• Share
  • Email
  • Embed
  • Like
  • Save
  • Private Content
Software Configuration: Loading Software into a BANDIT? Product
 

Software Configuration: Loading Software into a BANDIT? Product

on

  • 330 views

 

Statistics

Views

Total Views
330
Views on SlideShare
330
Embed Views
0

Actions

Likes
0
Downloads
0
Comments
0

0 Embeds 0

No embeds

Accessibility

Categories

Upload Details

Uploaded via as Adobe PDF

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

    Software Configuration: Loading Software into a BANDIT? Product Software Configuration: Loading Software into a BANDIT? Product Document Transcript

    • ! encor e n etworks • TM Version A.1, March 2008 Copyright 2008 Encore Networks, Inc. All rights reserved. Loading Software into a BANDIT™ Product Y our BANDIT™ device has been shipped with the latest version of the Encore Legacy-to-IP Operating System™ (ELIOS™) software installed. However, when the ELIOS™ software is revised, you will want to load the revised software into your BANDIT. Note: When you upgrade the ELIOS software, the upgrade reloads the BANDIT’s saved configuration. Make sure you have saved the current configuration before you load new software. See Saving (Writing) a Configuration. ! Caution: If you have replaced hardware in this device, make sure you have also reconfigured the device’s software to reflect the hardware change. Also be sure to save (Write) that new configuration before loading a software upgrade. You must do all of this before updating the software. If you upgrade software before reconfiguring for any hardware changes, the software upgrade may not perform optimally. The following overview outlines the process for loading application software: 1 A BANDIT device has two code regions for application software. One region is active at a time. Before you load new software, check to see which region of the BANDIT code is active. See Section D.1, Determining the Active Code Region for Application Software. 2 You can load updated ELIOS™ software into the BANDIT in the following ways: Option A: You can download the software from the control terminal (through the Supervisory Port). See Section D.2, Downloading BANDIT Application Software from the Control Terminal (via Flash). Option B: You can download the software from the network (through the LAN port). See Section D.3, Downloading BANDIT Application Software from the Network (via TFTP). 3 After you have downloaded the new application software (and, if you updated via Option B, after you have saved the new software configuration and have reset the BANDIT), you must make the new software the primary code region and you must make it the active code region. See Section D.4, Making the New Application Software Primary and Active. For information on trademarks, safety, limitations of liability, and Home Module: Software Configuration similar topics, see Notices. Document D
    • D-2 Software Configuration, Document D D.1 Determining the Active Code Region for Application Software 1 On the Main Menu, select System Administration. Main Menu ---------- 1) QuickStart Config Builder 2) Typical Configurations 3) Advanced Configurations 4) Tools V) View Current Unit Status L) Load Factory Defaults P) Load Plug and Play Defaults W) Write Configuration R) Reset Unit X) eXit Session S) Statistics Y) sYstem Administration Enter Choice : ❖ The system requests a password. Enter System Admin Password: 2 Type the administrative password and press Enter. (Default passwords are listed in Default Passwords. If your organization requested a specific password, check with your network administrator.) ❖ After you enter the correct password, you see the following message. System remembers this password until user exits or times out ❖ Then the System Administration menu is displayed.
    • Loading Software into a BANDIT™ Product D-3 System Administration ---------------------- 1) Passwords 2) SNMP Configuration 3) Database Management 4) Telnet Terminal 5) Port Data Capture 6) SNMP Triggered TRAPs C) Copy Configuration N) Network Download V) VPN Commands 7) Program RDU Flash Enter Choice : 3 On the System Administration menu, select Database Management. ❖ The Database Administration menu is displayed. Database Administration ------------------------ 1) Flash Memory Management 2) BANDIT Database Management 3) Code Region Priority Enter Choice : 4 On the Database Administration menu, select Code Region Priority. ❖ The Code Region Priority menu is displayed. Code Region Priority --------------------- 1) Region #1 : Primary(Active) 2) Region #2 : Secondary Enter Choice : 5 Do all of the following: a Note the number of the code region that is Active. We will use the variable a to represent this code region number. Note: The BANDIT always uses the software in the Active code region. b Also note whether the Active code region a is the Primary code region. Note: We will load the new software into the code region that is not active. We will use the variable b to represent this code region number. 6 Because we want to load software into the inactive code region b, the active region a must also be the primary code region. Do one of the following:
    • D-4 Software Configuration, Document D a If the Active region a is the Primary code region, go to Step 7. b If the Active region a is not the Primary code region, select Region #a and make its priority Primary. Enter Region Priority (1 (Primary) or 2 (Secondary)): 7 Do all of the following: a Press Escape to return to the Database Administration menu. b On the Database Administration menu, select Flash Memory Management. ❖ The Flash Memory Management menu is displayed. Flash Memory Management ------------------------ 1) FLASH Sector Use Report 2) FLASH Memory Map Report R) Erase Inactive Code Region S) Erase Flash Sector Enter Choice : c On the Flash Memory Management menu, select Erase Inactive Code Region. ❖ The following warning is displayed. WARNING! This action will disable BANDIT functionality for at least 50 seconds. Delete region #b. Are you sure? (Y or N): d Answer y. ❖ A message similar to the following is displayed. Code region b is being erased. Erasing Region #b: Sectors 72 to 127. Please wait !! Note: It may take a couple of minutes to erase the region. ❖ When the erasure has finished, the Flash Memory Management menu is displayed again. 8 Press Ctrl Z once, or press Escape until you reach the Main Menu. ❖ The Main Menu is redisplayed.
    • Loading Software into a BANDIT™ Product D-5 9 To save this configuration (with code region b empty), do the following: a On the Main Menu, select Write Configuration. ❖ The Write Configuration menu is displayed. Write New Configuration to Memory ---------------------------------- Y) Yes N) No Are You Sure? : b Select Yes. ❖ The BANDIT asks for the Write password. Enter WRITE Password: Note: Default passwords are listed in Default Passwords. c Enter the password. ❖ The configuration will be saved. When the configuration has been saved, the following message is displayed. Configuration SAVED Press Any Key to Continue d Press Enter. ❖ The Main Menu is redisplayed. 10 To reset the BANDIT device to use the saved configuration, do the following: a On the Main Menu, select Reset Unit. ❖ The Reset Unit menu is displayed. Reset Unit ----------- Y) Yes N) No Are You Sure? : b Select Yes. ❖ The unit resets.
    • D-6 Software Configuration, Document D Resetting this Unit, Please Wait... ❖ When the unit starts to reset, the BANDIT’s login banner is displayed. ***************************************************** BANDIT, ENCORE NETWORKS INC ***************************************************** Note: This banner displays again after the BANDIT has finished resetting. ❖ Then you will see the login prompt. Press <ENTER> to login 11 After you see the login prompt, press Enter. ❖ The Main Menu is displayed. 12 Do all of the following: a Perform Step 1 through Step 5 to verify that the Active code region is now the Primary region, and that the region you erased is Unused. Code Region Priority --------------------- 1) Region #1 : Primary(Active) 2) Region #2 : Unused Enter Choice : b Press Escape until you reach the Main menu (or press Ctrl z once). 13 Continue to one of the following sections: • Section D.2, Downloading BANDIT Application Software from the Control Terminal (via Flash) • Section D.3, Downloading BANDIT Application Software from the Network (via TFTP)
    • Loading Software into a BANDIT™ Product D-7 D.2 Downloading BANDIT Application Software from the Control Terminal (via Flash) Note: Make sure you have performed the procedure in Section D.1, Determining the Active Code Region for Application Software. 1 Make sure the BANDIT device’s Supervisory port is connected to the COM port of a PC or another control terminal. 2 If a terminal-emulation session (for example, HyperTerminal) is not already open, open one. Set the communication parameters as shown in Table D-1. Table D-1. BANDIT Communication Parameters Parameter Setting Baud rate 9600 Data bits 8 Parity none Stop bits 1 Flow control none 3 If the BANDIT’s power is on, turn it off. 4 Turn the BANDIT’s power on. Watch for the start-up banner. BANDIT 2002, ENCORE NETWORKS, INC. ***************************************************** BOOTING..., YOU MAY ENTER ATTENTION SEQUENCE FROM NOW TILL ONLINE --> 5 When you see the start-up banner, type the attention sequence. INITIALIZING EXTENDED DRAM AND SOME REGISTERS TO GO OFFLINE ENTER ATTENTION SEQUENCE... Note: The attention sequence is Control T, then Shift 7. (Shift 7 is usually the ampersand character, &). ❖ The system goes off line. GOING OFFLINE VIA ATTENTION SEQUENCE ❖ Then the system displays the firmware and hardware startup information.
    • D-8 Software Configuration, Document D **************************************************** ENCORE NETWORKS. RELEASE DATE 2002/09/24 FIRMWARE VERSION 15453.0101 **************************************************** ****************** BANDIT SYSTEM HARDWARE MAP **************** Board Id = 0 ❖ Then the system displays the Broadband Off-Line menu. ----BROADBAND OFF-LINE MENU ---- B) GO ON-LINE D) LOW LEVEL OPERATIONS ENTER YOUR SELECTION: 6 Select Low Level Operations and press Enter. ❖ The system displays the BANDIT Diagnostic Low Level Operations menu, similar to the following. ---- BANDIT DIAGNOSTIC LOW LEVEL OPERATIONS MENU ---- A) LOAD BOOTCODE VIA CONSOLE B) FLASH APPLICATION VIA CONSOLE C) RUN APPLICATION D) DEBUG L) LOAD DEFAULT CONFIGURATION ENTER YOUR SELECTION: 7 Select Flash Application via Console and press Enter. ❖ The system prompts the user to enter the code region (1 or 2). ********* BSP APPLICATION FLASH BURN FROM DRAM *********** ENTER CODE REGION (1 or 2): -> 8 You need to load the new code into region b, the code region that you erased in Section D.1, Determining the Active Code Region for Application Software. Type b and press Enter, where b is the code region you erased. ❖ The system asks for confirmation.
    • Loading Software into a BANDIT™ Product D-9 DO YOU WISH TO CONTINUE ? ENTER Y (CAPS) to continue or <cr> to exit 9 To continue, type Y and press Enter. ❖ The system indicates that it will erase the selected region b, and asks for confirmation. ALL APPLICATION REGION b FLASH WILL BE ERASED TO PERFORM THE WRITE DO YOU WISH TO CONTINUE ? ENTER Y (CAPS) to continue or <cr> to exit 10 Again, type Y and press Enter to continue. Note: Even if you have already erased code region b, answer Y, to allow this routine to continue. ❖ The system starts erasing the indicated code region. ONE MOMENT PLEASE ... ERASING BSP APPLICATION FLASH, ADDR 0x01200100, PLEASE WAIT... Note: It may take a couple of minutes to erase the region. ❖ After the code region has been erased, the system prompts for the baud rate for file transfer. Please enter the baud rate: 1) 9600 bps 2) 38400 bps 3) 57600 bps 4) 115200 bps Your Selection [1]--> 11 Select 57600 bps and press Enter. ❖ The following message is displayed. Please set your monitor to 57600 and press enter 12 If you will use a different application to transfer the code, do the following. Otherwise, go to Step 13.
    • D-10 Software Configuration, Document D a Disconnect the management application’s electrical connection (i.e., its software connection) from the BANDIT. (But leave the physical connection—the cable between the PC and the BANDIT—in place.) Note: If the management application software can be disconnected without being closed, leave the management application open. b Open an application that can transfer files. Note: The transfer application you select can use a menu, a graphic user interface, or a command line interface. ! Caution: If you did not disconnect the management application’s electrical connection, the transfer application will be unable to connect to the BANDIT. You may see a message similar to the following message. Figure D-1. Message That Communication Port Cannot Be Opened c If you see the message in Figure D-1, close the message and repeat Step 12. Note: After the transfer application opens, you may see a message similar to the following. CARRIER DETECTED, Send modem initialization [Y/N] ? d If you see this message, answer N (no). The transfer will not take place across a LAN. It will take place over the direct connection between the terminal (console) and the BANDIT. ❖ The transfer application shifts to terminal mode. You are now in TERMINAL mode 13 In the transfer application, do the following: a Set the PC’s baud rate to 57600 bps. ❖ After you have changed the baud rate, the transfer application window is displayed again.
    • Loading Software into a BANDIT™ Product D-11 b Press Enter. ❖ A message similar to the following message appears in the transfer application window. Please start Downloading now.. Note: Because the file resides on the PC that is running the transfer application, we will upload the file from the PC (according to the PC’s point of view). ! Caution: If you do not see a message to start downloading, or if the screen displays unexpected characters (for example, δ, ¬, or φ), the baud rates do not match. In this case, perform Step 13a and Step 13b again. c Set the upload protocol to ASCII. ❖ A window is displayed, asking for the name of the file to transfer. d Type the full path and filename (as shown in the example below), and press Enter to start transferring the file to the BANDIT. G:BANDT_SW64070200.RX ❖ The application starts transferring the file to the BANDIT. The transfer application’s window may show the progress of the transfer (by indicating the number of bytes sent). Note: The file transfer may take 20 minutes or more. Wait until the file transfer has completed. There are two parts (steps) in the file transfer when performed from the control terminal: Part 1: • Uploading the code ❖ When the first part (the upload) has completed, you may hear a soft beep. The screen may display a message similar to the following. checksum cal: 0xe8f890f0 code downloaded successfully. please wait... erasing bsp application flash, addr 0x01200100, please wait... Part 2: • Programming the uploaded code ❖ After the upload has completed, the transfer starts the second part (programming the code). The transfer application’s window may show the programming progress (for example, as a progression of dots).
    • D-12 Software Configuration, Document D programming 4579184 bytes. please wait ... . . . . . . . . ❖ When the programming has completed, the transfer application screen displays the BANDIT Diagnostic Low Level Operations menu. ---- BANDIT DIAGNOSTIC LOW LEVEL OPERATIONS MENU ---- A) LOAD BOOTCODE VIA CONSOLE B) FLASH APPLICATION VIA CONSOLE C) RUN APPLICATION D) DEBUG L) LOAD DEFAULT CONFIGURATION ENTER YOUR SELECTION: e In the transfer application, after the file transfer has finished, change the baud rate of the control console to 9600 bps. 14 If you used the same application for the management connection to the BANDIT and for the file transfer, go to Step 15. Otherwise, do the following. Note: In this step’s discussion, the terms “connection,” “connect,” and “disconnect” refer to the electrical connection between devices. In this step’s discussion, the terms do not refer to the physical connection. a If the transfer application requires a separate step to disconnect communication with the BANDIT, disconnect the application. Note: Some transfer applications automatically disconnect communication when they are properly closed. b Close the transfer application. ! Caution: Use the transfer application’s defined method of closing. (That is, use the transfer application’s exit command.) Do not use the operating system’s default closing routine to close the transfer application, because that may not disconnect the application. In such a case, the BANDIT may retain the connection to the transfer application, preventing the management application from reconnecting to the BANDIT. If the BANDIT will not allow the management application to reconnect, re-open the transfer application. Then use the transfer application’s commands to disconnect and close properly. c Reconnect the management application. 15 Unplug the BANDIT to turn its power off; then plug the BANDIT back into its power source. ❖ The BANDIT restarts. (This also resets the BANDIT’s baud rate to 9600.)
    • Loading Software into a BANDIT™ Product D-13 ***************************************************** BANDIT 2002, ENCORE NETWORKS, INC. ***************************************************** BOOTING..., YOU MAY ENTER ATTENTION SEQUENCE FROM NOW TILL ONLINE --> ... ... INITIALIZING EXTENDED DRAM AND SOME REGISTERS TO GO OFFLINE ENTER ATTENTION SEQUENCE... CHECKING CODE REGION 2 Calculated checksum = 0x4eb2cd0b, stored = 0x4eb2cd0b GOING ONLINE, PLEASE WA ❖ When the BANDIT has restarted, the login banner is displayed. ***************************************************** BANDIT, ENCORE NETWORKS INC ***************************************************** Press <ENTER> to login 16 Press Enter. ❖ The version information and copyright information are displayed. Then the Main Menu is displayed. Welcome to BANDIT Product --15535.0600 Copyright ENCORE NETWORKS Inc., 2002-2003. Main Menu ---------- 1) QuickStart Config Builder 2) Typical Configurations 3) Advanced Configurations 4) Tools V) View Current Unit Status L) Load Factory Defaults W) Write Configuration R) Reset Unit X) eXit Session S) Statistics Y) sYstem Administration Enter Choice : Note: The new software resides in the unit. It is not yet active.
    • D-14 Software Configuration, Document D 17 Go to Section D.4, Making the New Application Software Primary and Active. D.3 Downloading BANDIT Application Software from the Network (via TFTP) Note: Make sure you have performed the procedure in Section D.1, Determining the Active Code Region for Application Software. In addition, the BANDIT device’s LAN port must be connected to the network. 1 Make sure a network host in your LAN has a TFTP server. Note: The network host must contain the ELIOS™ software update (for example, 55350600.RX) and a TFTP server application. 2 On the network host, start the TFTP server application and do the following: a Verify the TFTP host’s IP address. b Make sure the new software file (for example, 55350600.RX) is in the TFTP directory. c Leave the TFTP application open. 3 Make sure the BANDIT’s LAN port is connected to the network that the host resides on. Note: If you are using a laptop PC as a temporary host, you can connect the BANDIT’s LAN port to the host’s LAN port. You will still have to configure the IP addresses used for this procedure. ❖ When the BANDIT is connected to a LAN, the Link LED for the BANDIT’s LAN port stays on. 4 On the BANDIT’s Main Menu, select Advanced Configurations. Main Menu ---------- 1) QuickStart Config Builder 2) Typical Configurations 3) Advanced Configurations 4) Tools V) View Current Unit Status L) Load Factory Defaults W) Write Configuration R) Reset Unit X) eXit Session S) Statistics Y) sYstem Administration Enter Choice : ❖ The Advanced Configurations menu is displayed.
    • Loading Software into a BANDIT™ Product D-15 Advanced Configurations ------------------------ 1) Physical Configurations 2) Data Configurations 3) Local Address 4) Routing 5) Global Paths Enter Choice : 5 On the Advanced Configurations menu, select Local Address. ❖ The Configure Local Addresses menu is displayed. Configure Local Addresses -------------------------- 1) IP Address : 0.0.0.0 2) BANDIT Name : Enter Choice : 6 Select IP Address. ❖ The following prompt appears. Enter Local IP Address (N.N.N.N) : 7 If the BANDIT does not already have an IP address, type one and press Enter. Note: Get all IP addresses (even temporary IP addresses) from your network administrator. The BANDIT and the host must be in the same network. If you are setting up a temporary connection (e.g., with a laptop as host), you can assign the BANDIT a temporary IP address in the same subnet as the host. For example, if the host’s IP address is 192.168.202.6 and its subnet mask is 255.255.255.0, you can give the BANDIT an IP address of 192.168.202.x, where x is any unused value between 0 and 255. (So x cannot be 6 or any other value already used in the subnet.) Your network administrator can provide an appropriate value for x. However, when the BANDIT resumes function as a network gateway, it must use the permanent IP address assigned by the network administrator. ❖ The Configure Local Addresses menu is displayed again, with the IP address you entered. 8 Press Escape to return to the Advanced Configurations menu.
    • D-16 Software Configuration, Document D 9 On the Advanced Configurations menu, select Routing. ❖ The Configure Routing menu is displayed. 10 On the Configure Routing menu, select IP Routing. ❖ The IP Routing Configuration menu is displayed. 11 On the IP Routing Configuration menu, select IP Routing Method and set it to Static. 12 Then, still on the IP Routing Configuration menu, select Static Routing. ❖ The Static Routing Parameters menu is displayed. 13 On the Static Routing Parameters menu, select IP Routing Table. ❖ If the Static IP Routing Table does not yet exist, it prompts you for the first record in the table. Go to Step 15. Add IP Routing Table Entry Enter Low IP Address (N.N.N.N) : ❖ If the Static IP Routing Table already exists, it is displayed. Entry Low IP Address High IP Address Gpt Name MTU Priority 1 192.168.202.6 192.168.202.10 LAN 1500 Add, Modify, or Delete an Entry? (Enter A, M, or D): 14 If the Static IP Routing Table is displayed, select A (to add a record). ❖ The BANDIT prompts you for the new record in the table. Add IP Routing Table Entry Enter Low IP Address (N.N.N.N) : 15 The routing table must tell the BANDIT how to get to the TFTP server’s IP address. In the following substeps, we set up a route that uses the LAN port to reach the TFTP server. Do the following: a In Step 7, you configured the BANDIT to be in the same subnet with the TFTP server. Type the lowest IP address in this subnet, and press Enter. Note: This IP address is based on the subnet mask. Ask your network administrator what this IP address will be. ❖ The BANDIT presents the next field in the record:
    • Loading Software into a BANDIT™ Product D-17 Enter High IP Address (N.N.N.N) : b Type the highest IP address in the subnet, and press Enter. Note: This IP address is based on the subnet mask. Ask your network administrator what this IP address will be. ❖ The BANDIT presents the next field in the record: Enter Path Name (1 to 10 Characters): LAN c For the path name, type LAN and press Enter. ❖ If the path already exists, a prompt asks which NAT configuration scheme to use. Go to Step 15g. Enter NAT Configuration Number ( 0 = None ) : ❖ If the path does not yet exist, the BANDIT prompts you to configure the path. Path Name Does Not Exist In GPT Table. To Add Global Path Entry, Press ’Y’or <enter>. Press Escape Otherwise.y d Enter y to configure the path. ❖ The Global Path Types menu is displayed. Global Path Types ------------------ 1) X25 SVC 2) X25 PVC 3) Frame Relay PVC 4) Port Type 5) IP/UDP Enter Choice : (1 to 5)[1] : 4 e This route uses a specific port. Select Port Type. ❖ A prompt asks which port to use. Enter Port Number (L (LAN),W (WAN),M (MODEM), S (SERIAL),): L
    • D-18 Software Configuration, Document D f Select the LAN port. ❖ The BANDIT adds the path to the Global Path Table. GPT Entry added. ❖ Then the BANDIT asks which NAT configuration scheme to use for this record in the routing table. Enter NAT Configuration Number ( 0 = None ) : g This route will not use a NAT scheme. If the default is None, press Enter. Otherwise, enter 0 (zero). ❖ Then the BANDIT asks for the Maximum Transfer Unit (MTU). Enter the MTU (256 to 1500)[1500] : h If the default MTU is 1500, press Enter. Otherwise, enter 1500. ❖ The BANDIT adds this record to the Static IP Routing Table. Entry Added ❖ Then the BANDIT asks for information for the next new record in the table. Enter Low IP Address (N.N.N.N) : i Press Escape. ❖ The Static IP Routing Table is displayed. It contains the path you just entered. (It may also contain additional paths.) Entry Low IP Address High IP Address Gpt Name MTU Priority 1 192.168.202.6 192.168.202.10 LAN 1500 Add, Modify, or Delete an Entry? (Enter A, M, or D):
    • Loading Software into a BANDIT™ Product D-19 16 When you have finished configuring the static routing table, press Escape until you reach the Main Menu. 17 Select System Administration. 18 When the BANDIT requests a password, type the password. Note: Default passwords are listed in Default Passwords. ❖ The System Administration menu is displayed. 19 On the System Administration menu, select Network Download. ❖ The Network Download menu is displayed. Network Download ----------------- 1) TFTP Host IP Address : 0.0.0.0 2) Code File Name : 3) TFTP Time-out : 4 R) Erase Inactive Code Region I) Initiate Network Download S) Status P) Code Region Priority Enter Choice : 20 Select TFTP Host IP Address. ❖ A prompt for the IP address is displayed. Enter TFTP Host Address (N.N.N.N) : 21 Type the TFTP server’s IP address and press Enter. (This is the IP address you verified in Step 2a.) ❖ The Network Download menu is redisplayed, with the entered IP address. 22 On the Network Download menu, select Code File Name. ❖ The following prompt appears. Enter TFTP File Path / Name (Maximum 64 characters): 23 Type the filename you wish to download (for example, 55350600.rx), and press Enter.
    • D-20 Software Configuration, Document D Note: For a network download, do not include the path in this entry. Type the filename exactly as it appears in the host’s TFTP directory, including capitalization. (You checked this in Step 2b.) ❖ The Network Download menu is redisplayed, with the entered filename. 24 On the Network Download menu, select TFTP Time-out. ❖ A prompt asks how long to wait before dropping the transfer, if there is a period of no transmission between the host and the BANDIT. Enter TFTP timeout in seconds (1 - 20): 25 Enter the maximum number of seconds (20) and press Enter. ❖ The Network Download menu is redisplayed. 26 Press Escape until you reach the Main Menu. 27 On the Main Menu, select Write Configuration. ❖ A confirmation menu is displayed. Write New Configuration to Memory ---------------------------------- Y) Yes N) No Are You Sure? : 28 Select Yes to save the configuration. Enter the password. (Default passwords are listed in Default Passwords.) ❖ The BANDIT saves the configuration. When the system has finished writing the configuration, the Main Menu is displayed again. 29 On the Main Menu, select Reset Unit. ❖ A confirmation menu is displayed. Reset Unit ----------- Y) Yes N) No Are You Sure? : 30 Select Yes. ❖ The BANDIT restarts.
    • Loading Software into a BANDIT™ Product D-21 Resetting this Unit, Please Wait... ❖ When the BANDIT is ready, the login screen is displayed. ***************************************************** BANDIT, ENCORE NETWORKS INC ***************************************************** Press <ENTER> to login 31 Press Enter. ❖ The Main Menu is displayed. 32 Select System Administration. 33 When the BANDIT requests a password, type the password. Note: Default passwords are listed in Default Passwords. ❖ The System Administration menu is displayed. 34 On the System Administration menu, select Network Download. ❖ The Network Download menu is displayed. 35 On the Network Download menu, select Initiate Network Download. ❖ A confirmation prompt appears. Initiate Network Download. proceed? (Y or N): 36 Answer y. ❖ A message similar to the following is displayed. Please wait while the Net Load starts. . . . Transfer beginning! ❖ When the download starts, the Activity LED for the BANDIT’s LAN port starts blinking. It continues to blink as long as data is being transmitted across the connection. Note: It takes 5 to 10 minutes to download the software. After the transfer starts, the Network Download menu is redisplayed. You can select Status to monitor the file transfer.
    • D-22 Software Configuration, Document D Network Loader Statistics _________________________ Network Loader State: Programming Number of Attempted Transfers: 1 Number of Successful Connections: 1 Number of Failed Transfers: 0 Number of Completed Transfers: 0 Present / Last File Transfer File Transfer State: Active Bytes Received: 193033 Starting Region Address: 0x0 Present FLASH Write Address: 0x52618 Ending Region Address: 0x0 Press Any Key to Continue ... Enter "C" to Clear Statistics, "ESC" to Return and Any Other Key to Refresh Statistics ❖ When the download has completed, a message similar to the following is displayed. Then the Network Download menu is redisplayed. Download successful. Note: This message is not displayed if the screen is displaying information on status or statistics. However, if you select Status on the Network Download menu, the display shows Idle and Transfer Complete. Network Loader Statistics _________________________ Network Loader State: Idle Number of Attempted Transfers: 1 Number of Successful Connections: 1 Number of Failed Transfers: 0 Number of Completed Transfers: 1 Present / Last File Transfer File Transfer State: Transfer Complete Bytes Received: 6903423 Starting Region Address: 0x0 Present FLASH Write Address: 0x29B7B4 Ending Region Address: 0x0 Press Any Key to Continue ... Note: Unlike file transfer over the Supervisory port, this file transfer over the LAN port does not program the code after downloading.
    • Loading Software into a BANDIT™ Product D-23 37 Press Escape until you return to the BANDIT’s Main Menu, and save (Write) the configuration. 38 Reset the unit. ❖ The new software resides in the unit. It is not yet active. 39 Go to Section D.4, Making the New Application Software Primary and Active. Note: If you changed the BANDIT device’s IP address during any of the download procedure, you will change it back to its permanent IP address after completing the procedure in Section D.4, Making the New Application Software Primary and Active. ! Caution: Do not change the IP address until you have completed that procedure. D.4 Making the New Application Software Primary and Active 1 Make sure you have loaded the new software into the BANDIT device, according to a procedure in one of the following sections: • Section D.2, Downloading BANDIT Application Software from the Control Terminal (via Flash) • Section D.3, Downloading BANDIT Application Software from the Network (via TFTP) 2 On the BANDIT device’s Main Menu, select System Administration. 3 When the BANDIT requests the System Administration password, type the password and press Enter. Note: Default passwords are listed in Default Passwords. ❖ The System Administration menu is displayed. System Administration ---------------------- 1) Passwords 2) SNMP Configuration 3) Database Management 4) Telnet Terminal 5) Port Data Capture 6) SNMP Triggered TRAPs C) Copy Configuration N) Network Download V) VPN Commands 7) Program RDU Flash Enter Choice : 4 On the System Administration menu, select Database Management. ❖ The Database Administration menu is displayed.
    • D-24 Software Configuration, Document D Database Administration ------------------------ 1) Flash Memory Management 2) BANDIT Database Management 3) Code Region Priority Enter Choice : 1 5 On the Database Administration menu, select Code Region Priority. ❖ The Code Region Priority menu is displayed. The downloaded Region b says Secondary. Code Region Priority --------------------- 1) Region #1 : Primary(Active) 2) Region #2 : Secondary Enter Choice : 6 Select Region #b and make its priority Primary. Enter Region Priority (1 (Primary) or 2 (Secondary)): ❖ The Code Region Priority menu is displayed again. The uploaded Region b now says Primary. (It is not yet Active.) Code Region Priority --------------------- 1) Region #1 : Secondary(Active) 2) Region #2 : Primary Enter Choice : 7 Press Ctrl Z once, or press Escape until you reach the Main Menu. ❖ The Main Menu is redisplayed. 8 On the Main Menu, save (Write) the configuration. 9 Then Reset the BANDIT. 10 After the BANDIT has restarted, use Step 2 through Step 5 to see the code region priority again. ❖ The new code region now says Primary and Active.
    • Loading Software into a BANDIT™ Product D-25 Code Region Priority --------------------- 1) Region #1 : Secondary 2) Region #2 : Primary(Active) Enter Choice : 11 Press Ctrl Z once, or press Escape until you reach the Main Menu. 12 On the Main Menu, select View Current Unit Status. ❖ The BANDIT’s current information is displayed. View Current Unit Status ------------------------ Active Code Region : 2 Active Database : 2 Board ID : 25 Feature Set : Undefined Software Version : 16407.0200 Build Date : 11:15:09 09/13/07 Snmp Mib Version : 5.0.6 WAN MAC Address : 00A0EB666666 LAN MAC Address : 00A0EB666667 Code Server Address : 0.0.0.0 Memory Utilization Buffer Utilization : 4% EEPROM Utilization : 51% Last EEPROM Write Time : 0 seconds CPU Utilization Factor : 0 Time Since Last Reset/Powerup : 0 days 0 hours 0 minutes 45 seconds Press Any Key to Continue ... Note: The Active Code Region should show the region you updated (region b). If the Software Version (16407 in the example) and extension (0200 in the example) match the number and extension of the software version you uploaded, the BANDIT is using the updated ELIOS™ software. ! Caution: If you changed the BANDIT device’s IP address during any of the download procedure, make sure you reconfigure the BANDIT with the permanent IP address assigned by your network administrator. Otherwise, the BANDIT will not be identified properly in the WAN, and other devices will not be able to find the BANDIT.
    • D-26 Software Configuration, Document D