Solved

Using Com1 to romote into a Dell Poweredge 2950

Posted on 2016-07-25
4
91 Views
Last Modified: 2016-11-22
hi, i am trying to use the serial port to get into a dell poweredge 2950.. i am using Putty.. it does not seem to get in .. any suggestions?

thank you
0
Comment
Question by:JerseyGiant
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
4 Comments
 
LVL 22

Assisted Solution

by:David Atkin
David Atkin earned 250 total points (awarded by participants)
ID: 41727661
Are you changing the connection type to Serial?  Have you checked the port baud rate?

Have a look at this article:
http://www.chipkin.com/using-putty-for-serial-com-connections-hyperterminal-replacement/


To use PuTTY for your serial COM connections, follow these steps:
1. Figure out the COM port you’ll be using.
2. Run PuTTY.
3. Switch the Connection Type to Serial.
4. Edit the Serial Line to match the COM port you want to use.
5. Edit the Speed to match the BAUD Rate you want to use.
6. Select the Serial category from the menu on the left.
7. Make sure all of the settings are correct (the settings in the screenshot are what I used for my session, yours could look different depending on what you’re connecting to).
8. Select the Open button to start the session.
Your connection should now be fully functional.
If you find yourself using PuTTY quite extensively, you could save settings to different profiles for fast future usage. To create a profile for your settings:
1. Make sure you have the settings you require.
2. Enter a profile name under Saved Sessions.
3. Click the Save button.
On your next PuTTY session, you can load your profile by selecting it from the list and clicking the Load button.
Logging is also a great feature that PuTTY provides. It lets you output your entire session to a log file. To enable logging, follow these steps before you open your connection:
1. Select Logging from the category list on the left.
2. Choose your desired logging method (All session output, printable output, etc…)
3. Enter a file name.
4. Select the file handling settings.
5. Open your connection.
1
 
LVL 27

Accepted Solution

by:
Dr. Klahn earned 250 total points (awarded by participants)
ID: 41728753
We need some more information here, I think.  Mainly, what operating system is the Poweredge running?

If it's linux, then COM1 should be available as a TTY port at some speed.

But if it's Windows, COM1 is just an application port available to any process unless you tell Windows it's something else by defining it as a network connection host port.  If this has not been done, Windows will cheerfully ignore anything coming in on a COM port.

And don't forget the obvious but easy to forget:  Use a null modem cable, not a straight-through cable.
1
 
LVL 27

Expert Comment

by:Dr. Klahn
ID: 41755351
Additional information from the customer would have helped both him and us.
0
 

Author Comment

by:JerseyGiant
ID: 41758425
thank you
0

Featured Post

Edgartown IT Case Study

Learn about Edgartown's quest to ensure the safety and security of the entire town's employee and citizen data. Read the case study!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

The 6120xp switches seem to have a bug when you create a fiber port channel when you have a UCS fabric interconnects talking to them.  If you follow the Cisco guide for the UCS, the FC Port channel will never come up and it will say that there are n…
Usually shares are where we want them for our users and we tend to take them for granted. There are times, however, when those shares may disappear causing difficulty for your users. One of the first things to try is searching for files that shou…
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…
Attackers love to prey on accounts that have privileges. Reducing privileged accounts and protecting privileged accounts therefore is paramount. Users, groups, and service accounts need to be protected to help protect the entire Active Directory …

710 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question