3 Sept 2024

How We Tamed a Legacy Avaya Switch with Telnet, VT100, and a Bit of rConfig Magic

How We Tamed a Legacy Avaya Switch with Telnet, VT100, and a Bit of rConfig Magic

Discover how rConfig tackled a tricky Telnet login on a legacy Avaya Switch using VT100 control codes, automation magic, and a whole lot of coffee. A win for both Core and Pro users!

stephen stack portrait
stephen stack portrait

Stephen Stack

CTO, rConfig

Hello everyone! As the CTO of rConfig, I'm often in the trenches, dealing with all sorts of quirky tech scenarios. Today, I'm excited to share a recent adventure we had with an ISP in the UK, featuring a legacy Avaya Switch series. You can check out the product details here: Avaya Switch Series Datasheet. It's quite the read!

Our journey began when a customer needed help backing up this device via telnet – a request we simply couldn't ignore. We pride ourselves on not letting our customers down, so we rolled up our sleeves and dove in. Several caffeine-fueled hours later, we emerged victorious with an elegant and surprisingly simple solution. And guess what? It works for both our pro and core customers.

Now, let's talk about the problem. When you log into these devices via telnet, you're greeted with a splash screen. From a marketing standpoint, it makes sense, but it's a bit of a hurdle for automation scripts. You're prompted to press ctrl+y to proceed, a small but crucial step. See the screenshot below:

After bypassing the initial splash screen, you encounter another one – a reminder of the days when CLI interfaces were designed solely for human interaction. You enter your username and password, fill in the fields, and voilà, you're at the standard switch prompt, ready to get down to business.

But here's the kicker: when accessing the device via standard telnet, your keystrokes are translated into VT100 control codes, which the CLI's VT100 interpreter then processes. This is great for humans, but not so much for scripts or applications like rConfig. We needed a way to get passed the splash screens and proceed to the CLI prompt, all without human intervention.

Speaking of rConfig, our Telnet engine is pretty robust, supporting thousands of different vendor implementations. But this Avaya switch presented a unique challenge. We realized we were dealing with a VT100 implementation, evident from the special character strings in the rConfig debug output.

Here are some examples of what we saw when working on VT100 connsoles. A bit like the matrix, an experieinced eye can see the patterns in the output right away.:

[<span class="hljs-number">24</span>;0HE/
[<span class="hljs-number">24</span>;0HE
[<span class="hljs-number">24</span>;<span class="hljs-number">38</span>H
[<span class="hljs-number">24</span>;<span class="hljs-number">19</span>H
[?<span class="hljs-number">25</span>h
[<span class="hljs-number">1</span>;<span class="hljs-number">24</span>r
[<span class="hljs-number">24</span>;<span class="hljs-number">1</span>H
[<span class="hljs-number">2</span>K

So, what was the solution? It turned out to be straightforward. We needed to identify the VT100 control code for ctrl+y, which is x19 (you can find it here: IBM VT100 Control Characters). The actual PHP code to send this was simply:

fwrite(<span class="hljs-keyword">$this</span>->connection, <span class="hljs-string">'\X19'</span>); <span class="hljs-comment">// ASCII code for Ctrl+Y</span>

To keep this solution flexible for rConfig, we added special parameters to a new connection template for this device. Based on these parameters, the system sends ctrl+y and credentials in response to specific data.

Here's a glimpse of the template code:

<span class="hljs-section">vt100:</span>
    hasSplashScreen: <span class="hljs-string">"on"</span>
    splashScreenReadToText: <span class="hljs-string">"008"</span>
    splashScreenSendControlCode: <span class="hljs-string">"\x19"</span>

The full template is in our templates github repo.

In conclusion, this adventure underscores the versatility of rConfig. We're not just about managing configurations; we're about embracing the challenge of legacy devices and protocols, ensuring our platform remains vendor-agnostic and flexible. And yes, troubleshooting this with a fantastic customer was a blast!

Oh, and by the way, all tests passed post-implementation in both V6 Core and V7 Pro.

There you have it! A little peek into the life of a CTO at rConfig, where every day is a new opportunity to tackle the fascinating world of network management. Stay tuned for more tales from our tech adventures!

Why rConfig is Going All-In at Zabbix Summit 2025 — and What We’re Launching There

We’re thrilled to share that rConfig is going Platinum at the Zabbix Summit 2025, taking place this October 8–10 in Riga. This isn’t just a sponsorship — it’s a statement. We're bringing the full power of our new rConfig V8 release to the global stage, including two major new features: a next-gen Zabbix integration and a soon-to-be-revealed AI-powered capability that’s going to change the game for network teams. If you’re in the business of automating, scaling, or securing network operations — you’ll want to see what’s coming.

rConfig

All at rConfig

Cisco Critical CVE Image
Cisco Critical CVE Image
🚨 URGENT: Critical Cisco Vulnerability Allows Remote Command Execution with Root Privileges (CVE-2025-20188)

Network security teams are racing to address a new critical vulnerability in Cisco IOS XE Wireless Controller Software. With a maximum CVSS score of 10.0, CVE-2025-20188 allows unauthenticated attackers to remotely execute commands with root privileges across enterprise networks. This post explains the vulnerability details and demonstrates how rConfig's automation tools can detect, mitigate, and verify fixes across your entire infrastructure within minutes instead of days. Protect your Catalyst 9800 devices now with these step-by-step remediation techniques.

rConfig

All at rConfig

rconfig vector poster
rconfig vector poster
Introducing rConfig Vector: Scalable, Distributed Network Configuration Management for Modern Teams

Discover rConfig Vector—the next-gen distributed NCM solution designed for scale, speed, and security. Built for modern IT teams, Vector offers high availability, encryption by default, lightning-fast backups, and seamless tool integration. Future-proof your network management today.

Stephen Stack

CTO, rConfig

+5

Trusted by Leading Enterprises

Want to see how rConfig can transform your network management?

Contact us today to discuss your specific use case and get expert guidance on securing and optimizing your infrastructure.

An isometric illustration of a person standing on a digital platform beside a staircase, interacting with floating holographic screens, symbolizing technological advancement and data analysis.

+5

Trusted by Leading Enterprises

Want to see how rConfig can transform your network management?

Contact us today to discuss your specific use case and get expert guidance on securing and optimizing your infrastructure.

An isometric illustration of a person standing on a digital platform beside a staircase, interacting with floating holographic screens, symbolizing technological advancement and data analysis.

+5

Trusted by Leading Enterprises

Want to see how rConfig can transform your network management?

Contact us today to discuss your specific use case and get expert guidance on securing and optimizing your infrastructure.

An isometric illustration of a person standing on a digital platform beside a staircase, interacting with floating holographic screens, symbolizing technological advancement and data analysis.