Small Form Factor Substation-Rated Secure Ethernet
Layer 3 Router/Gateway with Optional 2G/3G/4G LTE Cellular
Radio Link, and 100/1000 Mbps SFP Uplink Port
ComNet product series RL1000GW are substation-rated and industrially hardened
layer 3 router/gateways, with a unique and highly robust packet processing SCADAaware security firewall for the most mission-critical and demanding cyber-security
applications. The RL1000GW is intended for deployment in environments where
high levels of electromagnetic noise and interference (EMI) and severe voltage
transients and surges are routinely encountered, such as electrical utility substations
and switchyards, heavy manufacturing facilities, track-side electronic equipment,
and other difficult out-of-plant installations. Layer 3 routing functionality allows for
the participation and foundation of a core network infrastructure. The compact-sized
DIN-rail mountable RL1000GW is ideally suited to those installations and applications
where space may be limited. These features make the RL1000GW an effective
platform for deploying a secure communications and networking gateway for remote
electrical utility sites, and other critical infrastructure applications.
The RL1000GW is an ideal platform for deploying a secure communications and
networking gateway for remote electrical utility sites, and other critical infrastructure
applications.
INSTALLATION AND OPERATION MANUAL RL1000GW
Contents
About This Guide 8
Intended Audience 8
Related Documentation 9
About ComNet 9
Website 9
Support 9
Safety 9
Over view 10
Introduction 10
Key Features 10
Hardware and Interfaces 14
Graphic View of Hardware 16
Distance kept for natural air flow 17
Logical Structure 17
Grounding 17
Connecting to a Power Source 18
Power Budget 18
Configuration Environment 19
Command Line Interface 19
Supported Functionalities 20
System Version and Data Base 24
Configuration Database 24
OS VERSION 25
Commands Hierarchy 25
Example 26
Safe Mode 28
Ethernet Port Interfaces 32
TECH SUPPORT: 1.888.678.9427
Safe mode view 29
SW Image Installation 30
Commands Hierarchy 32
Show example 33
INS_RL1000GW_REV– 15 Jul 2016 PAGE 2
INSTALLATION AND OPERATION MANUAL RL1000GW
Login and Management 35
Serial Console Port 35
Connecting to the Console Port 35
CLI Terminal Commands 36
Management 36
Default state 36
Commands Hierarchy 37
Commands Description 38
IP Interfaces 39
Interface Assignment Rules 39
IP interface id 41
IP interface VLAN id 41
IP Interface Commands Hierarchy 41
IP Interface Commands Description 42
Example 43
Diagnostic 46
System logs export 46
Commands Hierarchy 46
Commands Description 46
Capture Ethernet service traffic 47
Commands Hierarchy 47
Commands Description 47
Example 47
Syslog 49
The Priority indicator 50
Message Format 51
Commands Hierarchy 58
Output example 59
Discrete IO Channels 60
TECH SUPPORT: 1.888.678.9427
Interfaces 60
Diagnostics and logic states 60
Technical data 61
Discrete IO Channels Commands Hierarchy 61
Discrete IO Channels Commands 61
INS_RL1000GW_REV– 15 Jul 2016 PAGE 3
INSTALLATION AND OPERATION MANUAL RL1000GW
Clock and Time 62
Local Clock 62
TACACS 63
Default Configurations 63
TACACS Command Hierarchy 64
TACACS Commands Descriptions 64
Configuration Example 65
ACLs 66
Flow of ACL Inspection 66
ACG 67
Comments 67
Example 68
ACL Commands Hierarchy 68
ACL Commands Descriptions
70
Configuration Example 71
QOS 72
QOS Commands Hierarchy 72
QOS Commands Descriptions
72
NAT 73
Networking 73
NAT Commands Hierarchy 74
NAT Commands Description 75
Example 75
OSPF 78
OSPF Commands Hierarchy 78
OSPF Commands Descriptions
79
Serial Ports and Services 83
TECH SUPPORT: 1.888.678.9427
OSPF setup example 79
Serial interfaces 83
Services configuration structure 83
Serial Commands Hierarchy 84
Serial Commands Description 85
INS_RL1000GW_REV– 15 Jul 2016 PAGE 4
INSTALLATION AND OPERATION MANUAL RL1000GW
Declaration of ports 88
Default State 88
RS- 232 Port Pin Assignment 88
RS-232 Serial cable 89
RS-485 Port Pin Assignment 90
LED States 90
Transparent Serial Tunneling 91
Concept of Operation 91
Supported Network topologies 92
Point to multipoint point 93
Multi Point to multipoint point 94
Modes of Operation 94
Reference drawing 96
Serial Traffic Direction 97
Allowed latency 97
Tx Delay 98
Bus Idle Time 98
Example 1 98
Example 2 100
Protocol Gateway IEC 101 to IEC 104 102
Modes of Operation 102
IEC101/104 Gateway properties IEC 101 104
IEC101/104 Gateway Configuration 105
Gateway 101/104 Configuration Flow 106
Gateway 101/104 Commands Hierarchy 108
Gateway 101/104 Commands 110
Example Gateway 101/104 111
Terminal Server 114
TECH SUPPORT: 1.888.678.9427
Service Buffer Mode 116
Terminal Server Commands Hierarchy 117
Terminal Server Commands 119
Example local Service 121
Example Networking 124
INS_RL1000GW_REV– 15 Jul 2016 PAGE 5
INSTALLATION AND OPERATION MANUAL RL1000GW
Modbus Gateway 126
Implementation 126
Modbus Gateway Commands Hierarchy 127
Modbus Gateway Commands Description 128
Example 129
DNP3 Gateway 132
Example 132
VPN 133
Background 133
Modes supported 133
Layer 3 DM-VPN 134
Layer 3 IPSec-VPN 135
DM-VPN Commands Hierarchy 136
IPSec-VPN Commands Hierarchy 137
IPSec 138
Applications 138
Authentication Header (AH) 138
Encapsulating Security Payload (ESP) 138
Security Associations 139
ISAK MP 139
IKE 139
ISAKMP Phase 2 147
IPSec Command Association 148
IPSec Commands Hierarchy 150
IPsec Commands 152
IPSec defaults 155
Cellular Modem 156
LTE Modem 156
TECH SUPPORT: 1.888.678.9427
GPRS/UMTS Modem 158
Interface Name 158
Method of operation 159
SIM card state 160
Backup and redundancy 162
Cellular Commands Hierarchy 163
Cellular Commands Description 164
INS_RL1000GW_REV– 15 Jul 2016 PAGE 6
INSTALLATION AND OPERATION MANUAL RL1000GW
Default State 166
LED States 166
Example for retrieving the IMEI 167
Example for Sim Status 168
Discrete IO Channels 169
Discrete channel interface 169
Technical data 169
Discrete IO Channels Commands Hierarchy 170
Discrete IO Channels Commands 170
VPN Setup Examples 171
DM-VPN Setup 171
Network drawing 172
DM-VPN over Cellular Setup 176
Network drawing 177
Configuration 177
Testing the setup 181
Adding a terminal server service 184
Adding a transparent serial tunneling service 185
Application Aware Firewall 186
Firewall Service flow 186
Firewall Flow Illustration 187
Supported Hardware 187
Configuration 187
Example 188
Firewall Commands Hierarchy 189
Firewall Commands 190
TECH SUPPORT: 1.888.678.9427
INS_RL1000GW_REV– 15 Jul 2016 PAGE 7
INSTALLATION AND OPERATION MANUAL RL1000GW
About This Guide
This user guide includes relevant information for utilizing the Reliance RL1000GW line of switches.
The information in this document is subject to change without notice and describes only the
product defined in the introduction of this document.
This document is intended for the use of customers of ComNet only for the purposes of the
agreement under which the document is submitted, and no part of it may be reproduced or
transmitted in any form or means without the prior written permission of ComNet.
The document is intended for use by professional and properly trained personnel, and the
customer assumes full responsibility when using it.
If the Release Notes that are shipped with the device contain information that conflicts with the
information in this document or supplements it, the customer should follow the Release Notes.
The information or statements given in this document concerning the suitability, capacity, or
performance of the relevant hardware or software products are for general informational purposes
only and are not considered binding. Only those statements and/or representations defined in the
agreement executed between ComNet and the customer shall bind and obligate ComNet.
ComNet however has made all reasonable efforts to ensure that the instructions contained in this
document are adequate and free of material errors. ComNet will, if necessary, explain issues which
may not be covered by the document.
ComNet sole and exclusive liability for any errors in the document is limited to the documentary
correction of errors. ComNet is not and shall not be responsible in any event for errors in
this document or for any damages or loss of whatsoever kind, whether direct, incidental, or
consequential (including monetary losses), that might arise from the use of this document or the
information in it.
This document and the product it describes are the property of ComNet, which is the owner of all
intellectual property rights therein, and are protected by copyright according to the applicable laws.
Other product and company names mentioned in this document reserve their copyrights,
trademarks, and registrations; they are mentioned for identification purposes only.
This user guide is intended for network administrators responsible for installing and configuring
network equipment. Users must be familiar with the concepts and terminology of Ethernet and
local area networking (LAN) to use this User Guide.
ComNet develops and markets the next generation of video solutions for the CCTV, defense, and
homeland security markets. At the core of ComNet’s solutions are a variety of high-end video
servers and the ComNet IVS software, which provide the industry with a standard platform for
analytics and security management systems enabling leading performance, compact and cost
effective solutions.
ComNet products are available in commercial and rugged form.
Website
For information on ComNet’s entire product line, please visit the ComNet website at
http://www.comnet.net
Support
For any questions or technical assistance, please contact your sales person (sales@comnet.net) or
the customer service support center (techsupport@comnet.net)
Safety
» Only ComNet service personnel can service the equipment. Please contact ComNet Technical
Support.
» The equipment should be installed in locations with controlled access, or other means of
security, and controlled by persons of authority.
TECH SUPPORT: 1.888.678.9427
INS_RL1000GW_REV– 15 Jul 2016 PAGE 9
INSTALLATION AND OPERATION MANUAL RL1000GW
Overview
Introduction
The ComNet Service-aware Industrial Ethernet routers combine a ruggedized Ethernet platform
with a unique application-aware processing engine.
As an Industrial Ethernet router the ComNet RL1000GW provide a strong Ethernet and IP featureset with a special emphasis on the fit to the mission-critical industrial environment such as fit to the
harsh environment, high reliability and network resiliency.
In addition the ComNet routers have unique service-aware capabilities that enable an integrated
handling of application-level requirements such as implementation of security measures.
Such an integrated solution results in simple network architecture with an optimized fit to the
application requirements.
Figure 1 - Illustration of ComNet RL1000GW
Key Features
The ComNet RL1000GW devices offer the following features:
» Compact systems
» Advanced Router feature-set
» Integrated Defense-in-Depth tool-set
» Ethernet and Serial interfaces
» Fit to harsh industrial environment
TECH SUPPORT: 1.888.678.9427
INS_RL1000GW_REV– 15 Jul 2016 PAGE 10
INSTALLATION AND OPERATION MANUAL RL1000GW
Seamless & Reliable Connection to Any Network
The RL1000GW provides connectivity to any copper, fiber optic, or cellular radio-based Ethernet
network. Fiber optic networks are supported by the use of the optional 100/1000FX SFP uplink
port. The optional highly resilient 2G/3G/4G LTE cellular radio uplink with 2 SIM card slots for
network redundancy, is ideal where fiber optic infrastructure is not available, and may be used as
a back-up link for those applications where interruption of service is not tolerable.
Extremely Effective Network Security, For the Most Mission-Critical Applications
Service Gateway
The RL1000GW service gateway includes a highly robust application layer, and provides legacy
support, a Deep Packet Inspection (DPI) application-aware SCADA firewall, serial tunnelling,
protocol gateway, and extremely effective encryption technologies. The service gateway offers a
uniquely capable feature set which may serve as the hardware foundation to a secure industrial
controls network, and includes Protocol Gateway, VPN, and IPsec features.
Protocol Gateway
Gateway functionality between a DNP3 TCP client (master) and a DNP3 Serial RTU, IED, PLC, or
other compatible device is supported. This same functionality is supported across MODBUS TCP
to MODBUS RTU, and IEC 61850 101/104 TCP to IEC 61850 101/104 RTU. This level of protocol
conversion allows legacy protocols to be secured by enterprise and industry best practice level
encryption across a TCP IP-based network.
VPN
VPN tunnels are included for secure inter-site connectivity with IPsec, DM-VPN, and VPN GRE
tunnels with key management certificates. The supported VPN modes allow both layer-2 and layer3 services, to best suit the user’s application-specific cyber-protection needs.
IPSec
Internet Protocol Security (IPsec) is a protocol suite for securing Internet Protocol (IP) communications
by authenticating and/or encrypting each IP packet of a communication session. IPsec-VPN as well
as IPsec encryption are supported over other VPN technologies. By implementing this level of
industry-accepted encryption, data may traverse the network in a guaranteed delivery method, as
well as providing a cohesive and secure methodology for network communication across legacy and
modern networks.
Identity Management and Authentication Proxy Access (APA)
NERC-CIP-5 defines the important requirement for network security protection of remote and
unattended facilities. The capability of identifying the user and creating specific network privileges
per identified and authenticated user prior to granting the user access to the network therefore
becomes critical
The Authentication Proxy Access (APA) is a highly sophisticated security feature, which allows the
network operator to manage the substation or any other facility maintenance process. This feature
TECH SUPPORT: 1.888.678.9427
INS_RL1000GW_REV– 15 Jul 2016 PAGE 11
INSTALLATION AND OPERATION MANUAL RL1000GW
gives full control of the maintenance process to the operator by granting the capability to create
dynamic policies to specific tasks within an explicitly defined time window. Following this time
window, operators receive reporting on activities performed during the task. This audit trail comes
in the form of an overview log, and a full packet capture (PCAP) of the session.
Before a user is allowed access to the network, they must log in to ComNet’s internal authentication
process with their unique user name and password. Upon validation of the user profile, specific
access is granted to predefined devices and functions, and each operation is logged. Multi-factor
authentication is available when combined with the Cyber-Physical Integration feature.
X.509 Certificate Exchange for VPN Connections
VPN tunnels for secure inter-site connectivity with IPsec VPN, GRE Tunnels, and DMVPN
technologies are fully supported. In addition to IPsec encryption, X.509 key management
certificates are provided. This certificate support allows for a secure signed key exchange
between a Certificate Authority, and two secure nodes. Having a third-party authority as a signing
participant offers end-to-end security that may be managed and reissued from a trusted central
source within the user’s network.
Cyber-Physical Integration
Integrated within the enhanced-security RL1000GW, is a physical identity server system,
allowing the use of external authentication hardware, such as magnetic card readers, biometric
identification sensors, facial recognition cameras, etc., to create a two-factor authentication to
the APA feature. This provides an additional level of validation of the user and his/her credentials,
prior to granting the user network access. Once the authentication is validated and approved, a
set of defined policies allow the authenticated technician to perform their task.
Enhanced SCADA-Aware Firewall
A whitelist-based firewall is provided for every Ethernet and serial data port, so full firewall
protection is available at all remote sites within the network. Every SCADA protocol packet (IEC
61850, DNP3 RTU/TCP, ModBus RTU/TCP, and IEC 101/104) is scanned and validated by the
firewall engine for its source and destination, as well as its protocol and packet content.
The structure of the distributed firewall allows the creation of a unique firewall at each access point
to the network. This is critical for securing against insider cyber-attacks, compromised field devices,
man-in-the-middle attacks, and a myriad of alternate attack vectors, by providing a secure baseline.
Two firewall states are included: Monitoring, and enforcing. The monitoring state provides an
alarm at the control center for any network violation, without blocking the network traffic. The
enforcing state is extremely effective for blocking suspicious traffic, while also triggering a
violation alarm at the control center.
ComNet’s distributed DPI firewall ensures that the operator will have full control over the network,
even when faced with a sophisticated attempt at breaching the network. Monitoring SCADA
commands, this highly robust whitelist-based firewall analyses SCADA network traffic, and is
TECH SUPPORT: 1.888.678.9427
INS_RL1000GW_REV– 15 Jul 2016 PAGE 12
INSTALLATION AND OPERATION MANUAL RL1000GW
provided for every Ethernet and serial data port, so full firewall protection is available at all remote
sites within the network, as well as all IEDs, RTUs, PLCs, or any other device connected to the
network. Every SCADA protocol packet (IEC 61850, DNP3 RTU/TCP, ModBus RTU/TCP, and IEC
101/104) is scanned and validated by the firewall engine for its source and destination, as well as
its protocol and its specific packet
Any detected abnormal traffic behavioral patterns are blocked, any affected subnets are isolated,
and alerts are automatically generated.
Ease of Installation and Network Integration
High levels of cyber-security experience are not required to successfully deploy the RL1000GW. It
is fully supported by ComNet’s Reliance Product Configuration Utility and CLI, allowing the secure
switch/router to be easily configured, and to diagnose network and security functions.
Configuration of the secure firewall is also simple. Once connected to the user’s network, the
RL1000GW immediately begins to collect and analyse information across the network, including
from other connected devices, traffic behavior, etc. Recommended firewall rules are then
suggested to the user; the implementation of these rules is optional, and they can be easily edited
using the Configuration Utility.
OAM (IEEE 802.3-2005 & IEEE 802.1ag) and QoS are also supported. Strict priority, Weighted Round
Robin (WRR), ingress policing, and egress traffic shaping are included for traffic management.
Serial Data Interface
The 2-port serial interface is available for applications including terminal server with protocol
gateway and serial tunnelling functionality, and provides direct connectivity to legacy RS-232 or
4-wire RS-485 serial data IEDs, RTUs, PLCs, and other devices.
TECH SUPPORT: 1.888.678.9427
INS_RL1000GW_REV– 15 Jul 2016 PAGE 13
INSTALLATION AND OPERATION MANUAL RL1000GW
Hardware and Interfaces
Depending on the RL1000GW hardware variant ordered your router will hold physical Ethernet
and Serial ports.
» Serial, RJ 45 ports are RS-232. Max 2 ports
» Serial, RJ 45 ports are RS-485. Max 1 ports
» Ethernet RJ45 copper ports are 10/100 FE. One port
» Ethernet SFP based ports are 100/1000 GE. One port.
Ordering options of Hardware
RL1000GW Standard Models
Part NumberDescription
RL1000GW/12/E/S22RL1000GW with 2 x RS-232 and 1 x 10/100 Tx, 12/24V DC
RL1000GW/12/E/S24RL1000GW with 1 x RS-232, 1 x RS-485 and 1 x 10/100 Tx, 12/24 VDC
RL1000GW/12/ESFP/S22RL1000GW with 2 x RS-232, 1 x 10/100 Tx and 1 x 100/1000 Fx SFP, 12/24 VDC
RL1000GW/12/ESFP/S24RL1000GW with 1 x RS-232, 1 x RS-485, 1 x 10/100 Tx and 1 x 100/1000 Fx SFP, 12/24 VDC
RL1000GW/12/E/S22/CH+RL1000GW with 2 x RS-232, 1 x 10/100 Tx and 2G/3G/HSPA+ Cellular Modem, 12/24 VDC
RL1000GW/12/E/S24/CH+
RL1000GW/12/ESFP/S22/CH+
RL1000GW/12/ESFP/S24/CH+
RL1000GW/12/E/S22/CNARL1000GW with 2 x RS-232, 1 x 10/100 Tx and 4G LTE Cellular Modem (NA Bands), 12/24 VDC
RL1000GW/12/E/S24/CNA
RL1000GW/12/ESFP/S22/CNA
RL1000GW/12/ESFP/S24/CNA
RL1000GW/12/E/S22/CEURL1000GW with 2 x RS-232, 1 x 10/100 Tx and 4G LTE Cellular Modem (EU Bands), 12/24 VDC
RL1000GW/12/E/S24/CEU
RL1000GW/12/ESFP/S22/CEU
RL1000GW/12/ESFP/S24/CEU
RL1000GW/48/E/S22RL1000GW with 2 x RS-232 and 1 x 10/100 Tx, 24/48V DC
RL1000GW/48/E/S24RL1000GW with 1 x RS-232, 1 x RS-485 and 1 x 10/100 Tx, 24/48 VDC
RL1000GW/48/ESFP/S22RL1000GW with 2 x RS-232, 1 x 10/100 Tx and 1 x 100/1000 Fx SFP, 24/48 VDC
RL1000GW/48/ESFP/S24RL1000GW with 1 x RS-232, 1 x RS-485, 1 x 10/100 Tx and 1 x 100/1000 Fx SFP, 24/48 VDC
RL1000GW/48/E/S22/CH+RL1000GW with 2 x RS-232, 1 x 10/100 Tx and 2G/3G/HSPA+ Cellular Modem, 24/48 VDC
RL1000GW with 1 x RS-232, 1 x RS-485, 1 x 10/100 Tx and 2G/3G/HSPA+ Cellular Modem,
12/24 VDC
RL1000GW with 2 x RS-232, 1 x 10/100 Tx, 1 x 100/1000 Fx SFP and 2G/3G/HSPA+ Cellular
Modem, 12/24 VDC
RL1000GW with 1 x RS-232, 1 x RS-485, 1 x 10/100 Tx, 1 x 100/1000 Fx SFP and 2G/3G/HSPA+
Cellular Modem, 12/24 VDC
RL1000GW with 1 x RS-232, 1 x RS-485, 1 x 10/100 Tx and 4G LTE Cellular Modem (NA Bands),
12/24 VDC
RL1000GW with 2 x RS-232, 1 x 10/100 Tx, 1 x 100/1000 Fx SFP and 4G LTE Cellular Modem
(NA Bands), 12/24 VDC
RL1000GW with 1 x RS-232, 1 x RS-485, 1 x 10/100 Tx, 1 x 100/1000 Fx SFP and 4G LTE
Cellular Modem (NA Bands), 12/24 VDC
RL1000GW with 1 x RS-232, 1 x RS-485, 1 x 10/100 Tx and 4G LTE Cellular Modem (EU Bands),
12/24 VDC
RL1000GW with 2 x RS-232, 1 x 10/100 Tx, 1 x 100/1000 Fx SFP and 4G LTE Cellular Modem
(EU Bands), 12/24 VDC
RL1000GW with 1 x RS-232, 1 x RS-485, 1 x 10/100 Tx, 1 x 100/1000 Fx SFP and 4G LTE
Cellular Modem (EU Bands), 12/24 VDC
TECH SUPPORT: 1.888.678.9427
INS_RL1000GW_REV– 15 Jul 2016 PAGE 14
INSTALLATION AND OPERATION MANUAL RL1000GW
Part NumberDescription
RL1000GW/48/E/S24/CH+
RL1000GW/48/ESFP/S22/CH+
RL1000GW/48/ESFP/S24/CH+
RL1000GW/48/E/S22/CNARL1000GW with 2 x RS-232, 1 x 10/100 Tx and 4G LTE Cellular Modem (NA Bands), 24/48 VDC
RL1000GW/48/E/S24/CNA
RL1000GW/48/ESFP/S22/CNA
RL1000GW/48/ESFP/S24/CNA
RL1000GW/48/E/S22/CEURL1000GW with 2 x RS-232, 1 x 10/100 Tx and 4G LTE Cellular Modem (EU Bands), 24/48 VDC
RL1000GW/48/E/S24/CEU
RL1000GW/48/ESFP/S22/CEU
RL1000GW/48/ESFP/S24/CEU
RL1000GW with 1 x RS-232, 1 x RS-485, 1 x 10/100 Tx and 2G/3G/HSPA+ Cellular Modem,
24/48 VDC
RL1000GW with 2 x RS-232, 1 x 10/100 Tx, 1 x 100/1000 Fx SFP and 2G/3G/HSPA+ Cellular
Modem, 24/48 VDC
RL1000GW with 1 x RS-232, 1 x RS-485, 1 x 10/100 Tx, 1 x 100/1000 Fx SFP and 2G/3G/HSPA+
Cellular Modem, 24/48 VDC
RL1000GW with 1 x RS-232, 1 x RS-485, 1 x 10/100 Tx and 4G LTE Cellular Modem (NA Bands),
24/48 VDC
RL1000GW with 2 x RS-232, 1 x 10/100 Tx, 1 x 100/1000 Fx SFP and 4G LTE Cellular Modem
(NA Bands), 24/48 VDC
RL1000GW with 1 x RS-232, 1 x RS-485, 1 x 10/100 Tx, 1 x 100/1000 Fx SFP and 4G LTE
Cellular Modem (NA Bands), 24/48 VDC
RL1000GW with 1 x RS-232, 1 x RS-485, 1 x 10/100 Tx and 4G LTE Cellular Modem (EU Bands),
24/48 VDC
RL1000GW with 2 x RS-232, 1 x 10/100 Tx, 1 x 100/1000 Fx SFP and 4G LTE Cellular Modem
(EU Bands), 24/48 VDC
RL1000GW with 1 x RS-232, 1 x RS-485, 1 x 10/100 Tx, 1 x 100/1000 Fx SFP and 4G LTE
Cellular Modem (EU Bands), 24/48 VDC
Options
Optional Part NoDescription
ANT3G-2M2G/3G External Grade Cellular Antenna with 2M cable (1 required per switch)
ANT3G-5M2G/3G External Grade Cellular Antenna with 5M cable (1 required per switch)
ANT4G - 2M4G LTE External Grade Cellular Antenna with 2M cable (2 required per switch)
ANT4G - 5M4G LTE External Grade Cellular Antenna with 5M cable (2 required per switch)
Power Supply12 V, 24 V or 48 V DC DIN Rail power supply
Conformal CoatAdd suffix ‘/C’ for Conformally Coated Circuit Boards to extend to condensation conditions
SFP Modules¹User selection of ComNet SFP (See SFP Modules data sheet for product numbers and compatibility)
DINBKT319-inch rack mount panel adapter
TECH SUPPORT: 1.888.678.9427
INS_RL1000GW_REV– 15 Jul 2016 PAGE 15
INSTALLATION AND OPERATION MANUAL RL1000GW
Graphic View of Hardware
8
1
10
9
11
1
3
4
2
5
6
7
Figure 2 – RL1000GW Product
Table 1 – RL1000GW Physical Feature Descriptions
Call-out DescriptionManual Reference
1
Antenna Female Connection–
2
SIM Card Ports 1 - 2
3
Power and Run LED Indicators
4
Console Interface, Link/Activity (L/A) and Speed LED Indicators
5
RS-232 Ports 1 - 2, Link/Activity (L/A) and Speed LED Indicators
6
10/100 TX Port, Link/Activity (L/A) and Speed LED Indicators
7
SIM1, SIM2, Fast Ethernet Port LED Indicators
8
Dry Contact DI/DO Interface
9
USB Interface
10
Power Interface
11
Chassis GND Lug
TECH SUPPORT: 1.888.678.9427
INS_RL1000GW_REV– 15 Jul 2016 PAGE 16
INSTALLATION AND OPERATION MANUAL RL1000GW
Distance kept for natural air flow
Proper installation depends on natural air flow for cooling. You must maintain a 10cm distance
above and below the ComNet switch for proper air flow.
Logical Structure
Figure 4 - Logical system view, illustration
Grounding
To install the grounding wire:
» Prepare a minimum 10 American Wire Gauge (AWG) grounding wire terminated by a crimped
two-hole lug with hole diameter and spacing as shown in the below figure. Use a suitable
crimping tool to fasten the lug securely to the wire. Adhere to your company’s policy as to the
wire gauge and the number of crimps on the lug.
» Apply some anti-oxidant onto the metal surface.
» Mount the lug on the grounding posts, replace the spring-washers and fasten the bolts. Avoid
using excessive torque.
CAUTION – Do not remove the earth connection unless all power supply connections are
disconnected.
DANGER – Before connecting power to the platform, make sure that the grounding posts are
firmly connected to a reliable ground, as described below.
TECH SUPPORT: 1.888.678.9427
INS_RL1000GW_REV– 15 Jul 2016 PAGE 17
INSTALLATION AND OPERATION MANUAL RL1000GW
Connecting to a Power Source
Wiring AC Input voltage connector
For an AC product variant there is a single input connector.
Use a Brown wire for the Line (Phase) conductor, a Green/Yellow for the grounding and a Blue wire
for the Neutral conductor. use 18AWG (1mm2) wire, with insulated ferrules.
Power Budget
The following table details power consumption of the Hardware variants with cellular and serial
interfaces.
Unit Power feedMax Power [Watt] Version without POE
ports
12vDC18. 580
24vDC18.5100
48vDC18.5140 (or 260*)
110 vD C18.5120
220vDC18.5120
110 vAC20.35149
220vAC20.35149 (or 275*)
* Refers to specific ordering option supporting 240w PoE.
Max Power [Watt] Version with POE
ports
TECH SUPPORT: 1.888.678.9427
INS_RL1000GW_REV– 15 Jul 2016 PAGE 18
INSTALLATION AND OPERATION MANUAL RL1000GW
Configuration Environment
A CLI based configuration environment is available for the user.
Command Line Interface
The CLI (Command Line Interface) is used to configure the RL1000GW from a console attached to
the serial port of the router or from a remote terminal using SSH. The following table lists the CLI
environments and modes.
Table 3-1: Command Line Interface
Command
Mode
Global
Configuration
Environment
(GCE)
Global
Hierarchy
Configuration
Application
Configuration
Environment
(ACE)
ACE ConfigUse the command ‘configure’ to
Application
Hierarchy
Configuration
Access MethodPromptExit Method
Following user log in this mode
is available to the user.
From the Global Configuration
mode command you may drill
down to specific feature sub
tree.
Example is shown here for
router configuration sub tree.
The ACE is an alternative
configuration environment for
supported features
access the ACE Configuration
mode
Access the target feature. For
example :
‘interface vlan 1’
RL1000GW#To exit this mode would mean the user to log out
from the system.
Use the command ‘exit’
[router/]To exit one level back, the ‘..’ (Two dots) is used.
ACE#This mode is not supported at current version
To exit back to the GCE mode use the ‘exit’
command.
ACE(config)#To exit back to the ACE mode use the ‘exit’
command.
ACE(config-if-eth1.1)#To return one level up use ‘exit’.
To return to the ACE use ‘end’.
TECH SUPPORT: 1.888.678.9427
INS_RL1000GW_REV– 15 Jul 2016 PAGE 19
INSTALLATION AND OPERATION MANUAL RL1000GW
Supported Functionalities
The RL1000GW is a feature rich industrial router supporting:
» L3 dynamic and static Routing.
» SCADA services.
» Firewall.
» Secure networking.
The below table gives a high level view of the supported features.
User Configuration is taking effect immediately upon entering. No specific COMMIT command is
required. In order to have configuration changes available after system reboot a COMMIT must
take place.
The user can as well export his running configuration as a file with a chosen name for backup and
import the file back to boot the system with when needed.
User configuration is saved using the following command
RL1000GW# commit
Building configuration...
[OK]
Removing all user configuration and setting the router to its factory defaults is done by erasing
the RL1000GW.conf with the following command
RL1000GW# delete startup-cfg
RL1000GW# reload
Exporting the database is available using tftp to a tftp server.
RL1000GW# db export filename my-file-name remote-host aa.bb.cc.dd
NOTE: Importing of db file requires system reboot for its activation
TECH SUPPORT: 1.888.678.9427
INS_RL1000GW_REV– 15 Jul 2016 PAGE 24
INSTALLATION AND OPERATION MANUAL RL1000GW
OS VERSION
Updating of system version is available by TFTP/SFTP server od safe mode.
Available OS files on the router can be seen with command showed below.
Running OS file is marked with “active”.
RL1000GW#os-image show-list
Versions list:
R F _ R L10 0 0G W _ 4.0.02.67.ta r (a ct iv e)
NOTE: The RL1000GW can hold at its disk maximum two OS image files. Before downloading a
new OS file to the router make sure the RL1000GW has on it only one (the active) file. If
needed, delete the unused file before attempting to download new.
9. Exporting configuration data base to TFTP server
Co m m and syntax:
RL1000GW# db export filename my-file-name remote-host aa.bb.cc.dd
Exa mple:
RL1000GW# db export filename db-May-14 remote-host 172.18.212.240
10. Importing configuration data base to TFTP server
Co m m and syntax:
RL1000GW# db import filename my-file-name remote-host aa.bb.cc.dd
Exa mple:
RL1000GW# db import filename db-May-14 remote-host 172.18.212.240
TECH SUPPORT: 1.888.678.9427
INS_RL1000GW_REV– 15 Jul 2016 PAGE 27
INSTALLATION AND OPERATION MANUAL RL1000GW
Completed OK, reboot to activate
RL1000GW# reload schedule in 0
Safe Mode
The system has two safe mode menus available.
To access safe mode, connect to the router via console cable, reboot the unit and interrupt the
boot process at the safe mode prompt.
The first Safe mode is used for approved technician only and should not be used unless specified
by ComNet. This safe mode state is available at the prompt
“For first safe mode Press ‘s’...”
The second safe mode is accessible at the following prompt:
##########################
For safe mode Press ‘s’...
##########################
Below screenshot details the 2 safe mode menus and their options for:
1. system reset
2. Load the factory-default configuration for the device
3. Write to EEPROM (should be used only after consulting with ComNet)
4. Recover the device’s images from a package file
Configuring the Login Authentication Method sets the authentication method for user logins.
Default user of the system:
» Name : su
» Password : 1234
» Privileges : all
» Available by: Console and Telnet.
Serial Console Port
Management over the serial console port is enabled by default.
NOTE: A console cable is supplied in the box. The cable is uniquely colored white.
Connecting to the Console Port
The console port is an EIA232 VT-100 compatible port to enable the definition of the device’s
basic operational parameters.
Connecting the device to a PC using the Console Port:
Connect the RJ-45 connector of the console cable to the device’s Console Port (CON).
Connect the other side of the cable to the PC.
Configure the PC port to 9600-N-8-1 (9600 bps, no parity,8 data bits, 1 stop bit, no flow control)
Below table details the console cable pin-out.
RJ45 MaleDB9 Female
1-
23
32
45
55
6-
7-
8-
TECH SUPPORT: 1.888.678.9427
INS_RL1000GW_REV– 15 Jul 2016 PAGE 35
INSTALLATION AND OPERATION MANUAL RL1000GW
CLI Terminal Commands
Following are commands related to the CLI terminal.
+ root
- idle-timeout
Management
The router can be managed via following methods:
» IP based.
» Serial console port.
Default state
FeatureDefault state
Layer 3 interfaceNo default IP
SSHNo available
TelnetEnabled
Console Enabled
UserUser name : su
Password : 1234
Privilege : all
DHCP Clientdisabled
TECH SUPPORT: 1.888.678.9427
INS_RL1000GW_REV– 15 Jul 2016 PAGE 36
INSTALLATION AND OPERATION MANUAL RL1000GW
Commands Hierarchy
+ root
+ reload
- schedule date-and-time YYYY-MM-DD,HH:MM:SS
- schedule every <180 – 604800 seconds >
- schedule time HH:MM:SS
- schedule in <0 – 604800 seconds >
- cancel
- show
+ users
- modify username su password <password>
- show
- commit
- delete diagnostics
- delete logs
- delete startup-cfg
- show disk info
- router interface show
- ping <destination>
- ssh {<user>@<remote IP>}
- telnet [user]@{remote IP}
TECH SUPPORT: 1.888.678.9427
INS_RL1000GW_REV– 15 Jul 2016 PAGE 37
INSTALLATION AND OPERATION MANUAL RL1000GW
Commands Description
CommandDescription
reload schedule date-and-timeSet specific date and time for router reload.
Time format: YYYY-MM-DD,HH:MM:SS
configuration which was not committed will not be available after reload!
reload schedule everySet time interval for cyclic automatic system reload.
Permissible range in seconds is 180 – 604800.
Configuration which was not committed will not be available after reload!
reload schedule timeSet specific time for router reload.
Time format: HH:MM:SS
configuration which was not committed will not be available after reload!
reload schedule inSet specific timer for next router reload.
Permissible range in seconds is 180 – 604800.
Configuration which was not committed will not be available after reload!
reload cancelCancels all scheduled automatic reloads
reload showShows user set scheduled reloads
Userspassword: alpha-numeric string. Mandatory to consist of minimum one Capital letter, one
small letter, one special symbol, one number.
Changing password is permitted to the default user ‘su’ only. Once changed from the
default password 1234, returning to password 1234 is only possible by clearing the router
to its manufacturing defaults from safe mode.
TECH SUPPORT: 1.888.678.9427
INS_RL1000GW_REV– 15 Jul 2016 PAGE 38
INSTALLATION AND OPERATION MANUAL RL1000GW
IP Interfaces
The RL1000GW supports multiple layer 3 interfaces to be set for the purposes of:
» Routing.
» Management.
» Serial services.
IP Interfaces
The following services require assignment of an IP interface.
» An IP interface may optionally be set with a VLAN tag to result on vlan tagging at the interface
egress.
» The VLAN tag set to an interface must be unique.
» If a vlan tag is not set, packets will carry no vlan tag when egress the interface.
» An interface ID is automatically assigned to each IP interface.
» Each interface must be associated with a “purpose”.
› One (and only one) of the interfaces must be set to purpose ‘application-host’
› All other interfaces must be set to purpose ‘general’
› If a “purpose” is not configured by the user, the interface will receive the ‘general’ status.
TECH SUPPORT: 1.888.678.9427
INS_RL1000GW_REV– 15 Jul 2016 PAGE 39
INSTALLATION AND OPERATION MANUAL RL1000GW
» Each interface must be in a unique subnet.
» Each interface must be associated to a physical interface. Either eth1 or eth2.
An interface cannot be associated with both.
» Physical interfaces (eth1, eth2) may be associated with more than one IP interface. Tagged
packets accessing the port will be routable to a relevant vlan IP interface. Untagged packets
accessing the port will be routable with IP interface set to be in the same subnet as the packets
origin (if such is available at the RL1000GW).
» IP interfaces associated to vlans are given an automatic name indicating the vlan tag they are
created with. The name format is:
eth<1|2>.<vlan id>
» IP interfaces not associated to a vlan, are given an automatic name indicating the id they are
created with. The name format is:
eth<1|2>:<id>
» Below is an example of interfaces configured with either vlan tag or id tag.
When an IP interface is created without explicitly assigned vlan tag, it will not support vlan
tagging. Packet coming inward to the physical interface (eth1 or eth2 as assigned) which are
holding a vlan tag will not be received by the IP interface.
Packets originated from the IP interface (egress) will be without vlan tag.
NOTE: Use id assignment to an IP interface when the network does not support vlan tagging and
ingress packets to the physical interface are untagged.
IP interface VLAN id
When an IP interface is assigned with a VLAN id it supports vlan tagging. Packet coming inward to
the physical interface (eth1 or eth2 as assigned) will be received by the IP interface only if holding
the required VLAN tag.
Packets originated from the IP interface will be without vlan tag.
NOTE: Use VLAN assignment to an IP interface when the network supports vlan tagging and a
- [no] ip route static <dest network> /<subnet> <Gateway>
- write memory
TECH SUPPORT: 1.888.678.9427
INS_RL1000GW_REV– 15 Jul 2016 PAGE 41
INSTALLATION AND OPERATION MANUAL RL1000GW
- exit
+ dhcp {enable | dissable |show}
- enable physical-interface {eth1| eth2}
- disable physical-interface {eth1| eth2}
- show physical-interface {eth1| eth2}
- interface show
- route show
IP Interface Commands Description
Command Description
Router Enter the router configuration mode
interface
create | remove Add or Remove an IP interface. The configuration should include:
Address-prefix : IP address in the format aa.bb.cc.dd/xx
VLAN: vlan ID for egress packets from the interface
Purpose: application-host or general.
physical-interface: association to the relevant Ethernet port [eth1 |eth2]
mtu: set size in bytes. Default is 1500
description: descriptive text
Static Access the router static mode.
Enable: enable configuration
Disable: disable configuration
Exit: exit to upper level
show running-cofig: static route config
configure terminal
[no] ip route static dest network: a.b.c.d
subnet: 0-32
gateway: a.b.c.d
Show Show application engine IP interfaces
TECH SUPPORT: 1.888.678.9427
INS_RL1000GW_REV– 15 Jul 2016 PAGE 42
INSTALLATION AND OPERATION MANUAL RL1000GW
Example
1. Create an IP interface with vlan 1 and static route (default gateway).
Schedulemanage scheduled task to copy system logs to the usb drive. To mound a usb drive insert it
to the router usb port and reboot the router.
add task-name copy-logsAdd a scheduled task to copy system logs to the usb drive.
Day : <1-31>
Month : <1-12>
year : <2013 -3000>
hour : <1-24>
minute : <1-60>
remove task-name copy-logsRemove a scheduled task to copy system logs to the usb drive.
ShowDisplay tasks
TECH SUPPORT: 1.888.678.9427
INS_RL1000GW_REV– 15 Jul 2016 PAGE 46
INSTALLATION AND OPERATION MANUAL RL1000GW
Capture Ethernet service traffic
The system supports sniffing and capturing of Ethernet traffic for selected service IP interfaces.
This capability is important in order to diagnose network traffic of a service for debugging.
The capturing is available for IP interfaces set at the ACE.
Captures can be displayed at the terminal or exported to a user tftp server.
CaptureStart: initiate Ethernet traffic capture on a selected ACE IP interface.
-i: mandatory prefix to be followed with the IP interface name eth1.<vlan id> where “vlan id” is the vlan
of the ip interface.
Stop : stop Ethernet traffic capture
Delete : delete capture files
Export remote-address: export file to a tftp server.
Show captured-packets –C<1-200>: display the captured content up to a chosen length (1-200) lines.
Show status : display capture configuration
Help: display help on settings options.
Syslog is a protocol used for capturing log information for devices on a network. The syslog
protocol provides a transport to allow a machine to send event notification messages across
IP networks to event message collectors, also known as syslog servers. The protocol is simply
designed to transport the event messages.
One of the fundamental tenets of the syslog protocol and process is its simplicity. The
transmission of syslog messages may be started on a device without a receiver being configured,
or even actually physically present.
This simplicity has greatly aided the acceptance and deployment of syslog.
User enables syslog server and configures the syslog related parameters. The logging process
controls the distribution of logging messages to the various destinations, such as the local buffer
or syslog server.
Severity of logging can be set with its name tag.
The syslog works in UDP mode, default port 514.
The default state of the syslog is enabled, destination ‘local’.
|S= E|SG =3500|SR C =172.18.212.50:52011|DST=172.18.212.46:2404|LEN =56|TT L =128|PRO T O=iec104|MSG =[0x 100]
[45,0]:FW RULE - no rule configured| (164 bytes)
2. Example for violation type “protocol type mismatch”
|S= A|SG =3500|SRC=172.18.212.50:52011|DST =172.18.212.46:2404|LE N=56|TT L=128|PR O TO =ie c 104|M S G =[0x101]
[45,0]:FW PROTOCOL protcol type missmatch| (170 bytes)
Server message format
The message format when sent to a SYSLOG server is,
|S= A|SG =3500|SRC=172.18.212.50:52011|DST =172.18.212.46:2404|LE N=56|TT L=128|PR O TO =ie c 104|M S G =[0x101]
[45,0]:FW PROTOCOL protcol type missmatch| (170 bytes)
Firewall Serial SCADA Protocols
The following will describe the ComNet structure of syslog mssages generated for firewall of IEC
101, DNP3 RTU, MODBUS RTU.
VIOLATION_DESCRThe FW violation description string. The following format is used:
[Major Protocol Id,Minor Protocol Id]:Violation description string
Major Protocol Id: Major protocol id value,
for ModBus – Function Code
for IEC101/104 - Type Id
for DNP3 - Function Code
Minor Protocol Id: Minor protocol id value,
for ModBus – Sub-Function Code
for IEC101/104 - non used
for DNP3 - non used
Violation description string:
The following values are available for general violations:
“Flow is not allowed”
“FW PROTOCOL no violation”
“FW internal error (no drop)”
“FW PROTOCOL SW problem”
“FW PROTOCOL no free memory”
“FW PROTOCOL illegal message length”
“FW PROTOCOL illegal data length”
“FW PROTOCOL illegal value”,
“FW PROTOCOL Timeout problem”
“FW PROTOCOL message flow inconsistancy”
“FW PROTOCOL invalid creation”
“FW PROTOCOL general flow error”
“FW PROTOCOL illeagl message”
“FW PROTOCOL general session problem”
“FW PROTOCOL illegal identifier”
“FW PROTOCOL illegal address”
“FW PROTOCOL protcol type missmatch”
“FW RULE - illegal flow”
“FW RULE - illegal message”
“FW RULE - illegal identifier”
“FW RULE - illegal address”
“FW RULE - no rule configured”
TECH SUPPORT: 1.888.678.9427
INS_RL1000GW_REV– 15 Jul 2016 PAGE 54
INSTALLATION AND OPERATION MANUAL RL1000GW
CommandDescription
VIOLATION_DESCRThe following values are available for MODBUS protocol violations:
“Modbus validity: illegal function”
“Modbus validity: illegal sub-function”
“Modbus validity: illegal encapsulated interface”
“Modbus validity: unknown device ID”
“Modbus validity: illegal quantity “
“Modbus validity: illegal FIFO byte counter”
“Modbus validity: illegal FIFO counter”
“Modbus validity: illegal record number”
“Modbus validity: illegal reference type”
“Modbus validity: illegal byte counter”
“Modbus validity: illegal length of File sub-record”
“Modbus validity: illegal write quantity”,
“Modbus validity: illegal read quantity”
“Modbus validity: illegal File sub-record length”
“Rule violation: not allowed function”
“Rule violation: not allowed sub function”
“Rule violation: out of allowed address range”
“Rule violation: not allowed quantity”
“Rule violation: out of allowed value range”
“Rule violation: not allowed sub function”
“Rule violation: not allowed file number”
“Rule violation: not allowed record number”
“Rule violation: out of allowed READ address range”
“Rule violation: out of allowed WRITE address range”
“Rule violation: not allowed READ quantity”
“Rule violation: not allowed WRITE quantity”
“Rule violation: out of the allowed address range”
“Rule violation: out of the allowed FIFO addresse range”
“Rule violation: out of the allowed encapsulated interface range”
“Rule violation: out of the allowed devise identifiers range”
“Rule violation: out of the allowed object identifiers range”
“Rule violation: address and quantity are out of the allowed range”
“Rule violation: illegal operation”
“Rule violation: inconsistent TCP Unit Identifier”
The following values are available for IEC104/IEC101 protocol violations:
“Iec104 validity: Illegal TypeId field”
“Iec104 validity: Illegal Cause field”
“Iec104 validity: Illegal APCI header”
“Iec104 validity: Illegal Control field 1 in APCI header”
“Iec104 validity: Illegal Control field 2 in APCI header”
“Iec104 validity: Illegal Control field 3 in APCI header”
“Iec104 validity: Illegal Control field 4 in APCI header”
“Iec104 rule validity: Illegal type id, no rule”
The following values are available for DNP3 protocol violations:
“DNP3 validity: Illegal Function Code field”
“DNP3 validity: Illegal Group Id field”
“DNP3 validity: Invalid Object”
“DNP3 validity: Parsing Error”
“DNP3 validity: unused”
“DNP3 validity: unused”
“DNP3 validity: unused”
“DNP3 validity: unused”
“DNP3 validity: MAX”
SLOT_NUMBERSerial Slot number on ComNet equipment
PORT_NUMBERSerial port number on ComNet equipment
DATA _MSG_ DIRThe field defines data message direction. The following values are available:
“access”,
“net w o r k ”,
“N /A”
TECH SUPPORT: 1.888.678.9427
INS_RL1000GW_REV– 15 Jul 2016 PAGE 55
INSTALLATION AND OPERATION MANUAL RL1000GW
DM-VPN logs
The following will describe the DM-VPN logs.
Message fields description
The following will further describe the syslog message fields
Ssylg messageDescription
“NHRP Event:<NHS-UP|NHS-DOWN>,i/f=<MGRE IF
NAME>,NHS=<address>”
“<MGRE IF NAME>,<ip/mask>,<NBMA NAME>: state change
<UP|DOWN> -> <UP|DOWN>”
“Handle interface UP, walk over upper layer device via
<ppp0>,Operator:<Mobile Operator>”
“Handle interface DOWN, walk over upper layer devices via
%s”
“WTR expired for <ip/mask>,<MGRE IF NAME>”Wait to restore timer expired. Relevant when protection group
“WTR started for <MGRE IF NAME> <ip/mask>,<NBMA
address> “
“WTR stopped for <MGRE IF NAME> <ip/mask>,<NBMA
address> “
“Failed to create dm-vpn mGRE interface <MGRE IF NAME>”Unexpected error while creating mGRE interface.
“Failed to reload config with <Mobile operator>”Unexpected error trying to change configuration.
“Failed to create ipsec tunnel <IPSEC tunnel name>”Failed to create ipsec tunnel
Failed to remove dm-vpn mGRE interface <MGRE IF NAME>”Failed to remove dm-vpn mGRE interface
“Failed to remove ipsec-vpn tunnel <IPSEC tunnel name>”Failed to remove ipsec-vpn tunnel
Appears when NHS status changed in spoke, happen when
registered to NHS (NHS-UP) or NHS became unreachable
(NHS-DOWN).
Appears when status of mgre interface changed.
Appears when cellular interface connected to mobile network
Appears when cellular interface disconnected from mobile
network
is configured between dm vpn interfaces
Relevant when protection group is configured between dm
vpn interfaces
Relevant when protection group is configured between dm
vpn interfaces
Cellular logs
The following will describe the Cellular logs.
Message fields description
The following will further describe the syslog message fields
Syslog messageDescription
“admin status <UP|DOWN>”Cellular enabled/disabled
“Modem is busy or no ready SIM, retrying...”Modem is not responsive or SIM cards are not present
“Cellular Admin UP cannot be applied, SIMs are disabled. Stop
operation”
“No ready SIMs”A SIM is enabled, but not in READY state
“Only SIM in slot <1|2> is ready”Only SIM in slot <1|2> is ready
“slot <1|2> is preferred”slot <1|2> is selected as preferred
“<1|2> slot has better(or equal) RSSI (<RSSI>>=<RSSI>).
Threshold is <Threshold>”
TECH SUPPORT: 1.888.678.9427
SIMs are not configured.
INS_RL1000GW_REV– 15 Jul 2016 PAGE 56
INSTALLATION AND OPERATION MANUAL RL1000GW
Syslog messageDescription
“Both slots are below required threshold <RSSI>,<RSSI>
(threshold=<Threshold>)”
“<1|2> slot is above threshold as required <RSSI>>=<RSSI>.
Other slot <RSSI>”
“disconnected... attempt moving to alternative provider will be
performed”
“disconnected... attempt to recover will be performed”Announced disconnection while other provider is not
“failed to connect... attempt to recover will be performed”Announced failure while trying to connect
“T2 expired - remove caveat on slot <1|2>”Announce of T2 timer expiration
“T1 expired on slot <1|2>”Announce of T1 timer expiration
“Wait to restore expired. Attempt to move to primary...”Wait to restore expired. Attempt to move to primary SIM
“Wait to restore expired, but primary SIM is not present or
disabled”
“RSSI is <RSSI> - below required threshold (<Threshold>)”RSSI is <RSSI> - below required threshold
“RSSI is <RSSI> - below required threshold (<Threshold>), but
primary SIM is not present or disabled”
“Continiuty check failed, attempt moving to alternative
provider will be performed “
“Continiuty check failed, attempt to recover will be performed” Announce cont. check failure when no alternative provider is
“unexpected failure, keep trying.... Retry within <SEC> sec”Announce unexpected failure
“Clear caveat on slot <1|2>”Announce clear caveat of specified slot
“Retry threshold exceeded <RETRIES>, reloading switch!”Announce threshold exceeded of cellular failures while trying
“<ppp0> connected to <Operator>,IP <address>,
BAND=<WCDMA|GSM>, Channel=<channel>”
May 18 19:27:48 SmartSwitch user.warn kernel: adjust _ link Addr 1 link 0 speed 100 o 100
dup 1 o 1
May 18 19:27:48 SmartSwitch user.info kernel: PHY: mdio@ff724000:01 - Link is Down
May 18 19:27:50 SmartSwitch user.warn kernel: adjust _ link Addr 1 link 1 speed 100 o 0 dup
1 o -1
May 18 19:27:50 SmartSwitch user.info kernel: PHY: mdio@ff724000:01 - Link is Up - 100/Full
TECH SUPPORT: 1.888.678.9427
INS_RL1000GW_REV– 15 Jul 2016 PAGE 59
INSTALLATION AND OPERATION MANUAL RL1000GW
Discrete IO Channels
Discrete signals are very common in industrial applications to monitor alarms and indications from
the field side.
Monitoring the state of discrete input channels is supported by the RL1000GW.
NOTE: Software support for the DI channels will be available from R5.0
Interfaces
Connection terminal are as shown in below figure.
Diagnostics and logic states
1. Within the CLI diagnostics of the discrete channels can be viewed using the show command
RL1000GW # discrete show
2. Status of digital input is either high or low.
a. Default: low.
3. Status of digital output is either open or closed.
a. Default – open.
TECH SUPPORT: 1.888.678.9427
INS_RL1000GW_REV– 15 Jul 2016 PAGE 60
INSTALLATION AND OPERATION MANUAL RL1000GW
Technical data
At digital Inputs please connect a DC source in the range 12vDC at terminals 6,4 for channel 1 or
5,4 for channel 2.
Digital outputs are dry mechanical relay contacts. Maximum power to be implemented at the
contacts :
AC: Max 250v, 37.5vA.
DC: Max 220v,30 watt.
Above mentioned power limitations should not be exceeded.
Maximum current allowed at the contacts is 1A.
Discrete IO Channels Commands Hierarchy
+ root
+ discrete
- show
Discrete IO Channels Commands
CommandDescription
DiscreteEnter the configuration mode for a specific physical serial ports
Show
TECH SUPPORT: 1.888.678.9427
INS_RL1000GW_REV– 15 Jul 2016 PAGE 61
INSTALLATION AND OPERATION MANUAL RL1000GW
Clock and Time
Local time set and update is available.
Local Clock
Commands Hierarchy
+ config terminal
+ date {[YYYY.]MM.DD-hh:mm[:ss] | hh:mm[:ss]}
- date
Commands Description
CommandDescription
Config terminal
date {[YYY Y.]MM.DD-hh:mm[:ss] | hh:mm[:ss]}Sets the current time and date.
dateShow the system time
1. Example for time configuration
R L 1000 G W# d at e 2014.02.02-10:01:3 0
Sun Feb 2 10:01:30 UTC 2014
Current RTC date/time is 2-2-2014, 10:01:30.
RL1000GW# date
Sun Feb 2 10:01:34 UTC 2014
TECH SUPPORT: 1.888.678.9427
INS_RL1000GW_REV– 15 Jul 2016 PAGE 62
INSTALLATION AND OPERATION MANUAL RL1000GW
TACACS
TACACS (Terminal Access Controller Access Control System), widely used in network
environments, is a client/server protocol that enables remote access servers to communicate with
a central server to authenticate dial-in users and authorize their access to the requested system or
service.
TACACS is used for several reasons:
» Facilitates centralized user administration.
» Uses TCP for transport to ensure reliable delivery.
» Supports inbound authentication, outbound authentication and change password request for
the Authentication service.
» Provides some level of protection against an active attacker.
TACACS+ is a security application that provides centralized validation of users attempting to gain
access to a router or Network Access Server. TACACS+ allows a client to accept a username and
password and sends a query to a TACACS+ authentication server, sometimes called TACACS+
daemon or simply TACACS+D.
The TACACS+ server is generally a program running on a host. The host determines whether to
accept or deny the request and sends a response back.
login authenticationSelect the authentication type.
Local: tacacs is not used. authentication is based on local database only.
Tacacs-only: tacacs server is used for authentication. If the server is unreachable, no fallback
to local database.
Tacacs-local: tacacs server is used AS default for authentication. If the server is unreachable,
fallback to local database is supported.
tacacs-server addThis command configures the TACACS server with the parameters (host, retries, key) and
specifies the IP address of one or more servers.
Host <ipv4-address>: Configures the IPv4 address of the server (host).
Port <tcp port (1- 65535 )>: Configures the TCP port number in which the multiple sessions
are established. The value ranges between 1 and 65535. default- 49.
Retries <(1-10)>: Number of retries to connect to the host. default- 1.
Key <secret key>: Specifies the authentication and encryption key for all TACACS
communications between the authenticator and the TACACS server. The value is string of
maximum length 64.
should be 1-64 charaters length.
- May include small letters.
- May include capitol letter.
- must include numbers
- May include special symbol.
- allowed synbols: @#$%^&*()-+./<\`
tacacs-server removeHost <ipv4-address>: Configures the IPv4 address of the server (host).
tacacs-server default hostThis command sets the default server to be used. The server must be predefined.
ACLs (Access Control Lists) filter network traffic by controlling whether routed packets are
forwarded or blocked at the router’s interfaces. ACLs are used to block IP packets from being
forwarded by a router. The router examines each packet to determine whether to forward or drop
the packet, based on the criteria specified within the access lists. Access list criteria can be the
source address of the traffic, the destination address of the traffic or the upper-layer protocol.
There are many reasons to configure access lists - access lists can be used to restrict contents
of routing updates or to provide traffic flow control. But one of the most important reasons to
configure access lists is to provide security for the network. Access lists must be used to provide
a basic level of security for accessing the network. If access lists has not been configured on the
router, all packets passing through the router can be allowed onto all parts of the network. For
example, access lists can allow one host to access a part of the network and prevent another host
from accessing the same area.
Flow of ACL Inspection
ACL Rules
» An ACL has a unique identifier, acl number <1001-65535>.
» ACL may consist of a single, or multiple rules.
» Each rule represents a specific condition to inspect the packet with and for which an action of
permit/deny is set.
» A rule is assigned explicitly to a specific, single ACL.
» Each ACL rule must be set with a priority, integer of value 1-255.
ACL rule with priority value 1 will be inspected before rule with priority value 255. Generally
speaking, rule x will be inspected before y, if x<y.
For a given ACL which has multiple rules assigned to it, each rule must have a unique priority
value.
» A packet which is set to be inspected by the ACL will be inspected by its rules, according to
their priority, until first match is found. The packet will then be permitted/ denied as per the
action set for the rule. The packet will not be further inspected by following rules.
» An ACL may optionally be set with an action of ‘redirect’. This action will redirect packets,
which meet one of the ACL rules, to the IPS SCADA firewall process.
A packet must meet one of the ACL rule with the action of ‘permit’.
» When creating an ACL, by the default the system will add a last rule which permits all traffic
which was not explicitly addressed by the user configured rules.
TECH SUPPORT: 1.888.678.9427
INS_RL1000GW_REV– 15 Jul 2016 PAGE 66
INSTALLATION AND OPERATION MANUAL RL1000GW
ACG
» For an ACL to take effect on incoming packets, it must be asserted on an interface. The
assignment of the ACL to an interface is referred to as Port Access Group (ACG).
» An ACG assigns a specific ACL to an interface.
» Multiple ACGs, assigning the same ACL to the same interface are not allowed.
» Each ACG is assigned with a priority, integer of value 1-255.
An ACG with priority value 1 will be inspected before ACG with priority value 255. Generally
speaking, priority x will be inspected before y, if x<y.
» A packet which is assigned multiple ACGs, will be inspected according to the ACG priorities
until first match is found. The packet will then be permitted/ denied, with the ACL option of
‘redirect’. The packet will not be further inspected by lower priority ACGs.
» If a packet does not meet any of the port assigned ACG conditions, it will be permitted.
Comments
1. An ACL rule which denies ICMP, does not block TCP or UDP traffic, only ICMP
2. An ACL rule which denies TCP, does not block ICMP or UDP traffic, only TCP
3. An ACL rule which denies UDP, does not block ICMP or TCP traffic, only UDP
4. Deleting an ACL will automatically remove corresponding ACGs on the interfaces, if such exists.
5. For an ACL which is already set to a port with an ACG, if a rule is added to the ACL (on the fly) it
takes effect immediately on the ACG without need to reassign it to the interface.
6. To delete a rule, it is needed to delete the entire ACL it is assigned to.
TECH SUPPORT: 1.888.678.9427
INS_RL1000GW_REV– 15 Jul 2016 PAGE 67
INSTALLATION AND OPERATION MANUAL RL1000GW
Example
Following example will explain the ACL inspection flow.
The PC is sending udp packets. At the interface eth1, ACGs are intercepting the packets and
examine them.
ACG with priority 10 will take effect first, examine the packet with ACL 1050 rules. Rule 2, which
has priority 50, will be the first to be examined. As the rule addresses TCP packets, the condition
is not met. The packet will then be examined with rule 1 which addresses ICMP and thus as well
the rule is not met. The packet will now be examined with ACL 1010 rule 2 (priority 30). As the rule
condition of ICMP is not met, the packet is examined by the next rule (priority 80). The condition
of UDP is met and the packet is permitted.
ip access-list extendedThis command enters the IP Access-list configuration mode.
Create | deleteacl-num <1001-65535>} : the acl main identifier.
acl-name: optional name to describe the acl.
Redirect: redirect traffic to the SCADA firewall. <off| on>
Permit |deny tcp| udpacl-num <1001-65535>} : the acl main identifier.
rule-name: optional name to describe the rule.
Src-ip: Any | <src-ip>| <src-ip/mask>. Source IP address can be: ‘any’ or the dotted decimal address
or the IP address of the host that the packet is from and the network mask to use with the source IP
address.
dst-ip: any|host <dst-ip>|<dest-ip/mask>. Destination IP address can be: ‘any’ or the dotted
decimal address or the IP address of the host that the packet is destined for and the network mask
to use with the destination IP address.
Src-port: source port number.
dst-port: destination port number.
Src-port-range: source port number range min:max.
dst-port-range: destination port number range min:max.
Priority: this field will determine the rules execution order. Higher value of filter priority implies it
will be executed first. This value ranges between 1 and 256.
Permit |deny icmpacl-num <1001-65535>} : the acl main identifier.
rule-name: optional name to describe the rule.
Src-ip: Any | <src-ip>| <src-ip/mask>. Source IP address can be: ‘any’ or the dotted decimal address
or the IP address of the host that the packet is from and the network mask to use with the source IP
address.
Dst-ip: any|host <dst-ip>|<dest-ip/mask>. Destination IP address can be: ‘any’ or the dotted
decimal address or the IP address of the host that the packet is destined for and the network mask
to use with the destination IP address.
Priority: this field will determine the rules execution order. Higher value of filter priority implies it
will be executed first. This value ranges between 1 and 256.
ip access-group
Apply| removeacl-num <1001-65535>} : the acl main identifier.
direction: supported direction is ‘in’.
interface: choose the target interface.
Priority: this field will determine the ACL execution order. Higher value of al priority implies it will
be executed first. This value ranges between 1 and 256.
ShowList the acl assignment to the interface.
Flush interfacesFlush the acl assignment from a specific or all interfaces.
TECH SUPPORT: 1.888.678.9427
INS_RL1000GW_REV– 15 Jul 2016 PAGE 70
INSTALLATION AND OPERATION MANUAL RL1000GW
Configuration Example
Example 1
RL1000GW# ip access-list extended create acl-num 1010
RL1000GW# ip access-list extended permit icmp acl-num 1010 priority 10 src-ip any dst-ip any
RL1000GW# ip access-group apply acl-num 1010 interface eth1 direction in priority 10
Example 2
RL1000GW# ip access-list extended create acl-num 1010
RL1000GW# ip access-list extended permit icmp acl-num 1010 priority 10 src-ip 192.168.1.250
d s t-ip 192.168.1.101
RL1000GW# ip access-list extended deny icmp acl-num 1010 priority 20 src-ip 192.168.1.250
d s t-ip 192.168.2.101
RL1000GW# ip access-list extended permit tcp acl-num 1010 priority 40 src-ip any dst-ip
192.16 8.2.101
RL1000GW# ip access-list extended deny tcp acl-num 1010 priority 30 src-ip any dst-ip
192.16 8.1.101
RL1000GW# ip access-group apply acl-num 1010 interface eth1 direction in priority 1
Example 3
RL1000GW# ip access-list extended create acl-num 1010
RL1000GW# ip access-list extended permit icmp acl-num 1010 priority 10 src-ip 192.168.1.250
d s t-ip 192.168.1.101
RL1000GW# ip access-list extended deny icmp acl-num 1010 priority 255 src-ip any dst-ip
192.16 8.1.101
RL1000GW# ip access-list extended create acl-num 1020
RL1000GW# ip access-list extended deny icmp acl-num 1020 priority 10 src-ip any dst-ip
any
RL1000GW# ip access-group apply acl-num 1010 interface eth1 direction in priority 10
RL1000GW# ip access-group apply acl-num 1020 interface eth1 direction in priority 20
TECH SUPPORT: 1.888.678.9427
INS_RL1000GW_REV–
08/31/12 PAGE 71
INSTALLATION AND OPERATION MANUAL RL1000GW
QOS
SCADA services are still commonly using serial legacy hardware. For such applications, the
RL1000GW supports services as protocol gateway, serial tunneling and terminal server. These low
bandwidth application may be of high importance to the utility process and require high network
availability.
The QOS allows setting priority for serial services.
qosThis command enters the quality of service configuration mode.
mark-ruleCreate| update| show
src-ip: IPv4 source IP of the packet. Should be one of the RL1000GW IP interfaces. A.B.C.D/E
dest-ip: IPv4 destination IP of the packet.
Protocol: tcp|udp protocol used at the packet.
src-port: protocol source port used at the packet.
dest-port: protocol source port used at the packet.
TECH SUPPORT: 1.888.678.9427
INS_RL1000GW_REV– 15 Jul 2016 PAGE 72
INSTALLATION AND OPERATION MANUAL RL1000GW
NAT
The RL1000GW routing package supports Static and Dynamic settings of Network Address
Translation.
Dynamic NAT settings allow LAN members to initiate sessions with targets located at the WAN.
The NAT router (RL1000GW) will use its WAN IP interface as the new source ip of the session
request, hiding the original private IP of the initiating LAN device. The NAT router can use a single
WAN ip interface to traverse multiple private IP addresses of its lan, thus limiting the required
public ip addresses to a single one.
Static NAT settings, direct incoming WAN traffic to a particular target LAN client. As the WAN
stations usually will not have a route to the private LAN, but only to the WAN ip address of the
router, the static Nat settings are mandatory to allow them to initiate sessions towards LAN
targets.
The NAT router serves both a routing function and security layer, allowing provisioning of WAN
traffic access to the LAN.
Networking
Following picture will suggest NAT networking results per configuration option of dynamic/ static
NAT set at the RL1000GW.
Figure 2 NAT networking 1
Looking at picture ‘NAT networking 1’, PC communication towards the server is dependent on the
NAT configuration set at the RL1000GW NAT router.
» Static NAT only
TECH SUPPORT: 1.888.678.9427
INS_RL1000GW_REV– 15 Jul 2016 PAGE 73
INSTALLATION AND OPERATION MANUAL RL1000GW
The PC will not be able to initiate sessions towards the Server. Sessions initiated by the Server
towards the PC will be received by the PC and replies of the PC will be received at the Server.
» Dynamic NAT only
The PC will be able to initiate sessions towards the Server and replies of the Server will be
received at the PC. Sessions initiated by the Server towards the PC will not be received by the PC.
» Dynamic and Static NAT together
Both the Server and the PC can initiate sessions and receive replies.
DynamicCreate| remove| show interface for dynamic nat.
Interface name: the IP interface on which to enable the dynamic nat. Lan packets egressing the route rover
this interface will have their ‘source ip’ replaced with the interface ip.
The interface may be one which is associated with a physical port or the cellular ppp0 (GPRS/UMTS
modem) or eth0 (LTE modem) interface.
Description: text describing the interface. Optional.
staticCreate| remove| show static nat entries.
Original-ip: the original ‘destination ip’ at the incoming packet ip header.
Modified-ip: the ip to which the nat should traverse the original-ip to.
Original-port: the original protocol ‘destination port’ at the incoming packet ip header.
Modified-port: the protocol port to which the nat should traverse the original-port to.
Protocol: define the protocol, which the incoming packet uses, for which the nat should traverse. Packets
which do not meet this condition will not traverse.
Rule-id: an identifier given automatically by the system for each static nat entry. The rule-id is a sufficient
parameter to remove an entry.
Example
Following setup example will explain how to use NAT to allow the PC, residing outside the LAN
and with no routing to the LAN, connectivity to the LAN.
The PC is set to achieve management to the switch using the switch private interface and as well
telnet to a server located at the LAN.
OSPF (Open Shortest Path First) protocol is an Interior Gateway Protocol used to distribute routing
information within a single Autonomous System. Routers use link-state algorithms to send routing
information to all nodes in an inter-network by calculating the shortest path to each node based
on topography of the Internet constructed by each node. Each router sends that portion of the
routing table (keeps track of routes to particular network destinations), which describes the state
of its own links, and it also sends the complete routing structure (topography).
The advantage of shortest path first algorithms is that they result in smaller more frequent update
everywhere. They converge quickly, thus preventing such problems as routing loops and Countto-Infinity (when routers continuously increment the hop count to a particular network). This makes
for a stable network.
OSPF Commands Hierarchy
+ root
+ router ospf
- enable
- exit
+ configure terminal
+ router ospf
- [no] area { A.B.C.D | < metric id ,(0-4294967295)> }
- [no] router-id < A.B.C.D >
- [no] network { A.B.C.D/M | <interface name ,eth1.(id)> }
Router ospf area – OSPF area parameters given in A.B.C.D format or as a metric id (0-4294967295).
router-id – router-id for the OSPF process given in A.B.C.D format.
network – Enable routing on an IP network .
Network can be given as A.B.C.D/M or as a name of a preconfigured interface eth1.<vlan id>.
passive-interface – Suppress routing updates on an interface.
given as a name of a preconfigured interface eth1.<vlan id>.
redistribute – Redistribute information from another routing protocol.
neighbor – Specify a neighbor router. given as A.B.C.D/M .
write – commit and preserve configuration
OSPF setup example
Below setup and configuration will example OSPF based routing between RL1000GW and
RLGE2FE16R routers.
R1 configuration (RLGE2FE16R)
1. remove network ports from default vlan 1
config
vla n 1
no ports fa 0/1-2 untagged fa 0/1-2
exit
TECH SUPPORT: 1.888.678.9427
INS_RL1000GW_REV– 15 Jul 2016 PAGE 79
INSTALLATION AND OPERATION MANUAL RL1000GW
2. assign vlans and corresponding IP interfaces
vlan 101
config
vla n 2
ports fastethernet 0/2
exit
vla n 4
ports fastethernet 0/1 untagged all
exit
interface fast 0/1
switchport pvid 4
exit
interface vlan 2
ip a dd re s s 192.168.2.101 255.255.255.0
no shutdown
exit
interface vlan 4
ip a dd re s s 192.168.4.101 255.255.255.0
no shutdown
exit
end
3. configure OSPF
router ospf
router ospf
ro ute r-i d 192.168.4.101
network 192.168.4.101 255.255.255.0 area 0.0.0.0
ne t w o r k 192.168.2.101 2 5 5.255.2 55.0 a r e a 0.0.0.0
Destination Gateway Genmask Flags Metric Ref Use Iface
192.168.1.0 0.0.0.0 255.255.255.0 U 0 0 0 eth1
192.168.2.0 0.0.0.0 255.255.255.0 U 0 0 0 eth2.2
192.168.4.0 192.168.2.101 255.255.255.0 UG 11 0 0 eth2.2
Completed OK
R L 1000G W# p i n g 192.168.4.101
PING 192.168.4.101 (192.168.4.101): 56 data bytes
64 bytes from 192.168.4.101: seq=0 ttl=64 time=1.509 ms
64 bytes from 192.168.4.101: seq=1 ttl=64 time=1.227 ms
64 bytes from 192.168.4.101: seq=2 ttl=64 time=1.231 ms
TECH SUPPORT: 1.888.678.9427
INS_RL1000GW_REV– 15 Jul 2016 PAGE 82
INSTALLATION AND OPERATION MANUAL RL1000GW
Serial Ports and Services
The serial interfaces connect legacy serial-based industrial devices to an Ethernet network. Each
of the serial ports can be configured to work in one of these modes of operation:
1. Transparent tunneling
2. Terminal Server
3. Protocol Gateway.
Serial interfaces
Two serial interfaces are available at the RL1000GW.
Services configuration structure
Below table group the relevant configuration areas which should be included per application type
Hierarchy LevelTransparent TunnelingTerminal Server101/104 Gatew ay
Router IP InterfaceXXX
Serial PortXXX
Serial Local end pointXXX
Serial Remote end pointrequired if service is remote
iec101-gwX
termserverX
Below table details the state required for main configuration parameters depending on the used
application.
Hierarchy level
Serial Portmode-of-operationtransparenttransparenttransparent
Serial Local end pointapplicationSerial-tunnelTerminal-serveriec101-gw
SerialAccess serial configuration hierarchy. Configuration for ports, local-end-point, and remote-
end-point are available here.
Service showProvides configuration state of a serial service
local-end-point filter showProvides detailed configuration state of an iec101 serial tunneling service
cardAuto-recover: allows automatic recovery when identifying continuous loss of serial
infrastructure keep alive (between the serial processor and the Ethernet processor).
Enable: auto recovery will reboot the process.
Disable: no action taken.
Show : show state
Show : display the version and the provision state of the serial processor
port slot 1 por t <>Create/update the serial port
Clear countersClear counters
TECH SUPPORT: 1.888.678.9427
INS_RL1000GW_REV– 15 Jul 2016 PAGE 85
INSTALLATION AND OPERATION MANUAL RL1000GW
CommandDescription
Create | updateSlot : 1 (constant)
Port : por t number .1-2
Baud rate :
50,75,100,110,134,150,200,300,600,1200,2400,4800,9600,19200,38400,57600,115200,230400,4
60800,921600
Parity : no, odd, even
Stopbits : 1,2
admin-status: up| done. Default= up.
Mode of operation:
transparent
bus-idle-time : number of total serial bits received over the local serial link to be considered as
a single message
allowed-latency: given in msec this value describe the network allowed latency. This value
affects the time to be allowed to delay before transmitting UDP|TCP packets. The higher the
value is the more serial frames can accumulate into a single UDP|TCP packets. Default value
is 10msec which corresponds to max 3 bytes of serial data to be packed at a single UDP|TCP
packet (with 9.6kbps rate)
Remove Slot : 1 (constant)
Port : por t number .1-2
Show
Local-end-point
Create Slot : 1 (constant)
Port : por t number .1-2
Service id: numeric value of serial service.
Position:
Master – point to multipoint
Slave – point to multipoint
Application :
Serial-tunnel (default)
Terminal-server
iec101-gw
modbus-gw
buffer mode:
byte (default)
frame
protocol :
any (default)
modbus_rtu
ie c101
iec101-link-address: set the IEC 101 link address. Applicable when ‘application’=’ iec101-gw’
and ‘protocol’=’ iec101’. <0-65535>
iec101-link-address-len: set the IEC 101 link address length. Applicable when ‘application’=’
iec101-gw’ and ‘protocol’=’ iec101’. <1|2> bytes. Default is 2.
iec101-originator-address: set if the ‘originator’ i=field is included in the IEC 101 message. This
will reflect on the Cause Of Transmission being 1 byte or 2 byte size. If ‘present’, COT=2. If
‘none’, COT=1.
unit-id: set the IEC 101 unit ASDU address. Applicable when ‘application’=’ iec101-gw’ and
‘protocol’=’ iec101’. <0-65535>
unit-id-len: set the IEC 101 ASDU length. Applicable when ‘application’=’ iec101-gw’ and
‘protocol’=’ iec101’. <1|2> bytes. Default is 2.
TECH SUPPORT: 1.888.678.9427
INS_RL1000GW_REV– 15 Jul 2016 PAGE 86
INSTALLATION AND OPERATION MANUAL RL1000GW
CommandDescription
Remove Slot : 1 (constant)
Port : por t number .1-2
Service id: numeric value of serial service.
Position:
Master – point to multipoint
Slave – point to multipoint
Application :
Serial-tunnel (default)
Terminal-server
iec101-gw
modbus-gw
show
tunnel settingsupdate low-border-ip-port: define here the range of port number used for tcp/udp connection.
The set number will define the low border range value ‘x’ and result in a permissible range of x
to x+100.
The actual port number which will be used is dependent on the ‘service-id’ value as such:
[‘service-id’+ ‘low-border-ip-port’].
Default value is 9849 which results in port number 9850 for service-id=1.
Changing the default 9849 is permitted to a value higher than 1024.
Remote-end-pointDefines the remote end points in a transparent serial tunneling service.
Create remote-address : IPv4 address A.B.C.D
Service id: numeric value of serial service. <1-100.
Position:
Master
Slave
connection mode:
udp – default
tcp
Buffer mode:
byte – default
frame
Remove address : IPv4 address A.B.C.D
Service id: numeric value of serial service.
show
TECH SUPPORT: 1.888.678.9427
INS_RL1000GW_REV– 15 Jul 2016 PAGE 87
INSTALLATION AND OPERATION MANUAL RL1000GW
Declaration of ports
Example of serial port declaration:
+ root
serial
Port create port 1
Port create port 2
..
Co mm it
Default State
The default state of the serial ports is non-configured.
RS- 232 Port Pin Assignment
Below is the pin assignment of the serial ports.
ComNet RJ45 Female Port
linepin
DCD2
TX6
RX5
DSR1
GND4
DTR3
CTS7
RTS8
NOTE: The serial control lines are not supported at current version
TECH SUPPORT: 1.888.678.9427
INS_RL1000GW_REV– 15 Jul 2016 PAGE 88
INSTALLATION AND OPERATION MANUAL RL1000GW
RS-232 Serial cable
The RS-232 ports are of RJ-45 type, a cable is available as ordering option having one end of male
RJ-45 and second end of female DB-9.
The cable should be used when no control lines are needed.
Serial port at the router DB-9 female connector for end device
Pinout for crossed cable (“CBL-RJ45/DB9/NULL”):
RJ45 MaleDB9 Female
Female DB-9 (DCE)Male RJ-45 Female RJ-45
266 Tx
355 Tx
544 GND
CAUTION: Take notice not to use the console cable for the user serial ports.
The console cable is uniquely colored white. “CBL-TJ45-DB9/S-RPT”
TECH SUPPORT: 1.888.678.9427
INS_RL1000GW_REV– 15 Jul 2016 PAGE 89
INSTALLATION AND OPERATION MANUAL RL1000GW
RS-485 Port Pin Assignment
The RS-485 ports are of RJ-45 type.
The RS-485 supported mode is 4 wires.
RJ45 Female Router portDirection
1B (+)Rx
4GND
5A (-)Rx
6B (+)Tx
8A (-)Tx
LED States
Each serial port has a led to indicate its state.
Port createdport admin stateTraf f ic passingLED
No (default)N/AN/AOFF
yesdownN/AOFF
yesUp (default)NoGreen
yesUp (default)yesGreen blinking
TECH SUPPORT: 1.888.678.9427
INS_RL1000GW_REV– 15 Jul 2016 PAGE 90
INSTALLATION AND OPERATION MANUAL RL1000GW
Transparent Serial Tunneling
In transparent tunneling mode the router encapsulates the serial frames into UDP|TCP packets.
The UDP|TCP packet is sourced with a local IP interface. Topologies supported are P2P, P2MP and
MP2MP over a single unit or IP network.
The condition for transparent serial tunneling is having a ComNet router/ router at both ends of
the network, connecting the devices.
The transparent tunneling implementation is based on encapsulation of standard serial frames is
supported. The serial frames are structured with start, stop, data, and parity bits.
Following chapter will explain key serial properties and modes of operation.
Concept of Operation
The benefit of transparent serial tunneling is its simplicity.
Serial traffic received from the customer serial device at the router serial port, is encapsulated as
UDP or TCP Ethernet packets by the router.
An IP interface is configured to route the packets over the Ethernet network. The Ethernet cloud
may be layer 2 based, or layer 3 routing based and may involve any type of networking including
cellular connectivity and VPN between the routers.
The serial devices must all be connected to ComNet routers.
The router serial port is configurable with a full set of serial properties.
Each serial port is assigned to a service-id. The service-id groups serial devices in the network to a
logic communication segment at which members can communicate with each other.
At each service-id group there must be at least one device which is set a master and at least one
device set as a slave.
The communication rules, which are maintained between service-id group members, are as
follows:
1. Traffic sent from a master will be received at all slaves.
2. Traffic sent from a slave will be received at all masters.
3. Traffic between masters is blocked
4. Traffic between slaves is blocked.
TECH SUPPORT: 1.888.678.9427
INS_RL1000GW_REV– 15 Jul 2016 PAGE 91
INSTALLATION AND OPERATION MANUAL RL1000GW
Supported Network topologies
Transparent serial tunneling supports following topologies:
» Point to point
» Point to multipoint point
» Multi Point to multipoint point
Point to Point
Below picture illustrates Point-to-point service at which the master and slave are connected locally
at the same router.
Figure 3: P2P, local service
Below picture illustrates Point to point service at which the master and slave are behind different
routers.
Figure 4: P2P, remote service
TECH SUPPORT: 1.888.678.9427
INS_RL1000GW_REV– 15 Jul 2016 PAGE 92
INSTALLATION AND OPERATION MANUAL RL1000GW
Point to multipoint point
Below picture illustrates Point-to-multipoint service at which the master and slaves are connected
locally at the same router.
Figure 5: P2MP, local service
Below picture illustrates Point-to-multipoint service at which the service members are spread.
TECH SUPPORT: 1.888.678.9427
Figure 6: P2MP, remote service
INS_RL1000GW_REV– 15 Jul 2016 PAGE 93
INSTALLATION AND OPERATION MANUAL RL1000GW
Multi Point to multipoint point
Below picture illustrates a typical multipoint-to-multipoint service.
Figure 7: MP2MP, mixed service
Modes of Operation
Port Mode Of Operation
The port mode-of-operation is set at the serial port configuration level and defines how serial data
is collected.
Transparent Tunneling
Transparent-tunneling is a mode at which serial data is sent with a distinct start bit, stop bit and a
known length of data bits.
At this mode, the serial processor will collect data received until one of the following conditions is
met:
» Bus idle time has expired.
» Allowed latency has expired.
At such time, the serial data collected will be encapsulated to a UDP|TCP packet and transmitted.
TECH SUPPORT: 1.888.678.9427
INS_RL1000GW_REV– 15 Jul 2016 PAGE 94
INSTALLATION AND OPERATION MANUAL RL1000GW
Service Buffer Mode
The service buffer-mode is set at local-end-point configuration level and defines the buffer
operational mode for the service-id.
The default state is ‘byte’ mode. If the user keeps this field with its default state but configures the
service ‘connection-mode’ to ‘tcp’, the buffer mode will be changed to ‘frame’ automatically. If the
user explicitly set the buffer mode to either ‘byte’ or ‘frame’, the configuration will take effect for
any connection-mode setting (tcp|udp).
Byte mode
A byte is structured as [start-bit, data-bits, parity-bit, stop-bits] whereas the number of data-bits
may be 5 to 8.
At this mode, the serial-processor collects bytes and encapsulates the data at a UDP|TCP Ethernet
frame.
The number of bytes collected to a single Ethernet packet is determined by the following factors:
» Allowed latency.
» Bus idle time.
Frame mode
A frame is a group of bytes sent by the customer equipment (CE) as complete message.
When using frame mode, the serial-processor will use the bus-idle-time to distinguish between
frames. Each frame will be encapsulated as an individual UDP|TCP packet.
Service Connection Mode
The service connection-mode is set at remote-end-point configuration level and defines the
protocol option to be used for the service-id.
UDP
Serial data will be encapsulated as UDP/IP frames.
This is the default option for a serial service.
UDP connection mode will use by default, byte mode for the service ‘buffer-mode’. That is unless
‘buffer-mode’ was explicitly set to ‘frame’ by the user.
TCP
Serial data will be encapsulated as TCP/IP frames.
TECH SUPPORT: 1.888.678.9427
INS_RL1000GW_REV– 15 Jul 2016 PAGE 95
INSTALLATION AND OPERATION MANUAL RL1000GW
This mode allows higher availability for the end to end connection and traffic validation.
TCP connection mode will use by default, frame mode for the service ‘buffer-mode’. That is unless
‘buffer-mode’ was explicitly set to ‘byte’ by the user.
Service Port number
the TCP/UDP port number used at a serial tunneling connection is defined by the values of
‘service-id’ and the ‘low-border-ip-port’ set at the ‘serial’ ‘settings’.
Reference drawing
For ease of explanation of following terms and serial properties at this chapter, below diagram will
be used as a reference to follow on the serial traffic flow.
The diagram demonstrates two RL1000GW routers connected over an Ethernet network and
sharing a transparent serial tunneling service.
The customer equipment #1 (CE1) is a serial master sending data to a serial slave CE2. For
simplicity purposes, the diagram and explanations refer to unidirectional traffic from CE1 to CE2.
TECH SUPPORT: 1.888.678.9427
INS_RL1000GW_REV– 15 Jul 2016 PAGE 96
INSTALLATION AND OPERATION MANUAL RL1000GW
Serial Traffic Direction
Transmit direction represents the serial-processor traffic towards the CE, over the serial port.
Receive direction represents the traffic received at the serial-processor from the CE, over the serial
port.
Serial ports counters
The Tx and Rx counters of the serial ports are controlled by the serial-processor.
Rx counters
» Switch1 – counters will increase when CE1 transmits. Data is received at the serial-processor via
S1 and updates the counters.
» Switch2 – counters are not updated.
Tx counters
» Switch1 – counters are not updated.
» Switch2 –CE1 Data is received over the Ethernet network to router 2 and to the serial-
processor. The serial processor transmits the data to CE2 over S1 and increases the Tx
counters.
Allowed latency
Allowed latency is the maximum time allowed for the serial-processor to collect serial data from
CE1 transmission, before closing an Ethernet packet and send it over the cloud.
This parameter refers to round-trip in milliseconds units. It reflects only the time for the serial
processor to collect data, it does not consider the network self-latency.
Allowed latency is applicable in byte mode only.
» Switch1 – as CE1 transmits data to serial processor over S1, the allowed-latency properties are
applicable. For a configured value x at allowed-latency, the serial processor will collect serial
data for up to x/2 milliseconds time and then close the collected data as an Ethernet packet.
» Switch2- as CE2 is only receiving, the allowed-latency is not of influence.
TECH SUPPORT: 1.888.678.9427
INS_RL1000GW_REV– 15 Jul 2016 PAGE 97
INSTALLATION AND OPERATION MANUAL RL1000GW
Tx Delay
Tx-delay is set in bits. It determines a delay to take place by the serial processor before
transmitting serial data to the port.
Depending on the baudrate chosen, and the number of bits, a time is calculated for Tx-delay.
» Switch1 – as the serial processor only receives serial data, the tx-delay is of no affect.
» Switch2- the Ethernet encapsulated data is received at router 2 and to its serial-processor. It is
then transmitted to CE2 via S1 following a time elapse of the tx-delay.
The serial-processor will delay transmitting the first serial byte to CE2. Following data bytes are
sent without delay.
Bus Idle Time
This parameter determines a silence on the serial line to identify frame end.
The configurable value for it is given in number of bits. Depending on the baudrate chosen, and
the number of bits, a time is calculated for bus-idle-time.
Byte mode
When using byte mode, end of byte is determined by stop bits. Bus-idle-time is not applicable at
this mode.
Frame mode
» Switch1- the serial-processor will collect serial data transmitted from CE1 until a silence is
identified on the line for a time period equal or above the bus-idle-time.
» Switch2- the serial-processor transmits the serial frames to CE2 while maintaining a gap
between frames. The gap is the bus-idle-time.
Example 1
Below network demonstrates a P2P topology of transparent serial tunneling between two
RL1000GW routers.