Home > Amanda > Communications System > Amanda Work Group Installation Manual

Amanda Work Group Installation Manual

Here you can view all the pages of manual Amanda Work Group Installation Manual. The Amanda manuals for Communications System are available online for free. You can easily download all the documents as PDF.

Page 181

Chapter 14: Accessing Amanda Remotely 169
Setting Up Amanda’s Computer as a Host
It is a good idea to run the Host program automatically whenever Amanda’s 
computer starts. The AUTOEXEC.BAT file already contains lines that you 
can use for this purpose. 
However, you must remove the REM at the beginning of two lines in the 
AUTOEXEC.BAT: the line that contains the HOST command and the line 
above it that starts REM ECHO…. You might also have to change the 
number of the COM port to be used by the null...

Page 182

170 Installing [email protected]/DOS
The line for the modem is:
REM LH HOST /4 >>%LOGN%
Use the list above (for the null modem) to understand each part of this line.
Change the /4 to the number of the COM port used by the modem on 
Amanda’s computer, and add a /f if your modem can handle data speeds of 
higher than 2400 bps.
Setting Up the Remote Computer
The remote computer must have a copy of the Remote program. Then you 
can run the Remote program from that computer (for example, a 
notebook).You can...

Page 183

Chapter 14: Accessing Amanda Remotely 171
Connecting by Null Modem Cable
To connect over a null modem cable: 
1. Attach one end of the null modem cable to the correct serial port (for 
example, COM2) on Amanda’s computer and to a serial port on the 
remote computer.
2. Turn on both computers. 
3. From the remote computer, use the following command to start the 
Remote program. 
remote /x /n /f 
where x is 1 or 2, depending on what COM port the cable is connected 
to on the remote computer. For COM1, you...

Page 184

172 Installing [email protected]/DOS
Connecting by Modem
To connect via data modem, both Amanda’s computer and the computer that 
will be accessing Amanda remotely must be running and have a modem that 
is connected to both a serial port and a telephone line. The data modem must 
be connected to either a dedicated telephone number (this works best) or its 
own telephone system station.
The Host program can use COM1 through COM4. The Amanda Company 
recommends that Amanda’s computer use one of the...

Page 185

Chapter 14: Accessing Amanda Remotely 173
If the computer runs a version of Windows, run the command while the 
computer is in DOS mode. (Remote may not run in a DOS box.)
2. Press Enter.
The following appears on the screen:
Remote Version 2.0
Enter phone number:
3. Type the telephone number for Amanda, then press Enter.
For example, if both modems are on the station side of the telephone 
switching system, you might use 9,17147530414,,,,,102 where the com-
mas are two-second pauses and the 102 is for...

Page 186

174 Installing [email protected]/DOS 

Page 187

Chapter 15:
Programming Amanda
Using Tokens
The Token Programming Language allows you to write programs for 
Amanda. These programs consist of tokens entered in Extension fields 
(defined per mailbox using Amanda Administrator’s Mailbox window or 
Amanda Standalone’s Users screen) and/or in Method fields (defined per 
mailbox using Amanda Administrator’s Notify window or Amanda 
Standalone’s Notify Screen). This section describes the language and 
introduces you to common programming terms. Understanding...

Page 188

176 Installing [email protected]
 Stop Amanda’s normal processing of the fields and tell her what to 
do.
In this case, the first character in the field is @. Then you add the tokens 
that tell Amanda what to do.
For example,
@
R(G1,%S1)
assigns the DTMF digits entered by the caller to a variable named %S1. 
This starts with an @ to indicate that you are NOT processing this 
Extension field normally.
Normal processing for the Extension field: Amanda plays “Please hold 
while I try that extension,” puts...

Page 189

Chapter 15: Programming Amanda 177
You use additional fields for any of the following reasons:
 The logic of the program branches or repeats. You use a G() com-
mand or I() command to create the branch or loop. See “Flow of 
Control: Branching and Looping” on page 188 for more details.
 The length of the string of tokens exceeds 65 characters, so you are 
forced to continue in another field. You use a G() command to ex-
tend the token string to a new Extension field.
Mailbox Settings
If you are using a...

Page 190

178 Installing [email protected]
For a literal or system variable, there is no such thing as failure. The token 
always succeeds. Some tokens define almost any behavior as successful. For 
example, you can have Amanda spell an empty string. Amanda doesn’t say 
anything, but no failure occurs either. 
Tracing Token Execution
Amanda’s trace files can let you know where and how a token program is 
failing. This is an invaluable debugging tool. 
Amanda creates trace files as she runs, because the following...
Start reading Amanda Work Group Installation Manual

Related Manuals for Amanda Work Group Installation Manual

All Amanda manuals