
Operations 21
3 Operations
Overview
The SCS and its ports are easily configured and managed to meet your requirements for device connection, user
authentication, access control, power status monitoring, port history information display, and SNMP compliance for
use with third-party network management products.
Configuring global settings
Generally, the SCS-level commands affect console port operations, configure or initiate physical operations, and
enable or disable features.
Console port settings
The Server CLI commands include parameters that configure:
•
The terminal type to be used.
•
Enabling and disabling connections to devices from the console port. See “Connecting to devices from the
console port.”
•
The modem initialization character. See “Configuring and using dial-in connections.”
This command also covers:
•
The CLI access character that suspends a device session and puts the user in CLI command mode (this value can
be overridden at the port level). See “CLI mode.”
•
Local port history file processing options during connection and when a session ends. See “Managing port
history.”
•
The session time-out value, which indicates the period of inactivity that must occur before a session is ended (this
value can be overridden at the port level). See “Session time-out.”
Changing the SCS IP
To change the SCS IP, gateway, or subnet addresses, use the
server set
command. See “SCS commands.”
Updating firmware
To update the boot and application firmware on the SCS, use the
server FLASH
command. See “SCS commands.”
Rebooting or reinitializing the SCS
The SCS can be rebooted or reinitialized by pressing a button on the SCS or by issuing a command. See “Rebooting
the SCS” and “Reinitializing the SCS.”
Enabling and disabling features
Table 3-1
SCS feature reference
For information about using this feature
See this section
Accessing a Network Time Protocol (NTP) server to update the
time
“Updating the SCS clock”
Using an NFS server to store device session data
“NFS history files”
PPP “Using
PPP”
Using a RADIUS server for user authentication
“RADIUS authentication”
Using LDAP for directory based authentication
“LDAP authentication”
Security lock-out
“Using security lock-out”
Session sharing
“Session sharing”
SNMP
“Managing the SCS using SNMP”
SSH “Using
SSH”