background image

     ASTi Telestra Target Operations & Maintenance Manual (Ver. 2, Rev. M)

10

Copyright © 2020 Advanced Simulation Technology inc.

3.3. Software Installation and Configuration

Targets are shipped with all necessary software pre-installed. To rebuild the system’s hard disk, 
reference the 

Telestra

 Target Cold Start Procedure (DOC-02-TEL4-TCS-1). 

Turn on the Target via the power switch on the front of the chassis. The system will boot into 
the Linux operating system. For further instruction on Target installation, see the Telestra Quick 
Start Guide (DOC-01-TEL4-QSG-1) for initial setup and IP address assignment. 

The only user account that exists after system installation or cold start is 

admin

. The default 

password for this user is also 

admin

. All user account logins and passwords are case-sensitive. 

Login: admin

Password: admin

Login: root

Password: abcd1234

3.3.1. Network Ports

Each Target has two or more Ethernet network ports depending on the system configuration. The 
physical location and function of each of these connections varies, based on the hardware 
installed by ASTi prior to shipment. The connections will vary over time and from system to 
system. 

Please read the ETH labels on your system to verify Ethernet locations. 

The multiple network ports provide convenient, independent connection to a DIS or HLA 
network, Host simulation network, Diskless, and ACENet. The local or host network is used to 
pass required data and state parameters back and forth to the user defined sound and 
communications models on the Target and the customer's simulation software. 

Network Ports (optional shown)

See chassis labels for ethernet assignment

Ethernet labels will be Eth0, Eth1, Eth2, etc.

Figure 4: Network Ports

Summary of Contents for Telestra Target

Page 1: ...r Park Drive ASTi Telestra Target Operation and Maintenance Manual Document DOC TEL NA OM M 2 Advanced Simulation Technology inc 500A Huntmar Park Drive Herndon Virginia 20170 USA Revision M Version 2...

Page 2: ......

Page 3: ...lestra Restricted Rights Use duplication or disclosure by the Government is subject to restrictions as set forth in sub paragraph c 1 ii of the Rights in Technical Data and Computer Software clause at...

Page 4: ......

Page 5: ...tem Configuration 9 3 3 Software Installation and Configuration 10 3 3 1 Network Ports 10 3 4 Default Network Settings 11 3 5 Connections 12 3 5 1 Connecting ACENet Devices 12 3 5 2 Power Connection 1...

Page 6: ...urity Package Installation 30 Chapter 7 Warranty and Repairs 31 7 1 Warranty Information 31 7 2 Repairs and Returns 31 7 3 Disclaimer and Warnings 32 Appendix A System Specifications 33 Temperature an...

Page 7: ...onmental cue modeling The Target connects to ASTi s flexible networked based ACENet architecture which provides a wide range of high fidelity scalable digital 48 kHz audio and I O peripherals The Targ...

Page 8: ...name instead of an IP address Reference the ASTi ACENet Guide for more information 3 The Target runs a custom Project that processes the audio and simulates radios intercom systems or sounds such as...

Page 9: ...h l i CHANNEL C CHANNEL D CHANNEL A CHANNEL B POWER STANDBY PROTECT DISABLE COM 1 2 3 4 5 6 7 8 Bridge Bridge Temp Clip Mute Clip Mute 12 12 18 18 6 6 Temp Current Current Headsets PTTs Speakers Micro...

Page 10: ...Target Hardware Components The Target consists of a number of hardware components and can be configured in many different ways depending on the requirements of the particular application The componen...

Page 11: ...ount system Target Depth Width Height Weight Standard 2U 22 3 4 17 3 1 2 31 lbs as shipped With Front Rackmount 24 19 with thumb screws 3 1 2 With Middle Rackmount 22 3 4 19 3 1 2 Table 1 Telestra Tar...

Page 12: ...supported along with some multicast capabilities The following sections discuss the individual network features in more detail Host Simulation Simulation state and sound model control parameters gener...

Page 13: ...flexible archi tecture provides highly scalable distribution network of model processing systems and remote audio and I O interface devices to address widely distributed and complex multi user sound a...

Page 14: ...guration and debug of ASTi systems over LAN WAN from any standard computer with a proper web browser 2 2 2 Support and Utilities Software All Target configurations include Linux operating system softw...

Page 15: ...in accordance with procedures common to industry standard practices Be sure to observe all notes caution or warning labels that may be present on the outside and inside of the shipping packages 3 2 P...

Page 16: ...logins and passwords are case sensitive Login admin Password admin Login root Password abcd1234 3 3 1 Network Ports Each Target has two or more Ethernet network ports depending on the system configura...

Page 17: ...o not wish to use DHCP to configure eth0 or if the network does not have a DHCP server the user must manually configure the network configurations including the IP address subnet mask and gateway IP A...

Page 18: ...tems To chassis To wall Connects to monitor s 15 pin D connector PS 2 connection may not be purple in color Each system will have three 3 labeled jacks RJ 45 connection To network x3 Not Included Reme...

Page 19: ...of a shielded twisted pair is for the microphone line Microphone lines usually carry a very small signal and typically run next to the headset line which typically has a much larger higher current si...

Page 20: ...use of the Target The disclaimer applies to all parties using the Target in any situation or configuration This disclaimer should be read and understood completely before using the Target Disclaimer...

Page 21: ...sed for your application or suggestions for future enhancements you can contact ASTi in the following ways By Email Send an email at any time to support asti usa com By Web Contact us through the ASTi...

Page 22: ...t hlauser is created for user convenience WARNING ASTi recommends changing the password for the account immediately after software installation or cold start User Account Username Default Password HLA...

Page 23: ...federation The host can also get the following information from the federate Joined resign status Current federate name federation name fed file name rid file name and conversion file name RTI networ...

Page 24: ...y that it is working correctly To run the host emulator on the local platform log in as hlauser hostemu port number To connect to a port on a remote Target type the command hostemu port number IP addr...

Page 25: ...ay be initiated by simply pressing the ENTER key See the sample output below life count 0x41 Attribute Updates rx 0x6 tx 0xc ignored 0x0 Interactions Audio rx 0x0 tx 0x0 TDL rx 0x0 tx 0x0 Attach rx 0x...

Page 26: ...nt debug level If the command is entered without a value it will display the current debug level If entered with a level that debug level will be set The debug level parameter determines which combina...

Page 27: ...VEN FAIL Two federates must use the same feder ation name to pass information between them The response to the JOIN command is either JOIN FederationName OK JOIN FederationName FAIL or JOIN Federation...

Page 28: ...command can be entered at any time in order to leave the current federation To join a different federation it is not necessary to resign Issuing a new JOIN command will cause the Target federate to r...

Page 29: ...system resident on the HLA network However to perform local only testing or stand alone tests it is possible to run the rtiexec on the Target The rtiexec will service every system on the network Prior...

Page 30: ...NOT on one of the Targets 1 Start the RTI as described above 2 On each machine run the host emulator utility from any console 3 Then enter the command join Wait for the federate software to return JO...

Page 31: ...ecurity features Red Hat Enterprise Linux version 5 x NIAP Approved OS Minimal OS Footprint Only essential OS elements are included For example the Target platform does not include a desktop environme...

Page 32: ...s the ability to remove and secure non volatile media Diskless operation options also available Telestra Security Package features Note The Telestra Security Package is an optional software package fo...

Page 33: ...mmediate access into a machine allow super user access or bypass a firewall Category II Vulnerabilities that provide information that have a high potential of giving access to an intruder Category III...

Page 34: ...erability it represents Out of the hundreds of PDIs ASTi can eliminate the majority of them however the customer is responsible for eliminating several PDIs For example certain elements of the STIGS r...

Page 35: ...ou will receive the security software version that was run against the November 15th 2007 DISA UNIX and Web Server SRRs Future Telestra security software packages upgrades that are required to match t...

Page 36: ...ry contains a PDF that is provided to assist in the IA accreditation process The PDF is generated from the non ASTi generated DISA SRR results ASTi transforms the raw results generated from the DISA S...

Page 37: ...ile the exterior container should use a more pliant shock absorbing material such as styrofoam peanuts The device should be properly enclosed in an antistatic bag to prevent possible ESD damage Failur...

Page 38: ...hipment will not be tested After sixty 60 days ASTi reserves the right to scrap all hardware received in this condition 12 International customers must include the correct product value on all shippin...

Page 39: ...32 131 F 0 55 C 10 95 0 8 000 ft 2 438 meters Reliability The ASTi sound system has been designed to use the minimal complexity of electronic hardware and the highest quality components Special attent...

Page 40: ...get Operations Maintenance Manual Ver 2 Rev M 34 Copyright 2020 Advanced Simulation Technology inc Appendix B Software Version Release Notes Go to Telestra FAQs on the ASTi web site support asti usa c...

Page 41: ...st be tested together in their target environment under operational conditions ASTi s Telestra HLA software supports the RTIs listed below ASTi s Telestra platform was tested with and supports several...

Page 42: ...he files and ls a which will display all files and directories including hidden directories pwd This command returns the full path that you are currently in It is useful for seeing where you are in th...

Page 43: ...eate and rename copies of any file in the file system You must always specify both the file being copied and the new file name See below for some examples mv oldfile newfile The Move command works exa...

Reviews: