Upload
jason2017
View
212
Download
0
Embed Size (px)
Citation preview
7/24/2019 NN47263-302_04.01_Commissioning
1/56
CommissioningAvaya Secure Router 2330/4134
10.3NN47263-302, 04.01
October 2010
7/24/2019 NN47263-302_04.01_Commissioning
2/56
2010 Avaya Inc.
All Rights Reserved.
Notice
While reasonable efforts have been made to ensure that theinformation in this document is complete and accurate at the time ofprinting, Avaya assumes no liability for any errors. Avaya reserves theright to make changes and corrections to the information in thisdocument without the obligation to notify any person or organization ofsuch changes.
Documentation disclaimerAvaya shall not be responsible for any modifications, additions, ordeletions to the original published version of this documentation unlesssuch modifications, additions, or deletions were performed by Avaya.End User agree to indemnify and hold harmless Avaya, Avaya's agents,servants and employees against all claims, lawsuits, demands and
judgments arising out of, or in connection with, subsequentmodifications, additions or deletions to this documentation, to theextent made by End User.
Link disclaimer
Avaya is not responsible for the contents or reliability of any linked Websites referenced within this site or documentation(s) provided by Avaya.
Avaya is not responsible for the accuracy of any information, statementor content provided on these sites and does not necessarily endorsethe products, services, or information described or offered within them.
Avaya does not guarantee that these links will work all the time and hasno control over the availability of the linked pages.
Warranty
Avaya provides a limited warranty on this product. Refer to your salesagreement to establish the terms of the limited warranty. In addition,
Avayas standard warranty language, as well as information regardingsupport for this product, while under warranty, is available to Avayacustomers and other parties through the Avaya Support Web site:http://www.avaya.com/support . Please note that if you acquired theproduct from an authorized Avaya reseller outside of the United Statesand Canada, the warranty is provided to you by said Avaya reseller andnot by Avaya.
Licenses
THE SOFTWARE LICENSE TERMS AVAILABLE ON THE AVAYAWEBSITE, HTTP://SUPPORT.AVAYA.COM/LICENSEINFO/ARE
APPLICABLE TO ANYONE WHO DOWNLOADS, USES AND/ORINSTALLS AVAYA SOFTWARE, PURCHASED FROM AVAYA INC.,
ANY AVAYA AFFILIATE, OR AN AUTHORIZED AVAYA RESELLER(AS APPLICABLE) UNDER A COMMERCIAL AGREEMENT WITH
AVAYA OR AN AUTHORIZED AVAYA RESELLER. UNLESSOTHERWISE AGREED TO BY AVAYA IN WRITING, AVAYA DOESNOT EXTEND THIS LICENSE IF THE SOFTWARE WAS OBTAINEDFROM ANYONE OTHER THAN AVAYA, AN AVAYA AFFILIATE OR AN
AVAYA AUTHORIZED RESELLER, AND AVAYA RESERVES THERIGHT TO TAKE LEGAL ACTION AGAINST YOU AND ANYONEELSE USING OR SELLING THE SOFTWARE WITHOUT A LICENSE.BY INSTALLING, DOWNLOADING OR USING THE SOFTWARE, OR
AUTHORIZING OTHERS TO DO SO, YOU, ON BEHALF OFYOURSELF AND THE ENTITY FOR WHOM YOU ARE INSTALLING,DOWNLOADING OR USING THE SOFTWARE (HEREINAFTERREFERRED TO INTERCHANGEABLY AS YOU AND END USER),
AGREE TO THESE TERMS AND CONDITIONS AND CREATE A
BINDING CONTRACT BETWEEN YOU AND AVAYA INC. OR THEAPPLICABLE AVAYA AFFILIATE (AVAYA).
Copyright
Except where expressly stated otherwise, no use should be made ofmaterials on this site, the Documentation(s) and Product(s) providedby Avaya. All content on this site, the documentation(s) and theproduct(s) provided by Avaya including the selection, arrangement anddesign of the content is owned either by Avaya or its licensors and is
protected by copyright and other intellectual property laws including thesui generis rights relating to the protection of databases. You may notmodify, copy, reproduce, republish, upload, post, transmit or distributein any way any content, in whole or in part, including any code andsoftware. Unauthorized reproduction, transmission, dissemination,storage, and or use without the express written consent of Avaya canbe a criminal, as well as a civil, offense under the applicable law.
Third-party components
Certain software programs or portions thereof included in the Productmay contain software distributed under third party agreements (ThirdParty Components), which may contain terms that expand or limit
rights to use certain portions of the Product (Third Party Terms).Information regarding distributed Linux OS source code (for thoseProducts that have distributed the Linux OS source code), andidentifying the copyright holders of the Third Party Components and theThird Party Terms that apply to them is available on the Avaya SupportWeb site: http://www.avaya.com/support/Copyright/.
Trademarks
The trademarks, logos and service marks (Marks) displayed in thissite, the documentation(s) and product(s) provided by Avaya are theregistered or unregistered Marks of Avaya, its affiliates, or other thirdparties. Users are not permitted to use such Marks without prior writtenconsent from Avaya or such third party which may own the Mark.Nothing contained in this site, the documentation(s) and product(s)should be construed as granting, by implication, estoppel, or otherwise,any license or right in and to the Marks without the express writtenpermission of Avaya or the applicable third party.
Avaya is a registered trademark of Avaya Inc.
All other trademarks are the property of their respective owners.
Downloading documents
For the most current versions of documentation, see the Avaya SupportWeb site: http://www.avaya.com/support
Contact Avaya Support
Avaya provides a telephone number for you to use to report problemsor to ask questions about your product. The support telephone numberis 1-800-242-2121 in the United States. For additional supporttelephone numbers, see the Avaya Web site: http://www.avaya.com/support
2 Commissioning October 2010
http://www.avaya.com/supporthttp://www.avaya.com/support/LicenseInfohttp://www.avaya.com/support/Copyright/http://www.avaya.com/supporthttp://www.avaya.com/supporthttp://www.avaya.com/supporthttp://www.avaya.com/supporthttp://www.avaya.com/supporthttp://www.avaya.com/supporthttp://www.avaya.com/support/Copyright/http://www.avaya.com/support/LicenseInfohttp://www.avaya.com/support7/24/2019 NN47263-302_04.01_Commissioning
3/56
Contents
Chapter 1: New in this release.................................................................................................5Features............................................................................................................................................................5
Other changes...................................................................................................................................................5
FAT 32 File System Support for SR 4134 and SR 2330...........................................................................5Multiple SNTP Server support..................................................................................................................5
Source IP enhancements.........................................................................................................................6
Chapter 2: Introduction.............................................................................................................7Prerequisites.....................................................................................................................................................7
Navigation.........................................................................................................................................................7
Chapter 3: Avaya Secure Router 2330/4134 commissioning................................................9Prerequisites.....................................................................................................................................................9
Secure Router 2330/4134 commissioning procedures.....................................................................................9
Secure Router 2330/4134 commissioning navigation.....................................................................................12
Chapter 4: Commissioning the Avaya Secure Router 2330/4134.......................................15Gathering required information.......................................................................................................................15Connecting a terminal for local access...........................................................................................................17
Powering up the Secure Router 2330/4134....................................................................................................18
Logging in to the Secure Router 2330/4134...................................................................................................21
Defining boot parameters................................................................................................................................22
Viewing boot parameters and software image information.....................................................................24
Enabling the management LAN port...............................................................................................................24
Disabling the USB port on the Secure Router 4134........................................................................................26
Configuring SSH.............................................................................................................................................27
Enabling FTP, TFTP, and Telnet......................................................................................................................27
Configuring FTP users....................................................................................................................................28
Verifying the Telnet connection.......................................................................................................................29
Viewing Telnet server settings.........................................................................................................................29Clearing a Telnet session................................................................................................................................30
Configuring the Telnet banner.........................................................................................................................30
Configuring the Telnet timeout........................................................................................................................31
Configuring the host name..............................................................................................................................32
Configuring the static default route.................................................................................................................32
Verifying the next-hop connection...................................................................................................................33
Configuring the date........................................................................................................................................33
Configuring the time........................................................................................................................................34
Configuring multiple SNTP servers.................................................................................................................35
Configuring the SNTP client............................................................................................................................36
Displaying the SNTP configuration.................................................................................................................37
Configuring the SNTP source address............................................................................................................37
Configuring daylight saving time.....................................................................................................................37Example of configuring daylight saving time...................................................................................................39
Changing the admin user password................................................................................................................40
Changing the administrator account name.....................................................................................................41
Adding users...................................................................................................................................................41
Removing users..............................................................................................................................................42
Pinging a device..............................................................................................................................................43
Commissioning October 2010 3
7/24/2019 NN47263-302_04.01_Commissioning
4/56
Saving a configuration.....................................................................................................................................43
Deleting a configuration file.............................................................................................................................44
Rebooting or resetting the Secure Router 2330/4134.....................................................................................44
Powering down the Secure Router 2330/4134...............................................................................................45
Viewing the Secure Router 2330/4134 configuration......................................................................................46
Viewing chassis status....................................................................................................................................46
Viewing interface module configuration...........................................................................................................47Checking the system for alarms......................................................................................................................47
Checking the system status............................................................................................................................48
Configuring reverse Telnet on the Secure Router 4134..................................................................................48
Copying an external compact flash or a USB drive file...................................................................................50
Downloading a network file to a compact flash or a USB drive.......................................................................50
Formatting the external compact flash file system..........................................................................................51
Formatting the USB drive file system..............................................................................................................52
Listing files on a compact flash drive or USB drive.........................................................................................52
Listing image version files from a compact flash drive or USB drive..............................................................53
Removing a file from a compact flash drive or USB drive...............................................................................53
Renaming a file on a compact flash drive or USB drive..................................................................................54
Uploading files from a compact flash drive or USB drive................................................................................54
Uploading the event log from the Secure Router 2330/4134..........................................................................55
4 Commissioning October 2010
7/24/2019 NN47263-302_04.01_Commissioning
5/56
Chapter 1: New in this release
The following sections detail what is new inAvaya Secure Router 2330/4134 Commissioning
(NN47263-302) for Release 10.3.
Features
There is no new feature content added toAvaya Secure Router 2330/4134 Commissioning
(NN47263-302) for Release 10.3.
Other changes
The following sections include commissioning specific feature information that was previouslydocumented in the Secure Router 2330/4134, 10.2 and 10.2.1 release notes, and has beenmoved toAvaya Secure Router 2330/4134 Configuration Commissioning(NN47263-302)for Release 10.3:
FAT 32 File System Support for SR 4134 and SR 2330Beginning with Release 10.2, Secure Router 2330/4134 supports the FAT 32 file system for
the compact flash and USB drives. For more information, see Formatting the external compact
flash file systemon page 51.
Multiple SNTP Server support
Beginning with Release 10.2, Secure Router 2330/4134 supports Multiple Simple Network
Time Protocol (SNTP) Servers. For more information see, Configuring multiple SNTP
serverson page 35.
Commissioning October 2010 5
7/24/2019 NN47263-302_04.01_Commissioning
6/56
Source IP enhancements
Beginning with Release 10.2, Secure Router 2330/4134 supports adding source address
information to existing services. For more information about Source IP enhancements, see
Avaya Secure Router 2330/4134 Configuration IPv4 and Routing(NN47263-502).
For information about adding source address information to SNTP, see Configuring the SNTP
source addresson page 37.
New in this release
6 Commissioning October 2010
7/24/2019 NN47263-302_04.01_Commissioning
7/56
Chapter 2: Introduction
This document provides information about the recommended method to commission the Avaya SecureRouter 2330/4134. For a complete list of Command Line Interface (CLI) commands that you use to monitorand configure the Secure Router 2330/4134, seeAvaya Secure Router 2330/4134 Command LineReference(NN47263-507).
Prerequisites
Hardware installation is complete.
You must have a console cable to connect to the console port of the router.
You must have an Ethernet cable to connect to the management port of the router.
Important:
The Secure Router 2330 does not support a dedicated management LAN port. Youcan use one of the front panel Ethernet ports as a management LAN port.
Be familiar with using the CLI and interpreting partial configuration procedures. SeeAvaya
Secure Router 2330/4134 Using the Command Line Interface(NN47263-506).
Navigation
Avaya Secure Router 2330/4134 commissioningon page 9
Commissioning the Avaya Secure Router 2330/4134on page 15
Commissioning October 2010 7
7/24/2019 NN47263-302_04.01_Commissioning
8/56
Introduction
8 Commissioning October 2010
7/24/2019 NN47263-302_04.01_Commissioning
9/56
Chapter 3: Avaya Secure Router 2330/4134
commissioning
You commission the Avaya Secure Router 2330/4134 to prepare the unit for software featureconfiguration. Commissioning includes tasks such as establishing communication with the system,defining boot parameters, configuring usernames and passwords, and establishing remote access.
Prerequisites
Ensure the Secure Router 2330/4134 is securely installed in an equipment rack.
Secure Router 2330/4134 commissioning procedures
This task flow shows you the sequence of procedures you perform to commission the Secure
Router 2330/4134. To link to any procedure, go to Secure Router 2330/4134 commissioning
navigationon page 12.
Commissioning October 2010 9
7/24/2019 NN47263-302_04.01_Commissioning
10/56
Figure 1: Secure Router 2330/4134 commissioning procedures
Avaya Secure Router 2330/4134 commissioning
10 Commissioning October 2010
7/24/2019 NN47263-302_04.01_Commissioning
11/56
Figure 2: Secure Router 2330/4134 commissioning procedures (continued)
Secure Router 2330/4134 commissioning procedures
Commissioning October 2010 11
7/24/2019 NN47263-302_04.01_Commissioning
12/56
Secure Router 2330/4134 commissioning navigation
Gathering required informationon page 15
Connecting a terminal for local accesson page 17
Powering up the Secure Router 2330/4134on page 18
Logging in to the Secure Router 2330/4134on page 21
Defining boot parameterson page 22
Enabling the management LAN porton page 24
Disabling the USB port on the Secure Router 4134on page 26
Configuring SSHon page 27
Enabling FTP, TFTP, and Telneton page 27
Verifying the Telnet connectionon page 29
Viewing Telnet server settingson page 29
Clearing a Telnet sessionon page 30
Configuring the Telnet banneron page 30
Configuring the Telnet timeouton page 31
Configuring the host nameon page 32
Configuring the static default routeon page 32
Verifying the next-hop connectionon page 33
Configuring the dateon page 33
Configuring the timeon page 34
Configuring the SNTP clienton page 36
Displaying the SNTP configurationon page 37
Configuring daylight saving timeon page 37
Changing the admin user passwordon page 40
Changing the administrator account nameon page 41
Adding userson page 41
Removing userson page 42
Configuring FTP userson page 28
Pinging a deviceon page 43
Avaya Secure Router 2330/4134 commissioning
12 Commissioning October 2010
7/24/2019 NN47263-302_04.01_Commissioning
13/56
Saving a configurationon page 43
Deleting a configuration fileon page 44
Rebooting or resetting the Secure Router 2330/4134on page 44
Powering down the Secure Router 2330/4134on page 45
Viewing the Secure Router 2330/4134 configurationon page 46
Viewing chassis statuson page 46
Viewing interface module configurationon page 47
Checking the system for alarmson page 47
Checking the system statuson page 48
Configuring reverse Telnet on the Secure Router 4134on page 48
Copying an external compact flash or a USB drive fileon page 50
Downloading a network file to a compact flash or a USB driveon page 50
Formatting the external compact flash file systemon page 51
Formatting the USB drive file systemon page 52
Listing files on a compact flash drive or USB driveon page 52
Listing image version files from a compact flash drive or USB driveon page 53
Removing a file from a compact flash drive or USB driveon page 53
Renaming a file on a compact flash drive or USB driveon page 54
Uploading files from a compact flash drive or USB driveon page 54
Uploading the event log from the Secure Router 2330/4134on page 55
Secure Router 2330/4134 commissioning navigation
Commissioning October 2010 13
7/24/2019 NN47263-302_04.01_Commissioning
14/56
Avaya Secure Router 2330/4134 commissioning
14 Commissioning October 2010
7/24/2019 NN47263-302_04.01_Commissioning
15/56
Chapter 4: Commissioning the Avaya
Secure Router 2330/4134
This section includes the recommended method to commission the Avaya Secure Router 2330/4134,while ensuring that you limit unauthorized access to the router.
Commissioning is the first step following hardware installation. The commissioning task includes the initialprocedures required to bring the router online, and to configure appropriate access for remote users.
Gathering required informationBefore you begin, gather all the information you require to complete the commissioning steps.
Procedure steps
Record all the required information for commissioning your Secure Router 2330/4134in the following table.
Procedure job aid
Table 1: Gathering required information
Required information Sample entries Record information here
New password for admin
user
kevx
Host name fremont
Management IP address and
mask
10.11.12.13 255.255.255.0
Next hop IP address for static
route to hosts and servers
11.12.13.14/24
IP address of hosts and
servers that access the
Secure Router 2330/4134
a.b.c.d/32
The following figure is an example of a commissioning scenario showing the basicconfiguration requirements including host name, management interface, and terminals.
Commissioning October 2010 15
7/24/2019 NN47263-302_04.01_Commissioning
16/56
Figure 3: Commissioning scenario
The following figure shows the same commissioning example scenario but with the SecureRouter 2330.
Figure 4: Secure Router 2330 Commissioning scenario
Commissioning the Avaya Secure Router 2330/4134
16 Commissioning October 2010
7/24/2019 NN47263-302_04.01_Commissioning
17/56
Connecting a terminal for local access
Connect a local terminal to the console port of the Secure Router 2330/4134. This localconnection provides communication with the system during commissioning.
Important:
When powering up for the first time, Avaya recommends that you use a direct consoleconnection to the Secure Router 2330/4134. After you have completed the initialconfiguration, you can use a remote connection for router management.
Prerequisites
You have a PC running HyperTerminal or similar terminal emulation program with thefollowing communication protocol settings:
- 9600 bps- 8 data bits
- 1 stop bit
- No flow control
- No parity
Ensure you have the supplied console cable (shipped with the chassis).
Ensure you have the supplied female DB-9 to RJ-45 adapter if you require it for connectionto your terminal or PC.
Ensure you have the Secure Router 2330/4134 securely installed in the equipment rack.
Procedure steps
1. Insert the male RJ-45 connector in the console port of the Secure Router2330/4134.
2. Connect the female DB-9 to RJ-45 adapter to the opposite end of the console cable,if necessary.
3. Insert the RJ-45 or female DB-9 connector (dependent on your equipment) in aterminal or PC.
Procedure job aid
The following figure shows how to connect a terminal to the Secure Router 4134 for local
access.
Connecting a terminal for local access
Commissioning October 2010 17
7/24/2019 NN47263-302_04.01_Commissioning
18/56
Figure 5: Connect a local terminal to the Secure Router 4134
The following figure shows how to connect a terminal to the Secure Router 2330 for localaccess.
Figure 6: Connect a local terminal to the Secure Router 2330
Powering up the Secure Router 2330/4134
Power up the Secure Router 2330/4134 to initiate the power-on diagnostics test. The SecureRouter 2330/4134 indicates the resulting pass or fail with status LEDs, and by logging results inthe event log.
Average time for the Secure Router to boot up: 5 minutes.
Commissioning the Avaya Secure Router 2330/4134
18 Commissioning October 2010
7/24/2019 NN47263-302_04.01_Commissioning
19/56
Prerequisites
The Secure Router 2330/4134 is securely mounted and grounded. For information aboutinstalling the Secure Router 4134 chassis, seeAvaya Secure Router 4134 Installation Chassis(NN47263-300). For information about installing the Secure Router 2330chassis, seeAvaya Secure Router 2330 Installation Chassis(NN47263-304). For
information about installing the power supplies, interface modules, and other hardwarecomponents, seeAvaya Secure Router 2330/4134 Installation Hardware Components(NN47263-301).
A local terminal is connected to the Secure Router console port (the console port is locatedon the rear panel of the Secure Router 4134 and the front panel of the Secure Router2330).
Ensure you have powered up the terminal or PC.
Voltage:
Risk of electric shock
Ensure the Secure Router 2330/4134 is properly grounded. For information about groundingthe Secure Router 4134, seeAvaya Secure Router 4134 Installation Chassis(NN47263-300). For information about grounding the Secure Router 2330, see AvayaSecure Router 2330 Installation Chassis(NN47263-304).
Important:
When powering up for the first time, Avaya recommends that you use a direct consoleconnection to the Secure Router 2330/4134. After you have completed the initialconfiguration, you can use a remote connection for router management.
Procedure steps (AC power)
1. Connect power cables for AC power supplies.
On the Secure Router 2330, no power switch exists, and so the router begins topower up as soon as the power cable is connected.
2. On the Secure Router 4134, turn on one power switch at a time (if you installed twoAC power supplies). Power switches are on the rear panel of the Secure Router4134. The fans start immediately, and the LEDs cycle.
Powering up the Secure Router 2330/4134
Commissioning October 2010 19
7/24/2019 NN47263-302_04.01_Commissioning
20/56
3. Verify that diagnostic testing is underway by observing the startup messages onyour local terminal.
4. Once the router completes the self-diagnostics tests, verify that the System LEDand, on the Secure Router 4134, the power LEDs that correspond to the powersupplies installed on your router (PS0 and PS1) are green.
5. Verify that the fan LED on the rear panel of the Secure Router 2330/4134 is green,and air is flowing through the unit.
Procedure steps (DC power on Secure Router 4134)
1. Connect power cables for DC power supplies.
2. Turn on the DC power source. The fans start immediately, and the LEDs cycle.
3. Verify that diagnostic testing is underway by observing the startup messages onyour local terminal.
4. Once the router completes the self-diagnostics tests, verify that the System LEDand the power LEDs that correspond to the power supplies installed on your router(PS0 and PS1) are green.
5. Verify that the fan LED on the rear panel of the Secure Router 4134 is green, andair is flowing through the unit.
For troubleshooting information, seeAvaya Secure Router 2330/4134 Troubleshooting(NN47263-700).
When the Secure Router 2330/4134 begins powering up, the boot sequence displaysmessages on the terminal or PC that you connected to the console port. A prompt displays atthe beginning of the boot sequence indicating that you can stop the auto-boot sequence bypressing any key. The Secure Router 2330/4134 waits for 5 seconds for input from you beforebeginning the boot sequence. If you press a key and stop the auto-boot sequence, the Secure
Commissioning the Avaya Secure Router 2330/4134
20 Commissioning October 2010
7/24/2019 NN47263-302_04.01_Commissioning
21/56
Router 2330/4134 displays the bootrom command menu. The following figure shows theprompt to stop the auto-boot sequence and enter the bootrom command area.
Figure 7: Accessing the bootrom command menu
If you accidentally enter the bootrom command menu, you can exit that command menu andrestart the normal boot sequence by pressing @ on your keyboard.
For detailed information on using the bootrom command menu, seeAvaya Secure Router2330/4134 Troubleshooting(NN47263-700).
Logging in to the Secure Router 2330/4134
The first time you log on to the Secure Router 2330/4134 CLI, you perform initial configurationsuch as the following:
Configure the IP address for the management port.
Configure the next-hop (gateway IP address).
Enable remote access.
Use the procedure in this section to log on to the Secure Router 2330/4134 for the first time.
Prerequisites
You have securely mounted the Secure Router 2330/4134 in an equipment rack.
You have connected a local terminal to the console port of the Secure Router 2330/4134.
You have powered up the Secure Router 2330/4134.
The boot sequence is complete.
Logging in to the Secure Router 2330/4134
Commissioning October 2010 21
7/24/2019 NN47263-302_04.01_Commissioning
22/56
Procedure steps
To log on to the Secure Router 2330/4134 CLI for the first time, enter the default username and password: login: admin password: setup
Defining boot parameters
You can configure boot parameters for the Secure Router 2330/4134, if necessary. Youconfigure boot parameters only if you are having issues to boot the router. For example, youcan change the device from which the router boots (that is, the device that has the softwareimage) if you want to try to boot the device from a software image on an FTP server in thenetwork.
The boot parameters are relevant to the boot process only. Any network addressing that youconfigure for boot parameters is independent of the normal IP addresses that the router uses inruntime. The addresses you configure in the boot parameters can be the same as or different
from the IP addresses you configure for normal operation. After the Secure Router 2330/4134boots, the router no longer uses the information in the boot parameters, but rather the routeruses what you have configured in the system.cfg file.
The Secure Router 2330/4134 provides two bootrom images for redundancy:
normal bootromthe default boot image saved in the normal boot area, and used as yourworking bootrom image
golden bootromthe backup boot image saved in the golden boot area, and used if thenormal bootrom image is corrupted
For more information about troubleshooting the Secure Router 2330/4134, seeAvaya SecureRouter 2330/4134 Troubleshooting(NN47263-700).
Procedure steps
1. To access configuration mode, enter:
configure terminal
2. To define the boot parameters, enter:
boot_params
Example of defining boot parameters
1. Access configuration mode:
configure terminal2. Define boot parameters:
boot_params
The router returns the following:
WARNING : Configuration changes not yet saved!
Commissioning the Avaya Secure Router 2330/4134
22 Commissioning October 2010
7/24/2019 NN47263-302_04.01_Commissioning
23/56
3. When prompted, enter the name of the device from which you prefer the routerboots:
Boot dev [ftp,cf0,cf1,usb0]: cf0
4. Enter the boot file name (the router provides this information if you have previouslyconfigured it):
Boot file name:SR4134.Z
5. Enter the name of the server you use to download the software image (the routerprovides this information if you have previously configured it):
Server name:sunserver
6. Enter the server IP address (the router provides this information if you havepreviously configured it):
Server IP address:10.10.11.12
7. Enter the router IP address (the router provides this information if you havepreviously configured it):
My IP address: 10.10.13.14
8. Enter the subnet mask (the router provides this information if you have previouslyconfigured it):
My subnet mask: 255.255.255.0
9. Enter the gateway IP address (the router provides this information if you havepreviously configured it):
Gateway IP address: 10.10.15.16
10. Enter your user name and password:
User name: kevx
Password: kevx
11. Enter 0 to disable or 1 to enable the checksum feature:
Checksum enable [0:Disable,1:Enable]: 1
12. Enter 0 to disable or 1 to enable the display of the image header contents:
Show header enable [0:Disable,1:Enable]: 1
13. Enter the number (0, 1, or 2) that corresponds to the type of bootrom image updatethat you prefer, or enter 3 if you prefer to not update the bootrom image:
Save bootrom image [0:AutoUpdate,1:NormalBTupd,2:GoldenBTupd,3:NoUpd]: 0
If you select 0, 1, or 2, the router returns the following:
Defining boot parameters
Commissioning October 2010 23
7/24/2019 NN47263-302_04.01_Commissioning
24/56
BOOT PARAMETERS HAVE BEEN SAVED.
14. Reboot the Secure Router 2330/4134 to activate changes, or continue with yourconfiguration:
DO YOU WANT TO REBOOT: (Y/N) ? y
Viewing boot parameters and software image information
Use the procedures in this section to view the boot parameters configuration and to display
information for the normal and golden bootrom images.
Procedure steps
1. To view the boot parameters configuration, enter:
show boot_params
2. 2. To view the current software version information, enter:
show version
Enabling the management LAN port
Enable a management Local Area Network (LAN) port on the Secure Router 4134 for networkmanagement access. To enable the management port, you assign it an IP address.
The Secure Router 2330 does not support a dedicated management LAN port. You can useone of the front panel Ethernet ports as a management LAN port.
Important:
The Secure Router 4134 management Ethernet interface (FE 0/0) on the rear panel doesnot support jumbo frames. Therefore, the management port Maximum Transmission Unit(MTU) can be configured with a value in the range of 64 to 1500 bytes.
Important:
The Secure Router 4134 management Ethernet interface (FE 0/0) does not support routingor multicast.
Important:The Secure Router 4134 management Ethernet interface (FE 0/0) is disabled after boot ifa voice card is installed in the chassis. You can use one of the front panel Ethernet portsas a management LAN port.
The following figure shows the location of the management port on the rear panel of the SecureRouter 4134.
Commissioning the Avaya Secure Router 2330/4134
24 Commissioning October 2010
7/24/2019 NN47263-302_04.01_Commissioning
25/56
Figure 8: Management port on the rear panel of the Secure Router 4134
Prerequisites
You must be connected to the Secure Router 2330/4134 through the console port. See
Connecting a terminal for local accesson page 17 for information about connecting aterminal to the console port.
You must log in as a user with sufficient permissions to configure the Secure Router2330/4134.
You must have the IP address and netmask that you want to assign to the managementport.
The following procedure uses Ethernet port 0/0 (on the rear of the Secure Router 4134) for themanagement port. You can also use port 0/1 or port 0/2 on the front panel of the Secure Router4134 for management purposes. Ethernet port 0/0 is a 10/100 Base-T port. Ethernet ports 0/1and 0/2 are 10/100/1000 Base-T ports.
On the Secure Router 2330, you can use one of the front panel Ethernet ports as amanagement port.
Procedure steps
1. To access configuration mode, enter:
Enabling the management LAN port
Commissioning October 2010 25
7/24/2019 NN47263-302_04.01_Commissioning
26/56
configure terminal
2. To identify the management port for configuration, enter:
interface ethernet 0/0
3. To configure the management port IP address, enter:
ip address
4. To configure the speed and mode of the port, enter:
speed mode
Table 2: Variable definitions
Variable Value
The speed of the interface. Enter autofor auto-negotiation. Note that Ethernet port 0/0 is a 10/100
Base-T port.
The port mode. The default value is half_duplex.
The IP address that you assign to the management
port. For example, 10.11.12.13.
The network mask that you assign to the management
port IP address. For example, 255.255.255.0.
Disabling the USB port on the Secure Router 4134
To provide additional security on the router, you can optionally disable the rear-panel USB port.
The Secure Router 2330 does not support a USB port.
Important:
The system configuration must be stored to retain this setting over system reboots.
Procedure steps
1. To access configuration mode, enter:
configure terminal
2. To disable the USB port, enter:
no usb enable
3. To display the status of the USB port, enter:
show usb_userstat
4. To re-enable the USB port, as required, enter:
Commissioning the Avaya Secure Router 2330/4134
26 Commissioning October 2010
7/24/2019 NN47263-302_04.01_Commissioning
27/56
usb enable
Configuring SSH
You can enable an SSH connection for remote access. To generate a key and enable SSH,
use the procedures in this section.
Procedure steps
1. To access configuration mode, enter:
configure terminal
2. To access the SSH key generation subtree, enter:
ssh_keygen
3. To generate the DSA key, enter:
generate dsa
4. To generate the RSA key, enter:
generate rsa
5. To exit the SSH key generation subtree, enter:
exit
6. To enable the SSH connection, enter:
ssh_server enable
7. To save the configuration, enter:
save local
Enabling FTP, TFTP, and Telnet
The default configuration for the Secure Router 2330/4134 includes FTP, TFTP, and Telnetservers disabled. You can enable any and all of these servers to allow this type of access tothe Secure Router 2330/4134.
Prerequisites
You must assign an IP address to the Secure Router 2330/4134.
Procedure steps
1. To access configuration mode, enter:
Configuring SSH
Commissioning October 2010 27
7/24/2019 NN47263-302_04.01_Commissioning
28/56
configure terminal
2. To enable the FTP service, enter:
ftp_server
3. To enable the TFTP service, enter:
tftp_server
4. To enable the Telnet service, enter:
telnet_server
Configuring FTP users
Procedure steps
1. To access configuration mode, enter:configure terminal
2. To configure an FTP user, enter a user name:
ftp_user
The default ftp user name is admin.
3. At the prompt, enter a password for the FTP user:
Please enter new password:
The default ftp user password is admin.
4. At the prompt, re-enter the password:
Please re-enter password:
If you entered the password correctly, the Secure Router returns a messageindicating a successful configuration:
password is set
5. To verify the current ftp server configuration, enter:
show ftp
Job aid: sample output
The following figure shows sample output for theshow ftp
command.
Commissioning the Avaya Secure Router 2330/4134
28 Commissioning October 2010
7/24/2019 NN47263-302_04.01_Commissioning
29/56
7/24/2019 NN47263-302_04.01_Commissioning
30/56
show telnet
Clearing a Telnet session
You can disconnect a specific Telnet session, if necessary, or you can disconnect all Telnet
sessions simultaneously.
Procedure steps
1. To view the list of users currently connected using a Telnet session to find the Telnetsession sequence numbers, enter: show usersThe following figure shows anexample of the Telnet session sequence numbers for users remotely connected tothe router.
2. To clear a specific Telnet session, enter: clear telnet_session
Table 3: Variable definitions
Variable Value The Telnet session sequence number. Enter
a value from 1 to 16.
To quickly disconnect all Telnet sessions, use the command: clear telnet_sessions
Configuring the Telnet banner
You can customize the banner that appears when users access the router using Telnet
services. When configuring the Telnet banner, use \nto begin a new line.
With Release 10.2 and later, you no longer need to use quotes ("") as a delimiter for the banner
text.
Commissioning the Avaya Secure Router 2330/4134
30 Commissioning October 2010
7/24/2019 NN47263-302_04.01_Commissioning
31/56
Procedure steps
1. To access configuration mode, enter:
configure terminal
2. To configure the Telnet banner, enter:
telnet_banner banner [banner1] [banner2]
Table 4: Variable definitions
Variable Value
[banner1] An optional parameter that you use to extend
the banner text. If you require the banner text
be more than 255 characters in length, use
banner1 to continue thebanner text.
[banner2] An optional parameter that you use to extend
the banner text.
The banner text that you want to appear in
Telnet sessions. The banner text can be up
to 255 characters in length. Use \nto begina new line within the banner.
Configuring the Telnet timeout
You can configure the timeout value for Telnet sessions. A Telnet session disconnects if itremains inactive for the configured session duration.
Procedure steps
1. To access configuration mode, enter:
configure terminal
2. To configure the Telnet timeout value, enter:
telnet_timeout
Table 5: Variable definitions
Variable Value
Enter the time in seconds (from 0 to 3600)
after which inactive Telnet sessions
automatically disconnect. The default value
is 900 seconds. If you enter a value of 0
Configuring the Telnet timeout
Commissioning October 2010 31
7/24/2019 NN47263-302_04.01_Commissioning
32/56
Variable Value
seconds, inactive Telnet sessions do not
automatically disconnect.
Configuring the host name
Configure a host name for the Secure Router 2330/4134 to uniquely identify it. Once assigned,
the host name becomes the CLI prompt name.
Important:
Changing the host name later (that is, post commissioning), and committing this change,drops all Telnet and SSH connections. All active console sessions also end.
Procedure steps
1. To access configuration mode, enter:
configure terminal
2. To configure the host name for the Secure Router 2330/4134, enter:
hostname
Table 6: Variable definitions
Variable Value
The name you want to assign to the Secure
Router 2330/4134.
Configuring the static default route
Configure a static route to specify a preferred route to a destination. You can identify the
gateway, or next-hop, for a static route by specifying one of the following:
IP address of a directly connected interface
name of a local interface such as ethernet0/0
Procedure steps
1. To access configuration mode, enter:
configure terminal
2. To configure the gateway route, enter:
Commissioning the Avaya Secure Router 2330/4134
32 Commissioning October 2010
7/24/2019 NN47263-302_04.01_Commissioning
33/56
ip route
Table 7: Variable definitions
Variable Value
The IP address and the subnet mask of the
destination network. For example,11.12.13.14/24. Entering the subnet mask is
optional.
The IP address or interface name of the
gateway. For example, 10.11.12.16.
Verifying the next-hop connection
Use the procedure in this section to verify that the connection from the management interfacesuccessfully connects to the next-hop device.
Prerequisites
You must have the IP address of the next-hop device.
Procedure steps
To ping the next-hop device, enter:
ping
Configuring the date
To configure the date, you enter the month, day, and year.
Procedure steps
1. To access configuration mode, enter:
configure terminal
2. To configure the date, enter:
date
Verifying the next-hop connection
Commissioning October 2010 33
7/24/2019 NN47263-302_04.01_Commissioning
34/56
Table 8: Variable definitions
Variable Value
The current day in relation to the month.
Enter a value from 1 to 31.
The current month. Enter a value from 1 to12.
The current year. Enter a value from 2000 to
2100.
Configuring the time
To set the current time for the Secure Router 2330/4134, you specify the time in relation to
Coordinated Universal Time (UTC):
time zone offset ahead (+) or behind (-) UTC
number of hours ahead or behind UTC
number of minutes ahead or behind UTC
Procedure steps
1. To access configuration mode, enter:
configure terminal
2. To configure your local time, enter:
utc
Table 9: Variable definitions
Variable Value
The time zone offset. Enter + to indicate that
your time zone is ahead of UTC. Enter - to
indicate that your time zone is behind UTC.
For example, if you are in New York, you
enter utc -.
The number of hours that your local time is
offset from UTC. Enter a value from 0 to 23.For example, if you are in New York, you
enter utc - 4.
The number of minutes that your local time
is offset from UTC. Enter a value from 0 to
Commissioning the Avaya Secure Router 2330/4134
34 Commissioning October 2010
7/24/2019 NN47263-302_04.01_Commissioning
35/56
Variable Value
59. For example, if you are in New York, you
enter utc - 4 0.
Configuring multiple SNTP servers
The Secure Router 2330/4134 supports the Multiple Simple Network Time Protocol (SNTP)
Server feature. SNTP is a simple form of the Network Time Protocol (NTP), which is an internet
protocol used for synchronization of computer clocks.
The Multiple SNTP Server feature provides support for up to 10 SNTP servers. Multiple servers
provide redundant backup for synchronizing time on the Secure Router. During configuration,
servers can be specified by hostname or IP address, and a timeout value must be set for the
query. The Multiple SNTP Server features operates by having the SNTP service query
configured SNTP servers on a round-robin basis. If an SNTP server is queried and fails torespond, the router sends a request to the next configured SNTP server. The SNTP server
support is not active until the service is enabled. While the service is enabled the configuration
cannot be changed.
The show sntpcommand has been modified to display the current state of SNTP, the server it
is contacting to receive the current time, as well as all configured servers. When specifying a
server by domain name, DNS entries need to be configured before SNTP functions properly.
Use the following procedure to configure multiple SNTP servers.
Procedure steps
1. To configure multiple SNTP servers, enter Configuration Mode.
configure terminal
2. Because DNS entries must be configured for SNTP to function properly, configureprimary and secondary DNS servers.
ip pname_server ip name_server
3. To configure an SNTP server, enter the sntp sub-tree.
sntp
4. Configure the source address of the SNTP client.
source-address 5. Configure the number of retries for each SNTP server.
retries
6. Configure an NTP server.
server [timeout]
Configuring multiple SNTP servers
Commissioning October 2010 35
7/24/2019 NN47263-302_04.01_Commissioning
36/56
7. To add up to 10 SNTP servers, repeat step 6.
8. Enable the SNTP client.
enable
Table 10: Variable definitions
Variable Value
Specifies an IP address.
Specifies the number of retries the NTP server performs, in
the range 15. Default is 3.
Specifies the NTP server to use for updates.
Specifies the maximum response time, in the range 10
7200. Default is 1024.
Configuring the SNTP client
The Simple Network Time Protocol (SNTP) synchronizes the internal clocks of various network
devices across large, diverse networks to universal standard time. Use the procedure in this
section to enable the SNTP client on the Secure Router 2330/4134.
Procedure steps
1. To access configuration mode, enter:
configure terminal
2. To set the location of the SNTP server, enter:
sntp server {ipaddr|hostname}
3. To set the timeout value for the response from the server, enter:
sntp timeout
Table 11: Variable definitions
Variable Value
{ipaddr | hostname} The IP address or host name of the
broadcast server. The default value is any
broadcast server.
The timeout value in seconds. The default
timeout value is 1024 seconds.
Commissioning the Avaya Secure Router 2330/4134
36 Commissioning October 2010
7/24/2019 NN47263-302_04.01_Commissioning
37/56
Displaying the SNTP configuration
Use this procedure to display the SNTP configuration.
Procedure steps
To display the SNTP configuration, enter:
show sntp
Configuring the SNTP source address
Use the following procedure to configure the SNTP server source address for all services.
Procedure Steps
1. To configure source addresses for a service, enter Configuration Mode.
configuration terminal
2. Enter the sntpsubtree
sntp
3. Configure the source address.
source-address
Table 12: Variable definitions
Variable Value
[ip-address] Specifies the source address by IP address.
[interface-name] Specifies the source address by interface name.
Configuring daylight saving time
The daylight saving time (DST) feature allows you to configure a time offset for daylight saving.Use the procedure in this section to configure DST on the Secure Router 2330/4134.
Procedure steps
1. To access configuration mode, enter:
Displaying the SNTP configuration
Commissioning October 2010 37
7/24/2019 NN47263-302_04.01_Commissioning
38/56
configure terminal
2. To configure the DST offset, enter:
dst set
3. To enable DST, enter:
dst enable
4. To disable DST, enter:
no dst enable
5. To display the DST configuration and status, enter:
show dst
Table 13: Variable definitions
Variable Value
Specifies the location of the device.
Specifies the start hour (00 - 23), in other
words, the hour at which the DST offset time
begins.
Specifies the start minute (00 - 59)
Specifies the start week of (1
- 4)
Specifies the start day of week (0 - sunday,
6 - saturday) Specifies the start month of year (1 - 12)
Specifies the end hour (00 - 23), in other
words, the hour at which the DST offset time
ends.
Specifies the end minute (00 - 59)
Specifies the end week of (1 -
4)
Specifies the end day of week (0 - sunday,
6 - saturday)
Specifies the end month of year (1 - 12)
Specifies the number of offset hours to add
to the time at the start of DST (and remove
at the end of DST).
Commissioning the Avaya Secure Router 2330/4134
38 Commissioning October 2010
7/24/2019 NN47263-302_04.01_Commissioning
39/56
Variable Value
Specifies the number of offset minutes to add
to the time at the start of DST (and remove
at the end of DST).
Example of configuring daylight saving time
Consider the following DST scenario:
DST start: 2nd Sunday of April at 2:00 AM
DST end: 2nd Sunday of October at 2:00 AM
Offset time amount: 1:00 hours
To achieve this configuration, consider the following:
Parameter DST start: 2nd
Sunday of April at
2:00 AM
DST end: 2nd Sunday
of October at 2:00 AM
Offset time
amount: 1:00
hours
start hour 2 - -
start minute 0 - -
start week of month 2 - -
start day of week 0 - -
start month 4 - -
end hour - 2 -
end minute - 0 -
end week of month - 2 -
end day of week - 0 -
end month - 10 -
dst duration hrs - - 1
dst duration minutes - - 0
To configure DST for this example, use the following procedure.
Procedure steps
1. To enter configuration mode, enter:
configure terminal
2. To configure the DST for this example, enter:
Example of configuring daylight saving time
Commissioning October 2010 39
7/24/2019 NN47263-302_04.01_Commissioning
40/56
dst set LOCATION 2 0 2 0 4 2 0 2 0 10 1 0
3. To enable DST, enter:
dst enable
This configuration provides the following outcome:
For year 2009: DST start: SUN APR 12 02:00:00 2009 DST end: SUN OCT 11 02:00:00 2009
For year 2010: DST start: SUN APR 11 02:00:00 2010 DST end: SUN OCT 10 02:00:00 2010
Changing the admin user password
The system administrator login consists of two components: the account name and the
password. The initial login name is always "admin". You can change this after logging in for
the first time. The default administrative password is "setup". Avaya recommends you change
the default password as soon as possible to ensure only authorized personnel can access theSecure Router 2330/4134.
Procedure steps
1. To access password configuration mode, enter:
password
The Secure Router 2330/4134 prompts you for the current user name.
2. Enter the default user name, which is the current user name:
admin
The Secure Router 2330/4134 prompts you for the old password.
3. Enter the default password, which is the current password:
setup
The Secure Router 2330/4134 prompts you for the new password.
4. Enter your new password. The Secure Router 2330/4134 prompts you to verify thenew password.
5. Re-enter your new password. A message appears that confirms that the passwordis changed.
Commissioning the Avaya Secure Router 2330/4134
40 Commissioning October 2010
7/24/2019 NN47263-302_04.01_Commissioning
41/56
Changing the administrator account name
Use the procedure in this section to change the administrator login name (Level 1 access) to
a user-specified name. The default login name for the Secure Router 2330/4134 is "admin".
The administrator login name can be from 3 to 39 characters in length.
Procedure steps
1. To access configuration mode, enter:
configure terminal
2. To change the login name, enter:
admin_name
The Secure Router 2330/4134 displays a message that confirms the login name is
successfully changed.
Adding users
You can identify users (that is, login names) who can access the Secure Router 2330/4134,and assign each user an access privilege (levels 24). Only the system administrator (level 1access) can add, modify, or remove this information from the system.
Procedure steps
1. To access configuration mode, enter:
configure terminal
2. Enter the user name and access level:
user level
The Secure Router 2330/4134 prompts you to enter a password for this user.
3. Enter a password (from 0 to 10 characters) for the new user. The Secure Router2330/4134 prompts you to re-enter the password.
4. Re-enter the password for the new user. The Secure Router 2330/4134 confirmsthat the password is set and confirms the name of the new user is added.
Changing the administrator account name
Commissioning October 2010 41
7/24/2019 NN47263-302_04.01_Commissioning
42/56
Table 14: Variable definitions
Variable Value
The user name you want to add to the Secure
Router 2330/4134. The user name can
contain up to 39 characters.
The access level assigned to the user.
Values are 24. The lower the access level
value, the higher the access privileges. For
example, a user with an access level of 2 has
more privileges than a user with an access
level 3 or 4.
Procedure job aid
The CLI supports four levels of privilege for users. The following table defines each level.
Table 15: CLI user access levels
Privilege level Privilege name Definition
1 (highest) PRIVILEGE_ADMIN Admin level can access any
command and configure any
feature in the router,
including user configuration
and administration.
2 PRIVILEGE_CONFIGURE Configure level can configure
any feature. Cannot add or
delete users.
3 PRIVILEGE_TEST Test level can only run
diagnostic tests. Cannotaccess configuration
commands.
4 (lowest) PRIVILEGE_NORMAL Normal level can only enter
showor displaycommands.
Removing users
The system administrator can remove configured user names from the Secure Router
2330/4134.
Important:
To reset a user password, you must delete and then recreate the user account.
Commissioning the Avaya Secure Router 2330/4134
42 Commissioning October 2010
7/24/2019 NN47263-302_04.01_Commissioning
43/56
Procedure steps
1. To access configuration mode, enter:
configure terminal
2. To remove a user, enter:
no user
Pinging a device
Ping a device to verify the connection between the Secure Router 2330/4134 and that networkdevice. If the network device sends a ping reply, a message indicates that the specified IPaddress is alive and can communicate with the router. If the router does not receive a reply,the message indicates that the address is not responding.
Prerequisites
You must physically connect the Secure Router 2330/4134 to the network.
You must physically connect the specific network device to the network.
Procedure steps
Ping the network device:
ping
Saving a configuration
Issue the save command to save the running configuration to a file. You can save the
configuration to the local file system, or to a file on the network.
Procedure steps
1. To save the configuration to the local file system, enter:
save local [file ]
2. To save the configuration to a network file, enter:
save network
Table 16: Variable definitions
Variable Value
[file ] The name of the file to which the
configuration is saved. This is an optional
Pinging a device
Commissioning October 2010 43
7/24/2019 NN47263-302_04.01_Commissioning
44/56
Variable Value
parameter. The configuration is saved to the
system default file (system.cfg) if you do not
specify a filename.
The IP address of the device on which you
store the network configuration file.
The full path of the remote configuration file.
Deleting a configuration file
Delete the .cfg file to remove a configuration file from the flash. Use this command with caution
as it can delete all current configurations from the router. If you do not specify a filename, the
command deletes the system.cfg file by default.
Procedure steps
1. To delete the current configuration file, enter:
clear cfg_file []
A prompt appears asking you to confirm the operation.
2. Enter yto delete, or nto cancel the operation.
Table 17: Variable definitions
Variable Value
[] The name of the file to delete. This is anoptional parameter. if You do not specify a
filename, the router deletes the system
default file (system.cfg).
Rebooting or resetting the Secure Router 2330/4134
Reset and reboot the Secure Router 2330/4134 properly to avoid file system corruption.Resetting the router returns it to a factory-default configuration. Rebooting the router shutsdown and restarts the system. The procedure in this section shows you how to reset theconfiguration on the Secure Router 2330/4134, reboot the router to restore the factory-default settings, and save the factory-default settings to the configuration file.
Commissioning the Avaya Secure Router 2330/4134
44 Commissioning October 2010
7/24/2019 NN47263-302_04.01_Commissioning
45/56
Important:
If you have the Mediation Server Module installed on the SR4134, there is a 2-minute delayafter you issue the rebootcommand while the router waits for the module to shut down.The chassis reboots automatically when the Mediation Server Module completes shutdown.
Procedure steps
1. To access configuration mode, enter:
configure terminal
2. To reset the Secure Router 2330/4134, enter:
system reset-to-factory {system|users}
3. To exit configuration mode, enter:
exit
4. To reboot the Secure Router 2330/4134, enter:
reboot
Issue the rebootcommand from the CLI root.
5. When the Secure Router 2330/4134 completes the reboot, save the factory-default settings to the system.cfg file by entering:
save local
Table 18: Variable definitions
Variable Value
{system | users} Enter systemto remove all informationstored in memory, which includes user
information, event logs, crash logs,
command logs, and boot parameters.
Enter usersto remove all users andinformation related to users.
Powering down the Secure Router 2330/4134
Use the procedure in this section if you must power down the Secure Router 2330/4134. For
example, Avaya strongly recommends that you power down the router to install an interfacemodule in a slot in which that module has not previously been installed. You must also powerdown the Secure Router 4134 before opening the service access panel on the rear of therouter, or when removing the cover from the Secure Router 2330.
Powering down the Secure Router 2330/4134
Commissioning October 2010 45
7/24/2019 NN47263-302_04.01_Commissioning
46/56
Prerequisites
Ensure you have backed up your system configuration. Use the save localcommand tosave your configuration.
Procedure steps
1. To shut down the system, enter:
reboot
If you have the Mediation Server Module installed on the SR4134, there is a 2-minute delay after you issue the rebootcommand while the router waits for themodule to shut down. The chassis reboots automatically when the Mediation ServerModule completes shutdown.
2. When the system restarts (you will see memory tests begin on your console), powerdown the Secure Router 4134 by putting the power switch (or power switches if youhave more than one power supply installed) in the "off" position. To power down theSecure Router 2330, disconnect the power cord.
Viewing the Secure Router 2330/4134 configuration
View the Secure Router 2330/4134 configuration to understand the current state of the system
software.
For more information about using commands, seeAvaya Secure Router 2330/4134 Using
the Command Line Interface(NN47263-506). For a complete list of CLI commands, seeAvaya
Secure Router 2330/4134 Command Line Reference(NN47263-507).
Procedure steps
1. To view the current configuration, enter:
show configuration running
You can also enter show running-configto view the current configuration.
2. To view the configuration that is stored in Flash, enter:
show configuration stored
You can also enter show startup-configto view the stored configuration.
Viewing chassis status
Use the procedure in this section to view summary information about the Secure Router
2330/4134 chassis, including its operational status. After you install interface modules, you
Commissioning the Avaya Secure Router 2330/4134
46 Commissioning October 2010
7/24/2019 NN47263-302_04.01_Commissioning
47/56
can use the show chassiscommand to verify that the Secure Router 2330/4134 recognizes
the modules.
Procedure steps
To view summary information about the Secure Router 2330/4134, enter:
show chassis
Viewing interface module configuration
Use the procedure in this section to quickly check the state and configuration of installed
interface modules.
Procedure steps
1. To view the configuration of interface modules installed in your Secure Router2330/4134, enter:
show module configuration all
2. To view the configuration of individual interface modules, enter:
show module configuration [t1|e1|ct3| serial|hssi|t3]
Checking the system for alarms
The Secure Router 2330/4134 reports alarms when it detects irregular conditions in incoming
signals to the interface modules. Use the show module alarmscommand to quickly check
for any irregularities.
Procedure steps
1. To view the current alarms for any T1 WAN link on the Secure Router 2330/4134,enter:
show module alarms t1
2. To view the current alarms for any E1 port on the Secure Router 2330/4134, enter:
show module alarms e1
3. To view the current alarms for any CT3 port on the Secure Router 4134, enter:
show module alarms ct3
4. To view the current alarms for any serial port on the Secure Router 2330/4134,enter:
Viewing interface module configuration
Commissioning October 2010 47
7/24/2019 NN47263-302_04.01_Commissioning
48/56
show module alarms serial
5. To view the current alarms for any HSSI port on the Secure Router 4134, enter:
show module alarms hssi
6. To view the current alarms for any T3 port on the Secure Router 4134, enter:
show module alarms t3
Checking the system status
You can view the operating status and current configuration of each WAN, Ethernet, or serial
interface using theshow module configurationcommand. Refer toAvaya Secure Router
2330/4134 Command Line Reference(NN47263-507) for a complete list of CLI commands
for the Secure Router 2330/4134.
Procedure steps
View the operating status of all installed interface modules:
show module configuration all
Configuring reverse Telnet on the Secure Router 4134
Reverse Telnet gives you the ability to Telnet to a device, and then use a console connection
to connect to another device from there. For example, you can Telnet to a router, and then
connect into a switch, modem, or any other device that has a console port. There are manydevices that do not have remote access built into them, and the only access option for these
devices is a console session. With reverse Telnet, you can remotely manage these type of
devices through the Secure Router 4134.
The Secure Router 2330 does not have an AUX port and therefore cannot support reverse
Telnet.
1. Connect a straight-through cable from the console port of the console-only device
to the AUX port on the Secure Router 4134.
2. In the CLI, to enter configuration mode, enter:
configure termainal
3. To specify reverse Telnet configuration, enter:
reverse_telnet
The following steps allow you to configure the AUX port of the Secure Router 4134
with the proper settings for the console connection to the remote device.
Commissioning the Avaya Secure Router 2330/4134
48 Commissioning October 2010
7/24/2019 NN47263-302_04.01_Commissioning
49/56
4. To configure the baud rate, enter:
set_baud_rate
5. To configure the data bits, enter:
set_data_bits
6. To configure the flow control, enter:
set_flow_control
7. To configure the parity, enter:
set_parity
8. To configure the stop bits, enter:
set_stop_bits
9. To configure the revers telnet port, enter:
telnet_port 10. To configure the timeout, enter:
telnet_timeout
11. To enable reverse Telnet, enter:
[no] enable
Table 19: Variable definitions
Variable Value
Sets the speed of the AUX port. Range is 50 -
115200 (default 9600).
Configures the data bits on the AUX port.
Configures flow control on the AUX port.
Range: 0-none, 1-software, 2-hardware
(default: 0).
Sets parity of the AUX port. Range: 0-none,
1-odd, 2-even (default: no parity).
Configures the number of stop bits on the
AUX port. Range: 1 - 2 (default 1).
Specifies the Telnet port which reverse
Telnet listens on to establish the remoteconsole though the AUX port. Range :2000 -
65535 (default 2001).
Specifies the timeout for the reverse telnet
session in seconds. Range: 0 ( disable
timeout) - 7200 (default 600).
Configuring reverse Telnet on the Secure Router 4134
Commissioning October 2010 49
7/24/2019 NN47263-302_04.01_Commissioning
50/56
Variable Value
[no] enable Activates the reverse Telnet functionality on
the router. The no option deactivates reverse
Telnet.
Copying an external compact flash or a USB drive file
Use this procedure to copy a file to or from an external compact flash drive or a USB drive.
Procedure steps
1. Insert a compact flash drive or USB drive into the router.
2. To copy a file, enter:
file copy Table 20: Variable definitions
Variable Value
Specifies the source file name.
Specifies the destination file name.
Downloading a network file to a compact flash or a USBdrive
Use this procedure to download a file from the network to an internal or external compact flash
drive or a USB drive.
Procedure steps
1. Insert a compact flash drive or USB drive into the router.
2. To copy a file, enter:
file download
[interface ] [id ] [passwd] [mode {image | file}] [source-address]
Commissioning the Avaya Secure Router 2330/4134
50 Commissioning October 2010
7/24/2019 NN47263-302_04.01_Commissioning
51/56
Table 21: Variable definitions
Variable Value
Specifies the name of the destination file.
Specifies the host IPv4 or IPv6 address.
[id ] Specifies the user ID.
[interface ] Specifies the outgoing interface. For example,
ethernet0/2.
[mode {image | file}] Specifies the file download mode. Options are image or file.
The default is file.
If you are downloading a Secure Router image, be sure to
set the mode to image.
[passwd ] Specifies the user password.
[source-address
]
Specifies the source IP address.
Specifies the source file name in the format .
Formatting the external compact flash file system
Use this procedure to format the USB drive for the FAT 16 or FAT 32 file system.
Procedure steps
1. Insert a compact flash drive into the router.
2. To format the compact flash drive, enter:
format |
The following message is displayed:
WARNING :Do not remove the Compact Flash during this processDo not reboot this device during this process
COMPACT FLASH FORMAT: Are you sure ? (y/n) :
3. To approve the formatting, enter:
y
The following message is displayed:
Erasing Compact Flash Blocks. Please wait tillcompletedCompact flash formatting completed
Formatting the external compact flash file system
Commissioning October 2010 51
7/24/2019 NN47263-302_04.01_Commissioning
52/56
Table 22: Variable definitions
Variable Value
Specifies the FAT 16 file system.
Specifies the FAT 32 file system.
Formatting the USB drive file system
Use this procedure to format the USB drive for the FAT 16 or FAT 32 file system.
Procedure steps
1. Insert a USB drive into the router.
2. To format the USB drive, enter:
format /usb0 |
The following message is displayed:
WARNING :Do not remove the Compact Flash during this processDo not reboot this device during this process
COMPACT FLASH FORMAT: Are you sure ? (y/n) :
3. To approve the formatting, enter:
y
Table 23: Variable definitions
Variable Value
Specifies the FAT 16 file system.
Specifies the FAT 32 file system.
Listing files on a compact flash drive or USB drive
Use this procedure to list the files stored on a compact flash drive or USB drive.Procedure steps
1. Insert a compact flash drive or USB drive into the router.
2. To list stored files, enter:
Commissioning the Avaya Secure Router 2330/4134
52 Commissioning October 2010
7/24/2019 NN47263-302_04.01_Commissioning
53/56
file ls [file_system ]
Table 24: Variable definitions
Variable Value
[file_system ] Specifies a specific file system from which to
list stored files.
Listing image version files from a compact flash drive or
USB drive
Use this procedure to list versions of the image files from a compact flash drive or USB drive.
Procedure steps
1. Insert a compact flash drive or USB drive into the router.
2. To list stored files, enter:
file version [file_name ]
Table 25: Variable definitions
Variable Value
[file_name ] Specifies a specific device from which to list
the image version files.
Removing a file from a compact flash drive or USB drive
Use this procedure to remove a file stored on a compact flash drive or USB drive.
Procedure steps
1. Insert a compact flash drive or USB drive into the router.
2. To list stored files, enter:
file rm Table 26: Variable definitions
Variable Value
Specifies the path and name of the file to
remove.
Listing image version files from a compact flash drive or USB drive
Commissioning October 2010 53
7/24/2019 NN47263-302_04.01_Commissioning
54/56
Renaming a file on a compact flash drive or USB drive
Use the following procedure to rename a file stored on a compact flash drive or USB drive.
Procedure Steps
1. Insert a compact flash drive or USB drive into the router.
2. To list stored files, enter:
file rename
Table 27: Variable definitions
Variable Value
Specifies the file to be renamed.
[interface-name] Specifies the new name for the file.
Uploading files from a compact flash drive or USB drive
Use this procedure to upload files to the Secure Router from a compact flash drive or USB drive.
Procedure steps
1. Insert a compact flash drive or USB drive into the router.
2. To list stored files, enter:
file upload
Table 28: Variable definitions
Variable Value
Specifies the destination file name,
expressed in the directory path/filename
format.
Specifies the host IPv4 or IPv6 address. Specifies the source filename, expressed in
the device/filename format.
Commissioning the Avaya Secure Router 2330/4134
54 Commissioning October 2010
7/24/2019 NN47263-302_04.01_Commissioning
55/56
Uploading the event log from the Secure Router 2330/4134
Use this procedure to upload the event log from the Secure Router to the network.
Procedure steps
1. Insert a compact flash drive or USB drive into the router.
2. To list stored files, enter:
file upload_event_log
Table 29: Variable definitions
Variable Value
Specifies the IPv4 or IPv6 address the file isto be uploaded to.
Specifies the name of remote filename to
apply to the event log.
Specifies the source IP address.
Uploading the event log from the Secure Router 2330/4134
Commissioning October 2010 55
7/24/2019 NN47263-302_04.01_Commissioning
56/56
Commissioning the Avaya Secure Router 2330/4134