Home WTI User's Guides
cover
Warnings and Cautions
1. Introduction
2. Unit Description
2.1. Front Panel Indicators
2.2. Back Panel
3. Quick Start Guide
3.2. Hardware Installation
3.2.1. Apply Power to the NetLink II
3.2.2. Connect your PC to the NetLink II
3.3. Communicating with the NetLink II
3.3.1. Access via Console Port or Modem
3.3.2. Access via Network
3.4. Connect your PBX to the NetLink II
4. Hardware Installation
4.1. Connect the NetLink II to your Power Supply
4.2. Set-Up Switches
4.2.1. Console Port Password
4.2.2. Power Up Console Defaults
4.2.3 Modem Speaker
4.3. Reset to Defaults
4.4. Connecting Cables and Phone Line
4.4.1. PBX Input Port
4.4.2. Modem Port
4.4.3. Console Port
4.4.4. Network Port
5. Configuration
5.1. Command Mode Access
5.2. Menu System Conventions
5.3. Set System Parameters
5.3.1. The User Directory
5.3.1.1. Administrator Access
5.3.1.2. Adding New User Accounts
5.3.1.3. Editing and Deleting User Accounts
5.3.1.4. Viewing the User Directory
5.3.2 Real-Time Clock Settings
5.4. Port Configuration
5.4.1. PBX Serial Input Port
5.4.1.1. Field Suppression; The Lucent Switch Feature
5.4.2. PBX IP Port Configuration
5.4.3. Console Port Configuration
5.4.4. Modem Port Configuration
5.4.4.1. Dialback Security
5.4.5. Network Port Configuration
5.4.5.1. The IP Security Feature
5.4.5.2. The Email Text Messaging Parameters Menu
5.4.5.3. PPP Dialout Configuration
5.4.6. Push File Configuration
5.4.7. Server Configuration
6. Menu System Description
6.1. Software Tree
7. Status Screens
7.1. Buffer Status Screen
7.2. File List Screen
7.4. The User Directory
7.5 PBX Port Status Screen
7.6. The PBX IP Port Status Screen
7.7. The Console Port Status Screen
7.8. The Modem Port Status Screen
7.9. The Network Port Status Screen
7.10. Scheduled Action Status Screens
7.11. PBX Inactivity Alarm Status Screens
7.12. 80 Full Alarm Status Screen
7.13. Data Filters Alarms Status Screen
7.15. Reason for Action Screen
7.16. Alarm Filter Clue Status Screens
8. The Data Filters
8.1. The Data Filter Configuration Menus
8.2. Defining the Data Filter Format
8.3. Defining Data Filter Clues
8.4. Logical and Relational Operators 8.4. Logical and Relational Operators
8.4.1. Logical AND-OR Conditions
8.4.1.1. Logical AND Conditions
8.4.1.2. Logical OR Conditions
8.4.2. The Contains String Operator
8.5. Real Time Variables
8.6. Assigning the Data Filter to a Port
8.7. Data Filter Definition Examples
9. The Alarm Filters
9.1. Common Types of Suspect Phone Activity
9.2. The Alarm Configuration Menu
9.2.1. Default Alarm Filter Actions
9.3. The Alarm Filter Configuration Menus
9.4. Defining the Alarm Filter Format
9.5. Defining Alarm Filter Clues
9.5.1. Alarm Clue Definition
9.5.2. Editing and Deleting Clues
9.6. Logical and Relational Operators
9.6.1. Logical AND-OR Conditions
9.6.1.1. Logical AND Conditions
9.6.1.2. Logical OR Conditions
9.6.2. The Contains String Operator
9.7. Real Time Variables
9.8. Assigning the Alarm Filter to a Port
9.9. Match Parameter Definition Examples
10. PBX Inactivity Alarms
10.1. Schedules and Timers
10.2. Enabling the PBX Inactivity Alarm
11. The 80 Full Alarm
12. Alarm Actions
12.1. Alarm Actions for Alarm Filter Clues
12.2. Alarm Action Summary
12.2.1. None
12.2.2. Callout
12.2.3. Alphanumeric Page
12.2.4. Numeric Page
12.2.6. Email Text Message
12.2.7. Console
12.3. The Auto Execute Function
13. Scheduled Actions
14. Saving NetLink II Parameters
14.1. Saving Parameters to Flash Memory
14.2. Saving and Restoring Parameters from an ASCII File
14.2.1. Saving Parameters to an ASCII File
14.2.2. Saving Parameters to an ASCII File
14.3. Configuring NetLink II with Saved Parameters
15. Buffer Functions
15.1. Memory Partitions and Shared Data
15.1.1. Partitions and Files
15.1.2. Setting the Partition
15.1.3. Releasing the Partition
15.2. Menu Driven Data Release
15.2.1. The Buffer Functions Menu
15.2.2. Read Session Parameters
15.3. Command Driven Data Release
15.3.1. Command B00
15.3.2. The B01 Command Line
15.3.3. Command B01 Examples
15.3.4. Other Commands Used During Data Release
15.4. Retrieving Data Using the Push Function
15.4.1. File Names Created by the Push Function
15.4.2. Push Start Time
15.5. Retrieving Data Using the Server Function
15.5.1. File Names Created by the Server Feature
15.6. The Auto Delete Function
15.7. Zmodem Data Release Mode
16. Other Menu Functions
16.1. System Functions
16.1.1. Pass-Through Mode
16.1.2. Monitor Mode
16.1.3. Clear Alarm Condition
16.1.4. Clear Alarm Counters
16.1.5. Download Parameters
16.1.6. Audit Trail
16.1.7. Upload Firmware
16.1.8. Download SSH Server Keys
16.2. System Diagnostics
16.2.1. Load and Test Memory
16.2.2. Send Test Message
16.2.3. Test Pager
16.2.4. Send Test SNMP
16.2.5 Send Test SYSLOG Message
16.3. Reboot System
17. Command Reference Guide
17.1. Command Mode Access
17.2. Command Help
17.3. Command Syntax
17.4. Command Summary
A. Specifications
B. Description of System Interfaces
B.1. Serial PBX Input Port
B.2. Console Port
C. Administrator Functions and User Functions
C.1. Security Mode at Start Up
C.2. Dialback Security
C.3. Administrator Mode and User Mode Functions
D. Alarm Clue Definition Tips
D.1. Headers Banners and Other Non-Data
D.1.1. The Comparative Operators
D.1.1.1. Limit Comparisons
D.1.1.2. Exclude Non-Data Characteristics
D.1.2. Exact Match with PBX Call Record Format
D.2. Programming Support
E. SSH Application Notes
E.1. Windows XP - Assign a User Name
E.2. Create the User Name in the WINSSHD Application
E.3. Generate Netlink client keys
E.4. Import the Client Keys Into the WINSSHD Application
E. Customer Service
Index
PollCat NetLink II B

15.5.1. File Names Created by the Server Feature

 

When the Server feature is used, NetLink II will assign a name to the file that contains the data. This file name will be based on the user-defined base file name, the source port and the data type.  File names created by the Server feature do not include an extension. As shown in Figure 15.5, the file name consists of the following components:

Note: This file naming convention applies only to data that is transferred by the Server feature. A different file naming convention is employed when data is transferred using the Push feature.

File Name (Up to Four Characters): The base file name that is defined via item 3 in the Server configuration menu.  If the file name is not defined, NetLink II will use the first three characters of the Site ID message. If the Site ID message is not defined, the letters "PNL" will be used. Note that if the file name is less than four characters long, the remaining characters in this field will not be used.

Figure 15.5:  Server Function File Names

 

 

Source Port (One Character): This character is used to indicate which input port originally received the data. NetLink II will enter an"A" to indicate that the data was received via the serial PBX Port, or an "I" to indicate data received via the PBX IP Port.

Data Type (Two Characters): The last two characters indicate the data type as follows:

1                     ST: The letters "ST" indicate that the file contains standard (non­alarm) data; this is all data that did not match either of the two Alarm Filters.

2                     A1: This indicates that the file contains data that matched Alarm Filter 1.

3                     A2: This indicates that the file contains data that matched Alarm Filter 2.

 

Examples:

•                      If the base File Name is defined as "DATA," and the file contains data that was received from the Serial PBX Port (A), that did not match either Alarm Filter (ST), then the file would be named "DATAAST".

•                      If the base File Name is defined as "PBX," and the file contains data that was received via the PBX-IP Port (I), that matched Alarm Filter 1 (A1), then the file would be named "PBXIA1".

•                      If the base File Name has not been defined, but the Site ID Message is "DENVER," and the file contains data received via the Serial PBX Port (A), that matched Alarm Filter 2 (A2), then the file would be named "DENVAA2".

 

15-18