Table Of Contents
RS400 7 ROS™ v3.5
11 PPP over Modem......................................................................................................................221
11.1 PPP over Modem Operation................................................................................................. 221
11.1.1 Remote Dial-in For Monitoring ......................................................................................221
11.1.2 Router Concentration.................................................................................................... 222
11.1.3 Assigning IP Addresses For PPP..................................................................................223
11.1.4 PAP/CHAP Authentication ............................................................................................223
11.1.5 Static Routes.................................................................................................................224
11.2 PPP Configuration.................................................................................................................225
11.2.1 Modem Settings ............................................................................................................226
11.2.2 PPP Control...................................................................................................................227
11.2.3 PPP Users.....................................................................................................................229
11.2.4 PPP Statistics................................................................................................................231
11.2.5 Clearing PPP Statistics .................................................................................................233
11.2.6 Resetting PPP...............................................................................................................233
11.3 Troubleshooting ....................................................................................................................234
12 Diagnostics................................................................................................................................237
12.1 Using the Alarm System........................................................................................................237
12.1.1 Active Alarms ................................................................................................................238
12.1.2 Passive Alarms..............................................................................................................238
12.1.3 Alarms and the Critical Failure Relay............................................................................238
12.1.4 Viewing and Clearing Alarms........................................................................................ 238
12.2 Viewing CPU Diagnostics .....................................................................................................239
12.3 Viewing and Clearing the System Log.................................................................................. 241
12.4 Viewing Product Information................................................................................................. 242
12.5 Loading Factory Default Configuration..................................................................................243
12.6 Resetting the Device.............................................................................................................243
13 Using the CLI Shell................................................................................................................... 245
13.1 Entering and Leaving the Shell............................................................................................. 245
13.2 Summary Of CLI Commands available in ROS™.................................................................245
13.2.1 Getting Help for a Command.........................................................................................246
13.2.2 Viewing Files................................................................................................................. 246
13.2.3 Pinging a Remote Device..............................................................................................247
13.2.4 Tracing Events ..............................................................................................................247
13.2.5 Viewing DHCP Learned Information .............................................................................249
13.2.6 Executing Commands Remotely Through RSH............................................................249
13.2.7 Resetting the Device..................................................................................................... 250
14 Upgrading Firmware and Managing Configurations..................................................................251
14.1 Upgrading Firmware..............................................................................................................251
14.1.1 Upgrading Firmware using XModem.............................................................................251
14.1.2 Upgrading Firmware Using a TFTP Client on Your Workstation...................................252
14.1.3 Upgrading Firmware Using ROS TFTP Client............................................................253
14.2 Capturing Configurations ......................................................................................................254
14.2.1 Capturing Configurations with XModem........................................................................254
14.2.2 Capturing Configurations with TFTP............................................................................. 254
14.3 Using SQL Commands .........................................................................................................255
14.3.1 Getting Started.............................................................................................................. 255
14.3.2 Finding the Correct Table..............................................................................................255
14.3.3 Retrieving Information................................................................................................... 256