IOLAN CLI Reference Guide

Total Page:16

File Type:pdf, Size:1020Kb

IOLAN CLI Reference Guide IOLAN Secure Command Line Interface Reference Guide V5.0 Version A1.06.29.2020 Part #5500430-10 (Rev D) June 2020 Copyright Statement This document must not be reproduced in any way whatsoever, either printed or electronically, without the consent of: Perle Systems Limited, 60 Renfrew Drive Markham, ON Canada L3R 0E1 Perle reserves the right to make changes without further notice, to any products to improve reliability, function, or design. Perle, the Perle logo, and IOLAN are trademarks of Perle Systems Limited. Perle Systems Limited, 2020. FCC Note The IOLAN Product has been found to comply with the limits for a Class A digital device, pursuant to Part 15 of the FCC rules. These limits are designed to provide reasonable protection against harmful interference when the equipment is operated in a commercial environment. This equipment generates, uses, and can radiate radio frequency energy and, if not installed and used in accordance with the instructions in this Guide, may cause harmful interference to radio communications. Operation of this equipment in a residential area is likely to cause harmful interference, in which case the user will be required to correct the interference at his/her own expense. EN 55022: 1998, Class A, Note WARNING This is a Class A product. In a domestic environment this product may cause radio interference in which case the user may be required to take adequate measures. Caution: IOLAN products are approved for commercial use only. Table of Contents Preface ...............................................................................14 About This Book ........................................................................ 14 Intended Audience..................................................................... 14 Typeface Conventions............................................................... 14 Making a support query via the Perle web page ................................ 14 Chapter 1 Introduction......................................................15 CLI Conventions ........................................................................ 15 Command Syntax ................................................................................... 15 Command Shortcuts .............................................................................. 15 Command Options ................................................................................. 16 Chapter 2 User Commands ..............................................18 Commands for Users Logged Into the IOLAN ........................ 18 Admin ...................................................................................................... 18 Help.......................................................................................................... 18 Line .......................................................................................................... 18 Kill Line.................................................................................................... 18 Kill Session ............................................................................................. 18 Logout ..................................................................................................... 19 Menu ........................................................................................................ 19 Ping.......................................................................................................... 19 Resume.................................................................................................... 19 Rlogin ...................................................................................................... 19 Screen...................................................................................................... 19 Set Termtype........................................................................................... 20 IOLAN Secure V5.0 Command Reference Guide 3 Set User................................................................................................... 20 Set User Session .................................................................................... 21 Show Line Users..................................................................................... 22 SSH .......................................................................................................... 22 Syslog Console....................................................................................... 23 Show Sessions ....................................................................................... 23 Show Termtype....................................................................................... 24 Start ......................................................................................................... 24 Telnet....................................................................................................... 24 Version .................................................................................................... 25 Configuring Users...................................................................... 25 Add User.................................................................................................. 25 Delete User.............................................................................................. 25 Set Default User...................................................................................... 26 Set User................................................................................................... 29 Set User Session .................................................................................... 33 Show Default User.................................................................................. 33 Show User............................................................................................... 34 Chapter 3 Server Commands ...........................................35 Set Console............................................................................................. 35 Show Console......................................................................................... 36 Set Custom-App ..................................................................................... 36 Show Custom-App ................................................................................. 36 Set Port-Buffering................................................................................... 36 Show Port-Buffering............................................................................... 37 Set Server................................................................................................ 38 Show Server............................................................................................ 43 Set Wlan (applies to some models) ...................................................... 44 Add Wlan (applies to some models)..................................................... 49 Show Wlan (applies to some models) .................................................. 49 Delete Wlan (applies to some models)................................................. 49 Set Wwan (applies to some models) .................................................... 50 Show Wwan (applies to some models) ................................................ 51 4 Set Front Panel (applies to some models)........................................... 52 Show Front Panel (applies to some models)....................................... 53 Set Keypad (applies to some models).................................................. 53 Show Keypad (applies to some models).............................................. 53 Set SSL Server........................................................................................ 54 Set Service .............................................................................................. 55 Set Web Manager.................................................................................... 56 Show Web-Manager ............................................................................... 56 Hardware Commands ................................................................ 57 Set Ethernet ............................................................................................ 57 Show Serial Numbers (applies to some models) ................................ 57 Show Interface Ethernet (applies to some models) ............................ 57 Show Slot-hardware (applies to some models)................................... 58 Show Hardware (applies to some models) .......................................... 58 Show Part-number (applies to some models) ..................................... 58 SSH Server Commands............................................................. 58 Set SSH-Server ....................................................................................... 58 Show SSH-Server ................................................................................... 59 SSL/TLS Commands.................................................................. 60 Set SSL Server........................................................................................ 60 Set SSL Server Cipher-suite.................................................................. 61 Show SSL................................................................................................ 62 Modbus Commands................................................................... 63 Set Modbus Gateway ............................................................................. 63 Show Modbus ........................................................................................
Recommended publications
  • Windows Command Prompt Cheatsheet
    Windows Command Prompt Cheatsheet - Command line interface (as opposed to a GUI - graphical user interface) - Used to execute programs - Commands are small programs that do something useful - There are many commands already included with Windows, but we will use a few. - A filepath is where you are in the filesystem • C: is the C drive • C:\user\Documents is the Documents folder • C:\user\Documents\hello.c is a file in the Documents folder Command What it Does Usage dir Displays a list of a folder’s files dir (shows current folder) and subfolders dir myfolder cd Displays the name of the current cd filepath chdir directory or changes the current chdir filepath folder. cd .. (goes one directory up) md Creates a folder (directory) md folder-name mkdir mkdir folder-name rm Deletes a folder (directory) rm folder-name rmdir rmdir folder-name rm /s folder-name rmdir /s folder-name Note: if the folder isn’t empty, you must add the /s. copy Copies a file from one location to copy filepath-from filepath-to another move Moves file from one folder to move folder1\file.txt folder2\ another ren Changes the name of a file ren file1 file2 rename del Deletes one or more files del filename exit Exits batch script or current exit command control echo Used to display a message or to echo message turn off/on messages in batch scripts type Displays contents of a text file type myfile.txt fc Compares two files and displays fc file1 file2 the difference between them cls Clears the screen cls help Provides more details about help (lists all commands) DOS/Command Prompt help command commands Source: https://technet.microsoft.com/en-us/library/cc754340.aspx.
    [Show full text]
  • Lab - Observing DNS Resolution (Instructor Version) Instructor Note: Red Font Color Or Gray Highlights Indicate Text That Appears in the Instructor Copy Only
    Lab - Observing DNS Resolution (Instructor Version) Instructor Note: Red font color or Gray highlights indicate text that appears in the instructor copy only. Objectives Part 1: Observe the DNS Conversion of a URL to an IP Address Part 2: Observe DNS Lookup Using the Nslookup Command on a Web Site Part 3: Observe DNS Lookup Using the Nslookup Command on Mail Servers Background / Scenario The Domain Name System (DNS) is invoked when you type a Uniform Resource Locator (URL), such as http://www.cisco.com, into a web browser. The first part of the URL describes which protocol is used. Common protocols are Hypertext Transfer Protocol (HTTP), Hypertext Transfer Protocol over Secure Socket Layer (HTTPS), and File Transfer Protocol (FTP). DNS uses the second part of the URL, which in this example is www.cisco.com. DNS translates the domain name (www.cisco.com) to an IP address to allow the source host to reach the destination host. In this lab, you will observe DNS in action and use the nslookup (name server lookup) command to obtain additional DNS information. Work with a partner to complete this lab. Required Resources 1 PC (Windows 7, Vista, or XP with Internet and command prompt access) Part 1: Observe the DNS Conversion of a URL to an IP Address a. Click the Windows Start button, type cmd into the search field, and press Enter. The command prompt window appears. b. At the command prompt, ping the URL for the Internet Corporation for Assigned Names and Numbers (ICANN) at www.icann.org. ICANN coordinates the DNS, IP addresses, top-level domain name system management, and root server system management functions.
    [Show full text]
  • Shells and Shell Scripting
    Shells and Shell scripting What is a Shell? • A shell is a command line interpreter that is the interface between the user and the OS. • A “program launcher” of sorts. • The shell: o analyzes each command o determines what actions are to be performed o performs the actions • Example: wc –l file1 > file2 Which shell? • sh – Bourne shell o Most common, other shells are a superset o Good for programming • csh or tcsh – default for command line on CDF o C-like syntax o Best for interactive use. Not good for programming. • bash – default on Linux (Bourne again shell) o Based on sh, with some csh features. • korn – written by David Korn o Based on sh – Some claim best for programming. o Commercial product. Common shell facilities Shell startup When a shell is invoked, it does the following: 1. Read a special startup file (usually in home directory) 2. display prompt and wait for command 3. Ctrl-D on its own line terminates shell, otherwise, goto step 2. Shell startup files used to set shell options, set up environment variables, alias sh – executes .profile if it’s there. ksh – executes .profile if in interactive mode. Executes $ENV (usually $HOME/.kshrc) csh – executes .cshrc if it exists. If a login shell, executes .login bash – executes .bashrc, if a login shell, executes .bash_profile instead Executables vs. built-in commands Most commands you run are other compiled programs. Found in /bin Example: ls – shell locates ls binary in /bin directory and launches it Some are not compiled programs, but built into the shell: cd, echo Input-output redirection prog < infile > outfile ls > outfile 2>&1 # sh stdout and stderr Pipelining commands send the output from one command to the input of the next: ls -l | wc ps –aux | grep reid | sort Before a program is executed, the shell recognizes the special characters such as <, >, |, and rewires the standard input, output, or error file descriptors of the program about to be executed to point to the right files (or the standard input of another program).
    [Show full text]
  • IOLAN SDS/SCS/STS/MDC Command
    IOLAN SDS/SCS/STS/MDC Command Line Interface Reference Guide Version 4.8 Part #5500210-49 (Rev B) June 2016 Copyright Statement This document must not be reproduced in any way whatsoever, either printed or electronically, without the consent of: Perle Systems Limited, 60 Renfrew Drive Markham, ON Canada L3R 0E1 Perle reserves the right to make changes without further notice, to any products to improve reliability, function, or design. Perle, the Perle logo, and IOLAN are trademarks of Perle Systems Limited. Perle Systems Limited, 2005-2016. FCC Note The IOLAN Device Server has been found to comply with the limits for a Class A digital device, pursuant to Part 15 of the FCC rules. These limits are designed to provide reasonable protection against harmful interference when the equipment is operated in a commercial environment. This equipment generates, uses, and can radiate radio frequency energy and, if not installed and used in accordance with the instructions in this Guide, may cause harmful interference to radio communications. Operation of this equipment in a residential area is likely to cause harmful interference, in which case the user will be required to correct the interference at his/her own expense. EN 55022: 1998, Class A, Note WARNING This is a Class A product. In a domestic environment this product may cause radio interference in which case the user may be required to take adequate measures. Caution: the IOLAN Device Server is approved for commercial use only. WARNING The IOLAN Device Server SDS T models operate in an ambient air temperature above 70 oC.
    [Show full text]
  • NETSTAT Command
    NETSTAT Command | NETSTAT Command | Use the NETSTAT command to display network status of the local host. | | ┌┐────────────── | 55──NETSTAT─────6─┤ Option ├─┴──┬────────────────────────────────── ┬ ─ ─ ─ ────────────────────────────────────────5% | │┌┐───────────────────── │ | └─(──SELect───6─┤ Select_String ├─┴ ─ ┘ | Option: | ┌┐─COnn────── (1, 2) ──────────────── | ├──┼─────────────────────────── ┼ ─ ──────────────────────────────────────────────────────────────────────────────┤ | ├─ALL───(2)──────────────────── ┤ | ├─ALLConn─────(1, 2) ────────────── ┤ | ├─ARp ipaddress───────────── ┤ | ├─CLients─────────────────── ┤ | ├─DEvlinks────────────────── ┤ | ├─Gate───(3)─────────────────── ┤ | ├─┬─Help─ ┬─ ───────────────── ┤ | │└┘─?──── │ | ├─HOme────────────────────── ┤ | │┌┐─2ð────── │ | ├─Interval─────(1, 2) ─┼───────── ┼─ ┤ | │└┘─seconds─ │ | ├─LEVel───────────────────── ┤ | ├─POOLsize────────────────── ┤ | ├─SOCKets─────────────────── ┤ | ├─TCp serverid───(1) ─────────── ┤ | ├─TELnet───(4)───────────────── ┤ | ├─Up──────────────────────── ┤ | └┘─┤ Command ├───(5)──────────── | Command: | ├──┬─CP cp_command───(6) ─ ┬ ────────────────────────────────────────────────────────────────────────────────────────┤ | ├─DELarp ipaddress─ ┤ | ├─DRop conn_num──── ┤ | └─RESETPool──────── ┘ | Select_String: | ├─ ─┬─ipaddress────(3) ┬ ─ ───────────────────────────────────────────────────────────────────────────────────────────┤ | ├─ldev_num─────(4) ┤ | └─userid────(2) ─── ┘ | Notes: | 1 Only ALLCON, CONN and TCP are valid with INTERVAL. | 2 The userid
    [Show full text]
  • Introduction to Unix Shell
    Introduction to Unix Shell François Serra, David Castillo, Marc A. Marti- Renom Genome Biology Group (CNAG) Structural Genomics Group (CRG) Run Store Programs Data Communicate Interact with each other with us The Unix Shell Introduction Interact with us Rewiring Telepathy Typewriter Speech WIMP The Unix Shell Introduction user logs in The Unix Shell Introduction user logs in user types command The Unix Shell Introduction user logs in user types command computer executes command and prints output The Unix Shell Introduction user logs in user types command computer executes command and prints output user types another command The Unix Shell Introduction user logs in user types command computer executes command and prints output user types another command computer executes command and prints output The Unix Shell Introduction user logs in user types command computer executes command and prints output user types another command computer executes command and prints output ⋮ user logs off The Unix Shell Introduction user logs in user types command computer executes command and prints output user types another command computer executes command and prints output ⋮ user logs off The Unix Shell Introduction user logs in user types command computer executes command and prints output user types another command computer executes command and prints output ⋮ user logs off shell The Unix Shell Introduction user logs in user types command computer executes command and prints output user types another command computer executes command and prints output
    [Show full text]
  • Command-Line IP Utilities This Document Lists Windows Command-Line Utilities That You Can Use to Obtain TCP/IP Configuration Information and Test IP Connectivity
    Guide to TCP/IP: IPv6 and IPv4, 5th Edition, ISBN 978-13059-4695-8 Command-Line IP Utilities This document lists Windows command-line utilities that you can use to obtain TCP/IP configuration information and test IP connectivity. Command parameters and uses are listed for the following utilities in Tables 1 through 9: ■ Arp ■ Ipconfig ■ Netsh ■ Netstat ■ Pathping ■ Ping ■ Route ■ Tracert ARP The Arp utility reads and manipulates local ARP tables (data link address-to-IP address tables). Syntax arp -s inet_addr eth_addr [if_addr] arp -d inet_addr [if_addr] arp -a [inet_address] [-N if_addr] [-v] Table 1 ARP command parameters and uses Parameter Description -a or -g Displays current entries in the ARP cache. If inet_addr is specified, the IP and data link address of the specified computer appear. If more than one network interface uses ARP, entries for each ARP table appear. inet_addr Specifies an Internet address. -N if_addr Displays the ARP entries for the network interface specified by if_addr. -v Displays the ARP entries in verbose mode. -d Deletes the host specified by inet_addr. -s Adds the host and associates the Internet address inet_addr with the data link address eth_addr. The physical address is given as six hexadecimal bytes separated by hyphens. The entry is permanent. eth_addr Specifies physical address. if_addr If present, this specifies the Internet address of the interface whose address translation table should be modified. If not present, the first applicable interface will be used. Pyles, Carrell, and Tittel 1 Guide to TCP/IP: IPv6 and IPv4, 5th Edition, ISBN 978-13059-4695-8 IPCONFIG The Ipconfig utility displays and modifies IP address configuration information.
    [Show full text]
  • Freebsd Command Reference
    FreeBSD command reference Command structure Each line you type at the Unix shell consists of a command optionally followed by some arguments , e.g. ls -l /etc/passwd | | | cmd arg1 arg2 Almost all commands are just programs in the filesystem, e.g. "ls" is actually /bin/ls. A few are built- in to the shell. All commands and filenames are case-sensitive. Unless told otherwise, the command will run in the "foreground" - that is, you won't be returned to the shell prompt until it has finished. You can press Ctrl + C to terminate it. Colour code command [args...] Command which shows information command [args...] Command which modifies your current session or system settings, but changes will be lost when you exit your shell or reboot command [args...] Command which permanently affects the state of your system Getting out of trouble ^C (Ctrl-C) Terminate the current command ^U (Ctrl-U) Clear to start of line reset Reset terminal settings. If in xterm, try Ctrl+Middle mouse button stty sane and select "Do Full Reset" exit Exit from the shell logout ESC :q! ENTER Quit from vi without saving Finding documentation man cmd Show manual page for command "cmd". If a page with the same man 5 cmd name exists in multiple sections, you can give the section number, man -a cmd or -a to show pages from all sections. man -k str Search for string"str" in the manual index man hier Description of directory structure cd /usr/share/doc; ls Browse system documentation and examples. Note especially cd /usr/share/examples; ls /usr/share/doc/en/books/handbook/index.html cd /usr/local/share/doc; ls Browse package documentation and examples cd /usr/local/share/examples On the web: www.freebsd.org Includes handbook, searchable mailing list archives System status Alt-F1 ..
    [Show full text]
  • Networking TCP/IP Troubleshooting 7.1
    IBM IBM i Networking TCP/IP troubleshooting 7.1 IBM IBM i Networking TCP/IP troubleshooting 7.1 Note Before using this information and the product it supports, read the information in “Notices,” on page 79. This edition applies to IBM i 7.1 (product number 5770-SS1) and to all subsequent releases and modifications until otherwise indicated in new editions. This version does not run on all reduced instruction set computer (RISC) models nor does it run on CISC models. © Copyright IBM Corporation 1997, 2008. US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents TCP/IP troubleshooting ........ 1 Server table ............ 34 PDF file for TCP/IP troubleshooting ...... 1 Checking jobs, job logs, and message logs .. 63 Troubleshooting tools and techniques ...... 1 Verifying that necessary jobs exist .... 64 Tools to verify your network structure ..... 1 Checking the job logs for error messages Netstat .............. 1 and other indication of problems .... 65 Using Netstat from a character-based Changing the message logging level on job interface ............. 2 descriptions and active jobs ...... 65 Using Netstat from System i Navigator .. 4 Other job considerations ....... 66 Ping ............... 7 Checking for active filter rules ...... 67 Using Ping from a character-based interface 7 Verifying system startup considerations for Using Ping from System i Navigator ... 10 networking ............ 68 Common error messages ....... 13 Starting subsystems ........ 68 PING parameters ......... 14 Starting TCP/IP .......... 68 Trace route ............ 14 Starting interfaces ......... 69 Using trace route from a character-based Starting servers .......... 69 interface ............ 15 Timing considerations ........ 70 Using trace route from System i Navigator 15 Varying on lines, controllers, and devices .
    [Show full text]
  • Unix Basic Command
    SOI Asia Workshop 2008 Pre-workshop Unix Basic Assignment This document aims to provide basic Unix commands that operator needs to know to be able to follow lecture content of SOI Asia operator workshop. Participant should review the usage and do a practice on SOI Asia server with guidance and further explanation from senior SOI Asia operator at your site. To do practice, you need a user account on SOI Asia server machine and root password. Remember to always use your user account to do practice unless the practicing command really require root permission. 1. User account command passwd : Change your password. This will let you enter a new password. Please use a password that is not a real word or name and has numbers or punctuation in it. Practice. Login your user and change password to new one. Do not practice this command with root user. # passwd su : Become another user “su username” attempt to login as another user, system authenticate by prompting password. Without specifying username, it is attempt to login as root. exit : Logout When you are login as a user, you logout by this command. whoami : Check the current being user It returns username that you are using now. Practice. Login your user, and check current being user. “su” to be root, and check that your user is changing to root. Logout user root, and check your user again. # whoami # su # whoami # exit # whoami 2. Manual and Process command man : Show any UNIX command usages “man command” shows purpose of command, its format, how to specify options and usage examples.
    [Show full text]
  • 1 Introduction to Shell Programming
    1 Introduction to Shell Programming This lecture is prepared for beginners who wish to learn the basics of shell scripting/programming plus introduction to power tools such as awk, sed, etc. 1.1 What is Linux Shell? • In Operating System, there is special program called Shell. Shell ac- cepts your instruction or commands in English (mostly) and if its a valid command, it is passed to kernel. • Shell is a user program or it's a environment provided for user interac- tion. • Shell is an command language interpreter that executes commands read from the standard input device (keyboard) or from a file. • Shell is not part of system kernel, but uses the system kernel to execute programs, create files etc. • To find all available shells in your system type following command: $ cat /etc/shells • Note that each shell does the same job, but each understand a different command syntax and provides different built-in functions. • In MS-DOS, Shell name is COMMAND.COM which is also used for same purpose, but it's not as powerful as our Linux Shells are! • To find your current shell type following command $ echo $SHELL • To use shell (You start to use your shell as soon as you log into your system) you have to simply type commands. 1 1.2 What is Shell Script ? • Normally shells are interactive. It means shell accept command from you (via keyboard) and execute them. • But if you use command one by one (sequence of 'n' number of com- mands) , the you can store this sequence of command to text file and tell the shell to execute this text file instead of entering the commands.
    [Show full text]
  • Behind the 'System(…)' Command Execv Execl
    Computer Systems II Execung Processes 1 Behind the ‘system(…)’ Command execv execl 2 1 Recall: system() Example call: system(“mkdir systest”); • mkdir is the name of the executable program • systest is the argument passed to the executable mkdir.c int main(int argc, char * argv[]) { ... // create directory called argv[1] ... } 3 Unix’s execv The system call execv executes a file, transforming the calling process into a new process. AFer a successful execv, there is no return to the calling process. execv(const char * path, const char * argv[]) • path is the full path for the file to be executed • argv is the argument array, starGng with the program name • each argument is a null-terminated string • the first argument is the name of the program • the last entry in argv is NULL 4 2 system() vs. execv system(“mkdir systest”); mkdir.c int main(int argc, char * argv[]) { ... // create directory called argv[1] ... } char * argv[] = {“/bin/mkdir”, “systest”, NULL}; execv(argv[0], argv); 5 How execv Works (1) pid = 25 pid = 26 Data Resources Data Text Text Stack Stack PCB File PCB char * argv[ ] = {“/bin/ls”, 0}; cpid = 26 cpid = 0 char * argv[ ] = {“/bin/ls”, 0}; <…> <…> int cpid = fork( ); int cpid = fork( ); if (cpid = = 0) { if (cpid = = 0) { execv(argv[0], argv); execv(argv[0], argv); exit(0); exit(0); } } <parent code> <parent code> wait(&cpid); wait(&cpid); /bin/ls UNIX kernel 6 3 How execv Works (2) pid = 25 pid = 26 Data Resources Text Stack PCB File char * argv[ ] = {“/bin/ls”, 0}; cpid = 26 <…> Exec destroys the int cpid = fork( ); if (cpid = = 0) { process image of the execv(argv[0], argv); calling process.
    [Show full text]