Dissemination or reproduction of this document, or evaluation and communication of its contents, is not authorized except where
expressly permitted. Violations are liable for damages. All rights reserved, particularly for the purposes of patent application or
trademark registration.
This document contains proprietary information, which is protected by copyright. All rights are reserved. No part of this document may
be photocopied, reproduced or translated to another language without the prior written consent of RuggedCom Inc.
Disclaimer Of Liability
We have checked the contents of this manual against the hardware and software described. However, deviations from the description
cannot be completely ruled out.
RuggedCom shall not be liable for any errors or omissions contained herein or for consequential damages in connection with the
furnishing, performance, or use of this material.
The information given in this document is reviewed regularly and any necessary corrections will be included in subsequent editions.
We appreciate any suggested improvements. We reserve the right to make technical improvements without notice.
Registered Trademarks
RuggedServer™, RuggedWireless™, RuggedCom Discovery Protocol™ (RCDP™), RuggedExplorer™, Enhanced Rapid Spanning
Tree Protocol™ (eRSTP™), are trademarks of RuggedCom Inc. Rugged Operating System® (ROS®) and RuggedSwitch® are
registered trademarks of RuggedCom Inc. Other designations in this manual might be trademarks whose use by third parties for their
own purposes would infringe the rights of the owner.
Warranty
Five (5) years from date of purchase, return to factory. For warranty details, visit www.ruggedcom.com or contact your customer
service representative.
Contacting RuggedCom
Corporate HeadquartersUS HeadquartersEurope Headquarters
RuggedCom Inc.
This manual contains instructions, examples, guidelines, and general theory on how to use
the Rugged Operating System (ROS®) management software.
Supported Platforms
ROS® is designed to work on many RuggedCom product hardware platforms, ensuring
a consistent user experience when migrating from one product model to another. ROS®
supports the following RuggedCom products:
• RuggedSwitch® i800, i801, i802, and i803
• RuggedSwitch® RS8000 and RS1600
• RuggedSwitch® RS900/RS930 with both ‘L’ (EoVDSL) and ‘W’ (WLAN) port variants
• RuggedSwitch® RS900GP
• RuggedSwitch® RS900G/RS940G with Gigabit
• RuggedSwitch® RS950G
• RuggedSwitch® RS969/M969 waterproof with Gigabit
• RuggedSwitch® RSG2100/M2100, RSG2200/M2200, and RSG2300 modular switches with
Gigabit Ethernet
• RuggedSwitch® RSG2288 modular switch with Gigabit Ethernet, PTP (Precision Time
Protocol - IEEE 1588), GPS, and IRIG-B support
• RuggedServer™ RS416, RS910 and RS920 modular serial servers
• RuggedServer™ RS416v2 modular serial server with PTP and IRIG-B support
• RuggedServer™ RS400
• RuggedMC™ Media Converters RMC30 and RP110
Each product model has a subset of the entire ROS® feature set. This manual is intended for
use with the RMC30 product family and has been streamlined to only describe the relevant
features.
Who Should Use This User Guide
This guide is to be used by network technical support personnel who are familiar with the
operation of networks. Others who might find the book useful are network and system planners,
system programmers and line technicians.
How Chapters are organized
The index of this guide has been prepared with:
• Entries to each of the “Features” sections of the manual
• Entries to each of the “Troubleshooting” sections of the manual (located at the end of each
chapter)
• Entries to each of the Menus, organized by name
Document Conventions
This publication uses the following conventions:
ROS® v3.11User Guide9RMC30
Preface
Means reader take note. Notes contain helpful suggestions or references to
materials not contained in this guide.
It is recommended that you use this guide along with the following applicable documents:
• RMC30 Family Installation Guide
• RuggedCom Fiber Guide
• RuggedCom Wireless Guide
• White paper: Rapid Spanning Tree in Industrial Networks
Applicable Firmware Revision
This guide is applicable to ROS® software version 3.11.
Firmware/User Guide Version Numbering System
ROS® has a three-digit version numbering system of the form X.Y.Z where each digit is a
number starting from zero. The 'X.Y' digits represent the functional version of ROS® whereas
the 'Z' digit represents firmware patches. The 'X' digit is incremented for major functional
updates of the product. The 'Y' digit is incremented for minor functional updates of the product.
The 'Z' digit is incremented for bug fixes, cosmetic enhancements and other minor issues.
User guides follow the same format. In general, a user guide will have the same 'X.Y' digits
as the firmware to which it corresponds.
It is RuggedCom's policy to provide Web access to only the latest 'patch' release for a version
of firmware. If you decide that an upgrade is merited, then getting all the fixes only makes
sense. It is for this reason that release notes are created detailing all patches for a given
functional version.
ROS® v3.11User Guide10RMC30
1. Administration
1. Administration
The Administration menu covers the configuration of administrative parameters of both device
and network (local services availability, security methods employed, system identification and
functionality related to the IP network):
• IP Address, Subnet Mask and Gateway Address (static or dynamically obtainable)
• Management VLAN
• Management Connection Inactivity Timeout
• TFTP Server Permissions
• System Identification
• Passwords
• Time-keeping
• SNMP Management
• Radius Server
• Remote Syslog
1.1. The ROS® User Interface
1.1.1. Using the RS232 Port to Access the User Interface
Attach a terminal (or PC running terminal emulation software) to the RS232 port. The terminal
should be configured for 8 bits, no parity operation at 57.6 Kbps. Hardware and software flow
control must be disabled. Select a terminal type of VT100.
Once the terminal is connected, restart the unit and press and hold <Ctrl-Z>. The following
will be printed:
“Console mode...
Type ‘yes’ if you want to enter console mode: ”
After typing 'yes', pressing any key on the keyboard will prompt for the user name and
password to be entered.
To prevent unauthorized access to the device, make sure to change the default
user, admin and guest passwords before commissioning the device.
The switch is shipped with a default administrator user name - “admin” - and password “admin”. Once successfully logged in, the user will be presented with the main menu.
1.1.2. The Structure of the User Interface
The user interface is organized as a series of menus with an escape to a command line
interface (CLI) shell. Each menu screen presents the switch name (as provided by the
System Identification parameter), Menu Title, Access Level, Alarms indicator, Sub-Menus and
Command Bar.
Sub-menus are entered by selecting the desired menu with the arrow keys and pressing the
enter key. Pressing the escape key returns you to the parent menu.
ROS® v3.11User Guide11RMC30
1. Administration
Figure 1.1. Main Menu With Screen Elements Identified
The command bar offers a list of commands that apply to the currently displayed menu. These
commands include:
• <Ctrl-Z> to display help on the current command or data item
• <Ctrl-S> to switch to the CLI shell
• <Ctrl-Up/Down> to jump to next/previous page of a status display
The main menu also provides a <Ctrl-X> command, which will terminate the session. This type
of menu is accessible via serial console, telnet session and SSH session.
1.1.3. Making Configuration Changes
When changing a data item, the user selects the data item by the cursor keys and then pressing
the enter key. The cursor will change position to allow editing of the data item.
Typing a new value after pressing enter always erases the old parameter value. The left and
right cursor keys can be used to position the edit point without erasing the old parameter value.
The up and down cursor keys can be used to cycle through the next higher and lower values
for the parameter.
After the parameter has been edited, press enter again to change other parameters. When
all desired parameters have been modified, press <Ctrl-A> to apply changes. The switch will
automatically prompt you to save changes when you leave a menu in which changes have
been made.
Some menus will require you to press <Ctrl-I> to insert a new record of information and <CtrlL> to delete a record.
ROS® v3.11User Guide12RMC30
1. Administration
1.1.4. Updates Occur In Real Time
All configuration and display menus present the current values, automatically updating if
changed from other user interface sessions or SNMP. All statistics menus will display changes
to statistics as they occur.
1.1.5. Alarm Indications Are Provided
Alarms are events for which the user is notified through the Diagnostics sub-menu. All
configuration and display menus present an indication of the number of alarms (in the upper
right hand corner of the screen) as they occur, automatically updating as alarms are posted
and cleared.
1.1.6. The CLI Shell
The user interface provides a Command Line Interface shell for operations that are more easily
performed at the command line. You may switch back and forth from the menu system and
shell by pressing <Ctrl-S>. For more information on the capabilities of the shell please refer
to Chapter 5, Using the CLI Shell.
1.2. The ROS® Secure Shell Server
1.2.1. Using a Secure Shell to Access the User Interface
SSH (Secure Shell) is a network protocol which provides a replacement for insecure remote
login and command execution facilities, such as telnet and remote shell. SSH encrypts traffic
in both directions, preventing traffic sniffing and password theft.
SSH protocol version 2 is implemented in ROS®. The authentication method is “keyboardinteractive” password authentication. A user logged in via SSH has the same privileges as
one logged in via the console port.
1.2.2. Using a Secure Shell to Transfer Files
ROS® implements an SFTP server via SSH to transfer files securely. The file system visible
on the RuggedSwitch® has a single directory. The files in it are created at startup time and
can be neither deleted nor renamed. Existing files can be downloaded from the switch. For
example, firmware images may be downloaded for backup and log files may be downloaded
for analysis. Some files may be overwritten by uploading a file of the same name to the switch,
as would be done in order to upgrade the firmware.
The implemented commands are:
dir/ls
list directory contents
get
download a file from the switch
put
upload a file to the switch
ROS® v3.11User Guide13RMC30
1. Administration
The files that may be overwritten via SFTP upload are:
main.bin
main ROS® firmware image
boot.bin
RuggedSwitch bootloader image
config.csv
ROS® configuration file
fpga.xsvf
FPGA configuration file
1.3. The ROS® Web Server Interface
1.3.1. Using a Web Browser to Access the Web Interface
A web browser uses a secure communications method called SSL (Secure Socket Layer) to
encrypt traffic exchanged with its clients. The web server guarantees that communications
with the client are kept private. If the client requests access via an insecure HTTP port, it will
be rerouted to the secure port. Access to the web server via SSL will be granted to a client
that provides a valid user name / password pair.
It can happen that upon connecting to the ROS® web server, a web browser may
report that it cannot verify the authenticity of the server's certificate against any of its
known certificate authorities. This is expected, and it is safe to instruct the browser to
accept the certificate. Once the browser accepts the certificate, all communications
with the web server will be secure.
Start a web browser session and open a connection to the switch by entering a URL that
specifies its host name or IP address. For example, in order to access the unit at its factory
default IP address, enter https://192.168.0.1. Once in contact with the switch, start the login
process by clicking on the “Login” link. The resulting page should be similar to that presented
below:
Figure 1.2. The ROS® log in page
To prevent unauthorized access to the device, make sure to change the default
user, admin and guest passwords before commissioning the device.
Enter the “admin” user name and the password for the admin user, and then click the
“LogIn” button. The switch is shipped with a default administrator password of “admin”. After
successfully logging in, the main menu appears.
ROS® v3.11User Guide14RMC30
1. Administration
1.3.2. Customizing the Login Page
To display a custom welcome message, device information or any other information on the
login page, add text to the “banner.txt” file. If the “banner.txt” file is empty, only the username
and password fields will appear on the login page.
For more information, see Section 6.1, “Files Of Interest”.
1.3.3. The Structure of the Web Interface
The user interface is organized as a series of linked web pages. The main menu provides the
links at the top level of the menu hierarchy and allows them to be expanded to display lowerlevel links for each configuration subsystem.
Figure 1.3. Main Menu via Web Server Interface
Every web page in the menu system has a common header section which contains:
• The System Name, as configured in the System Identification menu, is displayed in the top
banner, in between elements of the RuggedCom logo.
• A “Log out” link at left and immediately below the banner, terminates the current web session.
• A “Back” link at left and below “Log out” links back to the previously viewed page.
• The menu title, in the center of the page and below the banner, is a link to a context-sensitive
help page.
• The access level, e.g. “access admin”, is displayed by default at the right of the page and
below the banner. If, however, any alarms are pending, the text will be replaced with a link
which displays the number of pending alarms. Following this link displays a table of pending
alarms.
Figure 1.4. Web Page Header Showing Alarms Link
ROS® v3.11User Guide15RMC30
1. Administration
1.3.4. Making Configuration Changes
When changing a data item, the user selects the data item by selecting the field to edit with
the mouse, entering a new value and clicking on the apply field. More than one parameter
may be modified at a time.
Figure 1.5. Parameters Form Example
Some menus will require you to create or delete new records of information.
1.3.5. Updating Statistics Displays
You may click the refresh button to update statistics displays.
1.4. Security Recommendations
To prevent unauthorized access to the device, note the following security recommendations:
• Do not connect the RMC30 directly to the Internet. The device should be protected by
appropriate security appliances.
• Replace the default passwords for the standard admin, operator and guest profiles before
the device is deployed.
• Use strong passwords. For more information about creating strong passwords, refer to the
password requirements in Section 1.10, “Passwords”.
1.5. Administration Menu
The Administration menu provides ability to configure network and switch administration
parameters.
ROS® v3.11User Guide16RMC30
1. Administration
Figure 1.6. Administration Menu
1.6. IP Interfaces
These parameters provide the ability to configure IP connection parameters, such as address,
network, and mask. Only one IP interface can be configured.
You can choose from the following IP Address types: Static, DHCP, BOOTP, and Dynamic.
The Static IP Address type refers to the manual assignment of an IP address. The DHCP,
BOOTP, and Dynamic IP Address types refer to the automatic assignment of an IP address.
DHCP is widely used in LAN environments to dynamically assign IP addresses from a
centralized server, which reduces the overhead of administrating IP addresses.
BOOTP is a subset of the DHCP protocol. ROS® supports the transfer of a BOOTFILE via
BOOTP. The BOOTFILE represents any valid ROS® file, such as config.csv. The name of the
BOOTFILE on the BOOTP server must match the corresponding ROS® file.
The Dynamic IP Address type refers to a combination of the BOOTP and DHCP protocols.
Starting with BOOTP, the system tries BOOTP and DHCP in a round-robin fashion until it
receives a response from the corresponding server.
On non-management interfaces, only static IP addresses can be assigned.
On the management interface, the user can choose from the following IP Address types:
Static, DHCP, BOOTP and Dynamic. Static IP Address type refers to the manual assignment
of an IP address while DHCP, BOOTP and Dynamic IP Address types refer to the automatic
assignment of an IP address.
DHCP is widely used in LAN environments to dynamically assign IP addresses from a
centralized server, which reduces the overhead of administrating IP addresses.
ROS® v3.11User Guide17RMC30
1. Administration
BOOTP is a subset of the DHCP protocol. ROS® supports the transfer of a BOOTFILE via
BOOTP. The BOOTFILE represents any valid ROS® file such as config.csv. The name of
BOOTFILE on the BOOTP server must match the corresponding ROS® file.
The Dynamic IP Address type refers to a combination of the BOOTP and DHCP protocols.
Starting with BOOTP, the system will try BOOTP and DHCP in a round-robin fashion until it
receives a response from the corresponding server.
You can use the ROS® web interface to change the IP Address Type of the
management interface from Static to DHCP. However, after doing so, you cannot
use the web interface to change the IP Address Type back to Static and set an IP
address. If you need to change the IP Address Type of the management interface
from DHCP to Static, configure the setting through a telnet, SSH, RSH, or serial
port connection, or upload a new configuration file to the device.
Specifies whether the IP address is static or is dynamically assigned via DHCP or BOOTP.
The Dynamic option automatically switches between BOOTP and DHCP until it receives
a response from the relevant server. The Static option must be used for non-management
interfaces.
IP Address
Synopsis: ###.###.###.### where ### ranges from 0 to 255
Default: 192.168.0.1
Specifies the IP address of this device. An IP address is a 32-bit number that is notated by
using four numbers from 0 through 255, separated by periods. Only a unicast IP address
is allowed, which ranges from 1.0.0.0 to 233.255.255.255.
Subnet
Synopsis: ###.###.###.### where ### ranges from 0 to 255
Default: 255.255.255.0
Specifies the IP subnet mask of this device. An IP subnet mask is a 32-bit number that is
notated by using four numbers from 0 through 255, separated by periods. Typically, subnet
mask numbers use either 0 or 255 as values (e.g. 255.255.255.0) but other numbers can
appear.
1.7. IP Gateways
These parameters provide the ability to configure gateways. A maximum of 10 gateways can
be configured. When both the Destination and Subnet fields are both 0.0.0.0 (displayed as
blank space), the gateway is a default gateway.
ROS® v3.11User Guide18RMC30
1. Administration
Figure 1.7. IP Gateways Form
Destination
Synopsis: ###.###.###.### where ### ranges from 0 to 255
Default: 0.0.0.0
Specifies the IP address of the destination device. An IP address is a 32-bit number that
is notated by using four numbers from 0 through 255, separated by periods.
Subnet
Synopsis: ###.###.###.### where ### ranges from 0 to 255
Default: 0.0.0.0
Specifies the IP subnet mask of the destination. An IP subnet mask is a 32-bit number
that is notated by using four numbers from 0 through 255, separated by periods. Typically,
subnet mask numbers use either 0 or 255 as values (e.g. 255.255.255.0) but other
numbers can appear.
Gateway
Synopsis: ###.###.###.### where ### ranges from 0 to 255
Default: 0.0.0.0
Specifies the gateway IP address. The gateway address must be on the same IP subnet
as this device.
The default gateway configuration will not be changed when resetting all
configuration parameters to defaults.
1.8. IP Services
These parameters provide the ability to configure properties for IP services provided by the
device.
ROS® v3.11User Guide19RMC30
1. Administration
Figure 1.8. IP Services Form
Inactivity Timeout
Synopsis: 1 to 60 or { Disabled }
Default: 5 min
Specifies when the console will timeout and display the login screen if there is no user
activity. A value of zero disables timeouts for console and Telnet users. For Web Server
users maximum timeout value is limited to 30 minutes.
Limits the number of Telnet sessions. A value of zero prevents any Telnet access.
Web Server Users Allowed
Synopsis: 1 to 16
Default: 16
Limits the number of simultaneous web server users.
TFTP Server
Synopsis: { Disabled, Get Only, Enabled }
Default: Disabled
As TFTP is a very insecure protocol, this parameter allows the user to limit or disable TFTP
Server access.
DISABLED - disables read and write access to TFTP Server
GET ONLY - only allows reading of files via TFTP Server
ENABLED - allows reading and writing of files via TFTP Server
ModBus Address
Synopsis: 1 to 254 or { Disabled }
Default: Disabled
Determines the Modbus address to be used for Management through Modbus.
The system identification is displayed in the sign-on screen and in the upper left hand corner
of all ROS® screens.
Figure 1.9. System Identification Form
System Name
Synopsis: Any 19 characters
Default: System Name
The system name is displayed in all ROS® menu screens. This can make it easier to
identify the switches within your network, provided that all switches are given a unique
name.
Location
Synopsis: Any 49 characters
Default: Location
The location can be used to indicate the physical location of the switch. It is displayed in
the login screen as another means to ensure you are dealing with the desired switch.
Contact
Synopsis: Any 49 characters
Default: Contact
The contact can be used to help identify the person responsible for managing the switch.
You can enter name, phone number, email, etc. It is displayed in the login screen so that
this person may be contacted, should help be required.
ROS® v3.11User Guide21RMC30
1. Administration
1.10. Passwords
These parameters provide the ability to configure parameters for authorized and authenticated
access to the device's services (HMI via Serial Console, Telnet, SSH, RSH, Web Server).
Access to the switch can be authorized and authenticated via RADIUS or TACACS+ servers,
or using locally configured passwords that are configured per user name and access level.
Note that access via the Serial Console is authorized first using local settings. If a local match
is not found, RADIUS/TACACS+ will be used if enabled. For all other services, if RADIUS
or TACACS+ is enabled for authentication and authorization, but is unreachable, the local
settings will be used if configured.
To access the unit, the user name and password must be provided.
Three user names and passwords can be configured. They correspond to three access levels,
which provide or restrict access to change settings and execute various commands within the
device.
• guest users can view most settings, but may not change settings or run commands
• operator cannot change settings, but can reset alarms, clear statistics and logs
• admin user can change all the settings and run commands
To prevent unauthorized access to the device, make sure to change the default
user, admin and guest passwords before commissioning the device.
When creating a new password, it should adhere to the following rules:
• Must not be less than 6 characters in length.
• Must not include the username or any 4 continous alphanumeric characters found in
the username. For example, if the username is Subnet25, the password may not be
subnet25admin or subnetadmin. However, net25admin or Sub25admin is permitted.
• Must have at least one alphabetic character and one number. Special characters are
permitted.
• Must not have more than 3 continuously incrementing or decrementing numbers. For
example, Sub123 and Sub19826 are permitted, but Sub12345 is not.
An alarm will generate if a weak password is configured. The weak password alarm can
be disabled by user. For more information about disabling alarms, refer to Section 4.1.4,
Password authentication can be performed using locally configured values, a remote
RADIUS server, or a remote TACACS+ server. Setting this value to one of the
combinations that includes RADIUS or TACACS+ requires that the Security Server Table
be configured.
• Local - authentication from the local Password Table
• RADIUS - authentication using a RADIUS server
• TACACS+ - authentication using a TACACS+ server
• RADIUSOrLocal - authentication using RADIUS. If the server cannot be reached,
authenticate from the local Password Table.
• TACACS+OrLocal - authentication using TACACS+. If the server cannot be reached,
authenticate from the local Password Table
Guest Username
Synopsis: 15 character ASCII string
Default: guest
Related password is in the Guest Password field; view only, cannot change settings or
run any commands.
Guest Password
Synopsis: 15 character ASCII string
Default: guest
Related user name is in the Guest Username field; view only, cannot change settings or
run any commands.
ROS® v3.11User Guide23RMC30
1. Administration
Confirm Guest Password
Synopsis: 15 character ASCII string
Default: None
Confirm the input of the above Guest Password.
Operator Username
Synopsis: 15 character ASCII string
Default: operator
Related password is in the Oper Password field; cannot change settings; can reset alarms,
statistics, logs, etc.
Operator Password
Synopsis: 15 character ASCII string
Default: operator
Related user name is in the Oper Username field; cannot change settings; can reset
alarms, statistics, logs, etc.
Confirm Operator Password
Synopsis: 15 character ASCII string
Default: None
Confirm the input of the above Operator Password.
Admin Username
Synopsis: 15 character ASCII string
Default: admin
Related password is in the Admin Password field; full read/write access to all settings and
commands.
Admin Password
Synopsis: 15 character ASCII string
Default: admin
Related user name is in the Admin Username field; full read/write access to all settings
and commands.
Confirm Admin Password
Synopsis: 15 character ASCII string
Default: None
Confirm the input of the above Admin Password.
1.11. System Time Management
ROS® running on the RMC30 offers the following time-keeping and time synchronization
features:
• Local hardware time keeping and time zone management
• SNTP time synchronization
1.11.1. Configuring System Time
The System Time Manager option within the ROS® Administration menu fully configures time
keeping functions on a ROS®-based device:
ROS® v3.11User Guide24RMC30
1. Administration
Figure 1.11. System Time Manager Menu
1.11.1.1. Configuring Time and Date
This menu configures the current time, date, time zone, and DST (Daylight Savings Time)
settings.
Figure 1.12. Time and Date Form
Time
Synopsis: HH:MM:SS
This parameter enables both the viewing and setting of the local time.
Date
Synopsis: MMM DD, YYYY
This parameter enables both the viewing and setting of the local date.
This setting enables the conversion of UTC (Universal Coordinated Time) to local time.
DST Offset
Synopsis: HH:MM:SS
Default:00:00:00
This parameter specifies the amount of time to be shifted forward/backward when DST
begins and ends. For example, for most of the USA and Canada, DST time shift is 1 hour
(01:00:00) forward when DST begins and 1 hour backward when DST ends.
This parameter specifies a rule for time and date when the transition between Standard
and Daylight Saving Time occurs.
• mm - Month of the year (01 - January, 12 - December)
• n - week of the month (1 - 1st week, 5 - 5th/last week)
• d - day of the week (0 - Sunday, 6 - Saturday)
• HH - hour of the day (0 - 24)
• MM - minute of the hour (0 - 59)
• SS - second of the minute (0 - 59)
Example: The following rule applies in most of the USA and Canada:
03.2.0/02:00:00 11.1.0/02:00:00
In the example, DST begins on the second Sunday in March at 2:00am, and ends on the
first Sunday in November at 2:00am.
Current UTC Offset
Synopsis: 0 s to 1000 s
Default: 34 s
Coordinated Universal Time (UTC) is a time standard based on International Atomic
Time (TAI) with leap seconds added at irregular intervals to compensate for the Earth's
slowing rotation. The Current UTC Offset parameter allows the user to adjust the difference
between UTC and TAI. The International Earth Rotation and Reference System Service
(IERS) observes the Earth's rotation and nearly six months in advance (January and July)
a Bulletin-C message is sent out, which reports whether or not to add a leap second in
the end of June and December.
Please note that change in the Current UTC Offset parameter will result in a temporary
disruption in the timing network.
ROS® v3.11User Guide26RMC30
1. Administration
1.11.1.2. Configuring NTP Service
ROS® may optionally be configured to refer periodically to a specified NTP server to correct
any accumulated drift in the on-board clock. ROS® will also serve time via SNTP to hosts
that request it.
Two NTP servers (primary and secondary) may be configured for the device. The primary
server is contacted first upon each attempt to update the system time. If the primary server
fails to respond, the secondary server is contacted. If either the primary or secondary server
fails to respond, an alarm is raised.
Figure 1.13. NTP Server List
Figure 1.14. NTP Server Form
Server
Synopsis: Primary, Secondary
This field displays the chosen NTP server. The remaining fields on this form correspond
to the chosen server.
IP Address
Synopsis: ###.###.###.### where ### ranges from 0 to 255
Default:
This parameter specifies the IP address of an (S)NTP server ((Simple) Network Time
Protocol); programming an address of '0.0.0.0' disables SNTP requests. This device is an
SNTP client which may connect to only one server. If a server address is programmed
then a manual setting of the time will be overwritten at the next update period.
Update Period
Synopsis: 1 to 1440
Default: 60 min
This setting determines how frequently the (S)NTP server is polled for a time update. If the
server cannot be reached, three attempts are made at one-minute intervals and then an
alarm is generated, at which point the programmed rate is resumed.
ROS® v3.11User Guide27RMC30
1. Administration
1.12. SNMP Management
ROS® supports Simple Network Management Protocol Versions 1 (SNMPv1), 2 (SNMPv2c),
and 3 (SNMPv3). SNMPv3 protocol provides secure access to devices by a combination of
authentication and packet encryption over the network. SNMPv3 security features include the
following:
• message integrity – ensures that a packet has not been tampered with in-transit.
• authentication – determines the message is from a valid source.
• encryption – scrambles the contents of a packet to prevent it from being seen by an
unauthorized source.
SNMPv3 provides security models and security levels. A security model is an authentication
strategy that is set up for a user and the group in which the user resides. A security level is
a permitted level of security within a security model. A combination of a security model and
security level will determine which security mechanism is employed when handling an SNMP
packet.
Note the following about the SNMPv3 protocol:
• each user belongs to a group.
• a group defines the access policy for a set of users.
• an access policy defines what SNMP objects can be accessed for: reading, writing and
creating notifications.
• a group determines the list of notifications its users can receive.
• a group also defines the security model and security level for its users.
Community is configured for protocols v1 and v2c. Community is mapped to the group and
access level with security name (which is configured as User name).
1.12.1. SNMP Users
These parameters provide the ability to configure users for the local SNMPv3 engine, along
with the community for SNMPv1 and SNMPv2c. Note that when employing the SNMPv1 or
SNMPv2c security level, the User Name maps the community name with the security group
and access level. Up to 32 entries can be configured.
Figure 1.15. SNMP User Table
ROS® v3.11User Guide28RMC30
1. Administration
Figure 1.16. SNMP User Form
Name
Synopsis: Any 32 characters
Default: initial
The name of the user. This user name also represents the security name that maps this
user to the security group.
IP Address
Synopsis: ###.###.###.### where ### ranges from 0 to 255
Default:
The IP address of the user's SNMP management station. If IP address is configured, SNMP
requests from that user will be verified by IP address as well. SNMP Authentication trap
will be generated to trap receivers if request was received from this user, but from any
other IP address. If IP address is empty, traps can not be generated to this user, but SNMP
requests will be served for this user from any IP address.
v1/v2c Community
Synopsis: Any 32 characters
Default:
The community string which is mapped by this user/security name to the security group if
security model is SNMPv1 or SNMPv2c. If this string is left empty, it will be assumed to
be equal to the same as user name.
Auth Protocol
Synopsis: { noAuth, HMACMD5 }
Default: noAuth
An indication of whether messages sent on behalf of this user to/from SNMP engine, can
be authenticated, and if so, the type of authentication protocol which is used.
Priv Protocol
Synopsis: { noPriv, CBC-DES }
ROS® v3.11User Guide29RMC30
1. Administration
Default: noPriv
An indication of whether messages sent on behalf of this user to/from SNMP engine can
be protected from disclosure, and if so, the type of privacy protocol which is used.
Auth Key
Synopsis: 31 character ASCII string
Default:
The secret authentication key (password) that must be shared with SNMP client. if the key
is not an emtpy string, it must be at least 6 characters long.
Confirm Auth Key
Synopsis: 31 character ASCII string
Default:
The secret authentication key (password) that must be shared with SNMP client. if the key
is not an emtpy string, it must be at least 6 characters long.
Priv Key
Synopsis: 31 character ASCII string
Default:
The secret encription key (password) that must be shared with SNMP client. if the ke is
not an emtpy string, it must be at least 6 characters long.
Priv Key
Synopsis: 31 character ASCII string
Default:
The secret encription key (password) that must be shared with SNMP client. if the ke is
not an emtpy string, it must be at least 6 characters long.
1.12.2. SNMP Security to Group Maps
Entries in this table map configuration of security model and security name (user) into a group
name, which is used to define an access control policy. Up to 32 entries can be configured.
The Security Model that provides the name referenced in this table.
Name
Synopsis: Any 32 characters
Default:
The user name which is mapped by this entry to the specified group name.
Group
Synopsis: Any 32 characters
Default:
The group name to which the security model and name belong. This name is used as an
index to the SNMPv3 VACM Access Table.
1.12.3. SNMP Access
These parameters provide the ability to configure access rights for groups.To determine
whether access is allowed, one entry from this table needs to be selected and the proper view
name from that entry must be used for access control checking. View names are predefined:
• noView - access is not allowed
• V1Mib - SNMPv3 MIBs excluded
• allOfMibs - all supported MIBs are included.
ROS® v3.11User Guide31RMC30
1. Administration
Figure 1.19. SNMP Access Table
Figure 1.20. SNMP Access Form
Group
Synopsis: Any 32 characters
Default:
The group name to which the security model and name belong. This name is used as an
index to the SNMPv3 VACM Access Table.
The minimum level of security required in order to gain the access rights allowed by this
entry. A security level of noAuthNoPriv is less than authNoPriv, which is less than authPriv.
This parameter identifies the MIB tree(s) to which this entry authorizes access for
notifications. If the value is noView, then access for notifications will not be granted.
1.13. RADIUS
RADIUS (Remote Authentication Dial In User Service) is used to provide centralized
authentication and authorization for network access. ROS® assigns a privilege level of Admin,
Operator or Guest to a user who presents a valid user name and password. The number of
users who can access the ROS® server is ordinarily dependent on the number of user records
which can be configured on the server itself. ROS® can also, however, be configured to pass
along the credentials provided by the user to be remotely authenticated by a RADIUS server. In
this way, a single RADIUS server can centrally store user data and provide authentication and
authorization service to multiple ROS® servers needing to authenticate connection attempts.
1.13.1. RADIUS overview
RADIUS (described in RFC 2865 [http://tools.ietf.org/html/rfc2865]) is a UDP-based protocol
used for carrying authentication, authorization, and configuration information between a
Network Access Server which desires to authenticate its links and a shared Authentication
Server.
A RADIUS server can act as a proxy client to other RADIUS servers or other kinds of
authentication servers.
Unlike TACACS+, authorization and authentication functionality is supported by RADIUS in
the same packet frame. TACACS+ actually separates authentication from authorization into
separate packets.
On receiving an authentication-authorization request from a client in an “Access-Request”
packet, the RADIUS server checks the conditions configured for received username-password
combination in the user database. If all the conditions are met, the list of configuration values
for the user is placed into an “Access-Accept” packet. These values include the type of service
(e.g. SLIP, PPP, Login User) and all the necessary values to deliver the desired service.
1.13.2. User Login Authentication and Authorization
A RADIUS server can be used to authenticate and authorize access to the device's services,
such as HMI via Serial Console, Telnet, SSH, RSH, Web Server (see Password Configuration).
ROS® implements a RADIUS client which uses the Password Authentication Protocol (PAP)
to verify access. Attributes sent to a RADIUS server are:
ROS® v3.11User Guide33RMC30
1. Administration
• user name
• user password
• service type: Login
• vendor specific, currently defined as the following:
vendor ID: RuggedCom Inc. enterprise number (15004) assigned by the Internet Assigned
Numbers Authority (IANA)
string, sub-attribute containing specific values:
subtype: 1 (vendor's name subtype)
length: 11 (total length of sub-attribute of subtype 1)
ASCII string “RuggedCom”
Two RADIUS servers (Primary and Secondary) are configurable per device. If the Primary
Server is not reachable, the device will automatically fall back to the Secondary server to
complete the authorization process.
The vendor specific attribute is used to determine the access level from the server, which may
be configured at the RADIUS server with the following information:
• Vendor ID: RuggedCom Inc. enterprise number (15004) assigned by Internet Assigned
Numbers Authority (IANA)
• Sub-attribute Format: String
• Vendor Assigned Sub-Attribute Number: 2
• Attribute value – any one of: admin, operator, guest
If no access level is received in the response packet from the server then no access
will be granted to the user
An Example of a RuggedCom Dictionary for a FreeRADIUS server:
Sample entry for user “admin” Adding Users:
admin Auth-Type := Local, User-Password == “admin”
RuggedCom-Privilege-level = “admin”
ROS® v3.11User Guide34RMC30
1. Administration
1.13.3. Radius Server Configuration
Figure 1.21. RADIUS Server Summary
Figure 1.22. RADIUS Server Form
Server
Synopsis: Any 8 characters
Default: Primary
This field tells whether this configuration is for a primary or a backup server
ROS® v3.11User Guide35RMC30
1. Administration
IP Address
Synopsis: ###.###.###.### where ### ranges from 0 to 255
Default:
The RADIUS server IP Address.
Auth UDP Port
Synopsis: 1 to 65535
Default: 1812
The authentication UDP Port on the RADIUS server.
Auth Key
Synopsis: 31 character ASCII string
Default: None
The authentication key shared with the RADIUS server. It is used to encrypt any passwords
that are sent between the switch and the RADIUS server.
Confirm Auth Key
Synopsis: 31 character ASCII string
Default: None
Confirm input of the above authentication key.
1.14. TACACS+
TACACS+ (Terminal Access Controller Access-Control System Plus) is a TCP-based access
control protocol that provides authentication, authorization and accounting services to routers,
network access servers and other networked computing devices via one or more centralized
servers. It is based on, but is not compatible with, the older TACACS protocol. TACACS+
has generally replaced its predecessor in more recently built or updated networks, although
TACACS and XTACACS are still used on many older networks. Note that RuggedCom's
TACACS+ client implementation always has encryption enabled.
1.14.1. User Login Authentication and Authorization
A TACACS+ server can be used to authenticate and authorize access to the device's services,
such as HMI via Serial Console, Telnet, SSH, RSH, Web Server (see Password Configuration).
User name and Password are sent to the configured TACACS+ Server.
Two TACACS+ servers (Primary and Secondary) are configurable per device. If the primary
server is not reachable, the device will automatically fall back to the secondary server to
complete the authorization process.
ROS® v3.11User Guide36RMC30
1. Administration
1.14.2. TACACS+ Server Configuration
Figure 1.23. TACACS+ Server Summary
Figure 1.24. TACACS+ Server Form
Server
Synopsis: Any 8 characters
Default: Primary
This field indicates whether this configuration is for a primary or a backup server.
ROS® v3.11User Guide37RMC30
1. Administration
IP Address
Synopsis: ###.###.###.### where ### ranges from 0 to 255
Default:
The TACACS+ server IP Address.
Auth TCP Port
Synopsis: 1 to 65535
Default: 49
The authentication TCP Port on the TACACS+ server.
Auth Key
Synopsis: 31 character ASCII string
Default:
The authentication key shared with the TACACS+ server. It is used to encrypt any
passwords that are sent from the switch to the TACACS+ server.
Confirm Auth Key
Synopsis: 31 character ASCII string
Default: None
Confirm input of the above authentication key.
1.14.3. User Privilge Level Configuartion
The TACACS+ standard priv_lvl attribute is used to grant access to the device. By default, the
attribute uses the following ranges:
• priv_lvl=15 represents an access level of “admin”
• 1 < priv_lvl < 15 (any value from 2 to 14) represents an access level of “operator”
• priv_lvl=1 represents an access level of “guest”
You can also configure a different non-default access level for admin, operator or guest users.
If an access level is not received in the response packet from the server, access
is not be granted to the user.
1.14.4. TACACS+ Server Privilege Configuration
Figure 1.25. TACACS+ Server Privilege Form
ROS® v3.11User Guide38RMC30
1. Administration
Admin Priv
Synopsis: (0 to 15)-(0 to 15)
Default: 15
Privilege level to be assigned to the user.
Oper Priv
Synopsis: (0 to 15)-(0 to 15)
Default: 2-14
Privilege level to be assigned to the user.
Guest Priv
Synopsis: (0 to 15)-(0 to 15)
Default: 1
Privilege level to be assigned to the user.
1.15. Syslog
The syslog provides users with the ability to configure local and remote syslog connections.
The remote syslog protocol, defined in RFC 3164, is a UDP/IP-based transport that enables a
device to send event notification messages across IP networks to event message collectors,
also known as syslog servers. The protocol is simply designed to transport these event
messages from the generating device to the collector.
The syslog client resides in ROS® and supports up to 5 collectors (syslog servers). ROS®
Remote Syslog provides the ability to configure:
• IP address(es) of collector(s).
• Source UDP port.
• Destination UDP port per collector.
• Syslog source facility ID per collector (same value for all ROS® modules).
• Filtering severity level per collector (in case different collectors are interested in syslog
reports with different severity levels).
1.15.1. Configuring Local Syslog
The local syslog configuration enables users to control what level of syslog information will
be logged. Only messages of a severity level equal to or greater than the configured severity
level are written to the syslog.txt file in the unit.
The severity of the message that has been generated. Note that the severity level selected
is considered the minimum severity level for the system. For example, if ERROR is
selected, the system sends any syslog messages generated by Error, Critical, Alert and
Emergency.
1.15.2. Configuring Remote Syslog Client
Figure 1.27. Remote Syslog Client Form
UDP Port
Synopsis: 1025 to 65535 or { 514 }
Default: 514
The local UDP port through which the client sends information to the server(s).
ROS® v3.11User Guide40RMC30
1. Administration
1.15.3. Configuring the Remote Syslog Server
Figure 1.28. Remote Syslog Server Table
Figure 1.29. Remote Syslog Server Form
IP Address
Synopsis: ###.###.###.### where ### ranges from 0 to 255
Default:
Syslog server IP Address.
UDP Port
Synopsis: 1025 to 65535 or { 514 }
Default: 514
The UDP port number on which the remote server listens.
Syslog Facility is an information field associated with a syslog message. The syslog facility
is the application or operating system component that generates a log message. ROS®
maps all syslog logging information onto a single facility, which is configurable to facilitate
a remote syslog server.
The severity level is the severity of the generated message. Note that the selected severity
level is accepted as the minimum severity level for the system. For example, if the severity
level is set as “Error”, then the system sends any syslog message generated by Error,
Critical, Alert and Emergency events.
1.16. Troubleshooting
Problem One
I have configured the IP address and a gateway. I am pinging the switch but it is not responding.
I am sure the switch is receiving the ping because its port LEDs are flashing and the statistics
menu shows the pings. What is going on?
Is the switch being pinged through a router? If so, the switch gateway address must be
configured. The following figure illustrates the problem.
Figure 1.30. Using A Router As A Gateway
The router is configured with the appropriate IP subnets and will forward the ping from the
workstation to the switch. When the switch responds, however, it will not know which of its
interfaces to use in order to reach the workstation and will drop the response. Programming a
gateway of 10.0.0.1 will cause the switch to forward unresolvable frames to the router.
This problem will also occur if the gateway address is not configured and the switch tries to
raise an SNMP trap to a host that is not on the local subnet.
ROS® v3.11User Guide42RMC30
2. Serial Protocols
2. Serial Protocols
RuggedCom devices support the following serial protocols:
• Raw Socket serial encapsulation
• Preemptive Raw Socket
• TCPModbus (client and server modes)
• DNP 3
• DNP packetization over Raw Socket
• Microlok
• WIN and TIN
• Mirrored Bits
• TelnetComPort (RFC2217)
2.1. Serial Protocols Overview
Serial interface bit rates can be configured in range of 100 to 230400 bps. A "turnaround"
time is supported to enforce minimum times between successive messages transmitted via
a serial port.
If a port is set to force half-duplex mode, while sending data, all received data will be discarded.
To set this mode, the port must natively work in full-duplex mode.
To transport protocol messages through the network, either TCP/IP or UDP/IP transport can
be used. The exception is the TCPModbus protocol, which cannot be employed over UDP.
The setting of Differentiated Services Code Point (DSCP) in the IP header is provided for TCP/
IP and UDP/IP transport in the egress direction only.
Debugging facilities include statistics and tracing information on a serial port and/or network
transport.
2.1.1. Raw Socket protocol features
• A means to transport streams of characters from one serial port, over an IP network to
another serial port.
• XON/XOFF flow control.
• Configurable local and remote IP port numbers per serial port.
• Many-to-many UDP transactions.
• TCP accept or request connection mode.
• Point-to-point TCP connection mode and a broadcast connection mode in which up to 64
remote servers may connect to a central server.
• Packetization and sending data on a specific packet size, a specific character, or upon a
timeout.
• Configurable “turnaround” time to enforce minimum time between messages sent out the
serial port.
2.1.2. DNP over Raw Socket protocol features
• Packetization and sending data per DNP 3 protocol specification.
ROS® v3.11User Guide43RMC30
2. Serial Protocols
2.1.3. Preemptive Raw Socket protocol features
• A means to transport streams of characters from one serial port, over an IP network, to
another serial port.
• Configurable local and remote IP port numbers per serial port.
• TCP accept or request one permanent connection on configured IP address.
• TCP accept one dynamic connection from different IP address.
• Dynamic connection activity timer controlled.
• XON/XOFF flow control for permanent connection.
• ‘Packetization’ trigger based on a specific packet size, a specific character, or upon a timeout
for each connection.
2.1.4. Modbus protocol features
• Operation in TCPModbus Server Gateway or Client Gateway mod.e
• Multi-master mode on the server.
• Configurable behavior for sending exceptions.
• Full control over ‘packetization’ timers.
• A configurable Auxiliary IP port number for applications that do not support port 502.
2.1.5. DNP protocol features
• ‘Packetization’ per protocol specification.
• CRC checking in message headers received from the serial port.
• Local and remote source address learning.
2.1.6. Microlok protocol features
• ‘Packetization’ per protocol specification.
2.1.7. WIN protocol features
• ‘Packetization’ following the protocol requirements.
• CRC checking for messages received from the serial port.
2.1.8. TIN protocol features
• Support for two modes of TIN protocol.
• ‘Packetization’ following the protocol requirements.
• CRC checking for messages received from the serial port.
• Remote source address learning, specific for two different modes.
2.1.9. TelnetComPort protocol features
• RawSocket protocol with additional support for the serial break signal.
• Compliant with RFC2217.
ROS® v3.11User Guide44RMC30
2. Serial Protocols
2.2. Serial Protocols Operation
2.2.1. Serial Encapsulation Applications
2.2.1.1. Character Encapsulation (Raw Socket)
Character encapsulation is used any time a stream of characters must be reliably transported
across a network.
Character streams can be created by any type of device. The baud rates supported at either
server need not be the same. If configured, the server will obey XON/XOFF flow control from
the end devices.
Figure 2.1. Character Encapsulation
2.2.1.2. RTU Polling
The following applies to a variety of RTU protocols, including Modbus ASCII and DNP.
If a given device or service employs a serial protocol that is supported by ROS®,
it is advised to configure ROS® to use that particular protocol, rather than another
one (e.g. RawSocket) that can be made to be (partly) compatible.
Host equipment may connect directly to a RuggedServer™ via a serial port, may use a port
redirection package, or may connect natively to the (Ethernet / IP) network.
Figure 2.2. RTU Polling
ROS® v3.11User Guide45RMC30
2. Serial Protocols
If a RuggedServer™ is used at the host end, it will wait for a request from the host, encapsulate
it in an IP Datagram and send it to the remote side. There, the remote RuggedServer will
forward the original request to the RTU. When the RTU replies the RuggedServer will forward
the encapsulated reply back to the host end.
RuggedServer maintains configurable timers to help decide if replies and requests are
complete.
RuggedServer also handles the process of line-turnaround when used with RS485. It is
important to mention that unsolicited messages from RTUs in half-duplex mode cannot be
supported reliably. Message processing time includes sending a message over RS485, a
packtimer and a turnaround time. In order to handle half-duplex mode reliably, the turnaround
time must be configured long enough to allow an expected response to be received. Any other
messages will not be sent to the RS485 line within the processing time. If such a message is
received from the network, it will be delayed. It is up to the application to handle polling times
on ports properly.
2.2.1.3. Broadcast RTU Polling
Broadcast polling allows a single host-connected RuggedServer to “fan-out” a polling stream
to a number of remote RTUs.
The host equipment connects via a serial port to a RuggedServer. Up to 64 remote
RuggedServers may connect to the host server via the network.
Figure 2.3. Broadcast RTU Polling
Initially, the remote servers establish connections with the host server. The host server is
configured to accept a maximum of three incoming connections.
The host sequentially polls each RTU. Each poll received by the host server is forwarded (i.e.
broadcast) to all of the remote servers. All RTUs receive the request and the appropriate RTU
issues a reply. The reply is returned to the host server, where it is forwarded to the host.
ROS® v3.11User Guide46RMC30
2. Serial Protocols
2.2.1.4. Preemptive Raw Socket
Figure 2.4. Permanent and Dynamic Master Connection Support
Most SCADA protocols are master/slave and support only a single master device. Preemptive
Raw Socket offers the ability to have multiple masters communicate to RTUs/IEDs in a
protocol-independent manner. For example, the SCADA master polling device is the normal
background process collecting data from the RTUs/IEDs on permanent TCP connection.
Occasionally, RTU/IED maintenance configuration or control may be required from a different
master (on dynamic TCP connection).
This feature allows a dynamic master to automatically preempt a permanent master. A
connection request from the dynamic master would cause the permanent master to be
suspended. Either closing the dynamic connection or timing out on data packets causes the
permanent master session to be resumed.
The diagram, Permanent and Dynamic Master Connection Support shows the case where
all RTUs are connected to Preemptive Raw Socket ports of RuggedServer devices. The
permanent master is connected to the Raw Socket port of the RuggedServer. Raw Socket
is configured to be connected to all Preemptive Raw Socket ports where polled RTUs are
connected (multiple incoming connection). Preemptive Raw Socket configuration on all ports
connected to RTUs will point to that Raw Socket as a permanent master (IP address and
Remote IP port).
A dynamic master can establish a connection to any Preemptive Raw Socket port at any time
and temporarily suspend the polling process (until the dynamic connection is cleared or times
out).
ROS® v3.11User Guide47RMC30
2. Serial Protocols
2.2.1.5. Use of Port Redirectors
Port redirectors refer to software packages that emulate the existence of serial
communications ports. The redirector software creates and makes these “virtual” serial ports
available, providing access to the network via a TCP connection.
When a software package uses one of the virtual serial ports, a TCP connection request is
sent to a remote IP address and IP port that have been programmed into the redirector. Some
redirectors also offer the ability to accept connection requests.
The RawSocket protocol is the one most frequently used on RuggedServer for connection
to serial port redirection software. The TelnetComPort protocol may be used in place of
RawSocket if the redirection software on the other end of the connection also supports
the serial break command, as defined in RFC2217. In TelnetComPort mode, a serial break
received from the remote RFC2217-compatible client will be transmitted as a serial break on
the configured serial port, and a break signal received on the serial port will be transmitted as
an RFC2217-compatible break signal to the remote client. Note that a break signal on a serial
port is defined as a condition where the serial data signal is in 'space', or logic zero, state for
longer than the time needed to transmit one whole character, including start and stop bits.
2.2.1.6. Message Packetization
The serial server buffers received characters into packets in order to improve network
efficiency and demarcate messages.
The server uses three methods to decide when to packetize and forward the buffered
characters to the network:
• Packetize on a specific character.
• Packetize on timeout.
• Packetize on a specific packet size.
If configured to packetize on a specific character, the server will examine each received
character and will packetize and forward upon receiving the configured character. The
character is usually a <CR> or an <LF> character but may be any 8 bit (0 to 255) value.
If configured to packetize on a timeout, the server will wait for a configurable time after receiving
a character before packetizing and forwarding. If another character arrives during the waiting
interval, the timer is restarted. This method allows characters transmitted as part of an entire
message to be forwarded to the network in a single packet, when the timer expires after
receiving the very last character of the message.
Some polling software packages which perform well under DOS have been known
to experience problems when used with Windows-based software or port redirection
software. If the OS does not expedite the transmission of characters in a timely
fashion, pauses in transmission can be interpreted as the end of a message.
Messages can be split into separate TCP packets. A locally attached RuggedServer
or a port redirector could packetize and forward the message incorrectly. Solutions
include tuning the OS to prevent the problem or increasing the packetizing timer.
Finally, the server will always packetize and forward on a specific packet size, i.e. when the
number of characters received from the serial port reaches a configured value.
ROS® v3.11User Guide48RMC30
2. Serial Protocols
2.2.2. Modbus Server and Client Applications
The Modbus Server and Client applications are used to transport Modus requests and
responses across IP networks.
The Modbus Client application accepts Modbus polls from a master and determines the
IP address of the corresponding RTU. The client then encapsulates the message in TCP
respecting TCPModbus protocol, and forwards the frame to a Server Gateway or native
TCPModbus RTU. Returning responses are stripped of their TCP headers and issued to the
master.
The Modbus Server application accepts TCP encapsulated TCPModbus messages from
Client Gateways and native masters. After removing the TCP headers, the messages are
issued to the RTU. Responses are TCP encapsulated and returned to the originator.
The following figure presents a complex network of Client Gateways, Server Gateways and
native TCPModbus devices.
Figure 2.5. Modbus Client and Server
2.2.2.1. TCPModbus Performance Determinants
The following description provides some insight into the possible sources of delay and error
in an end-to-end TCPModbus exchange.
ROS® v3.11User Guide49RMC30
2. Serial Protocols
Master
Clien
t
Gateway
Server
Gateway
RTU
Trans
mission time from
Master to Client Gateway
Network transmission time
Transmission time from
Server Gateway to RTU
RTU "think" and transmission
timesto Server Gateway
Network transmission time
Transmission time from
ClientGateway to Master
Queuing time
1
5
8
6
3
b
3
a
4
2
9b
9a
9
d
9
c
7
Time-out / Retransmissions
complete, Exception sent
1
a
Figure 2.6. Sources of Delay and Error in an End-to-End Exchange
In step 1, the master issues a request to the Client Gateway. If the Client Gateway validates
the message, it will forward it to the network as step 2.
The Client Gateway can respond immediately in certain circumstances, as shown in step 1a.
When the Client Gateway does not have a configuration for the specified RTU, it will respond
to the master with an exception using TCPModbus exception code 11 (“No Path”). When the
Client Gateway has a configured RTU but the connection is not yet active, it will respond to
the master with an exception using TCPModbus exception code 10 (“No Response”). If the
forwarding of TCPModbus exceptions is disabled, the client will not issue any responses.
Steps 3a and 3b represent the possibility that the Server Gateway does not have a
configuration for the specified RTU. The Server Gateway will always respond with a type 10
(“No Path”) in step 3a, which the client will forward in step 3b.
Step 4 represents the possibility of a queuing delay. The Server Gateway may have to queue
the request while it awaits the response to a previous request. The worst case occurs when a
number of requests are queued for an RTU that has gone off-line, especially when the server
is programmed to retry the request upon failure.
Steps 5-8 represent the case where the request is responded to by the RTU and is forwarded
successfully to the master. It includes the “think time” for the RTU to process the request and
build the response.
Step 9a represents the possibility that the RTU is off-line, the RTU receives the request in
error or that the Server Gateway receives the RTU response in error. The Server Gateway will
issue an exception to the originator. If sending exceptions has not been enabled, the Server
Gateway will not send any response.
ROS® v3.11User Guide50RMC30
2. Serial Protocols
2.2.2.2. A Worked Example
A network is constructed with two masters and 48 RTUs on four Server Gateways. Each of the
masters is connected to a Client Gateway with a 115.2 Kbps line. The RTUs are restricted to
9600 bps lines. The network is Ethernet-based and introduces an on average 3 ms of latency.
Analysis of traces of the remote sites has determined that the min/max RTU think times were
found to be 10/100 ms. What time-out should be used by the master?
The maximum length of a Modbus message is 256 bytes. This leads to a transmission time of
about 25 ms at the Master and 250 ms at the RTU. Under ideal circumstances, the maximum
round trip time is given by: 25 ms (Master->client) + 3 ms (network delay) + 250 ms (server>RTU) + 100 ms (Think time) + 250 ms (RTU->server) + 3 ms (network delay) + 25 ms (client>Master). This delay totals about 650 ms.
Contrast this delay with that of a “quick” operation such as reading a single register. Both
request and response are less than 10 bytes in length and complete (for this example) in 1
and 10 ms at the client and server. Assuming the RTU responds quickly, the total latency will
approach 35 ms.
The server can already be busy sending a request when the request of our example arrives.
Using the figures from the above paragraph, the server being busy would increase the endto-end delay from 650 to 1250 ms (additional 250 ms (server->RTU) + 100 ms (Think time)
+ 250 ms (RTU->server)).
The preceding analysis suggests that the Master should time-out at some time after 1250 ms
from the start of transmission.
2.2.2.3. Use of Turnaround Delay
Modbus protocol uses the concept of a turnaround delay in conjunction with broadcast
messages. When the host sends a broadcast message (that does not invoke an RTU
response), it waits for a turnaround delay time. This delay ensures that the RTU has enough
time to process the broadcast message before it receives the next poll.
When polling is performed over TCP, network delays may cause the broadcast and next poll
to arrive at the remote server at the same time. Configuring a turnaround delay at the server
will enforce a minimum separation time between each message transmitted via the serial port.
Note that turnaround delays do not need to be configured at the host computer side and may
be disabled there.
2.2.3. DNP 3.0, Microlok, TIN and WIN Applications
RuggedServer supports a variety of protocols that specify source and destination addresses.
A destination address specifies which device should process the data, and the source address
specifies which device sent the message. Having both destination and source addresses
satisfies at least one requirement for peer-to-peer communication because the receiver knows
where to direct responses. Each device supporting one of these protocols must have a unique
address within the collection of devices sending and receiving messages to and from each
other.
ROS® v3.11User Guide51RMC30
2. Serial Protocols
Figure 2.7. Source/Destination Two-Way Communication
Even if the protocol can distinguish between the server and client sides, RuggedServer does
not do so. Both sides need to know where on the network a given destination device is. If a
message is received from the network, the destination address must point to the serial port
on the receiving server. If a message is received from the local serial port, the destination
address must point to the IP address of the server where the addressed device is connected.
2.2.3.1. The Concept of Links
A communication link is established between two IP addresses. The addressing is described
below:
• The remote address is the source IP address in a message received over the network, and
also the destination address of a message received from a serial port and transmitted on
the network.
• The local address is the destination IP address in a message received over the network,
and also the source address of a message received from a serial port and transmitted on
the network.
For each link, a statistical record will be available to the user if link statistics collection is
enabled in the protocol configuration.
2.2.3.2. Address Learning
2.2.3.2.1. Address Learning for TIN
Address learning is implemented for the TIN protocol and learned entries are viewable in the
Dynamic Device Address Table.
ROS® v3.11User Guide52RMC30
2. Serial Protocols
Address Learning for TIN Mode 1
When a message with an unknown source address is received from the IP network, it is learned
on the IP address and IP port. If a message with the same source address is received from
another IP address and/or IP port, the address will be relearned.
The aging time will be reset whenever a unicast TIN message is received from a particular
source address.
The address will be removed from the table when the aging time expires.
Address Learning for TIN Mode 2
When a message with an unknown source address is received from the IP network, it is learned
on the IP address. If a message with the same source address is received from another IP
address and/or IP port, it will be learned again, and another entry will be created in the Dynamic
Device Address Table (TIN addresses will be duplicated).
Aging time will be reset whenever a unicast TIN message is received from a particular source
address.
The address will be removed from the table when the aging time expires.
2.2.3.2.2. Address Learning for DNP
For the DNP protocol, both the local and remote concepts of address learning are
implemented. Source addresses are learned from messages received from the network for
specific IP Addresses. Source addresses from messages received from the serial ports are
learned for specific local serial ports.
Although the DNP protocol can be configured for TCP or UDP transport, UDP transport is used
during the address learning phase as it supports all types of IP addresses: unicast, multicast
and broadcast.
When a message with an unknown source address is received from the local serial port, the
address is learned on that port and the local IP address.
When a message with an unknown source address is received from the IP network, on IP
interface that is configured as learning interface, it is learned on the IP address of the sender
and serial port is unknown.
When a message with an unknown destination address is received from a serial port, a UDP
broadcast datagram is transmitted on the UDP port configured for the DNP protocol. The IP
interface that transmits this broadcast is the one configured as the learning interface.
When a message with an unknown destination address is received from the IP network, it is
sent to all DNP serial ports.
All learned addresses will be kept in the Device Address Table until they are active. They
will also be saved in non-volatile memory and recovered if the device reboots, so the
learning process does not have to be repeated because of, for example, an accidental power
interruption.
The aging timer is reset whenever a message is received or sent to the specified address.
This concept makes the DNP protocol configurable with the minimum number of parameters:
an IP port, a learning IP interface and an aging timer.
Addresses 65521 through 65535 are DNP 3.0 broadcast addresses. RuggedServer supports
broadcasts sending messages with those destination addresses received from serial ports to
all IP Addresses found in the Device Address Table (either learned or statically configured).
When a DNP broadcast message is received from the IP network, it will be distributed to all
ports configured to support the DNP protocol.
TIN Broadcast Messages
TIN broadcast messages can be received only from devices connected to the serial ports.
TIN Mode 1 Broadcast Messages
These messages will be sent to all TIN Address/Ports found in the Dynamic Address Table.
TIN Mode 2 Broadcast Messages
These messages will be sent according to the configuration: to all TIN addresses on every IP
address found in the Dynamic Address Table and/or to all Wayside Data Radio IP addresses
found in the Static Device Address Table.
2.2.3.3. Transport Protocols
For supported protocols, with exception of Modbus, either UDP datagram or TCP connection
packets can be used to transport protocol data over the IP network. The Modbus data can be
transported only using TCP connection, following TCPModbus protocol. UDP supports all the
addressing modes of IP – unicast, multicast and broadcast. Therefore, if address learning is
enabled, UDP broadcasts will be sent across the network.
2.2.3.3.1. Transport for Raw Socket
The TCP transport for RawSocket requires configuration of connection request direction,
remote IP address, and IP port for listening or requesting outgoing TCP connections. Only
one outgoing connection can be requested, but up to 64 connections can be accepted if the
port is configured to listen to incoming connection requests. For ports configured to request
connections and to listen to incoming connection requests, only one connection can become
active.
RuggedServer will attempt to connect periodically if the first attempt fails and after a connection
is broken.
RuggedServer can be used to connect to any device supporting TCP (e.g. a host computer’s
TCP stack or a serial application on a host using port redirection software).
If Raw Socket ports are configured to use UDP for transport, up to 64 remote hosts can
communicate with devices connected to local serial ports. Data in UDP packets from remote
hosts configured to communicate with a particular serial port will be forwarded to that port, as
long as the serial port is configured to listen on the UDP port to which the remote hosts are
transmitting. Data received from the serial port will be forwarded to all remote hosts configured
to communicate with that serial port.
ROS® v3.11User Guide54RMC30
2. Serial Protocols
The Raw Socket mechanism transparently passes data. It does not attempt to determine
where to demarcate packets in the data received from connected devices. Given this
transparency, any protocol can be encapsulated within Raw Socket.
2.2.3.3.2. Transport for Protocols with Defined Links
All protocols with defined links (source and destination addresses are part of protocol) can
use either TCP or UDP to transport data.
The Device Address Table contains addresses and locations of devices configured (or learned)
for specific protocols.
If a protocol is configured to use TCP to transport data, the server will start listening to the
IP Port configured for the protocol. At the same time, TCP connections will be placed to all
IP addresses where devices for that protocol are attached. RuggedServer will keep only one
connection open to one IP Address on one IP Port.
2.2.3.3.3. Use of Differentiated Services Code Point (DSCP)
RuggedServer has the ability to set the DS byte in the IP header of outbound IP packets.
The value can be configured on an ingress serial port, and/or for a protocol. Which value will
be used depends on the protocol configured on a port and the transport configured for the
particular protocol.
UDP/IP transport supports a DSCP setting per serial port or per protocol. If a configuration
contains a DSCP setting per serial port as well as per protocol then the system will use
whichever setting has a higher DSCP value.
TCP/IP transport supports per protocol DSCP setting. RawSocket and Modbus Server protocol
properties are configured per port as well, so they always support DSCP setting per serial port.
2.2.4. Force Half-Duplex Mode of Operation
A "force half-duplex" mode of operation allows use of extensions that create echo loops (as
optical loop topology that utilizes the RMC20 repeat mode function).
Figure 2.8. Optical Loop Topology
ROS® v3.11User Guide55RMC30
2. Serial Protocols
The diagram: Optical Loop Topology illustrates a topology that utilizes the RMC20 repeat
mode function. The repeat function will optically retransmit any data received on the optical
receiver, in addition to any connected serial devices. As a result, any data transmitted from
the master will be retransmitted optically to all the slaves.
This topology can be used for RS232, RS485, or RS422 multi-drop networks. In all cases, all
slaves have the repeat function (DIP position 4) ON, while the one connected to the RMC30 is
configured with the repeat function OFF. The port used on the RMC30 must be in full-duplex
mode, while the ForceHD (Force Half-Duplex) parameter must be turned ON.
2.3. Serial Protocol Configuration
The Serial Protocols menu is accessible from the main menu:
Figure 2.9. Serial Protocols Menu
ROS® v3.11User Guide56RMC30
2. Serial Protocols
2.3.1. Serial Ports
Figure 2.10. Serial Port Table
Figure 2.11. Serial Port Configuration Form
Port
Synopsis: 1 to maximum port number
Default: 1
The port number as seen on the front plate silkscreen of the switch.
Name
Synopsis: Any 15 characters
ROS® v3.11User Guide57RMC30
2. Serial Protocols
Default: Port 1
A descriptive name that may be used to identify the device connected on that port.
The serial protocol supported on this serial port.
Type
Synopsis: { RS232, RS485, RS422 }
Default: RS232
The serial port interface type.
ForceHD
Synopsis: { On, Off }
Default: Off
Enables forcing half-duplex mode of operation. While sending data out of the serial port, all
received data are ignored. This mode of operation is available only on ports that operate
in full-duplex mode.
Baud
Synopsis: 100 to 230400
Default: 9600
The baud rate at which to operate the port.
Data Bits
Synopsis: { 7, 8 }
Default: 8
The number of data bits to operate the port with.
Stop
Synopsis: { 1, 1.5, 2 }
Default: 1
The number of stop bits to operate the port with.
Parity
Synopsis: { None, Even, Odd }
Default: None
The parity to operate the port with.
Turnaround
Synopsis: 0 to 1000
Default: 0 ms
The amount of delay (if any) to insert between the transmissions of individual messages
via the serial port. For Modbus protocol this value must be non-zero. It represents the delay
between sending a brodcast message and the next poll out of the serial port. Because
RTUs do not reply to a broadcast, enough time must be ensured to process it.
ROS® v3.11User Guide58RMC30
2. Serial Protocols
PostTX Delay
Synopsis: 0 to 15
Default: 15 bits
The number of data bits needed to generate required delay with configured baudrate after
the last bit of the packet was sent out before serial UART starts listening to the RX line.
This value is relevant for RS485 interfaces only.
Hold Time
Synopsis: 1 to 15000 ms or { off }
Default: off
The maximum amount of time, in milliseconds, that the serial packet can be held in the
queue before being sent to the serial line. Time is measured from the moment the packet
is received from the IP layer.
DSCP
Synopsis: 0 to 63
Default: 0
Sets the DS byte in the IP header. DS byte setting is supported in the egress direction only.
RXtoTX Delay
Synopsis: 0 ms to 1000 ms
Default: 0 ms
The minimum amount of time, in milliseconds, that the transmission of a new message
delays after the last message is received through the serial port. This parameter is
especially useful for half duplex transmission modes, such as the two-wire RS485 serial
protocol. It provides the connected device with time to turn off its transmitter and to turn on
its receiver, helping to ensure that the device receives the next message without data loss.
2.3.2. Raw Socket
Figure 2.12. Raw Socket Table
ROS® v3.11User Guide59RMC30
2. Serial Protocols
Figure 2.13. Raw Socket Form
Port
Synopsis: 1 to maximum port number
Default: 1
The port number as seen on the front plate silkscreen of the switch.
Pack Char
Synopsis: 0 to 255 or { Off }
Default: Off
The character that can be used to force forwarding of accumulated data to the network.
If a packetization character is not configured, accumulated data will be forwarded based
upon the packetization timeout (Pack Timer) parameter.
Pack Timer
Synopsis: 3 to 1000
Default: 10 ms
The delay from the last received character until when data is forwarded.
Pack Size
Synopsis: 64 to 1400 or { Maximum }
Default: Maximum
The maximum number of bytes received from the serial port to be forwarded.
Flow Control
Synopsis: { None, XON/XOFF }
Default: None
The Flowcontrol setting for serial port.
ROS® v3.11User Guide60RMC30
2. Serial Protocols
Transport
Synopsis: { TCP, UDP }
Default: TCP
The network transport used to transport protocol data over IP network.
Call Dir
Synopsis: { In, Out, Both }
Default: In
The Call direction for TCP Tranport.
• Whether to accept an incoming connection or
• to place an outgoing connection or
• to place outgoing connection and wait for incomming (both directions).
Max Conns
Synopsis: 1 to 64
Default: 1
The maximum number of allowed incoming TCP connections (for configurations using
TCP).
Loc Port
Synopsis: 1024 to 65535
Default: 50000
The local IP port to use when listening for an incoming connection or UDP data.
Rem Port
Synopsis: 1 to 65535
Default: 50000
The remote TCP port to use when placing an outgoing connection. Note that this parameter
is applicable only to TCP connections. If the transport protocol is set to UDP, the remote
port is configured using the "Remote Hosts" table. For more information, see the Remote
Hosts section.
IP Address
Synopsis: ###.###.###.### where ### ranges from 0 to 255 or { }
Default:
For direction: 'Out' (client), the remote IP address to use when placing an outgoing TCP
connection request.
For direction: 'In' (server), the local interface IP address on which to listen for connection
requests. An empty string implies the default: the IP address of the management interface.
For direction: 'Both' (client or server), the remote IP address to use when placing an
outgoing TCP connection request. The listening interface will be chosen by matching mask.
Note that this parameter is applicable only to TCP connections. If the transport protocol
is set to UDP, the remote port is configured using the "Remote Hosts" table. For more
information, see the Remote Hosts section.
Link Stats
Synopsis: { Disabled, Enabled }
Default: Enabled
Enables link statistics collection for the protocol.
ROS® v3.11User Guide61RMC30
2. Serial Protocols
2.3.3. Remote Hosts
Figure 2.14. Remote Hosts Table
Figure 2.15. Remote Hosts Form
IP Address
Synopsis: ###.###.###.### where ### ranges from 0 to 255
Default:
The IP address of the remote host.
IP Port
Synopsis: 1 to 65535 or { Unknown }
Default: 50000
The IP port that remote host listens to. If this is zero (Unknown), the unit only receives from
the remote host but does not transmit to it.
Port(s)
Synopsis: Any combination of numbers valid for this parameter
Default: All
The local serial ports that the remote host is allowed to communicate with.
ROS® v3.11User Guide62RMC30
2. Serial Protocols
2.3.4. Preemptive Raw Socket
Figure 2.16. Preemptive Raw Socket Table
Figure 2.17. Preemptive Raw Socket Form
Port
Synopsis: 1 to 4
ROS® v3.11User Guide63RMC30
2. Serial Protocols
Default: 1
The port number as seen on the front plate silkscreen of the switch.
Pack Char
Synopsis: 0 to 255 or { Off }
Default: Off
The character that can be used to force forwarding of accumulated data to the network.
If a packetization character is not configured, accumulated data will be forwarded based
upon the packetization timeout parameter.
Pack Timer
Synopsis: 3 to 1000
Default: 10 ms
The delay from the last received character until when data is forwarded.
Flow Control
Synopsis: { None, XON/XOFF }
Default: None
The Flowcontrol setting for serial port.
Loc Port
Synopsis: 1024 to 65535
Default: 62001
The local IP port to use when listening for an incoming connection or UDP data.
Rem Port
Synopsis: 1 to 65535
Default: 62000
The remote TCP port to use when placing an outgoing connection.
IP Address
Synopsis: ###.###.###.### where ### ranges from 0 to 255 or
{ <EMTY STRING> }
Default:
The permanent master's IP address. Empty string represents management IP address of
this device.
Link Stats
Synopsis: { Disabled, Enabled }
Default: Enabled
Enables link statistics collection for this protocol.
Dyn Pack Char
Synopsis: 0 to 255 or { Off }
Default: Off
The character that can be used to force the forwarding of accumulated data to the
network for connection to a dynamic master. If a packetization character is not configured,
accumulated data will be forwarded based upon the packetization timeout parameter.
Dyn Pack Timer
Synopsis: 3 to 1000
Default: 10 ms
ROS® v3.11User Guide64RMC30
2. Serial Protocols
The delay from the last received character until when data is forwarded to the dynamic
master.
Timeout
Synopsis: 10 to 3600
Default: 10 s
The time in seconds that is allowed for a dynamic master to be idle before its connection
is closed. The protocol listens to the socket open to the dynamic master, and if no data
are received within this time, the connection will be closed.
2.3.5. Modbus Server
Figure 2.18. Modbus Server Table
Figure 2.19. Modbus Server Form
Port
Synopsis: 1 to maximum port number
ROS® v3.11User Guide65RMC30
2. Serial Protocols
Default: 1
The port number as seen on the front plate silkscreen of the switch.
Response Timer
Synopsis: 50 to 10000
Default: 1000 ms
The maximum allowable time to wait for the RTU to start to respond.
Auxiliary TCP Port
Synopsis: 1024 to 65535 or { Disabled }
Default: Disabled
The TCP Modbus Server always listens on TCP port 502. It may be additionally configured
to listen on this auxiliary port number, accepting calls on both.
Send Exceptions
Synopsis: { Disabled, Enabled }
Default: Enabled
This parameter enables/disables sending a TCP Modbus exception back to the master if
a response has not been received from the RTU within expected time.
Link Stats
Synopsis: { Disabled, Enabled }
Default: Enabled
Enables link statistics collection for this protocol.
2.3.6. Modbus Client
Figure 2.20. Modbus Client Form
IP Port
Synopsis: 1 to 65535
Default: 502
ROS® v3.11User Guide66RMC30
2. Serial Protocols
The remote port number at which the Modbus protocol makes TCP connection requests.
Forward Exceptions
Synopsis: { Disabled, Enabled }
Default: Enabled
Enables forwarding exception messages to the Master as exception codes 10 (no path) or
11 (no response) When the Master polls for an unconfigured RTU or the remote Modbus
Server receives a poll for an RTU which is not configured or is timing out, it returns an
exception message. Disable this feature if your Master does not support exceptions but
recognizes failure by time-out when waiting for response.
Link Stats
Synopsis: { Disabled, Enabled }
Default: Enabled
Enables link statistics collection for this protocol.
DSCP
Synopsis: 0 to 63
Default: 0
To set the DS byte in the IP header. DS byte setting is supported in the egress direction
only.
2.3.7. WIN and TIN
Figure 2.21. WIN and TIN Form
ROS® v3.11User Guide67RMC30
2. Serial Protocols
TIN Mode:
Synopsis: 1 to 2
Default: 1
The TIN Protocol running mode.
TIN Transport:
Synopsis: { TCP, UDP }
Default: UDP
The network transport used to transport protocol data over an IP network.
WIN Transport:
Synopsis: { TCP, UDP }
Default: UDP
The network transport used to transport protocol data over an IP network.
TIN IP Port
Synopsis: 1024 to 65535
Default: 51000
The local port number on which the TIN protocol listens for connections or UDP datagrams.
WIN IP Port
Synopsis: 1024 to 65535
Default: 52000
The local port number on which the WIN protocol listens for connections or UDP
datagrams.
Message Aging Timer
Synopsis: 1 to 3600 or { Disabled }
Default: Disabled
The Aging Time for TIN mode2 messages. It specifies how long a message should be
stored in the internal table. When the feature is enabled, any TIN mode2 message received
will be stored in an internal table which can be examined by using command 'SQL SELECT
FROM ItcsTin2Dup'. If the same message is received within the time window specified by
this parameter, the new message is considered duplicate, and thus discarded.
Address Aging Timer
Synopsis: 60 to 1000
Default: 300 s
The time of communication inactivity after which a learned TIN address is removed from
the device address table. Entries in the Link Statistics Table with the aged address will be
kept until statistics are cleared.
The device address table in which addresses will be found for unicast messages.
Link Stats
Synopsis: { Disabled, Enabled }
Default: Enabled
Enables link statistics collection for this protocol.
WIN DSCP
Synopsis: 0 to 63
Default: 0
To set the DS byte in the IP header. DS byte setting is supported in the egress direction
only.
TIN DSCP
Synopsis: 0 to 63
Default: 0
To set the DS byte in the IP header. DS byte setting is supported in the egress direction
only.
2.3.8. MicroLok
Figure 2.22. MicroLok Form
Transport
Synopsis: { TCP, UDP }
Default: UDP
The network transport used to transport protocol data over an IP network.
IP Port
Synopsis: 1024 to 65535
Default: 60000
ROS® v3.11User Guide69RMC30
2. Serial Protocols
A local port number on which the MicroLok protocol listens for UDP datagrams or TCP
connections.
Link Stats
Synopsis: { Disabled, Enabled }
Default: Enabled
Enables link statistics collection for this protocol.
DSCP
Synopsis: 0 to 63
Default: 0
To set the DS byte in the IP header. DS byte setting is supported in the egress direction
only.
2.3.9. DNP
Figure 2.23. DNP Form
Transport
Synopsis: { TCP, UDP }
Default: TCP
The network transport used to transport protocol data over an IP network.
IP Port
Synopsis: 1024 to 65535
Default: 20000
A local port number on which the DNP protocol listens for UDP datagrams.
Remote UDP Port
Synopsis: { IP Port, Learn }
ROS® v3.11User Guide70RMC30
2. Serial Protocols
Default: IP Port
The IP port on which remote device listens to UDP datagrams. This port is either the same
IP port that devices in all networks listen to, or can be learned from the UDP datagram.
Learning
Synopsis: ###.###.###.### where ### ranges from 0 to 255 or
{ Disabled }
Default: Disabled
Enable or disable address learning. Learning can be disabled or enabled on a management
IP interface (empty string), or enabled on the interface with a specific IP address. If learning
is enabled and the remote address is not known, a UDP broadcast message will be sent
and source addresses will be learned on devices that run the DNP protocol. If the local
address is not known, a message will be sent to all serial ports running the DNP protocol.
Local addresses will be learned from local responses. If the TCP transport is configured,
a connection will be established to the devices with the corresponding IP address.
Aging Timer
Synopsis: 60 to 1000
Default: 300 s
The time of communication inactivity after which a learned DNP address is removed from
the device address table. Entries in the Link Statistics Table with the aged address will be
kept until the statistics are cleared.
Link Stats
Synopsis: { Disabled, Enabled }
Default: Enabled
Enables link statistics collection for this protocol.
DSCP
Synopsis: 0 to 63
Default: 0
To set the DS byte in the IP header. DS byte setting is supported in the egress direction
only.
2.3.10. DNP over Raw Socket
Figure 2.24. DNP over Raw Socket Table
ROS® v3.11User Guide71RMC30
2. Serial Protocols
Figure 2.25. DNP over Raw Socket Form
Port
Synopsis: 1 to 4
Default: 1
The port number as seen on the front plate silkscreen on the switch.
Transport
Synopsis: { TCP, UDP }
Default: TCP
The network transport used to transport protocol data over the IP network.
Call Dir
Synopsis: { In, Out, Both }
Default: In
The Call direction for TCP Tranport.
• In: accepts an incoming connection.
• Out: places an outgoing connection.
• Both: places an outgoing connection and waits for as incomming connection (both
directions).
Max Conns
Synopsis: 1 to 64
Default: 1
The maximum number of allowed incoming TCP connections.
Loc Port
Synopsis: 1 to 65535
Default: 21001
The local IP port to use when listening for an incoming connection or UDP data.
ROS® v3.11User Guide72RMC30
2. Serial Protocols
Rem Port
Synopsis: 1 to 65535
Default: 21000
The remote TCP port to use when placing an outgoing connection.
IP Address
Synopsis: ###.###.###.### (where ### ranges from 0 to 255) |
{ <empty string> }
Default: <empty string>
Defines the IP address based on the following:
• For outgoing TCP connection (client), this is the remote IP address to communicate with.
• For incoming TCP connection (server), this is the local interface IP address to listen to
for the local port for connection request. If an empty string is configured, the IP address
of the management interface is used.
• When both outgoing and incoming connections are enabled (client or server), this is
remote IP address to use to place an outgoing TCP connection request or from which
to accept calls.
• For UDP transport, this is the IP address of the interface to listen to for UDP datagrams.
Link Stats
Synopsis: { Disabled, Enabled }
Default: Enabled
Enables links statistics collection for the protocol.
2.3.11. Mirrored Bits
Figure 2.26. Mirrored Bits Table
ROS® v3.11User Guide73RMC30
2. Serial Protocols
Figure 2.27. Mirrored Bits Form
Port
Synopsis: 1 to 4
Default: 1
The port number as seen on the front plate silkscreen of the switch.
Transport
Synopsis: { TCP, UDP }
Default: UDP
The network transport used to transport Mirrored Bits protocol data over an IP network.
Loc Port
Synopsis: 1024 to 65535
Default: 61001
The local IP port to use when listening for an incoming connection or UDP data.
Rem Port
Synopsis: 1 to 65535
Default: 61000
The remote TCP port to use when placing an outgoing connection.
IP Address
Synopsis: ###.###.###.### where ### ranges from 0 to 255 or
{ <EMPTY STRING> }
Default:
For an outgoing TCP connection (client) and UDP transport, this is the remote IP address
to communicate with.
For an incoming TCP connection (server), the local interface IP address on which to
listen for connection requests. An empty string implies the default: the IP address of the
management interface.
ROS® v3.11User Guide74RMC30
2. Serial Protocols
When both outgoing and incoming connections are enabled (client or server), this is the
remote IP address to which to place an outgoing TCP connection request or from which
to accept an incoming request.
Link Stats
Synopsis: { Disabled, Enabled }
Default: Enabled
Enables link statistics collection for this protocol.
2.3.12. TelnetComPort
Figure 2.28. TelnetComPort Form
Port
Synopsis: 1 to maximum port number
Default: 1
The serial port number as seen on the front plate silkscreen of the RuggedServer.
Pack Char
Synopsis: 0 to 255 or { Off }
Default: Off
ROS® v3.11User Guide75RMC30
2. Serial Protocols
The character that will be used to force the forwarding of buffered data to the network. If a
packetization character is not configured, buffered data will be forwarded based upon the
packetization timeout (Pack Timer) parameter.
Pack Timer
Synopsis: 5 to 1000
Default: 10 ms
The delay from the last received character until when data is forwarded to the dynamic
master.
Pack Size
Synopsis: 64 to 1400 or { Maximum }
Default: Maximum
When this number of bytes is received on the serial port, buffered characters received on
the port are packetized and forwarded on the network.
Flow Control
Synopsis: { None, XON/XOFF }
Default: None
The Flowcontrol setting for serial port.
Call Dir
Synopsis: { In, Out, Both }
Default: In
The Call direction for TCP Tranport.
• Whether to accept an incoming connection or
• to place an outgoing connection or
• to place outgoing connection and wait for incomming (both directions).
Loc Port
Synopsis: 1024 to 65535
Default: 50000
The local IP port to use when listening for an incoming connection.
Rem Port
Synopsis: 1 to 65535
Default: 50000
The remote TCP port to use when placing an outgoing connection. This parameter is
applicable only to TCP transport.
IP Address
Synopsis: ###.###.###.### where ### ranges from 0 to 255 or { }
Default:
For direction 'OUT' (client), remote IP address to use when placing an outgoing TCP
connection request. For direction 'IN' (server), local interface IP address to listen to the
local port for connection request. Empty string can be used for IP address of management
interface. For direction 'BOTH' (client or server), remote IP address to use when placing
an outgoing TCP connection requestListening interface will be chosen by matching mask.
This parameter is applicable only to TCP connections. If the transport protocol is set to
ROS® v3.11User Guide76RMC30
2. Serial Protocols
UDP, the remote port is configured using the "Remote Hosts" table. For more information,
see the Remote Hosts section.
Link Stats
Synopsis: { Disabled, Enabled }
Default: Enabled
Enables links statistics collection for this protocol.
The serial protocol supported on this serial port.
Address
Synopsis: Any 31 characters
Default:
The complete address of a device, which might be either local to the RuggedCom device
or remote.
A local address is one associated with a device connected to a serial port on this device.
The corresponding serial port must be configured to match this address specification.
A remote address is the address of a device connected to a serial port on a remote host
over an IP network. In this case, "Remote Ip Addr" must also be configured.
The format and range of this address field is determined by the protocol:
• Modbus: 1 to 244
• MicroLok: 1 to 65535, or 8 to hexadecimal digits ‘1’ to ‘a’
• DNP 3.0: 1 to 65520
• WIN: 6 bits address (0 to 63)
• TIN: String 'wdr' for wayside data radio (TIN mode 2), or a 32 bit address (8 digits,
expressed in hexadecimal digits '0' through 'f'). An all-zero address is not allowed.
Remote IP Addr
Synopsis: ###.###.###.### where ### ranges from 0 to 255
Default:
The IP address of a remote host where a device with a configured remote address is
connected.
Port
Synopsis: 1 to maximum port number or {Unknown}
Default: Unknown
The serial port to which a device is attached. If the device with this address is attached to
the serial port of a remote host, the value of this parameter is 'Unknown'.
Name
Synopsis: Any 16 characters
Default:
The addressed device name.
2.3.14. Dynamic Device Addresses
This table provides the ability to view the TIN protocol’s device addresses from remote
locations that were learned dynamically.
ROS® v3.11User Guide78RMC30
2. Serial Protocols
Figure 2.31. Dynamic Device Address Table
Figure 2.32. Dynamic Device Address Form
Protocol
Synopsis: { TIN }
The serial protocol supported on this serial port.
Address
Synopsis: Any 31 characters
The remote device address.
Location
Synopsis: ###.###.###.### where ### ranges from 0 to 255
The IP Address of the remote host.
IP Port
Synopsis: 1 to 65535
The remote port number from which a UDP datagram was received from a remote device,
or from which a TCP connection was established.
ROS® v3.11User Guide79RMC30
2. Serial Protocols
RSSI
Synopsis: -128 to 0 or { N/A }
The signal strength indicator received from wayside data radio. N/A for TIN Mode 1.
Aging Time
Synopsis: 0 to 1000
The amount of time since the last packet arrived from the device. Once this time exceeds
the Aging Timer setting for the protocol, the device will be removed from the table. This
value is updated every 10 seconds.
2.4. Serial Statistics
2.4.1. Link Statistics
This table presents detailed statistics for serial links between two devices.
The serial protocol supported by devices that create this link.
Local Address
Synopsis: Any 27 characters
The address of the device connected to the serial port on this device.
Remote Address
Synopsis: Any 35 characters
The address of the device connected to the remote host's serial port.
Rx Local
Synopsis: 0 to 4294967295
The number of packets received from the local address that were forwarded to the remote
side.
Rx Remote
Synopsis: 0 to 4294967295
The number of packets received from the local address that were forwarded to the local
serial port.
Erroneous
Synopsis: 0 to 4294967295
The number of erroneous packets received from the remote address.
2.4.2. Connection Statistics
This table presents statistics for all active TCP connections on serial protocols. The statistics
are updated once every second.
Figure 2.35. Connection Statistics Table
Remote IP
Synopsis: ###.###.###.### where ### ranges from 0 to 255
ROS® v3.11User Guide81RMC30
2. Serial Protocols
The remote IP address of the connection.
Remote Port
Synopsis: 0 to 65535
The remote port number of the connection.
Local Port
Synopsis: 0 to 65535
The local port number of the connection.
Rx Packets
Synopsis: 0 to 4294967295
The number of received packets on the connection.
Tx Packets
Synopsis: 0 to 4294967295
The number of packets transmitted on the connection.
2.4.3. Serial Port Statistics
Figure 2.36. Serial Port Statistics Table
Port
Synopsis: 1 to maximum port number
The port number as seen on the front plate silkscreen of the switch.
Protocol
Synopsis: Any 15 characters
The serial protocol supported on this serial port.
Rx Chars
Synopsis: 0 to 4294967295
The number of received characters.
Tx Chars
Synopsis: 0 to 4294967295
ROS® v3.11User Guide82RMC30
2. Serial Protocols
The number of transmitted characters.
Rx Packets
Synopsis: 0 to 4294967295
The number of received packets.
Tx Packets
Synopsis: 0 to 4294967295
The number of transmitted packets.
Packet Errors
Synopsis: 0 to 4294967295
The number of packets received from this port and discarded (error in protocol, CRC or
routing information not found).
Parity Errors
Synopsis: 0 to 4294967295
The number of Parity Errors.
Framing Errors
Synopsis: 0 to 4294967295
The number of Framing Errors.
Overrun Errors
Synopsis: 0 to 4294967295
The number of Overrun Errors.
2.4.4. Clearing Serial Port Statistics
Figure 2.37. Clear Serial Port Statistics Form
This command clears statistics on one or more serial ports. To clear statistics for one or more
ports, check the boxes corresponding to the selected ports and select "Apply".
ROS® v3.11User Guide83RMC30
2. Serial Protocols
2.4.5. Resetting Serial Ports
Figure 2.38. Reset Serial Port(s) Form
To reset one or more ports, check the boxes corresponding to the selected ports and select
"Apply".
2.5. Troubleshooting
Problem One
I configured a Serial IP connection to use the TCP transport (using either an inbound or
outbound connection) but nothing seems to be happening. What is going on?
Ensure that an Ethernet port link is up.
The peer may not be requesting (accepting) connections. The Connection Statistics Table will
display whether the connection is active or not.
The peer may not be sending data. The Connection statistics Table will display the counts of
transmitted and received data packets via the IP network.
Watch the connection activity. For a detailed description of the TCP connection activity, turn
on tracing at the TRANSPORT level.
Problem Two
My connections (as shown in the Connection Statistics Table) go up and then immediately go
down again. What is going on?
If two ports (on the same or different RuggedServers™) are configured to call the same IP/
TCP port in the network, only the first one to call will be successful. All other ports will fail,
displaying the attempts as brief periods of connection in the Connection Statistics Table.
Problem Three
My Modbus polling is not working. I am sure that a connection is occurring but my Master
reports an error connecting to the device. What is happening?
Are framing, parity or overrun errors reported by either the client or server?
Is the Server Gateway set up for the correct baud, parity and stop bits? Is the RTU online?
ROS® v3.11User Guide84RMC30
2. Serial Protocols
Is an adequate response timer configured at the server? Is the master’s timeout long enough?
Is the master pausing in the middle of transmitting the request? Some versions of the Windows
OS have been observed to display this behavior as the load is increased.
Could the IP network be splitting the Modbus message into two TCP segments?
Ultimately, it may be necessary to view the contents of messages transmitted over TCP (by
activating tracing at the IP level) or by viewing messages at the serial port level (See the section
on tracing at the SERIAL level.) Start by tracing at the client side, ensuring that it is receiving
and forwarding the request over IP. Then, if need be, trace at the server side to ensure that it
is receiving the request and forwarding to the RTU. Verify that the RTU is responding properly.
Problem Four
How do I get figures (like those presented earlier in the chapter) for my own analysis?
Activating tracing at the IP level and serial port level. The trace package displays timestamps,
packet sizes, message directions and timeout event occurrences.
ROS® v3.11User Guide85RMC30
3. Network Discovery
3. Network Discovery
ROS® supports the RCDP (the RuggedCom Discovery Protocol™) Layer 2 protocol for
automated network discovery.
RCDP™ (the RuggedCom Discovery Protocol™) is designed primarily for the initial
deployment of RuggedCom networking devices that have not been configured. In response to
RCDP commands and queries from an application such as RuggedExplorer™, which supports
RCDP, ROS® has the ability to:
• Enable or disable RCDP functionality
• Report its basic network configuration and other identifying information
• Respond to a basic set of control commands
• Perform basic device configuration
3.1. RCDP Operation
The purpose of the RuggedCom Discovery Protocol™ is to support the deployment of ROS®based devices that have not been configured since leaving the factory. ROS® devices that
have not been configured all have the default IP (Layer 3) address. Connecting more than one
of them on a Layer 2 network means that one cannot use standard IP-based configuration
tools to configure them. The behavior of IP-based mechanisms such as the web interface,
SSH, telnet, or SNMP will all be undefined.
Since RCDP operates at Layer 2, it can be used to reliably and unambiguously address
multiple devices even though they may share the same IP configuration.
RuggedCom's RuggedExplorer™ is a lightweight, standalone Windows application that
supports RCDP. It is capable of discovering, identifying and performing basic configuration of
ROS®-based devices via RCDP. The features supported by RCDP include:
• Discovery of ROS®-based devices over a Layer 2 network.
• Retrieval of basic network configuration, ROS® version, order code, and serial number.
• Control of device LEDs for easy physical identification.
• Configuration of basic identification, networking, and authentication parameters.
For security reasons, RuggedExplorer™ will attempt to disable RCDP on all devices when
RuggedExplorer is shut down. If RuggedExplorer™ is unable to disable RCDP on a device,
ROS® will automatically disable RCDP after approximately one hour of inactivity.
RCDP is not compatible with VLAN-based network configurations. For correct
operation of RuggedExplorer, no VLANs (tagged or untagged) must be configured.
All VLAN configuration items must be at their default settings.
ROS® responds to RCDP requests only. It does not under any circumstances
initiate any RCDP-based communication.
3.2. Network Discovery Menu
The main Network Discovery menu links to configuration menus for both LLDP and RCDP.
ROS® v3.11User Guide86RMC30
3. Network Discovery
Figure 3.1. Network Discovery Main Menu
3.2.1. RCDP Configuration
Figure 3.2. RCDP Parameters Form
RCDP Discovery
Synopsis: { Disabled, Enabled }
Default: Enabled
Disables/Enables Device Discovery through RuggedCom Proprietary RCDP.
ROS® v3.11User Guide87RMC30
4. Diagnostics
4. Diagnostics
ROS® provides the following diagnostics features:
• Alarm System to view and clear alarms
• Viewing and clearing the system log
• Viewing CPU diagnostics
• Viewing the product information
• Loading the factory default configuration
• Resetting the device
• Transferring Files
The Diagnostics menu is accessible from the main menu:
Figure 4.1. Diagnostics Menu
4.1. Using the Alarm System
Alarms are the occurrence of events of interest that are logged by the device. If alarms have
occurred, the device will indicate the number of alarms in the top right corner of all menu
screens.
There are two broad types of alarms - active and passive alarms.
4.1.1. Active Alarms
Active alarms are ongoing. They signify states of operation that are not in accordance with
normal operation. Examples of active alarms include links that should be up but are not or
error rates that are continuously exceeding a certain threshold.
Active alarms are removed (cleared) either by solving the original cause of the alarm or by
explicitly clearing the alarm itself.
ROS® v3.11User Guide88RMC30
4. Diagnostics
4.1.2. Passive Alarms
Passive alarms are historic in nature. They signify events that represented abnormal conditions
in the past, and do not affect the current operational status. Examples of passive alarms
include authentication failures or error rates that temporarily exceeded a certain threshold.
Passive alarms are cleared through the Clear Alarms option under the diagnostics menu.
RMON generated alarms are passive.
4.1.3. Alarms and the Critical Failure Relay
All active alarms will immediately de-energize the critical fail relay (thus signifying a problem).
The relay will be re-energized when the last outstanding active alarm is cleared.
Alarms are volatile in nature. All alarms (active and passive) are cleared at startup.
4.1.4. Configuring Alarms
ROS® provides a means for selectively configuring alarms in fine-grained detail. Some notes
on alarm configuration in ROS®:
• Alarms at levels CRITICAL or ALERT are not configurable nor can they be disabled.
• The "Level" field is read-only; the preconfigured alarm level is not a configurable option.
• Alarms cannot be added to or deleted from the system.
• Alarm configuration settings changed by a user will be saved in the configuration file.
• The "alarms" CLI command lists all alarms - configurable and non-configurable.
ROS® v3.11User Guide89RMC30
4. Diagnostics
Figure 4.2. Alarm Configuration Table
Figure 4.3. Alarm Configuration Form
Name
Synopsis: Any 34 characters
ROS® v3.11User Guide90RMC30
4. Diagnostics
Default: sys_alarm
The alarm name (e.g. as obtained via CLI:"alarms")
Severity level of alarm - refer to Level, above, for a detailed breakdown of the levels.
Time
Synopsis: MMM DD HH:MM
Time of first occurrence of the alarm.
Description
Synopsis: Any 127 characters
Description of the alarm; gives details about the frequency of the alarm if it has occurred
again since the last clear.
Alarms can be cleared from the Clear Alarms option.
4.2. Viewing CPU Diagnostics
Figure 4.5. CPU Diagnostics Form
ROS® v3.11User Guide92RMC30
4. Diagnostics
Running Time
Synopsis: DDDD days, HH:MM:SS
The length of time since the device was last powered on.
Total Powered Time
Synopsis: DDDD days, HH:MM:SS
The cumulative powered up time of the device.
CPU Usage
Synopsis: 0 to 100
The percentage of available CPU cycles used for device operation as measured over the
last second.
RAM Total
Synopsis: 0 to 4294967295
The total number of bytes of RAM in the system.
RAM Free
Synopsis: 0 to 429496729
The total number of bytes of RAM still available.
RAM Low Watermark
Synopsis: 0 to 4294967295
The total number of bytes of RAM that have not been used during the system runtime.
Temperature
Synopsis: -32768 to 32767 C
The temperature of the CPU board.
Free Rx Bufs
Synopsis: 0 to 4294967295
Free Rx Buffers.
Free Tx Bufs
Synopsis: 0 to 4294967295
Free Tx Buffers.
4.3. Viewing and Clearing the System Log
The system log records various events including reboots, user sign-ins, alarms and
configuration saves.
ROS® v3.11User Guide93RMC30
4. Diagnostics
Figure 4.6. Viewing the System Log
The system log will continue to accumulate information until it becomes full. There is enough
room in the file to accumulate logs for months or years under normal operation.
The Clear System Log option will clear the system log. Clearing the log is recommended after
a firmware upgrade.
4.4. Viewing Product Information
Figure 4.7. Product Information Form
MAC Address
Synopsis: ##-##-##-##-##-## where ## ranges 0 to FF
Shows the unique MAC address of the device.
ROS® v3.11User Guide94RMC30
4. Diagnostics
Order Code
Synopsis: Any 57 characters
Shows the order code of the device.
Classification
Synopsis: Any 15 characters
Provides system classification.
The value 'Controlled' indicates the main firmware is a Controlled release. The value 'Non-
Controlled' indicates the main firmware is a Non-Controlled release. The 'Controlled' main
firmware can run on Controlled units, but it can not run on Non-Controlled units. The 'NonControlled' main firmware can run on both Controlled and Non-Controlled units.
Serial Number
Synopsis: 31 characters
Shows the serial number of the device.
Boot Version
Synopsis: 47 characters
Shows the version and the build date of the boot loader software.
Main Version
Synopsis: 47 characters
Shows the version and build date of the main operating system software.
Shows the type, part number, and revision level of the hardware.
4.5. Loading Factory Default Configuration
The Load Factory Defaults menu is used to reset the unit’s configuration to its factory default.
Optionally, it is possible to exclude parameters that affect basic connectivity and SNMP
management from the reset in order to be able to remain in communication with the device.
Specifically, configuration items in the following categories are not affected by a selective
configuration reset:
• IP Interfaces
• IP Gateways
• SNMP Users
• SNMP Security to Group Maps
• SNMP Access
• RuggedCom Discovery Protocol™ (RCDP)
• Time Zone
ROS® v3.11User Guide95RMC30
4. Diagnostics
• DST Offset
• DST Rule
The menu presents a choice of whether to reset all or only the selected set of configuration
parameters to their factory default values:
Figure 4.8. Load Factory Defaults Dialog
Defaults Choice
Synopsis: { None, Selected, All }
This parameter allows the user to choose to load defaults to Selected tables (i.e. excluding
those listed above), which would preserve configuration of the tables that are critical for
basic communication and switch management applications, or to force All tables to default
settings.
It is possible to explicitly reset configuration items in the exceptional categories
listed above to their default values by using the “sql” command. Please refer to the
section entitled: “Upgrading Firmware and Managing Configurations”.
4.6. Resetting the Device
This operation will warm-start the device after the user has confirmed the reset operation from
the Reset Device option.
Figure 4.9. Reset Device Dialog
ROS® v3.11User Guide96RMC30
4. Diagnostics
4.7. Transferring Files
The Files Transfer form is used to transfer files between the device and a PC. To transfer files
using this form, either a TFTP server must be installed and running on the PC, or a TELNET
connection must be established with the device so that XMODEM can be used to transfer files.
If a TFTP server is installed and running on the PC, press GET to transfer from the PC to the
device, or PUT to transfer from the device to the PC.
Available files include:
• main.bin (application software)
• boot.bin (boot software)
• config.csv (configuration file)
• syslog.txt (system log file)
If the transfer is not completed within 1 minute, an error will be reported.
Figure 4.10. Files Transfer Form
PC File
The path and name of the file on your local PC. Use the Browse button to locate the file.
Device File
The name of the file on the device.
TFTP Server IP Address
The IP address of a TFTP server. A TFTP server application must be installed on your
local PC.
ROS® v3.11User Guide97RMC30
5. Using the CLI Shell
5. Using the CLI Shell
ROS® Command Line Interface (CLI) support enables:
• Execution of commands from a CLI shell.
• Remote execution of commands using RSH or SSH.
• Switching between the CLI shell and the menu system.
Different commands may be available to users at different login session security
levels (guest, operator or administrator).
The ROS® CLI shell may be accessed from a terminal session to the device. A terminal
session may be established in one of three ways:
• Direct cable, via RS-232.
• Remote via RSH.
• Remote via SSH.
When a terminal session is first established to the ROS® device, the user interface presented
will be the full-screen menu interface. Please refer to Section 1.1, “The ROS® User Interface”
for more detail on the menu interface.
The Command Line Interface (CLI) shell may be accessed from any menu by pressing <CtrlS>. Any menu operation in progress, such as changing a configuration parameter, will be
terminated. You may return to the menu system by pressing <Ctrl-S> again or by entering
“exit<CR>” at the shell prompt.
This chapter describes a selection of the most useful commands in detail. For a complete list
of available commands, please refer to Appendix E, Command Line Listing.
5.1. Summary Of CLI Commands available in ROS®
Type “help” and press Enter to see the list of commands available at the current session
access level. For more information on the ROS® CLI commands, see Appendix E, Command
Line Listing.
5.2. Obtaining Help For A Command
Help related to the usage of a particular command may be obtained by entering “help command
name <CR>” at the shell prompt.
>help type
Displays the contents of a text file.
Enter 'dir' for a directory listing of files.
TYPE filename
Figure 5.1. Displaying Help For A Command
5.3. Viewing Files
RuggedCom devices maintain a number of volatile and non-volatile files. These files can aid
in the resolution of problems and serve as a useful gauge of the device’s health.
ROS® v3.11User Guide98RMC30
5. Using the CLI Shell
5.3.1. Listing Files
Enter “dir<CR>” to obtain a complete list of files and a description of each.
Each file has associated attributes, as described under the Attr column in “dir”
command. Files marked “R” are readable, i.e. may be uploaded by the user. Files
marked “W” are writable, i.e. may be modified (downloaded) by the user. Files
marked “B” are binary files, i.e. may be upgraded by the user.
The most useful files include config.csv, crashlog.txt and syslog.txt. These files may be viewed
by using the “type” command, specifying the desired filename.
Figure 5.2. Displaying The Directory Of A ROS®Device
5.3.2. Viewing and Clearing Log Files
The crashlog.txt and syslog.txt files contain historical information about events that have
occurred.
The crashlog.txt file will contain debugging information related to problems that might have
resulted in unplanned restarts of the device or which may effect the device operation. A file
size of 0 bytes indicates that no untoward events have occurred.
The syslog.txt file contains a record of significant events including startups, configuration
modifications, firmware upgrades and database re-initializations due to feature additions.
Syslog.txt file will accumulate information until it fills, holding approximately 3 megabytes of
characters.
The “clearlogs” command resets these logs. It is recommended to run “clearlogs” command
after every firmware upgrade.
ROS® v3.11User Guide99RMC30
5. Using the CLI Shell
5.4. Managing The Flash Filesystem
The flashfiles command is an interface to three utilities for obtaining information about and for
managing the Flash filesystem maintained by ROS®:
• Flash filesystem statistics display.
• Detailed information about a specific file.
• Flash filesystem defragmentation tool.
>help flashfiles
A set of diagnostic commands to display information about the Flash filesystem
and to defragment flash memory.
flashfiles
When no parameters are provided, statistics about the Flash memory and
filesystem are printed.
flashfiles info [filename]
Provides information about a specific file in the Flash filesystem.
flashfiles defrag
Defragments files in the Flash filesystem.
Figure 5.3. Flashfiles command summary
5.4.1. Flash Filesystem Memory Mapping
When the flashfiles command is invoked with no arguments, a listing is displayed of files
currently in Flash memory, their locations, and the amount of memory they consume:
When the flashfiles command is invoked with the key word, info, followed by the name of a file
in memory as arguments, detailed information is displayed for the named file. For example:
ROS® v3.11User Guide100RMC30
Loading...
+ hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.