RuggedCom Welder RS400 ユーザーズマニュアル
Table Of Contents
RS400
7
ROS™ v3.5
11
PPP over Modem ......................................................................................................................221
11.1
PPP over Modem Operation .................................................................................................221
11.1.1
Remote Dial-in For Monitoring ......................................................................................221
11.1.2
Router Concentration ....................................................................................................222
11.1.3
Assigning IP Addresses For PPP..................................................................................223
11.1.4
PAP/CHAP Authentication ............................................................................................223
11.1.5
Static Routes .................................................................................................................224
11.2
PPP Configuration.................................................................................................................225
11.2.1
Modem Settings ............................................................................................................226
11.2.2
PPP Control...................................................................................................................227
11.2.3
PPP Users.....................................................................................................................229
11.2.4
PPP Statistics................................................................................................................231
11.2.5
Clearing PPP Statistics .................................................................................................233
11.2.6
Resetting PPP ...............................................................................................................233
11.3
Troubleshooting ....................................................................................................................234
12
Diagnostics................................................................................................................................237
12.1
Using the Alarm System........................................................................................................237
12.1.1
Active Alarms ................................................................................................................238
12.1.2
Passive Alarms..............................................................................................................238
12.1.3
Alarms and the Critical Failure Relay ............................................................................238
12.1.4
Viewing and Clearing Alarms ........................................................................................238
12.2
Viewing CPU Diagnostics .....................................................................................................239
12.3
Viewing and Clearing the System Log ..................................................................................241
12.4
Viewing Product Information .................................................................................................242
12.5
Loading Factory Default Configuration..................................................................................243
12.6
Resetting the Device .............................................................................................................243
13
Using the CLI Shell ...................................................................................................................245
13.1
Entering and Leaving the Shell .............................................................................................245
13.2
Summary Of CLI Commands available in ROS™.................................................................245
13.2.1
Getting Help for a Command.........................................................................................246
13.2.2
Viewing Files .................................................................................................................246
13.2.3
Pinging a Remote Device..............................................................................................247
13.2.4
Tracing Events ..............................................................................................................247
13.2.5
Viewing DHCP Learned Information .............................................................................249
13.2.6
Executing Commands Remotely Through RSH ............................................................249
13.2.7
Resetting the Device .....................................................................................................250
14
Upgrading Firmware and Managing Configurations..................................................................251
14.1
Upgrading Firmware..............................................................................................................251
14.1.1
Upgrading Firmware using XModem.............................................................................251
14.1.2
Upgrading Firmware Using a TFTP Client on Your Workstation...................................252
14.1.3
Upgrading Firmware Using ROS
™ TFTP Client............................................................253
14.2
Capturing Configurations ......................................................................................................254
14.2.1
Capturing Configurations with XModem........................................................................254
14.2.2
Capturing Configurations with TFTP .............................................................................254
14.3
Using SQL Commands .........................................................................................................255
14.3.1
Getting Started ..............................................................................................................255
14.3.2
Finding the Correct Table..............................................................................................255
14.3.3
Retrieving Information ...................................................................................................256