26
encor en ! etworks TM For information on trademarks, safety, limitations of liability, and similar topics, see Notices. Loading Software into a BANDIT™ Product our BANDIT™ device has been shipped with the latest version of the Encore Legacy-to-IP Operating System™ (ELIOS™) software installed. However, when the ELIOS™ software is revised, you will want to load the revised software into your BANDIT. Note: When you upgrade the ELIOS software, the upgrade reloads the BANDIT’s saved configuration. Make sure you have saved the current configuration before you load new software. See Saving (Writing) a Configuration. Caution: If you have replaced hardware in this device, make sure you have also reconfigured the device’s software to reflect the hardware change. Also be sure to save (Write) that new configuration before loading a software upgrade. You must do all of this before updating the software. If you upgrade software before reconfiguring for any hardware changes, the software upgrade may not perform optimally. The following overview outlines the process for loading application software: 1 A BANDIT device has two code regions for application software. One region is active at a time. Before you load new software, check to see which region of the BANDIT code is active. See Section D.1, Determining the Active Code Region for Application Software. 2 You can load updated ELIOS™ software into the BANDIT in the following ways: Option A: You can download the software from the control terminal (through the Supervisory Port). See Section D.2, Downloading BANDIT Application Software from the Control Terminal (via Flash). Option B: You can download the software from the network (through the LAN port). See Section D.3, Downloading BANDIT Application Software from the Network (via TFTP). 3 After you have downloaded the new application software (and, if you updated via Option B, after you have saved the new software configuration and have reset the BANDIT), you must make the new software the primary code region and you must make it the active code region. See Section D.4, Making the New Application Software Primary and Active. Y ! Home Module: Software Configuration Document D Version A.1, March 2008 Copyright 2008 Encore Networks, Inc. All rights reserved.

Software Configuration: Loading Software into a BANDIT? Product

Embed Size (px)

DESCRIPTION

 

Citation preview

Page 1: Software Configuration: Loading Software into a BANDIT? Product

encore n!• etworksTM

Version A.1, March 2008

Copyright 2008 Encore Networks, Inc.All rights reserved.

Loading Software into a BANDIT™ Product

our BANDIT™ device has been shipped with the latest version of the Encore Legacy-to-IP Operating System™ (ELIOS™) software installed. However, when the ELIOS™ software is revised, you will want to load the revised software into your BANDIT.

Note: When you upgrade the ELIOS software, the upgrade reloads the BANDIT’s saved configuration. Make sure you have saved the current configuration before you load new software. See Saving (Writing) a Configuration.

Caution: If you have replaced hardware in this device, make sure you have also reconfigured the device’s software to reflect the hardware change. Also be sure to save (Write) that new configuration before loading a software upgrade. You must do all of this before updating the software.

If you upgrade software before reconfiguring for any hardware changes, the software upgrade may not perform optimally.

The following overview outlines the process for loading application software:

1 A BANDIT device has two code regions for application software. One region is active at a time. Before you load new software, check to see which region of the BANDIT code is active. See Section D.1, Determining the Active Code Region for Application Software.

2 You can load updated ELIOS™ software into the BANDIT in the following ways:

Option A: You can download the software from the control terminal (through the Supervisory Port). See Section D.2, Downloading BANDIT Application Software from the Control Terminal (via Flash).

Option B: You can download the software from the network (through the LAN port). See Section D.3, Downloading BANDIT Application Software from the Network (via TFTP).

3 After you have downloaded the new application software (and, if you updated via Option B, after you have saved the new software configuration and have reset the BANDIT), you must make the new software the primary code region and you must make it the active code region. See Section D.4, Making the New Application Software Primary and Active.

Y

!

For information on trademarks, safety, limitations of liability, and similar topics, see Notices.

Home Module: Software ConfigurationDocument D

Page 2: Software Configuration: Loading Software into a BANDIT? Product

D-2 Software Configuration, Document D

D.1 Determining the Active Code Region for Application Software

1 On the Main Menu, select System Administration.

❖ The system requests a password.

2 Type the administrative password and press Enter. (Default passwords are listed in Default Passwords. If your organization requested a specific password, check with your network administrator.)

❖ After you enter the correct password, you see the following message.

❖ Then the System Administration menu is displayed.

Main Menu----------1) QuickStart Config Builder

2) Typical Configurations3) Advanced Configurations4) Tools

V) View Current Unit StatusL) Load Factory DefaultsP) Load Plug and Play DefaultsW) Write ConfigurationR) Reset UnitX) eXit SessionS) StatisticsY) sYstem Administration

Enter Choice :

Enter System Admin Password:

System remembers this password until user exits or times out

Page 3: Software Configuration: Loading Software into a BANDIT? Product

Loading Software into a BANDIT™ Product D-3

3 On the System Administration menu, select Database Management.

❖ The Database Administration menu is displayed.

4 On the Database Administration menu, select Code Region Priority.

❖ The Code Region Priority menu is displayed.

5 Do all of the following:

a Note the number of the code region that is Active. We will use the variable a to represent this code region number.

Note: The BANDIT always uses the software in the Active code region.

b Also note whether the Active code region a is the Primary code region.

Note: We will load the new software into the code region that is not active. We will use the variable b to represent this code region number.

6 Because we want to load software into the inactive code region b, the active region a must also be the primary code region. Do one of the following:

System Administration----------------------1) Passwords2) SNMP Configuration3) Database Management4) Telnet Terminal5) Port Data Capture6) SNMP Triggered TRAPs

C) Copy ConfigurationN) Network DownloadV) VPN Commands7) Program RDU Flash

Enter Choice :

Database Administration------------------------1) Flash Memory Management2) BANDIT Database Management3) Code Region Priority

Enter Choice :

Code Region Priority---------------------1) Region #1 : Primary(Active)2) Region #2 : Secondary

Enter Choice :

Page 4: Software Configuration: Loading Software into a BANDIT? Product

D-4 Software Configuration, Document D

a If the Active region a is the Primary code region, go to Step 7.

b If the Active region a is not the Primary code region, select Region #a and make its priority Primary.

7 Do all of the following:

a Press Escape to return to the Database Administration menu.

b On the Database Administration menu, select Flash Memory Management.

❖ The Flash Memory Management menu is displayed.

c On the Flash Memory Management menu, select Erase Inactive Code Region.

❖ The following warning is displayed.

d Answer y.

❖ A message similar to the following is displayed. Code region b is being erased.

Note: It may take a couple of minutes to erase the region.

❖ When the erasure has finished, the Flash Memory Management menu is displayed again.

8 Press Ctrl Z once, or press Escape until you reach the Main Menu.

❖ The Main Menu is redisplayed.

Enter Region Priority (1 (Primary) or 2 (Secondary)):

Flash Memory Management------------------------1) FLASH Sector Use Report2) FLASH Memory Map Report

R) Erase Inactive Code RegionS) Erase Flash Sector

Enter Choice :

WARNING! This action will disable BANDIT functionality for at least 50 seconds.

Delete region #b. Are you sure? (Y or N):

Erasing Region #b: Sectors 72 to 127. Please wait !!

Page 5: Software Configuration: Loading Software into a BANDIT? Product

Loading Software into a BANDIT™ Product D-5

9 To save this configuration (with code region b empty), do the following:

a On the Main Menu, select Write Configuration.

❖ The Write Configuration menu is displayed.

b Select Yes.

❖ The BANDIT asks for the Write password.

Note: Default passwords are listed in Default Passwords.

c Enter the password.

❖ The configuration will be saved. When the configuration has been saved, the following message is displayed.

d Press Enter.

❖ The Main Menu is redisplayed.

10 To reset the BANDIT device to use the saved configuration, do the following:

a On the Main Menu, select Reset Unit.

❖ The Reset Unit menu is displayed.

b Select Yes.

❖ The unit resets.

Write New Configuration to Memory----------------------------------Y) YesN) No

Are You Sure? :

Enter WRITE Password:

Configuration SAVEDPress Any Key to Continue

Reset Unit-----------Y) YesN) No

Are You Sure? :

Page 6: Software Configuration: Loading Software into a BANDIT? Product

D-6 Software Configuration, Document D

❖ When the unit starts to reset, the BANDIT’s login banner is displayed.

Note: This banner displays again after the BANDIT has finished resetting.

❖ Then you will see the login prompt.

11 After you see the login prompt, press Enter.

❖ The Main Menu is displayed.

12 Do all of the following:

a Perform Step 1 through Step 5 to verify that the Active code region is now the Primary region, and that the region you erased is Unused.

b Press Escape until you reach the Main menu (or press Ctrl z once).

13 Continue to one of the following sections:

• Section D.2, Downloading BANDIT Application Software from the Control Terminal (via Flash)

• Section D.3, Downloading BANDIT Application Software from the Network (via TFTP)

Resetting this Unit, Please Wait...

***************************************************** BANDIT, ENCORE NETWORKS INC*****************************************************

Press <ENTER> to login

Code Region Priority---------------------1) Region #1 : Primary(Active)2) Region #2 : Unused

Enter Choice :

Page 7: Software Configuration: Loading Software into a BANDIT? Product

Loading Software into a BANDIT™ Product D-7

D.2 Downloading BANDIT Application Software from the Control Terminal (via Flash)

Note: Make sure you have performed the procedure in Section D.1, Determining the Active Code Region for Application Software.

1 Make sure the BANDIT device’s Supervisory port is connected to the COM port of a PC or another control terminal.

2 If a terminal-emulation session (for example, HyperTerminal) is not already open, open one. Set the communication parameters as shown in Table D-1.

3 If the BANDIT’s power is on, turn it off.

4 Turn the BANDIT’s power on. Watch for the start-up banner.

5 When you see the start-up banner, type the attention sequence.

Note: The attention sequence is Control T, then Shift 7. (Shift 7 is usually the ampersand character, &).

❖ The system goes off line.

❖ Then the system displays the firmware and hardware startup information.

Table D-1. BANDIT Communication Parameters

Parameter Setting Baud rate 9600 Data bits 8 Parity none Stop bits 1 Flow control none

BANDIT 2002, ENCORE NETWORKS, INC.*****************************************************BOOTING..., YOU MAY ENTER ATTENTION SEQUENCE FROM NOW TILL ONLINE -->

INITIALIZING EXTENDED DRAM AND SOME REGISTERSTO GO OFFLINE ENTER ATTENTION SEQUENCE...

GOING OFFLINE VIA ATTENTION SEQUENCE

Page 8: Software Configuration: Loading Software into a BANDIT? Product

D-8 Software Configuration, Document D

❖ Then the system displays the Broadband Off-Line menu.

6 Select Low Level Operations and press Enter.

❖ The system displays the BANDIT Diagnostic Low Level Operations menu, similar to the following.

7 Select Flash Application via Console and press Enter.

❖ The system prompts the user to enter the code region (1 or 2).

8 You need to load the new code into region b, the code region that you erased in Section D.1, Determining the Active Code Region for Application Software. Type b and press Enter, where b is the code region you erased.

❖ The system asks for confirmation.

****************************************************ENCORE NETWORKS. RELEASE DATE 2002/09/24FIRMWARE VERSION 15453.0101****************************************************

****************** BANDIT SYSTEM HARDWARE MAP ****************Board Id = 0

----BROADBAND OFF-LINE MENU ----

B) GO ON-LINED) LOW LEVEL OPERATIONS

ENTER YOUR SELECTION:

---- BANDIT DIAGNOSTIC LOW LEVEL OPERATIONS MENU ----

A) LOAD BOOTCODE VIA CONSOLE B) FLASH APPLICATION VIA CONSOLE C) RUN APPLICATION D) DEBUG L) LOAD DEFAULT CONFIGURATION

ENTER YOUR SELECTION:

********* BSP APPLICATION FLASH BURN FROM DRAM ***********

ENTER CODE REGION (1 or 2): ->

Page 9: Software Configuration: Loading Software into a BANDIT? Product

Loading Software into a BANDIT™ Product D-9

9 To continue, type Y and press Enter.

❖ The system indicates that it will erase the selected region b, and asks for confirmation.

10 Again, type Y and press Enter to continue.

Note: Even if you have already erased code region b, answer Y, to allow this routine to continue.

❖ The system starts erasing the indicated code region.

Note: It may take a couple of minutes to erase the region.

❖ After the code region has been erased, the system prompts for the baud rate for file transfer.

11 Select 57600 bps and press Enter.

❖ The following message is displayed.

12 If you will use a different application to transfer the code, do the following. Otherwise, go to Step 13.

DO YOU WISH TO CONTINUE ? ENTER Y (CAPS) to continue or <cr> to exit

ALL APPLICATION REGION b FLASH WILL BE ERASED TO PERFORM THE WRITE

DO YOU WISH TO CONTINUE ? ENTER Y (CAPS) to continue or <cr> to exit

ONE MOMENT PLEASE ...

ERASING BSP APPLICATION FLASH, ADDR 0x01200100, PLEASE WAIT...

Please enter the baud rate:

1) 9600 bps2) 38400 bps3) 57600 bps4) 115200 bps

Your Selection [1]-->

Please set your monitor to 57600 and press enter

Page 10: Software Configuration: Loading Software into a BANDIT? Product

D-10 Software Configuration, Document D

a Disconnect the management application’s electrical connection (i.e., its software connection) from the BANDIT. (But leave the physical connection—the cable between the PC and the BANDIT—in place.)

Note: If the management application software can be disconnected without being closed, leave the management application open.

b Open an application that can transfer files.

Note: The transfer application you select can use a menu, a graphic user interface, or a command line interface.

Caution: If you did not disconnect the management application’s electrical connection, the transfer application will be unable to connect to the BANDIT. You may see a message similar to the following message.

Figure D-1. Message That Communication Port Cannot Be Opened

c If you see the message in Figure D-1, close the message and repeat Step 12.

Note: After the transfer application opens, you may see a message similar to the following.

d If you see this message, answer N (no). The transfer will not take place across a LAN. It will take place over the direct connection between the terminal (console) and the BANDIT.

❖ The transfer application shifts to terminal mode.

13 In the transfer application, do the following:

a Set the PC’s baud rate to 57600 bps.

❖ After you have changed the baud rate, the transfer application window is displayed again.

CARRIER DETECTED, Send modem initialization [Y/N] ?

You are now in TERMINAL mode

!

Page 11: Software Configuration: Loading Software into a BANDIT? Product

Loading Software into a BANDIT™ Product D-11

b Press Enter.

❖ A message similar to the following message appears in the transfer application window.

Note: Because the file resides on the PC that is running the transfer application, we will upload the file from the PC (according to the PC’s point of view).

Caution: If you do not see a message to start downloading, or if the screen displays unexpected characters (for example, δ, ¬, or φ), the baud rates do not match. In this case, perform Step 13a and Step 13b again.

c Set the upload protocol to ASCII.

❖ A window is displayed, asking for the name of the file to transfer.

d Type the full path and filename (as shown in the example below), and press Enter to start transferring the file to the BANDIT.

G:\BANDT_SW\64070200.RX

❖ The application starts transferring the file to the BANDIT. The transfer application’s window may show the progress of the transfer (by indicating the number of bytes sent).

Note: The file transfer may take 20 minutes or more. Wait until the file transfer has completed.

There are two parts (steps) in the file transfer when performed from the control terminal:

Part 1: • Uploading the code

❖ When the first part (the upload) has completed, you may hear a soft beep. The screen may display a message similar to the following.

Part 2: • Programming the uploaded code

❖ After the upload has completed, the transfer starts the second part (programming the code). The transfer application’s window may show the programming progress (for example, as a progression of dots).

Please start Downloading now..

checksum cal: 0xe8f890f0

code downloaded successfully. please wait...

erasing bsp application flash, addr 0x01200100, please wait...

!

Page 12: Software Configuration: Loading Software into a BANDIT? Product

D-12 Software Configuration, Document D

❖ When the programming has completed, the transfer application screen displays the BANDIT Diagnostic Low Level Operations menu.

e In the transfer application, after the file transfer has finished, change the baud rate of the control console to 9600 bps.

14 If you used the same application for the management connection to the BANDIT and for the file transfer, go to Step 15. Otherwise, do the following.

Note: In this step’s discussion, the terms “connection,” “connect,” and “disconnect” refer to the electrical connection between devices. In this step’s discussion, the terms do not refer to the physical connection.

a If the transfer application requires a separate step to disconnect communication with the BANDIT, disconnect the application.

Note: Some transfer applications automatically disconnect communication when they are properly closed.

b Close the transfer application.

Caution: Use the transfer application’s defined method of closing. (That is, use the transfer application’s exit command.)

Do not use the operating system’s default closing routine to close the transfer application, because that may not disconnect the application. In such a case, the BANDIT may retain the connection to the transfer application, preventing the management application from reconnecting to the BANDIT.

If the BANDIT will not allow the management application to reconnect, re-open the transfer application. Then use the transfer application’s commands to disconnect and close properly.

c Reconnect the management application.

15 Unplug the BANDIT to turn its power off; then plug the BANDIT back into its power source.

❖ The BANDIT restarts. (This also resets the BANDIT’s baud rate to 9600.)

programming 4579184 bytes. please wait ...

. . . . . . . .

---- BANDIT DIAGNOSTIC LOW LEVEL OPERATIONS MENU ----

A) LOAD BOOTCODE VIA CONSOLE B) FLASH APPLICATION VIA CONSOLE C) RUN APPLICATION D) DEBUG L) LOAD DEFAULT CONFIGURATION

ENTER YOUR SELECTION:

!

Page 13: Software Configuration: Loading Software into a BANDIT? Product

Loading Software into a BANDIT™ Product D-13

❖ When the BANDIT has restarted, the login banner is displayed.

16 Press Enter.

❖ The version information and copyright information are displayed. Then the Main Menu is displayed.

Note: The new software resides in the unit. It is not yet active.

*****************************************************BANDIT 2002, ENCORE NETWORKS, INC. *****************************************************BOOTING..., YOU MAY ENTER ATTENTION SEQUENCE FROM NOW TILL ONLINE -->......INITIALIZING EXTENDED DRAM AND SOME REGISTERS

TO GO OFFLINE ENTER ATTENTION SEQUENCE...

CHECKING CODE REGION 2Calculated checksum = 0x4eb2cd0b, stored = 0x4eb2cd0b

GOING ONLINE, PLEASE WA

***************************************************** BANDIT, ENCORE NETWORKS INC*****************************************************Press <ENTER> to login

Welcome to BANDIT Product --15535.0600 Copyright ENCORE NETWORKS Inc., 2002-2003.

Main Menu----------1) QuickStart Config Builder

2) Typical Configurations3) Advanced Configurations4) Tools

V) View Current Unit StatusL) Load Factory DefaultsW) Write ConfigurationR) Reset UnitX) eXit SessionS) StatisticsY) sYstem Administration

Enter Choice :

Page 14: Software Configuration: Loading Software into a BANDIT? Product

D-14 Software Configuration, Document D

17 Go to Section D.4, Making the New Application Software Primary and Active.

D.3 Downloading BANDIT Application Software from the Network (via TFTP)

Note: Make sure you have performed the procedure in Section D.1, Determining the Active Code Region for Application Software. In addition, the BANDIT device’s LAN port must be connected to the network.

1 Make sure a network host in your LAN has a TFTP server.

Note: The network host must contain the ELIOS™ software update (for example, 55350600.RX) and a TFTP server application.

2 On the network host, start the TFTP server application and do the following:

a Verify the TFTP host’s IP address.

b Make sure the new software file (for example, 55350600.RX) is in the TFTP directory.

c Leave the TFTP application open.

3 Make sure the BANDIT’s LAN port is connected to the network that the host resides on.

Note: If you are using a laptop PC as a temporary host, you can connect the BANDIT’s LAN port to the host’s LAN port. You will still have to configure the IP addresses used for this procedure.

❖ When the BANDIT is connected to a LAN, the Link LED for the BANDIT’s LAN port stays on.

4 On the BANDIT’s Main Menu, select Advanced Configurations.

❖ The Advanced Configurations menu is displayed.

Main Menu----------1) QuickStart Config Builder

2) Typical Configurations3) Advanced Configurations4) Tools

V) View Current Unit StatusL) Load Factory DefaultsW) Write ConfigurationR) Reset UnitX) eXit SessionS) StatisticsY) sYstem Administration

Enter Choice :

Page 15: Software Configuration: Loading Software into a BANDIT? Product

Loading Software into a BANDIT™ Product D-15

5 On the Advanced Configurations menu, select Local Address.

❖ The Configure Local Addresses menu is displayed.

6 Select IP Address.

❖ The following prompt appears.

7 If the BANDIT does not already have an IP address, type one and press Enter.

Note: Get all IP addresses (even temporary IP addresses) from your network administrator.

The BANDIT and the host must be in the same network. If you are setting up a temporary connection (e.g., with a laptop as host), you can assign the BANDIT a temporary IP address in the same subnet as the host.

For example, if the host’s IP address is 192.168.202.6 and its subnet mask is 255.255.255.0, you can give the BANDIT an IP address of 192.168.202.x, where x is any unused value between 0 and 255. (So x cannot be 6 or any other value already used in the subnet.) Your network administrator can provide an appropriate value for x.

However, when the BANDIT resumes function as a network gateway, it must use the permanent IP address assigned by the network administrator.

❖ The Configure Local Addresses menu is displayed again, with the IP address you entered.

8 Press Escape to return to the Advanced Configurations menu.

Advanced Configurations------------------------1) Physical Configurations2) Data Configurations3) Local Address4) Routing5) Global Paths

Enter Choice :

Configure Local Addresses--------------------------1) IP Address : 0.0.0.02) BANDIT Name :

Enter Choice :

Enter Local IP Address (N.N.N.N) :

Page 16: Software Configuration: Loading Software into a BANDIT? Product

D-16 Software Configuration, Document D

9 On the Advanced Configurations menu, select Routing.

❖ The Configure Routing menu is displayed.

10 On the Configure Routing menu, select IP Routing.

❖ The IP Routing Configuration menu is displayed.

11 On the IP Routing Configuration menu, select IP Routing Method and set it to Static.

12 Then, still on the IP Routing Configuration menu, select Static Routing.

❖ The Static Routing Parameters menu is displayed.

13 On the Static Routing Parameters menu, select IP Routing Table.

❖ If the Static IP Routing Table does not yet exist, it prompts you for the first record in the table. Go to Step 15.

❖ If the Static IP Routing Table already exists, it is displayed.

14 If the Static IP Routing Table is displayed, select A (to add a record).

❖ The BANDIT prompts you for the new record in the table.

15 The routing table must tell the BANDIT how to get to the TFTP server’s IP address. In the following substeps, we set up a route that uses the LAN port to reach the TFTP server. Do the following:

a In Step 7, you configured the BANDIT to be in the same subnet with the TFTP server. Type the lowest IP address in this subnet, and press Enter.

Note: This IP address is based on the subnet mask. Ask your network administrator what this IP address will be.

❖ The BANDIT presents the next field in the record:

Add IP Routing Table Entry

Enter Low IP Address (N.N.N.N) :

Entry Low IP Address High IP Address Gpt Name MTU Priority

1 192.168.202.6 192.168.202.10 LAN 1500

Add, Modify, or Delete an Entry? (Enter A, M, or D):

Add IP Routing Table Entry

Enter Low IP Address (N.N.N.N) :

Page 17: Software Configuration: Loading Software into a BANDIT? Product

Loading Software into a BANDIT™ Product D-17

b Type the highest IP address in the subnet, and press Enter.

Note: This IP address is based on the subnet mask. Ask your network administrator what this IP address will be.

❖ The BANDIT presents the next field in the record:

c For the path name, type LAN and press Enter.

❖ If the path already exists, a prompt asks which NAT configuration scheme to use. Go to Step 15g.

❖ If the path does not yet exist, the BANDIT prompts you to configure the path.

d Enter y to configure the path.

❖ The Global Path Types menu is displayed.

e This route uses a specific port. Select Port Type.

❖ A prompt asks which port to use.

Enter High IP Address (N.N.N.N) :

Enter Path Name (1 to 10 Characters): LAN

Enter NAT Configuration Number ( 0 = None ) :

Path Name Does Not Exist In GPT Table.To Add Global Path Entry, Press ’Y’or <enter>. Press Escape Otherwise.y

Global Path Types------------------1) X25 SVC2) X25 PVC3) Frame Relay PVC4) Port Type5) IP/UDPEnter Choice : (1 to 5)[1] : 4

Enter Port Number (L (LAN),W (WAN),M (MODEM), S (SERIAL),): L

Page 18: Software Configuration: Loading Software into a BANDIT? Product

D-18 Software Configuration, Document D

f Select the LAN port.

❖ The BANDIT adds the path to the Global Path Table.

❖ Then the BANDIT asks which NAT configuration scheme to use for this record in the routing table.

g This route will not use a NAT scheme. If the default is None, press Enter. Otherwise, enter 0 (zero).

❖ Then the BANDIT asks for the Maximum Transfer Unit (MTU).

h If the default MTU is 1500, press Enter. Otherwise, enter 1500.

❖ The BANDIT adds this record to the Static IP Routing Table.

❖ Then the BANDIT asks for information for the next new record in the table.

i Press Escape.

❖ The Static IP Routing Table is displayed. It contains the path you just entered. (It may also contain additional paths.)

GPT Entry added.

Enter NAT Configuration Number ( 0 = None ) :

Enter the MTU (256 to 1500)[1500] :

Entry Added

Enter Low IP Address (N.N.N.N) :

Entry Low IP Address High IP Address Gpt Name MTU Priority

1 192.168.202.6 192.168.202.10 LAN 1500

Add, Modify, or Delete an Entry? (Enter A, M, or D):

Page 19: Software Configuration: Loading Software into a BANDIT? Product

Loading Software into a BANDIT™ Product D-19

16 When you have finished configuring the static routing table, press Escape until you reach the Main Menu.

17 Select System Administration.

18 When the BANDIT requests a password, type the password.

Note: Default passwords are listed in Default Passwords.

❖ The System Administration menu is displayed.

19 On the System Administration menu, select Network Download.

❖ The Network Download menu is displayed.

20 Select TFTP Host IP Address.

❖ A prompt for the IP address is displayed.

21 Type the TFTP server’s IP address and press Enter. (This is the IP address you verified in Step 2a.)

❖ The Network Download menu is redisplayed, with the entered IP address.

22 On the Network Download menu, select Code File Name.

❖ The following prompt appears.

23 Type the filename you wish to download (for example, 55350600.rx), and press Enter.

Network Download-----------------1) TFTP Host IP Address : 0.0.0.02) Code File Name :3) TFTP Time-out : 4

R) Erase Inactive Code RegionI) Initiate Network DownloadS) StatusP) Code Region Priority

Enter Choice :

Enter TFTP Host Address (N.N.N.N) :

Enter TFTP File Path / Name (Maximum 64 characters):

Page 20: Software Configuration: Loading Software into a BANDIT? Product

D-20 Software Configuration, Document D

Note: For a network download, do not include the path in this entry.

Type the filename exactly as it appears in the host’s TFTP directory, including capitalization. (You checked this in Step 2b.)

❖ The Network Download menu is redisplayed, with the entered filename.

24 On the Network Download menu, select TFTP Time-out.

❖ A prompt asks how long to wait before dropping the transfer, if there is a period of no transmission between the host and the BANDIT.

25 Enter the maximum number of seconds (20) and press Enter.

❖ The Network Download menu is redisplayed.

26 Press Escape until you reach the Main Menu.

27 On the Main Menu, select Write Configuration.

❖ A confirmation menu is displayed.

28 Select Yes to save the configuration. Enter the password. (Default passwords are listed in Default Passwords.)

❖ The BANDIT saves the configuration. When the system has finished writing the configuration, the Main Menu is displayed again.

29 On the Main Menu, select Reset Unit.

❖ A confirmation menu is displayed.

30 Select Yes.

❖ The BANDIT restarts.

Enter TFTP timeout in seconds (1 - 20):

Write New Configuration to Memory----------------------------------Y) YesN) No

Are You Sure? :

Reset Unit-----------Y) YesN) No

Are You Sure? :

Page 21: Software Configuration: Loading Software into a BANDIT? Product

Loading Software into a BANDIT™ Product D-21

❖ When the BANDIT is ready, the login screen is displayed.

31 Press Enter.

❖ The Main Menu is displayed.

32 Select System Administration.

33 When the BANDIT requests a password, type the password.

Note: Default passwords are listed in Default Passwords.

❖ The System Administration menu is displayed.

34 On the System Administration menu, select Network Download.

❖ The Network Download menu is displayed.

35 On the Network Download menu, select Initiate Network Download.

❖ A confirmation prompt appears.

36 Answer y.

❖ A message similar to the following is displayed.

❖ When the download starts, the Activity LED for the BANDIT’s LAN port starts blinking. It continues to blink as long as data is being transmitted across the connection.

Note: It takes 5 to 10 minutes to download the software.

After the transfer starts, the Network Download menu is redisplayed. You can select Status to monitor the file transfer.

Resetting this Unit, Please Wait...

***************************************************** BANDIT, ENCORE NETWORKS INC*****************************************************Press <ENTER> to login

Initiate Network Download. proceed? (Y or N):

Please wait while the Net Load starts. . . . Transfer beginning!

Page 22: Software Configuration: Loading Software into a BANDIT? Product

D-22 Software Configuration, Document D

❖ When the download has completed, a message similar to the following is displayed. Then the Network Download menu is redisplayed.

Note: This message is not displayed if the screen is displaying information on status or statistics. However, if you select Status on the Network Download menu, the display shows Idle and Transfer Complete.

Note: Unlike file transfer over the Supervisory port, this file transfer over the LAN port does not program the code after downloading.

Network Loader Statistics _________________________

Network Loader State: Programming Number of Attempted Transfers: 1 Number of Successful Connections: 1 Number of Failed Transfers: 0 Number of Completed Transfers: 0

Present / Last File Transfer File Transfer State: Active Bytes Received: 193033 Starting Region Address: 0x0 Present FLASH Write Address: 0x52618 Ending Region Address: 0x0

Press Any Key to Continue ...

Enter "C" to Clear Statistics, "ESC" to Returnand Any Other Key to Refresh Statistics

Download successful.

Network Loader Statistics _________________________

Network Loader State: Idle Number of Attempted Transfers: 1 Number of Successful Connections: 1 Number of Failed Transfers: 0 Number of Completed Transfers: 1

Present / Last File Transfer File Transfer State: Transfer Complete Bytes Received: 6903423 Starting Region Address: 0x0 Present FLASH Write Address: 0x29B7B4 Ending Region Address: 0x0

Press Any Key to Continue ...

Page 23: Software Configuration: Loading Software into a BANDIT? Product

Loading Software into a BANDIT™ Product D-23

37 Press Escape until you return to the BANDIT’s Main Menu, and save (Write) the configuration.

38 Reset the unit.

❖ The new software resides in the unit. It is not yet active.

39 Go to Section D.4, Making the New Application Software Primary and Active.

Note: If you changed the BANDIT device’s IP address during any of the download procedure, you will change it back to its permanent IP address after completing the procedure in Section D.4, Making the New Application Software Primary and Active.

Caution: Do not change the IP address until you have completed that procedure.

D.4 Making the New Application Software Primary and Active

1 Make sure you have loaded the new software into the BANDIT device, according to a procedure in one of the following sections:

• Section D.2, Downloading BANDIT Application Software from the Control Terminal (via Flash)

• Section D.3, Downloading BANDIT Application Software from the Network (via TFTP)

2 On the BANDIT device’s Main Menu, select System Administration.

3 When the BANDIT requests the System Administration password, type the password and press Enter.

Note: Default passwords are listed in Default Passwords.

❖ The System Administration menu is displayed.

4 On the System Administration menu, select Database Management.

❖ The Database Administration menu is displayed.

System Administration----------------------1) Passwords2) SNMP Configuration3) Database Management4) Telnet Terminal5) Port Data Capture6) SNMP Triggered TRAPs

C) Copy ConfigurationN) Network DownloadV) VPN Commands7) Program RDU Flash

Enter Choice :

!

Page 24: Software Configuration: Loading Software into a BANDIT? Product

D-24 Software Configuration, Document D

5 On the Database Administration menu, select Code Region Priority.

❖ The Code Region Priority menu is displayed. The downloaded Region b says Secondary.

6 Select Region #b and make its priority Primary.

❖ The Code Region Priority menu is displayed again. The uploaded Region b now says Primary. (It is not yet Active.)

7 Press Ctrl Z once, or press Escape until you reach the Main Menu.

❖ The Main Menu is redisplayed.

8 On the Main Menu, save (Write) the configuration.

9 Then Reset the BANDIT.

10 After the BANDIT has restarted, use Step 2 through Step 5 to see the code region priority again.

❖ The new code region now says Primary and Active.

Database Administration------------------------1) Flash Memory Management2) BANDIT Database Management3) Code Region Priority

Enter Choice : 1

Code Region Priority---------------------1) Region #1 : Primary(Active)2) Region #2 : Secondary

Enter Choice :

Enter Region Priority (1 (Primary) or 2 (Secondary)):

Code Region Priority---------------------1) Region #1 : Secondary(Active)2) Region #2 : Primary

Enter Choice :

Page 25: Software Configuration: Loading Software into a BANDIT? Product

Loading Software into a BANDIT™ Product D-25

11 Press Ctrl Z once, or press Escape until you reach the Main Menu.

12 On the Main Menu, select View Current Unit Status.

❖ The BANDIT’s current information is displayed.

Note: The Active Code Region should show the region you updated (region b). If the Software Version (16407 in the example) and extension (0200 in the example) match the number and extension of the software version you uploaded, the BANDIT is using the updated ELIOS™ software.

Caution: If you changed the BANDIT device’s IP address during any of the download procedure, make sure you reconfigure the BANDIT with the permanent IP address assigned by your network administrator. Otherwise, the BANDIT will not be identified properly in the WAN, and other devices will not be able to find the BANDIT.

Code Region Priority---------------------1) Region #1 : Secondary2) Region #2 : Primary(Active)

Enter Choice :

View Current Unit Status------------------------ Active Code Region : 2 Active Database : 2 Board ID : 25 Feature Set : Undefined Software Version : 16407.0200 Build Date : 11:15:09 09/13/07 Snmp Mib Version : 5.0.6 WAN MAC Address : 00A0EB666666 LAN MAC Address : 00A0EB666667 Code Server Address : 0.0.0.0

Memory Utilization Buffer Utilization : 4% EEPROM Utilization : 51%

Last EEPROM Write Time : 0 seconds

CPU Utilization Factor : 0

Time Since Last Reset/Powerup : 0 days 0 hours 0 minutes 45 seconds

Press Any Key to Continue ...

!

Page 26: Software Configuration: Loading Software into a BANDIT? Product

D-26 Software Configuration, Document D