[nos-bbs] Autoexec.Nos

Dave dave at mynatt.biz
Fri Aug 28 23:11:39 EDT 2009


Here's the autoexec.nos.  Sorry.....



 
===================================================
#
# A minimal autoexec.nos for a JNOS system having network connectivity to #
the linux box on which it is running on. From JNOS you can telnet to the #
linux box, and from the linux box you can telnet to JNOS. Any packet radio #
users can connect to JNOS through the single RF port which can be any TNC #
running in KISS mode. This configuration also allows JNOS users to exchange
# mail with other JNOS users (local mail), using the Send and Receive cmds.
#
# The jnosinstaller was designed for first time JNOS users, giving them #
something to start playing with.
#
# This autoexec.nos was GENERATED by jnosinstaller (version 2.1), which was
# released in January of 2008. The original version was written in July of #
the year 2005 - both versions written by Maiko Langelaar / VE4KLM.
#
# Enable JNOS to log events to dated files in /jnos/logs directory # log on
# # Maximize TCP performance for standard LAN having MTU 1500 # tcp mss 1460
tcp window 5840 # tcp maxwait 30000 tcp retries 5 # ip address 192.168.2.2
ip address 10.1.10.154 # # Hostname and default ax25 call # hostname
KA0SWT-13
ax25 mycall KA0SWT-13
#
# Local DNS is done via the 'domain.txt' file !
#
# Create a network interface. This allows us to talk to the linux # box on
which JNOS is running - and in turn - to the internet.
#
attach tun tun0 1500 0
# ifconfig tun0 ipaddress 192.168.2.2
ifconfig tun0 ipaddress 10.1.10.154
ifconfig tun0 netmask 255.255.255.0
ifconfig tun0 mtu 1500
#
# Give it a chance to come up
#
pause 1
#
# JNOS creates the TUN device, so JNOS needs to do some post configuration,
# by shelling out to the linux command line and running 'ifconfig' command.
#
shell ifconfig tun0 192.168.2.1 pointopoint 192.168.2.2 mtu 1500 up # #
Attach AXIP wormhole to a remote system # attach axip axi0 256 192.168.0.103
# ifconfig axi0 description "axip wormhole"
#
# Attach AXUDP wormhole to a remote system # attach axudp axu0 256
192.168.0.103 # ifconfig axu0 description "axudp wormhole"
#
# Attach a kiss enabled TNC
#
attach asy ttyS0 - ax25 vhf 4096 256 9600 # ifconfig vhf description "vhf -
1200 baud port"
#
param vhf 2 256
param vhf 3 1
param vhf 5 1
#
param vhf TxDelay 25
#
# Beacon out the RF port every 20 minutes # #
ax25 bctext "internet gateway"
ax25 bcinterval 1200
ax25 bc vhf
#
# Start the engines
#
start ax25
start telnet
start smtp
#








 
 
 
 
 
 
 
 
 
 
 
 
 
Dave 
DM78qg // KA0SWT
Well, if I called the wrong number, why did you answer the phone? -- James
Thurber, New Yorker cartoon caption, June 5, 1937
+++++++++++++++++++++++++++++++++++++
 
 
 
 

________________________________

From: nos-bbs-bounces at tapr.org [mailto:nos-bbs-bounces at tapr.org] On Behalf
Of Bob Tenty
Sent: Friday, August 28, 2009 9:02 PM
To: TAPR xNOS Mailing List
Subject: Re: [nos-bbs] Autoexec.Nos


Hi Dave,

We didn't see your autoexec.nos only an ifconfig of your interfaces.
Maybe this list doesn't allow attached files. (If it was attached)

73,

Bob VE3TOK

Dave wrote: 

	Hi group-
	 
	I was wondering if someone would look at this autoexec and let me
know if
	I'm in the ballpark. This is pretty much as the installer configured
it.
	Any help, advice, recommendations or comments welcome as I start
getting
	this thing going. Seems like a wonderful app, but help is needed to
make
	sure I don't mess someone else up.
	 
	==========================================
	jnos> ifconfig
	vhf      IP addr 10.1.10.154 MTU 256 Link encap AX25
	         Link addr KA0SWT   BBS KA0SWT   Paclen 256   Irtt 5000
	         BCText: internet gateway
	         flags 0xcb0 trace 0x0 netmask 0x00000000 broadcast 0.0.0.0
	         sent: ip 0 tot 5 idle 0:00:00:05
	         recv: ip 0 tot 0 idle 0:00:00:06
	         descr: vhf - 1200 baud port
	axu0     IP addr 10.1.10.154 MTU 256 Link encap AX25
	         Link addr KA0SWT   BBS KA0SWT   Paclen 256   Irtt 5000
	         BCText: internet gateway
	         AXIP dest 192.168.0.103
	         flags 0xcb0 trace 0x0 netmask 0x00000000 broadcast 0.0.0.0
	         sent: ip 0 tot 0 idle 0:00:00:06
	         recv: ip 0 tot 0 idle 0:00:00:06
	         descr: axudp wormhole
	axi0     IP addr 10.1.10.154 MTU 256 Link encap AX25
	         Link addr KA0SWT   BBS KA0SWT   Paclen 256   Irtt 5000
	         BCText: internet gateway
	         AXIP dest 192.168.0.103
	         flags 0xcb0 trace 0x0 netmask 0x00000000 broadcast 0.0.0.0
	         sent: ip 0 tot 0 idle 0:00:00:06
	         recv: ip 0 tot 0 idle 0:00:00:06
	         descr: axip wormhole
	tun0     IP addr 10.1.10.154 MTU 1500 Link encap TUN
	         flags 0x0 trace 0x0 netmask 0x00000255 broadcast 0.0.0.0
	         sent: ip 0 tot 0 idle 0:00:00:06
	         recv: ip 0 tot 0 idle 0:00:00:06 
	loopback IP addr 127.0.0.1 MTU 65535 Link encap None
	         flags 0x0 trace 0x0 netmask 0xffffffff broadcast
255.255.255.255
	         sent: ip 0 tot 0 idle 0:00:00:06
	         recv: ip 0 tot 0 idle 0:00:00:06
	encap    IP addr 0.0.0.0 MTU 65535 Link encap None
	         flags 0x0 trace 0x0 netmask 0xffffffff broadcast
255.255.255.255
	         sent: ip 0 tot 0 idle 0:00:00:06
	         recv: ip 0 tot 0 idle 0:00:00:06
	jnos> 
	 
	========================================
	
	Much thanks,
	
	Dave
	  
	________________________________



	No virus found in this outgoing message.
	Checked by AVG - www.avg.com 
	Version: 8.5.409 / Virus Database: 270.13.71/2331 - Release Date:
08/28/09 06:26:00
	
	  
	________________________________


	_______________________________________________
	nos-bbs mailing list
	nos-bbs at tapr.org
	https://www.tapr.org/cgi-bin/mailman/listinfo/nos-bbs
	  


-------------- next part --------------

No virus found in this outgoing message.
Checked by AVG - www.avg.com 
Version: 8.5.409 / Virus Database: 270.13.71/2332 - Release Date: 08/28/09 18:10:00


More information about the nos-bbs mailing list