Tera Term Commands



Solved: 3512XL, Tera Term serial console I think BAUD is set correctly because the switch responses to commands like enable but the characters are unrecognizable. 7 years, 10 months ago. No Display in Teraterm. Hello, I've installed the mbed USB serial program and the mbed driver shows up under 'COM ports' in Win7 as 'mbed serial port COM 5'.

  1. Tera Term Commands
  2. Tera Term Scripting
  3. Tera Term Command Reference

8.2.2.6 Lab – Establish a Console Session with Tera Term Answers

  • Tera Term is an opensource terminal emulator on MS-Windows commonly used by us developers. Tera Term supports a 'rich' macro language that can help in automating user actions. These scripts usually remain personal - rarely shared. In this page, I intend to share the basic scripts that can be used to automate common tasks in the Linux PSP release.
  • For Tera Term write down the commands somewhere else and paste it on the console by right clicking. No need of pressing enter. The command will be executed immediately and confirmed. HC 06 AT commands are limited, all I could find are given here. AT: check the connection AT+NAME: Change name. No space between name and command.

Lab – Establish a Console Session with Tera Term (Answers Version)

Answers Note: Red font color or gray highlights indicate text that appears in the Answers copy only.

Topology

Objectives

Part 1: Access a Cisco Device through the Serial Console Port

  • Connect to a Cisco device using a serial console cable.
  • Establish a console session using a terminal emulator, such as Tera Term.

Part 2: Erasing and Reloading the Cisco Device

  • Erase previously saved settings to return the device to the default state.

Background / Scenario

Various models of Cisco routers and switches are used in networks of all types. These devices are initially managed using a local console connection and then routinely managed using a remote connection. Nearly all Cisco devices have a serial console port to which you can connect.

In this lab, you will learn how to access a Cisco device via a direct local connection to the console port, using a terminal emulation program, Tera Term. You will also learn how to configure the serial port settings for the Tera Term console connection. After you have established a console connection with the Cisco device, you will erase the saved configurations and reload the device.

Note: The routers used are Cisco 1941 ISRs with Cisco IOS Release 15.4(3) (universalk9 image). The switches used are Cisco Catalyst 2960s with Cisco IOS Release 15.0(2) (lanbasek9 image). Other routers, switches, and Cisco IOS versions can be used. Depending on the model and Cisco IOS version, the commands available and output produced might vary from what is shown in the labs.

Answers Note: You may choose to use serial console cables to connect to all the Cisco devices because not all Cisco devices have the USB console ports.

Answers Note: If you are using a Cisco 1941 router or other Cisco IOS devices with a mini-USB console port, you can access the device console port using a mini-USB cable connected to the USB port on your computer.

Answers Note: The mini-USB console cable is the same type of mini-USB cables that are used with other electronics devices, such as USB hard drives, USB printers, or USB hubs. These mini-USB cables can be purchased through Cisco Systems, Inc. or other third-party vendors. Please verify that you are using a mini-USB cable, not a micro-USB cable, to connect to the mini-USB console port on a Cisco IOS device.

Required Resources

  • 1 Router (Cisco 1941 with Cisco IOS software, release 15.4(3) universal image or comparable)
  • 1 Switch (Cisco 2960 with Cisco IOS Release 15.0(2) lanbasek9 image or comparable)
  • 1 PC (Windows 10) with terminal emulation program, such as Tera Term)
  • DB-9 to RJ-45 console cable to configure the switch or router via the RJ-45 console port
  • Mini-USB cable to configure the router via the USB console port if available

Part 1: Access a Cisco Device through the Serial Console Port

You will connect a PC to a Cisco switch or router using a console cable. This connection will allow you to access the command line interface (CLI) and display settings or configure the device

Step 1: Connect a Cisco device and computer using a console cable.

  1. Connect the console cable to the RJ-45 console port of the switch or router.If you are using a mini-USB console cable, connect it to mini-USB port of the device.
  2. Connect the other cable end to the serial COM port on the computer.
    Note: Serial COM ports are no longer available on most computers today. A USB-to-DB9 adapter can be used with the console cable for console connection between the computer and a Cisco device. These USB-to-DB9 adapters can be purchased at any computer electronics store.
    If using a USB-to-DB9 adapter to connect to the COM port, you may be required to install a driver for the adapter provided by the manufacturer on your computer.
    Note: If you are using a mini-USB cable, you maybe prompted to install a driver.
  3. Power up the Cisco device and computer if these devices are not already on.

Step 2: Configure Tera Term to establish a console session with the device.

Tera Term is a terminal emulation program. This program allows you to access the terminal output of the switch. It also allows you to configure the switch.

  1. Right-click Start. Enter Tera Term and select Tera Term in the results list.
    Note: If the program is not installed on the system, Tera Term can be downloaded from the following link by selecting the latest Tera Term package release. Tera Term is open source free software.
    https://en.osdn.jp/projects/ttssh2/releases/
  2. Click Serial.
    When using the USB-to-Serial cable, select the COM port associated with Prolific USB-to-Serial Comm Port. In this example, COM4 is the serial port used by the computer.When using the mini-USB cable, select the COM port associated with the USB Serial Device. In this example, COM3 is the serial port used by the computer.
  3. Click OK to connect to the device.

Part 2: Erasing and Reloading the Cisco Device

For the majority of the labs in this course, it is necessary to start with an unconfigured router and switch. Using a device with an existing configuration may produce unpredictable results. The following instructions prepare a switch or router prior to performing the lab so that previous configuration options do not interfere. Instructions are provided for the 2960 series switches.

  1. Enter privileged EXEC mode by typing enable. If prompted for a password, refer to the Answers for assistance.
    Switch> enable
    or
    Router> enable
  2. If you are using a switch, remove the VLAN database information file. This file exists only if changes were made to the switch VLAN configurations.
    Switch# delete vlan.dat
    Delete filename [vlan.dat]? [Enter]
    Delete flash:vlan.dat? [confirm] [Enter]
    If there was no VLAN file, this message is displayed:
    %Error deleting flash:vlan.dat (No such file or directory)
  3. Remove the startup configuration file from NVRAM.
    Switch# erase startup-config
    or
    Router# erase startup-config
    The responding line prompt is:
    Erasing the nvram filesystem will remove all files! Continue? [confirm]
  4. Press Enter to confirm. The response should be:
    Erase of nvram: complete
  5. Restart the software using the reload command in privileged EXEC mode.
    Switch# reload
    or
    Router# reload
    The responding line prompt is:
    System configuration has been modified. Save? [yes/no]:
  6. Type n, and then press Enter. The responding line prompt is:
    Proceed with reload? [confirm] [Enter]
    The first line of the response is:
    Reload requested by console.
    After the device has reloaded, the line prompt is:
    Would you like to enter the initial configuration dialog? [yes/no]:
  7. Type n, and then press Enter. The responding line prompt is:
    Press RETURN to get started! [Enter]
HomeSwitchboardUnix AdministrationRed HatTCP/IP NetworksNeoliberalismToxic Managers
May the source be with you, but remember the KISS principle ;-)
Skepticism and critical thinking is not panacea, but can help to understand the world better
NewsTeraTerm MacrosRecommended LinksReferenceConnect commandLogMeTT
ExpectSSH Password-less SSH loginTelnet protocolSerial Console on Solarissshfs
GNU ScreenExceed HostExplorerHyperTermTTPMenuHumorEtc

Connects.

Remarks

If MACRO is not linked to Tera Term, this command runs Tera Term with <command line parameters>, and links it to MACRO. For example:

If MACRO has already been linked to Tera Term and Tera Term is not connected to the host, this command causes Tera Term to connect to the host specified by <command line parameters>.

If MACRO has already been linked to Tera Term and Tera Term has already been connected to the host, this command is ignored.

As a result of this command, the system variable 'result' is set to one of the following values depending on the link and connection status:

ValueStatus
0Link to Tera Term has not been made.
1Connection to the host has not been made, but link to Tera Term has been made.
2Both connection and link have been made.

To test the current link and connect status before executing the 'connect' command, use the 'testlink' command.

Communication commands except 'connect', 'cygconnect' and 'testlink' can not be executed before the link is established.

Connection method

There are 3 types of connection you can establish from Tera Term macro:

  • Telnet connection (port 23)
  • SSH1 or SSH2 connection (port 22)
  • General connection
  • Connection via COM port

Telnet connections

Using /nossh is strongly recommended. Without this parameter Tera Term will start connecting with the same method (telnet or SSH) that was used during last time when teraterm.ini file was saved. In case it was SSH than your macro will try to connect via SSH and will eventually fail.

SSH connections

This way will start SSH connection without defining whether SSH1 or SSH2 has to be used.

Parameters /1 and /2 force to use SSH1 or SSH2 method.

Note: path to /keyfile should be relative to Teraterm directory. Absiolute path does not work.

Above 9 ways allow to skip popup dialog and pass username and password directly from macro. Please note that /auth=password or /auth=publickey or /auth=challenge is the parameter saying that authentication will be done by entering password or private-key-file thus you should not replace the word 'password' or the word 'publickey' in it with actual password.

Above 3 ways allow to skip popup dialog and pass username directly from macro.

Above 9 ways pass username and authentication method directly from macro, and the popup asks for password.

General connection

Note: This option value is connecting timeout value(per seconds). Connecting to myserver could be canceled after timeout has occurred with the specified value. Conversely, no action if the value is zero. The default value is zero. Also this value would be saved as `ConnectingTimeout' entry in teraterm.ini file.

Connections via COM port

Here x represents COM port number. For example to connect via COM port 1 the command will look like: connect '/C=1'

Examples

Note

  1. In these examples parameters shown with Italic font have to be replaced with their actual values.
  2. The password can contain space character. To represent space inside the password replace it with '@' character. If '@' character itself is part of the password than it has to be replaced with 2 consecutive '@' characters '@@'.
  3. Please remember that entering actual username and password in Tera Term macro will cause them to be stored as an open text and it is your responsibility to keep such macro is secure location.
  4. When a user re-connect the remote host soon after disconnecting the server, a user could not connect the server. For more detail, refer to 'here'.

NEWS CONTENTS

  • 200412 : Macro command connect syntax description ( Macro command 'connect' syntax description, )

Old News ;-)

Top Visited
Switchboard
Latest
Past week
Past month

Macro command 'connect' syntax description

Three types of connections
There are 3 types of connection you can establish from TeraTerm macro:

- Telnet connection (port 23)
- SSH1 or SSH2 connection (port 22)
- Connection via COM port

Telnet connections

Quote:

connect 'myserver:23 /nossh'

or

Tera Term Commands

Quote:

connect 'myserver:23 /telnet'

or

Quote:

connect 'myserver:23'


Using /nossh is strongly recommended. Without this parameter TeraTerm will start connecting with the same method (telnet or SSH) that was used during last time when teraterm.ini file was saved. In case it was SSH than macro will try to connect via SSH and will eventually fail.

SSH connections

Quote:

connect 'myserver /ssh'


This way will start SSH connection without defining whether SSH1 or SSH2 has to be used.

Quote:

connect 'myserver /ssh /1'

or

Quote:

connect 'myserver /ssh /2'


Parameters /1 and /2 force to use SSH1 or SSH2 method.

Quote:

connect 'myserver /ssh /auth=password /user=username /passwd=password'

or

Quote:

connect 'myserver /ssh /1 /auth=password /user=username /passwd=password'Tera Term Commands

or

Quote:

connect 'myserver /ssh /2 /auth=password /user=username /passwd=password'

or

Quote:

connect 'myserver /ssh /auth=publickey /user=username /passwd=password /keyfile=private-key-file'

or

Quote:

connect 'myserver /ssh /1 /auth=publickey /user=username /passwd=password /keyfile=private-key-file'

or

Quote:

connect 'myserver /ssh /2 /auth=publickey /user=username /passwd=password /keyfile=private-key-file'


Above 6 ways allow to skip popup dialog and pass username and password directly from macro. Please note that /auth=password or /auth=publickey is the parameter saying that authentication will be done by entering password or private-key-file thus you should not replace the word 'password' or the word 'publickey' in it with actual values. Only the words shown above with italic font have to be substituted.

Important note: The password can contain space character. To represent space inside the password replace it with @ character. If @ character itself is part of the password than it has to be replaced with 2 consecutive @ characters @@.

Please remember that entering actual username and password in TeraTerm macro will cause them to be stored as an open text and it is your responsibility to keep such macros in secure place.

A little bit better practice is to use getpassword and passwordbox commands that store encrypted passwords in the file.

Quote:

connect 'myserver /ssh /auth=password /user=username /ask4passwd'

or

Quote:

connect 'myserver /ssh /1 /auth=password /user=username /ask4passwd'

or

Quote:

connect 'myserver /ssh /2 /auth=password /user=username /ask4passwd'

or

Quote:

connect 'myserver /ssh /auth=publickey /user=username /ask4passwd /keyfile=private-key-file'

or

Quote:

Tera Term Scripting

connect 'myserver /ssh /1 /auth=publickey /user=username /ask4passwd /keyfile=private-key-file'

or

Quote:

connect 'myserver /ssh /2 /auth=publickey /user=username /ask4passwd /keyfile=private-key-file'


Above 6 ways pass username and authentication method directly from macro, and the popup asks for password.

Connections via COM port

Quote:

connect '/C=x'


Here x represents COM port number. For example to connect via COM port 1 the command will look like: connect '/C=1'

About setsync
It is highly recommended to use the macro command

Quote:

setsync 1


right after the command connect. This command switches TeraTerm into synchronous communication mode in which the buffer never overflows. See TeraTerm Macro help for more details.
_________________
Thanks.
Best regards,
// Boris

Recommended Links

Google matched content

Softpanorama Recommended

Top articles

Sites

Etc

Society

Groupthink :Two Party System as Polyarchy : Corruption of Regulators :Bureaucracies :Understanding Micromanagers and Control Freaks : Toxic Managers : Harvard Mafia :Diplomatic Communication : Surviving a Bad Performance Review : Insufficient Retirement Funds as Immanent Problem of Neoliberal Regime : PseudoScience :Who Rules America :Neoliberalism : The Iron Law of Oligarchy : Libertarian Philosophy

Quotes

War and Peace: Skeptical Finance : John Kenneth Galbraith :Talleyrand :Oscar Wilde :Otto Von Bismarck :Keynes :George Carlin :Skeptics :Propaganda : SE quotes : Language Design and Programming Quotes :Random IT-related quotes : Somerset Maugham :Marcus Aurelius :Kurt Vonnegut :Eric Hoffer :Winston Churchill :Napoleon Bonaparte :Ambrose Bierce : Bernard Shaw : Mark Twain Quotes

Bulletin:

Tera Term Commands

Vol 25, No.12 (December, 2013) Rational Fools vs. Efficient Crooks The efficient markets hypothesis :Political Skeptic Bulletin, 2013 :Unemployment Bulletin, 2010 : Vol 23, No.10 (October, 2011) An observation about corporate security departments :Slightly Skeptical Euromaydan Chronicles, June 2014 :Greenspan legacy bulletin, 2008 :Vol 25, No.10 (October, 2013) Cryptolocker Trojan (Win32/Crilock.A) :Vol 25, No.08 (August, 2013) Cloud providers as intelligence collection hubs : Financial Humor Bulletin, 2010 :Inequality Bulletin, 2009 :Financial Humor Bulletin, 2008 :Copyleft Problems Bulletin, 2004 :Financial Humor Bulletin, 2011 :Energy Bulletin, 2010 : Malware Protection Bulletin, 2010 : Vol 26, No.1 (January, 2013) Object-Oriented Cult :Political Skeptic Bulletin, 2011 :Vol 23, No.11 (November, 2011) Softpanorama classification of sysadmin horror stories : Vol 25, No.05 (May, 2013) Corporate bullshit as a communication method : Vol 25, No.06 (June, 2013) A Note on the Relationship of Brooks Law and Conway Law

History:

Fifty glorious years (1950-2000): the triumph of the US computer engineering :Donald Knuth : TAoCP and its Influence of Computer Science : Richard Stallman : Linus Torvalds :Larry Wall :John K. Ousterhout : CTSS : Multix OSUnix History : Unix shell history :VI editor :History of pipes concept :Solaris : MS DOS : Programming Languages History :PL/1 : Simula 67 :C :History of GCC development : Scripting Languages :Perl history :OS History : Mail :DNS : SSH : CPU Instruction Sets :SPARC systems 1987-2006 :Norton Commander :Norton Utilities :Norton Ghost :Frontpage history :Malware Defense History :GNU Screen : OSS early history

Classic books:

The Peter Principle : Parkinson Law : 1984 :The Mythical Man-Month : How to Solve It by George Polya :The Art of Computer Programming :The Elements of Programming Style :The Unix Hater’s Handbook :The Jargon file :The True Believer :Programming Pearls :The Good Soldier Svejk : The Power Elite

Most popular humor pages:

Manifest of the Softpanorama IT Slacker Society :Ten Commandments of the IT Slackers Society : Computer Humor Collection : BSD Logo Story :The Cuckoo's Egg :IT Slang : C++ Humor : ARE YOU A BBS ADDICT? :The Perl Purity Test :Object oriented programmers of all nations : Financial Humor :Financial Humor Bulletin, 2008 : Financial Humor Bulletin, 2010 : The Most Comprehensive Collection of Editor-related Humor : Programming Language Humor :Goldman Sachs related humor :Greenspan humor : C Humor :Scripting Humor :Real Programmers Humor :Web Humor : GPL-related Humor : OFM Humor :Politically Incorrect Humor :IDS Humor : 'Linux Sucks' Humor : Russian Musical Humor : Best Russian Programmer Humor : Microsoft plans to buy Catholic Church : Richard Stallman Related Humor :Admin Humor : Perl-related Humor : Linus Torvalds Related humor : PseudoScience Related Humor :Networking Humor :Shell Humor :Financial Humor Bulletin, 2011 : Financial Humor Bulletin, 2012 :Financial Humor Bulletin, 2013 : Java Humor : Software Engineering Humor : Sun Solaris Related Humor :Education Humor : IBM Humor : Assembler-related Humor :VIM Humor : Computer Viruses Humor : Bright tomorrow is rescheduled to a day after tomorrow : Classic Computer Humor

The Last but not LeastTechnology is dominated by two types of people: those who understand what they do not manage and those who manage what they do not understand ~Archibald Putt. Ph.D

Copyright © 1996-2020 by Softpanorama Society. www.softpanorama.org was initially created as a service to the (now defunct) UN Sustainable Development Networking Programme (SDNP) in the author free time and without any remuneration. This document is an industrial compilation designed and created exclusively for educational use and is distributed under the Softpanorama Content License. Original materials copyright belong to respective owners. Quotes are made for educational purposes only in compliance with the fair use doctrine.

FAIR USE NOTICEThis site contains copyrighted material the use of which has not always been specifically authorized by the copyright owner. We are making such material available to advance understanding of computer science, IT technology, economic, scientific, and social issues. We believe this constitutes a 'fair use' of any such copyrighted material as provided by section 107 of the US Copyright Law according to which such material can be distributed without profit exclusively for research and educational purposes.

This is a Spartan WHYFF (We Help You For Free) site written by people for whom English is not a native language. Grammar and spelling errors should be expected. The site contain some broken links as it develops like a living tree...

You can use PayPal to make a contribution, supporting development of this site and speed up access. In case softpanorama.org is down you can use the at softpanorama.info

Tera Term Command Reference

Disclaimer:

The statements, views and opinions presented on this web page are those of the author (or referenced source) and are not endorsed by, nor do they necessarily reflect, the opinions of the author present and former employers, SDNP or any other organization the author may be associated with.We do not warrant the correctness of the information provided or its fitness for any purpose. The site uses AdSense so you need to be aware of Google privacy policy. You you do not want to be tracked by Google please disable Javascript for this site. This site is perfectly usable without Javascript.

Last modified: July 28, 2019