1.2 THEORY OF OPERATION ................................................................................................................................. 3
1.3 SEAL ................................................................................................................................................................ 5
This document desc ribes all of the procedures neces sary to operate the Remotely Monitored
Seal Array system including the Seals, their supporting Translators, and communications
subsystems. The User is expected to be familiar with the basic PC and MS/DOS procedures.
This document is divided into the following five chapters:
Chapter 1 RMSA System Description - T his section includes an RMSA system overview
and theory of operation and describes the Seal, Translator and Rem ote Review
Application software.
Chapter 2 RMSA System Set-Up - This section provides step-by-step instructions for
setting up each of the RMSA System components.
Chapter 3 RMSA Key Generation - This section contains the procedures for generating
cryptographic keys that will be loaded into the Seal.
Chapter 4 RMSA Security - This section discusses RMSA Security via encryption,
authentication, and default keys for a specific Seal.
Chapter 5 Remote Review of Seal Data - This section demonstrates the Remote Review of
Seal Data.
Safety Guidelines
Caution – Do not operate this unit in a manner not specified in this document.
Caution – Only use this unit with the manufacturer provided input power cable.
FCC Compliance
Compliance Statement (Part 15.19)
The enclosed hardware device complies with Part 15 of the FCC R ules. Operation is subject to the follow ing tw o
conditions: (1) This device may not cause harmful interference, and (2) This device must accept any interfer ence
received including interference that may cause undesired operation.
Warning (Part 15.21)
Changes or modifications not expressly approved by Canberra Industries could void the user’s authority to operate
the equipment. Manufacturer is not responsible for any radio or TV inter ference caused by unauthorized
modifications to this equipment.
Compliance Statement (Part 15.105(b))
This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part
15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a
residential installation. This equipment generates, uses and can radiate radio frequency energy and, if not installed
and used in accordance with the instructions, may cause harmful interference to radio communications. However,
REMOTELY MONITORED SEAL ARRAY(RMSA)
I
SFG-MAN-001
REVISION: 1.7
2016 CANBERRA
there is no guarantee that interference will not occur in a particular installation. If this equipment does cause
harmful interference to radio or television reception, which can be determined by turning the equipment off and on,
the user is encouraged to try to correct the interference by one or more of the following measures:
• Reorient or relocate the receiving antenna
• Increase the separation between the equipment and receiver
• Connect the equipment into an outlet on a circuit different from that to which the receiver is connected
• Consult the dealer or an experienced radio/TV technician for help
Industry Canada (IC) r egulatory information
This device complies with Industry Canada license-ex empt RSS standar d(s). Operation is subject to the follow ing
two conditions: (1) this device may not cause interference, and (2) this device must accept any interference,
including interference that may cause undesired operation of the device.
Le présent appareil est conforme aux CNR d'Industrie
Canada applicables aux appareils radio exempts de licence. L'exploitation est autor isée aux deux conditions
suivantes : (1) l'appareil ne doit pas produire de brouillage, et (2) l'utilisateur de l'appareil doit accepter tout
brouillage radioélectrique subi, même si le brouillage est susceptible d'en compromettre le fonctionnement.
Class B digital device notice
This Class B digital apparatus complies with Canadian
ICES-003, RSS-Gen and RS S-210.
Cet appareil numérique de la classe B est conforme à
la norme NMB-003, CNR -Gen et CNR-210 du Canada.
•The system antenna(s) used for this transmitter must be installed to provide a separation distance of at least
20cm from all the persons and must not be co-located or operating in conjunction with any other antenna or
transmitter, except in accordance with FCC and Industry Canada multi-transmitter product procedures.
•The system antenna(s) used for this module must not exceed 10dBi (CDM A BC 0) and 9.31dBi (CD M A BC1)
for mobile and fixed operating configurations. Users and installers must be provided w ith antenna installation
instructions and transmitter operating conditions for satisfying RF exposure compliance.
Translator Input P ow er
Voltage: 100-240 VAC, 50-60Hz
Power Consumption: .75A
Prepared by:
Author(s): Michael Fontanarosa, Tammy Wenderlich
II
REMOTELY MONITORED SEAL ARRAY(RMSA)
SFG-MAN-001
REVISION: 1.7
2016 CANBERRA
Chapter
Introduction
Welcom e to the Remotely Monitored Seal Array (RMSA) system provided by Canberra and
Sandia National Labs. RMSA was designed to meet the needs of a large bas e of Users who
require more data storage features, better RF performance, longer battery life, enhanced
security and other more powerful functions. Figure 1 provides a pictorial representation of how
the RMSA System f its within the Secure Sensor Platf orm (SSP) product family constellation in
terms of its complexity and shared capabilities.
The RMSA Seal monitors a fiber optic loop, records tamper events, provides autonomous and
requested State of Health via encrypted and authenticated messages. This information is
stored in the Seal, remotely via the RMSA Translator and reviewed through the Remote
Review Application. T he Authenticated Switch vers ion of the Seal includes m agnetic sensors
and activating magnets such that a pair of Authentic ate Switch Seals can be used to create a
balanced magnetic switch suitable for monitoring doors, containers and other ar ticles where
one surface moves away from another under authorized conditions.
1.1 RMSA System Overview
The RMSA system consists of Seals, a Translator, a Program ming Card interfac e as well as
the Remote Review Application. The RMSA system provides the following features:
• Offers a low cost solution for monitoring Sealed components
• Incorporates high reliability
• It is inexpensive compared to earlier RF Seals
• Ensures surveillance capabilities available for a long duration
• Provides requested or periodic state of health updates
• Monitors and records date and time of any Seal tamper or other events
• Secures Seal data wi th encryption and authentication techniques
• Allows remote review of Seals
• Can receive messages from multiple Seals while polling for data via Remote Review
• Requires no license for its low power 900 MHz ISM band RF communication
Each of these features will be discussed in this RMSA User Guide.
1
REMOTELY MONITORED SEAL ARRAY(RMSA)
SFG-MAN-001
REVISION: 1.7
2016 CANBERRA
Figure 1 Capability and Implementation Relational Diagram
2
REMOTELY MONITORED SEAL ARRAY(RMSA)
SFG-MAN-001
REVISION: 1.7
2016 CANBERRA
1.2 Theory of Operation
The RMSA allows for monitoring of a fiber optic or authenticated switch sensor as a Seal. See
Figure 2 for an overview of the RMSA system configur ation. Seal data is collected with an
RMSA Translator with Translator/Seal communications via a no-license, low power RF
communications c hannel. Seal data is encrypted, authenticated, and stored before transfer to
the Translator as the Translator is an unsecure device. A Microsoft Windows (XP-based)
Remote Review Application host can decrypt and authenticate the data stored on the
Translator for inspec tor analysis. A TCP/IP (Ethernet) connection between the T ranslator and
the Remote Review Application host facilitates the transfer of data from the T ranslator to the
Remote Review Application. In addition to remote review, this network connection is used to
allow the inspector to interrogate specific Seals for state-of-health or to request re-send of a
specific Seal message.
The RMSA system is capable of supporting thr ee configuration modes of operation. These
three modes are designated standalone mode, local host supported mode and remote
monitoring mode. In the standalone configuration the system hardware may consist of m any
active Seals and one Translator, which sits unmonitored f or long periods of time. The local
host supported configuration is via an Ethernet interface connected directly to a local host
computer. The remote monitoring mode is similar to the local host mode but is via the internet
to allow monitoring by a host computer of the RMSA system over the internet.
The Programming Card has several functions. It is used to provide power via an external
power supply, a USB interface or from a Microchip compatible programm ing device. It also
converts the Microchip RJ12 connector 6-wire programming cable to the RMSA 8-wire
interface cable. The RMSA interf ace cable is used to program the mic rocontroller code and
Seal personality information that is unique to each Seal. It also provides the interface between
an external USB device, such as a PC, and the UART on the Seal, for personality
programming and debugging.
3
REMOTELY MONITORED SEAL ARRAY(RMSA)
SFG-MAN-001
REVISION: 1.7
2016 CANBERRA
Figure 2 RMSA System Configuration
4
REMOTELY MONITORED SEAL ARRAY(RMSA)
SFG-MAN-001
REVISION: 1.7
2016 CANBERRA
1.3 Seal
The Seal's design is rugged and resistant to tampering. Its electronics are in a tamper
indicating plastic housing. See Figure 3 f or a picture of the prototype version of Seal in its
case. A pair of tamper switches is used to detect any opening of the Seal housing. The Seal
housing may be opened to replace the internal batteries. Openings are recorded as tamper
events. The Seal is contained in either a white PVC or a blue and white swirl polycarbonate
plastic overlapping two piece case that contains an O-ring Sealing system for environmental
protection. The Plastic Optical Fiber (POF) cable connectors have special Delrin® plastic
ferules along with O-ring Sealing gaskets.
Figure 3 Seal in Case
Advantages of using the RMSA Seal include the following:
• Can be reused indefinitely
• Can be read in situ without removal from the Sealed item
• No external power required, battery operated
• Provides intrinsic tamper indication
• Easily installed
• One or multiple Seals can be read remotely
The Seal stores data and then forwards this data securely to a local Translator via low
power RF communication. As many as 2000 normal State of Health messages are stored
locally in the Seal in a non-volati le circular memory buffer. This locally stored Seal data
can be retrieved manually by the User by using the Send Message Protocol should RF
transmission be interrupted during normal operation.
5
REMOTELY MONITORED SEAL ARRAY(RMSA)
SFG-MAN-001
REVISION: 1.7
2016 CANBERRA
The Seal is comprised of the following major components: the Fiber Optic Cable, a Fiber Optic
Emitter and a Fiber Optic Receiver, a Microcontroller, Memory, an RF Transceiver and Real
Time Cloc k. Other inherent components include the Battery Pack, Personality and Security
Key programming, and the Programming Interface. See Figure 4 for a block diagram of the
Seal.
Authenticated Switch Seals contain all of the components in the Seal, and additionally have a
complementary set of magnetic switches, one operating as normally closed and the other
operating as normally open. There is also a strong m agnet installed in the housing such that
when two Authenticated Switch modules are installed face to face, the magnet from one
activates the magnetic switches on the other module.
6
REMOTELY MONITORED SEAL ARRAY(RMSA)
SFG-MAN-001
REVISION: 1.7
2016 CANBERRA
PIC
18
FL
6722
Microcontroller
Real Time Clock
CC
1100
RF Transceiver
Memory
Fiber Optic
Emitter
Fiber Optic
Receiver
Tamper
Battery
Pack
I2C
SPI
Programming
Interface
TX/ RX
To USB
Programming
Cable
VDD
(
unregulated
)
30
Meters
1
mm Plastic Fiber
SPI
Figure 4 Block Diagram of the Seal
7
REMOTELY MONITORED SEAL ARRAY(RMSA)
SFG-MAN-001
REVISION: 1.7
2016 CANBERRA
A parametric measure of the light intensity through the Fiber Cable Monitor is monitored
electronically by the Seal. The fiber optic loop may be as short as 1 meter and as long as 30
meters in length.
Dates and times of opening or clos ing the loop, tampering, out of boundary conditions and
interrogation are stored in the Seal. Each Seal has a unique ID number that is programm ed
before deployment in non-volatile memory internally. A new Seal received from the
manufacturer does not contain any personality information such as encryption or authentication
keys. For the Seal initialization and configuration process, refer to Section 2.1.
For tamper resistanc e, a pair of tamper switches along with a special pin attached to the case
top are used together to detect opening of the Seal case. Once the case is opened, the time of
this tamper is recorded f or later review. Additionally, the encr yption and authentication keys
are automatically destroyed and a default key is used from that point forward to do both the
encryption and authentication for any further messages.
The Seal contains the following components:
•Quartz crystal based timer (real-time clock) to ensure high precision in time/date
generation
•Microchip low power microcontroller with 128 Kbyte Flash memory to c ontrol the Seal
functions, encryption, and transmit information
• Non-volatile Flash memory to store up to 2000 normal SOH messages
• Case switches for tamper detection
• Fiber optic circuits to emit and r eceive light pulses traveling through the optical fiber
loop
•Serial interface for data exchange between the Seal and the Personality Programming
device
• Two AA 3.6V, 2100 mA-H Lithium Batteries
• Temperature monitor circuit
• Programmable RF transceiver for the 900 MHz ISM band
• Magnasphere magnetic switches (Authenticated Switch only)
• Cylindrical magnet (Authenticated Switch only)
The microprocessor is activated by any of the following events:
• Tampering attempt on the case switch
• Fiber optic (FO) loop event
• Valid request for communication (interrogation, initialization, etc.)
8
REMOTELY MONITORED SEAL ARRAY(RMSA)
SFG-MAN-001
REVISION: 1.7
2016 CANBERRA
• Magnetic switch activation (Authenticated Switch only)
The plastic optical fiber (POF) cable is a 200-micron single fiber in a 1000 micron (1mm)
plastic jacket. At each end is a r em ovable plastic ferrule for connecting the POF into the Seal
body. There is a 1 mm hole in the f err ule to allow the POF to pass through and ins ert into the
Seal case opening to allow light from the POF to either enter or exit.
To communicate with the Seal, the Seal is connected to a PC USB port through the
Programming Card. The Seal’s two replaceable AA 3.6V lithium batteries may provide a
source of power for over four years, although it is recommended that they be replaced sooner if
there is more RF transmitting activity than normal.
1.4 Translator
The Translator is the device used to read the Seal data in situ. The Translator collects, stores,
and then for wards data fr om Seals upon request, local or remote. All data is encrypted by the
Seals before transmiss ion, though som e portions of the data fr am e s uch as Seal ID is sent in
the clear (no encryption). An authentication signature is part of the overall Seal message. The
Translator can then trans fer this pre-encrypted Seal data via its Ethernet link as it does not
decrypt the data nor authenticate nor does not contain such functionality. The Translator
sends on the encrypted Seal mes sages as well as non-encrypted information regarding the
Seal address, the number of bytes in the enc rypted m essages, received signal strength as
seen by the Translator, and other information. Dat a can then be verified and analyzed on-site
or remotely worldwide.
When a message is transmitted the source device expects an acknowledge response from the
destination device. If an acknowledge m essage is not received the source device retransm its
the message after a random stand-off period of time. This RF “hand-shak e” is an aff irmative
action and has been shown to cut down the amount of RF tr af f ic used by other types of Seals.
The Seal will only try to wait for this acknowledgem ent of successful data reception by the
Translator up to three times before s topping any further attempts for that particular mes sage.
The Translator stores the messages chronologically in non-volatile memory.
For physical security, the Translator is hous ed in a tamper-indicating enclosure with openings
for RF antenna and an Ethernet cable. The Translator consists of an ARM9 based single
board computer (SBC) with a specially designed PC/104 daughter card called the T ranslator
Communication Card (T CC), a universal 115/230V, 50/60Hz AC to 5VDC power supply, two
external vertical swivel antennas and a tamper switch. See Figure 5 for a block diagram of the
Translator. The SBC runs Debian Linux and contains the Operating System and RMSA
application on a removable 4 GB SD card. There are 128 MB of DDR RAM, 512MB of NAND
Flash, USB ports, Gigabit Ethernet, a serial port and several other items which are not used on
the SBC. The T ranslator may be powered by Power Over Ethernet (POE) if desired. Total
power consumption is around 5 watts.
9
REMOTELY MONITORED SEAL ARRAY(RMSA)
SFG-MAN-001
REVISION: 1.7
2016 CANBERRA
UNIVERSAL
ACPOWERSUPPLY
ARM9 PC/104 SBC
TRANSLATOR
COMMUNICATION
CARD
(TCC)
PC/104
(ISA Bus)
TAMPER
DETECTSWITCH
+ 5 VDC
AC INPUT
ETHERNET
(POE)
ETHERNET
UNIVERSAL
AC
POWER
SUPPLY
ARM9 PC/104 SBC
TRANSLATOR
COMMUNICATION
CARD
(TCC)
PC/104
(ISA Bus)
TAMPER
DETECT
SWITCH
+ 5 VDC
AC INPUT
ETHERNET
(POE)
ETHERNET
Figure 5 Translator Block Diagram
The Translator base system stores the encrypted Type Length Value (TLVs) messages in day
files. The log file name consists of a date stam p and 4 digit counter. At m idnight, the curr ent
day file is closed and a new file is opened with the new date stamp. To minimize Linux
resource issues while stress testing, a maxim um number of rec ords per log file is imposed.
When this max imum record c ount is reached, the c urrent day file is closed and a new one is
open with the same date stamp but incremented counter. Multi-part messages are
reassembled and stored as a s ingle day file entry for ease of retrieval. Remote comm and
pass-through sends the State of Health of the Seals, the Message ID and includes an initiation
of Wake on Radio sequence to the Seal. In addition, the day files also contain basic Translator
State of Health data such as the following:
• Translator up-time and RMSA application start / stop time.
• Date and time that messages are received by the Translator timebase (though not
necessarily the date and time the message was created by the Seal timebase).
•Num ber of suc cess ful and unsuc ces sful T LVs r eceived f rom this Seal (based only on
properly formatted TLV Header infor mation). See Figure 6 f or a breakdown of the
TLV information and its proper formatting.
•Receive Signal Strength Indication (RSSI) / Link Quality Indication (LQI) based on
messages.
The Translator is cons idered a non-secure device as any stored seal data is encrypted at the
seal source befor e being collected by the Translator. However, Translator security features
are available including:
10
REMOTELY MONITORED SEAL ARRAY(RMSA)
2016 CANBERRA
SFG-MAN-001
REVISION: 1.7
• Password protection for upload of Translator log files to a review host via Samba.
• T ranslator log files are placed on a s eparate disk partition so problems with the root
partition will have no effect on the logs.
•An “rmsadeploy” script on the Translator that disables user access including
console/serial port access, f tp, ssh, etc. In deployed mode, the Tr anslator’s SD card
(firmware) would have to be replaced to regain access.
•Im properly encrypted and authenticated data will be flagged by the Remote Review
GUI as “corrupt”.
Refer to Chapter 4 of this User’s Guide for more details on Translator operational deployment.
During RF transmissions , badly formatted T LV packets will be noted during the Translator’s
data review of the packets sent. All transmitted m essage data is stored on the Seal as well.
Interruption of network operations will not affect the Translator’s RF data store operations.
Network operations are only necessary during inspector download and review events.
Figure 6 shows the TLV mess age construction from the Physical Layer all the way up to the
Application Layer. The TLV message format is very flexible as it allows for new message types
to be created at some future point in time while allowing all previous message types previously
created to be fully backwards compatible.
The TLV f ormat is set up with a Message T ype Field (this it the “T”), followed by the Length
Field (this is the “L”) and then followed by the Value Field (this is the “V”). The Type and
Length fields are fixed in the number of bytes, but can be modified for future growth. The
Value field can be as long as feasible, depending on the Message Type.
11
REMOTELY MONITORED SEAL ARRAY(RMSA)
SFG-MAN-001
REVISION: 1.7
2016 CANBERRA
Figure 6 Type Length Value (TLV) Format
12
REMOTELY MONITORED SEAL ARRAY(RMSA)
SFG-MAN-001
REVISION: 1.7
2016 CANBERRA
1.5 RMSA Rev iew GUI
The RMSA Review GUI application runs under Microsoft WindowsXP. The Review application
includes the ability to decrypt and authenticate Seal data and facilitates remote review of data
both in a batch processing mode and in a live update mode. Decryption and authentication of
the Seal data messages is pr ovided as is handling of incorrectly formatted TLVs and batch
processing of multiple input files.
The RMSA Review GUI includes an Inspector Mode that provides a Main Batch Review
Screen and a Demand Data Screen. W ithin the Main Batch processing, a sim plified view of
the data, a full view of the data, or a custom view may be set up by the inspector. The batch
processing of an RMSA day file(s) is only allowed w ith a password-protected Samba file share.
Figure 7 provides a diagram of how the Review Application Software may be used.
Should live data updates or Seal data quer ies be needed, a TCP/IP port connection to the
Translator is required. Query functions include either a request to acquire a specific Seal
message via a send message demand or a request for status via a State-of Health demand.
13
REMOTELY MONITORED SEAL ARRAY(RMSA)
SFG-MAN-001
REVISION: 1.7
2016 CANBERRA
Figure 7 Example RMSA System Installation
14
REMOTELY MONITORED SEAL ARRAY(RMSA)
SFG-MAN-001
REVISION: 1.7
2016 CANBERRA
Chapter
RMSA Set-Up
This chapter details the set-up steps for the RM SA system.
2.1 RMSA Seal Programming and Configuring
Ensure that the Seal has fresh batteries with the following instructions.
15
REMOTELY MONITORED SEAL ARRAY(RMSA)
SFG-MAN-001
REVISION: 1.7
2016 CANBERRA
Battery
Batteries
2.1.1Changing the Seal Batteries
•Open the Seal case. See Figure 8 below, which just shows the Seal circuit card
assembly.
• The two 3.6-volt Lithium AA batteries are on the top of the board in battery holders.
• Rem ove old batteries and insert two fresh batteries. Note that the bat tery pos itive
terminal must align with where the arrows are pointing. There are also battery
orientation symbols in the battery holders.
•NOTE: The prototype Seal has a power switch which mus t be turned on (slide away
from the end of the board with the fiber optic cable ferrules) to enter the command
interface for personality programming.
• Reprogram the Seal personality, close the Seal case and install a fiber loop.
• Conf irm proper s tart-up by verifying that the red LED visible through the bottom of the
Seal case flashes 5 times and then turns off.
Holders for
Figure 8 Battery Holders (Seal Not in Case)
16
REMOTELY MONITORED SEAL ARRAY(RMSA)
SFG-MAN-001
REVISION: 1.7
2016 CANBERRA
2.1.2Programming the Seal
The picture below illustrates the hardware set-up for the Seal programming phase. In Figure 9
the Programming Card and Seal are outside of their respective cases while Figure 10 shows
the Programming inside its cas e. T he hardware s hown are the RMSA Programm er with USB
cable, an 8-pin cable to support the Seal console and a PICKit2 Programm ing Dongle with
USB-mini cable to support Seal microcontroller programming. The connections are the sam e
if an MPLAB ICD3 Programm ing and Emulation m odule is us ed instead of the PICKit 2. Both
USB cables (one from the PICKit 2 or ICD3 and one from the Programmer) are attached to the
host PC. The set-up for the W indows terminal program such as HyperTerm or TeraTer m to
be used with the Programmer Card is as follows: 8 data bits, No parity, 1 stop bit, 19.2 KBaud,
no flow control. Once the Seal has been properly configured and programm ed, all dongle
connections may be removed and the Seal can operate stand-alone.
Figure 9 Out of Case Seal and Programmer Set -up
Figure 10 Seal Programmer Inside Case
17
REMOTELY MONITORED SEAL ARRAY(RMSA)
SFG-MAN-001
REVISION: 1.7
2016 CANBERRA
Note that support files have been packaged f or the User in a folder called RMSA_USER_Files
in the support and documentation package provided with the RMSA system. The folder will be
referred to as the RMSA USER file repository in the remainder of this User Guide.
Seal pr ogramm ing requires acces s to MPLAB IDE version 8.43 or later and PICKit 2 version
2.61 or later. If programm ing is being performed using the MPLAB ICD3, the ICD3 is fully
supported by the MPLAB IDE. Both are available as free downloads from the Microchip
website at www.microchip.com
. The MPLAB IDE is us ed to create the Seal hex code with
embedded Seal ID and then the PICKit 2 is used to write the hex file to the Seal. Each process
is described below along with the process to configure a Seal with the appropriate date and
encryption keys.
•Locate hex code files (will have a format such as NAME.hex) and Keys.dat in the
RMSA file repository. Also, locate the Seal personality Blind Programm er executable
in the RMSA file repository. (The default is typically C:\Program Files\Sandia National
Laboratories\SSP Software)
•Identify the host PC COM Port associated with the RMSA USB dongle (e.g., COM5 or
COM11). For the remainder of this User Guide, this COM port will be referred to as
Comport.
2.1.3Creating the Seal-Specific Hex File with MPLAB IDE
To create a Seal specific .hex file (with embedded Seal ID), perform the following steps:
• Launch the MPLAB IDE application.
• Using the Configure/Select Device option, ensure that the MPLAB tool is conf igured
for device type PIC18F6722 as illustrated in the screen shot below:
Normal operation for the Seal should be 3.5 V, +/- 0.1 V. The Seal will operate between 3.0
and 3.6 volts.
IMPORTANT INFORMATION! Do not apply any voltage greater than 3.7 volts to the
Seal!
18
REMOTELY MONITORED SEAL ARRAY(RMSA)
SFG-MAN-001
REVISION: 1.7
2016 CANBERRA
• Under the File pull down, select Import. In the Open window, browse to the location of
the RMSA User files and select file FullUser.hex.
•Select Conf igure, then ID Memory, then enter the Seal ID (NOTE: All ID’s us in g 0x F F
in the least significant byte of the ID are reserved for the Translator only and may not
be used for Seal identification) in the User ID box, then press OK.
•Under the File pull down, select Export. Select the export defaults as illustrated below
and click OK.
19
REMOTELY MONITORED SEAL ARRAY(RMSA)
SFG-MAN-001
REVISION: 1.7
2016 CANBERRA
• In the Save As window, browse to the User file location and save the Seal specific
.hex file with a unique name. For exam ple, if the new .hex file has embedded ID 6F,
save the .hex file as FullUser_ID6F.hex.
•If the Seal is to be programmed with the PICKit2 dongle, exit the MPLAB IDE
application and use the
Otherwise, remain in the MPLAB IDE and use the
with ICD3 section.
Writing the Hex File to the Seal with PICKit2 section.
Writing the Hex File to the Seal
2.1.4Writing the Hex File to the Seal with ICD3
Writing the .hex f ile to the Seal requires the RMSA USB/Progr ammer. To write the .hex file to
a Seal, perform the following steps:
•Select a Seal, remove the enclosure and connect the RMSA USB/Programming
dongle and ICD3 dongle shown in Section 2.1 of this User Guide.
•Start the MPLAB Integrated Development Environment (IDE) if it is not already
running. The progr am will confirm the existence of the ICD3 progr amming module
and ask the user to confirm the correct power supply setting. When the initialization is
complete, the prompt will indicate that the program is ready. If not, check dongle
cabling (as shown in Section 2.1) and repeat this step until the connection is indicated.
20
REMOTELY MONITORED SEAL ARRAY(RMSA)
SFG-MAN-001
REVISION: 1.7
2016 CANBERRA
• Under the F ile pull down, select Import, browse to the Seal specific .hex file for the
Seal and select Open. The program will report the successful import of the hex file.
•Click Programmer from the top menu line and click on Program in the drop-down
menu
•The progress bar at the bottom of the screen will indicate that programming is in
progress, and the screen will report “Programming/Verify Complete” when it is
finished. Exit the MPLAB IDE program.
2.1.4Writing the Hex File to the Seal with P ICKit2
Writing the .hex file to the Seal requires the RMSA USB/Program mer. To wr it e the .hex file to
a Seal, perform the following steps:
•Select a Seal, remove the enclosure and connect the RMSA USB/Programming
dongle and PICKit 2 dongle shown in Section 2.1 of this User Guide.
•Start the PIC Kit 2 application. Once started, the PICKit 2 window should indicate that
a PIC device was found. If not, check dongle cabling (as shown in Section 2.1) and
repeat this step until the connection is indicated.
21
REMOTELY MONITORED SEAL ARRAY(RMSA)
SFG-MAN-001
REVISION: 1.7
2016 CANBERRA
• Under the File pull down, select Im port Hex, browse to the Seal specific .hex file for
the Seal and select Open. Note whether the program bytes appear in the Program
Memory window and if the message that the Hex file has been successfully imported
appears.
•Click the Write button. Writing the hex file to the Seal will take approximately 1 minute
allowing erase of the device then programming of the new code. A successful
outcome will cause the message box to be shaded green with the message
Programming Successful.
Note: Should the User wish to Read the code back, click the Read button. T he m ess age
“Reading Device: Program Memory” is displayed in the message box. After several
seconds, the message box will indicate it is “Done.”. No program bytes are available in the
Program Memory window (use ICD3 from Microchip).
2.1.5The Key Files
Key files are used to load keys into the Seal with the Sandia National Laboratories Blind
Programmer GUI. The key files are for creation and review of encrypted and authenticated
Type Length Value (TLV) data. The key file is a table of comma-delimited records where each
22
REMOTELY MONITORED SEAL ARRAY(RMSA)
SFG-MAN-001
REVISION: 1.7
2016 CANBERRA
record contains the Seal ID followed by the default encryption key, encryption key and
authentication key. Key generation is dictated by IAEA policy and, therefore, outside the scope
of this User Guide. Example encryption keys for this step are obtained from key file keyfile.dat.
See Section 3.1 for information on how a Key file is generated for a series of RMSA Seal IDs.
23
REMOTELY MONITORED SEAL ARRAY(RMSA)
SFG-MAN-001
REVISION: 1.7
2016 CANBERRA
2.1.6Configuring the Seal Personality
Sandia National Laboratories provides sof tware for configuring seal personality including the
SSP Personality Profile Editor for creating an XML file to define SSP seal configuration and the
SSP Personality Program mer for programm ing the personality defined in an XML file into a
seal. Use the RMSA Software.msi installer progr am to install the tools on a host PC running
Windows XP. Then, from Start->All Programs, choose SSP Software to create the personality
XML file. Once created, the personality XML file can be used to configure any number of
seals. The XML file creation and SSP Programmer steps are described in more detail below.
The instructions below assum e that the key file for the s eals has been generated and is in a
known location.
•Start the SSP Personality Profile Editor from Start->All Programs->SSP Software.
Just under the SSP Seal Configuration Title, click on the left most icon to create a new
configuration file. The configuration window should be similar to:
•Click the empty cell in the right column next to “Translator Addresses”. Enter the
default address 000000ff.
•Click anywhere on the “Key File Location” row for the CMAC Authentic ation Key then
click on the “…” icon that appears to the right of this row. Use the standar d browser
interface to select the key file for the seals. Repeat this step for the “Key File Location”
row for the AES Encryption Key and Default Encryption and Authentication Key. Note
that these keys may be loaded from the same file.
•Click on the cells to the r ight of the label “Reporting Interval”. (The default value of
these cells is 30 seconds.) Enter any value between 30 seconds and 24 hour s . This
interval defines the period for normal State of Health reporting for the seal.
•At this point, the configuration window should appear similar to:
24
REMOTELY MONITORED SEAL ARRAY(RMSA)
SFG-MAN-001
REVISION: 1.7
2016 CANBERRA
• Under the SSP Seal Configuration title, select the right-most icon to save the
personality configuration using the provided standard browser interface. Once saved,
exit the editor program.
•It is important that the RMSA program mer dongle be plugged into the host PC via a
USB port before starting the RMSA Blind Programmer GUI so that the GUI selects the
correct COM port for c ommunications .Plug the RMSA Programmer dongle into the
USB port of the PC host and the white 8-pin connector into the seal.
•Start the SSP Personality Programmer from Start->All Programs->SSP Software. In
the browser interface that is pr esented at startup, navigate to the XML configuration
file that you just saved. The SSP Programmer window will appear similar to:
25
REMOTELY MONITORED SEAL ARRAY(RMSA)
SFG-MAN-001
REVISION: 1.7
2016 CANBERRA
• Open the seal that is to be configured. Cycle the power (red switch) to the VDD
position. Message will appear in the Blind Programmer window reporting status of
seal configuration similar to:
•T here should be no messages printed out in red font. Any such messages indicate
errors in the personality programming and/or the hardware.
• Disconnect the 8-pin programming connector from the seal and install the cover.
• When configuring multiple seals repeat the SSP Personality Programmer steps
above. (*The XM L confi guration fi le will need to be r e-loaded for each seal.)
•At this point, the seals have been loaded with the information from the XML
configuration file:
• Translator Address
• Translator Retry Attempts
• Date and Time
• Authentication and Encryption Key s
• Seal Reporting Interval
26
REMOTELY MONITORED SEAL ARRAY(RMSA)
SFG-MAN-001
REVISION: 1.7
2016 CANBERRA
2.1.7Verification of Seal Communications
Verification of seal com munications requires an RMSA T ranslator. Ref er to section 2.2.2
of this User’s Guide.
2.2 RMSA Translator Set-up and Linux Bootstrap
The Translator is initially delivered in factory set-up mode. In factory set-up mode, the
Translator is not yet installed in the tamper indicating enclosure and the User has access to the
Translator via the console port or secure network communication s uch as ssh. Section 4.1
includes Translator deployment steps which put the Translator in the m ore secure “ deployed”
mode, eliminating console port access and auto-starting the RMSA application.
In factory set-up mode, an XP W indows PC can be used with a terminal emulator progr am
such as Ter aTerm or Hyperterm to create a console connection to the T ranslator via an RS232 or USB port (with a USB-serial dongle). The console port should be configured with
115,200 baud, 8 bits, no parity, 1 stop bit and no flow control.
2.2.1 Translator Physical Configuration
To support the console port connection required for factory set-up mode, the Translator is
initially used in an open case or on the bench top. The Translator board stac k cons ists of an
EmbeddedARM TS7800 SBC with Canberra’s custom TCC daughter card. Physical
configuration details for the Translator are as follows:
• TS7800 jumper JP1 is installed to initiate bootstrap from the SD card.
• TS7800 jumper JP3 is installed to run the CPU at 333MHz instead of 500MHz, saving
power and increasing reliability in extreme thermal conditions.
•A serial port console connection requires a null modem connector. A cross-over
Ethernet cable can be used to connect the Translator directly to the Windows-XP
Remote Review Host (see below).
•Two RF antennas should be connected to the TCC card through cabling in the
tamper-indicating enclosure.
•The tamper switch is connected to the Tamper port of the TCC card.
2.2.2 Creating a Translator SD Card
Translator initial factory set-up mode is achieved by creating a clone of a bootable Translator
SD card as documented in the “Cloning Translator SD Cards” section of the “Building RMSA
Software” document. This guideline contains a complete description of the c loning procedur e.
Create a bootable SD card for the Translator as described below in a brief summary:
•Insert an SD card in an SD appliance connected to a Linux development environment.
These steps assum e that the contents of the clonesd folder provided by Canberra is
installed in the Linux development environment in /home/r msa/clonesd. This folder
should contain the tarclone.sh script, the tarballs for the R MSA root (root.tar.gz) and
home (home.tar.gz) partitions and the dd f iles for the other partitions required by the
27
REMOTELY MONITORED SEAL ARRAY(RMSA)
SFG-MAN-001
REVISION: 1.7
2016 CANBERRA
EmbeddedARM bootloader.
•Befor e proceeding, you must k now the /dev file name for the inser ted SD appliance.
This can typically be obtained from the dmesg utility. Make sure the SD appliance is
settled and available after insertion before continuing.
•From the shell prompt of the Linux development system, enter the following
commands:
cd /home/rmsa/clonesd
./tarclone.sh sdX
where sdX represents the /dev file nam e of the SD c ard appliance (which can be
determined from the dmesg utility).
•T he disk clone procedur e will take several minutes. Upon completion, dism ount the
SD card from the appliance.
2.2.3Booting the Translator
With power removed from the Translator, insert the bootable SD card into the Translator’s SD
card slot then apply Translator power. Linux boots trap messages appear in the Translator
console window. The Translator is configured to auto-start the RMSA application. W ith no
active seals, the Translator bootstrap messages will be similar to:
>> TS-BOOTROM - built Dec 4 2008
>> Copyright (c) 2008, Technologic Systems
>> Booting from SD card...
.
.
.
.
>> Booting to SD Card...
INIT: version 2.86 booting
Starting the hotplug events dispatcher: udevd.
Synthesizing the initial hotplug events...done.
Waiting for /dev to be fully populated...done.
Cleaning up ifupdown...done.
Loading kernel modules...done.
Checking all file systems...
fsck 1.37 (21-Mar-2005)
... done.
/dev/tssdcardb6 on /home type ext3 (rw,noexec,nosuid,nodev)
Setting up networking...done.
Setting up IP spoofing protection: rp_filter.
Enabling packet forwarding...done.
Configuring network interfaces...done.
Starting portmap daemon: portmap.
INIT: Entering runlevel: 3
Starting system log daemon: syslogd.
Starting kernel log daemon: klogd.
Starting internet superserver: inetdJul 25 20:19:55 ts7800
kernel: Debian version TCC driver.
Jul 25 20:19:55 ts7800 kernel: Initializing TCCDriver: 0.0.1 @
IO base address 320
Jul 25 20:19:55 ts7800 kernel: TCC Card Version: -
(202D)<0>ID RT (5452)
Jul 25 20:19:55 ts7800 kernel: Registered device tcc, major #
OpenBSD Secure Shell server: sshd.
Starting periodic command scheduler: cron.
main: Translator starting. Verbosity Level = LOW.
rmsa: Initializing log file.
rmsa: Initializing TCC.
tccInit: Opening /dev/tcc.
tccInit: TranslatorId=ff
tccInit: Wake Interval = 12 msec, Wake Duration = 5 msec
tccInit: Initializing known device queue at 0x16610.
tccInit: SSPq ready. tccInit: radioCfg=0
tccInit: channel number = 0x0main: Ready to service TCC port.
rmsa: Initializing CC1100.
Jul 25 20:20:02 ts7800 kernel: CC1100 INIT: Success and ready
in RX mode.
Kernel level CC1100 INIT returns 1.
Disable all TCC interrupts returns 1.
cc1100: Programming CC1100.
Setting cc1100Ready to 1
CC1100 programming successful.
Flushing the RX FIFO returns 1.
Flushing the TX FIFO returns 1.
Calibrating.
Calibration returns 1
Entering RX Mode.
RX mode returns 1
CC1100 Ready.
rmsa: Starting threads.
netCreateSocket: translator hostname: ts7800
netCreateSocket: Creating network socket ...
net create socket, sockfd = 7
netCreateSocket: Network socket ready. Bind=0
rmsa: Logging application start.
logTranslatorEvent: Logging translator event 0.
rmsa: Enabling TCC interrupts.
rmsa: Radio channel number: 0x0
main: Translator successfully initialized.
Set process priority to -10
Calling tccServicePort with priority -10
2.2.4Setting Translator Time
To configure the Translator system time, Login as User “root” with password “rmsa”. This can be
done from the cons ole port or via a ss h c onnection f r om a Linux host. If the console is required,
we must first term inate the RMSA application. To do this, enter CTRL C on the console port.
Within 7 sec onds, you must enter the root user name and password then iss ue the command
wdoff. If the wdoff command is not iss ued within 7 seconds, the watchdog timer will expire
and the Translator will reboot.
29
REMOTELY MONITORED SEAL ARRAY(RMSA)
SFG-MAN-001
REVISION: 1.7
2016 CANBERRA
From the shell prompt, issue the following command to set the Translator system time:
date –u MMDDhhmmCCYY.ss
Where –u is the command line argument that specifies UTC format and
MM represents the current month (01-12)
DD represents the current month day (01-31)
hh represents the current hour (01-23)
mm represents the current minute (01-59)
CCYY represents the current year (e.g. 2010)
and ss represents the seconds (01-59)
Repeat this step as often as necess ary until satisfied with the new system date and
time, the new date and time is repeated on the cons ole without error and the shell
prompt is re-displayed. For example:
# date –u 011208272010.45
Tue Jan 12 08:27:45 MST UTC 2010
#
If the RMSA application was terminated in order to use the Translator console, restart the
RMSA application with the following command:
rmsa -v
Alternatively, the application can be restarted by rebooting the Translator.
2.2.5Verification of Translator Operation
An operational Translator running the RMSA application will auto matically collect and store the
Seal messages. The Translator receives and stores Seal messages, and logs them
chronologically (in the order received) in day files in a separate partition on the SD card f rom
the root file system. The size of the storage for messages is 1.5GB or larger.
Translator Implementation Note: All Translator statist ics and message logs are stored in files
on the Translator SD c ard. As disk files, the logs are non-volatile. Separate file partitions are
provided for system and mess age logs. Sy s tem stat us infor mation is in the root partition. The
size of the root /home partition depends on the size of the SD card. Approximately 512 MB are
used for bootloader and root partitions. A 2GB SD card, for example, would have
approximately 1.5GB available for the message log partition.
In order to verify Tr anslator operat ion, prepare at least 2 seals acc ording to the instructions in
Section 2.1 of this User’s Guide and operate the Translator in factory configuration mode with a
console cable attached. W ith the seals configured and installed, reboot the T ranslator and
observe the bootstrap messages in the console window followed by the RMSA application
initialization messages as described in section 2.2.3, above. If the seal period is set to one
minute, then within one minute you should see messages similar to the following:
tccServicePort: Rcvd 63 bytes from 45 seq_ack 31
tccRegisterDevice: creating new SSPq entry for 45
sspReceive: ACKing 45 SSP with seq_ack byte 33
tccSend (14): 0D 45 00 00 00 45 00 00 00 FF 33 00 00 00
tccServicePort: Rcvd 43 bytes from 45 seq_ack 43
sspReceive: ACKing 45 SSP with seq_ack byte 44
Note: In this example, 45 is t he Seal address that originated the message. Similar messages
should appear for other Seals.
Verification of seal message logging can be accomplished by logging into the Translator.
Once again, if the console must be used, it will be necessary to CTRL C, log on to the
Translator as root and issue the wdoff command within 7 seconds .Alternatively, use an ssh
network connection. From the shell prompt (“#”) within the console window, issue the
following commands:
cd /home/share
ls
Verify log file contents with the command:
cat filename
where filename is a log file name such as rmsa255_20100112.log.
The log file will contain entries that look similar to the following example:
1, 2010 01 15 17:10:47, 00000051, 00000032, 00000000, 000000FF,
0 06:43:22, 1, ab(a9/ab), 00(00/00), 80, fb 1c a7 b5 55 a4
d1 69 22 f5 67 be 1c 09 c1 82 ec 79 59 ec de 6d a1 a2 32 44 22 8e
1b b2 34 62 7b 45 4c 35 e2 d2 1c 43 04 1b ba 1e 3b ce d4 dd fe 63
57 25 93 e2 3d b0 ea 95 35 a6 0f bc 24 ea 03 4d 02 e3 5e b7 3b c6
69 5d dc 40 c7 3d 5c 55
Highlights have been added to the example log entry above to facilitate understanding of this
comma separated data file:
The green text is the log entry type. 1 indicates a message received. (Other log entry types
indicate Translator start, Translator tamper, etc.)
The yellow text is the timestamp that the m essage was received. A review of the log file
(using cat or similar linux tool) will show the entries in chronological order based on this time
stamp.
The non-highlighted text contains a snapshot of key Translator statistics at the time the
message was received.
The pink text is the number of message bytes received.
The cyan text contains the actual as-received encrypted mess age bytes. The TLV contents
are not available to the Translator in clear-text.
From the shell prompt, issue the following command to display Translator file partitions:
df
Results will be similar to:
31
REMOTELY MONITORED SEAL ARRAY(RMSA)
SFG-MAN-001
REVISION: 1.7
2016 CANBERRA
Filesystem 1K-blocks Used Available Use% Mounted on
tmpfs 63584 … … 0% /dev/shm
/dev/tssdcardb6 2855172 … … 3% /home
tmpfs 10240 … … 1% /dev
Note that /home is mounted as a s eparate file partition completely separating the storage for
the RMSA log files from system information and statistics.
2.2.6Translator Power-Over-Ethernet Operation
To configure the Power-Over-Ethernet option, disconnect the AC power cord from the
Translator and connect POE enabled power supply or POE enabled Ethernet Router to the
Translator with an Ethernet cable. To verify correct operations, apply Translator power and
verify the bootstrap messages in the console window as described in section 2.2.3 of this
User’s Manual.
Note that the Translator can be powered sim ultaneously from either the POE interface or the
AC interface without any issues.
2.2.7Alternate Translator Configuration
The default T ranslator SSP addres s is 0x ff and the def ault radio channel is 0. T hese set tings
should be adequate in m ost cases. Instructions are provided below for applications where
these default settings must be modified.
The default radio f requency of the Translator is set c orrespond with the base of the proper
allocated frequency band and to agree with the fr equency that is programm ed into the Seals.
While the channel of the Translator m ay be changed, it must agree with the channel that the
Seals are operating on to insure proper comm unication. The Tr anslator channel should only
be changed if the Seals have been programm ed with an alternate channel. To change the
default radio channel, edit the file /etc/rmsa/radioconfig and replace the 0 with the desired radio
channel. The radio channel value may range from 0-30 hexadecimal.
To change the T ranslator’s SSP address , edit the file /etc/rm sa/tr ansid and replace the ff with
the desired translator address. T he Translator address may be any hexadecimal integer (4
bytes) where the last byte is either ff or 0.
Note that the /etc/rmsa folder contains 2 other files that should not be modified. The sdVersion
file may be read to obtain the translator software version. The wakecfg file was used by
developers to experiment with the command and acknowledge timing for demanding seal data
and should not be changed.
2.2.8Change Translator IP Address
To change the translator IP address, connect to the translator via the console port. The 4
steps below must be performed within 7 seconds or the watchdog will cause the system to
reboot.
To add new characters place the cursor under the character(s) that will be changed and press
"i", type the desired character(s) and press "esc". To Delete old characters place the cursor
under the characters(s) that need to be removed and press "x". When changes are complete
press "shift+z+z" to close and save the file.
Edit the Interfaces file
root@ts7800:root# cd etc/network (enter)
root@ts7800:network# vi interfaces (enter)
The "interfaces" file will be open for editing.
#Used by ifup(8) and ifdown(8). See the interfaces(5) manpage
or
# /usr/share/doc/ifupdown/examples for more information.
auto lo
iface lo inet loopback
auto eth0
#iface eth0 inet dhcp
iface eth0 inet static
address 10.10.16.72<--Change to the desir ed IP a ddress
network 10.10.16.0<--Change to the desir ed network (if ne cess ary )netmask 255.255.255.0
broadcast 10.10.16.255
gateway 10.10.16.72 <--Change to the desir ed gateway
To add new characters place the cursor under the character(s) that will be changed and press
"i", type the desired character(s) and press "esc". To Delete old characters place the cursor
under the characters(s) that need to be removed and press "x". When changes are complete
press "shift+z+z" to close and save the file.
When all changes are complete the system will need to be re-booted.
root@ts7800:network# reboot (enter)
34
REMOTELY MONITORED SEAL ARRAY(RMSA)
SFG-MAN-001
REVISION: 1.7
2016 CANBERRA
Chapter
RMSA Key Generation
This chapter demonstrates key generation for the Seal.
3.1. RMSA Key Generation
This step uses s of tware that r uns in a DO S box on a WindowsXP PC gener ating k eys for one
Seal. The resultant keys will be loaded into the Seal.
• Locate the file rmsakeyfilegen.exe in the RMSA file repository.
• Note that Help is available if needed in the following file:
msakeyfilegenhelp.txt
•Start the key generation software by typing the following command line in the DOS
box:
rmsakeyfilegen.exe /start:0x00000001 /end:0x000000FF /keyfile:rmsakeys.dat
/start tells the generator what the first RMSA Seal ID in the f ile will be. Additional
Seal IDs will increment from this one.
/end tells the generator what the last RMSA Seal ID in the file will be.
/keyfile tells the generator the filename to write the keys to.
•You will be prom pted to retype in a first set of specif ic random c haracter s in the DOS
box. Type in the first set of characters.
•You will be prom pted to retype in second set of specific random ly characters in the
DOS box. Type in the second set of characters
•You will be asked to type in 128 random key strokes. Type in 128 keystrokes.
th
•After the 128
the keyfile.
k eystroke, the program will ask the User to stop typing and will create
35
REMOTELY MONITORED SEAL ARRAY(RMSA)
SFG-MAN-001
REVISION: 1.7
2016 CANBERRA
Starting the Key Generation Software
After echoing 2 sets of characters by the key generation software
After entering 128 keystrokes
The keys have been generated in the named file. You can close the DOS box.
36
REMOTELY MONITORED SEAL ARRAY(RMSA)
SFG-MAN-001
REVISION: 1.7
2016 CANBERRA
Chapter
RMSA Security
This chapter demonstrates RMSA encryption, authentication and
default keys as well as adding new fiber lengths to a Seal.
4.1 Collect / Store Seal Messages with no Console Access
The Translator pr ovides a script for deploying from f actory set-up mode to operational mode.
In operational mode, no further acc ess to the Translator (via the physical console or secure
network communications such as ssh or sftp) will be possible. To re-use the Translator in
factory set-up mode, the User will have to configure a new bootable SD card as described in
Section 2.2 of this User Guide.
To deploy a Translator into operational mode, from the shell prompt in the console window,
issue the command:
rmsadeploy
Messages similar to the following will be display ed on the in the console window:
Cleaning files out of the /home/share directory ...
Cleaning debug statistics in /var/stat/rmsa ...
Disable root login...
Removing ssh service...
Remove unnecessary modules...
Disable root ftp access ...
Autostart RMSA application ...
Removing TTYs and console...
Deploy complete.
Rebooting Translator to implement security changes.
Remove the Translator console cable and install the enclosure cover.
4.2 Authentication and Encryption of Messages
Valid keys are necessary for decryption and signature verification. Key management
procedures, including generation of keys and key file management, are the responsibility of the
user.
Messages with invalid authentication keys will result in a “Bad signature” message status in the
RMSA Review GUI. Messages with invalid encryption keys will result in a “Bad key” message
status in the RMSA Review GUI and the decrypted data will not be available for review.
Messages with a corr ect encryption and authentication key will be available for review in the
37
REMOTELY MONITORED SEAL ARRAY(RMSA)
SFG-MAN-001
REVISION: 1.7
2016 CANBERRA
RMSA Review GUI. When m es sages are proper ly decrypted and authenticated, all TLV data
is displayed.
•Ensure t hat the RMSA Review Application is connected to t he Translator by noting
that the RMSA Review Application indicates it is connected and new m essages f rom
the Seals appear in the main display at a rate that has been configured by the User in
Section 2.1.7.
• Open the key file keyfile.dat in the RMSA file repository.
• Note that for each Seal ID is defined 3 keys. The first is the default key, the 2nd is the
encryption key, the 3rd is the authentication key. An example for a hypothetical entry
for Seal ID 50 could show:
This step is to demons trate how to use various fiber lengths. The User m ay add any User
selected length of fiber, bet ween 1 and 30 meters cut f rom a spool of fiber without any special
tools. However, it should be noted that the best way to ensure a good plastic optical fiber
(POF) connection to the Seal would be to use a very sharp implem ent that will create a clean
cut that is orthogonal to the cable. Cuts that have angles, are r agged or ar e poorly terminated
will affect the sensitivity measurements done by the Seal for the light intensity and can preclude
proper operation if not enough light is coupled through the fiber.
After each fiber insertion or rem oval, the Seal will send a message that shows the state of the
fiber link in the Seal (i.e., Open or Closed).
•Inser t the fiber within the RMSA Seal ferrules and then screw down until Hand Tight.
(DO NOT OVER-TIGHTEN!)
o Push the POF into the opening until you feel it bottom out against the
photodiode. Hand-tighten the ferrule
Figure 11 Installing Plastic Optical Fiber (POF)
38
REMOTELY MONITORED SEAL ARRAY(RMSA)
SFG-MAN-001
REVISION: 1.7
2016 CANBERRA
o Repeat the above sequence for the other end of the POF for the rem aining
fiber opening in the Seal.
o To remove the POF, do the same set of operations but in reverse order.
•Ensure t hat the RMSA Review Application is connected to the Translator (see section
5.1) by noting that the RMSA Review Application indicates it is connected and new
messages from the Seals appear in the main display at a rate of that has been
configured by the User in Section 2.1.6.
• Remove one end of the POF from the seal.
• W ithin a few seconds, a message is displayed from that Seal indicating an alarm
under the Source Tamper Status colum n, indicating that a fiber has been removed or
inserted.
39
REMOTELY MONITORED SEAL ARRAY(RMSA)
SFG-MAN-001
REVISION: 1.7
2016 CANBERRA
Chapter
Remote Review of Seal Data
This chapter describes the installation, configuration and use of the
demonstration RMSA Remote Review GUI provided by Canberra for
the analysis of data collected by the T ranslator .
5.1 RMSA Review GUI Installation and Configuration
The RMSA Review GUI installer is provided by Canberra in the RMSA repository. The
demonstration GUI runs on a Windows XP PC. The default installation location of the GUI will
be in c:\Program Files\RMSA. The GUI is based on the .NET framework which must be
installed before installing the RMSA Review GUI. If required, a copy of the .NET framework is
also provided by Canberra in the RMSA repository.
The demonstration RMSA Review GUI relies on a network connection from the W indows XP
host to the Translator. This c an be accomplished with an Ethernet cross over cable from the
PC to the Translator with the PC LAN port configured as follows:
Once the LAN is properly configured, it should be possible to ping the T ranslator (default IP
10.10.16.72) to confirm the network connection.
40
REMOTELY MONITORED SEAL ARRAY(RMSA)
SFG-MAN-001
REVISION: 1.7
2016 CANBERRA
5.2 Loading Collected RMS A Data
The RMSA Review GUI is designed to work in two ways:
•In Rem ote Review Mode the GUI loads one or more day files from the Translator’s
Samba-mounted /home partition for review and analysis.
•In Local Host Mode an active network connection is made between the RMSA
application running on the Translator and the Rem ote Review GUI. In this mode, as
seal messages are rec eived by the Translator and stored in a day file, the messages
are also sent immediately to the GUI providing a “live” view of RMSA message activity.
In local host m ode, the GUI operator can also demand seal data by requesting an
immediate State-of-Health (SOH) message or a resend of a previous seal message.
In both modes, the GUI controls the number of r ecords loaded for review in order to avoid
resource issues on the Host PC. Operating procedures for each mode are further described in
the remainder of this section as is the procedure for configuring the maximum number of
records available for viewing. Operating procedures f or data analysis and for dem and of s eal
data are provided in sections 5.3 and 5.4 of this chapter.
Both Remote Review and Local Host operations require the G UI operator to have access to
the same k ey file(s) used to configure the seal personality in order to properly decrypt and
authenticate the seal data.
5.2.1Remote Review Operation
Perform the following steps to operate the RMSA Review GUI in Remote Review mode:
• Ensure the T ranslator is operational and a PC LAN connection has been es tablished
between the Host PC and the Translator (refer to section 5.1, above).
•Establish the Samba connection between the Host PC and the T ranslator using the
Tools->Map Network Drive function in an Explore window. The drive folder will be
\\10.10.16.72\share. Click on Connect Using a Different Username and enter
Username “smbuser” and password “asdfqwer”. (Note that this factory default
password can be changed by the user prior to Translator deployment.)
• Start the RMSA Review GUI via Start->All Programs->RMSA Review. A window
similar to the following should appear:
41
REMOTELY MONITORED SEAL ARRAY(RMSA)
SFG-MAN-001
REVISION: 1.7
2016 CANBERRA
• Click the Load Keys button, then browse for the appropr iate key file. Double click the key
file (keyfile.dat, for example) to load the keys. A message box will be displayed indicating
that the key file was successfully loaded. Click OK to dismiss this message.
•Using the File pull-down in the toolbar (upper left corner), browse for a log file on the
Translator’s Samba-mounted drive. Double click on one or more day file to upload that
day’s data to the remote review GUI.
•Data is displayed in the GUI similar to the exam ple below. Note the file name in the Data
File text box at the top of the display. If more than one file is selected for loading, this text
box will contain the name of the last file loaded but the main window will contain the data for
all files.
42
REMOTELY MONITORED SEAL ARRAY(RMSA)
SFG-MAN-001
REVISION: 1.7
2016 CANBERRA
5.2.2Local Host Operation
Perform the following steps to operate the RMSA Review GUI in Local Host mode:
•Repeat all steps for R em ote Review operation up to the point of select day files with the
File pull down. I.e., start the RMSA Review GUI and load keys.
•Click the Connect to Translator button. W ithin a few seconds, the Translator status
should be changed from Disc onnected to Connected and the button will be relabeled
“Disconnect From Translator”. As seal messages are rec eived by the Translator, they
will be immediately sent to the GUI. Refer to the view below:
To terminate the Local Host c onnection, click on the Disc onnect From Trans lator button. For
best synchronization of the network connection between the GUI and Translator, the
connection should be disconnected before terminating the RMSA Review application. If not, it
may take several minutes to re-establish the connection if the GUI restarted.
In Local Review mode, demanding seal data is available via the Tools pull down as described
in section 5.4.
In Local Host mode, a TCP/IP c onnection hear tbeat message is passed between the GUI and
Translator. If loss of heartbeat is detected, the connection will be shutdown. If this occurs, the
Translator status will change to Disconnected and the button will be relabeled “Connect to
Translator.
Note the Auto Connect option near the upper right corner of the display. If this option is
selected, the GUI will automatically attempt to establish GUI/Translator communications.
Therefore, if a network disruption causes disconnection due to loss of heartbeat, the GUI will
re-establish the connection within a minute once the network becomes available.
43
REMOTELY MONITORED SEAL ARRAY(RMSA)
SFG-MAN-001
REVISION: 1.7
2016 CANBERRA
5.2.3Maximum Record Display Threshold
If the number of total num ber of recor ds for all day files exceeds the m axim um record count for
the RMSA Review Display, a warning will be printed at the top of the display indicating that the
maximum record threshold has been exceed as illustrated below. Consider loading fewer day
files to view the complete set of data. If a particular day file exceeds the maximum record count,
consider raising the threshold or using an editor to break the day files into multiple parts.
To increase the threshold, select T ools->Customize Report View. The threshold setting is in
the Maximum Number of Records to Display box at the top of the configuration menu
(illustrated below). Change the setting as desired and click O K. Data will need to be reloaded
(from the File pulldown) to load additional records. The default value of the threshold is 1000.
44
REMOTELY MONITORED SEAL ARRAY(RMSA)
SFG-MAN-001
REVISION: 1.7
2016 CANBERRA
5.3 Sorting and Analyzing RMSA Data
This section summ arizes the methods available in the demonstration RMSA Review GUI for
sorting data or generating alternate data view to assist with analysis. The details of the default
data view, device-specific reports and data view customization are provided below.
5.3.1Default Data View
The RMSA Review default data view is illustrated below.
45
REMOTELY MONITORED SEAL ARRAY(RMSA)
SFG-MAN-001
REVISION: 1.7
2016 CANBERRA
From the default view, note the following:
•Each row in the main display contains a Device Report row including a message
counter, the Source Timestamp column contains the UNIX encoded time field and the
Source Alert Count column contains the alert c ounter. These fields are included in
every State of Health Message. The source timestamp should mirror the seal
reporting period that was configured when programming the seal personality.
•The following Event Log Types may be included in the report:
o Device Report: a TLV message from a seal
o Translator Start: provides the timestamp of the start of the RMSA collection
application on the Translator.
o Cal Succes s: The Translator has detected conditions where the RF receiver
needed to be recalibrated and has successfully performed this task.
o Cal Failure: The T ranslator has detected conditions where the RF receiver
needed to be recalibrated and failed to successfully perform this task.
o Translator Tamper: Indicates a tamper event in the Translator enclosure.
•In Device Report entries, the following fields are reported with a standard SOH
message:
o The Source ID is the address of the reporting seal.
o The Log Timestamp is the time the seal report was logged by the Translator.
o The Report Status will indicate Normal, Alarm, W arning or Bad Key if the
message decryption fails. Alarm ent ries will be shaded red, W ar ning entries
are shaded yellow, normal messages are not shaded. In the example below,
46
REMOTELY MONITORED SEAL ARRAY(RMSA)
SFG-MAN-001
REVISION: 1.7
2016 CANBERRA
seal 00000121 reported an Alarm in the SOH m essage due to a failed light
test fiber status.
The seal logic includes a security feature that, under c ertain circumstances ,
will delete the encryption and authentication keys configured during
personality programming and replace them with default keys. If the RMSA
Review GUI fails to decr ypt and authenticate using the standard keys, it will
then try using the default keys. If the default key is required a “DK” code will
be added to the Report Status field. So a “Normal – DK” status indicates that
a normal SOH message has been received from the seal but a previous
event caused the keys to be replaced with default keys.
o The message number is the seals message count. The report should
contain consecutive mes sage numbers for each seal. However, in a busy
situation where a number of seals are reporting at the same time, it is
possible that the SSP ACK/Retry logic will time out and the message will be
missed by the Translator. The message will be stored on the seal and can be
recovered with the SNDM command as described in section 5.4.
o The Source Alert Count contains a cumulative alert count for the seal. Note
in the figure above that the Sourc e Alert C ount f or s eal 45 c hanges from 0 to
1 when the fiber event is reported.
o Other standard SOH fields include the battery voltage, temperature and
tamper status of the seal at the time the SOH message was sent. The
Further Report Info would be empty under normal circumstances but may
contain additional TLV information in the case of an alert or warning.
•On the left side of the main display is a Known Device List. This list can be minimized
with the Hide Known Devices button if more screen spac e is desired for a custom
report view as described in section 5.3.3. The known device list can be used to create
seal-specific reports as described in section 5.3.2. W ithin the known device list, the
seal address is shaded by the highest noted alert level. I.e. if no problems have been
47
REMOTELY MONITORED SEAL ARRAY(RMSA)
SFG-MAN-001
REVISION: 1.7
2016 CANBERRA
reported, the seal address is not s haded. If the s eal has ever repor ted a warning, the
device address will be shaded red. If the seal has ever reported an alert, the address
is shaded red.
5.3.2Device-Specific Report
Double click on the address cell of any seal in the Known Source ID’s list to get a pop-up report
containing only messages for that seal as illustrated below.
As with the main data display, it is possible to click on any column header to sor t by that data.
Note that the device report is static – it is generated from the data available at the time it was
created. In Local Host mode, where data is continually being added to the main display, it may
be necessary to click the Refresh Data button to receive live updates.
With the Device-specific report, it is quite eas y to note missing m essages where the message
numbers are not consecutive. There may be valid reasons for a missing message. For
example, the ack/retry logic on the seal takes place in a relatively short amount of time to
conserve seal battery. If multiple seals are reporting at once, the T r ans lator may not meet the
acknowledge time criteria for all seals and the message will not be received. However, the
message should still be available on the seal and can be res ent with the Send Message data
request as described in section 5.4.
5.3.3Customizing the Data View
Each Device Report log entry has more data available for forensic s and detailed analysis than is
probably desired during the initial data review. The RMSA Review GUI provides a tool to allow
the operator to customize the data view. Under Tools, select Customize Report View. A window
similar to the following will be displayed:
48
REMOTELY MONITORED SEAL ARRAY(RMSA)
SFG-MAN-001
REVISION: 1.7
2016 CANBERRA
The items listed on the left are def ault report items and can be restored by pressing the Default
Settings button. Use the checkboxes for each of the default and alternate report item s to select
the items to be visible then click OK. In the f ollowing example, the operator selected Report
Status, Message Number and Report Bytes. The Hide Known Sources button was clicked to
maximize the data view. The res ulting display can be used to forensically examine mes sage
bytes.
49
REMOTELY MONITORED SEAL ARRAY(RMSA)
SFG-MAN-001
REVISION: 1.7
2016 CANBERRA
seal address that originated a Device Report and is
In the next example, the report view was customized to include only the Event Log Type, Source
ID, Log Timestam p, Report Status and Message Number . The resulting minimal display could
be used to quickly scan for Alarm or Warning conditions:
It is important to note that all data exists at all tim es within the G UI. C ustomizing the report view
only determines which data will be displayed. In other words, customizing the report view does
not cause the GUI to reload data from the translator.
The following table has a complete list of available Device Report data items:
Column Label Description of Contents
Event Log Type Describes the type of report – ref er to section 5.3.1, above, for further
details. This c olumn should always contain data and is included in the
default report view.
Source ID Contains the
empty for all other Event Log Types. This column is inc luded in the
default report view.
Log Timestamp Contains the timestamp that the log entry was created on the translator
in the format MM/DD/YYYY hh.mm.ss. This column should always
contain data and is included in the default report view.
50
REMOTELY MONITORED SEAL ARRAY(RMSA)
SFG-MAN-001
REVISION: 1.7
2016 CANBERRA
Contains the seal’s cumulative alert count for a Device Report in
Source Battery
Contains the seal’s temperature reading for a Device Report in
Source Tamper
Column Label Description of Contents
Report Status Some analysis of m ess age data is perf or med by the GUI to categorize
each report as Normal, W arning or Alarm. Normal reports have no
background shading, W arning reports are shaded yellow and Alarm
reports are shaded red. In the case of a Norm al report, the Report
Status is Normal. Warning or Alarm reports may have a Report Status
of Warning or Alarm or may further indicate the Warning or Alarm
source (such as “Bad k ey.”). This colum n should always contain data
and is included in the default report view.
Message Number Contains the seal message number for a Device Report in decimal
format. This column is included in the default report view.
Source Timestamp Contains the seal times tamp for a Device Report indicating the time
that the seal generated the report. This column is included in the
default report view.
Source Alert Count
decimal format. This column is included in the default report view.
Source Fiber State Contains the seal’s fiber optic state for a Device Report. A f iber state
reading is interpreted by the seal into one of the following possible fiber
states:
Voltage
Source Temp
Status
• FiberOK
• Dark test failed
• Light test failed
• Measured light exceeds upper limit
• Measured light exceeds lower limit
• Positive threshold exceeds upper limit
• Negative threshold exceeds lower limit
• Measured light exceeds positive threshold
• Measured light exceeds negative threshold
• Unknown fiber state
A reported state of FiberOK is considered “Normal” all others are
considered an “Alarm”. T his column is included in the default report
view.
Contains the seal’s battery voltage reading for a Device Report. T his
column is included in the default report view.
Degrees Celsius. This column is included in the default report view.
Contains the seal’s tamper status reading for a Device Report. The
case tamper reading is analyzed by the seal and reported as either
Normal or Alarm . If “Alarm” is report ed, the report is classified as an
Alarm report and shaded red. T his column is included in the default
report view.
51
REMOTELY MONITORED SEAL ARRAY(RMSA)
SFG-MAN-001
REVISION: 1.7
2016 CANBERRA
up of the complete contents. Alternative,
is not included in the default report view. See Customizing Report
Source Report
header information are ignored (not processed and
Translator Tamper
RSSI (RF Signal
LQI (RF Signal
Column Label Description of Contents
Further Report Info Contains information as necessary to support the log entry. In the
case of a Translator Tamper report, this column will contain further
information on the nature of the tamper. For Device Report log entries,
the column is used to report a Bad T LV or invalid TLV format. It may
also be used to report information from TLVs that are not normally
reported in a SOH m essage and do not, therefore, have a dedicated
column. This column is included in the default report view.
Report Bytes Contains a list of the raw report bytes (in hexadecimal) f or a Device
Report. If the report bytes were successf ully decrypted, the decrypted
report bytes are reported. Note that this column can be quite wide. To
examine the report bytes of a single entry, roll the mouse over t he cell
for a 5-second popcustomize the report view to remove other colum ns, then expand the
Report Bytes column width. Report bytes will typically not be of interest
for inspection outside of forensic investigations. Therefore, this column
View, below for more information.
The number of r eports received by the translator from the seal s ource
Count
address of this Device Report. This column is not included in the
default report view.
Source Error Count The number of er r ors logged by the translator for repor ts f rom the seal
source address of this D evice Report . For example, RF payloads with
invalid SSP
logged), but a error counter is incremented. This column is not
included in the default report view.
Translator Address The translator address extracted f rom the SSP header for the Device
Report. In most cases, the Translator Address will be 0xff – unless the
translator device address has been modified during translator setup/configuration or corr uption of the RF payload has occurred. This
column is not included in the default report view.
Translator Uptime The translator uptime (time since last boot) at the time the Device
Report was processed and logged. The uptime can be used as a
forensic indicator that the translator was unavailable for a period of
time. This column is not included in the default report view.
The cumulative count of translator case tampers at the time the Device
Count
Report was processed and logged. T his colum n is not inc luded in the
default report view.
The RSSI value is an indicator of RF signal quality and can be used
Quality)
forensically by an RF expert to determine if there were problems with
the RF. This column is not included in the default report view.
The LQI value is an indicator of RF signal quality and can be used
Quality)
forensically by an RF expert to determine if there were problems with
the RF. This column is not included in the default report view.
Report Byte Count The number of bytes included in a Device Report. The raw bytes are
viewable in the Report Bytes column. This column is not included in
the default report view.
52
REMOTELY MONITORED SEAL ARRAY(RMSA)
SFG-MAN-001
REVISION: 1.7
2016 CANBERRA
5.4 Requesting RMSA Seal Data
In Local Host Operation mode (refer to section 5.2.2) the RMSA Review GUI provides an
interface to request imm ediate data from the RMSA seals via Tools->Request Device Data.
Six types of data request are supported(refer to sections 5.4.1 thru 5.4.5).
Because the translator cannot access the contents of incoming TLV messages from seals
(due to encryption), the translator has no way of assigning a particular incoming message to a
particular request. A response m essage will be delivered to the GUI for evaluation of TLV
contents as with any autonomous SOH or alarm.
Further, seal response is not guaranteed. All commands sent to a seal require an
acknowledgement to the Translator. If the T ranslator does not detect an acknowledgement
within an adequate time period, the request will time out and the translator will retry up to 3
times. (Further data reques ts are locked out until the current data request completes , so a
finite number of attem pts is necessary.) Data requests can be interrupted by autonomous
SOH or alarm mes sages from any seal resulting in a delayed acknowledge for the request.
Testing has shown that the translator’s three automatic retries are adequate in most cases, but
occasional misses still happen.
The GUI operator can watch the m ain display for the requested report from the seal address
specified in the request. If the report from the specified seal does not appear within 15
seconds, the GUI operator should repeat the request.
Procedures for each of the three requests are detailed below.
5.4.1State of Health (SSOH) Request
To demand a SOH m ess age from a seal, select T ools->Request Device Data. The f ollowing
pop-up will appear:
If necessary , cl i ck on the down arrow for the Request Type and select SSOH. (SSOH is the default
request type but the GUI will remember the las t request type.) Enter the hexadecimal address of
the seal (from 1 to FFFFFFFF) in the Seal Address text box then press OK. Within 15 seconds , a
SOH report from the s pecified seal, using the next available message num ber, should appear in
the GUI’s main display.
53
REMOTELY MONITORED SEAL ARRAY(RMSA)
SFG-MAN-001
REVISION: 1.7
2016 CANBERRA
5.4.2Extended State of Health (ESOH) Request
For an extended SOH request, enter the hexadecim al seal address (f rom 1 to FFFF FFFF) and
use the Request Type down arrow to select ESOH. The message ID text box is not activated as
a message num ber is not required for an ESOH request. Once the seal address has been
entered, click OK to continue. Click Cancel to abort the request.
Within 15 seconds , an extended SOH report from the specified seal, using the nex t available
message num ber, should appear in the G UI’s m ain display. The extended SOH repor t includes
entries in the Further Information column for the number of watchdog resets and the transmission
count for the seal.0
5.4.3Send Message (SNDM) Request
To request a particular archived message, enter the hexadecimal seal address (from 1 to
FFFFFFFF) and use the Request Type down arrow to select SNDM. Once t he SNDM request
type is selected, the Message ID text box is activated. Enter a valid message num ber for this
seal as a decimal value.
Message numbers start with 1. The maximum valid message number should be available in the
main display within the most recent autonomous State of Health message.
Click OK to send the request. Click Cancel to abort the request.
Within 15 seconds, the requested message number from the requested seal should appear
within the GUI window. Note that in default review mode, messages are sorted chronologically in
order of the log timestam p on the translator. Since the translator has no access to the TLV
contents of the mess age (due to encryption), it has no way of inserting the data in a day file log
based on the message num ber or time it was originally s ent. Therefor e, if interrogating a seal
that has been running for some tim e for message ID 1, the translator will log the event in the
current day file, not in the day file of the original transmission attempt. Similarly, the GUI will
present the new message (Message Number 1) at the end of the currently displayed data set.
5.4.4Send Fiber History (HIST) Request
To request a histor y of all f iber optic event messages generated (up to a limit of ~383) , enter t he
hexadecimal seal address (from 1 to FFFFFFF) and use the Request Type down arrow to select
HIST. Once the seal address has been entered, click OK to continue. Click Cancel to abort the
request.
Within 15 sec onds, a list of the seal’s fiber optic event messages should appear in the GUI’s
main display.
5.4.5 Send RMSA To Translator Associate(RTTA) and RMSA To Translator
Disassociate(RTTD) Request
The RMSA To Translator Associate (RTTA) and Dis assoc iate (RT T D) c om m ands were cr eated
for seals that do not provide translator addr esses during pers onality programm ing. The address
of the Trans lator that is c onnected to the GUI will be used by the seal after suc cess fully sending
this message. Before receiving the RTTA command, the seal will buffer but not transmit
messages. Upon receiving RTTA com mand, the seal will check a list of all mes sages buff ered
and send those to the associated translator all at once. Upon receiving the RTTD command, the
54
REMOTELY MONITORED SEAL ARRAY(RMSA)
SFG-MAN-001
REVISION: 1.7
2016 CANBERRA
seal will once again no longer tr ansmit, but buffer messages in f lash memory. Mess ages will
continue being buffered until a new RTTA c ommand is received. Note that these com mands
only work when translator addresses are not downloaded during personality programming.
The message num ber is not required for a RTT A or RTTD comm and. Enter the hexadecimal
seal address (from 1 to FFFFFFFF) then click OK to continue or Cancel to abort the request.
Within 15 seconds, buffered messages should begin to appear in the GUI’s main display.
55
REMOTELY MONITORED SEAL ARRAY(RMSA)
SFG-MAN-001
REVISION: 1.7
2016 CANBERRA
This page left blank intentional ly
56
REMOTELY MONITORED SEAL ARRAY(RMSA)
SFG-MAN-001
REVISION: 1.7
2016 CANBERRA
Loading...
+ hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.