Auto, Force On, or Force Off. Usually, the remote host sends back characters when a key is pressed and the corresponding character code is sent to it. In this case local echo should be turned off, otherwise, if the remote host doesn t send back characters to the terminal and nothing is displayed when you type on the keyboard, this options should be turned on. 21 P a g e

22 WinAgents Rhino Terminal can also automatically detect the status of local echo and decide whether turn it on or off; Local Line Editing line editing mode that is used in terminal emulation, can be Auto, Force On, or Force Off. This determines how line editing is working when you pressing keys on the keyboard. When local line editing is off, each press of a key sends the corresponding character code to the remote host. When local line editing is on, character codes are note sent immediately to the remote host, but they are placed in a local editing buffer instead, and all line editing is handled locally. Then when Enter key is pressed the whole buffer is sent to the remote host. Usually, this setting should be configured alongside with Local echo; Key Mappings user-defined key-mappings table. You may Add, Edit, and Remove mappings in the list. Each time when a key is pressed, WinAgents Rhino Terminal checks if a mapping for this key is configured, and if it finds the mapping it sends the corresponding mapped characters to the remote host instead of the original code of the key; Mouse Emulation specifies actions assigned to Right and Middle mouse buttons; Shift Overrides Mouse Behavior if this option is checked, when Shift key is pressed, default actions will be performed when either Right or Middle button is pressed. Figure 11. File Transfer Properties. 22 P a g e

23 WinAgents Rhino Terminal includes functionality implementing file transfers using X/Y/Z-modem protocols. X/Y/Z-modem tab contains the following options: Upload folder full path to a folder, where Rhino Terminal should search for files that are transferred to the remote host; Download folder full path to a folder, where Rhino Terminal should store files that are received from the remote host; XModem upload command that is sent by WinAgents Rhino Terminal to initiate a file transfer from the local host to the device via X-Modem protocol; XModem download command that is sent by WinAgents Rhino Terminal to initiate a file transfer from the remote host to the local host via X-Modem protocol; YModem upload command that is sent by WinAgents Rhino Terminal to initiate a file transfer from the local host to the device via Y-Modem protocol; YModem download command that is sent by WinAgents Rhino Terminal to initiate a file transfer from the remote host to the local host via Y-Modem protocol; ZModem upload command that is sent by WinAgents Rhino Terminal to initiate a file transfer from the local host to the device via Z-Modem protocol; ZModem download command that is sent by WinAgents Rhino Terminal to initiate a file transfer from the remote host to the local host via Z-Modem protocol. Upload and download commands can contain %s pattern, when a file transfer is initiated this pattern is replaced by the actual list of file names. Generating Keys for a SSH Connection WinAgents Rhino Terminal has a built-in keys generation utility, which could be used to create a pair of private and public keys and save them for later use. To run the key generator press the Generate keys button in the Connection Properties window, on the Protocol tab. The following parameters of a generated keys pair can be specified: Key Comment human-readable string that identifies and describes the key; Key Passphrase password to access the key; Confirm Passphrase repeat password to check; Algorithm key generation algorithm to use, WinAgents Rhino Terminal supports RSA and DSS algorithms; Key Length in Bits length of the key. 23 P a g e

24 Figure 12. The Key Generator Window. After all settings are specified, press the Generate button. The generation process runs, during the keys generation you will be prompted to move mouse pointer over the generation window to create some randomness for the keys. When the keys generation is completed, you can save private and public keys. Organizing Connections WinAgents Rhino Terminal maintains hierarchical structure of the connections catalog, allowing tree-like organization of the connections in folders. This helps organizing large amount of connections in an easyto-access catalog. You can create, rename, delete, and move folders in the connections catalog, and move connection between them. To create a folder, press the New Folder button on the Saved Connections tab of the Connect to window. You will be prompted for a name and location of a new folder. To rename a folder, select in the catalog and press the Properties button. You will be prompted for a new name. To delete a folder, press the Delete button. This will delete the folder itself as well as all connections that are stored in it. 24 P a g e

25 Figure 13. Organizing Connections. To move a connection to a folder, or move a folder to another folder, select the folder or the connection and press the Move to button. You will be prompted for a new location of the selected item. Specifying Default Connection Properties WinAgents Rhino Terminal requires a lot of parameters to be specified for a connection. To make connection creation easier, you can configure default values for different connection properties, and every time you create a new connection WinAgents Rhino Terminal will automatically use default parameters for it, so you need to configure a smaller set of options. To configure default connection properties click the Program Options command. In the Program Options window press the Configure default connection settings button. WinAgents Rhino Terminal displays the Connection Properties window where you can set default values for a connection. 25 P a g e

26 RouterTweak Extensions The RouterTweak Extensions are special tools which helps network administrators to visually edit the configuration files of devices manufactured by the Cisco Systems, Inc. Once you connect to a network device using Rhino Terminal, you have a number of tools allowing you to make your work with Cisco routers and switches more visual and effective. Knowing the principles of working with the command line interface of Cisco devices, you can use RouterTweak Extensions to automate the most common tasks of network device administration. This approach saves your time by allowing you to hand over routine operations to the program. Here is a number of benefits you get if you use RouterTweak technology: Reducing the time needed to connect to a device. Having specified the username and password for connecting to a device only once, you will not have to spend time on entering them again when you connect to your router next time. WinAgents Rhino Terminal will enter the account data itself and switch to the privileged mode if necessary. Viewing the configuration of a device in a convenient form. Just click once to get the configuration of your device in a visual form. Syntax highlighting and the structure tree of the device configuration will allow you to quicker find your bearings among numerous configuration commands. For instance, all you need to do in order to switch to the settings of a certain interface is select this interface in the configuration tree. Increasing the speed of work with access control lists (ACL). Rhino Terminal allows you to do without a TFTP server while editing access control lists. You can add, edit and remove commands located in the middle of ACLs. The program knows about the peculiarities of using the command line interface for working with Cisco access control lists and takes them into account while editing ACLs. Usability in editing the configuration of devices. It is easier to edit configuration commands due to the context help system. While you are adding a new command to the configuration file, Rhino Terminal requests its possible parameters from the device. In the process of editing commands, you see the list of available variants for each command all the time and can select one of them without entering the entire string. Usability in carrying out common tasks of Cisco device administration. Several mouse clicks are enough to print out the configuration of a device, copy it to a file or save it to NVRAM. Rhino Terminal contains an effective build-in configuration files editor for which supports most popular network devices of Cisco Systems Inc. By your request the program acquires the configuration file from the device and opens it in the editor. Instead of you, the application will do everything necessary in the command line. And you will be able to focus on the device configuration using context help. But it does not turn the application into a "black box". You are constantly in control of its actions and the results of your operations. The entire process of command exchange between the devices being configured and Rhino Terminal is displayed in the terminal window. Another convenient feature of Rhino Terminal is the permanent availability of the window for terminal access to the device. Thus, you can combine the two methods of working with the device. For detailed information about basic operations using RouterTweak extensions, see the corresponding sections: 26 P a g e

27 Retrieving the running and startup configurations Built-in Configuration File Editor Adding a Command Editing a Command Negating and Reverting Commands to Default Saving the Configuration to NVRAM Additional Editing Features Retrieving the Running and Startup Configurations To retrieve the running or startup configuration from the device, you can use the RouterTweak Show running/startup configuration menu commands or the corresponding toolbar buttons. These commands become available only when the user is connected to a device in the privileged mode. You can switch to this mode either using the enable terminal command or automatically by enabling the corresponding option in connection properties. Note that in both cases you should specify the password for switching to the privileged mode. After you execute the Show running configuration command, you will see a panel with the running device configuration that you can edit. See the Built-in Configuration File Editor section for details. If you execute the Show startup configuration command, you will see the window with the startup configuration. In this case it is impossible edit the configuration directly. If you need to make changes in the startup configuration of the device, you should modify the running configuration first and then copy it to NVRAM. See the Saving the Configuration to NVRAM section for additional information. Built-in Configuration File Editor One of the main WinAgents RouterTweak features is a built-in editor of configuration files. The editor of configuration files built into WinAgents RouterTweak has the following features: Editing the configuration in real time. Displaying configuration commands as editable text lines, which makes editing them more natural and intuitive. Automatically switching to the configuration mode and to the necessary configuration sublevel if needed. Context list of possible commands with their description. Context help for subcommands and parameters of the currently edited command. Smart system of informing about errors and typos in commands. Additional features for editing access lists. Complete support of commands that have multiline strings in their parameters. The abovementioned features supplement all functions typical of a regular terminal. Besides, to make the configuration text more readable, the following features are used: Highlighting key items (addresses, strings, numbers, etc.). Presenting embedded configuration modes as a tree of embedded commands. Highlighting recently edited commands in a special way. 27 P a g e

28 Figure 14. Editing the Running Configuration. Adding a Command Adding a command is one of the main operations in the process of editing the configuration of a device. Before you add a new command, you should select a line in the running configuration to specify the place for the new command. You can add a new command to the configuration using the RouterTweak Add command or RouterTweak Add command to mode menu item. Besides, you can use the corresponding toolbar buttons or hotkeys. Add command adds a new configuration mode to the same configuration mode after the selected one. Add command to mode can be used only when you select a command that changes the configuration mode the command being added will belong to. Commands changing the configuration modes are highlighted (in dark blue by default). 28 P a g e

29 Figure 15. Adding a Command. For instance, selecting the Add command to mode item will add a new command configuring the selected interface right after the 'speed auto' command. At the same time, selecting the Add command item will add a new command in the global configuration mode to the same level where the 'interface' command is. See detailed information about editing a command in the Editing a Command section. To make tracking changes easier, added commands are typed in italic and highlighted (in green by default). This highlighting remains until the configuration is refreshed or the connection to the device is reestablished. Attention! After you refresh the configuration of the device using the Refresh command or reconnect to the device, the added command may change its position in the configuration file. It is normal because the device sorts configuration commands in its own way. Editing a Command In the process of editing the configuration of a device, you often need to modify commands that already exist. To start editing a command, you should select the corresponding line in the configuration text and select the RouterTweak Edit command menu item. You can also use the corresponding hotkey and toolbar button. Another way to start editing a command is to double-click it in the configuration. 29 P a g e

30 Figure 16. Editing a Command. Tooltips and lists of possible commands/parameters help you in the process of editing commands. This help items automatically appear on the screen whenever necessary. If you need to open them manually, use the Ctrl+Space key combination. Tooltips depend on context and inform you about the type and the purpose of the parameter you are editing at the moment. The list of possible commands is used to speed up entering the necessary command. All you need to do to enter a command is select it from the list using either the keyboard or the mouse. The list of possible commands also helps you complete partially typed commands automatically. Just type the first few characters until the necessary command is selected in the list and press Space. The selected command will be automatically added to the line. Press Enter to finish editing. If there are no mistakes, the corresponding changes will be made in the device configuration and the command will become italic and highlighted (in green by default). This highlighting remains until the configuration is refreshed or the connection to the device is reestablished. If there is a mistake made in the command, you will see the corresponding message. You can cancel editing the configuration line by pressing the Esc key or by a mouse click on any other object. Attention! If you change some command completely, it may change its place in the configuration file after you refresh the configuration file using the Refresh command or reconnect to the device. It is normal because the device sorts configuration commands in its own way. 30 P a g e

31 When you are editing a command, you may delete its entire text. It will have the same effect as if you reset the command to its default value, see the Negating and Reverting Commands to Default section for details. Negating and Reverting Commands to Default With WinAgents RouterTweak, it is much easier to negate commands and revert them to default. These operations are performed with several mouse clicks so there is no need to use the console. You do not have to monitor the correct configuration mode and type any text. Negating commands To disable some function on the device or just execute the command opposite to the existing one, you should negate the command. To negate a command, you should select the corresponding line in the configuration text and use either the RouterTweak Negate command menu item or the corresponding toolbar button or hotkey. The device understands the Negate command operation as the same command with the no prefix. To make tracking changes easier, commands reverted to default are typed in italic and highlighted (in green by default). This highlighting remains until the configuration is refreshed or the connection to the device is reestablished. Attention! After you re-read the configuration of the device using the Refresh command or reconnect to the device, a command may completely disappear from the configuration if it completely coincides with its default. Use Negate command once again to cancel negating a command. Reverting a command to default Almost all commands have defaults. If some commands are absent in the running configuration, it means that they are set to default. To revert a command to default, you should select the corresponding line in the configuration text and use either the RouterTweak Revert to default command menu item or the corresponding toolbar button or hotkey. The device understands the Revert to default command operation as the same command with the default prefix. To make tracking changes easier, commands reverted to default have a line through them and they are italic and highlighted (in green by default). This highlighting remains until the configuration is refreshed or the connection to the device is reestablished. Attention! After you re-read the configuration of the device using the Refresh command or reconnect to the device, the command will be set to default and may completely disappear from the configuration. Use Revert to default command once again to cancel reverting a command to default. 31 P a g e

32 Saving the Configuration to NVRAM Changes applied to the running configuration will be reset after the device is reloaded. To save the changes, you should copy the running configuration to the Non-Volatile RAM (NVRAM) to the so-called startup configuration. WinAgents RouterTweak allows you to do it with a mouse click. To do it, you should use the Save configuration to NVRAM toolbar button or the corresponding menu command. Additional Editing Features Editing ACL It is fairly difficult to edit access control lists (ACL) on Cisco Systems devices. Unfortunately, there is no simple way to add a new rule to the middle of an access control list. There are also no simple ways to edit existing rules. In order to modify access control lists, network administrators have to load the configuration of a device to a TFTP server, edit it there and then copy it back to the device. You cannot say it is a simple approach. Besides, it is difficult to use this method if your device and the TFTP server are on different sides of NAT. Besides, copying the configuration of a device via the TFTP protocol is a treat to network security because the TFTP protocol does not encrypt transmitted data. WinAgents RouterTweak allows you to edit ACLs without a TFTP server. You can use the device configuration editor to add, edit and remove lines from access control lists. The program uses the command line interface of Cisco devices to make the necessary changes in ACLs. WinAgents RouterTweak knows about the peculiarities of editing ACLs and takes them into account. For example, if you insert a new rule into the middle of an access control list, the program will follow the following sequence of actions: Delete the access control list. Create a new ACL and add all existing rules to it one by one. The new rule will be added to the list in the selected position. All this is done automatically. You will only have to add a new rule to the necessary position in the access control list. You can see all commands the program executes during this process. Editing multiline strings in commands Some IOS commands can use multiline strings as their parameters. For example, these are commands setting the appearance of banners. You can add multiline commands the same as usual commands. The first character entered after the command is considered as terminal character. You can edit multiline commands in the same way as single line commands. Press Enter to add new strings to command. 32 P a g e

33 Figure 17. Editing Multiline Parameters. After you enter the terminal character and press Enter, the program will save the command to the configuration file of the device. Scripting Rhino Terminal allows you to execute scripts across network hosts. Using the scripting feature you can automate various routine tasks and perform massive changes on multiple servers or network devices. So, when you need to perform a series of repetitive tasks across multiple hosts, the scripting feature of Rhino Terminal will be the ideal solution. Scripts are also useful for non-repetitive tasks as well. If a task requires you to do many things in sequence, you can turn that sequence of tasks into just one task by scripting it. What Is a Script? A script is a sequence of instructions. Scripts are suited to creating short applications that provide quick solutions to small problems. Rhino Terminal supports scripts written in Microsoft JScript. Script in Microsoft JScript is a program written in the programming language. It consists of statements that instruct Rhino Terminal what actions it should perform on a network hosts and in what order. This kind of scripts is useful when you need complex logic and want to process information that host sends as a result of commands execution. Rhino Terminal supports all the functions of Microsoft s JScript implementation. In addition, it defines functions and objects that are used to establish communication and execute commands on hosts in a network. In many cases, scripts are used to automate manual tasks, much like a macro. Scripts are well suited for: Manipulating a host command line interface 33 P a g e

34 Automating logon procedures Changing configuration of network devices Sending key and command sequences to a CLI session For example, if you have several similar tasks, you can write one generalized script that can handle all of them. Script Recording and Execution WinAgents Rhino Terminal can record commands that you enter in the terminal window while working with the remote host, store them as a script, and then play the recorded script every time you need to repeat the recorded command sequence. To record a script click the Script Start Recording command, and perform actions in the terminal window you want to be recorded in the script. Then click the Script Stop Recording command. WinAgents Rhino Terminal prompts for a file name to save the script. To execute a script click the Script Execute Script command, and select the file containing the script to execute. Scripting API Rhino Terminal fully supports WinAgents HyperConf Scripting API. See WinAgents HyperConf Scripting Reference for more information on the API. 34 P a g e

35 Program Options The Program Options window allows specifying global-level application options. You can access the options using the Host Program Options command. Figure 18. Program Options. The Program Options window organizes configurable program options in tabs. The General tab includes the following options: Connection Timeout specifies the timeout for the session in seconds; Enable RouterTweak Extensions is this options is checked, WinAgents Rhino Terminal will use RouterTweak Extensions for editing configuration of Cisco network devices; Font font to use within the terminal window; Size size of the font that is used in the terminal window; Cursor shape of the cursor in the terminal window; Blinking if this options is checked, then the cursor will be blinking in the terminal window; You can also configure default parameters for a connection by pressing the Configure default connection settings button. Please, refer to Specifying default connection properties for more information on default connection parameters. The ANSI Colors tab allows you to change standard colors that are displayed by the terminal window in response to ANSI color codes sent by the remote host, and remap them to colors you want. 35 P a g e

Using Cisco IOS XE Software

Using Cisco IOS XE Software This chapter describes the basics of using the Cisco IOS XE software and includes the following section: Accessing the CLI Using a Router Console, on page 1 Accessing the CLI Using a Router Console Before

More information

Table of Contents 1 Commands for Access Controller Switch Interface Board 1-1

Table of Contents 1 Commands for Access Controller Switch Interface Board 1-1 Table of Contents 1 Commands for Access Controller Switch Interface Board 1-1 Commands for Access Controller and Access Controller Switch Interface Board 1-1 acl (user interface view) 1-1 activation-key

More information

Administration of Cisco WLC

Administration of Cisco WLC HTTP/HTTPS, SSH/Telnet to Cisco WLC, page 1 HTTP/HTTPS, SSH/Telnet to Cisco WLC Using the Controller GUI A browser-based GUI is built into each controller. It allows up to five users to simultaneously

More information

Parish . User Manual

Parish  . User Manual Parish Email User Manual Table of Contents LOGGING IN TO PARISH EMAIL... 3 GETTING STARTED... 3 GENERAL OVERVIEW OF THE USER INTERFACE... 3 TERMINATE THE SESSION... 4 EMAIL... 4 MESSAGES LIST... 4 Open

More information

TD-CALTERM2-001 CalTerm2 User s Guide

TD-CALTERM2-001 CalTerm2 User s Guide Technical Document TD-CALTERM2-001 CalTerm2 User s Guide DAQ Electronics Division 262-B Old New Brunswick Road, Piscataway, NJ 08854 732 981 0050 www.daq.net 2006 DAQ Electronics, Inc. All rights reserved.

More information

This document is intended to help you connect to the CVS server on a Windows system.

This document is intended to help you connect to the CVS server on a Windows system. Sourceforge CVS Access Sourceforge CVS Access... 1 Introduction... 1 Tools... 1 Generate Public / Private Keys... 1 Configuring Sourceforge Account... 4 Loading Private Keys for Authentication... 7 Testing

More information

The destination of the file(s) being transferred.

The destination of the file(s) being transferred. To The destination of the file(s) being transferred. Page 1 SESSION Command List SESSION [path]session-name[ext] Where: Session-Name is the name of the session file. By default, the session file is retrieved

More information

TTWin 4 Quick Start Guide

TTWin 4 Quick Start Guide Host connectivity for Windows TTWin 4 Quick Start Guide TTWin 4 is the latest evolution of Turbosoft s premier Terminal Emulation package - a fast, accurate, reliable and powerful connectivity tool for

More information

Upgrading the Software

Upgrading the Software APPENDIX B Upgrading the Software You can upgrade your software in the following ways: From the Cisco IOS command-line interface (CLI) From the ROM monitor Cisco recommends upgrading your software from

More information

Administration of Cisco WLC

Administration of Cisco WLC Using the Controller Interface, on page 1 Enabling Web and Secure Web Modes, on page 6 Telnet and Secure Shell Sessions, on page 8 Management over Wireless, on page 13 Configuring Management using Dynamic

More information

Operation Manual Login and User Interface. Table of Contents

Operation Manual Login and User Interface. Table of Contents Table of Contents Table of Contents Chapter 1 Switch Login... 1-1 1.1 Setting Up Configuration Environment Through the Console Port... 1-1 1.2 Setting Up Configuration Environment Through Telnet... 1-2

More information

OpenForms360 Validation User Guide Notable Solutions Inc.

OpenForms360 Validation User Guide Notable Solutions Inc. OpenForms360 Validation User Guide 2011 Notable Solutions Inc. 1 T A B L E O F C O N T EN T S Introduction...5 What is OpenForms360 Validation?... 5 Using OpenForms360 Validation... 5 Features at a glance...

More information

GeniusPlus Help On Line

GeniusPlus Help On Line GeniusPlus Help On Line Starting the application File Menu Device Menu Edit Menu View Menu Tools Menu Window Menu Help Menu Parameters Explorer Version 1.12 and later - September 30, 2013 1 Guide to Rapid

More information

Dominion KX II-101-V2

Dominion KX II-101-V2 Dominion KX II-101-V2 Quick Setup Guide Thank you for your purchase of the KX II-101-V2, the industry's most full-featured, enterprise-class, secure, digital KVM (Keyboard, Video, Mouse) switch. This Quick

More information

Cisco Unity Express Windows and Menus

Cisco Unity Express Windows and Menus Last updated: June 21, 2007 This chapter describes the windows, menus, and icons available in the Cisco Unity Express voice-mail system and contains the following sections: Navigating Through the Cisco

More information

Using Cisco IOS Software

Using Cisco IOS Software APPENDIX A This appendix describes the basics about using the Cisco IOS software that is installed on every Cisco ubr905 and Cisco ubr925 cable access routers: Accessing the Command-Line Interface, page

More information

Full file at https://fratstock.eu Programming in Visual Basic 2010

Full file at https://fratstock.eu Programming in Visual Basic 2010 OBJECTIVES: Chapter 2 User Interface Design Upon completion of this chapter, your students will be able to 1. Use text boxes, masked text boxes, rich text boxes, group boxes, check boxes, radio buttons,

More information

First-Time Login Procedure on XWin32

First-Time Login Procedure on XWin32 First-Time Login Procedure on XWin32 Configuring XWin32 The first time you log into X-Win32, you ll need to do a bit of profile setup; this is a one-time thing, and once done you shouldn t ever need to

More information

HP Switch Software. Basic Operation Guide. Abstract

HP Switch Software. Basic Operation Guide. Abstract HP Switch Software Basic Operation Guide Abstract This switch software guide is intended for network administrators and support personnel, and applies to the switch models listed on this page unless otherwise

More information

Lab - Examining Telnet and SSH in Wireshark

Lab - Examining Telnet and SSH in Wireshark Topology Addressing Table Objectives Device Interface IP Address Subnet Mask Default Gateway R1 G0/1 192.168.1.1 255.255.255.0 N/A PC-A NIC 192.168.1.3 255.255.255.0 192.168.1.1 Part 1: Configure the Devices

More information

Using the Cisco NCS Command-Line Interface

Using the Cisco NCS Command-Line Interface CHAPTER 2 This chapter provides helpful tips for understanding and configuring the Cisco Prime Network Control System (NCS) from the command-line interface (CLI). The Cisco NCS can be deployed for small,

More information

PART 7. Getting Started with Excel

PART 7. Getting Started with Excel PART 7 Getting ed with Excel When you start the application, Excel displays a blank workbook. A workbook is a file in which you store your data, similar to a three-ring binder. Within a workbook are worksheets,

More information

Terminal Emulation User's Guide

Terminal Emulation User's Guide Terminal Emulation User's Guide Trademarks ADDS Viewpoint A2 is a trademark of Applied Digital Data Systems Inc. DEC, VT52, VT00, VT3, VT220, VT300, VT320, VT340, VT400 and VT420 are registered trademarks

More information

CHAPTER 2 ACTIVITY

CHAPTER 2 ACTIVITY CHAPTER 2 ACTIVITY 2.1.1.1 1. CLI stands for 2. GUI stands for 3. Write the step you used to go to CLI interface on Windows 4. The OS, normally loads from a disk drive, into RAM. 5. The portion of the

More information

Agent and Agent Browser. Updated Friday, January 26, Autotask Corporation

Agent and Agent Browser. Updated Friday, January 26, Autotask Corporation Agent and Agent Browser Updated Friday, January 26, 2018 2018 Autotask Corporation Table of Contents Table of Contents 2 The AEM Agent and Agent Browser 3 AEM Agent 5 Privacy Mode 9 Agent Browser 11 Agent

More information

Login management commands

Login management commands Contents Login management commands 1 CLI login configuration commands 1 display telnet client configuration 1 telnet 1 telnet ipv6 2 telnet server enable 3 User interface configuration commands 3 acl (user

More information

CCNA 1 Chapter 2 v5.0 Exam Answers 2013

CCNA 1 Chapter 2 v5.0 Exam Answers 2013 CCNA 1 Chapter 2 v5.0 Exam Answers 2013 1. Refer to the exhibit. A switch was configured as shown. A ping to the default gateway was issued, but the ping was not successful. Other switches in the same

More information

Logi Ad Hoc Reporting System Administration Guide

Logi Ad Hoc Reporting System Administration Guide Logi Ad Hoc Reporting System Administration Guide Version 10.3 Last Updated: August 2012 Page 2 Table of Contents INTRODUCTION... 4 Target Audience... 4 Application Architecture... 5 Document Overview...

More information

HOBLink Terminal Edition Quick guide

HOBLink Terminal Edition Quick guide HOBLink Terminal Edition Quick guide Installation: To install, we will need to download the HOBLink Terminal Edition 5.3.1 link that you were sent from the HOB Support team. Once downloaded, let us run

More information

FUN TECH TIPS 101 SUMMER CLOVIS UNIFIED SCHOOL DISTRICT INFORMATION TECHNOLOGY SERVICES Prepared by Tanie McKinzie, TSS III

FUN TECH TIPS 101 SUMMER CLOVIS UNIFIED SCHOOL DISTRICT INFORMATION TECHNOLOGY SERVICES Prepared by Tanie McKinzie, TSS III FUN TECH TIPS 101 SUMMER 2016 CLOVIS UNIFIED SCHOOL DISTRICT INFORMATION TECHNOLOGY SERVICES Prepared by Tanie McKinzie, TSS III PUBLISHER BASICS... 3 Creating a text box... 3 Adding a picture... 4 Manipulating

More information

Using the Web-Browser and CLI Interfaces

Using the Web-Browser and CLI Interfaces CHAPTER 2 This chapter describes the web-browser and CLI interfaces that you use to configure the controller. It contains these sections: Using the Web-Browser Interface, page 2-2 Using the CLI, page 2-7

More information

Test/Debug Guide. Reference Pages. Test/Debug Guide. Site Map Index

Test/Debug Guide. Reference Pages. Test/Debug Guide. Site Map Index Site Map Index HomeInstallationStartAuthoringStreamSQLTest/DebugAPI GuideAdminAdaptersSamplesStudio GuideReferences Current Location: Home > Test/Debug Guide Test/Debug Guide The following topics explain

More information

Apptix Online Backup by Mozy User Guide

Apptix Online Backup by Mozy User Guide Apptix Online Backup by Mozy User Guide 1.10.1.2 Contents Chapter 1: Overview...5 Chapter 2: Installing Apptix Online Backup by Mozy...7 Downloading the Apptix Online Backup by Mozy Client...7 Installing

More information

Command-Line Interface Command Summary

Command-Line Interface Command Summary CHAPTER 1 Command-Line Interface Command Summary This chapter provides a summary of the command-line interface (CLI) commands included in the Global Site Selector software. The command summary tables are

More information

3 Connection, Shell Serial Connection over Console Port SSH Connection Internet Connection... 5

3 Connection, Shell Serial Connection over Console Port SSH Connection Internet Connection... 5 Contents 1 Description 2 2 Supported Devices 3 3 Connection, Shell 4 3.1 Serial Connection over Console Port...................... 4 3.2 SSH Connection................................. 4 3.3 Internet Connection...............................

More information

Cisco C880 M4 Server User Interface Operating Instructions for Servers with E v2 and E v3 CPUs

Cisco C880 M4 Server User Interface Operating Instructions for Servers with E v2 and E v3 CPUs Cisco C880 M4 Server User Interface Operating Instructions for Servers with E7-8800 v2 and E7-8800 v3 CPUs November, 2015 THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT

More information

Chapter 4. Network Security. Part II

Chapter 4. Network Security. Part II Chapter 4 Network Security Part II CCNA4-1 Chapter 4-2 Introducing Network Security Securing Cisco Routers CCNA4-2 Chapter 4-2 Router Security Issues The Role of Routers in Network Security: Router security

More information

Adding your IMAP Mail Account in Outlook 2013 on Windows

Adding your IMAP Mail Account in Outlook 2013 on Windows Adding your IMAP Mail Account in Outlook 2013 on Windows Replace example.co.za with your domain name as it was sent to you by Visualize IT 1. Launch Outlook 2. Select File on the top left menu bar 3. Select

More information

1. Which OSI layers offers reliable, connection-oriented data communication services?

1. Which OSI layers offers reliable, connection-oriented data communication services? CCNA 1 Practice Final Exam Answers v4.0 100% 1. Which OSI layers offers reliable, connection-oriented data communication services? application presentation session transport network 2. Refer to the exhibit.

More information

AVWorks. Installer/User Guide

AVWorks. Installer/User Guide AVWorks Installer/User Guide INSTRUCTIONS This symbol is intended to alert the user to the presence of important operating and maintenance (servicing) instructions in the literature accompanying the appliance.

More information

Parallels Remote Application Server

Parallels Remote Application Server Parallels Remote Application Server Parallels Client for Mac User's Guide v16 Parallels International GmbH Vordergasse 59 8200 Schaffhausen Switzerland Tel: + 41 52 672 20 30 www.parallels.com Copyright

More information

AST2500 ibmc Configuration Guide

AST2500 ibmc Configuration Guide AST2500 ibmc Configuration Guide Version 1.0b Copyright Copyright 2017 MITAC COMPUTING TECHNOLOGY CORPORATION. All rights reserved. No part of this manual may be reproduced or translated without prior

More information

Release Notes: Version G Operating System for the HP Procurve Switch 4108GL. Caution: Archive Pre-G Configuration Files

Release Notes: Version G Operating System for the HP Procurve Switch 4108GL. Caution: Archive Pre-G Configuration Files Release Notes: Version G.04.05 Operating System for the HP Procurve Switch 4108GL These release notes include information on the following: Downloading switch software and Documentation from the Web Friendly

More information

KoalaTerm. User Manual

KoalaTerm. User Manual KoalaTerm User Manual KoalaTerm Version 3.x & 4.x and Secure KoalaTerm Version 4.x. For latest version of KoalaTerm or Secure KoalaTerm: Download here 2012 Foxit Corporation. All rights reserved. 1 Copyright

More information

Configuring the Management Interface and Security

Configuring the Management Interface and Security CHAPTER 5 Configuring the Management Interface and Security Revised: February 15, 2011, Introduction This module describes how to configure the physical management interfaces (ports) as well as the various

More information

HP Load Balancing Module

HP Load Balancing Module HP Load Balancing Module System Management Configuration Guide Part number: 5998-4216 Software version: Feature 3221 Document version: 6PW100-20130326 Legal and notice information Copyright 2013 Hewlett-Packard

More information

Configuring Switch-Based Authentication

Configuring Switch-Based Authentication CHAPTER 7 This chapter describes how to configure switch-based authentication on the switch. Unless otherwise noted, the term switch refers to a standalone switch and to a switch stack. This chapter consists

More information

Chapter 2: Configure a Network Operating System. Every computer requires an operating system to function, including computerbased

Chapter 2: Configure a Network Operating System. Every computer requires an operating system to function, including computerbased 2.0.1.1 Chapter 2: Configure a Network Operating System Every computer requires an operating system to function, including computerbased network devices such as switches, routers, access points, and firewalls.

More information

Lab 7 Configuring Basic Router Settings with IOS CLI

Lab 7 Configuring Basic Router Settings with IOS CLI Lab 7 Configuring Basic Router Settings with IOS CLI Objectives Part 1: Set Up the Topology and Initialize Devices Cable equipment to match the network topology. Initialize and restart the router and switch.

More information

Creating Interactive PDF Forms

Creating Interactive PDF Forms Creating Interactive PDF Forms Using Adobe Acrobat X Pro for the Mac University Information Technology Services Training, Outreach, Learning Technologies and Video Production Copyright 2012 KSU Department

More information

WinSCP. Author A.Kishore/Sachin

WinSCP. Author A.Kishore/Sachin WinSCP WinSCP is a freeware windows client for the SCP (secure copy protocol), a way to transfer files across the network using the ssh (secure shell) encrypted protocol. It replaces other FTP programs

More information

DIL/NetPC ADNP/1520 Board Revision 2.1 Installing an SSH Connection User Manual

DIL/NetPC ADNP/1520 Board Revision 2.1 Installing an SSH Connection User Manual DIL/NetPC ADNP/1520 Board Revision 2.1 Installing an SSH Connection User Manual SSV Embedded Systems Heisterbergallee 72 D-30453 Hannover Phone: +49-(0)511-40 000-0 Fax: +49-(0)511-40 000-40 E-mail: sales@ist1.de

More information

Configurations for the Layer 3 Switch Router

Configurations for the Layer 3 Switch Router CHAPTER 3 This chapter describes the initial configuration of the Layer 3 switch router and contains the following major sections: Starting Up the Layer 3 Switch Router, page 3-1 Using the Console and

More information

DWG FastView for Web. User Guide

DWG FastView for Web. User Guide DWG FastView for Web User Guide Contents 1. Software installation and start-up... 1 1.1 Software installation... 1 1.2 Software start-up... 1 2.Operation interface and functions... 3 2.1 Operation interface...

More information

Using the VMware vcenter Orchestrator Client. vrealize Orchestrator 5.5.1

Using the VMware vcenter Orchestrator Client. vrealize Orchestrator 5.5.1 Using the VMware vcenter Orchestrator Client vrealize Orchestrator 5.5.1 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have comments

More information

Before you start the lab exercises see the lab administrator or EEE3080F tutor to get assigned to your routers.

Before you start the lab exercises see the lab administrator or EEE3080F tutor to get assigned to your routers. EEE00F Lab Basics of the Network Lab Student Lab Manual Before you start the lab exercises see the lab administrator or EEE00F tutor to get assigned to your routers. Contents. Resources used in the labs...

More information

Using TBLxNet Updated May 2016

Using TBLxNet Updated May 2016 Updated May 2016 Contents Understanding TBLxNet...3 Setting Your Options...3 Changing the Fonts...3 Selecting Colors...5 Selecting Cursor Options...6 Programming the Function Keys...6 Setting Up Miscellaneous

More information

WEBppliance for Windows User Administrator's Help

WEBppliance for Windows User Administrator's Help WEBppliance for Windows User Administrator's Help September 23, 2003 Contents About This Document...3 How to use this Help system...4 Getting started...6 What to do first... 6 Viewing your account settings...

More information

Configuring Secure Shell (SSH)

Configuring Secure Shell (SSH) Prerequisites for Configuring Secure Shell, page 1 Restrictions for Configuring Secure Shell, page 2 Information About Configuring Secure Shell, page 2 How to Configure Secure Shell, page 4 Monitoring

More information

Horizon Launcher Configuration Guide

Horizon Launcher Configuration Guide Horizon Launcher Configuration Guide Windows NT and Windows 2000 are registered trademarks of Microsoft Corporation. All other product or company names are trademarks or registered trademarks of their

More information

ACL Compliance Director Tutorial

ACL Compliance Director Tutorial Abstract Copyright 2008 Cyber Operations, Inc. This is a tutorial on ACL Compliance Director intended to guide new users through the core features of the system. Table of Contents Introduction... 1 Login

More information

InfoRecall in 20 Minutes Phantech Software

InfoRecall in 20 Minutes Phantech Software 2 Table of Contents Part I Introduction 3 Part II Create a File 3 Part III Create and Save Documents 4 Part IV Import Files 6 Part V Create a Hypertext Link 7 Part VI Create a Link to a Web Site 9 Part

More information

Configuring TACACS+ Finding Feature Information. Prerequisites for TACACS+

Configuring TACACS+ Finding Feature Information. Prerequisites for TACACS+ Finding Feature Information, page 1 Prerequisites for TACACS+, page 1 Information About TACACS+, page 3 How to Configure TACACS+, page 7 Monitoring TACACS+, page 16 Finding Feature Information Your software

More information

CCNA 1 Chapter 2 v5.0 Exam Answers %

CCNA 1 Chapter 2 v5.0 Exam Answers % CCNA 1 Chapter 2 v5.0 Exam Answers 2015 100% 1. Which two features are characteristics of flash memory? (Choose two.) Flash provides nonvolatile storage. Flash receives a copy of the IOS from RAM when

More information

Remote Support 19.1 Web Rep Console

Remote Support 19.1 Web Rep Console Remote Support 19.1 Web Rep Console 2003-2019 BeyondTrust Corporation. All Rights Reserved. BEYONDTRUST, its logo, and JUMP are trademarks of BeyondTrust Corporation. Other trademarks are the property

More information

Dominion KX II-101. Quick Setup Guide. Step 1: Configure the Target Server

Dominion KX II-101. Quick Setup Guide. Step 1: Configure the Target Server Dominion KX II-101 Quick Setup Guide Thank you for your purchase of the KX II-101, the industry's most full-featured, enterprise-class, secure, digital KVM (Keyboard, Video, Mouse) switch. This Quick Setup

More information

Chapter 10 - Configure ASA Basic Settings and Firewall using ASDM

Chapter 10 - Configure ASA Basic Settings and Firewall using ASDM Chapter 10 - Configure ASA Basic Settings and Firewall using ASDM This lab has been updated for use on NETLAB+ Topology Note: ISR G1 devices use FastEthernet interfaces instead of GigabitEthernet interfaces.

More information

Perceptive Data Transfer

Perceptive Data Transfer Perceptive Data Transfer User Guide Version: 6.5.x Written by: Product Knowledge, R&D Date: September 2016 2015 Lexmark International Technology, S.A. All rights reserved. Lexmark is a trademark of Lexmark

More information

Working with Mailbox Manager

Working with Mailbox Manager Working with Mailbox Manager A user guide for Mailbox Manager supporting the Message Storage Server component of the Avaya S3400 Message Server Mailbox Manager Version 5.0 February 2003 Copyright 2003

More information

2.1 Logging on to FieldManager Software

2.1 Logging on to FieldManager Software 2 Getting Started The main window displays all statewide contracts. Please note that you have access to ALL contracts and functionality is based on permission level. These contracts are imported into FieldManager

More information

OU EDUCATE TRAINING MANUAL

OU EDUCATE TRAINING MANUAL OU EDUCATE TRAINING MANUAL OmniUpdate Web Content Management System El Camino College Staff Development 310-660-3868 Course Topics: Section 1: OU Educate Overview and Login Section 2: The OmniUpdate Interface

More information

San Jacinto College. Secure SSL VPN Instruction Manual. Contents

San Jacinto College. Secure SSL VPN Instruction Manual. Contents 1 San Jacinto College Secure SSL VPN Instruction Manual The new Secure SSL VPN provides a more secure and convenient method of accessing San Jacinto College resources remotely. This document provides an

More information

Logi Ad Hoc Reporting System Administration Guide

Logi Ad Hoc Reporting System Administration Guide Logi Ad Hoc Reporting System Administration Guide Version 12 July 2016 Page 2 Table of Contents INTRODUCTION... 4 APPLICATION ARCHITECTURE... 5 DOCUMENT OVERVIEW... 6 GENERAL USER INTERFACE... 7 CONTROLS...

More information

JNIOR. A Network I/O Resource Utilizing the JAVA Platform. JNIOR Support Tool Manual. Release 6.0

JNIOR. A Network I/O Resource Utilizing the JAVA Platform. JNIOR Support Tool Manual. Release 6.0 JNIOR A Network I/O Resource Utilizing the JAVA Platform Release 6.0 Supports JNIOR Series 3 and 4 JNIOR OS 3.4 or greater required INTEG Process Group, Inc. 2919 East Hardies Rd, First Floor Gibsonia,

More information

CHAPTER 1 COPYRIGHTED MATERIAL. Getting to Know AutoCAD. Opening a new drawing. Getting familiar with the AutoCAD and AutoCAD LT Graphics windows

CHAPTER 1 COPYRIGHTED MATERIAL. Getting to Know AutoCAD. Opening a new drawing. Getting familiar with the AutoCAD and AutoCAD LT Graphics windows CHAPTER 1 Getting to Know AutoCAD Opening a new drawing Getting familiar with the AutoCAD and AutoCAD LT Graphics windows Modifying the display Displaying and arranging toolbars COPYRIGHTED MATERIAL 2

More information

ilo MP Utilities ilo MP

ilo MP Utilities ilo MP The Integrated Lights-Out Management Processor () offers remote server management through an independent management processor (MP). It provides a way for you to connect to a server and perform administration

More information

HP Switch Software. Basic Operation Guide

HP Switch Software. Basic Operation Guide HP Switch Software Basic Operation Guide HP 3500 HP 3800 HP 2520 HP 3500yl HP 2620 HP 2520G HP 5400zl HP 2615 HP 2530 HP 6200yl HP 2910 HP 6600 HP 2915 HP 8200zl November 2012 HP Networking HP 3500 HP

More information

Initial Configuration for the Switch

Initial Configuration for the Switch Options for Initial Configuration, page 1 Configuring the Switch Using the Web User Interface, page 1 Configuring the Switch Using the CLI, page 4 Configuring the Switch in the ROMMON Mode, page 12 Options

More information

User Manual Portable Laptop Console Crash Cart Adapter

User Manual Portable Laptop Console Crash Cart Adapter User Manual Portable Laptop Console Crash Cart Adapter GUC211V PART NO. M1458 www.iogear.com 2017 IOGEAR. All Rights Reserved. Part No. M1458. IOGEAR, the IOGEAR logo is trademarks of IOGEAR. Microsoft

More information

Configuring Terminal Settings and Sessions

Configuring Terminal Settings and Sessions This chapter contains the following sections: Information About Terminal Settings and Sessions, page 1 Configuring the Console Port, page 3 Configuring the COM1 Port, page 5 Configuring Virtual Terminals,

More information

XPress-I/O Device Server Command Reference

XPress-I/O Device Server Command Reference XPress-I/O Device Server Command Reference Part Number 900-464 Revision B July 2007 Copyright & Trademark Contacts 2006, 2007, Lantronix. All rights reserved. No part of the contents of this book may be

More information

Introduction to UNIX. Logging in. Basic System Architecture 10/7/10. most systems have graphical login on Linux machines

Introduction to UNIX. Logging in. Basic System Architecture 10/7/10. most systems have graphical login on Linux machines Introduction to UNIX Logging in Basic system architecture Getting help Intro to shell (tcsh) Basic UNIX File Maintenance Intro to emacs I/O Redirection Shell scripts Logging in most systems have graphical

More information

bs^ir^qfkd=obcib`qflk= prfqb=clo=u

bs^ir^qfkd=obcib`qflk= prfqb=clo=u bs^ir^qfkd=obcib`qflk= prfqb=clo=u cçê=u=táåççïë=póëíéãë cçê=lééåsjp=eçëíë cçê=f_j=eçëíë 14.1 bî~äì~íáåö=oéñäéåíáçå=u This guide provides a quick overview of features in Reflection X. This evaluation guide

More information

(electronic mail) is the exchange of computer-stored messages by telecommunication.

(electronic mail) is the exchange of computer-stored messages by telecommunication. What is email? E-mail (electronic mail) is the exchange of computer-stored messages by telecommunication. E-mail is one of the protocols included with the Transport Control Protocol/Internet Protocol (TCP/IP)

More information

JANUS EXPLORER. Janus Explorer Version 1.4 Quick Guide

JANUS EXPLORER. Janus Explorer Version 1.4 Quick Guide JANUS EXPLORER Version 1.4 Quick Guide Page 1 TABLE OF CONTENTS Introduction... 3 Installation... 3 Software Guide... 6 Send Commands... 8 Responses... 8 SMS and Dial... 8 Modem and SIM Details... 9 Phone

More information

SMART Sync User Guide: Getting Started. School District of Palm Beach County

SMART Sync User Guide: Getting Started. School District of Palm Beach County SMART Sync 2009 User Guide: Getting Started School District of Palm Beach County Revised: August 8, 2011 Table of Contents Overview... 4 Getting Started... 5 Logging In as a Teacher... 6 Logging in to

More information

Manage Your Inventory

Manage Your Inventory About Inventory About Inventory, on page 1 Inventory and Cisco ISE Authentication, on page 2 Display Information About Your Inventory, on page 2 Types of Devices in the DNA Center Inventory, on page 6

More information

Series 500 Frame Relay/Leased Line Bridge/Router PPP Menu Reference Manual

Series 500 Frame Relay/Leased Line Bridge/Router PPP Menu Reference Manual Series 500 Frame Relay/Leased Line Bridge/Router PPP Menu Reference Manual LR1530A-R3, LR1530A-EU-R3, LR1531A-R2, LR1535A-R2 5500101-10 equivalent to 5500068-12 Copyright 2002 by Black Box Corporation.

More information

SITRANS F. Ultrasonic Flowmeters SITRANS CONNECTION APP. Operating Instructions. Answers for industry.

SITRANS F. Ultrasonic Flowmeters SITRANS CONNECTION APP. Operating Instructions. Answers for industry. SITRANS F Ultrasonic Flowmeters Operating Instructions Edition 4/2014 Answers for industry. Introduction 1 SITRANS CONNECTION Main Settings 2 SITRANS F Configuring SITRANS Flowmeter to Communicate with

More information

Legal Notes. Regarding Trademarks KYOCERA MITA Corporation

Legal Notes. Regarding Trademarks KYOCERA MITA Corporation Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable for any problems arising from

More information

GEORGIA SOFTWORKS. February 15, GSW ConnectBot Android Client for SSH/Telnet. GSW ConnectBot. Users Guide

GEORGIA SOFTWORKS. February 15, GSW ConnectBot Android Client for SSH/Telnet. GSW ConnectBot. Users Guide GEORGIA SOFTWORKS February 15, 2018 GSW ConnectBot Android Client for SSH/Telnet GSW ConnectBot Users Guide THIS PAGE INTENTIONALLY LEFT BLANK ii GEORGIA SOFTWORKS February 15, 2018 Georgia SoftWorks Public

More information

ASIC-200 Version 5.0. integrated industrial control software. HMI Guide

ASIC-200 Version 5.0. integrated industrial control software. HMI Guide ASIC-200 Version 5.0 integrated industrial control software HMI Guide Revision Description Date C Name change, correct where applicable with document 4/07 HMI Guide: 139168(C) Published by: Pro-face 750

More information

Power Vision 1.5 (Cod )

Power Vision 1.5 (Cod ) ELECTRICAL NETWORK ANALYSIS SOFTWARE Power Vision 1.5 (Cod. 775 353) USER S MANUAL (Cod. M 981 358 / 02 D) 2002 - CIRCUTOR, S.A. INDEX 1.- POWER VISION SOFTWARE INSTALLATION...4 2.- INTRODUCTION TO POWER

More information

First-Time Configuration

First-Time Configuration This chapter describes the actions to take before turning on your router for the first time Setup Mode, on page 1 Verifying the Cisco IOS Software Version, on page 4 Configuring the Hostname and Password,

More information

WebStudio User Guide. OpenL Tablets BRMS Release 5.18

WebStudio User Guide. OpenL Tablets BRMS Release 5.18 WebStudio User Guide OpenL Tablets BRMS Release 5.18 Document number: TP_OpenL_WS_UG_3.2_LSh Revised: 07-12-2017 OpenL Tablets Documentation is licensed under a Creative Commons Attribution 3.0 United

More information

Conventions in this tutorial

Conventions in this tutorial This document provides an exercise using Digi JumpStart for Windows Embedded CE 6.0. This document shows how to develop, run, and debug a simple application on your target hardware platform. This tutorial

More information

G-router GSM/GPRS to RS-232 and Ethernet Gateway Release Notes

G-router GSM/GPRS to RS-232 and Ethernet Gateway Release Notes G-router GSM/GPRS to RS-232 and Ethernet Gateway Release Notes Author RFI Support Team Revision A0 Version RN_G-router_1.2.2 Date 23-05-2011 Covering Product code G-router, RE.40.QGSM Contents 1 Introduction...

More information

Practice Labs User Guide

Practice Labs User Guide Practice Labs User Guide This page is intentionally blank Contents Introduction... 3 Overview... 3 Accessing Practice Labs... 3 The Practice Labs Interface... 4 Minimum Browser Requirements... 5 The Content

More information

Manage Your Inventory

Manage Your Inventory About Inventory About Inventory, on page 1 Inventory and Cisco ISE Authentication, on page 6 Add a Device Manually, on page 7 Integrate Meraki Dashboard, on page 10 Filter Devices, on page 11 Change Devices

More information

Console Port, Telnet, and SSH Handling

Console Port, Telnet, and SSH Handling Console Port Overview, on page 1 Connecting Console Cables, on page 1 Installing USB Device Drivers, on page 1 Console Port Handling Overview, on page 2 Telnet and SSH Overview, on page 2 Persistent Telnet,

More information