Home WTI User's Guides
Warnings and Cautions
1. Introduction
2. Unit Description
2.1. Front Panel Indicators
2.2. Back Panel
3. Quick Start Guide
3.2. Hardware Installation
3.2.1. Apply Power to the NetLink II
3.2.2. Connect your PC to the NetLink II
3.3. Communicating with the NetLink II
3.3.1. Access via Console Port or Modem
3.3.2. Access via Network
3.4. Connect your PBX to the NetLink II
4. Hardware Installation
4.1. Connect the NetLink II to your Power Supply
4.2. Set-Up Switches
4.2.1. Console Port Password
4.2.2. Power Up Console Defaults
4.2.3 Modem Speaker
4.3. Reset to Defaults
4.4. Connecting Cables and Phone Line
4.4.1. PBX Input Port
4.4.2. Modem Port
4.4.3. Console Port
4.4.4. Network Port
5. Configuration
5.1. Command Mode Access
5.2. Menu System Conventions
5.3. Set System Parameters
5.3.1. The User Directory Administrator Access Adding New User Accounts Editing and Deleting User Accounts Viewing the User Directory
5.3.2 Real-Time Clock Settings
5.4. Port Configuration
5.4.1. PBX Serial Input Port Field Suppression; The Lucent Switch Feature
5.4.2. PBX IP Port Configuration
5.4.3. Console Port Configuration
5.4.4. Modem Port Configuration Dialback Security
5.4.5. Network Port Configuration The IP Security Feature The Email Text Messaging Parameters Menu PPP Dialout Configuration
5.4.6. Push File Configuration
5.4.7. Server Configuration
6. Menu System Description
6.1. Software Tree
7. Status Screens
7.1. Buffer Status Screen
7.2. File List Screen
7.4. The User Directory
7.5 PBX Port Status Screen
7.6. The PBX IP Port Status Screen
7.7. The Console Port Status Screen
7.8. The Modem Port Status Screen
7.9. The Network Port Status Screen
7.10. Scheduled Action Status Screens
7.11. PBX Inactivity Alarm Status Screens
7.12. 80 Full Alarm Status Screen
7.13. Data Filters Alarms Status Screen
7.15. Reason for Action Screen
7.16. Alarm Filter Clue Status Screens
8. The Data Filters
8.1. The Data Filter Configuration Menus
8.2. Defining the Data Filter Format
8.3. Defining Data Filter Clues
8.4. Logical and Relational Operators 8.4. Logical and Relational Operators
8.4.1. Logical AND-OR Conditions Logical AND Conditions Logical OR Conditions
8.4.2. The Contains String Operator
8.5. Real Time Variables
8.6. Assigning the Data Filter to a Port
8.7. Data Filter Definition Examples
9. The Alarm Filters
9.1. Common Types of Suspect Phone Activity
9.2. The Alarm Configuration Menu
9.2.1. Default Alarm Filter Actions
9.3. The Alarm Filter Configuration Menus
9.4. Defining the Alarm Filter Format
9.5. Defining Alarm Filter Clues
9.5.1. Alarm Clue Definition
9.5.2. Editing and Deleting Clues
9.6. Logical and Relational Operators
9.6.1. Logical AND-OR Conditions Logical AND Conditions Logical OR Conditions
9.6.2. The Contains String Operator
9.7. Real Time Variables
9.8. Assigning the Alarm Filter to a Port
9.9. Match Parameter Definition Examples
10. PBX Inactivity Alarms
10.1. Schedules and Timers
10.2. Enabling the PBX Inactivity Alarm
11. The 80 Full Alarm
12. Alarm Actions
12.1. Alarm Actions for Alarm Filter Clues
12.2. Alarm Action Summary
12.2.1. None
12.2.2. Callout
12.2.3. Alphanumeric Page
12.2.4. Numeric Page
12.2.6. Email Text Message
12.2.7. Console
12.3. The Auto Execute Function
13. Scheduled Actions
14. Saving NetLink II Parameters
14.1. Saving Parameters to Flash Memory
14.2. Saving and Restoring Parameters from an ASCII File
14.2.1. Saving Parameters to an ASCII File
14.2.2. Saving Parameters to an ASCII File
14.3. Configuring NetLink II with Saved Parameters
15. Buffer Functions
15.1. Memory Partitions and Shared Data
15.1.1. Partitions and Files
15.1.2. Setting the Partition
15.1.3. Releasing the Partition
15.2. Menu Driven Data Release
15.2.1. The Buffer Functions Menu
15.2.2. Read Session Parameters
15.3. Command Driven Data Release
15.3.1. Command B00
15.3.2. The B01 Command Line
15.3.3. Command B01 Examples
15.3.4. Other Commands Used During Data Release
15.4. Retrieving Data Using the Push Function
15.4.1. File Names Created by the Push Function
15.4.2. Push Start Time
15.5. Retrieving Data Using the Server Function
15.5.1. File Names Created by the Server Feature
15.6. The Auto Delete Function
15.7. Zmodem Data Release Mode
16. Other Menu Functions
16.1. System Functions
16.1.1. Pass-Through Mode
16.1.2. Monitor Mode
16.1.3. Clear Alarm Condition
16.1.4. Clear Alarm Counters
16.1.5. Download Parameters
16.1.6. Audit Trail
16.1.7. Upload Firmware
16.1.8. Download SSH Server Keys
16.2. System Diagnostics
16.2.1. Load and Test Memory
16.2.2. Send Test Message
16.2.3. Test Pager
16.2.4. Send Test SNMP
16.2.5 Send Test SYSLOG Message
16.3. Reboot System
17. Command Reference Guide
17.1. Command Mode Access
17.2. Command Help
17.3. Command Syntax
17.4. Command Summary
A. Specifications
B. Description of System Interfaces
B.1. Serial PBX Input Port
B.2. Console Port
C. Administrator Functions and User Functions
C.1. Security Mode at Start Up
C.2. Dialback Security
C.3. Administrator Mode and User Mode Functions
D. Alarm Clue Definition Tips
D.1. Headers Banners and Other Non-Data
D.1.1. The Comparative Operators
D.1.1.1. Limit Comparisons
D.1.1.2. Exclude Non-Data Characteristics
D.1.2. Exact Match with PBX Call Record Format
D.2. Programming Support
E. SSH Application Notes
E.1. Windows XP - Assign a User Name
E.2. Create the User Name in the WINSSHD Application
E.3. Generate Netlink client keys
E.4. Import the Client Keys Into the WINSSHD Application
E. Customer Service
PollCat NetLink II B

1. Introduction


The PollCat NetLink II Call Accounting Terminal is a highly reliable, PBX data recorder designed for SMDR/CDR data collection and alarm monitoring. The NetLink II can collect data from an RSP compatible PBX via a TCP/IP connection, and can also collect data from a conventional PBX switch via a serial port connection. Collected call records can be retrieved via TCP/IP network, via FTP client, via modem, or by a local PC connected directly to the NetLink II unit.

In addition to storing call data, NetLink II can also monitor call records for suspicious phone activity or critical alarm conditions. When an alarm is detected, the unit can immediately notify the proper personnel by pager, modem, email or SNMP trap. The NetLink II also provides secure access to connected serial devices such as PBX maintenance ports or Console/AUX ports.

Network and Modem Access

All command functions, including data retrieval and unit configuration, can be accessed via network, modem or local PC. When the NetLink II is installed in a TCP/IP environment, Telnet is used to access the command mode. If out-of-band access is required, you can also dial-up NetLink II’s internal modem. Stored data can be reliably retrieved using your terminal emulation program, or SFTP/FTP client.  Password protection and dialback security prevent unauthorized access to control functions.

RSP Compatibility

In addition to collecting data via a conventional serial port connection to your PBX switch, the NetLink II can also collect data from remote RSP compatible PBX switches such as an Avaya PBX.  Call records are sent from the RSP format PBX to the NetLink II unit via a TCP/IP connection, and then stored safely until they are needed by your call accounting system.

Nonvolatile Flash Memory

NetLink II uses reliable, low-cost flash memory to store operating parameters and configuration information  This eliminates the need to check and replace depleted batteries. If power to the unit is interrupted or disconnected, stored parameters can be retained for up to one year.  Call records are stored on reliable, battery backed SRAM memory.

SNMP Traps

Alarm messages, memory full status, and a variety of other conditions can be reported to your network manager via standard SNMP traps.  SNMP Traps can be used to provide notification when an alarm event  occurs, or to perform a wellness check at user selected time intervals.

Alarm Notification Via Email

The NetLink II can provide prompt notification via email when it’s memory is nearly full, when the data flow from the PBX is interrupted, or when one of the user-defined alarms is activated.  Alarm Notification can be sent to two user defined email addresses, and can be configured to include a message that describes the alarm, the exact call record that triggered the alarm, and current unit status.

Easy Firmware Upgrades

When program upgrades are available, there is no need to struggle while removing the old EPROM and installing an updated chip. NetLink II’s flash memory allows you to upload the latest firmware revisions via modem or console port.

Disclaimer on Toll Fraud

We do not guarantee that if you use the NetLink II, you will not become  the victim of toll fraud. We provide this device to assist you in minimizing your exposure to such losses. By monitoring call records as they are received, you can potentially catch calls that should not be made before they escalate and cost you large sums of money.  However, responding to alarms and determining what is fraud and abuse are still up to you. Western Telematic, Incorporated assumes no responsibility for any losses due to improper use of this product.

Typographic Conventions

In this user’s guide, typefaces and characters are used as follows:

^(e.g., ^B) Indicates a key combination used to invoke a command. For example, "^B" (Control B) indicates that the [Ctrl] key and [B] key should be pressed simultaneously.

COURIER FONT Indicates characters typed on the keyboard. For example, ^B16or ^B01.

[Bold Font] Text set in bold face and enclosed in square brackets indicates a specific key.  For example, [Enter] or [Esc]