Amanda Work Group Installation Manual
Have a look at the manual Amanda Work Group Installation Manual online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 32 Amanda manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.
Chapter 14: Accessing Amanda Remotely 169 Setting Up Amanda’s Computer as a Host It is a good idea to run the Host program automatically whenever Amanda’s computer starts. The AUTOEXEC.BAT file already contains lines that you can use for this purpose. However, you must remove the REM at the beginning of two lines in the AUTOEXEC.BAT: the line that contains the HOST command and the line above it that starts REM ECHO…. You might also have to change the number of the COM port to be used by the null modem cable or by the modem in Amanda’s computer. If the line is missing, add it as the first line of the AUTOEXEC.BAT file. Then reboot the computer to load the Host program. The line for the null modem cable is: REM LH HOST /2 /f /n >>%LOGN% This lines for the modem and null modem cabled can be explained as follows: REMIndicates that the line is currently ignored. Remove the REM to use the line. LH HOSTTells the computer to load this program in high memory. /2The 2 is for COM2. You can change this number to the number of the COM port the null modem cable or modem will use. /fIndicates that the cable or modem is faster than 2400 bps. /nIndicates that a null modem cable will be connected to both computers. >>%LOGN%Sends information about loading the Host program to ei- ther the C:\BOOTLOG file or to the screen, depending whether your AUTOEXEC.BAT file contains the line SET LOGN=C:\BOOTLOG or the line SET LOGN=CON:
170 Installing [email protected]/DOS The line for the modem is: REM LH HOST /4 >>%LOGN% Use the list above (for the null modem) to understand each part of this line. Change the /4 to the number of the COM port used by the modem on Amanda’s computer, and add a /f if your modem can handle data speeds of higher than 2400 bps. Setting Up the Remote Computer The remote computer must have a copy of the Remote program. Then you can run the Remote program from that computer (for example, a notebook).You can copy REMOTE.COM from C:\AMANDA to a floppy disk using the following command at the DOS prompt: copy c:\amanda emote.com a: emote.com (Your floppy disk drive may be b: rather than a:.) Then you can insert the floppy disk into the remote computer and copy the file to that computer. If Amanda is running as a standalone, you can copy the file using the Alt+F (Filecopy) command from the Main screen. Simply answer the Copy From: and Copy To: prompts.
Chapter 14: Accessing Amanda Remotely 171 Connecting by Null Modem Cable To connect over a null modem cable: 1. Attach one end of the null modem cable to the correct serial port (for example, COM2) on Amanda’s computer and to a serial port on the remote computer. 2. Turn on both computers. 3. From the remote computer, use the following command to start the Remote program. remote /x /n /f where x is 1 or 2, depending on what COM port the cable is connected to on the remote computer. For COM1, you can use /1 or nothing at all because COM1 is the default. You execute the command from the directory in which the Remote pro- gram is stored or you add the path name to the command. For example, if the program is stored on your hard drive in the UTIL directory on your C: drive, C:\UTIL\REMOTE would replace REMOTE in the com- mand. If the computer runs a version of Windows, run the command while the computer is in DOS mode. (Remote may not run in a DOS box.) 4. Press Enter. The following appears on the screen: Remote Version 2.0 You can run Setup and other programs on Amanda’s computer while sit- ting at the remote computer. (If the screen is blank because of Amanda’s screen saver, press the spacebar to exit the screen saver.) 5. To end the Remote session, press Alt+X. The program asks you to confirm your decision to exit by typing Y. The remote computer disconnects from Amanda.
172 Installing [email protected]/DOS Connecting by Modem To connect via data modem, both Amanda’s computer and the computer that will be accessing Amanda remotely must be running and have a modem that is connected to both a serial port and a telephone line. The data modem must be connected to either a dedicated telephone number (this works best) or its own telephone system station. The Host program can use COM1 through COM4. The Amanda Company recommends that Amanda’s computer use one of the following for the data modem: COM1 with IRQ4 and not other devices on COM1 or using IRQ4 COM2 with IRQ3 and not other devices on COM2 or using IRQ3 COM3 with IRQ11 and not other devices on COM3 or using IRQ11 COM4 with IRQ5 and not other devices on COM4 or using IRQ5 The Remote program works only with COM1 or COM2, with industry standard IRQ and I/O port addressing. That is: COM1 with IRQ4 and not other devices on COM1 or using IRQ4 COM2 with IRQ3 and not other devices on COM2 or using IRQ3 To control Amanda via modem: 1. Use the following command to start the Remote program: remote /x where x is 1 or 2, depending on what COM port the cable is connected to on the remote computer. (For COM1, you can use /1 or nothing at all because COM1 is the default.) You execute the command from the directory in which the Remote pro- gram is stored or you add the path name to the command. For example, if the program is stored on your hard drive in the UTIL directory on your C: drive, C:\UTIL\REMOTE would replace REMOTE in the command.
Chapter 14: Accessing Amanda Remotely 173 If the computer runs a version of Windows, run the command while the computer is in DOS mode. (Remote may not run in a DOS box.) 2. Press Enter. The following appears on the screen: Remote Version 2.0 Enter phone number: 3. Type the telephone number for Amanda, then press Enter. For example, if both modems are on the station side of the telephone switching system, you might use 9,17147530414,,,,,102 where the com- mas are two-second pauses and the 102 is for mailbox 102. In this example, the Extension field for mailbox 102 would have to be 102H to achieve a blind transfer to extension 102. Enter password: appears on the screen. 4. Type JENNIFER in uppercase letters, then press Enter. You can run Setup and other programs on Amanda’s computer while sit- ting at the remote computer. (If the screen is blank because of Amanda’s screen saver, press the spacebar to exit the screen saver.) 5. When you have finished, type Alt+X to end the connection. The program asks you to confirm your decision to exit by typing Y. The remote computer disconnects from Amanda.
Chapter 15: Programming Amanda Using Tokens The Token Programming Language allows you to write programs for Amanda. These programs consist of tokens entered in Extension fields (defined per mailbox using Amanda Administrator’s Mailbox window or Amanda Standalone’s Users screen) and/or in Method fields (defined per mailbox using Amanda Administrator’s Notify window or Amanda Standalone’s Notify Screen). This section describes the language and introduces you to common programming terms. Understanding these terms can help you understand any programming language. A token is a sequence of one or more characters that represents an action that Amanda can perform. The tokens that you use most often are simple and perform routine actions such as dialing an extension. However, a program can be much more complicated than that. With the Token Programming Language, you can use tokens to do either of the following: Enhance Amanda’s normal processing of the Extension and Method fields. Normally, she uses Programmed Call Progress Monitoring (PCPM). In this case, you add the tokens where appropriate within the field. For example, 147H is a sequence of four tokens that tells Amanda to dial the DTMF digits 147 (for extension 147) and then hang up. Notice that the tokens are not separated by spaces (or any other characters). You write tokens one right after the other.
176 Installing [email protected] Stop Amanda’s normal processing of the fields and tell her what to do. In this case, the first character in the field is @. Then you add the tokens that tell Amanda what to do. For example, @ R(G1,%S1) assigns the DTMF digits entered by the caller to a variable named %S1. This starts with an @ to indicate that you are NOT processing this Extension field normally. Normal processing for the Extension field: Amanda plays “Please hold while I try that extension,” puts the caller on transfer hold, then evaluates the tokens in the field. Unless told to do otherwise, she listens for call progress tones and an answer. The @ stops Amanda from performing the dial code that puts a caller on transfer hold (also known as the dl_dtwait dial code). As explained in Installing [email protected], you use the Setup utility (selection 1) to set or view the dial codes. The codes are stored in C:\AMANDA\PBX.DB\1001.PBX, which you can view or edit using the JOVE utility. Normal processing of the Notify Method field: Amanda tries to access a port for an outbound notification call. The @ stops Amanda from going off- hook. When most people think of a program, they think of a series of lines, each of which contains a single action or command. The Token Programming Language is similar, but each line become the contents of a different field, using the Extension field of a mailbox. If the program contains only a few lines, sometimes you can use just one Extension or Method field for the entire program. However, when you need more fields, you use the Extension fields from additional mailboxes. Even if a Method field must be extended, you extend it to the Extension field in another mailbox.
Chapter 15: Programming Amanda 177 You use additional fields for any of the following reasons: The logic of the program branches or repeats. You use a G() com- mand or I() command to create the branch or loop. See “Flow of Control: Branching and Looping” on page 188 for more details. The length of the string of tokens exceeds 65 characters, so you are forced to continue in another field. You use a G() command to ex- tend the token string to a new Extension field. Mailbox Settings If you are using a mailbox’s Extension field for token programming, you must use all of the following settings: Do Not Disturb must be off. Amanda ignores the Extension field al- together if Do Not Disturb is on. Call screening must be off. Success and Failure Amanda evaluates tokens from left to right. If Amanda performs a token successfully, she goes on to the next token. When all the tokens have been performed successfully in an Extension field, Amanda goes to the RNA Chain field. If the RNA field is blank, she goes to the Done Chain field for the company greeting mailbox (usually mailbox 990). When all the tokens have been performed successfully in the Notify Method field, Amanda goes to the next Notify Method field (if there is one). If there are no more Notify Method fields, Amanda goes to the Done Chain field for the current mailbox. If the token is unrecognized (because of a syntax error or a typographical error) or fails, Amanda immediately goes to the Done Chain field without processing the rest of the tokens in the field. If the last successful token gives Amanda an invalid mailbox, she processes the Done Chain field for the mailbox associated with the current port because she cannot locate a Done Chain field for the invalid mailbox. (The mailbox associated with the port is usually 990, the Company Greeting mailbox.)
178 Installing [email protected] For a literal or system variable, there is no such thing as failure. The token always succeeds. Some tokens define almost any behavior as successful. For example, you can have Amanda spell an empty string. Amanda doesn’t say anything, but no failure occurs either. Tracing Token Execution Amanda’s trace files can let you know where and how a token program is failing. This is an invaluable debugging tool. Amanda creates trace files as she runs, because the following trace command should be in the AUTOEXEC.BAT file. amanda /t5 /s1300 Like the default trace command, this command creates C:\AMANDA\TRACE.OUT file and limits its size to the last 1.3MB of data. (A file this size will fit on a 3 1/2-inch floppy disk.) What is different about this command is that it writes to the trace file every 10 lines. In this way, if Amanda crashes while running your token program, no more than ten lines of trace information can be lost. You can use /t with a number less than 10 if you need to, but it will slow down the system. You can also display trace information on-screen. To display trace information for a standalone system: 1. Press Ctrl+Home. 2. Press Alt+T. Pressing any key stops the display. On-screen traces are stored by default in C:\AMANDA\SCREEN.OUT. To change the name of this file, use the Setup utility to change the setting for the configuration option screen_save. To display trace information on Amanda Voice Server: Press T.