CANBERRA RMSA7070822 User Manual

107 Union Valley Road
Oak Ridge, TN 37830
6300
Fax: ( 865)483-0406
Phone: (865)220-
Remotely Monitored Seal Array (RMSA)
User’s Manual
SFG-MAN-001
Revision: 1.7
2016 CANBERRA
Table of Contents
PREFACE ....................................................................................................................................................... 1
INTRODUCTION ........................................................................................................................................... 1
1.1 RMSA SYSTEM OVERVIEW ........................................................................................................................... 1
1.2 THEORY OF OPERATION ................................................................................................................................. 3
1.3 SEAL ................................................................................................................................................................ 5
1.4 TRANSLATOR .................................................................................................................................................. 9
1.5 RMSA REVIEW GUI .................................................................................................................................... 13
RMSA SET-UP ............................................................................................................................................ 15
2.1 RMSA SEAL PROGRAMMING AND CONFIGURING....................................................................................... 15
2.2 RMSA TRANSLATOR SET-UP AND LINUX BOOTSTRAP .............................................................................. 27
2.3 WINDOWS XP REMOTE REVIEW APPLICATION HOST ........................ ERROR! BOOKMARK NOT DEFINED.
RMSA KEY GENERATION ....................................................................................................................... 35
3.1 RMSA KEY GENERATION............................................................................................................................ 35
RMSA SECURITY ...................................................................................................................................... 37
4.1 COLLECT / STORE SEAL MESSAGES WI TH NO CONSOLE ACCESS ............................................................... 37
4.2 AUTHENTICA TI ON AND ENCRYPTION OF MESSAGES................................................................................... 37
4.3 FIBER LENGTHS ............................................................................................................................................ 38
REMOTE REVIEW OF SEAL DATA ......................................................................................................... 40
5.1 RMSA REVIEW GUI INSTALL ATI ON A ND CONFIGURATION ....................................................................... 40
5.2 LOADING COLLECTED RMSA DATA ........................................................................................................... 41
5.3 SORTING A ND ANALYZING RMSA DATA .................................................................................................... 45
5.4 REQUESTING RMSA SEAL DATA ................................................................................................................ 53
Table of Figures
Figure 1 Capability and Implementation Relational Diagram ....... 2
Figure 2 RMSA System Configuration .......................................... 4
Figure 3 Seal in Case .................................................................... 5
Figure 4 Block Diagram of the Seal .............................................. 7
Figure 5 Translator Block Diagram ............................................. 10
Figure 6 Type Length Value (TLV) Format ................................. 12
Figure 7 Example RMSA System Installation ............................. 14
Figure 8 Battery Holders (Seal Not in Case) .............................. 16
Figure 9 Out of Case Seal and Programmer Set -up ................. 17
Figure 10 Seal Programmer Inside Case ................................... 17
Figure 11 Installing Plastic Optical Fiber (POF)………………..38
Preface
Inside This Manual
This document desc ribes all of the procedures neces sary to operate the Remotely Monitored Seal Array system including the Seals, their supporting Translators, and communications subsystems. The User is expected to be familiar with the basic PC and MS/DOS procedures.
This document is divided into the following five chapters: Chapter 1 RMSA System Description - T his section includes an RMSA system overview
and theory of operation and describes the Seal, Translator and Rem ote Review Application software.
Chapter 2 RMSA System Set-Up - This section provides step-by-step instructions for
setting up each of the RMSA System components.
Chapter 3 RMSA Key Generation - This section contains the procedures for generating
cryptographic keys that will be loaded into the Seal.
Chapter 4 RMSA Security - This section discusses RMSA Security via encryption,
authentication, and default keys for a specific Seal.
Chapter 5 Remote Review of Seal Data - This section demonstrates the Remote Review of
Seal Data.
Safety Guidelines
Caution – Do not operate this unit in a manner not specified in this document. Caution – Only use this unit with the manufacturer provided input power cable.
FCC Compliance
Compliance Statement (Part 15.19)
The enclosed hardware device complies with Part 15 of the FCC R ules. Operation is subject to the follow ing tw o conditions: (1) This device may not cause harmful interference, and (2) This device must accept any interfer ence received including interference that may cause undesired operation.
Warning (Part 15.21)
Changes or modifications not expressly approved by Canberra Industries could void the user’s authority to operate the equipment. Manufacturer is not responsible for any radio or TV inter ference caused by unauthorized modifications to this equipment.
Compliance Statement (Part 15.105(b))
This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications. However,
REMOTELY MONITORED SEAL ARRAY(RMSA)
I
SFG-MAN-001
REVISION: 1.7
2016 CANBERRA
there is no guarantee that interference will not occur in a particular installation. If this equipment does cause harmful interference to radio or television reception, which can be determined by turning the equipment off and on, the user is encouraged to try to correct the interference by one or more of the following measures:
• Reorient or relocate the receiving antenna
• Increase the separation between the equipment and receiver
• Connect the equipment into an outlet on a circuit different from that to which the receiver is connected
• Consult the dealer or an experienced radio/TV technician for help
Industry Canada (IC) r egulatory information
This device complies with Industry Canada license-ex empt RSS standar d(s). Operation is subject to the follow ing two conditions: (1) this device may not cause interference, and (2) this device must accept any interference, including interference that may cause undesired operation of the device.
Le présent appareil est conforme aux CNR d'Industrie Canada applicables aux appareils radio exempts de licence. L'exploitation est autor isée aux deux conditions suivantes : (1) l'appareil ne doit pas produire de brouillage, et (2) l'utilisateur de l'appareil doit accepter tout brouillage radioélectrique subi, même si le brouillage est susceptible d'en compromettre le fonctionnement.
Class B digital device notice
This Class B digital apparatus complies with Canadian ICES-003, RSS-Gen and RS S-210. Cet appareil numérique de la classe B est conforme à la norme NMB-003, CNR -Gen et CNR-210 du Canada.
The system antenna(s) used for this transmitter must be installed to provide a separation distance of at least 20cm from all the persons and must not be co-located or operating in conjunction with any other antenna or transmitter, except in accordance with FCC and Industry Canada multi-transmitter product procedures.
The system antenna(s) used for this module must not exceed 10dBi (CDM A BC 0) and 9.31dBi (CD M A BC1) for mobile and fixed operating configurations. Users and installers must be provided w ith antenna installation instructions and transmitter operating conditions for satisfying RF exposure compliance.
Translator Input P ow er
Voltage: 100-240 VAC, 50-60Hz Power Consumption: .75A
Prepared by:
Author(s): Michael Fontanarosa, Tammy Wenderlich
II
REMOTELY MONITORED SEAL ARRAY(RMSA)
SFG-MAN-001
REVISION: 1.7
2016 CANBERRA
Chapter
Introduction
Welcom e to the Remotely Monitored Seal Array (RMSA) system provided by Canberra and Sandia National Labs. RMSA was designed to meet the needs of a large bas e of Users who require more data storage features, better RF performance, longer battery life, enhanced security and other more powerful functions. Figure 1 provides a pictorial representation of how the RMSA System f its within the Secure Sensor Platf orm (SSP) product family constellation in terms of its complexity and shared capabilities.
The RMSA Seal monitors a fiber optic loop, records tamper events, provides autonomous and requested State of Health via encrypted and authenticated messages. This information is stored in the Seal, remotely via the RMSA Translator and reviewed through the Remote Review Application. T he Authenticated Switch vers ion of the Seal includes m agnetic sensors and activating magnets such that a pair of Authentic ate Switch Seals can be used to create a balanced magnetic switch suitable for monitoring doors, containers and other ar ticles where one surface moves away from another under authorized conditions.

1.1 RMSA System Overview

The RMSA system consists of Seals, a Translator, a Program ming Card interfac e as well as the Remote Review Application. The RMSA system provides the following features:
Offers a low cost solution for monitoring Sealed components
Incorporates high reliability
It is inexpensive compared to earlier RF Seals
Ensures surveillance capabilities available for a long duration
Provides requested or periodic state of health updates
Monitors and records date and time of any Seal tamper or other events
Secures Seal data wi th encryption and authentication techniques
Allows remote review of Seals
Can receive messages from multiple Seals while polling for data via Remote Review
Requires no license for its low power 900 MHz ISM band RF communication
Each of these features will be discussed in this RMSA User Guide.
1
REMOTELY MONITORED SEAL ARRAY(RMSA)
SFG-MAN-001
REVISION: 1.7
2016 CANBERRA
Figure 1 Capability and Implementation Relational Diagram
2
REMOTELY MONITORED SEAL ARRAY(RMSA)
SFG-MAN-001
REVISION: 1.7
2016 CANBERRA

1.2 Theory of Operation

The RMSA allows for monitoring of a fiber optic or authenticated switch sensor as a Seal. See Figure 2 for an overview of the RMSA system configur ation. Seal data is collected with an RMSA Translator with Translator/Seal communications via a no-license, low power RF communications c hannel. Seal data is encrypted, authenticated, and stored before transfer to the Translator as the Translator is an unsecure device. A Microsoft Windows (XP-based) Remote Review Application host can decrypt and authenticate the data stored on the Translator for inspec tor analysis. A TCP/IP (Ethernet) connection between the T ranslator and the Remote Review Application host facilitates the transfer of data from the T ranslator to the Remote Review Application. In addition to remote review, this network connection is used to allow the inspector to interrogate specific Seals for state-of-health or to request re-send of a specific Seal message.
The RMSA system is capable of supporting thr ee configuration modes of operation. These three modes are designated standalone mode, local host supported mode and remote monitoring mode. In the standalone configuration the system hardware may consist of m any active Seals and one Translator, which sits unmonitored f or long periods of time. The local host supported configuration is via an Ethernet interface connected directly to a local host computer. The remote monitoring mode is similar to the local host mode but is via the internet to allow monitoring by a host computer of the RMSA system over the internet.
The Programming Card has several functions. It is used to provide power via an external power supply, a USB interface or from a Microchip compatible programm ing device. It also converts the Microchip RJ12 connector 6-wire programming cable to the RMSA 8-wire interface cable. The RMSA interf ace cable is used to program the mic rocontroller code and Seal personality information that is unique to each Seal. It also provides the interface between an external USB device, such as a PC, and the UART on the Seal, for personality programming and debugging.
3
REMOTELY MONITORED SEAL ARRAY(RMSA)
SFG-MAN-001
REVISION: 1.7
2016 CANBERRA
Figure 2 RMSA System Configuration
4
REMOTELY MONITORED SEAL ARRAY(RMSA)
SFG-MAN-001
REVISION: 1.7
2016 CANBERRA

1.3 Seal

The Seal's design is rugged and resistant to tampering. Its electronics are in a tamper indicating plastic housing. See Figure 3 f or a picture of the prototype version of Seal in its case. A pair of tamper switches is used to detect any opening of the Seal housing. The Seal housing may be opened to replace the internal batteries. Openings are recorded as tamper events. The Seal is contained in either a white PVC or a blue and white swirl polycarbonate plastic overlapping two piece case that contains an O-ring Sealing system for environmental protection. The Plastic Optical Fiber (POF) cable connectors have special Delrin® plastic ferules along with O-ring Sealing gaskets.
Figure 3 Seal in Case
Advantages of using the RMSA Seal include the following:
Can be reused indefinitely
Can be read in situ without removal from the Sealed item
No external power required, battery operated
Provides intrinsic tamper indication
Easily installed
One or multiple Seals can be read remotely
The Seal stores data and then forwards this data securely to a local Translator via low power RF communication. As many as 2000 normal State of Health messages are stored locally in the Seal in a non-volati le circular memory buffer. This locally stored Seal data can be retrieved manually by the User by using the Send Message Protocol should RF transmission be interrupted during normal operation.
5
REMOTELY MONITORED SEAL ARRAY(RMSA)
SFG-MAN-001
REVISION: 1.7
2016 CANBERRA
The Seal is comprised of the following major components: the Fiber Optic Cable, a Fiber Optic Emitter and a Fiber Optic Receiver, a Microcontroller, Memory, an RF Transceiver and Real Time Cloc k. Other inherent components include the Battery Pack, Personality and Security Key programming, and the Programming Interface. See Figure 4 for a block diagram of the Seal.
Authenticated Switch Seals contain all of the components in the Seal, and additionally have a complementary set of magnetic switches, one operating as normally closed and the other operating as normally open. There is also a strong m agnet installed in the housing such that when two Authenticated Switch modules are installed face to face, the magnet from one activates the magnetic switches on the other module.
6
REMOTELY MONITORED SEAL ARRAY(RMSA)
SFG-MAN-001
REVISION: 1.7
2016 CANBERRA
PIC
18
FL
6722
Microcontroller
Real Time Clock
CC
1100
RF Transceiver
Memory
Fiber Optic
Emitter
Fiber Optic
Receiver
Tamper
Battery
Pack
I 2 C
SPI
Programming
Interface
TX/ RX
To USB
Programming
Cable
VDD
(
unregulated
)
30
Meters
1
mm Plastic Fiber
SPI
Figure 4 Block Diagram of the Seal
7
REMOTELY MONITORED SEAL ARRAY(RMSA)
SFG-MAN-001
REVISION: 1.7
2016 CANBERRA
A parametric measure of the light intensity through the Fiber Cable Monitor is monitored electronically by the Seal. The fiber optic loop may be as short as 1 meter and as long as 30 meters in length.
Dates and times of opening or clos ing the loop, tampering, out of boundary conditions and interrogation are stored in the Seal. Each Seal has a unique ID number that is programm ed before deployment in non-volatile memory internally. A new Seal received from the manufacturer does not contain any personality information such as encryption or authentication keys. For the Seal initialization and configuration process, refer to Section 2.1.
For tamper resistanc e, a pair of tamper switches along with a special pin attached to the case top are used together to detect opening of the Seal case. Once the case is opened, the time of this tamper is recorded f or later review. Additionally, the encr yption and authentication keys are automatically destroyed and a default key is used from that point forward to do both the encryption and authentication for any further messages.
The Seal contains the following components:
Quartz crystal based timer (real-time clock) to ensure high precision in time/date generation
Microchip low power microcontroller with 128 Kbyte Flash memory to c ontrol the Seal functions, encryption, and transmit information
Non-volatile Flash memory to store up to 2000 normal SOH messages
Case switches for tamper detection
Fiber optic circuits to emit and r eceive light pulses traveling through the optical fiber
loop
Serial interface for data exchange between the Seal and the Personality Programming device
Two AA 3.6V, 2100 mA-H Lithium Batteries
Temperature monitor circuit
Programmable RF transceiver for the 900 MHz ISM band
Magnasphere magnetic switches (Authenticated Switch only)
Cylindrical magnet (Authenticated Switch only)
The microprocessor is activated by any of the following events:
Tampering attempt on the case switch
Fiber optic (FO) loop event
Valid request for communication (interrogation, initialization, etc.)
8
REMOTELY MONITORED SEAL ARRAY(RMSA)
SFG-MAN-001
REVISION: 1.7
2016 CANBERRA
Magnetic switch activation (Authenticated Switch only)
The plastic optical fiber (POF) cable is a 200-micron single fiber in a 1000 micron (1mm) plastic jacket. At each end is a r em ovable plastic ferrule for connecting the POF into the Seal body. There is a 1 mm hole in the f err ule to allow the POF to pass through and ins ert into the Seal case opening to allow light from the POF to either enter or exit.
To communicate with the Seal, the Seal is connected to a PC USB port through the Programming Card. The Seal’s two replaceable AA 3.6V lithium batteries may provide a source of power for over four years, although it is recommended that they be replaced sooner if there is more RF transmitting activity than normal.

1.4 Translator

The Translator is the device used to read the Seal data in situ. The Translator collects, stores, and then for wards data fr om Seals upon request, local or remote. All data is encrypted by the Seals before transmiss ion, though som e portions of the data fr am e s uch as Seal ID is sent in the clear (no encryption). An authentication signature is part of the overall Seal message. The Translator can then trans fer this pre-encrypted Seal data via its Ethernet link as it does not decrypt the data nor authenticate nor does not contain such functionality. The Translator sends on the encrypted Seal mes sages as well as non-encrypted information regarding the Seal address, the number of bytes in the enc rypted m essages, received signal strength as seen by the Translator, and other information. Dat a can then be verified and analyzed on-site or remotely worldwide.
When a message is transmitted the source device expects an acknowledge response from the destination device. If an acknowledge m essage is not received the source device retransm its the message after a random stand-off period of time. This RF “hand-shak e” is an aff irmative action and has been shown to cut down the amount of RF tr af f ic used by other types of Seals. The Seal will only try to wait for this acknowledgem ent of successful data reception by the Translator up to three times before s topping any further attempts for that particular mes sage. The Translator stores the messages chronologically in non-volatile memory.
For physical security, the Translator is hous ed in a tamper-indicating enclosure with openings for RF antenna and an Ethernet cable. The Translator consists of an ARM9 based single board computer (SBC) with a specially designed PC/104 daughter card called the T ranslator Communication Card (T CC), a universal 115/230V, 50/60Hz AC to 5VDC power supply, two external vertical swivel antennas and a tamper switch. See Figure 5 for a block diagram of the Translator. The SBC runs Debian Linux and contains the Operating System and RMSA application on a removable 4 GB SD card. There are 128 MB of DDR RAM, 512MB of NAND Flash, USB ports, Gigabit Ethernet, a serial port and several other items which are not used on the SBC. The T ranslator may be powered by Power Over Ethernet (POE) if desired. Total power consumption is around 5 watts.
9
REMOTELY MONITORED SEAL ARRAY(RMSA)
SFG-MAN-001
REVISION: 1.7
2016 CANBERRA
UNIVERSAL
AC POWER SUPPLY
ARM9 PC/104 SBC
TRANSLATOR
COMMUNICATION
CARD
(TCC)
PC/104
(ISA Bus)
TAMPER
DETECT SWITCH
+ 5 VDC
AC INPUT
ETHERNET
(POE)
ETHERNET
UNIVERSAL
AC POWER SUPPLY
ARM9 PC/104 SBC
TRANSLATOR
COMMUNICATION
CARD
(TCC)
PC/104
(ISA Bus)
TAMPER
DETECT SWITCH
+ 5 VDC
AC INPUT
ETHERNET
(POE)
ETHERNET
Figure 5 Translator Block Diagram
The Translator base system stores the encrypted Type Length Value (TLVs) messages in day files. The log file name consists of a date stam p and 4 digit counter. At m idnight, the curr ent day file is closed and a new file is opened with the new date stamp. To minimize Linux resource issues while stress testing, a maxim um number of rec ords per log file is imposed. When this max imum record c ount is reached, the c urrent day file is closed and a new one is open with the same date stamp but incremented counter. Multi-part messages are reassembled and stored as a s ingle day file entry for ease of retrieval. Remote comm and pass-through sends the State of Health of the Seals, the Message ID and includes an initiation of Wake on Radio sequence to the Seal. In addition, the day files also contain basic Translator State of Health data such as the following:
Translator up-time and RMSA application start / stop time.
Date and time that messages are received by the Translator timebase (though not
necessarily the date and time the message was created by the Seal timebase).
Num ber of suc cess ful and unsuc ces sful T LVs r eceived f rom this Seal (based only on properly formatted TLV Header infor mation). See Figure 6 f or a breakdown of the TLV information and its proper formatting.
Receive Signal Strength Indication (RSSI) / Link Quality Indication (LQI) based on messages.
The Translator is cons idered a non-secure device as any stored seal data is encrypted at the seal source befor e being collected by the Translator. However, Translator security features are available including:
10
REMOTELY MONITORED SEAL ARRAY(RMSA)
2016 CANBERRA
SFG-MAN-001
REVISION: 1.7
Password protection for upload of Translator log files to a review host via Samba.
T ranslator log files are placed on a s eparate disk partition so problems with the root
partition will have no effect on the logs.
An “rmsadeploy” script on the Translator that disables user access including console/serial port access, f tp, ssh, etc. In deployed mode, the Tr anslator’s SD card (firmware) would have to be replaced to regain access.
Im properly encrypted and authenticated data will be flagged by the Remote Review GUI as “corrupt”.
Refer to Chapter 4 of this User’s Guide for more details on Translator operational deployment. During RF transmissions , badly formatted T LV packets will be noted during the Translator’s
data review of the packets sent. All transmitted m essage data is stored on the Seal as well. Interruption of network operations will not affect the Translator’s RF data store operations. Network operations are only necessary during inspector download and review events.
Figure 6 shows the TLV mess age construction from the Physical Layer all the way up to the Application Layer. The TLV message format is very flexible as it allows for new message types to be created at some future point in time while allowing all previous message types previously created to be fully backwards compatible.
The TLV f ormat is set up with a Message T ype Field (this it the “T”), followed by the Length Field (this is the “L”) and then followed by the Value Field (this is the “V”). The Type and Length fields are fixed in the number of bytes, but can be modified for future growth. The Value field can be as long as feasible, depending on the Message Type.
11
REMOTELY MONITORED SEAL ARRAY(RMSA)
SFG-MAN-001
REVISION: 1.7
2016 CANBERRA
Figure 6 Type Length Value (TLV) Format
12
REMOTELY MONITORED SEAL ARRAY(RMSA)
SFG-MAN-001
REVISION: 1.7
2016 CANBERRA

1.5 RMSA Rev iew GUI

The RMSA Review GUI application runs under Microsoft WindowsXP. The Review application includes the ability to decrypt and authenticate Seal data and facilitates remote review of data both in a batch processing mode and in a live update mode. Decryption and authentication of the Seal data messages is pr ovided as is handling of incorrectly formatted TLVs and batch processing of multiple input files.
The RMSA Review GUI includes an Inspector Mode that provides a Main Batch Review Screen and a Demand Data Screen. W ithin the Main Batch processing, a sim plified view of the data, a full view of the data, or a custom view may be set up by the inspector. The batch processing of an RMSA day file(s) is only allowed w ith a password-protected Samba file share. Figure 7 provides a diagram of how the Review Application Software may be used.
Should live data updates or Seal data quer ies be needed, a TCP/IP port connection to the Translator is required. Query functions include either a request to acquire a specific Seal message via a send message demand or a request for status via a State-of Health demand.
13
REMOTELY MONITORED SEAL ARRAY(RMSA)
SFG-MAN-001
REVISION: 1.7
2016 CANBERRA
Figure 7 Example RMSA System Installation
14
REMOTELY MONITORED SEAL ARRAY(RMSA)
SFG-MAN-001
REVISION: 1.7
2016 CANBERRA
Chapter
RMSA Set-Up
This chapter details the set-up steps for the RM SA system.

2.1 RMSA Seal Programming and Configuring

Ensure that the Seal has fresh batteries with the following instructions.
15
REMOTELY MONITORED SEAL ARRAY(RMSA)
SFG-MAN-001
REVISION: 1.7
2016 CANBERRA
Battery Batteries

2.1.1 Changing the Seal Batteries

Open the Seal case. See Figure 8 below, which just shows the Seal circuit card assembly.
The two 3.6-volt Lithium AA batteries are on the top of the board in battery holders.
Rem ove old batteries and insert two fresh batteries. Note that the bat tery pos itive
terminal must align with where the arrows are pointing. There are also battery orientation symbols in the battery holders.
NOTE: The prototype Seal has a power switch which mus t be turned on (slide away from the end of the board with the fiber optic cable ferrules) to enter the command interface for personality programming.
Reprogram the Seal personality, close the Seal case and install a fiber loop.
Conf irm proper s tart-up by verifying that the red LED visible through the bottom of the
Seal case flashes 5 times and then turns off.
Holders for
Figure 8 Battery Holders (Seal Not in Case)
16
REMOTELY MONITORED SEAL ARRAY(RMSA)
SFG-MAN-001
REVISION: 1.7
2016 CANBERRA

2.1.2 Programming the Seal

The picture below illustrates the hardware set-up for the Seal programming phase. In Figure 9 the Programming Card and Seal are outside of their respective cases while Figure 10 shows the Programming inside its cas e. T he hardware s hown are the RMSA Programm er with USB cable, an 8-pin cable to support the Seal console and a PICKit2 Programm ing Dongle with USB-mini cable to support Seal microcontroller programming. The connections are the sam e if an MPLAB ICD3 Programm ing and Emulation m odule is us ed instead of the PICKit 2. Both USB cables (one from the PICKit 2 or ICD3 and one from the Programmer) are attached to the host PC. The set-up for the W indows terminal program such as HyperTerm or TeraTer m to be used with the Programmer Card is as follows: 8 data bits, No parity, 1 stop bit, 19.2 KBaud, no flow control. Once the Seal has been properly configured and programm ed, all dongle connections may be removed and the Seal can operate stand-alone.
Figure 9 Out of Case Seal and Programmer Set -up
Figure 10 Seal Programmer Inside Case
17
REMOTELY MONITORED SEAL ARRAY(RMSA)
SFG-MAN-001
REVISION: 1.7
2016 CANBERRA
Note that support files have been packaged f or the User in a folder called RMSA_USER_Files in the support and documentation package provided with the RMSA system. The folder will be referred to as the RMSA USER file repository in the remainder of this User Guide.
Seal pr ogramm ing requires acces s to MPLAB IDE version 8.43 or later and PICKit 2 version
2.61 or later. If programm ing is being performed using the MPLAB ICD3, the ICD3 is fully supported by the MPLAB IDE. Both are available as free downloads from the Microchip website at www.microchip.com
. The MPLAB IDE is us ed to create the Seal hex code with embedded Seal ID and then the PICKit 2 is used to write the hex file to the Seal. Each process is described below along with the process to configure a Seal with the appropriate date and encryption keys.
Locate hex code files (will have a format such as NAME.hex) and Keys.dat in the RMSA file repository. Also, locate the Seal personality Blind Programm er executable in the RMSA file repository. (The default is typically C:\Program Files\Sandia National Laboratories\SSP Software)
Identify the host PC COM Port associated with the RMSA USB dongle (e.g., COM5 or COM11). For the remainder of this User Guide, this COM port will be referred to as Comport.

2.1.3 Creating the Seal-Specific Hex File with MPLAB IDE

To create a Seal specific .hex file (with embedded Seal ID), perform the following steps:
Launch the MPLAB IDE application.
Using the Configure/Select Device option, ensure that the MPLAB tool is conf igured
for device type PIC18F6722 as illustrated in the screen shot below:
Normal operation for the Seal should be 3.5 V, +/- 0.1 V. The Seal will operate between 3.0 and 3.6 volts.
IMPORTANT INFORMATION! Do not apply any voltage greater than 3.7 volts to the Seal!
18
REMOTELY MONITORED SEAL ARRAY(RMSA)
SFG-MAN-001
REVISION: 1.7
2016 CANBERRA
Under the File pull down, select Import. In the Open window, browse to the location of
the RMSA User files and select file FullUser.hex.
Select Conf igure, then ID Memory, then enter the Seal ID (NOTE: All ID’s us in g 0x F F in the least significant byte of the ID are reserved for the Translator only and may not be used for Seal identification) in the User ID box, then press OK.
Under the File pull down, select Export. Select the export defaults as illustrated below and click OK.
19
REMOTELY MONITORED SEAL ARRAY(RMSA)
SFG-MAN-001
REVISION: 1.7
2016 CANBERRA
In the Save As window, browse to the User file location and save the Seal specific
.hex file with a unique name. For exam ple, if the new .hex file has embedded ID 6F, save the .hex file as FullUser_ID6F.hex.
If the Seal is to be programmed with the PICKit2 dongle, exit the MPLAB IDE application and use the Otherwise, remain in the MPLAB IDE and use the
with ICD3 section.
Writing the Hex File to the Seal with PICKit2 section.
Writing the Hex File to the Seal

2.1.4 Writing the Hex File to the Seal with ICD3

Writing the .hex f ile to the Seal requires the RMSA USB/Progr ammer. To write the .hex file to a Seal, perform the following steps:
Select a Seal, remove the enclosure and connect the RMSA USB/Programming dongle and ICD3 dongle shown in Section 2.1 of this User Guide.
Start the MPLAB Integrated Development Environment (IDE) if it is not already running. The progr am will confirm the existence of the ICD3 progr amming module and ask the user to confirm the correct power supply setting. When the initialization is complete, the prompt will indicate that the program is ready. If not, check dongle cabling (as shown in Section 2.1) and repeat this step until the connection is indicated.
20
REMOTELY MONITORED SEAL ARRAY(RMSA)
SFG-MAN-001
REVISION: 1.7
2016 CANBERRA
Under the F ile pull down, select Import, browse to the Seal specific .hex file for the
Seal and select Open. The program will report the successful import of the hex file.
Click Programmer from the top menu line and click on Program in the drop-down menu
The progress bar at the bottom of the screen will indicate that programming is in progress, and the screen will report “Programming/Verify Complete” when it is finished. Exit the MPLAB IDE program.

2.1.4 Writing the Hex File to the Seal with P ICKit2

Writing the .hex file to the Seal requires the RMSA USB/Program mer. To wr it e the .hex file to a Seal, perform the following steps:
Select a Seal, remove the enclosure and connect the RMSA USB/Programming dongle and PICKit 2 dongle shown in Section 2.1 of this User Guide.
Start the PIC Kit 2 application. Once started, the PICKit 2 window should indicate that a PIC device was found. If not, check dongle cabling (as shown in Section 2.1) and repeat this step until the connection is indicated.
21
REMOTELY MONITORED SEAL ARRAY(RMSA)
SFG-MAN-001
REVISION: 1.7
2016 CANBERRA
Under the File pull down, select Im port Hex, browse to the Seal specific .hex file for
the Seal and select Open. Note whether the program bytes appear in the Program Memory window and if the message that the Hex file has been successfully imported appears.
Click the Write button. Writing the hex file to the Seal will take approximately 1 minute allowing erase of the device then programming of the new code. A successful outcome will cause the message box to be shaded green with the message Programming Successful.
Note: Should the User wish to Read the code back, click the Read button. T he m ess age “Reading Device: Program Memory” is displayed in the message box. After several seconds, the message box will indicate it is “Done.”. No program bytes are available in the Program Memory window (use ICD3 from Microchip).

2.1.5 The Key Files

Key files are used to load keys into the Seal with the Sandia National Laboratories Blind Programmer GUI. The key files are for creation and review of encrypted and authenticated Type Length Value (TLV) data. The key file is a table of comma-delimited records where each
22
REMOTELY MONITORED SEAL ARRAY(RMSA)
SFG-MAN-001
REVISION: 1.7
2016 CANBERRA
record contains the Seal ID followed by the default encryption key, encryption key and authentication key. Key generation is dictated by IAEA policy and, therefore, outside the scope of this User Guide. Example encryption keys for this step are obtained from key file keyfile.dat.
See Section 3.1 for information on how a Key file is generated for a series of RMSA Seal IDs.
23
REMOTELY MONITORED SEAL ARRAY(RMSA)
SFG-MAN-001
REVISION: 1.7
2016 CANBERRA

2.1.6 Configuring the Seal Personality

Sandia National Laboratories provides sof tware for configuring seal personality including the SSP Personality Profile Editor for creating an XML file to define SSP seal configuration and the SSP Personality Program mer for programm ing the personality defined in an XML file into a seal. Use the RMSA Software.msi installer progr am to install the tools on a host PC running Windows XP. Then, from Start->All Programs, choose SSP Software to create the personality XML file. Once created, the personality XML file can be used to configure any number of seals. The XML file creation and SSP Programmer steps are described in more detail below.
The instructions below assum e that the key file for the s eals has been generated and is in a known location.
Start the SSP Personality Profile Editor from Start->All Programs->SSP Software. Just under the SSP Seal Configuration Title, click on the left most icon to create a new configuration file. The configuration window should be similar to:
Click the empty cell in the right column next to “Translator Addresses”. Enter the default address 000000ff.
Click anywhere on the “Key File Location” row for the CMAC Authentic ation Key then click on the “…” icon that appears to the right of this row. Use the standar d browser interface to select the key file for the seals. Repeat this step for the “Key File Location” row for the AES Encryption Key and Default Encryption and Authentication Key. Note that these keys may be loaded from the same file.
Click on the cells to the r ight of the label “Reporting Interval”. (The default value of these cells is 30 seconds.) Enter any value between 30 seconds and 24 hour s . This interval defines the period for normal State of Health reporting for the seal.
At this point, the configuration window should appear similar to:
24
REMOTELY MONITORED SEAL ARRAY(RMSA)
SFG-MAN-001
REVISION: 1.7
2016 CANBERRA
Under the SSP Seal Configuration title, select the right-most icon to save the
personality configuration using the provided standard browser interface. Once saved, exit the editor program.
It is important that the RMSA program mer dongle be plugged into the host PC via a
USB port before starting the RMSA Blind Programmer GUI so that the GUI selects the correct COM port for c ommunications . Plug the RMSA Programmer dongle into the
USB port of the PC host and the white 8-pin connector into the seal.
Start the SSP Personality Programmer from Start->All Programs->SSP Software. In the browser interface that is pr esented at startup, navigate to the XML configuration file that you just saved. The SSP Programmer window will appear similar to:
25
REMOTELY MONITORED SEAL ARRAY(RMSA)
SFG-MAN-001
REVISION: 1.7
2016 CANBERRA
Open the seal that is to be configured. Cycle the power (red switch) to the VDD
position. Message will appear in the Blind Programmer window reporting status of seal configuration similar to:
T here should be no messages printed out in red font. Any such messages indicate errors in the personality programming and/or the hardware.
Disconnect the 8-pin programming connector from the seal and install the cover.
When configuring multiple seals repeat the SSP Personality Programmer steps
above. (*The XM L confi guration fi le will need to be r e-loaded for each seal.)
At this point, the seals have been loaded with the information from the XML configuration file:
Translator Address
Translator Retry Attempts
Date and Time
Authentication and Encryption Key s
Seal Reporting Interval
26
REMOTELY MONITORED SEAL ARRAY(RMSA)
SFG-MAN-001
REVISION: 1.7
2016 CANBERRA

2.1.7 Verification of Seal Communications

Verification of seal com munications requires an RMSA T ranslator. Ref er to section 2.2.2 of this User’s Guide.

2.2 RMSA Translator Set-up and Linux Bootstrap

The Translator is initially delivered in factory set-up mode. In factory set-up mode, the Translator is not yet installed in the tamper indicating enclosure and the User has access to the Translator via the console port or secure network communication s uch as ssh. Section 4.1 includes Translator deployment steps which put the Translator in the m ore secure “ deployed” mode, eliminating console port access and auto-starting the RMSA application.
In factory set-up mode, an XP W indows PC can be used with a terminal emulator progr am such as Ter aTerm or Hyperterm to create a console connection to the T ranslator via an RS­232 or USB port (with a USB-serial dongle). The console port should be configured with 115,200 baud, 8 bits, no parity, 1 stop bit and no flow control.

2.2.1 Translator Physical Configuration

To support the console port connection required for factory set-up mode, the Translator is initially used in an open case or on the bench top. The Translator board stac k cons ists of an EmbeddedARM TS7800 SBC with Canberra’s custom TCC daughter card. Physical configuration details for the Translator are as follows:
TS7800 jumper JP1 is installed to initiate bootstrap from the SD card.
TS7800 jumper JP3 is installed to run the CPU at 333MHz instead of 500MHz, saving
power and increasing reliability in extreme thermal conditions.
A serial port console connection requires a null modem connector. A cross-over Ethernet cable can be used to connect the Translator directly to the Windows-XP Remote Review Host (see below).
Two RF antennas should be connected to the TCC card through cabling in the tamper-indicating enclosure.
The tamper switch is connected to the Tamper port of the TCC card.

2.2.2 Creating a Translator SD Card

Translator initial factory set-up mode is achieved by creating a clone of a bootable Translator SD card as documented in the “Cloning Translator SD Cards” section of the “Building RMSA Software” document. This guideline contains a complete description of the c loning procedur e. Create a bootable SD card for the Translator as described below in a brief summary:
Insert an SD card in an SD appliance connected to a Linux development environment. These steps assum e that the contents of the clonesd folder provided by Canberra is installed in the Linux development environment in /home/r msa/clonesd. This folder should contain the tarclone.sh script, the tarballs for the R MSA root (root.tar.gz) and home (home.tar.gz) partitions and the dd f iles for the other partitions required by the
27
REMOTELY MONITORED SEAL ARRAY(RMSA)
SFG-MAN-001
REVISION: 1.7
2016 CANBERRA
EmbeddedARM bootloader.
Befor e proceeding, you must k now the /dev file name for the inser ted SD appliance. This can typically be obtained from the dmesg utility. Make sure the SD appliance is settled and available after insertion before continuing.
From the shell prompt of the Linux development system, enter the following commands:
cd /home/rmsa/clonesd ./tarclone.sh sdX
where sdX represents the /dev file nam e of the SD c ard appliance (which can be determined from the dmesg utility).
T he disk clone procedur e will take several minutes. Upon completion, dism ount the SD card from the appliance.

2.2.3 Booting the Translator

With power removed from the Translator, insert the bootable SD card into the Translator’s SD card slot then apply Translator power. Linux boots trap messages appear in the Translator console window. The Translator is configured to auto-start the RMSA application. W ith no active seals, the Translator bootstrap messages will be similar to:
>> TS-BOOTROM - built Dec 4 2008 >> Copyright (c) 2008, Technologic Systems >> Booting from SD card... . . . . >> Booting to SD Card... INIT: version 2.86 booting Starting the hotplug events dispatcher: udevd. Synthesizing the initial hotplug events...done. Waiting for /dev to be fully populated...done. Cleaning up ifupdown...done. Loading kernel modules...done. Checking all file systems... fsck 1.37 (21-Mar-2005) ... done. /dev/tssdcardb6 on /home type ext3 (rw,noexec,nosuid,nodev) Setting up networking...done. Setting up IP spoofing protection: rp_filter. Enabling packet forwarding...done. Configuring network interfaces...done. Starting portmap daemon: portmap. INIT: Entering runlevel: 3 Starting system log daemon: syslogd. Starting kernel log daemon: klogd. Starting internet superserver: inetdJul 25 20:19:55 ts7800 kernel: Debian version TCC driver. Jul 25 20:19:55 ts7800 kernel: Initializing TCCDriver: 0.0.1 @ IO base address 320 Jul 25 20:19:55 ts7800 kernel: TCC Card Version: - (202D)<0>ID RT (5452) Jul 25 20:19:55 ts7800 kernel: Registered device tcc, major #
28
REMOTELY MONITORED SEAL ARRAY(RMSA)
SFG-MAN-001
REVISION: 1.7
2016 CANBERRA
62 Jul 25 20:19:55 ts7800 kernel: CC1100 INIT: Success and ready in RX mode. Jul 25 20:19:55 ts7800 kernel: RxSyncLo = 91 Jul 25 20:19:55 ts7800 kernel: Verifying TCC Initial status: <0> 02 Jul 25 20:19:55 ts7800 kernel: TCC driver successfully initialized. .
Starting Samba daemon......Samba daemon started!Starting
OpenBSD Secure Shell server: sshd. Starting periodic command scheduler: cron. main: Translator starting. Verbosity Level = LOW. rmsa: Initializing log file. rmsa: Initializing TCC. tccInit: Opening /dev/tcc. tccInit: TranslatorId=ff tccInit: Wake Interval = 12 msec, Wake Duration = 5 msec tccInit: Initializing known device queue at 0x16610. tccInit: SSPq ready. tccInit: radioCfg=0 tccInit: channel number = 0x0main: Ready to service TCC port. rmsa: Initializing CC1100. Jul 25 20:20:02 ts7800 kernel: CC1100 INIT: Success and ready in RX mode. Kernel level CC1100 INIT returns 1. Disable all TCC interrupts returns 1. cc1100: Programming CC1100. Setting cc1100Ready to 1 CC1100 programming successful. Flushing the RX FIFO returns 1. Flushing the TX FIFO returns 1. Calibrating. Calibration returns 1 Entering RX Mode. RX mode returns 1 CC1100 Ready. rmsa: Starting threads. netCreateSocket: translator hostname: ts7800 netCreateSocket: Creating network socket ... net create socket, sockfd = 7 netCreateSocket: Network socket ready. Bind=0 rmsa: Logging application start. logTranslatorEvent: Logging translator event 0. rmsa: Enabling TCC interrupts. rmsa: Radio channel number: 0x0 main: Translator successfully initialized. Set process priority to -10 Calling tccServicePort with priority -10

2.2.4 Setting Translator Time

To configure the Translator system time, Login as User “root” with password “rmsa”. This can be done from the cons ole port or via a ss h c onnection f r om a Linux host. If the console is required, we must first term inate the RMSA application. To do this, enter CTRL C on the console port.
Within 7 sec onds, you must enter the root user name and password then iss ue the command wdoff. If the wdoff command is not iss ued within 7 seconds, the watchdog timer will expire
and the Translator will reboot.
29
REMOTELY MONITORED SEAL ARRAY(RMSA)
SFG-MAN-001
REVISION: 1.7
2016 CANBERRA
From the shell prompt, issue the following command to set the Translator system time:
date –u MMDDhhmmCCYY.ss
Where –u is the command line argument that specifies UTC format and MM represents the current month (01-12) DD represents the current month day (01-31) hh represents the current hour (01-23) mm represents the current minute (01-59) CCYY represents the current year (e.g. 2010) and ss represents the seconds (01-59)
Repeat this step as often as necess ary until satisfied with the new system date and time, the new date and time is repeated on the cons ole without error and the shell prompt is re-displayed. For example:
# date –u 011208272010.45 Tue Jan 12 08:27:45 MST UTC 2010
#
If the RMSA application was terminated in order to use the Translator console, restart the RMSA application with the following command:
rmsa -v
Alternatively, the application can be restarted by rebooting the Translator.

2.2.5 Verification of Translator Operation

An operational Translator running the RMSA application will auto matically collect and store the Seal messages. The Translator receives and stores Seal messages, and logs them chronologically (in the order received) in day files in a separate partition on the SD card f rom the root file system. The size of the storage for messages is 1.5GB or larger.
Translator Implementation Note: All Translator statist ics and message logs are stored in files on the Translator SD c ard. As disk files, the logs are non-volatile. Separate file partitions are provided for system and mess age logs. Sy s tem stat us infor mation is in the root partition. The size of the root /home partition depends on the size of the SD card. Approximately 512 MB are used for bootloader and root partitions. A 2GB SD card, for example, would have approximately 1.5GB available for the message log partition.
In order to verify Tr anslator operat ion, prepare at least 2 seals acc ording to the instructions in Section 2.1 of this User’s Guide and operate the Translator in factory configuration mode with a console cable attached. W ith the seals configured and installed, reboot the T ranslator and observe the bootstrap messages in the console window followed by the RMSA application initialization messages as described in section 2.2.3, above. If the seal period is set to one minute, then within one minute you should see messages similar to the following:
tccServicePort: Rcvd 63 bytes from 45 seq_ack 31 tccRegisterDevice: creating new SSPq entry for 45 sspReceive: ACKing 45 SSP with seq_ack byte 33 tccSend (14): 0D 45 00 00 00 45 00 00 00 FF 33 00 00 00 tccServicePort: Rcvd 43 bytes from 45 seq_ack 43 sspReceive: ACKing 45 SSP with seq_ack byte 44
30
REMOTELY MONITORED SEAL ARRAY(RMSA)
SFG-MAN-001
REVISION: 1.7
2016 CANBERRA
tccSend (14): 0D 45 00 00 00 45 00 00 00 FF 44 00 00 00 Cleared 2 segments for device 45
Note: In this example, 45 is t he Seal address that originated the message. Similar messages should appear for other Seals.
Verification of seal message logging can be accomplished by logging into the Translator.
Once again, if the console must be used, it will be necessary to CTRL C, log on to the Translator as root and issue the wdoff command within 7 seconds . Alternatively, use an ssh
network connection. From the shell prompt (“#”) within the console window, issue the following commands:
cd /home/share ls
Verify log file contents with the command:
cat filename
where filename is a log file name such as rmsa255_20100112.log.
The log file will contain entries that look similar to the following example:
1, 2010 01 15 17:10:47, 00000051, 00000032, 00000000, 000000FF, 0 06:43:22, 1, ab(a9/ab), 00(00/00), 80, fb 1c a7 b5 55 a4 d1 69 22 f5 67 be 1c 09 c1 82 ec 79 59 ec de 6d a1 a2 32 44 22 8e 1b b2 34 62 7b 45 4c 35 e2 d2 1c 43 04 1b ba 1e 3b ce d4 dd fe 63 57 25 93 e2 3d b0 ea 95 35 a6 0f bc 24 ea 03 4d 02 e3 5e b7 3b c6 69 5d dc 40 c7 3d 5c 55
Highlights have been added to the example log entry above to facilitate understanding of this comma separated data file:
The green text is the log entry type. 1 indicates a message received. (Other log entry types indicate Translator start, Translator tamper, etc.)
The yellow text is the timestamp that the m essage was received. A review of the log file (using cat or similar linux tool) will show the entries in chronological order based on this time stamp.
The non-highlighted text contains a snapshot of key Translator statistics at the time the message was received.
The pink text is the number of message bytes received. The cyan text contains the actual as-received encrypted mess age bytes. The TLV contents
are not available to the Translator in clear-text. From the shell prompt, issue the following command to display Translator file partitions:
df
Results will be similar to:
31
REMOTELY MONITORED SEAL ARRAY(RMSA)
SFG-MAN-001
REVISION: 1.7
2016 CANBERRA
Filesystem 1K-blocks Used Available Use% Mounted on tmpfs 63584 … … 0% /dev/shm /dev/tssdcardb6 2855172 … … 3% /home tmpfs 10240 … … 1% /dev
Note that /home is mounted as a s eparate file partition completely separating the storage for the RMSA log files from system information and statistics.

2.2.6 Translator Power-Over-Ethernet Operation

To configure the Power-Over-Ethernet option, disconnect the AC power cord from the Translator and connect POE enabled power supply or POE enabled Ethernet Router to the Translator with an Ethernet cable. To verify correct operations, apply Translator power and verify the bootstrap messages in the console window as described in section 2.2.3 of this User’s Manual.
Note that the Translator can be powered sim ultaneously from either the POE interface or the AC interface without any issues.

2.2.7 Alternate Translator Configuration

The default T ranslator SSP addres s is 0x ff and the def ault radio channel is 0. T hese set tings should be adequate in m ost cases. Instructions are provided below for applications where these default settings must be modified.
The default radio f requency of the Translator is set c orrespond with the base of the proper allocated frequency band and to agree with the fr equency that is programm ed into the Seals. While the channel of the Translator m ay be changed, it must agree with the channel that the Seals are operating on to insure proper comm unication. The Tr anslator channel should only be changed if the Seals have been programm ed with an alternate channel. To change the default radio channel, edit the file /etc/rmsa/radioconfig and replace the 0 with the desired radio channel. The radio channel value may range from 0-30 hexadecimal.
To change the T ranslator’s SSP address , edit the file /etc/rm sa/tr ansid and replace the ff with the desired translator address. T he Translator address may be any hexadecimal integer (4 bytes) where the last byte is either ff or 0.
Note that the /etc/rmsa folder contains 2 other files that should not be modified. The sdVersion file may be read to obtain the translator software version. The wakecfg file was used by developers to experiment with the command and acknowledge timing for demanding seal data and should not be changed.

2.2.8 Change Translator IP Address

To change the translator IP address, connect to the translator via the console port. The 4 steps below must be performed within 7 seconds or the watchdog will cause the system to reboot.
Type Ctrl + c
ts7800 login: root Password: rmsa root@ts7800:root# wdoff (enter)
32
REMOTELY MONITORED SEAL ARRAY(RMSA)
SFG-MAN-001
REVISION: 1.7
2016 CANBERRA
At this point the root@ts7800:root# prompt should be displayed. Edit the Hosts file
root@ts7800:root# cd /etc (enter) root@ts7800:etc# vi hosts (enter)
The "hosts" file will be open for editing.
10.10.16.72 ts7800 <--Change to the desir ed IP a ddress
127.0.0.1 ts7800
204.152.191.39 ftp.us.debian.org
130.225.242.102 ftp.sunsite.dk
10.10.16.71 yagoo
# The following lines are desirable for IPv6 capable hosts # (added automatically by netbase upgrade)
::1 ip6-localhost ip6-loopback fe00::0 ip6-localnet ff00::0 ip6-mcastprefix ff02::1 ip6-allnodes ff02::2 ip6-allrouters ff02::3 ip6-allhosts ~
To add new characters place the cursor under the character(s) that will be changed and press "i", type the desired character(s) and press "esc". To Delete old characters place the cursor under the characters(s) that need to be removed and press "x". When changes are complete press "shift+z+z" to close and save the file.
Edit the Interfaces file
root@ts7800:root# cd etc/network (enter) root@ts7800:network# vi interfaces (enter)
The "interfaces" file will be open for editing.
#Used by ifup(8) and ifdown(8). See the interfaces(5) manpage
or
# /usr/share/doc/ifupdown/examples for more information.
auto lo iface lo inet loopback
auto eth0 #iface eth0 inet dhcp iface eth0 inet static
address 10.10.16.72 <--Change to the desir ed IP a ddress
network 10.10.16.0 <--Change to the desir ed network (if ne cess ary ) netmask 255.255.255.0
broadcast 10.10.16.255 gateway 10.10.16.72 <--Change to the desir ed gateway
# address 192.168.239.50 # network 192.168.239.0 # netmask 255.255.255.0 # broadcast 192.168.239.255 # gateway 192.168.239.1 #iface eth0 inet static # address 192.168.1.207 # network 192.168.1.0 # netmask 255.255.255.0
33
REMOTELY MONITORED SEAL ARRAY(RMSA)
SFG-MAN-001
REVISION: 1.7
2016 CANBERRA
interfaces: unmodified: line 1
To add new characters place the cursor under the character(s) that will be changed and press "i", type the desired character(s) and press "esc". To Delete old characters place the cursor under the characters(s) that need to be removed and press "x". When changes are complete press "shift+z+z" to close and save the file.
When all changes are complete the system will need to be re-booted.
root@ts7800:network# reboot (enter)
34
REMOTELY MONITORED SEAL ARRAY(RMSA)
SFG-MAN-001
REVISION: 1.7
2016 CANBERRA
Chapter
RMSA Key Generation
This chapter demonstrates key generation for the Seal.

3.1. RMSA Key Generation

This step uses s of tware that r uns in a DO S box on a WindowsXP PC gener ating k eys for one Seal. The resultant keys will be loaded into the Seal.
Locate the file rmsakeyfilegen.exe in the RMSA file repository.
Note that Help is available if needed in the following file:
msakeyfilegenhelp.txt
Start the key generation software by typing the following command line in the DOS box:
rmsakeyfilegen.exe /start:0x00000001 /end:0x000000FF /keyfile:rmsakeys.dat /start tells the generator what the first RMSA Seal ID in the f ile will be. Additional
Seal IDs will increment from this one. /end tells the generator what the last RMSA Seal ID in the file will be. /keyfile tells the generator the filename to write the keys to.
You will be prom pted to retype in a first set of specif ic random c haracter s in the DOS box. Type in the first set of characters.
You will be prom pted to retype in second set of specific random ly characters in the DOS box. Type in the second set of characters
You will be asked to type in 128 random key strokes. Type in 128 keystrokes.
th
After the 128 the keyfile.
k eystroke, the program will ask the User to stop typing and will create
35
REMOTELY MONITORED SEAL ARRAY(RMSA)
SFG-MAN-001
REVISION: 1.7
2016 CANBERRA
Starting the Key Generation Software
After echoing 2 sets of characters by the key generation software
After entering 128 keystrokes
The keys have been generated in the named file. You can close the DOS box.
36
REMOTELY MONITORED SEAL ARRAY(RMSA)
SFG-MAN-001
REVISION: 1.7
2016 CANBERRA
Chapter
RMSA Security
This chapter demonstrates RMSA encryption, authentication and default keys as well as adding new fiber lengths to a Seal.

4.1 Collect / Store Seal Messages with no Console Access

The Translator pr ovides a script for deploying from f actory set-up mode to operational mode. In operational mode, no further acc ess to the Translator (via the physical console or secure network communications such as ssh or sftp) will be possible. To re-use the Translator in factory set-up mode, the User will have to configure a new bootable SD card as described in Section 2.2 of this User Guide.
To deploy a Translator into operational mode, from the shell prompt in the console window, issue the command:
rmsadeploy
Messages similar to the following will be display ed on the in the console window:
Cleaning files out of the /home/share directory ... Cleaning debug statistics in /var/stat/rmsa ... Disable root login... Removing ssh service... Remove unnecessary modules... Disable root ftp access ... Autostart RMSA application ... Removing TTYs and console... Deploy complete. Rebooting Translator to implement security changes.
Remove the Translator console cable and install the enclosure cover.

4.2 Authentication and Encryption of Messages

Valid keys are necessary for decryption and signature verification. Key management procedures, including generation of keys and key file management, are the responsibility of the user.
Messages with invalid authentication keys will result in a “Bad signature” message status in the RMSA Review GUI. Messages with invalid encryption keys will result in a “Bad key” message status in the RMSA Review GUI and the decrypted data will not be available for review. Messages with a corr ect encryption and authentication key will be available for review in the
37
REMOTELY MONITORED SEAL ARRAY(RMSA)
SFG-MAN-001
REVISION: 1.7
2016 CANBERRA
RMSA Review GUI. When m es sages are proper ly decrypted and authenticated, all TLV data is displayed.
Ensure t hat the RMSA Review Application is connected to t he Translator by noting that the RMSA Review Application indicates it is connected and new m essages f rom the Seals appear in the main display at a rate that has been configured by the User in Section 2.1.7.
Open the key file keyfile.dat in the RMSA file repository.
Note that for each Seal ID is defined 3 keys. The first is the default key, the 2nd is the
encryption key, the 3rd is the authentication key. An example for a hypothetical entry for Seal ID 50 could show:
Default key: FAAB136723F5DD237533C32A14879011 Encryption key: 2086C23014C770D7411C039028740150 Authentication key: 2B7E151628AED2A6ABF7158809CF4F50
Quit (Don’t Save) the keyfile.dat file.

4.3 Fiber Lengths

This step is to demons trate how to use various fiber lengths. The User m ay add any User selected length of fiber, bet ween 1 and 30 meters cut f rom a spool of fiber without any special tools. However, it should be noted that the best way to ensure a good plastic optical fiber (POF) connection to the Seal would be to use a very sharp implem ent that will create a clean cut that is orthogonal to the cable. Cuts that have angles, are r agged or ar e poorly terminated will affect the sensitivity measurements done by the Seal for the light intensity and can preclude proper operation if not enough light is coupled through the fiber.
After each fiber insertion or rem oval, the Seal will send a message that shows the state of the fiber link in the Seal (i.e., Open or Closed).
Inser t the fiber within the RMSA Seal ferrules and then screw down until Hand Tight. (DO NOT OVER-TIGHTEN!)
o Push the POF into the opening until you feel it bottom out against the
photodiode. Hand-tighten the ferrule
Figure 11 Installing Plastic Optical Fiber (POF)
38
REMOTELY MONITORED SEAL ARRAY(RMSA)
SFG-MAN-001
REVISION: 1.7
2016 CANBERRA
o Repeat the above sequence for the other end of the POF for the rem aining
fiber opening in the Seal.
o To remove the POF, do the same set of operations but in reverse order.
Ensure t hat the RMSA Review Application is connected to the Translator (see section
5.1) by noting that the RMSA Review Application indicates it is connected and new messages from the Seals appear in the main display at a rate of that has been configured by the User in Section 2.1.6.
Remove one end of the POF from the seal.
W ithin a few seconds, a message is displayed from that Seal indicating an alarm
under the Source Tamper Status colum n, indicating that a fiber has been removed or inserted.
39
REMOTELY MONITORED SEAL ARRAY(RMSA)
SFG-MAN-001
REVISION: 1.7
2016 CANBERRA
Chapter
Remote Review of Seal Data
This chapter describes the installation, configuration and use of the demonstration RMSA Remote Review GUI provided by Canberra for the analysis of data collected by the T ranslator .

5.1 RMSA Review GUI Installation and Configuration

The RMSA Review GUI installer is provided by Canberra in the RMSA repository. The demonstration GUI runs on a Windows XP PC. The default installation location of the GUI will be in c:\Program Files\RMSA. The GUI is based on the .NET framework which must be installed before installing the RMSA Review GUI. If required, a copy of the .NET framework is also provided by Canberra in the RMSA repository.
The demonstration RMSA Review GUI relies on a network connection from the W indows XP host to the Translator. This c an be accomplished with an Ethernet cross over cable from the PC to the Translator with the PC LAN port configured as follows:
Once the LAN is properly configured, it should be possible to ping the T ranslator (default IP
10.10.16.72) to confirm the network connection.
40
REMOTELY MONITORED SEAL ARRAY(RMSA)
SFG-MAN-001
REVISION: 1.7
2016 CANBERRA

5.2 Loading Collected RMS A Data

The RMSA Review GUI is designed to work in two ways:
In Rem ote Review Mode the GUI loads one or more day files from the Translator’s Samba-mounted /home partition for review and analysis.
In Local Host Mode an active network connection is made between the RMSA application running on the Translator and the Rem ote Review GUI. In this mode, as seal messages are rec eived by the Translator and stored in a day file, the messages are also sent immediately to the GUI providing a “live” view of RMSA message activity. In local host m ode, the GUI operator can also demand seal data by requesting an immediate State-of-Health (SOH) message or a resend of a previous seal message.
In both modes, the GUI controls the number of r ecords loaded for review in order to avoid resource issues on the Host PC. Operating procedures for each mode are further described in the remainder of this section as is the procedure for configuring the maximum number of records available for viewing. Operating procedures f or data analysis and for dem and of s eal data are provided in sections 5.3 and 5.4 of this chapter.
Both Remote Review and Local Host operations require the G UI operator to have access to the same k ey file(s) used to configure the seal personality in order to properly decrypt and authenticate the seal data.

5.2.1 Remote Review Operation

Perform the following steps to operate the RMSA Review GUI in Remote Review mode:
Ensure the T ranslator is operational and a PC LAN connection has been es tablished between the Host PC and the Translator (refer to section 5.1, above).
Establish the Samba connection between the Host PC and the T ranslator using the Tools->Map Network Drive function in an Explore window. The drive folder will be \\10.10.16.72\share. Click on Connect Using a Different Username and enter Username “smbuser” and password “asdfqwer”. (Note that this factory default password can be changed by the user prior to Translator deployment.)
Start the RMSA Review GUI via Start->All Programs->RMSA Review. A window similar to the following should appear:
41
REMOTELY MONITORED SEAL ARRAY(RMSA)
SFG-MAN-001
REVISION: 1.7
2016 CANBERRA
Click the Load Keys button, then browse for the appropr iate key file. Double click the key
file (keyfile.dat, for example) to load the keys. A message box will be displayed indicating that the key file was successfully loaded. Click OK to dismiss this message.
Using the File pull-down in the toolbar (upper left corner), browse for a log file on the
Translator’s Samba-mounted drive. Double click on one or more day file to upload that day’s data to the remote review GUI.
Data is displayed in the GUI similar to the exam ple below. Note the file name in the Data
File text box at the top of the display. If more than one file is selected for loading, this text box will contain the name of the last file loaded but the main window will contain the data for all files.
42
REMOTELY MONITORED SEAL ARRAY(RMSA)
SFG-MAN-001
REVISION: 1.7
2016 CANBERRA

5.2.2 Local Host Operation

Perform the following steps to operate the RMSA Review GUI in Local Host mode:
Repeat all steps for R em ote Review operation up to the point of select day files with the File pull down. I.e., start the RMSA Review GUI and load keys.
Click the Connect to Translator button. W ithin a few seconds, the Translator status should be changed from Disc onnected to Connected and the button will be relabeled “Disconnect From Translator”. As seal messages are rec eived by the Translator, they will be immediately sent to the GUI. Refer to the view below:
To terminate the Local Host c onnection, click on the Disc onnect From Trans lator button. For
best synchronization of the network connection between the GUI and Translator, the connection should be disconnected before terminating the RMSA Review application. If not, it may take several minutes to re-establish the connection if the GUI restarted.
In Local Review mode, demanding seal data is available via the Tools pull down as described in section 5.4.
In Local Host mode, a TCP/IP c onnection hear tbeat message is passed between the GUI and Translator. If loss of heartbeat is detected, the connection will be shutdown. If this occurs, the Translator status will change to Disconnected and the button will be relabeled “Connect to Translator.
Note the Auto Connect option near the upper right corner of the display. If this option is selected, the GUI will automatically attempt to establish GUI/Translator communications. Therefore, if a network disruption causes disconnection due to loss of heartbeat, the GUI will re-establish the connection within a minute once the network becomes available.
43
REMOTELY MONITORED SEAL ARRAY(RMSA)
SFG-MAN-001
REVISION: 1.7
2016 CANBERRA

5.2.3 Maximum Record Display Threshold

If the number of total num ber of recor ds for all day files exceeds the m axim um record count for the RMSA Review Display, a warning will be printed at the top of the display indicating that the maximum record threshold has been exceed as illustrated below. Consider loading fewer day files to view the complete set of data. If a particular day file exceeds the maximum record count, consider raising the threshold or using an editor to break the day files into multiple parts.
To increase the threshold, select T ools->Customize Report View. The threshold setting is in the Maximum Number of Records to Display box at the top of the configuration menu (illustrated below). Change the setting as desired and click O K. Data will need to be reloaded (from the File pulldown) to load additional records. The default value of the threshold is 1000.
44
REMOTELY MONITORED SEAL ARRAY(RMSA)
SFG-MAN-001
REVISION: 1.7
2016 CANBERRA

5.3 Sorting and Analyzing RMSA Data

This section summ arizes the methods available in the demonstration RMSA Review GUI for sorting data or generating alternate data view to assist with analysis. The details of the default data view, device-specific reports and data view customization are provided below.

5.3.1 Default Data View

The RMSA Review default data view is illustrated below.
45
REMOTELY MONITORED SEAL ARRAY(RMSA)
SFG-MAN-001
REVISION: 1.7
2016 CANBERRA
From the default view, note the following:
Each row in the main display contains a Device Report row including a message counter, the Source Timestamp column contains the UNIX encoded time field and the Source Alert Count column contains the alert c ounter. These fields are included in every State of Health Message. The source timestamp should mirror the seal reporting period that was configured when programming the seal personality.
The following Event Log Types may be included in the report:
o Device Report: a TLV message from a seal o Translator Start: provides the timestamp of the start of the RMSA collection
application on the Translator.
o Cal Succes s: The Translator has detected conditions where the RF receiver
needed to be recalibrated and has successfully performed this task.
o Cal Failure: The T ranslator has detected conditions where the RF receiver
needed to be recalibrated and failed to successfully perform this task.
o Translator Tamper: Indicates a tamper event in the Translator enclosure.
In Device Report entries, the following fields are reported with a standard SOH message:
o The Source ID is the address of the reporting seal. o The Log Timestamp is the time the seal report was logged by the Translator. o The Report Status will indicate Normal, Alarm, W arning or Bad Key if the
message decryption fails. Alarm ent ries will be shaded red, W ar ning entries are shaded yellow, normal messages are not shaded. In the example below,
46
REMOTELY MONITORED SEAL ARRAY(RMSA)
SFG-MAN-001
REVISION: 1.7
2016 CANBERRA
seal 00000121 reported an Alarm in the SOH m essage due to a failed light test fiber status.
The seal logic includes a security feature that, under c ertain circumstances , will delete the encryption and authentication keys configured during personality programming and replace them with default keys. If the RMSA Review GUI fails to decr ypt and authenticate using the standard keys, it will then try using the default keys. If the default key is required a “DK” code will be added to the Report Status field. So a “Normal – DK” status indicates that a normal SOH message has been received from the seal but a previous event caused the keys to be replaced with default keys.
o The message number is the seals message count. The report should
contain consecutive mes sage numbers for each seal. However, in a busy situation where a number of seals are reporting at the same time, it is possible that the SSP ACK/Retry logic will time out and the message will be missed by the Translator. The message will be stored on the seal and can be recovered with the SNDM command as described in section 5.4.
o The Source Alert Count contains a cumulative alert count for the seal. Note
in the figure above that the Sourc e Alert C ount f or s eal 45 c hanges from 0 to 1 when the fiber event is reported.
o Other standard SOH fields include the battery voltage, temperature and
tamper status of the seal at the time the SOH message was sent. The Further Report Info would be empty under normal circumstances but may contain additional TLV information in the case of an alert or warning.
On the left side of the main display is a Known Device List. This list can be minimized with the Hide Known Devices button if more screen spac e is desired for a custom report view as described in section 5.3.3. The known device list can be used to create seal-specific reports as described in section 5.3.2. W ithin the known device list, the seal address is shaded by the highest noted alert level. I.e. if no problems have been
47
REMOTELY MONITORED SEAL ARRAY(RMSA)
SFG-MAN-001
REVISION: 1.7
2016 CANBERRA
reported, the seal address is not s haded. If the s eal has ever repor ted a warning, the device address will be shaded red. If the seal has ever reported an alert, the address is shaded red.

5.3.2 Device-Specific Report

Double click on the address cell of any seal in the Known Source ID’s list to get a pop-up report containing only messages for that seal as illustrated below.
As with the main data display, it is possible to click on any column header to sor t by that data. Note that the device report is static – it is generated from the data available at the time it was created. In Local Host mode, where data is continually being added to the main display, it may be necessary to click the Refresh Data button to receive live updates.
With the Device-specific report, it is quite eas y to note missing m essages where the message numbers are not consecutive. There may be valid reasons for a missing message. For example, the ack/retry logic on the seal takes place in a relatively short amount of time to conserve seal battery. If multiple seals are reporting at once, the T r ans lator may not meet the acknowledge time criteria for all seals and the message will not be received. However, the message should still be available on the seal and can be res ent with the Send Message data request as described in section 5.4.

5.3.3 Customizing the Data View

Each Device Report log entry has more data available for forensic s and detailed analysis than is probably desired during the initial data review. The RMSA Review GUI provides a tool to allow the operator to customize the data view. Under Tools, select Customize Report View. A window similar to the following will be displayed:
48
REMOTELY MONITORED SEAL ARRAY(RMSA)
SFG-MAN-001
REVISION: 1.7
2016 CANBERRA
The items listed on the left are def ault report items and can be restored by pressing the Default Settings button. Use the checkboxes for each of the default and alternate report item s to select the items to be visible then click OK. In the f ollowing example, the operator selected Report Status, Message Number and Report Bytes. The Hide Known Sources button was clicked to maximize the data view. The res ulting display can be used to forensically examine mes sage bytes.
49
REMOTELY MONITORED SEAL ARRAY(RMSA)
SFG-MAN-001
REVISION: 1.7
2016 CANBERRA
seal address that originated a Device Report and is
In the next example, the report view was customized to include only the Event Log Type, Source ID, Log Timestam p, Report Status and Message Number . The resulting minimal display could be used to quickly scan for Alarm or Warning conditions:
It is important to note that all data exists at all tim es within the G UI. C ustomizing the report view only determines which data will be displayed. In other words, customizing the report view does not cause the GUI to reload data from the translator.
The following table has a complete list of available Device Report data items:
Column Label Description of Contents
Event Log Type Describes the type of report – ref er to section 5.3.1, above, for further
details. This c olumn should always contain data and is included in the default report view.
Source ID Contains the
empty for all other Event Log Types. This column is inc luded in the default report view.
Log Timestamp Contains the timestamp that the log entry was created on the translator
in the format MM/DD/YYYY hh.mm.ss. This column should always contain data and is included in the default report view.
50
REMOTELY MONITORED SEAL ARRAY(RMSA)
SFG-MAN-001
REVISION: 1.7
2016 CANBERRA
Contains the seal’s cumulative alert count for a Device Report in
Source Battery
Contains the seal’s temperature reading for a Device Report in
Source Tamper
Column Label Description of Contents
Report Status Some analysis of m ess age data is perf or med by the GUI to categorize
each report as Normal, W arning or Alarm. Normal reports have no background shading, W arning reports are shaded yellow and Alarm reports are shaded red. In the case of a Norm al report, the Report Status is Normal. Warning or Alarm reports may have a Report Status of Warning or Alarm or may further indicate the Warning or Alarm source (such as “Bad k ey.”). This colum n should always contain data and is included in the default report view.
Message Number Contains the seal message number for a Device Report in decimal
format. This column is included in the default report view.
Source Timestamp Contains the seal times tamp for a Device Report indicating the time
that the seal generated the report. This column is included in the default report view.
Source Alert Count
decimal format. This column is included in the default report view.
Source Fiber State Contains the seal’s fiber optic state for a Device Report. A f iber state
reading is interpreted by the seal into one of the following possible fiber states:
Voltage Source Temp
Status
FiberOK
Dark test failed
Light test failed
Measured light exceeds upper limit
Measured light exceeds lower limit
Positive threshold exceeds upper limit
Negative threshold exceeds lower limit
Measured light exceeds positive threshold
Measured light exceeds negative threshold
Unknown fiber state
A reported state of FiberOK is considered “Normal” all others are considered an “Alarm”. T his column is included in the default report view.
Contains the seal’s battery voltage reading for a Device Report. T his column is included in the default report view.
Degrees Celsius. This column is included in the default report view. Contains the seal’s tamper status reading for a Device Report. The
case tamper reading is analyzed by the seal and reported as either Normal or Alarm . If “Alarm” is report ed, the report is classified as an Alarm report and shaded red. T his column is included in the default report view.
51
REMOTELY MONITORED SEAL ARRAY(RMSA)
SFG-MAN-001
REVISION: 1.7
2016 CANBERRA
up of the complete contents. Alternative,
is not included in the default report view. See Customizing Report
Source Report
header information are ignored (not processed and
Translator Tamper
RSSI (RF Signal
LQI (RF Signal
Column Label Description of Contents
Further Report Info Contains information as necessary to support the log entry. In the
case of a Translator Tamper report, this column will contain further information on the nature of the tamper. For Device Report log entries, the column is used to report a Bad T LV or invalid TLV format. It may also be used to report information from TLVs that are not normally reported in a SOH m essage and do not, therefore, have a dedicated column. This column is included in the default report view.
Report Bytes Contains a list of the raw report bytes (in hexadecimal) f or a Device
Report. If the report bytes were successf ully decrypted, the decrypted report bytes are reported. Note that this column can be quite wide. To examine the report bytes of a single entry, roll the mouse over t he cell for a 5-second pop­customize the report view to remove other colum ns, then expand the Report Bytes column width. Report bytes will typically not be of interest for inspection outside of forensic investigations. Therefore, this column
View, below for more information. The number of r eports received by the translator from the seal s ource
Count
address of this Device Report. This column is not included in the default report view.
Source Error Count The number of er r ors logged by the translator for repor ts f rom the seal
source address of this D evice Report . For example, RF payloads with invalid SSP logged), but a error counter is incremented. This column is not included in the default report view.
Translator Address The translator address extracted f rom the SSP header for the Device
Report. In most cases, the Translator Address will be 0xff – unless the translator device address has been modified during translator set­up/configuration or corr uption of the RF payload has occurred. This column is not included in the default report view.
Translator Uptime The translator uptime (time since last boot) at the time the Device
Report was processed and logged. The uptime can be used as a forensic indicator that the translator was unavailable for a period of time. This column is not included in the default report view.
The cumulative count of translator case tampers at the time the Device
Count
Report was processed and logged. T his colum n is not inc luded in the default report view.
The RSSI value is an indicator of RF signal quality and can be used
Quality)
forensically by an RF expert to determine if there were problems with the RF. This column is not included in the default report view.
The LQI value is an indicator of RF signal quality and can be used
Quality)
forensically by an RF expert to determine if there were problems with the RF. This column is not included in the default report view.
Report Byte Count The number of bytes included in a Device Report. The raw bytes are
viewable in the Report Bytes column. This column is not included in the default report view.
52
REMOTELY MONITORED SEAL ARRAY(RMSA)
SFG-MAN-001
REVISION: 1.7
2016 CANBERRA

5.4 Requesting RMSA Seal Data

In Local Host Operation mode (refer to section 5.2.2) the RMSA Review GUI provides an interface to request imm ediate data from the RMSA seals via Tools->Request Device Data. Six types of data request are supported(refer to sections 5.4.1 thru 5.4.5).
Because the translator cannot access the contents of incoming TLV messages from seals (due to encryption), the translator has no way of assigning a particular incoming message to a particular request. A response m essage will be delivered to the GUI for evaluation of TLV contents as with any autonomous SOH or alarm.
Further, seal response is not guaranteed. All commands sent to a seal require an acknowledgement to the Translator. If the T ranslator does not detect an acknowledgement within an adequate time period, the request will time out and the translator will retry up to 3 times. (Further data reques ts are locked out until the current data request completes , so a finite number of attem pts is necessary.) Data requests can be interrupted by autonomous SOH or alarm mes sages from any seal resulting in a delayed acknowledge for the request. Testing has shown that the translator’s three automatic retries are adequate in most cases, but occasional misses still happen.
The GUI operator can watch the m ain display for the requested report from the seal address specified in the request. If the report from the specified seal does not appear within 15 seconds, the GUI operator should repeat the request.
Procedures for each of the three requests are detailed below.

5.4.1 State of Health (SSOH) Request

To demand a SOH m ess age from a seal, select T ools->Request Device Data. The f ollowing pop-up will appear:
If necessary , cl i ck on the down arrow for the Request Type and select SSOH. (SSOH is the default request type but the GUI will remember the las t request type.) Enter the hexadecimal address of the seal (from 1 to FFFFFFFF) in the Seal Address text box then press OK. Within 15 seconds , a SOH report from the s pecified seal, using the next available message num ber, should appear in the GUI’s main display.
53
REMOTELY MONITORED SEAL ARRAY(RMSA)
SFG-MAN-001
REVISION: 1.7
2016 CANBERRA

5.4.2 Extended State of Health (ESOH) Request

For an extended SOH request, enter the hexadecim al seal address (f rom 1 to FFFF FFFF) and use the Request Type down arrow to select ESOH. The message ID text box is not activated as a message num ber is not required for an ESOH request. Once the seal address has been entered, click OK to continue. Click Cancel to abort the request.
Within 15 seconds , an extended SOH report from the specified seal, using the nex t available message num ber, should appear in the G UI’s m ain display. The extended SOH repor t includes entries in the Further Information column for the number of watchdog resets and the transmission count for the seal.0

5.4.3 Send Message (SNDM) Request

To request a particular archived message, enter the hexadecimal seal address (from 1 to FFFFFFFF) and use the Request Type down arrow to select SNDM. Once t he SNDM request type is selected, the Message ID text box is activated. Enter a valid message num ber for this seal as a decimal value.
Message numbers start with 1. The maximum valid message number should be available in the main display within the most recent autonomous State of Health message.
Click OK to send the request. Click Cancel to abort the request. Within 15 seconds, the requested message number from the requested seal should appear
within the GUI window. Note that in default review mode, messages are sorted chronologically in order of the log timestam p on the translator. Since the translator has no access to the TLV contents of the mess age (due to encryption), it has no way of inserting the data in a day file log based on the message num ber or time it was originally s ent. Therefor e, if interrogating a seal that has been running for some tim e for message ID 1, the translator will log the event in the current day file, not in the day file of the original transmission attempt. Similarly, the GUI will present the new message (Message Number 1) at the end of the currently displayed data set.

5.4.4 Send Fiber History (HIST) Request

To request a histor y of all f iber optic event messages generated (up to a limit of ~383) , enter t he hexadecimal seal address (from 1 to FFFFFFF) and use the Request Type down arrow to select HIST. Once the seal address has been entered, click OK to continue. Click Cancel to abort the request.
Within 15 sec onds, a list of the seal’s fiber optic event messages should appear in the GUI’s main display.
5.4.5 Send RMSA To Translator Associate(RTTA) and RMSA To Translator
Disassociate(RTTD) Request
The RMSA To Translator Associate (RTTA) and Dis assoc iate (RT T D) c om m ands were cr eated for seals that do not provide translator addr esses during pers onality programm ing. The address of the Trans lator that is c onnected to the GUI will be used by the seal after suc cess fully sending this message. Before receiving the RTTA command, the seal will buffer but not transmit messages. Upon receiving RTTA com mand, the seal will check a list of all mes sages buff ered and send those to the associated translator all at once. Upon receiving the RTTD command, the
54
REMOTELY MONITORED SEAL ARRAY(RMSA)
SFG-MAN-001
REVISION: 1.7
2016 CANBERRA
seal will once again no longer tr ansmit, but buffer messages in f lash memory. Mess ages will continue being buffered until a new RTTA c ommand is received. Note that these com mands only work when translator addresses are not downloaded during personality programming.
The message num ber is not required for a RTT A or RTTD comm and. Enter the hexadecimal seal address (from 1 to FFFFFFFF) then click OK to continue or Cancel to abort the request. Within 15 seconds, buffered messages should begin to appear in the GUI’s main display.
55
REMOTELY MONITORED SEAL ARRAY(RMSA)
SFG-MAN-001
REVISION: 1.7
2016 CANBERRA
This page left blank intentional ly
56
REMOTELY MONITORED SEAL ARRAY(RMSA)
SFG-MAN-001
REVISION: 1.7
2016 CANBERRA
Loading...