q-Tech QSR-3920 Series Instruction sheet

CONFIGURATION MANUAL
www.qtech.ru
QSR-3920 Series Router Configuration
Manual
QSR-3920-08

www.qtech.ru
Table of contents
1 SYSTEM OPERATION BASICS 6
1.1 Overview 6
1.2 System Operation Basic Functions 6
1.2.1 Device Configuration Modes 6
1.2.2 Command Operating Modes 6
1.2.3 Command Line Interface 9
2 SYSTEM LOGIN 15
2.1 Overview 15
2.2 System Login Function Configuration 15
2.2.1 Log in to Device via Console Port 15
2.2.2 Configure Remote Login via Telnet 18
2.2.3 Configure Remote Login via SSH 19
2.2.4 System Login Monitoring and Maintaining 20
2.3 Typical Configuration Example of System Login 20
2.3.1 Configure a Local Terminal to Telnet to the Device 20
2.3.2 Configure a Local Device to Log in to a Remote Device via Telnet 22
2.3.3 Configure a Local Device to Log in to a Remote Device via SSH 23
3 SYSTEM CONTROL AND MANAGEMENT 25
3.1 Overview 25
3.2 Login Control and Management Function Configuration 25
3.2.1 Switch Over Between User Levels 26
3.2.2 Configure the Command Level 28
3.2.3 Configure the enable Password 28
3.2.4 Configure Users and the Related Properties 29
3.2.5 Configure Line Properties 33
3.2.6 System Control and Management Monitoring and Maintaining 40
4 FTP, FTPS, TFTP AND SFTP 41
4.1 Overview 41
4.2 FTP, FTPS, TFTP, and SFTP Function Configuration 42
4.2.1 Configure an FTP Server 42
4.2.2 Configure an FTP Client 43
4.2.3 Configure a TFTP Client 44
4.2.4 Configure a TFTP Server 45

www.qtech.ru
4.2.5 Configure an SFTP Server 46
4.2.6 Configure a SFTP Client 46
4.2.7 FTP, TFTP and SFTP Monitoring and Maintaining 47
4.3 Typical Configuration Example of FTP, TFTP, and SFTP 47
4.3.1 Configure a Device as an FTP Client 47
4.3.2 Configure a Device as an FTP Server 48
4.3.3 Configure a Device as an TFTP Client 52
4.3.4 Configure a Device as an SFTP Client 54
4.3.5 Configure a Device as an SFTP Server 55
4.3.6 Configure a Device as an FTPS Client 57
5 FILE SYSTEM MANAGEMENT 62
5.1 Overview 62
5.2 File System Management Function Configuration 62
5.2.1 Manage Storage Devices 63
5.2.2 Manage File Directories 64
5.2.3 Manage File Operations 66
5.2.4 Download Files from the FTP 68
5.2.5 Execute a Configuration File Manually 69
5.2.6 Configure Startup Parameters 69
5.2.7 File System Managing, Monitoring, and Maintaining 70
5.3 Typical Configuration Example of File System Management 70
5.3.1 Configure Startup Parameters 70
6 CONFIGURATION FILE MANAGEMENT 72
6.1 Overview 72
6.2 Configuration File Management Function Configuration 72
6.2.1 Save the Current Configuration 73
6.2.2 Configure the Backup System 73
6.2.3 Restore the Startup Configuration 75
6.2.4 Configuration File Managing, Monitoring, and Maintaining 75
7 SYSTEM MANAGEMENT 77
7.1 Overview 77
7.2 System Management Function Configuration 77
7.2.1 Configure the Device Name 78
7.2.2 Configure the System Time and Time Zone 78
7.2.3 Configure the Login Welcome Message 79
7.2.4 Configure the System Exception Processing Mode 79

www.qtech.ru
7.2.5 Configure to Restart a Device 80
7.2.6 Configure the Encryption Service 81
7.2.7 Configure the History Command Saving Function 81
7.2.8 Configure the Login Security Service 82
7.2.9 Configure CPU Monitoring 83
7.2.10 Configure Display of Properties in Pages 84
7.2.11 Configure a Serial Number for a Module Part 85
7.2.12 Delete the Serial Number of a Module Part 85
7.2.13 System Management Monitoring and Maintaining 86
8 SYSTEM ALARM 88
8.1 Overview 88
8.2 System Alarm Function Configuration 88
8.2.1 Configure System Temperature Alarms 88
8.2.2 Configure System Power Supply Alarms 89
8.2.3 Configure System Fan Alarms 89
8.2.4 Configure System Alarm Parameters 89
8.2.5 System Alarm Monitoring and Maintaining 90
9 SYSTEM LOG MANAGEMENT 91
9.1 Overview 91
9.2 System Log Function Configuration 92
9.2.1 Configure Log Output Functions 93
9.2.2 Configure the Timestamp for Logs 97
9.2.3 Configure a Log Task Name 98
9.2.4 Configure the Log Filtration Function 98
9.2.5 Configure the Log File Capacity 99
9.2.6 Configure Log Display Colors 99
9.2.7 System Log Monitoring and Maintaining 100
10 SOFTWARE UPGRADE 101
10.1 Overview 101
10.2 Software Upgrade Function Configuration 101
10.2.1 Upgrade the image Program Package 102
10.2.2 Upgrade the FPGA Program 103
10.2.3 Upgrade the bootloader Program 105
10.2.4 Upgrade devinfo File 109
10.3 Typical Configuration Example of Software Upgrade 111
10.3.1 Upgrade All Software Versions 111

www.qtech.ru
10.3.2 Upgrade the bootloader Program via the Console Port 115
11 BOOTLOADER 117
11.1 Overview 117
11.2 Bootloader Function Configuration 117
11.2.1 Preparation before Configuring the Bootloader Functions 117
11.2.2 Set the Bootloader Boot Parameters 117
11.2.3 Upgrade the Bootloader Program 118
11.2.4 Bootloader Monitoring and Maintaining 119
11.3 Typical Configuration Example of Bootloader 119
11.3.1 Configure bootloader to Guide the Image Program from the File System 119
11.3.2 Configure bootloader to Guide the Image Program from the Network 120

Configuration manual
1. System Operation Basics 6
www.qtech.ru
1SYSTEM OPERATION BASICS
1.1 Overview
System operation basics mainly describe the basic knowledge of device operations, including
device configuration modes, command modes, and command line interface.
1.2 System Operation Basic Functions
Table 1-1 Configuration list of the system operation basic functions
Configuration Task
Device configuration mode
Device configuration mode
Command operating mode
Command operating mode
Command line interface
Command line interface
1.2.1 Device Configuration Modes
Users can log in to the device for configuration and management in different modes. (For
details of the login modes, refer to the chapter "System login" in the configuration guide.) The
device provides four typical configuration modes:
Logging in to the device locally through the Console port. By default, users can configure
the device directly in this mode.
Logging in to the device by remote dial-up through a Modem. The device cannot be
configured directly in this mode, that is, before configuration, some preparations need to
be made.
Logging in to the device remotely through Telnet. The device cannot be configured directly
in this mode, that is, before configuration, some preparations need to be made.
Logging in to the device remotely through SSH. The device cannot be configured directly in
this mode, that is, before configuration, some preparations need to be made.
1.2.2 Command Operating Modes
The device provides a command processing subsystem for management and execution of
system commands. The subsystem shell provides the following main functions:
Registration of system commands
Editing of system configuration commands by users
Parsing of the commands that have been inputted by users
Execution of system commands
If a user configures the device through shell commands, the system provides multiple
operating modes for the execution of the commands. Each command mode supports specific

Configuration manual
1. System Operation Basics 7
www.qtech.ru
configuration commands. In this way, hierarchical protection is provided to the system,
protecting the system from unauthorized access.
The shell subsystem provides multiple modes for the operating of configuration commands.
These modes have different system prompts, prompting the current system mode of the user.
The following lists common configuration modes:
Common user mode (user EXEC)
Privileged user mode (privilege EXEC)
Global configuration mode (global configuration)
Interface configuration mode (interface configuration)
File system configuration mode (file system configuration)
Access list configuration mode (access list configuration)
Other configuration modes (They will be described in the related sections and chapters.)
The following table shows how to enter the common command modes and switch over
between the modes.
Table 1-2 System modes and methods of switching over between the modes
Mode
How to
Enter the
Mode
System
Prompt
How to Exit the
Mode
Functions
Commo
n user
mode
Log in to
the device.
Hostname>
Run the exit
command to
exit the mode.
Changes the terminal
settings.
Performs basic tests.
Display the system
information.
Privilege
d user
mode
In common
user mode,
run the
enable
command.
Hostname#
Run the disable
or exit
command to
exit to the
common user
mode.
Configure the
operating parameters
of the device.
Display the operating
information of the
device.
Global
configur
ation
mode
In
privileged
user mode,
run the
configure
terminal
command.
Hostname(con
fig)#
Run the disable
or exit
command to
exit to the
common user
mode
Configures the global
parameters that are
required for the
device operation.
Interface
In global
Hostname(con
Run the exit
In this mode,

Configuration manual
1. System Operation Basics 8
www.qtech.ru
configur
ation
mode
configuratio
n mode,
run the
interface
command
(while
specifying
the
correspondi
ng interface
or interface
group).
fig-if-
xxx[number])#
or
Hostname(con
fig-if-
group[number
])#
command to
exit to the
global
configuration
mode.
Run the end
command to
exit to the
privileged user
mode.
configures device
interfaces, including:
Interfaces of different
types
Interface groups
File
system
configur
ation
mode
In the
privileged
user mode,
run the
filesystem
command.
Hostname(con
fig-fs)#
Run the exit
command to
exit to the
privileged user
mode.
Manages the file
system of the device.
Access
list
configur
ation
mode
In global
configuratio
n mode,
run the ip
access-list
standard or
ip access-
list
extended
command.
Hostname(con
fig-std-nacl)#
Hostname(con
fig-ext-nacl)#
Run the exit
command to
exit to the
global
configuration
mode.
Run the end
command to
exit to the
privileged user
mode.
Configures the Access
Control List (ACL). The
configuration tasks
include:
Configuring standard
access control lists.
Configuring extended
access control lists.
Hostname is the system name. In global configuration mode, a user can run
the hostname command to modify the system name, and the modification
takes effect immediately.
If a user is not in privileged user mode while the user wants to run a
privileged mode command, the user can use the do command to run the
required command without the need to returning back to the privileged
mode. (For details, refer to the related sections in "System Operation
Basics" of the command manual.) Note that the mode switchover command

Configuration manual
1. System Operation Basics 9
www.qtech.ru
such as do configure terminal is not included.
1.2.3 Command Line Interface
The command line interface is a man-machine interface that is provided by the shell subsystem
to configure and use the device. With the command line interface, users can input and edit
commands to perform the required configuration tasks, and they can also query the system
information and learn the system operation status.
The command line interface provides the following functions for the users:
System help information management
System command inputting and editing
History command management
Terminal display system management
Command Line Online Help
The command line provides the following types of online help:
Help
Full help
Partial help
With the above types of online help, users can obtain various help information. The following
gives some examples.
To obtain a brief description of the online help system, run the help command in any
command mode.
Hostname#help
Help may be requested at any point in a command by entering
a question mark '?'. If nothing matches, the help list will
be empty and you must backup until entering a '?' shows the
available options.
Two styles of help for command are provided:
1. Full help is available when you are ready to enter a
command argument (e.g. 'show ?') and describes each possible
argument.
2. Partial help is provided when an abbreviated argument is entered
and you want to know what arguments match the input
(e.g. 'show pr?'.)
And "Edit key" usage is the following:
CTRL+A -- go to home of current line
CTRL+E -- go to end of current line
CTRL+U -- erase all character from home to current cursor
CTRL+K -- erase all character from current cursor to end

Configuration manual
1. System Operation Basics 10
www.qtech.ru
CTRL+W -- erase a word on the left of current cursor
CTRL+R -- erase a word on the right of current cursor
CTRL+D,DEL -- erase a character on current cursor
BACKSPACE -- erase a character on the left of current cursor
CTRL+B,LEFT -- current cursor backward a character
CTRL+F,RIGHT -- current cursor forward a character
To list all commands and their brief description in any command mode, type "?" in the
command mode.
Hostname#configure terminal
Hostname(config)# ?
3g-modem 3g modem reset by sms configure
aaa Authentication, Authorization and Accounting
access-list Access list
alarm Set the utilization factor alarm of the cpu or
memory
apply Command apply
arp Set a static ARP entry
banner Define a login banner
bgp BGP information
bridge Bridge Group
cam Config cam global parameters
cardreset-exception Cardreset exception handling for Modem card
cellular Cellular
..................................................... ......... ......
Type a command followed by "?", and all sub-commands that can be executed in the
current mode are displayed.
Hostname#show ?
3g-modem-reset 3g modem reset correlative information
about Print the copyright information
access-list Access List
access-list-reflexive List reflexive access lists
access-lists Show acl lists
acl-log-count Display the number of access list log
acl-object Show acl object
arp Command arp
bfd BFD Protocol information
bgp BGP information
bridge Bridge Forwarding/Filtering Database [verbose]
cam Command cam
card_list Show information of hardware modules

Configuration manual
1. System Operation Basics 11
www.qtech.ru
..................................................... .....
Type a character string followed by "?", and all the key words starting with the character
string and their description are displayed.
Hostname#show a?
about Print the copyright information
access-list Access List
access-list-reflexive List reflexive access lists
access-lists Show acl lists
acl-log-count Display the number of access list log
acl-object Show acl object
arp Command arp
Command Line Error Messages
For all commands that are typed by users, the command line performs a syntax check. If the
commands pass the syntax check, they are executed properly; otherwise, the system reports
error messages to the users. The following table shows common error messages.
Table 1-3 Command line error messages
Error Message
Error Cause
% Invalid input detected at '^' marker.
No command or key word is found, the
parameter type is incorrect, or the
parameter value is not within the valid
range.
Type “*** ?” for a list of subcommands
or
% Incomplete command
The inputted command is incomplete.
Hostname#wh
% Ambiguous command: wh
% Please select:
whoami
who
The inputted character string is a fuzzy
command.
History Commands
The command line interface provides a function that is similar to the Doskey function. The
system automatically saves the user inputted commands into the history command cache.
Then, users can invoke the history commands saved by the command line interface at any time
and execute the command repeatedly, reducing unnecessary efforts in re-typing the

Configuration manual
1. System Operation Basics 12
www.qtech.ru
commands. The command line interface saves up to 10 commands for each user that is
connected to the device. Then, new commands overwrite old ones.
Table 1-4 Accessing history commands of the command line interface
To...
Press...
Execution Result
Access the previous
history command
The up arrow key
↑ or Ctrl+P keys
If an earlier history command is
available, it is displayed. If no earlier
history command is available, an
alarm sound is played.
Access the next history
command
The down arrow
key ↓or Ctrl+P
keys
If a later history command is
available, it is displayed. If no later
command is available, the
commands are cleared, and an
alarm sound is played.
If you want to access history commands by using the up and down arrow
keys, when you telnet to the device in the Windows 98 or Windows NT OS,
set Terminals > Preferred Options > Simulation Options to VT-100/ANSI.
History command display is based on the current command mode. For
example, if you are in privileged mode, only history commands in privileged
mode are displayed.
Editing Features
The command line interface provides basic command editing functions. It supports multi-line
editing. Each line of command can contain up to 256 characters. The following table lists the
basic editing functions that are provided by the shell subsystem for the command line
interface.
Table 1-5 Basic editing functions
Key
Function
A common key
If the edit buffer is not full, the character is inserted to the
position of the cursor, and the cursor moves to the right. If
the edit buffer is full, an alarm sound is played.
The Backspace key
Deletes the character before the cursor and moves the
cursor backward. If the cursor reaches the beginning of the

Configuration manual
1. System Operation Basics 13
www.qtech.ru
command, an alarm sound is played.
The Delete key
Deletes the character behind the cursor. If the cursor
reaches the end of the command, an alarm sound is played.
The left arrow key ←
or Ctrl+B keys
Moves the cursor one characters to the left. If the cursor
reaches the beginning of the command, an alarm sound is
played.
The right arrow key
→ or Ctrl+F keys
Moves the cursor one characters to the right. If the cursor
reaches the end of the command, an alarm sound is played.
The up and down
arrow keys ↑↓
Display history commands.
Ctrl+A
Moves the cursor to the beginning of the command line.
Ctrl+E
Moves the cursor to the end of the command line.
Ctrl+U
Deletes all characters on the left of the cursor till the
beginning of the command line.
Display Features
To facilitate users, the command line interface provides the following display features:
If the information to be displayed is more than one screen, the pause function is provided, and
the prompt "---MORE---" is displayed at the lower left corner of the screen. At this time, the
options displayed in the following table are available for users.
Table 1-6 Display features
Key
Function
Space key, down arrow key ↓, or Ctrl-F
Display the next screen.
The up arrow key ↑ or Ctrl-B keys
Display the previous screen.
The Enter key, right arrow key → or
equal key =
Scroll the displayed information one line
down.
The left arrow key ← or the minus key -
Scroll the displayed information one line
up.
Ctrl-H
Return back to the topmost part of the
displayed information.

Configuration manual
1. System Operation Basics 14
www.qtech.ru
Any other keys
Exit the display. Then, the information
that has not been displayed will not be
displayed.

Configuration manual
2. System Login 15
www.qtech.ru
2SYSTEM LOGIN
2.1 Overview
The device supports the following system login modes:
Logging into the device through the Console port for management and maintenance.
Logging into the device through the AUX port for management and maintenance.
Telnet (remote login). Users can manage and maintain the device remotely in this mode.
Secure Shell (SSH). With its encryption and authentication technology, SSH provides secure
remote login management services for users.
2.2 System Login Function Configuration
Table 2-1 System login function configuration list
Configuration Tasks
Logging in to the device through the
Console port
-
Configuring remote login through Telnet
Enable the Telnet service of the device.
The device acts as a Telnet client for
remote login.
Configuring remote login through SSH
Enable the SSH service of the device.
The device acts as an SSH client for
remote login.
For the related user configuration of Telnet and SSH remote login, refer to
the login control and management manual.
2.2.1 Log in to Device via Console Port
To connect a terminal to the device through the Console port to configure the device, perform
the following steps:
Step 1:
Select a terminal.

Configuration manual
2. System Login 16
www.qtech.ru
The terminal can be a terminal with a standard RS-232 serial port or an ordinary PC, and the
latter one is more frequently used. If the remote dial-up login mode is selected, two Modems
are required.
Step 2:
Connect the physical connection of the Console port.
Ensure that the terminal or the device that provides the Console port has been powered off,
and then connect the RS-232 serial port of the terminal to the Console port of the device. The
following figure shows the connection.
Figure 2-1Connection for login via the console port
Step 3:
Configure the HyperTerminal.
After powering on the terminal, you need to set the communication parameters of the
terminal, that is, baud rate of 9600 bps, 8 data bits, 1 stop bit, no parity check, and no data
stream control. For a PC with the Windows XP or Windows NT OS, run the HyperTerminal
program, and set the communication parameters of the serial port of the HyperTerminal
according to the previously mentioned settings. The following takes the HyperTerminal in the
Windows NT OS for example.
Create a connection:
Input a connection name, and select a Windows icon for the connection.
Figure 2-2 Creating a connection
Select a serial communication port:
According to the serial communication port that has been connected, select COM1 or COM2.

Configuration manual
2. System Login 17
www.qtech.ru
Figure 2-3 Selecting a serial communication port
Configure parameters for the serial communication port:
Baud rate: 9600 bps
Data bit: 8 bits
Parity check: None
Stop bit: 1 bit
Data stream control: None
Figure 2-4 Configuring parameters for the serial communication port
Login success authentication:

Configuration manual
2. System Login 18
www.qtech.ru
After the device with the Console port is powered on, the startup information of the device is
displayed on the terminal. After the startup is completed, the "Press any key to start the shell!"
message is displayed. If login authentication is configured to be required, input the user name
and password; otherwise, press any key to log in directly. After the login succeeds, the
"Hostname>" prompt is displayed on the terminal. Then, you can configure the device.
2.2.2 Configure Remote Login via Telnet
Configuration Condition
None
Enable Telnet service of Device
A user can log in to the device remotely through Telnet for management and maintenance.
Before using the Telnet service, enable the Telnet service of the device. After the Telnet service
of the device is enabled, the Telnet service port 23 is monitored.
Table 2-2 Enabling the telnet service of the device
Step
Command
Description
Enter the global
configuration mode.
configure terminal
-
Enable the Telnet service
of the device.
telnet server enable
Mandatory.
By default, the Telnet
service is enabled.
Take Device as Telnet Client for Remote Login
The user takes the device as a Telnet client to log in to the specified Telnet server for
configuration and management.
Table 2-3 Taking the device as a telnet client for remote login
Step
Command
Description
Enter the global
configuration mode.
configure terminal
-
Enable the Telnet client of
the device.
telnet client enable
Optional.
By default, the Telnet
client is enabled.
Take the device as a
Telnet client for remote
login.
telnet [ vrf vrf-name ]
{ hostname | remote-host
}
[ port-number ] [ ipv4 |
Mandatory.

Configuration manual
2. System Login 19
www.qtech.ru
ipv6 ]
[ source-interface
interface-name ]
The Telnet client can log in to a remote device only when the Telnet server
function of the remote device is enabled, and the network between the
Telnet client and the remote device is normal.
2.2.3 Configure Remote Login via SSH
Configuration Condition
None
Enable the SSH Service of the Device
After the SSH server of a device is enabled, the device accepts the connection request initiated
by the user from the SSH client. After the client passes the authentication, the client can access
the device. After the SSH service of the device is enabled, the SSH service port 22 is monitored.
If the ip ssh server command is used without parameter sshv1-compatible, it indicates that an
SSH client can log in only through SSHv2.
Table 2-4 Enabling the SSH service of the device
Step
Command
Description
Enter the global
configuration mode.
configure terminal
-
Enable the SSH service of
the device.
ip ssh server [ sshv1-
compatible ][listen-port
]
Mandatory.
By default, the SSH
service is disabled.
Take the Device as an SSH Client for Remote Login
The device acts as an SSH client to log in to the specified SSH server remotely through the
SSHv1 or SSHv2 protocol. During the login, a user name and a password are required for
authentication from the SSH server.
Table 2-5 Taking an SSH client for remote login
Step
Command
Description

Configuration manual
2. System Login 20
www.qtech.ru
Take the device as an SSH
client for remote login.
ssh [vrf vrf-name]version
{ 1|2} remote-host
port-number [source-
interface interface-name]
user
auth-method 1password
[timeout]
Mandatory.
Configure cutting off all
SSH connections when
the SSH service is disabled
ssh disconnect client
when-disable-server
Optional
By default, do not cut off
the current SSH
connection when the SSH
service is disabled.
The Telnet client can log in to a remote device only when the SSH service of
the remote device is enabled, and the network between the SSH client and
the remote device is normal.
2.2.4 System Login Monitoring and Maintaining
Table 2-6 System login monitoring and maintaining
Command
Description
show fingerprint
Display the fingerprint information of
the SSH public key.
2.3 Typical Configuration Example of System Login
2.3.1 Configure a Local Terminal to Telnet to the Device
Network Requirements
A PC is used as a local terminal to log in to the device through Telnet.
A route must be available between the PC and the device.
Network Topology
Other manuals for QSR-3920 Series
1
This manual suits for next models
1
Table of contents
Other q-Tech Network Router manuals
Popular Network Router manuals by other brands

Craftsman
Craftsman 315.174740 manual

Load Balance
Load Balance V100 user manual

Cisco
Cisco CISCO7204VXR Installation and configuration guide

Case Communications
Case Communications 6904 user manual

Skyrc
Skyrc SK-600075 user manual

Bay Networks
Bay Networks BayStack ARN Routers none Installation and operating guide