Comments
-
Just to clarify further; this is the method of entering enable mode which is supported by CatTools: login as: bdback bdback@10.3.4.2's password: fw> fw> enable [level] Password: ********* fw# (Note: CatTools will also handle Username/Password authentication for enable mode, if this has been configured). Steve
-
Correct, I was referring to the compare feature (to show differences between backups). With regards to documentation: www.kiwisyslog.com/.../trb_antivirustools.htm Once we have verified the issue relating to Symantec Endpoint Protection causing issues with the diff.exe; I will also get this link updated with more…
-
Normally the CatTools_Client.exe process is controlled by CatTools when an activity is run. Generally the first time you run CatTools, (after say an upgrade or clean install) there will be no CatTools_Client.exe process until the first activity is run. If you kill the CatTools_Client.exe, it will terminate the activities…
-
Hi sharkey, I think I may have spotted the problem. First, please remove the call to the UpdatePassword function (which you say you used as a test), so that CatTools calls your custom activity. Now, in the Info Log, when you run the activity do you see this Warning level message (from within…
-
You are welcome. Glad to have helped. Just one last note; I based this on the code sample you provided which appeared to specifically only perform the operation on the device group called 'Default'. If you need to perform the operation on devices in other groups, change the text "Default" in the code line shown below to…
-
Sorry, I was under the impression from your initial description of the problem that you had also tried a manual console (telnet/ssh) session to one of the failing devices which is when you received the 'Error 4'. I therefore provided you with possibilities relating to the error code you were seeing... which was the most…
-
Dana, The CatTools ARP table report simply issues a 'show arp' command and then parses the results. Can you check the 'show arp' output with a manual telnet/ssh session to the device, and compare it to the data shown in the CatTools ARP report. If you find there is a difference in the data, then please raise a support…
-
Nigel, In CatTools versions prior to 3.3.15, the ActivityLog table in the database was holding ALL historic data (that is everything from when you first installed CatTools). In 3.3.15 we added the daily purge routine (which runs at the end of the first activity which is ran after midnight), which by default will delete all…
-
The Generic.Device supports the Device.Backup.TFTP activity. There are a number of options within that activity which will hopefully enable you to backup the device via TFTP. Give this a try and post back with your results. Regards, Steve
-
Hi Masashi, The Juniper.Netscreen.Firewall device type in CatTools should work with Netscreen O/S 6.1. We made some modifications to the script for another customer in CatTools v3.3.14 when their Juniper NetScreen 5200 firewalls were upgraded from v5.4 to v6.1. They confirmed to us that the script was working fine with…
-
j-c The actual filename that gets used for the file uploaded to the TFTP server is the device filename, and not the value of the 'File to write to TFTP Server' field (sorry for misleading you on that one). With the BS450 being a menu driven system, it actually works slightly differently to say Cisco IOS with this activity.…
-
Correct, the Device.Backup.Running Config activity performs a capture of the show running-config (or device equivalent) command. This is why you do not see anything in the TFTP pane. The Device.Backup.TFTP activity is only supported on a limited set of devices (see the device matrix:…
-
Hi Achu, Within the device setup, try removing the text you entered (Please Enter Login Name:) from within the 'Prompts --> Enable Prompt' field and enter it instead within the 'Prompts --> Username Prompt' field. This should fix the problem. When using 'Username/Password' authentication for enable mode, the 'Username…
-
Hi Clement, Does you device not support a 'tftp' command then? For example (based on your command syntax above): # tftp 192.168.5.30 config config-router-20101109102049.xml (I'm presuming that 192.168.5.30 is the IP of the system where CatTools is installed - i.e. where the (CatTools) TFTP Server is running?) Steve
-
Awesome. Thanks for letting me know. Steve
-
What prompt/device response do you see after the password is sent to the device?
-
Hi Arlo, I've managed to recreate the same error here and it appears that the reason is due to a bad data row in the source ARP report. About 50 rows up from the end of the file there is an incomplete row. The error is occurring because CatTools is looking for data in the 3rd column, which it can't find. If you delete this…
-
From my knowledge on various vendor devices, I would imagine that Private Const COMMAND_POSTLOGINKEYS = "cli more 64" would actually be enabling paging (like terminal length 64 on Cisco IOS)? If you are wanting to disable paging, then I'd expect you'd more likely need to use the command "cli more 0" (or something along…
-
Hi Chris, I've attached a tweaked script should pick up the 'Entering server port, ...' message from your Digi box and send an additional CR to hopefully continue on. Take a backup of your existing Cisco.Terminal.Server.txt file in the \Scripts folder and then unzip and copy the attachment file in its place. Please let me…
-
As I suspected, the device response <R-...> contains 16 backspace [08] characters to delete the paging prompt (which including the end whitespace is 16 chars long). It then over-writes with 16 whitespaces, then deletes them again. Unfortunately the variations feature doesn't handle the removal of these additional…
-
Tom, The Generic.Device was I believe available in 3.5.0. Also variations I think was also included, but only just for the Generic.Device type, and the variations was not in UI form. You're 3.6.0 version should have created the necessary variations script file though (check the Variations folder). You should be able to…
-
Hi, Looks like the notepad doc didn't make it through. Can you try reattach again please? All I need to the output of your 'show ip arp vrf VRF-NAME' command. Unfortunately pasting it into the thwack post messes with the column alignment, and the alignment is imperative for me to upload the data into our device emulator…
-
I have read somewhere on the APC site that they are supporting both interfaces Menu and new CLI; although I couldn't determine whether this is on specific devices/modules/cards or across the board. It may be best you try contacting APC support and see if you can get clarification. Please post back your finding to this…
-
Sonicwall aren't supported out-the-box by CatTools at present. You may want to have a look at this thwack thread: and more specifically the posting by scott.wilson.musco who has managed to get this working with his own custom scripts (which Scott has attached in further postings). You'll need to install your own ftp server…
-
Excellent. Glad its all working and thanks for posting back to update the thread.
-
Hi Sean,I've just been testing this on my SR1.0.1 system and it appears to be working fine.I’m seeing Hostname in Search results; Port Details List resource (on Node Details page); Port History resource (Port Details view) and also in the Watch List resource (Summary page). Can I just verify that you have clicked the…
-
Hi Christian, For the HP script, CatTools will wait for up to 30 seconds for the 'press any key to continue' prompt from the device. Note: it doesn't matter that the script is looking for 'ress any key to continue'; this will still work just fine - so not a bug :) If your device needs no user keyboard interaction between…
-
Hi niemand0815- Thanks for posting an update to the VM issue and confirming that my suggestion worked. Regarding your question of making CatTools multi-cpu capable; I'll raise this with the CatTools Project Manager for you. Regards, Steve
-
Hi James, Take a look at the following thread: Hope this helps. Steve
-
Hi, The CatTools Cisco ASA device script doesn't support this type of authentication. Is there any particular reason why you are using this method as opposed to the Cisco privileged levels for enable mode access (privileged EXEC), which CatTools does support? Steve