Professional Documents
Culture Documents
10.3
NN47263-302, 04.01
October 2010
Copyright
Except where expressly stated otherwise, no use should be made of
materials on this site, the Documentation(s) and Product(s) provided
by Avaya. All content on this site, the documentation(s) and the
product(s) provided by Avaya including the selection, arrangement and
design of the content is owned either by Avaya or its licensors and is
Commissioning
October 2010
Contents
Chapter 1: New in this release.................................................................................................5
Features............................................................................................................................................................5
Other changes...................................................................................................................................................5
FAT 32 File System Support for SR 4134 and SR 2330...........................................................................5
Multiple SNTP Server support..................................................................................................................5
Source IP enhancements.........................................................................................................................6
Chapter 2: Introduction.............................................................................................................7
Prerequisites.....................................................................................................................................................7
Navigation.........................................................................................................................................................7
Commissioning
October 2010
Saving a configuration.....................................................................................................................................43
Deleting a configuration file.............................................................................................................................44
Rebooting or resetting the Secure Router 2330/4134.....................................................................................44
Powering down the Secure Router 2330/4134...............................................................................................45
Viewing the Secure Router 2330/4134 configuration......................................................................................46
Viewing chassis status....................................................................................................................................46
Viewing interface module configuration...........................................................................................................47
Checking the system for alarms......................................................................................................................47
Checking the system status............................................................................................................................48
Configuring reverse Telnet on the Secure Router 4134..................................................................................48
Copying an external compact flash or a USB drive file...................................................................................50
Downloading a network file to a compact flash or a USB drive.......................................................................50
Formatting the external compact flash file system..........................................................................................51
Formatting the USB drive file system..............................................................................................................52
Listing files on a compact flash drive or USB drive.........................................................................................52
Listing image version files from a compact flash drive or USB drive..............................................................53
Removing a file from a compact flash drive or USB drive...............................................................................53
Renaming a file on a compact flash drive or USB drive..................................................................................54
Uploading files from a compact flash drive or USB drive................................................................................54
Uploading the event log from the Secure Router 2330/4134..........................................................................55
Commissioning
October 2010
Features
There is no new feature content added to Avaya Secure Router 2330/4134 Commissioning
(NN47263-302) for Release 10.3.
Other changes
The following sections include commissioning specific feature information that was previously
documented in the Secure Router 2330/4134, 10.2 and 10.2.1 release notes, and has been
moved to Avaya Secure Router 2330/4134 Configuration Commissioning (NN47263-302)
for Release 10.3:
Commissioning
October 2010
Source IP enhancements
Beginning with Release 10.2, Secure Router 2330/4134 supports adding source address
information to existing services. For more information about Source IP enhancements, see
Avaya Secure Router 2330/4134 Configuration IPv4 and Routing (NN47263-502).
For information about adding source address information to SNTP, see Configuring the SNTP
source address on page 37.
Commissioning
October 2010
Chapter 2: Introduction
This document provides information about the recommended method to commission the Avaya Secure
Router 2330/4134. For a complete list of Command Line Interface (CLI) commands that you use to monitor
and configure the Secure Router 2330/4134, see Avaya Secure Router 2330/4134 Command Line
Reference (NN47263-507).
Prerequisites
Hardware installation is complete.
You must have a console cable to connect to the console port of the router.
You must have an Ethernet cable to connect to the management port of the router.
Important:
The Secure Router 2330 does not support a dedicated management LAN port. You
can use one of the front panel Ethernet ports as a management LAN port.
Be familiar with using the CLI and interpreting partial configuration procedures. See Avaya
Secure Router 2330/4134 Using the Command Line Interface (NN47263-506).
Navigation
Avaya Secure Router 2330/4134 commissioning on page 9
Commissioning the Avaya Secure Router 2330/4134 on page 15
Commissioning
October 2010
Introduction
Commissioning
October 2010
Prerequisites
Ensure the Secure Router 2330/4134 is securely installed in an equipment rack.
Commissioning
October 2010
10
Commissioning
October 2010
Commissioning
October 2010
11
12
Commissioning
October 2010
Commissioning
October 2010
13
14
Commissioning
October 2010
Procedure steps
Record all the required information for commissioning your Secure Router 2330/4134
in the following table.
Sample entries
kevx
Host name
fremont
a.b.c.d/32
Commissioning
October 2010
15
The following figure shows the same commissioning example scenario but with the Secure
Router 2330.
16
Commissioning
October 2010
Prerequisites
You have a PC running HyperTerminal or similar terminal emulation program with the
following communication protocol settings:
- 9600 bps
- 8 data bits
- 1 stop bit
- No flow control
- No parity
Ensure you have the supplied console cable (shipped with the chassis).
Ensure you have the supplied female DB-9 to RJ-45 adapter if you require it for connection
to your terminal or PC.
Ensure you have the Secure Router 2330/4134 securely installed in the equipment rack.
Procedure steps
1. Insert the male RJ-45 connector in the console port of the Secure Router
2330/4134.
2. Connect the female DB-9 to RJ-45 adapter to the opposite end of the console cable,
if necessary.
3. Insert the RJ-45 or female DB-9 connector (dependent on your equipment) in a
terminal or PC.
Commissioning
October 2010
17
The following figure shows how to connect a terminal to the Secure Router 2330 for local
access.
18
Commissioning
October 2010
Prerequisites
The Secure Router 2330/4134 is securely mounted and grounded. For information about
installing the Secure Router 4134 chassis, see Avaya Secure Router 4134 Installation
Chassis (NN47263-300). For information about installing the Secure Router 2330
chassis, see Avaya Secure Router 2330 Installation Chassis (NN47263-304). For
information about installing the power supplies, interface modules, and other hardware
components, see Avaya Secure Router 2330/4134 Installation Hardware Components
(NN47263-301).
A local terminal is connected to the Secure Router console port (the console port is located
on the rear panel of the Secure Router 4134 and the front panel of the Secure Router
2330).
Ensure you have powered up the terminal or PC.
Voltage:
Risk of electric shock
Ensure the Secure Router 2330/4134 is properly grounded. For information about grounding
the Secure Router 4134, see Avaya Secure Router 4134 Installation Chassis
(NN47263-300). For information about grounding the Secure Router 2330, see Avaya
Secure Router 2330 Installation Chassis (NN47263-304).
Important:
When powering up for the first time, Avaya recommends that you use a direct console
connection to the Secure Router 2330/4134. After you have completed the initial
configuration, you can use a remote connection for router management.
Commissioning
October 2010
19
20
Commissioning
October 2010
Router 2330/4134 displays the bootrom command menu. The following figure shows the
prompt to stop the auto-boot sequence and enter the bootrom command area.
If you accidentally enter the bootrom command menu, you can exit that command menu and
restart the normal boot sequence by pressing @ on your keyboard.
For detailed information on using the bootrom command menu, see Avaya Secure Router
2330/4134 Troubleshooting (NN47263-700).
Prerequisites
You have securely mounted the Secure Router 2330/4134 in an equipment rack.
You have connected a local terminal to the console port of the Secure Router 2330/4134.
You have powered up the Secure Router 2330/4134.
The boot sequence is complete.
Commissioning
October 2010
21
Procedure steps
To log on to the Secure Router 2330/4134 CLI for the first time, enter the default user
name and password: login: admin password: setup
Procedure steps
1. To access configuration mode, enter:
configure terminal
2. To define the boot parameters, enter:
boot_params
22
Commissioning
October 2010
3. When prompted, enter the name of the device from which you prefer the router
boots:
Boot dev [ftp,cf0,cf1,usb0]: cf0
4. Enter the boot file name (the router provides this information if you have previously
configured it):
Boot file name: SR4134.Z
5. Enter the name of the server you use to download the software image (the router
provides this information if you have previously configured it):
Server name: sunserver
6. Enter the server IP address (the router provides this information if you have
previously configured it):
Server IP address: 10.10.11.12
7. Enter the router IP address (the router provides this information if you have
previously configured it):
My IP address: 10.10.13.14
8. Enter the subnet mask (the router provides this information if you have previously
configured it):
My subnet mask: 255.255.255.0
9. Enter the gateway IP address (the router provides this information if you have
previously configured it):
Gateway IP address: 10.10.15.16
10. Enter your user name and password:
User name: kevx
Password: kevx
11. Enter 0 to disable or 1 to enable the checksum feature:
Checksum enable [0:Disable,1:Enable]: 1
12. Enter 0 to disable or 1 to enable the display of the image header contents:
Show header enable [0:Disable,1:Enable]: 1
13. Enter the number (0, 1, or 2) that corresponds to the type of bootrom image update
that you prefer, or enter 3 if you prefer to not update the bootrom image:
Save bootrom image [0:AutoUpdate,1:NormalBTupd,
2:GoldenBTupd,3:NoUpd]: 0
If you select 0, 1, or 2, the router returns the following:
Commissioning
October 2010
23
Procedure steps
1. To view the boot parameters configuration, enter:
show boot_params
2. 2. To view the current software version information, enter:
show version
24
Commissioning
October 2010
Figure 8: Management port on the rear panel of the Secure Router 4134
Prerequisites
You must be connected to the Secure Router 2330/4134 through the console port. See
Connecting a terminal for local access on page 17 for information about connecting a
terminal to the console port.
You must log in as a user with sufficient permissions to configure the Secure Router
2330/4134.
You must have the IP address and netmask that you want to assign to the management
port.
The following procedure uses Ethernet port 0/0 (on the rear of the Secure Router 4134) for the
management port. You can also use port 0/1 or port 0/2 on the front panel of the Secure Router
4134 for management purposes. Ethernet port 0/0 is a 10/100 Base-T port. Ethernet ports 0/1
and 0/2 are 10/100/1000 Base-T ports.
On the Secure Router 2330, you can use one of the front panel Ethernet ports as a
management port.
Procedure steps
1. To access configuration mode, enter:
Commissioning
October 2010
25
configure terminal
2. To identify the management port for configuration, enter:
interface ethernet 0/0
3. To configure the management port IP address, enter:
ip address <ipaddr> <netmask>
4. To configure the speed and mode of the port, enter:
speed <10|100|1000|auto> mode <full_duplex|half_duplex>
Table 2: Variable definitions
Variable
Value
The speed of the interface. Enter auto for autonegotiation. Note that Ethernet port 0/0 is a 10/100
Base-T port.
<full_duplex | half_duplex>
<ipaddr>
<netmask>
Procedure steps
1. To access configuration mode, enter:
configure terminal
2. To disable the USB port, enter:
no usb enable
3. To display the status of the USB port, enter:
show usb_userstat
4. To re-enable the USB port, as required, enter:
26
Commissioning
October 2010
Configuring SSH
usb enable
Configuring SSH
You can enable an SSH connection for remote access. To generate a key and enable SSH,
use the procedures in this section.
Procedure steps
1. To access configuration mode, enter:
configure terminal
2. To access the SSH key generation subtree, enter:
ssh_keygen
3. To generate the DSA key, enter:
generate dsa
4. To generate the RSA key, enter:
generate rsa
5. To exit the SSH key generation subtree, enter:
exit
6. To enable the SSH connection, enter:
ssh_server enable
7. To save the configuration, enter:
save local
Prerequisites
You must assign an IP address to the Secure Router 2330/4134.
Procedure steps
1. To access configuration mode, enter:
Commissioning
October 2010
27
configure terminal
2. To enable the FTP service, enter:
ftp_server
3. To enable the TFTP service, enter:
tftp_server
4. To enable the Telnet service, enter:
telnet_server
<password>
<password>
If you entered the password correctly, the Secure Router returns a message
indicating a successful configuration:
password is set
5. To verify the current ftp server configuration, enter:
show ftp
28
Commissioning
October 2010
Prerequisites
The IP address of the management interface on the Secure Router 2330/4134 must be
configured.
You must have the IP address of the management interface on the router.
You must have a terminal or workstation connected to the Ethernet LAN.
Procedure steps
1. To start a Telnet session from your workstation, enter:
telnet <ipaddr>
2. To log in, enter:
login:
admin
password:
setup
Procedure steps
To view information about the Telnet server settings, enter:
Commissioning
October 2010
29
show telnet
Procedure steps
1. To view the list of users currently connected using a Telnet session to find the Telnet
session sequence numbers, enter: show users The following figure shows an
example of the Telnet session sequence numbers for users remotely connected to
the router.
Value
The Telnet session sequence number. Enter
a value from 1 to 16.
To quickly disconnect all Telnet sessions, use the command: clear telnet_sessions
30
Commissioning
October 2010
Procedure steps
1. To access configuration mode, enter:
configure terminal
2. To configure the Telnet banner, enter:
telnet_banner banner <string> [banner1] [banner2]
Table 4: Variable definitions
Variable
Value
[banner1]
[banner2]
<string>
Procedure steps
1. To access configuration mode, enter:
configure terminal
2. To configure the Telnet timeout value, enter:
telnet_timeout <value>
Table 5: Variable definitions
Variable
<value>
Commissioning
Value
Enter the time in seconds (from 0 to 3600)
after which inactive Telnet sessions
automatically disconnect. The default value
is 900 seconds. If you enter a value of 0
October 2010
31
Variable
Value
seconds, inactive Telnet sessions do not
automatically disconnect.
Procedure steps
1. To access configuration mode, enter:
configure terminal
2. To configure the host name for the Secure Router 2330/4134, enter:
hostname <WORD>
Table 6: Variable definitions
Variable
<WORD>
Value
The name you want to assign to the Secure
Router 2330/4134.
Procedure steps
1. To access configuration mode, enter:
configure terminal
2. To configure the gateway route, enter:
32
Commissioning
October 2010
Value
<netaddr/mask>
<gateway>
Prerequisites
You must have the IP address of the next-hop device.
Procedure steps
To ping the next-hop device, enter:
ping <ipaddr>
Procedure steps
1. To access configuration mode, enter:
configure terminal
2. To configure the date, enter:
date <month> <day> <year>
Commissioning
October 2010
33
Value
<day>
<month>
<year>
Procedure steps
1. To access configuration mode, enter:
configure terminal
2. To configure your local time, enter:
utc <+|-> <hour offset> <minute offset>
Table 9: Variable definitions
Variable
34
Value
<+|->
<hour offset>
<minute offset>
Commissioning
October 2010
Variable
Value
59. For example, if you are in New York, you
enter utc - 4 0.
Procedure steps
1. To configure multiple SNTP servers, enter Configuration Mode.
configure terminal
2. Because DNS entries must be configured for SNTP to function properly, configure
primary and secondary DNS servers.
ip pname_server <address> ip name_server <address>
3. To configure an SNTP server, enter the sntp sub-tree.
sntp
4. Configure the source address of the SNTP client.
source-address <address>
5. Configure the number of retries for each SNTP server.
retries <count>
6. Configure an NTP server.
server <server> [timeout]
Commissioning
October 2010
35
Value
<address>
Specifies an IP address.
<count>
<server>
<timeout>
Procedure steps
1. To access configuration mode, enter:
configure terminal
2. To set the location of the SNTP server, enter:
sntp server {ipaddr|hostname}
3. To set the timeout value for the response from the server, enter:
sntp timeout <value>
Table 11: Variable definitions
Variable
36
Value
{ipaddr | hostname}
<value>
Commissioning
October 2010
Procedure steps
To display the SNTP configuration, enter:
show sntp
Procedure Steps
1. To configure source addresses for a service, enter Configuration Mode.
configuration terminal
2. Enter the sntp subtree
sntp
3. Configure the source address.
source-address <[ip-address]|[interface-name]>
Table 12: Variable definitions
Variable
Value
[ip-address]
[interface-name]
Procedure steps
1. To access configuration mode, enter:
Commissioning
October 2010
37
configure terminal
2. To configure the DST offset, enter:
dst set <device location> <start hour> <start minute> <start
week of month> <start day of week> <start month> <end hour>
<end minute> <end week of month> <end day of week> <end month>
<dst duration hrs> <dst duration minutes>
3. To enable DST, enter:
dst enable
4. To disable DST, enter:
no dst enable
5. To display the DST configuration and status, enter:
show dst
Table 13: Variable definitions
Variable
38
Value
<device location>
<start hour>
<start minute>
<start month>
<end hour>
<end minute>
<end month>
Commissioning
October 2010
Variable
Value
Specifies the number of offset minutes to add
to the time at the start of DST (and remove
at the end of DST).
Offset time
amount: 1:00
hours
start hour
start minute
start month
end hour
end minute
end month
10
Procedure steps
1. To enter configuration mode, enter:
configure terminal
2. To configure the DST for this example, enter:
Commissioning
October 2010
39
Procedure steps
1. To access password configuration mode, enter:
password
The Secure Router 2330/4134 prompts you for the current user name.
2. Enter the default user name, which is the current user name:
admin
The Secure Router 2330/4134 prompts you for the old password.
3. Enter the default password, which is the current password:
setup
The Secure Router 2330/4134 prompts you for the new password.
4. Enter your new password. The Secure Router 2330/4134 prompts you to verify the
new password.
5. Re-enter your new password. A message appears that confirms that the password
is changed.
40
Commissioning
October 2010
Procedure steps
1. To access configuration mode, enter:
configure terminal
2. To change the login name, enter:
admin_name <WORD>
The Secure Router 2330/4134 displays a message that confirms the login name is
successfully changed.
Adding users
You can identify users (that is, login names) who can access the Secure Router 2330/4134,
and assign each user an access privilege (levels 24). Only the system administrator (level 1
access) can add, modify, or remove this information from the system.
Procedure steps
1. To access configuration mode, enter:
configure terminal
2. Enter the user name and access level:
user <username> level <value>
The Secure Router 2330/4134 prompts you to enter a password for this user.
3. Enter a password (from 0 to 10 characters) for the new user. The Secure Router
2330/4134 prompts you to re-enter the password.
4. Re-enter the password for the new user. The Secure Router 2330/4134 confirms
that the password is set and confirms the name of the new user is added.
Commissioning
October 2010
41
Value
<username>
<value>
Privilege name
Definition
1 (highest)
PRIVILEGE_ADMIN
PRIVILEGE_CONFIGURE
PRIVILEGE_TEST
4 (lowest)
PRIVILEGE_NORMAL
Removing users
The system administrator can remove configured user names from the Secure Router
2330/4134.
Important:
To reset a user password, you must delete and then recreate the user account.
42
Commissioning
October 2010
Pinging a device
Procedure steps
1. To access configuration mode, enter:
configure terminal
2. To remove a user, enter:
no user <username>
Pinging a device
Ping a device to verify the connection between the Secure Router 2330/4134 and that network
device. If the network device sends a ping reply, a message indicates that the specified IP
address is alive and can communicate with the router. If the router does not receive a reply,
the message indicates that the address is not responding.
Prerequisites
You must physically connect the Secure Router 2330/4134 to the network.
You must physically connect the specific network device to the network.
Procedure steps
Ping the network device:
ping <ipaddr>
Saving a configuration
Issue the save command to save the running configuration to a file. You can save the
configuration to the local file system, or to a file on the network.
Procedure steps
1. To save the configuration to the local file system, enter:
save local [file <filename>]
2. To save the configuration to a network file, enter:
save network <ipaddr> <path>
Table 16: Variable definitions
Variable
[file <filename>]
Commissioning
Value
The name of the file to which the
configuration is saved. This is an optional
October 2010
43
Variable
Value
parameter. The configuration is saved to the
system default file (system.cfg) if you do not
specify a filename.
<ipaddr>
<path>
Procedure steps
1. To delete the current configuration file, enter:
clear cfg_file [<filename>]
A prompt appears asking you to confirm the operation.
2. Enter y to delete, or n to cancel the operation.
Table 17: Variable definitions
Variable
[<filename>]
Value
The name of the file to delete. This is an
optional parameter. if You do not specify a
filename, the router deletes the system
default file (system.cfg).
44
Commissioning
October 2010
Important:
If you have the Mediation Server Module installed on the SR4134, there is a 2-minute delay
after you issue the reboot command while the router waits for the module to shut down.
The chassis reboots automatically when the Mediation Server Module completes shutdown.
Procedure steps
1. To access configuration mode, enter:
configure terminal
2. To reset the Secure Router 2330/4134, enter:
system reset-to-factory {system|users}
3. To exit configuration mode, enter:
exit
4. To reboot the Secure Router 2330/4134, enter:
reboot
Issue the reboot command from the CLI root.
5. When the Secure Router 2330/4134 completes the reboot, save the factorydefault settings to the system.cfg file by entering:
save local
Table 18: Variable definitions
Variable
{system | users}
Value
Enter system to remove all information
stored in memory, which includes user
information, event logs, crash logs,
command logs, and boot parameters.
Enter users to remove all users and
information related to users.
Commissioning
October 2010
45
Prerequisites
Ensure you have backed up your system configuration. Use the save local command to
save your configuration.
Procedure steps
1. To shut down the system, enter:
reboot
If you have the Mediation Server Module installed on the SR4134, there is a 2minute delay after you issue the reboot command while the router waits for the
module to shut down. The chassis reboots automatically when the Mediation Server
Module completes shutdown.
2. When the system restarts (you will see memory tests begin on your console), power
down the Secure Router 4134 by putting the power switch (or power switches if you
have more than one power supply installed) in the "off" position. To power down the
Secure Router 2330, disconnect the power cord.
Procedure steps
1. To view the current configuration, enter:
show configuration running
You can also enter show running-config to view the current configuration.
2. To view the configuration that is stored in Flash, enter:
show configuration stored
You can also enter show startup-config to view the stored configuration.
46
Commissioning
October 2010
can use the show chassis command to verify that the Secure Router 2330/4134 recognizes
the modules.
Procedure steps
To view summary information about the Secure Router 2330/4134, enter:
show chassis
Procedure steps
1. To view the configuration of interface modules installed in your Secure Router
2330/4134, enter:
show module configuration all
2. To view the configuration of individual interface modules, enter:
show module configuration [t1|e1|ct3| serial|hssi|t3] <slot/
port>
Procedure steps
1. To view the current alarms for any T1 WAN link on the Secure Router 2330/4134,
enter:
show module alarms t1 <slot/port>
2. To view the current alarms for any E1 port on the Secure Router 2330/4134, enter:
show module alarms e1 <slot/port>
3. To view the current alarms for any CT3 port on the Secure Router 4134, enter:
show module alarms ct3 <slot/port>
4. To view the current alarms for any serial port on the Secure Router 2330/4134,
enter:
Commissioning
October 2010
47
Procedure steps
View the operating status of all installed interface modules:
show module configuration all
48
Commissioning
October 2010
Value
<baud_rate>
Sets the speed of the AUX port. Range is 50 115200 (default 9600).
<data_bits>
<flow-control>
<parity>
<stop_bits>
<telnet_port>
<telnet_timeout>
Commissioning
October 2010
49
Variable
[no] enable
Value
Activates the reverse Telnet functionality on
the router. The no option deactivates reverse
Telnet.
Procedure steps
1. Insert a compact flash drive or USB drive into the router.
2. To copy a file, enter:
file copy <source_file> <dest_file>
Table 20: Variable definitions
Variable
Value
<source_file>
<dest_file>
Procedure steps
1. Insert a compact flash drive or USB drive into the router.
2. To copy a file, enter:
file download <host_ipaddr | host_ipv6addr> <source_file>
<dest_file> [interface <interface>] [id <user_id>] [passwd
<user_passwd>] [mode {image | file}] [source-address
<src_ipaddr>]
50
Commissioning
October 2010
Value
<dest_file>
<host_ipaddr |
host_ipv6addr>
[id <user_id>]
[interface <interface>]
[passwd <user_passwd>]
[source-address
<src_ipaddr>]
<source_file>
Procedure steps
1. Insert a compact flash drive into the router.
2. To format the compact flash drive, enter:
format </cf0 | /cf1> <16> | <32>
The following message is displayed:
WARNING :Do not remove the Compact Flash during this process
Do not reboot this device during this process
COMPACT FLASH FORMAT: Are you sure ? (y/n) :
3. To approve the formatting, enter:
y
The following message is displayed:
Erasing Compact Flash Blocks. Please wait till
completedCompact flash formatting completed
Commissioning
October 2010
51
Value
<16>
<32>
Procedure steps
1. Insert a USB drive into the router.
2. To format the USB drive, enter:
format /usb0 <16> | <32>
The following message is displayed:
WARNING :Do not remove the Compact Flash during this process
Do not reboot this device during this process
COMPACT FLASH FORMAT: Are you sure ? (y/n) :
3. To approve the formatting, enter:
y
Table 23: Variable definitions
Variable
Value
<16>
<32>
Procedure steps
1. Insert a compact flash drive or USB drive into the router.
2. To list stored files, enter:
52
Commissioning
October 2010
Listing image version files from a compact flash drive or USB drive
Value
Specifies a specific file system from which to
list stored files.
Procedure steps
1. Insert a compact flash drive or USB drive into the router.
2. To list stored files, enter:
file version [file_name </cfo | /cf1 | /usb0>]
Table 25: Variable definitions
Variable
[file_name </cfo | /cf1 | /usb0>]
Value
Specifies a specific device from which to list
the image version files.
Procedure steps
1. Insert a compact flash drive or USB drive into the router.
2. To list stored files, enter:
file rm <path_filename>
Table 26: Variable definitions
Variable
<path_filename>
Commissioning
Value
Specifies the path and name of the file to
remove.
October 2010
53
Procedure Steps
1. Insert a compact flash drive or USB drive into the router.
2. To list stored files, enter:
file rename <current_filname> <new_filename>
Table 27: Variable definitions
Variable
Value
<current_filname>
[interface-name]
Procedure steps
1. Insert a compact flash drive or USB drive into the router.
2. To list stored files, enter:
file upload <src_filename> <host_ipaddr | host_ipv6addr>
<dest_filname>
Table 28: Variable definitions
Variable
54
Value
<dest_filname>
<host_ipaddr | host_ipv6addr>
<src_filename>
Commissioning
October 2010
Procedure steps
1. Insert a compact flash drive or USB drive into the router.
2. To list stored files, enter:
file upload_event_log <host_ipaddr | host_ipv6addr>
<remote_filename> <src_ipaddr>
Table 29: Variable definitions
Variable
Value
<host_ipaddr | host_ipv6addr>
<remote_filename>
<src_ipaddr>
Commissioning
October 2010
55
56
Commissioning
October 2010