Digi One/PortServer TS Command Reference
This online manual, available on the Software and Documentation CD, provides complete information on commands.
RealPort Setup Guides
These online manuals provide information on setting up servers for
RealPort software.
Online Help for the Web UI
This
About Configuration Methods
Use this section to learn about configuration methods.
Configure the device server with the wizard
Simply follow the prompts and choose your configuration with the wizard. Choose either a Microsoft Windows or Unix platform.
Configuring the device server from an Attached Terminal
With this method, you cable a terminal or PC running terminal emulation software to a device server port and then use the command line to enter commands. This method allows you to configure all features. It requires, however, that you and the device server be in the same location. Some users find it advantageous to configure the device server IP address this way and then use one of the other methods for the rest of the configuration.
Configuring the device server from a Telnet Session
With this method, you Telnet to the device server and use the command line to complete configuration tasks. The only disadvantage to this method is that you have to configure the device server with an IP address before you can Telnet to it.
Configuring the device server from the Web Interface
The great advantage to this method is ease of use. This method requires that you configure the IP address before you can access the configuration from the web interface, however, some features cannot be configured this way.
Downloading a Configuration File
With this method, you configure a Digi device and then do the following:
1.Download an existing configuration file to a host system.
2.Edit the file with specific configuration using a text editor.
3.Upload the file to the device server.
This an excellent method for maintaining highly similar configuration files for multiple Digi devices. The disadvantage is that the device server requires some configuration steps, such as the IP address, to be completed before it can be used.
Chapter 3 Introduction | 11 |