APPENDIX F– Obtaining Provisioned Cell Service (Verizon)................................................... 129
APPENDIX G – Device Manager.............................................................................................. 130
11.1 Web Browser Connection ........................................................................................................ 130
APPENDIX H – Licenses .......................................................................................................... 132
Copyright and Trademark
This manual and all software described herein is protected by Copyright: 2013 GE MDS, LLC. All
rights reserved. GE MDS, LLC reserves its right to correct any errors and omissions in this publication.
iiMDS Orbit MCR Technical ManualMDS 05-6628A01, Rev. C
Page 5
RF Safety Notice (English and French)
RF Exposure
l'exposition aux RF
Concentrated energy from a directional antenna may pose a health hazard to
humans. Do not allow people to come closer to the antenna than the distances
listed in the table below when the transmitter is operating. More information on
RF exposure can be found online at the following website:
www.fcc.gov/oet/info/documents/bulletins.
Concentré d'énergie à partir d'une antenne directionnelle peut poser un risque
pour la santé humaine. Ne pas permettre aux gens de se rapprocher de l'antenne
que les distances indiquées dans le tableau ci-dessous lorsque l'émetteur est en
marche. Plus d'informations sur l'exposition aux RF peut être trouvé en ligne à
l'adresse suivante: www.fcc.gov / oet / info / documents et bulletins.
Antennas must not be co-located. All transmission antennas must be at least 20 cm apart to comply
with FCC co-location rules.
Orbit Device vs. Minimum RF Safety Distance
Radio Module Type
MCR-4G20 cm
MCR-90023 cm
Other modelsConsult factory prior to operation.
Minimum Safety Distance
from Antenna
FCC Part 15 Notice
Operation is subject to the following two conditions: (1) this device may not cause harmful interference, and (2) this device must accept any interference received, including interference that may
cause undesired operation. Any unauthorized modification or changes to this device without the
express approval of the manufacturer may void the user’s authority to operate this device. Furthermore, this device is intended to be used only when installed in accordance with the instructions outlined in this manual. Failure to comply with these instructions may void the user’s authority to
operate this device.
Industry Canada Notice
This Class A digital apparatus complies with Canadian ICES-003.
Cet appareil numérique de la classe A est conforme à la norme NMB-003 du Canada.
Operational Safety Notices
The MDS Orbit MCR-4G may not be used in an environment where radio frequency equipment is
prohibited or restricted in its use. This typically includes aircrafts, airports, hospitals, and other sensitive electronic areas.
Do not operate RF devices in an environment that may be susceptible to radio interference
resulting in danger, specifically:
• Areas where prohibited by law
Follow any special rules and regulations and obey all signs and notices. Do not use the MCR-4G
when you suspect that it may cause interference or danger.
• Near Medical and life support equipment
Do not use the MCR-4G in any area where medical equipment, or life support equipment may be
located, or near any equipment that may be susceptible to any form of radio interference.
Cellular Operational Bands
The following table shows the bands in which the cellular module operates for each wireless technology.
FCC IDs of Installed Transmitters
As of the printing date, the following identifiers are assigned to the modules listed below. For the
latest, official listings of all agency approvals, please contact your factory representative.
CELL Modem FCC ID: PKRNVWE362, IC ID: 3229B:E362
WIFI Module FCC ID: M4Y-ZCN722MV1, IC ID 3195A-ZCN722MV1
CE Mark and RTTE Notice
This product, using the "WIFI internal radio module" only, is CE marked and compliant with the
RTTE directive. Other configurations will be added for EU use in future releases.
ivMDS Orbit MCR Technical ManualMDS 05-6628A01, Rev. C
Page 7
Servicing Precautions
No user-serviceable parts are contained inside this equipment. Opening of the unit by unauthorized
personnel voids the warranty. All servicing must be performed by an authorized repair facility.
When servicing energized equipment, be sure to wear appropriate Personal Protective Equipment
(PPE). During internal service, situations could arise where objects accidentally contact or short
circuit components and the appropriate PPE would alleviate or decrease the severity of potential
injury. When servicing equipment, all workplace regulations and other applicable standards for
live electrical work should be followed to ensure personal safety.
Manual Revision and Accuracy
This manual was prepared to cover a specific version of firmware code. Accordingly, some screens
and features may differ from the actual unit you are working with. While every reasonable effort
has been made to ensure the accuracy of this publication, product improvements may also result in
minor differences between the manual and the product shipped to you. If you have additional questions or need an exact specification for a product, please contact GE MDS using the information at
the back of this guide. In addition, manual updates can be found on our web site at
www.gemds.com
Environmental Information
The manufacture of this equipment has required the extraction and use of natural resources.
Improper disposal may contaminate the environment and present a health risk due to hazardous
substances contained within. To avoid dissemination of these substances into our environment, and
to limit the demand on natural resources, we encourage you to use the appropriate recycling systems for disposal. These systems will reuse or recycle most of the materials found in this equipment
in a sound way. Please contact GE MDS or your supplier for more information on the proper disposal of this equipment.
Battery Disposal—This product may contain a battery. Batteries must be disposed of properly, and
may not be disposed of as unsorted municipal waste in the European Union. See the product documentation for specific battery information. Batteries are marked with a symbol, which may
include lettering to indicate cadmium (Cd), lead (Pb), or mercury (Hg). For proper recycling return
the battery to your supplier or to a designated collection point. For more information see:
www.weeerohsinfo.com.
Product Test Data Sheets
Test Data Sheets showing the original factory test results for this unit are available upon request
from the GE MDS Quality Leader. Contact the factory using the information at the back of this
manual. Serial numbers must be provided for each product where a Test Data Sheet is required.
This product is approved for use in Class 1, Division 2, Groups A, B, C & D Hazardous Locations.
Such locations are defined in Article 500 of the National Fire Protection Association (NFPA) publication NFPA 70, otherwise known as the National Electrical Code. The transceiver has been recognized for use in these hazardous locations by the Canadian Standards Association (CSA) which
also issues the US mark of approval (CSA/US). The CSA Certification is in accordance with CSA
STD C22.2 No. 213-M1987.
CSA Conditions of Approval: The transceiver is not acceptable as a stand-alone unit for use in the
hazardous locations described above. It must either be mounted within another piece of equipment
which is certified for hazardous locations, or installed within guidelines, or conditions of approval,
as set forth by the approving agencies. These conditions of approval are as follows: The transceiver
must be mounted within a separate enclosure which is suitable for the intended application.The
antenna feedline, DC power cable and interface cable must be routed through conduit in accordance with the National Electrical Code. Installation, operation and maintenance of the transceiver
should be in accordance with the transceiver's installation manual, and the National Electrical
Code. Tampering or replacement with non-factory components may adversely affect the safe use of the transceiver in hazardous locations, and may void the approval. A power connector
with screw-type retaining screws as supplied by GE MDS must be used.
Do not disconnect equipment unless power has been switched off or the area is known to
be non-hazardous. Refer to Articles 500 through 502 of the National Electrical Code
(NFPA 70) for further information on hazardous locations and approved Division 2 wiring
methods.
viMDS Orbit MCR Technical ManualMDS 05-6628A01, Rev. C
Page 9
1.0 INTRODUCTION
The MCR-4G Setup Guide, Part no. 05-6702A01,
contains installation instructions, as well as basic
startup information for this product.
All GE MDS user manuals and updates are available
online at www.gemds.com.
This manual describes the MDS Orbit MCR-4G Managed Connected Router (Figure 1). The unit is a highly
secure, industrial grade, wireless communication product for broad-based applications including control
center monitoring, well site pad operations, and video surveillance. It serves the need for localized WiFi
communications with a cellular back-up or backhaul option, while providing the extended temperature
range and industrial-grade packaging inherent to GE MDS products. These features allow the best use of
communication options at each installation site.
Figure 1. MCR-4G Unit
(Standard 2E1S configuration shown)
With a common hardware architecture and user interface, the MCR offers flexibility in network design and
application, with simplified training, maintenance, and deployment costs. GE MDS provides an array of
communication products with multiple interface options and a variety of enclosures to give customers the
choice and flexibility to design their communications network to meet geographic and industry specific
challenges. Information on other GE MDS products can be found by visiting our website at
www.gemds.com.
1.1About This Manual
This manual is intended for systems engineers, network administrators, and others responsible for planning,
commissioning, using, and troubleshooting the wireless system. Installation steps are not included in this
publication. For installation instructions, refer to the companion MCR-4G Setup Guide, part no.
05-6702A01. Electronic copies of all user documentation are available free of charge at www.gemds.com.
1.1.1 Software Command Notations
The product is designed for software control via a connected PC. As such, there are no external controls or
adjustments present. To show the names of software commands, keyboard entries, or other information displayed on a PC screen, a bolded font is used throughout the manual. In the case of tabular data displayed on
a PC screen, a variation on this font is used to maintain proper layout. (See examples that follow.)
Bolded font example (used in text for software commands and keyboard entries)
Bolded font example (used to show tables displayed on a PC screen)
In the Device Management section of this manual (Section 3.0), there are a number of command strings
where information is presented by the unit, and a reply is required from the user. In such cases, information
from the unit is shown in a non-bolded font, and the user response is shown in bold. For example:
(none) login: admin
Further, in some cases, command lines will be shown with non-bolded, italicized text contained within the
string. Such text indicates the need for user-supplied variable parameters, such as the name of an item. For
example:
set interfaces interface myBridge virtual-type bridge
In the above example, you would enter the specific name of your bridge to complete the entry.
NOTE: The software commands and responses shown in this manual were obtained from a unit operating
in a lab environment. The information displayed may differ from field service conditions.
2MDS Orbit MCR Technical ManualMDS 05-6628A01, Rev. C
Page 11
2.0 PRODUCT DESCRIPTION
The MCR-4G is a rugged networking router providing comprehensive solutions for IP/Ethernet, serial, and
machine-to-machine wireless communication. This industrial package provides integrated 4G LTE wireless
technology and connectivity for Ethernet and serial devices requiring secure operation.
2.1Key Features
MCR units include the following key features:
• Security—The unit uses industry-leading security features to protect data while maintaining com-
patibility with deployed infrastructures. Features include AAA user access with passwords and lockout protection, VPNs, signed firmware, secure booting, integrity management, and more.
NOTE: The Orbit MCR device is designed for high security environments. As such, management of the
device does not support Telnet, but instead implements the more secure SSH protocol.
• Small Form Factor—The unit is housed in a rugged enclosure suited for operation in harsh indus-
trial environments. It requires only protection from direct exposure to the weather, and may be easily
mounted inside a NEMA enclosure for outdoor applications when required.
• Network Interfaces—Several network interfaces are present to provide connectivity for a variety
of equipment and applications. Ethernet, serial, and WiFi interfaces provide local connections while
a cellular interface provides access to public carrier networks.
• User Interface—Multiple user interfaces are provided for configuration and monitoring of the unit.
These include local serial console, web, SSH, USB, and NETCONF.
NOTE: When the unit is installed in hazardous locations, use only the serial or Ethernet connections on
the unit’s front panel. Do not use the USB port in hazardous locations.
• NETCONF—A next-generation management protocol is used that provides an array of features for
device configuration and monitoring.
• Network Management System—The PulseNET Network Management System allows administer-
ing and monitoring the operation of small-to-large scale deployments.
2.2Interface Types
MCR units are offered in two external interface offerings; 2 Ethernet/1 Serial (2E1S), or 2 Serial/1 Ethernet
(2S1E). The 2E1S configuration (Figure 1) is the standard model and is the focus of this manual. Most information applies equally to both configurations, however.
2.3Typical Application
The unit provides flexibility in network communications and may be used in a wide variety of applications.
In a common scenario, it provides cellular connectivity to locally-connected devices that are located on a
local/internal/private LAN or WiFi network. The unit acts as an Access Point on the WiFi interface to provide connectivity to WiFi clients. Figure 2 shows an example network in whic h the unit provides connectivity to multiple end devices. The end devices are connected via Ethernet, serial, and WiFi links.
Figure 3 shows the unit’s front panel connectors and indicators. These items are referenced in the
text that follows. The unit’s LED Indicator Panel is described in Table 4 on Page 9.
Figure 3. Connectors and Indicators
(2E1S configuration shown)
4MDS Orbit MCR Technical ManualMDS 05-6628A01, Rev. C
Page 13
PWR—Two-conductor DC input connection. The unit includes a 6-foot (1. 83 meter) power cable suitable
Lead
Screws (2)
Binding
Wire Ports (2)
(Polarity: Left +, Right –)
Retaining
Screws (2)
for indoor or outdoor use when properly connected. The DC power connector (Figure 4) is keyed, and can
only be inserted one way.
Invisible place holder
Figure 4. DC Power Connector (P/N 73-1194A39)
NOTE: The unit is designed for use in negative ground DC power systems only.
Input voltage to the unit must be well filtered, and within the range of 10-60 Vdc. The maximum rated power
consumption of the device is 15 watts, but actual power may be much less, depending on configuration. The
power supply must be capable of supplying the expected maximum power for the installation. For expected
power requirements in common configurations, see “Technical Specifications” on Page 86.
ETH1 / ETH2— Ethernet connection port. These ports support both device management and payload data
transport. Depending on product version, the unit may have one or two Ethernet ports. This is a standard
RJ-45 jack, and features MDIX auto-sensing capability, allowing straight-through or crossover cables to be
used.
Connecting to the unit via SSH supports device management and provides the same user interface available
using the unit’s
COM1 serial port. Various options are available for passing Ethernet data, allowing system
administrators to optimize the configuration for maximum efficiency, based on the system’s operating characteristics.
USB Port—This port allows for connection of a laptop or PC. The port provides a local console for management of the device. A standard host-to-mini device USB 2.0 cable may be used.
COM Port—This
connector serves as the serial interface port for both console management and payload
data. By default, the port is enabled for local console control. The COM port serves as the primary interface
for connecting the unit to an external DTE serial device supporting RS-232 or RS-485. If necessary, an
adapter may be used to convert the unit’s RJ-45 serial jack to a DB-9F type (GE MDS 73-2434A12).
NOTE: Not all PCs include a serial port. If one is not available, the unit’s USB port may be used to access
the device management interface. Alternatively, a PC’s USB port may be used with a
USB-to-Serial adapter and appropriate driver software. These devices are available from several
manufacturers.
The COM port supports a serial data rate of 1200-115200 bps (115200 default, asynchronous only). The unit
is hardwired as a DCE device. Supported data formats for the COM port are:
8N1 - 8 char bits, no parity, 1 stop bit (Default setting)
8N2 - 8 char bits, no parity, 2 stop bits
8O1 - 8 char bits, odd parity, 1 stop bit
8O2 - 8 char bits, odd parity, 2 stop bits
8E1 - 8 char bits, even parity, 1 stop bit
8E2 - 8 char bits, even parity, 2 stop bits
7N1 - 7 char bits, no parity, 1 stop bit
7N2 - 7 char bits, no parity, 2 stop bits
7O1 - 7 char bits, odd parity, 1 stop bit
7O2 - 7 char bits, odd parity, 2 stop bits
7E1 - 7 char bits, even parity, 1 stop bit
7E2 - 7 char bits, even parity, 2 stop bits.
The tables below provide pin descriptions for the COM1 data port in RS-232 mode and RS-485 modes,
respectively.
NOTE: The COM2 port, if present, is restricted to RS-232 mode; it cannot be used for RS-485.
(As viewed from the outside of the unit)
Table 2. COM1/2 Port Pin Details (RS-232)
Pin
Number
1Reserved
2
3Reserved
4GroundConnects to ground (negative supply potential) on chassis
Input/OutputPin Description
OUTDCD (Data Carrier Detect)
6MDS Orbit MCR Technical ManualMDS 05-6628A01, Rev. C
Page 15
Table 2. COM1/2 Port Pin Details (RS-232) (Continued)
Pin
Number
5
6
7
8
Input/OutputPin Description
OUTRXD (Received Data)—Supplies received data to the connected device
INTXD (Transmitted Data)—Accepts TX data from the connected device
OUTCTS (Clear to Send)
INRTS (Ready to Send)
Table 3. COM1 Port Pin Details (RS-485)
Pin
Number
1Reserved
2
3Reserved
4GroundConnects to ground (negative supply potential) on chassis
5OUTTXD+ (Transmitted Data +)—Non-inverting driver output. Su pplies
6INRXD+ (Received Data +)— Non-inverting receiver input. Accepts
Input/OutputPin Description
OUTDCD (Data Carrier Detect)
received payload data to the connected device.
payload data from the connected device.
7OUTTXD-/TXB (Transmitted Data -)—Inverting driver output
8INRXD-/RXB (Received Data -)— Inverting receiver input
COM1 Port notes and wiring arrangements (RS-485):
The COM1 port supports 4-wire and 2-wire RS-485 mode.
·RXD+ / RXB and RXD– / RXA are data sent into the unit
·RXD+ / RXB is positive with respect to RXD– / RXA when the line input is a “0”
·TXD+ / TXB and TXD– / TXA are data sent out by the unit
·TXD+ / TXB is positive with respect to the TXD– / TXA when the line output is a “0”
Cell Antennas (AUX and MAIN)—These SMA coaxial connectors are for attachment of cellular antennas.
The MAIN connection is for basic cellular transmission/reception, and the AUX connector is for attachment
of a receive-only antenna which provides MIMO receive operation (diversity) with standard 4G modules,
improving signal quality in many installations. In general, both antennas should always be used for cellular
operation. The GE MDS part number for this antenna type is 97-2485A04.
WiFi Antenna—Antenna connection for 2.4 GHz WiFi service. The connector appears similar to the cellular connectors discussed above, but is a Reverse-SMA type. It contains a pin that matches with an SMA-F
connector. The GE MDS part number for this antenna is 97-4278A48.
SIM Port—This port accepts a mini SIM card (2FF type) for 4G cell operation. The unit’s cellular interface
will not function without a valid SIM card installed. The customer is responsible for obtaining a provisioned
SIM card for the appropriate service plan from their cellular provider.
module’s IMSI/IMEI (typically required for provisioning) is provided on Page 35 of this manual.
CAUTION: Do not insert the SIM card when the unit is powered on.
Card Insertion: The SIM card only inserts one way; do not force it. It should be inserted with the printed
label facing up, and the cut-off corner on the left side (see Figure 6). This side is inserted first. A small
instrument, such as a flathead screwdriver, may be helpful to gently push the SIM all the way in until it
locks.
Information on determining the cell
Invisible place holder
Figure 6. Steps for Inserting the SIM Card
8MDS Orbit MCR Technical ManualMDS 05-6628A01, Rev. C
Page 17
LED Status Indicators—The LEDs on the unit provide visual indications of the status of the device as
shown in Figure 7 and explained in Table 4 which follows.
Figure 7. LED Status Indicators
Table 4. Description of LED Status Indicators
LED NameLED StateDescription
PWR
(DC Power)
ETH
(Ethernet)
COM
(Serial Comm. Port)
NIC1
(Cell)
Off
Solid Green
Fast Blink/Red (1x/sec.)
Off
Solid Green
Blinking Green
Off
Blinking Green
Off
Solid Green
No power to unit
Unit is powered, no problems detected
Alarm indication
No Ethernet link to network
Ethernet link present
Ethernet traffic in/out
No serial connection, or idle
Serial traffic in/out
No cellular connection
Cell Connection
NIC2
(WiFi)
Access Point ModeSolid Green
Station ModeOff
OffInterface disabled
Operating as AP and at least one client connection
Solid Red
Solid Green
Operating as an AP and no client connection
No connection
Wi-Fi connection established.
NOTE: In addition to the LEDs above, the Ethernet connector has two embedded LEDs. A yellow indi-
cates a link at 100 Mbps operation. A flashing green indicates Ethernet data traffic.
2.4.1 Grounding Considerations
To minimize the chance of damage to the unit and its connected equipment, a safety ground (NEC
Class 2 compliant) is recommended, which bonds the chassis, antenna system(s), power supply,
and connected data equipment to a single-point ground, keeping all ground leads as short as possible.
Normally, the unit is adequately grounded if mounted with the flat brackets to a well-grounded
metal surface. If the unit is not mounted to a grounded surface, it is recommended that a safety
ground wire be attached to the screw provided on the bottom corner of the enclosure, in the
recessed flat area. Alternatively, a safety ground wire may be attached to one of the mounting
bracket screws.
The use of a lightning protector is recommended where the antenna cable enters the building; Bond
the protector to the tower ground, if possible. All grounds and cabling must comply with applicable
codes and regulations. One source for lightning protection products may be found online at
http://www.protectiongroup.com/PolyPhaser.
The unit may be mounted with flat mounting brackets or an optional 35 mm DIN rail attachment.
Figure 8 shows the mounting dimensions for a unit equipped with flat mounting brackets.
Invisible place holder
Figure 8. Flat Mounting Bracket Dimensions
NOTE: To prevent moisture from entering the unit, do not mount the case with the cable connectors
pointing up. Also, dress all cables to prevent moisture from running along the cables and into the
unit.
2.4.3 Optional DIN Rail Mounting
If ordered with the DIN rail mounting option, the unit is supplied with a DIN rail clip attached to
the case. The integrated bracket on the unit’s case allows for quick installation and removal from
a DIN mounting rail as shown in Figure 9.
Figure 9. DIN Rail Attachment and Removal
(Pull down tab to release from rail)
10MDS Orbit MCR Technical ManualMDS 05-6628A01, Rev. C
Page 19
2.4.4 Antenna Planning & Installation
Consideration must be taken to select appropriate antennas for optimal RF performance. This section
reviews the key factors involved in selecting and installing antennas for the MCR-4G. Only approved
antennas may be used on the unit's RF output connectors, as listed in Table 5. The use of non-approved
antennas may result in a violation of FCC rules, and subject the user to FCC enforcement action.
Table 5. Approved Antenna Types
Antenna ApplicationGE MDS Part Number
WiFi (direct connect), RP SMA,
2.4-2.5 GHz Antenna, 3.2dBi Gain
WiFi (external mount), Omni Ant. N M
960/2170/2700MHz, requires ground
WiFi (Magnetic Mount) 5 ft./1.52 m Cable,
RP SMA Plug
Antenna Type and Orientation
It is important to use antennas designed to operate in the applicable cellular coverage bands with a Return
Loss of 10 dB or better. Placement of the antennas also plays a key role in the coverage of the system. While
the antennas can be placed directly on the face of the unit in some short range installations, the best performance is obtained when mounting antennas remotely using low loss coaxial cable. Antennas mounted in
close proximity to each other can couple signals between them and desensitize the RF module.
97-4278A34
97-4278A48
97-2485A05
97-4278A78
When placing the indoor SMA style “paddle” antennas on the face of the unit, position them with a 90
degree angle of separation to improve the isolation. A “V” or an “L” configuration is a common approach
to use with the Main channel typically mounted for vertical polarization. The multipath nature of Cellular
systems means that polarization for indoor use is not normally a critical factor. Isolation between the
antennas is more important.
Note that with any installation, there needs to be a minimum 20 cm spacing between the Wi-Fi antenna and
any other radio antenna to avoid co-location difficulties.
Indoor use case:
1. This scenario employs direct mounting of an LTE paddle antenna (GE MDS PN: 97-2485A04) on the
Main and Aux Cell channels, and cabled mounting of the Wi-Fi antenna (GE MDS PN: 97-4278A34)
using a magnetic mount (GE MDS PN: 97-4278A78). This configuration offers easy mobility for
evaluation purposes or indoor applications with good cellular signal coverage (see Figure 10).
Figure 10. Direct Mounting of Cell Antenna; Cabled WiFi Antenna
Minimum 8-inch (20.32 cm) separation between cell and WiFi antennas
2. This arrangement employs cabled mounting of the L TE paddle antennas (GE MDS 97-2485A04) o n the
Main and AUX Cell channels, and cabled mounting of the Wi-Fi antenna (GE MDS 97-4278A34)
using a magnetic mount (GE MDS 97-4278A78). The Wi-Fi antenna may also be directly attached to
the unit if desired. This configuration works well for indoor installations in equipment closets, or for
more permanent applications.
Outdoor use case:
External enclosures—If the system is going to be installed in a weathertight enclosure and mounted outside
in the elements, cabled use of external LTE antennas (GE MDS PN: 97-2485A05) on the Main and AUX
Cell ports, with cabled use of the External Wi-Fi antenna (GE MDS PN: 97-4278A48) is a good solution.
This configuration requires a suitable metallic ground plane for the Cellular antennas (8" diameter disc minimum for the 97-2485A05 series) or a suitable counterpoise for frequencies as low as 698 MHz. Metal
enclosures work well for ground plane requirements when ground contact inside the box is not impeded by
painted surfaces.
Do not use internally mounted antennas inside of metal enclosures.
Other antenna configurations can be easily customized for applications not listed here. Consult your factory
representative for installation matters.
12MDS Orbit MCR Technical ManualMDS 05-6628A01, Rev. C
Page 21
2.4.5 Accessories and Spares
Table 6 lists common accessories and spare items for use with the MCR-4G. GE MDS also offers an Acces-
sories Selection Guide listing an array of additional items that may be used with the product. Contact your
factory representative or visit
ItemDescriptionPart Number
DC Power Plug, 2-pin, polarizedMates with power connector on the
Setup Guide
(for installation instructions)
Flat Mounting Bracket KitBra ckets that attach to the bottom of
COM Port AdapterConverts the unit’s RJ-45 serial jack
www.gemds.com to obtain a copy of the guide.
Table 6. Accessories & Ancillary Items
unit’s case. Screw terminals are
provided for wires, threaded locking
screws to prevent accidental
disconnect.
Describes the installation and setup
of the unit. It is a companion to this
Technical Manual. PDF copy
available free at www.gemds.com.
the unit. Used for mounting to a flat
mounting surface.
This section describes the steps for connecting a PC, logging in, and setting unit parameters. The focus here
is on the local serial console interface, but other methods of connection are available and offer similar capabilities. The key differences are with initial access and appearance of data.
The MCR offers several interfaces to allow device configuration and monitoring of status and performance.
These include local serial console, USB, NETCONF, HTTPS, and Secure Shell (SSH) for local and remote
access via the WAN and LAN networks. The serial console, USB, and SSH services offer a command line
interface (CLI). There are three user accounts/roles for management access:
accounts can be centrally managed with a RADIUS server. RADIUS accounts can be mapped to one of the
three user accounts/roles (see see “RADIUS”on Page 71).
NOTE: The Orbit MCR device is designed for high security environments. As such, management of the
device does not support Telnet, but instead implements the more secure SSH protocol.
Web-Based Device Manager
A web-based user interface is also available fo r this product. The web interface provides an intuitive, graphical facility, well-suited for many simple routine configuration and control tasks. An introduction and
sample screens for the web interface are provided in “APPENDIX G – Device Manager” on Page 129.
3.1Connecting to a PC
3.1.1 Differences Between Serial & SSH
admin, tech, and oper. User
Serial and SSH both present identical management capabilities, but the method of access is different for each. Serial involves an RS-232 serial connection from a PC to the unit’s management
COM port. SSH uses an Ethernet PC connection to the unit’s ETH port. Maximum recommended
cable length for a serial connection is 50 feet (15 meters). SSH can be connected to the unit from
any network point that has connectivity with the PC, including remotely over the Internet, or using
other networks.
The focus of these instructions is on Serial access, but SSH may also be used by following these
additional points, which replace Steps 1-3 below:
• Connect to the unit with a PC that is on the same IP network as the MCR. Launch an SSH
client program, and connect to the unit using its programmed IP address.
• The default IP address for the unit is 192.168.1.1. If you do not know the current IP address
of the unit, follow the serial configuration instructions below, where you can determine the
address and continue configuration, or check with your network administrator.
3.1.2 Establishing Communication—Serial Interface
Follow these steps to configure the unit for its first use with serial console interface:
1. Connect a PC to the unit’s
COM port as shown in Figure 11. (Maximum recommended cable
length: 50 ft./15 m)
NOTE:Not all PCs include a serial port. If one is not available, a USB port may be used, along with a USB-to-Serial
adapter (with appropriate driver software). Adapters are available from many manufacturers, including GE
MDS. The MCR Orbit’s USB port can be used to access the device management console by using a
Mini-USB cable between the device and a PC. The PC needs to register the device driver.
14MDS Orbit MCR Technical ManualMDS 05-6628A01, Rev. C
Page 23
NOTE:If the COM port has been configured for terminal server operation, pressing +++ switches it to console
PC Running Terminal Session
To COM Port
ENTER
ENTER
ENTER
(management) mode. Serial console mode is required for the following steps.
Launch a terminal communications program, such as HyperTerminal with the following communication parameters: 1 15200 bps (default speed), 8 bits, no parity, one stop bit (8N1), and flow control disabled. Incorrect parameter settings are a frequent cause of connection difficulties;
Double check to be sure they are correct.
If necessary, an adapter may be used to convert the unit’s RJ-45 serial jack to a DB-9F type (GE
MDS part no. 73-2434A12). If no serial port exist on the PC, a USB-to-serial adapter cable may be
used to connect to the MCR unit, or a Mini-USB cable may be connected between the MCR’s USB
device port and the PC.
Invisible place holder
Figure 11. PC Connection for Programming/Management
2. Press the key to receive the Login: prompt. This indicates that the unit is ready to receive
commands.
3. At the Login: prompt, enter admin (lower case) and press .
4. If no password has been previously set, enter the default password (admin) and press ;
Otherwise, enter the saved password at the Password: prompt. (Before placing the unit in final
service, it is recommended that the default password be changed to ensure that only authorized
users have access.)
5. After successful login, the command prompt appears where you may configure and manage a
number of unit settings.
3.1.3 Setting Basic Parameters—First Steps
There are three tasks that should be performed after initial startup and connection to a PC, as follows:
1. Create One-Time Programmable passwords for device recovery in the event a password is lost.
2. Change the login passwords.
3. Evaluate the default factory configuration and set it to the user's required security level.
Tab Completion Feature
Tab-completion is a powerful feature that presents CLI users with assistance while typing. Depending on
the text that was already entered, tab-completion will display different possible completions. When the tab
key is pressed and no text has been entered, the CLI shows all possible commands that can be typed.
The MDS Orbit platform employs extensive security measures to prevent unauthorized access. As such,
there are no hidden manufacturer passwords or other “backdoors” found in less secure products. If a password is lost, there is no way to access the unit, except by using a one-time password (OTP) for recovery.
This must be established by the user beforehand. Without a one-time password, the unit will not be accessible, and the hardware will need to be replaced. Not even the factory will be able to assist you if a password
is lost, so creating a one-time password is strongly encouraged.
One-Time Passwords: How They Work
One-time recovery passwords put control directly and exclusively in the user’s hands. They are similar to
spare keys for a lock. If you make a spare key, and put it away safely, you can take it out to quickly gain
entry when your primary key is lost. If you don’t make a spare, you are always at risk of locking yourself out.
A one-time recovery password is different from the one used to log into the unit on a routine basis. It is only
for use when the primary password is lost or forgotten. When a one-time password is used to log in, that
password is automatically revoked from the list of passwords created. (You may create up to five one-time
passwords at one time, and more can be created if some get used). A password cannot be used ag ain for
log-in to the unit (hence the name “one-time” password).
Creating a One-Time Password
To create a one-time recovery password, proceed as follows:
1. Upon successful log-in, enter the following command:
request system recovery one-time-passwords create function <selected function>
A one-time password is automatically generated and displayed on the screen. Copy this password
and save it in the desired location on your PC. There is no way to ever view it again from the
command line console, so be sure it is properly saved.
2. To create additional one-time passwords (up to a total of five), repeat the step above.
Logging in With a One-Time Password
Logging in with a one-time password can only be performed from the local serial or USB cons ole. You
cannot use a one-time password when connecting to the unit remotely. To use the one-time password for
log-in, proceed as follows:
1. At the username prompt, enter the word
2. At the
password prompt, paste in the one-time-password saved earlier on your PC. Using a
recovery.
one-time-password forces the unit to perform the “function” which was previously defined when the
password was created:
factory-reset—The unit resets its entire configuration to factory defaults
•
login—The unit allows logging in with “admin” privileges
•
Special case: If someone has disabled console access on the
COM port, the login prompt will still be present
on that console, but only one-time-passwords will be accepted. This is done to provide a way to recover the
unit in the case where the
COM port has been disabled and the unit cannot be accessed via TCP (for example;
SSH).
Deleting a One-Time Password
As noted earlier, a one-time password is automatically revoked when it is used for log-in. A revoked password may be replaced, but it must first be removed from the list so a new one can be generated. Any of the
five stored passwords may be removed on demand. As long as there is a free slot, an additional password
can be created, up to the maximum number of five. Logs are generated when the user creates, deletes or logs
in with a one-time-password. To remove an existing password from the list, proceed as follows:
16MDS Orbit MCR Technical ManualMDS 05-6628A01, Rev. C
Page 25
Enter the command request system recovery one-time-passwords delete identifier X, where X is a number
from the currently available one-time passwords. This identifier is not reused. If all five passwords have
been created, then ID 1 can be deleted, and the next created password will be at ID 6.
The current list of passwords may be viewed by issuing the command
. The following is an example output from that command. On the unit shown, only two passwords
words
show system recovery one-time-pass-
have been stored. Password 1 or 2 can be deleted from this list.
DATE
IDENTIFIER FUNCTION STATUS DATE CREATED REVOKED USER
The MCR is highly configurable to meet field requirements, but comes pre-configured as follows:
• The COM and USB ports are enabled for local console operation
• The Ethernet ports are bridged with the WiFi AP
• WiFi AP SSID is set based on the unit's serial number, and takes the form of:
GEMDS_<SERNUM>. The unit’s serial number is printed on the chassis sticker.
• WiFi is enabled with passphrase:
• A DHCP server is enabled for WiFi clients and the Ethernet LAN ports
• Cellular service is enabled with firewall/router rules in place.
• The following default configured firewall rules are also in effect:
# Firewall
set services firewall enabled true
set services firewall address-set LOCAL-NETS addresses [ 192.168.1.0/24 ]
set services firewall filter IN_TRUSTED rule 10 match protocol all
set services firewall filter IN_TRUSTED rule 10 actions action accept
set services firewall filter IN_UNTRUSTED rule 1 match protocol icmp
set services firewall filter IN_UNTRUSTED rule 1 actions action accept
set services firewall filter IN_UNTRUSTED rule 2 match protocol udp
set services firewall filter IN_UNTRUSTED rule 2 match src-port services [ dns ]
set services firewall filter IN_UNTRUSTED rule 10 match protocol all
set services firewall filter IN_UNTRUSTED rule 10 actions action drop
set services firewall filter OUT_TRUSTED rule 10 match protocol all
set services firewall filter OUT_TRUSTED rule 10 actions action accept
set services firewall filter OUT_UNTRUSTED rule 1 match src-address address-set LOCAL-NETS
set services firewall filter OUT_UNTRUSTED rule 1 match src-address add-interface-address true
set services firewall filter OUT_UNTRUSTED rule 10 match protocol all
set services firewall filter OUT_UNTRUSTED rule 10 actions action drop
set services firewall nat source rule-set MASQ rule 1 source-nat interface
GEMDS_ORBIT
The commands below show how the default settings are made. The unit must be in Configuration Mode to
make these settings. Each command string begins with the word
1. set interfaces interface Wi-Fi physical-interface Wi-Fi
2. set interfaces interface Wi-Fi wifi-config mode access-point ap-config ap GEMDS_1 broadcast-ssid true
privacy-mode wpa2-personal psk-config psk GEMDS_ORBIT
3. set interfaces interface Cell physical-interface Cell
5. set interfaces interface Cell filter in put IN_UNTRUSTED
6. set interfaces interface Cell filter ou tput OUT_UNTRUSTED
7. set interfaces interface Cell nat source MASQ
8. set services serial console serial-ports [ COM1 USB1 ]
9. set interfaces interface ETH1 ph ysical-interface ETH1
10. set interfaces interface ETH2 physical-interface ETH2
11. set interfaces interface Bridge virtual-type bridge
12. set interfaces interface Bridge filter input IN_TRUSTED
13. set interfaces interface Bridge filter output OUT_TRUSTED
14. set interfaces interface Bridge ipv4 address 192.168.1.1 prefix-length 24
15. set interfaces interface Bridge bridge-settings members port ETH1
16. set interfaces interface Bridge bridge-settings members port ETH2
17. set interfaces interface Bridge bridge-settings members wifi-ap GEMDS_1
18. set services dhcp v4subnet 192.168.1.0/24 range-start 192.168.1.2 range- end 192.168.1.10 broadcast-address 192.168.1.255 router 192.168.1.1
19. set services dhcp enabled true
3.3YANG Interface
The unit employs a data modeling language called YANG to model the configuration and status of the
device. YANG is used in conjunction with the NETCONF protocol to provide a device-specific data model
that can be administered by any NETCONF-capable NMS. The YANG data model is released with each
version of the device so NMS administrators can accurately administer the device per release.
Together, YANG and NETCONF present a structured user interface for the unit. The device data defined
by the YANG data model is either Operational Data or Configuration Data. Configuration Data may be
changed, but Operational Data can only be viewed.
Configuration Data
Configuration Data is any piece of data that can be changed by an administrator and the changes are persistent even if the device reboots. The IP address of the LAN port is an example of Configuration Data.
Operational Data
Operational Data is any piece of data that is volatile and will not be saved if the device is rebooted. Operational data is typically read-only, such as statistics information showing status or a value representing the
operation of the device. Ethernet statistics are an example of operational data.
Default Values
While configuring the unit, some of the configuration data may not need to be explicitly set, but instead the
data assumes the default value defined in the data model. For example, when a File Server configuration is
added and the server type is specified as TFTP, then the remote TFTP port will default to
69 if the user does
not explicitly specify the port. Data nodes that do not have a default value will require entry of a value for
that node during configuration. The command line interface (CLI) prompts for entry of a node value if the
node is mandatory and does not have a default value.
18MDS Orbit MCR Technical ManualMDS 05-6628A01, Rev. C
Page 27
When viewing the configuration, the nodes that have default values and have not been explicitly set by the
user are not displayed. Users can selectively view these defaulted values by using
The
show command can be used to view configuration data. Notice that the information displayed is dif-
details option on the CLI.
ferent, depending on which mode the CLI is in; Operational or Configuration.
Remote Procedure Call (Request)
This is an action that a user requests. Rebooting of the device, for example, is considered a request.
Privilege
A user who logs on to the device will belong to a role-based group. Each group is limited in capability to
view operational data or to change configuration data. Groups with lesser privileges will not be presented
with the option to view or change data on the CLI, which can be done by higher-privileged groups.
Changing Configuration Data and committing changes
Changing configuration data requires two steps. The first step is to use a user-interface to add, remove, or
alter a piece of configuration data. The second step is to use the user-interface to commit the change. Multiple changes can be made prior to committing them. This two-step process allows users to make multiple
changes to the configuration and apply them in a bulk commit. Additionally, the device can validate the bulk
commit and reject it if there is an error.
3.3.1 CLI Login Prompt
The CLI is available via the serial console or an SSH session. Use the default serial console settings shown
in the section titled “Serial Console” on Page 26 to connect a Computer to the unit via a serial cable. Once
the network settings are configured, users can also connect to the device via SSH over the network.
The CLI prompts for a login to the device before any other actions can be made. The defaults for both username and password are
admin. These credentials should be changed before placing the unit in full service.
(none) login: admin
Password: (valid password, default is admin)
Welcome to the CLI
admin connected from 127.0.0.1 using console on (none)
admin@(none) 04:24:12>
Using the CLI
This section describes how to use the CLI by using an example: changing the name of the unit.
Step 1: Login to the device using the serial console and us e the default username admin and the default pass-
admin.
word
(none) login: admin
Password:
Welcome to the CLI
admin connected from 127.0.0.1 using console on (none)
admin@(none) 04:24:12>
Step 2: Instruct the device to enter configuration mode by typing configure and pressing the enter key:
Step 7: Exit the login session by typing the following, followed by the enter key: exit
admin@Device539 05:40:32> exit
Device539 login:
20MDS Orbit MCR Technical ManualMDS 05-6628A01, Rev. C
Page 29
CLI Quick Reference Table
Table 7 provides a summary listing of commonly-needed tasks and the appropriate commands to enter. The
table can be used as a quick reference before consulting the more detailed information which follows in this
section. Each CLI command is proceeded by the symbol
> for operational command, or % for a configura-
tion command.
Table 7. CLI Quick Reference Table
If you wish to...Enter this CLI command:
Create a one-time password> request system recovery one-time-password create function <user
function>
View all network interface
status and statistics
Create a bridge% set interfaces interface myBridge virtual-type bridge
Add the ETH1 interface to a
bridge
Remove the ETH1 interface
from a bridge
Set WiFi AP SSID% set interfaces interface Wi-Fi wifi-config mode access-p oint
Enable WiFi WPA2-Personal
security
Enable WiFi SSID
Broadcasting
View WiFi settings> show configuration interfaces interface Wi-Fi wifi-config | details
Monitor WiFi statistics> show interfaces interface Wi-Fi statistics | repeat 5
View the cell module status> show interfaces interface Cell
View the cell APN> show configuration interfaces interface Cell cell-config apn
View the routing table> show routing
View the event log> show table logging event-log
Set the admin user’s
password
Set the device name% set system name “Mydevice”
Set the baud rate on COM1% set services serial ports COM1 baud-rate b19200
Download a firmware
package from TFTP server at
192.168.1.10
Monitor firmware download
status
Export configuration file to a
TFTP server at 192.168.1.10
Reboot device to firmware
image #2
> show interfaces
% set interfaces interface myBridge bridge-settings members port
ETH1
% delete interfaces interface myBridge bridge-settings members port
ETH1
ap-config ap myssid
% set interfaces interface Wi-Fi wifi-config mode access-p oint
ap-config ap myssid privacy-mode wpa2-personal psk-config psk
mypassphrase encryption ccmp
% set interfaces interface Wi-Fi wifi-config ap-config ap myssid
broadcast-ssid true
> request system authentication change-password user admin
password admin1234
In Figure 12, the MCR-4G is functioning as a WiFi Access Point to provide connectivity between a set of
laptops and a handheld device. The MCR-4G is also acting as a DHCP server for the laptops and handheld
device.
Invisible place holder
Figure 12. Example 1: Unit Providing Laptop and Handheld Device Connectivity
The following commands will configure the MCR-4G for this scenario.
1. % set interfaces inter fa ce Wi-Fi physical-interface Wi-Fi
2. % set interfaces inter fa ce Wi-Fi wifi-config mode access-point ap-config ap myssidenabled true
3. % set interfaces inter fa ce myBridge virtual-type bridge
4. % set interfaces inter fa ce myBridge bridge-settings members port ETH1
5. % set interfaces inter fa ce myBridge bridge-settings members wifi-ap myssid
6. % set interfaces inter fa ce myBridge ipv4 address 192.168.1.21 prefix-length 24
22MDS Orbit MCR Technical ManualMDS 05-6628A01, Rev. C
Page 31
Example #2
In Figure 13, there are two MCR-4G devices, one acting as a WiFi Access Point, the other as a WiFi Station.
Together, the MCR-4G devices are providing a wireless bridge between the laptop and the SCADA device.
Invisible place holder
Figure 13. Example 2: Units Providing Wireless Bridge Between Laptop & SCADA Device
The following commands will configure the MCR-4G #1 for this scenario.
1.% set interfaces interface Wi-Fiphysical-interface Wi-Fi
2.% set interfaces interface Wi-Fi wifi-config mode access-point ap-config ap myssid
3.% set interfaces interface myBridge bridge-settings members port ETH1
4.% set interfaces interface myBridge bridge-settings members wifi-ap myssid
5.% set interfaces interface myBridge ipv4 address 192.168.1.21 prefix-length 24
6.% set services dhcp enabled true v4subnet 192.168.1.0/24 domain-nam e gemds range-start 192.168.1.10
Figure 14 shows the MCR-4G #2 device acting as a terminal server to provide connectivity to the
serial-based SCADA device via UDP.
NOTE:The configuration for MCR-4G #1 in Figure 14is identical to the configuration shown in the previous
example (Example #2).
Invisible place holder
Figure 14. Example 3: Unit Providing Connectivity to Serial-Based SCADA Device via UDP
The following commands will configure the MCR-4G #2 for this scenario.
1. % set interfaces interface Wi-Fi physical-interface Wi-Fi
2. % set interfaces in terface Wi-Fi wifi-config mode station station-config ap myssid enabled true
3. % set interfaces interfacemyBridgevirtual-type bridge
4. % set interfaces in terface myBridge bridge-settings members port ETH1
5. % set interfaces in terface myBridge bridge-settings wifi-station members interface Wi-Fi
6. % set interfaces in terface myBridge ipv4 address 192.168.1.22 prefix-length 24
7. % set services serial terminal-server server COM1 mode udp port 30000 remote address 192.168.1.11 port
30001
24MDS Orbit MCR Technical ManualMDS 05-6628A01, Rev. C
Page 33
Example #4
In Figure 15, the MCR-4G provides internet access for a laptop that is accessing a public web page.
Invisible place holder
Figure 15. Example 4: Unit Providing Internet Access for Laptop
SIM Type: In this scenario, the MCR-4G has a SIM card installed that simply provides Internet access.
The following commands will configure the MCR-4G for this scenario.
1.% set interfaces interfacemyBridgevirtual-type bridge
2.% set interfaces interfacemyBridgebridge-settings members portETH1
3.% set interfaces interfacemyBridgeipv4 address192.168.1.21prefix-length24
4.% set interfaces interface Cell physical-interface Cellenabled true
5.% set services firewall enabled true
6.% set services firewall filter IN_UNTRUSTED
7.% set services firewall filter IN_UNTRUSTED rule 1 match protocol icmp
17. % set services interfaces interface Cell nat source MASQ
3.4Operational Topic Areas
The remaining headings in this section describe key operational features of the MCR unit, and list configurational options for them. Each major heading begins at the top of a new page. For this reason, large areas
of white space exist at the end of some sections. This is done to provide a clear delineation between major
sections.
A serial cable may be used to connect to a COM port on the unit to access the CLI. The default serial console
settings are 115200 bps with 8N1 format. A mini-USB-to-USB cable may also be used to connect to a Computer in case no serial port exists. If a mini-USB connection is used, the computer must contain the appropriate device driver. A driver for serial operation can be found on GE MDS website.
Configuring
This sequence shows how to add console access to the COM1 and COM2 serial ports and set the COM2
baud rate to 19200 bps:
admin@(none) 00:04:43% set services serial console serial-ports [ COM1 COM2 ]
[ok][2012-06-19 00:04:57]
[edit]
admin@(none) 00:04:59% set services serial ports COM2 baud-rate b19200
26MDS Orbit MCR Technical ManualMDS 05-6628A01, Rev. C
Page 35
Network
Understanding
The unit has multiple network interfaces including LAN, Cellular, and WiFi. Each of these has numerous
networking features and each feature is described in a separate section on the following pages:
• Static or dynamic IP addressing (DHCP) for each interface
•Bridging
• Firewall
• Routing
•VPN
Configuring
See each individual section for details about configuring the LAN, Cell, WiFi interfaces, and related networking features.
Monitoring
Ensure the CLI is in operational mode. Follow the example below to view the state and statistics of all the
network interfaces. The result of this command will vary from one configuration to another, so the following
is intended merely to serve as an example:
The unit has external Local Area Network (LAN) ports that can be used to connect to a local LAN. It supports both IPv4 and IPv6 addresses and may be assigned multiple IP addresses. The LAN port can be
assigned static IP addresses or a dynamically allocated address can be assigned using DHCP.
NOTE: The LAN port should be assigned IP addresses only if it is a routed interface (that is, not in a
bridge). Refer to the section on Bridging later in the document.
Virtual Local Area Networks (VLANs) are generic interface types in the MCR-4G, and can be assigned
unique IP addresses. They are treated the same as any other interface type, but they offer a way to link traffic
between interface ports. As such, a VLAN device can be thought of as a “bridging device.”
Setup
To setup a VLAN, you must first create one or more VLAN interfaces. Four sample commands are shown
below for doing this; one with an ID of
% set interfaces interface mgmt_vlan virtual-type vlan
% set interfaces interface mgmt_vlan vlan-config vlan-id 99
% set interfaces interface video_vlan virtual-type vlan
% set interfaces interface video_vlan vlan-config vlan-id 300
Operational Modes
Interfaces can have three separate VLAN modes:
set interface behavior, and examples of their use are provided below.
Trunk: To add ETH1 as a trunk (tagged) port in both defined VLANs above, the command is:
A native VLAN is conceptually the same as a standard VLAN except that the packets will never be tagged.
The purpose of a native VLAN is to segregate untagged packets on a VLAN trunk port that normally o nly
contains tagged traffic. If a VLAN trunk port receives an untagged packet, and the trunk is a member of the
native VLAN, that packet will be treated as if it came from the native VLAN. If the trunk port is not a
member of the native VLAN and an untagged packet arrives on that port, the packet will be dropped.
As VLAN's are implemented as bridges, and it is not valid for a bridge to be a member of another bridge, it
follows that a VLAN interface cannot be configured as a member of a bridge. VLANs can be configured
with IP addresses just as any other interface in the system can.
32MDS Orbit MCR Technical ManualMDS 05-6628A01, Rev. C
Page 41
Cell
Understanding
The unit incorporates a 4G LTE module capable of operation on Verizon Wireless LTE/CDMA network
(LTE 700 Mhz Band 13) in the United States. The unit supports routing of TCP/UDP/IP data from the Cellular WAN network interface to any of the other network interfaces (including WiFi or LAN) using the
IPsec VPN or network address and port translation (NAPT) feature and to the COM1 (or COM2) serial port
using the terminal server service. The configuration of these uses cases is specified in respective sections
on VPN, Firewall and NAT, and Terminal Service.
The cellular modem inside the unit supports main (primary) and secondary antenna (for receive diversity).
The primary antenna must be installed for cell modem to register with the cellular network. It is strongly
recommended that secondary antenna be installed for achieving a robust cellular link. There should be no
physical obstructions around the antennas. The main and diversity antennas must have a minimum amount
of 27 dB isolation from each other to ensure optimal LTE mode operation of the module.
Cell Configuration Hierarchy
interface Cell {
cell config {
apn <apn-name>
keep-alive {
address <host name or address>
interval <host name or address>
recovery-on-timeout <true| false>
}
service-recovery {
general-recovery-interva l <time in seconds>
lte-recovery <true|false>
lte-recovery-interval <tim e in seconds>
}
}
}
Access Point Name (APN)
After MCR has registered on the cellular network, it sets up the IP data connection with a specific Packet
Data Network identified by the Access Point Name (APN). APN is a string identifier.
The MCR comes preconfigured with APN of “vzwinternet”. Hence, it attempts to set up a data connection
toward internet PDN that provides internet connectivity. For this data connection to succeed, a SIM card
that has been provisioned for internet access needs to be obtained from the service provider and installed in
MCR.
If a private network (PN) account has been arranged with the service provider, a SIM card will be issued
from that account. When the modem is powered up with such a SIM, the default APN on the modem is automatically updated by the service provider to the one that identifies the user’s private network. This procedure is called OTA APN update. This procedure may not always succeed, and hence, requires the user to
manually update the APN on the MCR. The following example shows how to update APN manually via
CLI:
The cellular modem used inside the unit may occasionally remain in a 3G (EVDO-REV A) service state and
not transition to 4G LTE. The firmware incorporates a recovery mechanism to recover from this condition.
If the cellular modem has been in 3G coverage for more than 15 minutes, the firmware resets the modem to
bring it back into LTE service state. LTE recovery is enabled by default. This mechanism should be disabled
if the unit is deployed in areas that either lack or have poor LTE coverage. Otherwise, the cellular modem
will unnecessarily reset every 15 minutes.
Keep Alive
This feature allows the cellular modem to maintain a connection in situations where no traffic is passed over
cellular link for long periods of time, which would otherwise cause disruption. The keep alive mechanism
sends an ICMP echo message to the configured address/host at the configured interval. This feature should
be used only if an application is passing data very infrequently over a cellular connection (i.e., if data is
passed at a rate of less than once per hour).
The commands for setting 3G/4G operation are as follows:
NOTE: The Verizon network can disconnect the cellular connection if any packets get routed from LAN
to Cellular interface without undergoing masquerading (Source Network Address Translation
(NAT) before exiting the cellular interface. Therefore, always configure masquerading on the
cellular interface. Refer to the “Firewall and NAT” section (Page 45) in this manual for more
information on NAT configuration.
34MDS Orbit MCR Technical ManualMDS 05-6628A01, Rev. C
Page 43
Monitoring
Ensure the CLI is in Operational mode. Follow the example below to view the cellular interface state and
statistics:
When provisioning the cell module for network service, the cellular provider typically requires the International Mobile Subscriber Identity code (IMSI) or International Mobile Station Equipment Identity code
(IMEI) to be provided. These codes can be determined by entering the following command:
> show interfacesshow interfaces interface Cell cell-status
(Where Cell is the configured name for the cellular device. Cell is the factory default name, but it may have
been changed by a previous user.)
When the above command is entered, a number of items are returned as shown in the example below. The
first two items (highlighted blue) show the IMSI and IMEI codes. These are unique for each unit.
The internal WiFi module has FCC modular approval and may only be used with one of the GE MDS
approved antennas (see 802.11 WiFi Module Specifications below). The WiFi antenna is connected to the
reverse-SMA connector on the unit’s front panel. Only these antennas may be used. The WiFi module can
be configured to operate as an 802.11b/g/n Access Point or Station. The operational mode and frequency
can be configured through the user interface.
The specifications for the 2.4 GHz WiFi module (including permissible antennas) are covered in “Technical
Specifications” on Page 86.
The unit supports the following WiFi security modes:
None (should be used only to test connectivity)
1.
WPA2 + CCMP/AES Encryption – This mode should be used if all client devices support WPA2/CCMP.
2.
Encryption + TKIP Encryption – This mode should be used if there is mix of both legacy client devices
3.
that only support WPA/TKIP and newer devices that support WPA2/CCMP.
Also, WPA and WPA2 can be configured further in following modes:
Personal – This uses pre-shared keys (passphrases) configured on the MCR and client devices.
•
Enterprise – This supports EAP-TLS based authentication of client devices (configured with certif-
•
icates/keys) via RADIUS.
The default SSID is based on the unit's serial number, and takes the form of:
GEMDS_<SERNUM> (the serial
number is printed on the chassis sticker). The default password for WiFi operation is GEMDS_ORBIT.
AP Mode
Basic configuration with defaults
The following will configure a basic access point with
admin@(none) 17:06:10% set interfaces interface
admin@(none) 17:06:12% set interfaces interface
operation-mode 80211g ap
36MDS Orbit MCR Technical ManualMDS 05-6628A01, Rev. C
Page 45
Privacy Mode Configuration
The default privacy mode is
wpa2-personal
. (The privacy mode in the previous example was set to none.)
The following configures the unit to use WPA2-Personal security with the default of CCMP/AES encryption and disables the broadcasting of the SSID.
40MDS Orbit MCR Technical ManualMDS 05-6628A01, Rev. C
Page 49
Bridging
Understanding
The unit supports transparent bridging of LAN and WiFi networks. The bridge forwards traffic between
LAN and WiFi networks at the layer-2 of OSI model. This allows LAN and WiFi clients to be in the same
IP sub-network.
The bridge learns the clients’ locations by analyzing the source address of incoming frames from all
attached networks (LAN and WiFi network). For example, if a bridge sees a frame arrive on LAN port from
Host A, the bridge concludes that Host A can be reached through the segment connected to LAN port.
Through this process, the bridge builds a forwarding table (the learning process). When a frame is received
on one of the bridge's interfaces, the bridge looks up the frame's destination address in its forwarding table.
If the table contains an association between the destination address and any of the bridge's ports aside from
the one on which the frame was received, the frame is forwarded out the indicated port. If no association is
found, the frame is flooded to all ports except the inbound port. Broadcasts and multicast also are flooded
in this way.
Typically, for LAN/WiFi-to-Cellular Router use case (a.k.a LAN/WiFi HotSpot), the LAN and WiFi interface (acting as an Access Point) are bridged. However, for security and bandwidth considerations, a user
might want to remove LAN and WiFi networks from the bridge (i.e., configuring LAN and WiFi networks
as separate IP networks). In this network setup, broadcast/multicasts data packets coming into WiFi are not
directed out the LAN connection and vice versa.
The bridged network is addressable via bridge interface (a virtual interface). The interfaces that are in the
bridge are called bridged interfaces. The interfaces that are not in the bridge are called routed interfaces.
Bridging is performed between bridged interfaces. Routing is performed between routed interfaces. The
bridge interface is a routed interface.
NOTE: The Cellular modem by its nature can never be added to the bridge and is, therefore, a routed inter-
face. Advanced details of networking concepts such as routing and bridging are outside the scope
of this manual but are available through various training materials freely available on the Internet.
Theory of Operation
Refer to Figure 16 for this discussion. In a typical application, the MCR-4G provides cellular connectivity
to locally connected devices that are located on the user’s local/internal/private LAN or WiFi network. The
MCR-4G acts as an Access Point on the Wi-Fi interface, providing connectivity to Wi-Fi clients. The Wi-Fi
traffic is combined with the local Ethernet port traffic through a Layer 2 bridge. The serial interface is
matched to a terminal server that encapsulates serial data over a TCP or UDP connection.
The MCR-4G provides Network Address Translation (NAT) (both Masquerading and Port Forwarding) as
well as Firewalling between the cellular data interface (WAN side) and the local network (LAN/WiFi). The
MCR-4G can also act as a VPN client to provide a secure tunnel for LAN data to the user’s local network
(LAN/WiFi). This configuration obviates the need for NAT, as the back-office network behind the VPN
Concentrator (VPNC) can address the local LAN or WiFi network directly via the secure tunnel.
42MDS Orbit MCR Technical ManualMDS 05-6628A01, Rev. C
Page 51
Monitoring
Ensure the CLI is in operational mode. Follow the example below to view the state and statistics of a bridge.
In this example, bridge (Bridge) is bridging the LAN (ETH1).
44MDS Orbit MCR Technical ManualMDS 05-6628A01, Rev. C
Page 53
Firewall and NAT
Understanding
The MCR incorporates a firewall service that provides the following functionality:
1. Packet filtering to permit or deny incoming or outgoing traffic on an interface.
2. Network Address Translation (NAT)
• Source NAT - Masquerading
• Destination NAT – Port Forwarding
Packet Flow
This section provides a simplified view of packet flow for various categories of traffic flows going in and
out of the MCR unit. Figure 17 shows the flow of packets terminating at MCR. For example, device management traffic using SSH or NETCONF protocol terminating at local device management process within
the MCR unit.
Invisible place holder
Figure 17. Packets Terminating at MCR
Figure 18 shows flow of packets originating from the MCR unit. For example, DNS queries and/or VPN
connection setup traffic originating from local VPN service within the MCR unit.
Invisible place holder
Figure 18. Packets Originating from MCR
Figure 19 shows the flow of packets being forwarded (routed ) through the MCR unit. For example, IP
packets arriving inside IPsec VPN tunnel, being routed from cellular WAN to the local Ethernet interface.
Figure 20 shows the flow of packets being port-forwarded (DNAT’ed) through the MCR unit. For example,
TCP traffic arriving at the cellular interface and getting port forwarded to a private host connected to the
local Ethernet interface.
Invisible place holder
Figure 20. Packets Being Port-Forwarded Through MCR
Figure 21 shows the flow of packets being masqueraded (source NATed) through the MCR unit. For
example, TCP traffic from a private host arriving at Local Ethernet interface, being masqueraded to the cellular interface’s IP address before being sent out the cellular interface.
Invisible place holder
Figure 21. Packets Being Masqueraded Through MCR
46MDS Orbit MCR Technical ManualMDS 05-6628A01, Rev. C
Page 55
Packet Filtering
Understanding
Packet filtering allows configuring and applying a packet filter (also called Access Control List, or ACL) to
incoming or outgoing traffic on an interface. A filter is a set of one or more rules. Each rule consists of two
parts:
• Matching criteria that a packet must satisfy for the rule to be applied. Matching criteria consists of
various parameters like protocol, source/destination addresses and ports etc
• Actions that specify what to do with the packet when the matching criteria is met, for example, to
drop or accept the packet.
The filter can then be applied to an interface in the incoming or outgoing direction. Note that typically, different filters are applied in the incoming and outgoing direction on an interface. For example, a filter applied
to the cellular (WAN) interface of the MCR is typically very restrictive, permitting only a small set of traffic
to enter the MCR, where as outgoing filter might permit all outgoing traffic etc.
NOTE: If the firewall service is enabled and no filter is applied to an interface, then both incoming and
outgoing traffic is dropped on that interface.
Configuring
Configuration Hierarchy
NOTE: The configuration parameters shown here are a subset of the available configuration parameters.
Packet filter configuration on MCR involves following these high level steps:
1. Create a filter, decide on default policy of the filter. For example, there are usually two ways to or ganize
a filter:
a.Create a “restrictive” filter i.e. the last rule in the filter (also called “default policy” of
filter) is to deny traffic and rules are added to specifically permit the traffic. For example,
i. Rule 1 = permit protocol=tcp, dst port=22
ii. Rule 2 = permit protocol=icmp
iii. Rule 3 = deny everything
b. Or Create a “permissive” filter i.e. the last rule in the filter (also called “default policy” of
filter) is to permit traffic and rules are added to specifically deny traffic. For example,
i. Rule 1 = deny protocol=tcp, dst port=80
ii. Rule 2 = deny protocol=icmp
iii. Rule 3 = permit everything
2. Apply the filter to input or output direction of the interface.
The following example describes the step-by-step configuration of an example filter that can be applied to
cellular interface of the MCR. Change to CLI configuration mode:
1. Enable firewall service
admin@(none) 19:33:20% set services firewall enabled true
2. Create a “restrictive” filter named “IN_UNTRUSTED” to indicate that this filter has been
designed to be applied to an untrusted cellular interface of MCR. The cellular interface can be
considered untrusted as it is connected to public cellular network, which is inherently an untrusted
network.
admin@(none) 19:33:20% set services firewall filter IN_UNTRUSTED
3. Create rule to permit encrypted IPsec tunnel traffic i.e. tra ffic with protocol=ESP
admin@(none) 19:33:20% set services firewall filter IN_UNTRUSTED rule 1 match protocol esp
admin@(none) 19:33:20% set services firewall filter IN_UNTRUSTED rule 1 actions action accept
4. Create rule to permit traffic for the following UDP services: DNS, NTP and IKE (to allow IPsec
connection setup).
admin@(none) 19:33:20% set services firewall filter IN_UNTRUSTED rule 2 match protocol udp
src-port services [ dns ike ntp ]
48MDS Orbit MCR Technical ManualMDS 05-6628A01, Rev. C
Page 57
NOTE: The rule stated in step 5 permits SSH or NETCONF connection addressed to the cellular inter-
face’s IP address. If it is desired that SSH or NETCONF connection only be allowed via the VPN
tunnel, then ipsec match criteria described below should be used instead of the rule stated in step
5.
admin@(none) 19:33:20% set services firewall filter IN_UNTRUSTED rule 3 match ipsec direction in
tunnel-src-address 10.150.1.1/32 tunnel-dst-address 10.150.1.10/32
The above example assumes cell interface’s IP address is 10.150.1.10 and VPN Gateway’s IP address is
10.150.1.1.
6. Create the last rule for this “restrictive” filter to deny everything else. Note that rules are applied in
ascending order using rule IDs. Any rules added after this last rule will have no effect, as they
would match “any” traffic, and be dropped. In this example rule ID 10 is chosen. This facilitates
the insertion of new rules prior to this last one to support future new traffic types.
admin@(none) 19:33:20% set services firewall filter IN_UNTRUSTED rule 10 match protocol all
admin@(none) 19:33:20% set services firewall filter IN_UNTRUSTED rule 10 actions action drop
7. Apply this filter to incoming direction on cellular interface “Cell”.
admin@(none) 19:33:20% set interfaces interface Cell filter input IN_UNTRUSTED
8. Create a “permissive” filter that permits all traffic. Later on, if needed, this filter can be enhanced
to deny certain traffic from getting out of the cellular interface.
admin@(none) 19:33:20% set services firewall filter OUT_UNTRUSTED rule 10 match protocol all
admin@(none) 19:33:20% set services firewall filter OUT_UNTRUSTED rule 10 actions action accept
9. Apply this filter to ou tgoing direction on cellular interface “Cell”.
admin@(none) 19:33:20% set interfaces interface Cell filter output OUT_UNTRUSTED
10. Commit configuration and exit configuration mode.
At this time there are no commands to monitor traffic statistics for packets being dropped or permitted by
the firewall. This feature may be added to future revisions of firmware.
Network address translation allows one to map private IP addresses to public IP addresses and vice versa.
There are two basic kinds of network address translation:
• Source NAT
• Destination NAT
Source NAT
Source NAT performs translation of source IP address of the traffic egressing an interface. This is typically
used to provide many-to-one translation (also called masquerading) of a private network behind MCR to
allow hosts on that private network to access a host (say HOST-B) on the public network. (See Figure 22.)
All traffic originating from hosts in the private network will appear to have originated from a single IP
address (the IP address of the public interface of the MCR, typically, cellular interface) from HOST-B’s
point of view. To allow return IP traffic for UDP/TCP connections, to be delivered to right private host, the
MCR also performs source port translation. Therefore, masquerading consists of Network Address and Port
Translation (NAPT).
Invisible place holder
Figure 22. Source NAT Translation of IP Address
50MDS Orbit MCR Technical ManualMDS 05-6628A01, Rev. C
Source NAT configuration on MCR involves following high level steps:
1. Create a source NAT rule-set.
2. Add rule to perform source NAT on the public interface.
3. Apply the source NAT rule-set to the public interface.
Following example describes the step-by-step configuration of an example source NAT rule-set to perform
masquerading on cellular interface of MCR. Change to CLI configuration mode:
1. Enable firewall service, if it is not already enabled.
admin@(none) 19:33:20% set services firewall enabled true
2. Create source NAT rule-set named MASQ.
admin@(none) 19:33:20% set services firewall nat source rule-set MASQ
At this time there are no commands to monitor traffic statistics for packets being masqueraded by the firewall. This feature may be added in future revisions of firmware.
Destination NAT
Destination NAT performs translation of destination IP address (and, optionally, destination port) of the
traffic ingressing an interface. This is typically used to allow a host on the public network (HOST-B) to
access a service running on a host in the private network (HOST-1). This is also called port forwarding.
Invisible place holder
Figure 23. Destination NAT Translation of IP Address
52MDS Orbit MCR Technical ManualMDS 05-6628A01, Rev. C
Destination NAT configuration on MCR involves following high level steps:
1. Create a destination NAT rule-set.
2. Add one or more rules to perform destination NAT for specific incoming traffic on the public interface.
3. Apply the destination NAT rule-set to the public interface.
Following example describes the step-by-step configuration of an example destination NAT rule-set to perform port forwarding for incoming Modbus protocol (TCP port 512) traffic on the cellular interface to the
private HOST-1 (assume that modbus traffic is running on port 5512 on HOST-1). Change to CLI co nfiguration mode:
1. Enable firewall service, if it is not already enabled.
admin@(none) 19:33:20% set services firewall enabled true
2. Create source NAT rule-set named IO_SERVICES.
admin@(none) 19:33:20% set services firewall nat destination rule-set IO_SERVICES
At this time there are no commands to monitor traffic statistics for packets being masqueraded by the
firewall. This feature may be added in future revisions of firmware.
54MDS Orbit MCR Technical ManualMDS 05-6628A01, Rev. C
Page 63
VPN
Understanding
The MCR supports standards-based IPsec Virtual Private Network (VPN) technology to securely connect
remote private network (LAN or WiFi) with the customer’s backoffice/data center private network see
Figure 24). This allows IP traffic from/to devices connected to either LAN, WiFi or Serial port of the MCR
to securely flow to/from back-office applications via a secure tunnel through a public cellular network. The
tunneled application traffic is authenticated and encrypted to protect from eavesdropping, tampering and
replay attacks.
Invisible place holder
Figure 24. VPN Setup Example
Figure 24 shows an example network, where a remote Ethernet device is connected to MCR via Ethernet on
192.168.1.0/24 network. The MCR establishes a VPN connection with IPsec VPN gateway, thereby
securely connecting remote private network (192.168.1.0/24) with back-office private network
(192.168.2.0/24). This allows PC (192.168.2.2) to communicate with remote Ethernet device (192.168.1.2)
using any TCP/UDP/IP based protocol and vice versa.
IPsec, Internet Protocol Security, is a set of protocols defined by the IETF, Internet Engineering Task Force,
to provide IP security at the network layer.
An IPsec based VPN is made up by two parts:
• Internet Key Exchange protocol (IKE)
• IPsec protocols (ESP, AH)
The first part, IKE, is the initial negotiation phase, where the MCR and VPN gateway agree on which
methods will be used to provide security for the underlying IP traffic. There are two IKE protocol versions:
IKE-v1 and IKE-v2. These are not compatible with each other. The IKE-v2 is more efficient and therefore
should be preferred for new deployments. The MCR supports IKE-v1 and IKE-v2.
The other part is the actual IP data being transferred, using the encryption and authentication methods
agreed upon in the IKE negotiation. This is accomplished by using IPsec protocols like Encapsulating Security Payload (ESP) or Authentication Header (AH). The MCR only supports ESP protocol as it provides
both encryption and authentication of the data. The AH protocol provides only data authentication.
The process of IPsec VPN connection establishment consists of following phases:
• IKE Phase-1 (IKE security negotiation)
- Negotiate how IKE should be protected
• IKE Phase-2 (IPsec Security Association)
- Negotiate how IPsec should be protected
- Derive fresh keying material from the key exchange in phase-1, to provide session keys to be used
in the encryption
- and authentication of the VPN data flow
• Exchange data over the IPsec tunnel
Both the IKE and the IPsec connections have limited lifetimes. These lifetimes prevent a connection from
being used too long, which is desirable from a cryptanalysis perspective.
The IPsec lifetime is generally shorter than the IKE lifetime. This allows for the IPsec connection to be
re-keyed simply by performing another phase-2 negotiation.
Configuration
VPN Configuration Hierarchy
NOTE: The configuration parameters shown here are a subset of all available configuration parameters.
Refer to the appendix section for all available parameters.
When setting up IPsec VPN over a Cellular interface, the following firewall filters are recommended to be
configured and applied to the cellular interface. The
IN_UNTRUSTED and OUT_UNTRUSTED filters should
be applied to incoming and outgoing traffic respectively.
filter IN_UNTRUSTED {
rule 1 {
match {
protocol udp;
src-port {
services [ dns ike ntp ];
}
}
actions {
}
}
rule 2 {
}
rule 3 {
}
rule 4 {
action accept;
}
rule 10 {
}
}
filter OUT_UNTRUSTED {
rule 1 {
}
action accept;
match {
protocol esp;
}
actions {
action accept;
}
match {
protocol icmp;
}
actions {
action accept;
}
match {
ipsec {
direction in;
tunnel-src-address <VPN SERVER IP ADDRESS>/32;
tunnel-dst-address <CELL INTE RFACE IP ADDRESS>/32;
direction out ;
tunnel-src-address <CELL INTE RFACE IP ADDRESS>/32;
tunnel-dst-address <VPN SERVER IP ADDRESS>/32;
}
}
actions {
action accept;
}
}
rule 10 {
match {
protocol all;
}
actions {
action drop;
}
}
}
VPN configuration involves the following high level steps:
1. Configure an IKE policy specifying an authentication method, cipher suites to be included in the
proposal during IKE phase-1 and the credentials to be used for authentication e.g. certificates or
preshared-keys.
2. Configure an IKE peer specifying peer endpoint address, IKE policy to used for IKE phase-1 negotiation. The “role” specifies whether MCR initiates connection (initiator) or it waits for the connection
from the peer (responder). This should usually be set to “initiator”.
3. Configure an IPsec policy specifying ESP cipher suites to be included in the proposal during IKE
phase-2.
4. Configure an IPsec connection specifying IKE peer, IPsec policy, local and remote private IP subnets.
NOTE: The above configuration parameters should match with the corresponding parameters set in the
peer. Otherwise, the IPsec VPN connection will not succeed. Typical configuration mistakes
include incorrect security credentials (psk or certificates/keys), mismatched cipher suite configuration, and mismatched local and remote subnet configuration.
The following example describes the step-by-step VPN configuration for the example network shown in
figure above. We’ll assume that certificates are being used as security credentials and have already been
loaded in the MCR either manually or via SCEP.
1. Ensure that cellular interface has been configured.
2. Ensure that device has been configured with certificates/keys.
3. Ensure that device has been configured to obtain time via NTP.
NOTE: The VPN connection will fail unless the time is synchronized on the device because certificate
validation will fail.
58MDS Orbit MCR Technical ManualMDS 05-6628A01, Rev. C
Page 67
4. Enable VPN service
admin@(none) 20:38:44% set services vpn enabled true
5. Create IKE policy with auth-method “public-key encryption”.
admin@(none) 19:33:29% set services vpn ike policy IKE-POLICY-1 auth-method pub-key
6. Configure Public Key Infrastructure (PKI) security credentials
a.Certificate type as “rsa” if RSA public key encryption based certificates are being used.
b. Client certificate ID – This is the ID that was assigned to the client certificate obtained via
SCEP or loaded manually.
c.Client private key ID – This is the ID that was assigned to the client private key generated
during SCEP procedure or loaded manually.
d. Certificate Authority (CA) certificate ID – This is the ID that was assigned to the CA
certificate obtained via SCEP or loaded manually.
admin@(none) 19:33:29% set services vpn ike policy IKE-POLICY-1 pki cert-type rsa
admin@(none) 19:33:29% set services vpn ike policy IKE-POLICY-1 pki cert-id ID-1
admin@(none) 19:33:29% set services vpn ike policy IKE-POLICY-1 pki key-id ID-1
admin@(none) 19:33:29% set services vpn ike policy IKE-POLICY-1 pki ca-cert-id GEPKI
1. Configure the following ciphersuite to be included as proposal for IKE phase-1 negotiation:
a.Encryption Algorithm = AES 256 Bit in CBC mode
b. Message Authentication Algorithm = HMAC using SHA256 digest
c.Diffie-Hellman Group = DH-14 (group 14 modp2048)
admin@(none) 19:33:29% set services vpn ike policy IKE-POLICY-1 ciphersuite
AES256_CBC-SHA256-DH14 encryption-algo aes-256-cbc
admin@(none) 19:33:29% set services vpn ike policy IKE-POLICY-1 ciphersuite
AES256_CBC-SHA256-DH14 mac-algo sha256-hmac
admin@(none) 19:33:29% set services vpn ike policy IKE-POLICY-1 ciphersuite
AES256_CBC-SHA256-DH14 dh-group dh-14
NOTE: More than one ciphersuite can be included in the proposal.
1. Create IKE peer with address 10.150.1.1 and dead peer detection enabled and interval set to 5 mins.
The dead peer detection (DPD) is enabled by default. When enabled, it sends
messages to the peer if there no other data sent within DPD interval. This allows MCR to detect dead VPN
peers and clear a VPN connection. The DPD interval should be set to no less than 300 seconds (5 minutes)
to reduce the periodic traffic in the network.
The peer-identity-no-idr parameter, when set to true, prevents the unit from sending the responder’s ID (IDr)
IKE_AUTH request which might prevent the peer from finding matching a configuration.
in its
admin@(none) 19:33:29% set services vpn ike peer VPN-GW role initiator
admin@(none) 19:33:29% set services vpn ike peer VPN-GW ike-policy IKE-POLICY-1
admin@(none) 19:33:29% set services vpn ike peer VPN-GW peer-endpoint address 10.150.1.1
admin@(none) 19:33:29% set services vpn ike peer VPN-GW peer-identity-no-idr true
admin@(none) 19:33:29% set services vpn ike peer VPN-GW dpd-interval 300
The following table describes the VPN connection attempt retries and time interval between them. After
giving up as listed below, the unit waits for “failure-retry-interval” and repeats the connection attempt
sequence.
Relative Timeout
Attempt#
100
st
2 (1
retry)
nd
3 (2
retry)
rd
4 (3
retry)
5 (4th retry)
th
6 (5
retry)
Give up76165
Wait for “failure-retry-interval”, then repeat above sequence
Between Attempts (secs)
44
711
1324
2347
4289
Absolute Timeout
From First Attempt (secs)
During initial configuration set failure-retry-interval to lowest value of 1 min, to have MCR attempt connection more quickly. This allows debugging of any connection-related issue by watching logs on peer side
etc. Be sure to change this value to 5 mins or higher to prevent excessive attempts and traffic.
60MDS Orbit MCR Technical ManualMDS 05-6628A01, Rev. C
Page 69
Monitoring
Ensure the CLI is in operational mode. Follow the example below to view the VPN connection state (connecting, connected or disconnected). The failure-reason displays the reason for last connection failure.
admin@(none) 20:40:45> show services vpn
services vpn ipsec ipsec-status connection
state connecting
failure-reason none
last-timestamp 2013-01-18T20:24:15+00:00
ima-evaluation none
ima-recommendation none
admin@(none) 20:40:45> show services vpn
services vpn ipsec ipsec-status connection
state connected
failure-reason none
last-timestamp 2013-01-18T20:24:15+00:00
ima-evaluation none
ima-recommendation none
VPN-GWY-CONN-1
VPN-GWY-CONN-1
With a connection made, ping the back-office PC to make sure the traffic is passing between device and PC.
admin@(none) 20:41:32> ping 192.168.2.1
PING 192.168.1.2 (192.168.2.1) 56(84) bytes of data.
64 bytes from 192.168.2.1: icmp_req=1 ttl=63 time=389 ms
64 bytes from 192.168.2.1: icmp_req=2 ttl=63 time=161 ms
[ok][2013-01-18 20:49:42]
VPN Troubleshooting
The following are common reasons for VPN connection failure:
1. Invalid certificate or keys loaded on the device
2. Time not synchronized on the device. Note that after cell connection is established, device can take few
minutes to sync time from NTP server. VPN connection will not succeed until time is synchronized.
3. Mismatch in ciphersuites configured for IKE policy on device and peer VPN gateway.
4. Mismatch in ciphersuites configured for IPsec policy on device and peer VPN gateway.
5. Mismatch in remote and local IP subnets configured for IPsec connection on device and peer VPN
gateway. Note the following:
a.For device
i. remote ip subnet = back-office subnet
ii. local ip subnet = local LAN or WIFI subnet on device
b. For VPN gateway
i. remote ip subnet = device’s local LAN or WIFI subnet
ii. loca l ip subnet = back-office subnet on device
Domain Name System (DNS) servers can be configured on the unit to facilitate the resolution of domain
names to IP addresses.
NOTE: Manual configuration of DNS overrides any DNS settings obtained via DHCP.
Configuring
The following example shows how to configure a DNS server with IP address 192.168.1.2 on the MCR.
Note that the “search” option can take a list of arguments and in this example, there are two arguments;
and
gemds.
admin@(none) 00:31:02% set system dns server 192.168.1.2 search [ mds gemds ] options attempts 3
timeout 3
Monitoring
Ensure the CLI is in operational mode. Follow the example below to view the state and statistics.
The ping utility can be used on the CLI when it is in operational mode to verify that DNS is working prop-
erly. If ping can resolve a name on the connected network to an IP address then DNS settings are working
properly. The example below shows the resolution of the name “example.com” to the IP address
“192.0.43.10” on a unit that is connected to the Internet.
mds
Use the control sequence “CTRL-C” to stop the ping utility.
admin@(none) 00:20:33> ping example.com
PING example.com (192.0.43.10) 56(84) bytes of data.
64 bytes from 43-10.any.icann.org (192.0.43.10): icmp_req=1 ttl=237 time=30.8 ms
64 bytes from 43-10.any.icann.org (192.0.43.10): icmp_req=2 ttl=237 time=44.7 m
[ok][2012-06-19 00:24:08]
admin@(none) 00:24:08>
62MDS Orbit MCR Technical ManualMDS 05-6628A01, Rev. C
Page 71
DHCP Service
Understanding
The unit can be configured to act as a DHCP server. When enabled, this service will respond to DHCP
requests from any interface.
Configuring
The following shows an example of configuring DHCP service on the unit. The unit will administer IPv4
addresses from the 192.168.x.x network when requests are received from DHCP clients.
NOTE: At least one of the unit’s interfaces (ETH1, ETH2, WiFi or Bridge if the interface is bridged) must
be configured with an IP address from this subnet.
admin@(none) 04:18:26% set services dhcp v4subnet 192.168.0.0/16 domain-name gemds range-start
The unit allows the setup of the COM ports as a terminal server that passes data to/from the serial port to
network interfaces. The serial port must be configured to do this, in addition to the baud rate and data format.
The data from the serial port is treated as a seamless stream; meaning it is not protocol aware and will send
data from the serial port to the remote endpoint as soon as the data is received. A terminal-server can consist
of a TCP server, a TCP client, or a UDP endpoint, and a MODBUS-TCP server.
When a terminal server on the unit is configured as TCP server, then the unit listens on a TCP port for client
connections. When a terminal server on the unit is configured as TCP client, then the unit will attempt to
connect to the remote IP address. Once a TCP connection is established, then serial traffic from the COM
port can pass to and from the TCP port as long as the TCP connection remains established.
When a terminal server on the unit is configured as a UDP endpoint, then traffic from the COM port is sent
to the remote host at the specified port in UDP packets. Likewise, traffic sent to the UDP port of the unit is
forwarded out the COM port. Since UDP is stateless, some packets may not reach their intended destination
or may arrive out of order. The protocol contained in the UDP messages must handle these scenarios.
When a terminal server on the unit is configured as a MODBUS/TCP server, then the unit listens on a TCP
port for a client connection. Once a TCP connection is established, the unit will convert the incoming
MODBUS/TCP frame into either a MODBUS/RTU or MODBUS/ASCII frame for transmitting on the
serial port. Serial data received is converted from either MODBUS/RTU or MODBUS/ASCII to
MODBUS/TCP for transmission back to the MODBUS/TCP client.
NOTE: Once a terminal-server is enabled on a COM port, the port stays in data mode and the CLI will
not be available on that port. To break out of data mode, the escape sequence
on the PC’s keyboard. The baud rate and format must match on the PC and on the unit for the
escape sequence to be detected. Once the sequence is detected, the login prompt is presented as
long as the port is enabled for console access.
Configuring
The following shows how to enable a UDP terminal server on COM1
admin@(none) 01:34:45% set services serial terminal-server server COM1 mode udp port 10000
remote address 192.168.1.12 port 10000
[ok][2012-06-19 01:35:36]
[edit]
admin@(none) 01:35:36% commit
The following shows how to enable a TCP terminal server on COM1
admin@(none) 01:22:09% set services serial terminal-server server COM1 mode tcp-server port
30011 idle-timeout 30
Ensure the CLI is in operational mode. Follow the example below to view the state and statistics:
admin@(none) 22:03:06> show services serial
SERIAL SERIAL SERIAL SERIAL
SERIAL IP TX IP TX IP RX IP RX TX TX RX RX
PORT PACKETS BYTES PACKETS BYTES PACKETS BYTE S PACKETS BYTES
64MDS Orbit MCR Technical ManualMDS 05-6628A01, Rev. C
Page 73
Iperf Service
Understanding
Iperf service allows one to receive TCP traffic from remote host running iperf. Currently, iperf service is
hardcoded to act only as a TCP server listening on port 5001.
Configuring
The following shows how to enable iperf service:
admin@(none) 22:04:32% set services iperf enabled true
admin@(none) 22:04:32% commit
Commit complete.
[ok][2013-09-24 22:04:33]
NOTE: If firewall is enabled, then it must be configured to permit incoming TCP traffic on port 5001.
Monitoring
Ensure the CLI is in operational mode. Follow the example to view the state of iperf service:
The date and time can be set on the MCR using a manual ly configured value or automatically via Network
Time Protocol (NTP). The NTP settings take precedence over the manual settings. If NTP is enabled, then
the user will not be able to set the date and time manually.
Configuring
To manually set the date and time, use the request set-current-datetime:
admin@(none) 18:18:58> request system clock set set-current-datetime current-datetime
2013-10-01T8:33:45
To use an NTP server, an NTP server must be configured on MCR:
admin@(none) 00:20:33% set system ntp use-ntp true ntp-server
admin@(none) 00:20:33% commit
Commit complete.
[ok][2012-06-19 00:20:36]
time.nist.gov
Monitoring
Ensure the CLI is in operational mode. Follow the example below to view the state and statistics:
admin@(none) 00:20:34> show system clock
system clock current-datetime 2012-06-19T00:20:34+00:00
system clock boot-datetime 2012-06-19T00:18:01+00:00
[ok][2012-06-19 00:20:34]
66MDS Orbit MCR Technical ManualMDS 05-6628A01, Rev. C
Page 75
Geographical-location
The geographical-location of the unit can be configured as shown below:
admin@(none) 00:50:46% set system geographical-location altitude 1.0 latitude 43.117807
longitude -77.611896
There are three user accounts/roles (administrator, technician, and operator) for management access.
Users in the admin group have the highest privilege and can read everything in the tree that is readable, write
everything that is writable, and can execute any of the requests.
Users in the tech group have less access than admin. Generally, the tech group cannot configure any secu-
rity-related configuration.
Users in the oper group can only view status and configuration. They do not have access to modify the
device configuration.
By default, the password for each account is the same as the username. The passwords should be changed
by users prior to deploying the device. When local user management is being used, passwords are stored in
non-volatile memory using PKCS#5 based encryption.
The user authentication can be done using locally stored passwords or via RADIUS.
Configuring
The password for each user account can be changed using a request:
admin@(none) 01:04:19> request system authentication change-password user admin password
new_password
NOTE: If the admin password is forgotten, the only way to reset the login password is by using the login
One-Time-Password. This will reset the user passwords AND reset the entire unit’s configuration
to defaults. Refer to section 3.1.4 One-Time “Recovery” Passwords on Page 16.
User authentication order can be specified to give preference to which method is used first when authenticating user access. In the following example, the list of RADIUS servers will be contacted first before the
local authentication rules are used.
NOTE: If the local-users option is specified before RADIUS, then only the local-users option will be
utilized; the RADIUS servers will never be contacted.
admin@(none) 01:05:07% set system authentication user-authentication-order [ radius local-users ]
admin@(none) 01:05:07% commit
Commit complete.
[ok][2013-09-24 01:05:10]
68MDS Orbit MCR Technical ManualMDS 05-6628A01, Rev. C
Page 77
Monitoring
Ensure the CLI is in operational mode. Follow the example below to see the history of login attempts by
reviewing the event log:
The unit has protections against repeated login attempts. The max-login-attempts configuration determines
the number of failed logins that can occur in succession before the unit disables the ability to login for a
specified amount of time. The amount of time is determined by failed-login-lockout-time, which represents
the time in seconds.
Configuring
admin@(none) 01:51:26% set system max-login-attempts
[ok][2012-06-19 01:56:38]
[edit]
admin@(none) 01:56:38% set system failed-login-lockout-time
[ok][2012-06-19 01:56:56]
70MDS Orbit MCR Technical ManualMDS 05-6628A01, Rev. C
Page 79
RADIUS
Understanding
User accounts can be centrally managed with a RADIUS server. RADIUS accounts can be mapped to one
of the three user roles.
If the RADIUS server is not accessible, users may use the local username/password to “fall back” to local
authentication if the unit is configured to do so. Many RADIUS servers do not respond to a failed login
attempt. To the unit, this appears the same as if the server is not there. The consequence of this behavior is
that after three failed login attempts, the authentication will take place against the local user/password database if local fallback is enabled. Refer to the section on “Local User Management” for configuring the
authentication order.
If more than one RADIUS server is configured, then the unit will attempt each RADIUS server in the order
that they appear in the configuration until a successful response is received. A RADIUS server must be configured to provide the user’s authentication group in its authentication reply via a GE MDS vendor attribute.
This can be configured in freeradius (an open source RADIUS server) by using the following dictionary file:
VENDOR GEMDS 4130
BEGIN-VENDOR GEMDS
ATTRIBUTE GEMDS-UserAuth-Group 1 integer
VALUE GEMDS-UserAuth-Group Operator 0
VALUE GEMDS-UserAuth-Group Technician 1
VALUE GEMDS-UserAuth-Group Admin istrator 2
END-VENDOR GEMDS
External file servers can be preconfigured so that the configuration can easily be referenced in other services
without the need to re-enter the information. File Server Configurations can be used for reprogramming,
downloading certificates, configuration script import and export, and sending support bundles for debugging.
Configuring
The following shows how to add a file server configuration named “GE File Server 1”:
admin@(none) 05:11:42% set file-servers
admin@(none) 05:11:42% commit
Commit complete.
Ensure the CLI is in operational mode. The file transfer status is available as operational data. Refer to the
sections on “Firmware Management” and “Certificate Management” for more information.
72MDS Orbit MCR Technical ManualMDS 05-6628A01, Rev. C
Page 81
Certificate Management
Understanding
The unit uses x509 public certificates and private keys for the following services:
• Secure Reprogramming
• Syslog over TLS
• IPsec VPN/IMA (when using pub-key, EAP-TLS or EAP-TTLS based authentication)
• WiFi (when doing EAP-TLS authentication in station mode)
Certificates can be loaded into the device using one of two methods: manual or SCEP. Note that certificates
for secure reprogramming can only be loaded using the manual method.
The unit can load certificates that are in DER, PEM, or Encrypted PEM format. The unit can load private
keys that are in DER, PEM,or Encrypted PEM.
Configuring
From either operational or configuration mode, requests can be made on the device related to certificate
management. Using the Tab character after entering 'request pki' shows a list of the available requests.
admin@(none) 05:04:37> request pki
Possible completions:
cancel-scep-operation - Canc el the last SCEP operation initiated.
delete-cacert - Delete identified CA certificat e
delete-clientcert - Delete identified Client certificate
delete-firmware-cert - Delete identified certificate
delete-priv-key - Delete identified Priva te Key
generate-priv-key -
get-ca-cert - Request the certmgr to retrieve a CA cert fro m st or e.
get-client-cert - Request the certmgr to retr ieve a client cert from
get-firmware-cert - Install a certificate to be used for firmware
get-priv-key - Retrieve private key file from netw ork or local file
show-cert-info - Dump identifie d certificate as text to display
store.
validation
system.
Manual Download of Security Material
The ‘get’ series of requests allow security material to be downloaded from the network. The specifics of the
communication can either be defined in the request or a server can be preconfigured separately (see “File
Servers” on Page 72) and used in the request.
To manually load certificates from a file server, the following requests must be used:
·get-ca-cert – To load CA certificates
·get-client-cert – To load device/client certificates
·get-firmware-cert – To load firmware verification certificates
·get-priv-key – To load device/client private key
When loading certificates manually, the file server from which the certificate will be retrieved must be provided. The file server configuration can be entered every time or, to reduce typing, the file server configuration can be selected from one of the preconfigured file servers (see “File Servers” section on Page 72):
When defining a file server manually you may, as in this example, accept the defaults provided (in this
example, block-size, port and timeout). After entering the address, a space and ‘}’ must be entered to complete the parameters for the chosen mode. Always try the Tab-Enter to have the CLI show the next needed
parameters.
SCEP and CA Configuration
The process of interacting with a SCEP server involves getting the currently published certificate(s) from
the CA and then making a request for a client certificate with information and key material.
Before any attempt to interact with the SCEP server, the SCEP server itself, the CA associated with the
SCEP server must be identified and the certificate information must be defined:
·pki certificate-servers
·pki ca-servers
·pki cert-info
The certificate server is defined under certificate-server. In the operation shown below, we define the SCEP
server.
74MDS Orbit MCR Technical ManualMDS 05-6628A01, Rev. C
Page 83
This defines the server that is running the SCEP protocol on an accessible network. The unit will append an
'http://' to the URL so it must not be entered as part of the uri parameter in the configuration. Note also, the
above is just an example. Your IP address, specific port (if different from the default), and path to .dll or
.cgi or other SCEP server mechanism must be obtained from your Sys tem Administration or Security personnel.
The configuration of the Certificate Authority that will be accessed at the above server is setup in a second
command under ca-servers.
admin@(none) 03:05:56% set pki ca-servers ca-server
The fingerprint of the CA server is another data item you will obtain from your System Administrator or
Security personnel. The ca server name is the name that will be referenced in the SCEP operations described
below. In general, it is simply for your reference and does not have to be a specific name. In fact, it can be
the same name as the ca-server if this helps to remember it.
Also, client certificate information that goes in the “Subject” portion of an X.509 certificate must be configured. Some fields may be fixed/required by the specific SCEP server.
The list above was displayed by entering Space-Tab after entering a name for the new set of certificate info.
The parameters that must be entered for your client certificate information must again be obtain ed from your
System Administration or Security personnel. The common name will always be required. Other parameters
may be required.
Additional CA server files sent as part of the request and needed later are saved with the base name you
selected for the CA server and an added extension. Some of the names that may be added are:
·_ENC , SCEP encryption certificate
·_SGN , SCEP digital signature certificate
The second step is to request a client cert from the CA server via the SCEP server.
The parameter that must be entered for your ca-challenge must be obtained from your System Administrator
or Security personnel.
Certificate Renewal with SCEP
At some point, the dates on your certificate will need to be renewed due to time or security policy. A client
certificate can be renewed using the existing certificate with the same key as originally used when it was
generated. An alternative is to provide a new key and identify for the certificate that is to be renewed and
rekeyed.
The same request is used to renew as for the original request with a slight change in parameters provided.
For this request, the cert-key-name is always the key that will be used in the certificate that you identify with
the cert-identification-name. The ‘self’ cert and optional ‘self’ key are respectively the existing certificate
that will be renewed and the key that was originally used when it was created.
In the case we are going to use the same key in a renewed cert. Here is a renewal request formed accordingly:
An event is a notification that something meaningful occurred on the unit. Events contain information about
the occurrence that may be useful for administrators. The event can be stored locally and/or transported to
a remote server. Administrators can adjust which events are reported by the unit. The structure of the information about the event is described below (CEE).
Logs are stored in the Event Log, which can be viewed with the command:
admin@(none) 00:15:32> show table logging event-log
NETCONF-notifications
The events generated by the unit are converted to NETCONF notifications. NETCONF clients can subscribe
to the unit to receive those notifications.
Syslog
The events generated by the unit can be sent to remote syslog servers. The connection to the syslog server
can be made secure using syslog over TLS. To set up a syslog server, use the command:
admin@(none) 00:16:20> % set logging syslog server my_server ip 192.168.1.200
When logging to a syslog server, the following attributes can also be set:
• priority
• syslog-facility
Event Rules
All events can be configured to be logged to any combination of the following locations based on the event
type:
• Local: Store event in the local event log.
• Netconf-notification: generate a NETCONF notification
• Syslog: Forward events to a remote syslog server.
Configure the event rules
% set logging event-rules <parameter> <functions/outputs>
80MDS Orbit MCR Technical ManualMDS 05-6628A01, Rev. C
Page 89
Firmware Management
Understanding
The unit can have two firmware packages programmed into the device. The package that the device booted
into is referred to as the Active Firmware. The other image is referred to as the Inactive Firmware.
To reprogram the device, the Active Firmware streams the new firmware package from the network and
writes the package into the Inactive Firmware location in memory. To use the new firmware package, the
user must reboot the device to the Inactive Firmware. Doing so will make the Inactive Firmware the Active
Firmware and vice-versa.
Firmware packages released by the factory are digitally signed using a private key. The unit will not accept
firmware packages that are unsigned nor will it accept firmware packages that fail to verify while using the
public certificates loaded into the device. Therefore it is necessary to have the GE MDS public certificate
loaded into the device to reprogram the firmware.
Users may add their own signatures to the firmware package using the GE MDS code signing tool.
NOTE: Any additional signatures added to a firmware package will require the corresponding public
certificates to be loaded into the unit for firmware reprogramming to complete successfully. Simi-
larly, any additional firmware-validation public certificates loaded into the unit require a firm-
ware package to be signed with the corresponding private keys.
The request reprogram-inactive-image initiates the reprogramming sequence on the unit. The request will
return immediately and the reprogramming sequence will continue in the background on the device. The
reprogramming sequence can take several minutes. The status of the reprogramming sequence can be polled
to know when reprogramming has completed.
admin@(none) 06:24:44> request system firmware reprogram-inactive-image
preconfigured-file-serve r { configuration_name
admin@(none) 03:55:43>show system firmware reprogramming-status
system firmware reprogramming-status state active
system firmware reprogramming-status detailed-message “Transferring file"
system firmware reprogramming-status size 36005116
system firmware reprogramming-status bytes-transferred 7455744
system firmware reprogramming-status percent-complete 20
admin@(none) 03:55:43>show system firmware reprogramming-status
system firmware reprogramming-status state complete
system firmware reprogramming-status detailed-message "Reprogrammed successfully"
system firmware reprogramming-status size 36005116
system firmware reprogramming-status bytes-transferred 35984896
system firmware reprogramming-status percent-complete 100
The command below provides a simple way to monitor percent complete. (Use Ctrl-C to abort.)
admin@(none) 03:55:43>show system firmware reprogramming-st at us percent-complete | repeat 1
system firmware reprogramming-status percent-complete 25
system firmware reprogramming-status percent-complete 27
system firmware reprogramming-status percent-complete 28
82MDS Orbit MCR Technical ManualMDS 05-6628A01, Rev. C
Page 91
Support Bundle
Understanding
The MCR incorporates a facility to generate a support package bundle that includes internal debugs, logs,
etc. This can help factory personnel troubleshoot user issues.
Configuring
The following example shows how to have MCR generate and transfer a support package bundle (named
debug-2013-01-24.tgz) to a FTP server running on host (address 192.168.1.2) that is accessible from the
MCR (e.g. a locally connected host or remote host accessible via cellular interface):
admin@(none) 22:14:57> request system support generate-support-package filename
debug-2013-01-24.tgz manual-file-server { ftp { address 192.168.1.2 username xyz password xyz } }
The MCR supports TFTP, FTP, and SFTP transfer protocols.
Monitoring
Ensure the CLI is in operational mode. Follow the example below to view the state of the support bundle
transfer:
admin@(none) 22:17:18> show system support
system support support-transfer-status state active
system support support-transfer-status detailed-message “Transferring”
system support support-transfer-status size 0
system support support-transfer-status bytes-transferred 0
system support support-transfer-status percent-complete 0
[ok][2013-01-24 22:17:21]
NOTE: The web-based device manager interface should not be active when importing a configuration
script.
Understanding
An exported configuration script will contain all of the settable parameters of the unit for which the current
user has read-access; e.g. configuration scripts exported by the tech user will not contain values which only
the admin user has permissions to view. Configuration scripts can be saved and used to restore known-good
configurations.
Configuring
The following example shows how to have MCR generate and transfer a configuration script (named configscript-2013-09-24.txt) to a SFTP server running on host (address 192.168.1.10) that is accessible from
the MCR (e.g. a locally connected host or remote host accessible via cellular interface):
The MCR supports TFTP, FTP, and SFTP transfer protocols for configuration script export and import.
Monitoring
Ensure the CLI is in operational mode. Follow the example below to view the state of the configuration
script file transfer:
admin@(none) 22:17:18> show syst e m co nfiguration-file transfer-status
system support configuration-fi le s tr an sfer-status state active
system support configuration-files transfer-status detailed-message “Transferring”
system support configuration-files transfer-status size 30004
system support configuration-files transfer-status bytes-transfe r red 29404
system support configuration-files transfer-status percent-complete 97
[ok][2013-09-24 22:17:21]
84MDS Orbit MCR Technical ManualMDS 05-6628A01, Rev. C
Page 93
4.0 TECHNICAL REFERENCE
4.1Troubleshooting
All units must meet the basic requirements listed below for proper operation. Check these items first when
troubleshooting a system problem:
• Adequate and stable primary power
• Secure connections (antennas, data and power)
• A clear transmission path between associated units
• An efficient, properly installed antenna system
• Proper configuration of unit settings
• Correct interface between the unit and other equipment
4.1.1 LED Status Indicators
The LEDs on the unit are visual indications of the status of the device. These indicators can provide useful
information when troubleshooting. Refer to Table 8 for LED indications.
Figure 25. LED Status Indicators
Table 8. Description of LED Status Indicators
LED NameLED StateDescription
PWR
(DC Power)
ETH
(Ethernet)
COM
(Serial Comm. Port)
NIC1
(Cell)
NIC2
(WiFi)
Access Point ModeSolid Green
Station ModeOff
Off
Solid Green
Fast Blink/Red (1x/sec.)
Off
Solid Green
Blinking Green
Off
Blinking Green
Off
Solid Green
OffInterface disabled
Solid Red
Solid Green
No power to unit
Unit is powered, no problems detected
Alarm indication
No Ethernet link to network
Ethernet link present
Ethernet traffic in/out
No serial connection, or idle
Serial traffic in/out
No cellular connection
Cell Connection
Operating as AP and at least one client connection
Operating as an AP and no client connection
No connection
Wi-Fi connection established.
NOTE: In addition to the LEDs above, the Ethernet connector has two embedded LEDs. A yellow indi-
cates a link at 100 Mbps operation. A flashing green indicates Ethernet data traffic.
Specifications subject to change without notice or obligation.
4.2.5 2.4 GHz WiFi Specifications
• Protocol: IEEE 802.11b/g/n OFDM 6 to 54Mbps, CCK 1 to 11Mbps
• Frequency Range: 2400 to 2500 MHz
• Maximum Transmit Power: 18 dBm (Default is 15 dBm)
• Permissible Antennas:
- GE MDS 97-4278A36
- GE MDS 97-4278A34
- GE MDS 97-4278A35
• FCC: Part 15C
• FCC ID: VRA-SG9011028
• WiFi Antenna Connector: Female Reverse SMA
86MDS Orbit MCR Technical ManualMDS 05-6628A01, Rev. C
Page 95
4.3Glossary of Terms & Abbreviations
If you are new to wireless communications systems, some of the terms used in this guide may be unfamiliar.
The following glossary explains many of these terms and will prove helpful in understanding the operation
of the unit.
Antenna System Gain: A figure, normally expressed in dB, representing the power increase resulting from
the use of a gain-type antenna. System losses (from the feedline and coaxial connectors, for example) are
subtracted from this figure to calculate the total antenna system gain.
Bit: The smallest unit of digital data, often represented by a one or a zero. Eight bits (plus start, stop, and
parity bits) usually comprise a byte.
Bits-per-second: See BPS.
BPS (Bits-per-second): A measure of the information transfer rate of digital data across a communication
channel.
Bridging: (see Ethernet Bridging)
Byte: A string of digital data usually made up of eight data bits and start, stop and parity bits.
CLI: Command Line Interface. A method of user control where commands are entered as character strings
to set configuration and operating parameters.
CTS: Clear to Send
Decibel (dB): A measure computed from the ratio between two signal levels. Frequently used to express
the gain (or loss) of a system.
Data Circuit-terminating Equipment: See DCE.
Data Communications Equipment: See DCE.
Data Terminal Equipment: See DTE.
dBi: Decibels referenced to an “ideal” isotropic radiator in free space, frequently used to express antenna
gain.
dBm: Decibels referenced to one milliwatt. An absolute unit used to measure signal power, as in transmitter
power output, or received signal strength.
DCE (Data Circuit-terminating Equipment) (or Data Communications Equipment): In data communica-
tions terminology, this is the “modem” side of a computer-to-modem conn ection. The unit described in this
manual is hardwired as a DCE device.
DTE (Data Terminal Equipment): A device that provides data in the form of digital signals at its output.
DTE connects to the DCE device.
ETH: Ethernet
Ethernet Bridging: To be supplied.
Fade Margin: The greatest tolerable reduction in average received signal strength that will be anticipated
under most conditions. It provides an allowance for reduced signal strength due to multipath, slight antenna
movement or changing atmospheric losses. A fade margin of 20 to 30 dB is usually sufficient in most systems.
FPGA: Field Programmable Gate Array
Frame: A segment of data that adheres to a specific data protocol and contains definite start and end points.
It provides a method of synchronizing transmissions.
Hardware Flow Control: A feature used to prevent data buffer overruns when the unit is handling
high-speed data from an RTU or PLC. When the buffer approaches overflow, the unit drops the
clear-to-send (CTS) line, which instructs the RTU or PLC to delay further transmission until CTS again
returns to the high state.
Host Computer: The computer installed at the master unit, which controls the collection of data from one
or more remote sites.
IP: Internet Protocol
LAN: Local Area Network
LED: Light Emitting Diode
mA: Milliamperes
MAC: Media Access Control
Poll: A request for data issued from the host computer (or master PLC) to a Remote unit.
PLC (Programmable Logic Controller): A dedicated microprocessor configured for a specific applica-
tion with discrete inputs and outputs. It can serve as a host or as an RTU.
PPM: Parts per Million
Programmable Logic Controller: See PLC.
Remote Terminal Unit: See RTU.
RTS: Request-to-send
RTU: Remote Terminal Unit. A data collection device installed at a Remote unit site.
RX: Abbreviation for “Receive.”
Signal-to-Noise Ratio: See SNR.
SCADA (Supervisory Control And Data Acquisition): An overall term for the functions commonly pro-
vided through a multiple address radio system.
SCEP: Simple Certificate Enrollment Protocol. A scalable protocol for networks based on digital certifi-
cates, which can be requested by users without the need for assistance or manual intervention from a system
administrator.
SNR (Signal-to-Noise ratio): A measure of how well the signal is being received at a radio relative to noise
on the channel.
SSH: Secure Shell protocol for a network that allows users to open a window on a local PC and connect to
a remote PC as if they were present at the remote.
SSID (Service Set Identifier): A name that identifies a particular 802.11wireless LAN.
Supervisory Control And Data Acquisition: See SCADA.
Telnet: A terminal emulation protocol that enables an Internet user to communicate with a Remote device
for management activities as if it were locally connected to a PC.
TX: Abbreviation for “Transmit.”
WAN: Wide Area Network.
88MDS Orbit MCR Technical ManualMDS 05-6628A01, Rev. C
Page 97
5.0 APPENDIX A – DATA CONFIGURATION TREE
Current version matches with Firmware version 1.1.9.
The following is a hierarchical view of the data configuration tree for the unit. It is a composition of all
YANG files used by the unit.