259
1.877.877.2269
BLACKBOX.COM
NEED HELP?
LEAVE THE TECH TO US
LIVE 24/7
TECHNICAL
SUPPORT
1.877.877.2269
To enable RFC-2217 access:
# config -s config.ports.port5.bridge.rfc2217=on
To redirect the serial bridge over an SSH tunnel to the server:
#config -s config.ports.port5.bridge.ssh.enabled=on
SYSLOG SETTINGS
Additionally, the global system log settings can be set for any specific port, in any mode:
# config -s config.ports.port#.syslog.facility='facility'
# config -s config.ports.port#.syslog.priority='priority'
TABLE 15-3. GLOBAL SYSTEM SETTINGS
ARGUMENT
SUPPORTED VALUES
facility
Default, local 0–7, auth, authpriv, cron, daemon, ftp, kern, lpr, mail, news, user, uucp,
priority
Default, warning, notice, info, error, emergency, debug, critical, alert
15.1.2 ADDING AND REMOVING USERS
First, determine the total number of existing Users:
# config -g config.users.total
This command should display
config.users.total 1.
NOTE: If you see config.users.total, this means you have 0 Users configured.
Your new User will be the existing total plus 1. So if the previous command gave you 0 then you start with user number 1, if you already have
1 user your new user will be number 2, etc.
Assuming the previous command did return config.users.total 1., to add a user with Username=John, Password=secret and
Description=mySecondUser issue the commands:
# config -s config.users.total=2
# config -s config.users.user2.username=John
# config -s config.users.user2.description=mySecondUser
# config -P config.users.user2.password
NOTE: The -P parameter will prompt the user for a password, and encrypt it. The value of any config element can be encrypted using the
-P parameter, but only encrypted user passwords and system passwords are supported. If any other element value were to be
encrypted, the value will become inaccessible and will have to be reset.
To add this user to specific groups (admin/users):
# config -s config.users.user2.groups.group1='groupname'
# config -s config.users.user2.groups.group2='groupname2'
# [etc...]
CHAPTER 15: CONFIGURATION FROM THE COMMAND LINE