Rugged Operating System
(ROS™)
v3.5 User Guide
For use with:
RS400
Release 3.5.0 - June, 2008
Copyright
COPYRIGHT © 2008 RuggedCom Inc. ALL RIGHTS RESERVED
Dissemination or reproduction of this document, or evaluation and communication of its contents, is not authorized except where expressly permitted. Violations are liable for damages. All rights reserved, particularly for the purposes of patent application or trademark registration.
This document contains proprietary information, which is protected by copyright. All rights are reserved. No part of this document may be photocopied, reproduced or translated to another language without the prior written consent of RuggedCom Inc.
Disclaimer of liability
We have checked the contents of this manual against the hardware and software described. However, deviations from the description cannot be completely ruled out.
RuggedCom shall not be liable for any errors or omissions contained herein or for consequential damages in connection with the furnishing, performance, or use of this material.
The information given in this document is reviewed regularly and any necessary corrections will be included in subsequent editions. We appreciate any suggested improvements. We reserve the right to make technical improvements without notice.
Registered Trademarks
RuggedSwitch™ and RuggedServer™ are registered trademarks of RuggedCom Inc. Other designations in this manual might be trademarks whose use by third parties for their own purposes would infringe the rights of the owner.
Warranty
Five (5) years from date of purchase, return to factory. For warranty details, visit www.ruggedcom.com or contact your customer service representative.
Contacting RuggedCom
Corporate Headquarters |
US Headquarters |
Europe Headquarters |
|||
|
|
|
|||
RuggedCom Inc. |
RuggedCom |
RuggedCom |
|||
30 Whitmore Road |
1930 Harrison St., Suite-307 |
Unit 41, Aztec Centre, |
|||
Woodbridge, Ontario |
Hollywood, Florida |
Aztec West, Almondsbury, Bristol |
|||
Canada, L4L 7Z4 |
USA, 33020 |
United Kingdom BS32 4TD |
|||
Tel: |
(905) 856-5288 |
Tel: |
(954) 922-7975 |
Tel: |
+44 1454 203 404 |
Fax: |
(905) 856-1995 |
Fax: |
(954) 922-7984 |
Fax: |
+44 1454 203 403 |
Toll-free: 1 (888) 264-0006 |
Toll-free: |
1 (866) 922-7975 |
|
|
Email: RuggedSales@RuggedCom.com
Technical Support
Toll Free (North America): |
1 |
(866) |
922-7975 |
International: |
+1 |
(905) |
856-5288 |
Email: Support@RuggedCom.com |
|
Web: www.RuggedCom.com
|
|
|
Table Of Contents |
Table Of Contents |
|
||
Table Of Contents..................................................................................................................................... |
3 |
||
Table Of Figures ....................................................................................................................................... |
9 |
||
Preface |
................................................................................................................................................... |
|
13 |
Supported ...........................................................................................................................Platforms |
13 |
||
Who Should ......................................................................................................Use This User Guide |
13 |
||
How Chapters ..............................................................................................................are organized |
13 |
||
Document .......................................................................................................................Conventions |
13 |
||
Applicable .............................................................................................................Firmware Revision |
14 |
||
Firmware/User .............................................................................Guide Version Numbering System |
14 |
||
1 Administration ................................................................................................................................. |
15 |
||
1.1 ....................................................................................................... |
The ROS ™ User Interface |
15 |
|
1.1.1 ....................................................... |
Using the RS232 Port to Access the User Interface |
15 |
|
1.1.2 ................................................................................. |
The Structure of the User Interface |
16 |
|
1.1.3 ....................................................................................... |
Making Configuration Changes |
16 |
|
1.1.4 ........................................................................................... |
Updates Occur In Real Time |
17 |
|
1.1.5 ....................................................................................... |
Alarm Indications Are Provided |
17 |
|
1.1.6 ................................................................................................................... |
The CLI Shell |
17 |
|
1.2 ............................................................................................. |
The ROS ™ Secure Shell Server |
17 |
|
1.2.1 ......................................................... |
Using a Secure Shell to Access the User Interface |
17 |
|
1.2.2 ............................................................................ |
Using a Secure Shell to Transfer Files |
17 |
|
1.3 ........................................................................................... |
The ROS ™ Web Server Interface |
18 |
|
1.3.1 ........................................................ |
Using a Web Browser to Access the Web Interface |
18 |
|
1.3.2 ................................................................................. |
The Structure of the Web Interface |
21 |
|
1.3.3 ....................................................................................... |
Making Configuration Changes |
21 |
|
1.3.4 ............................................................................................ |
Updating Statistics Displays |
22 |
|
1.4 ............................................................................................................... |
Administration Menu |
23 |
|
1.5 ............................................................................................................................ |
IP Interfaces |
25 |
|
1.6 ............................................................................................................................ |
IP Gateways |
28 |
|
1.7 .............................................................................................................................. |
IP Services |
29 |
|
1.8 ............................................................................................................... |
System Identification |
31 |
|
1.9 ............................................................................................................................... |
Passwords |
32 |
|
1.10 ......................................................................................................................... |
Time and Date |
34 |
|
1.11 ................................................................................................................ |
SNMP Management |
36 |
|
1.11.1 .................................................................................................................... |
SNMP Users |
36 |
|
1.11.2 ....................................................................................... |
SNMP Security to Group Maps |
38 |
|
1.11.3 ................................................................................................................. |
SNMP Access |
39 |
|
1.12 ................................................................................................................................... |
RADIUS |
42 |
|
1.12.1 ............................................................................................................ |
RADIUS overview |
42 |
|
1.12.2 .................................................................. |
User Login Authentication and Authorization |
42 |
|
1.12.3 .................................. |
802.1X Authentication (not supported in RS400, N/A for RMC30) |
43 |
|
1.12.4 ........................................................................................... |
Radius Server Configuration |
44 |
|
1.13 ............................................................................................................................... |
TACACS+ |
46 |
|
1.13.1 .................................................................. |
User Login Authentication and Authorization |
46 |
|
1.13.2 ...................................................................................... |
TACACS+ Server Configuration |
46 |
RS400 |
3 |
ROS™ v3.5 |
Table Of Contents
|
1.14 DHCP Relay Agent (N/A for RMC30)...................................................................................... |
48 |
||
|
1.15 |
Syslog ..................................................................................................................................... |
49 |
|
|
1.15.1 |
Configuring Local Syslog................................................................................................. |
49 |
|
|
1.15.2 |
Configuring Remote Syslog Client .................................................................................. |
50 |
|
|
1.15.3 |
Configuring Remote Syslog Server ................................................................................. |
50 |
|
|
1.16 |
Troubleshooting ...................................................................................................................... |
52 |
|
2 |
Serial Protocols............................................................................................................................... |
53 |
||
|
2.1 |
Serial Protocols Overview ....................................................................................................... |
53 |
|
|
2.1.1 |
‘Raw Socket’ protocol features........................................................................................ |
53 |
|
|
2.1.2 |
‘Preemptive Raw Socket’ protocol features..................................................................... |
53 |
|
|
2.1.3 |
‘Modbus’ protocol features .............................................................................................. |
54 |
|
|
2.1.4 |
‘DNP’ protocol features ................................................................................................... |
54 |
|
|
2.1.5 |
‘Microlok’ protocol features.............................................................................................. |
54 |
|
|
2.1.6 |
‘WIN’ protocol features .................................................................................................... |
54 |
|
|
2.1.7 |
‘TIN’ protocol features ..................................................................................................... |
54 |
|
|
2.2 |
Serial Protocols Operation ...................................................................................................... |
55 |
|
|
2.2.1 |
Serial Encapsulation Applications ................................................................................... |
55 |
|
|
2.2.2 |
Modbus Server and Client Applications .......................................................................... |
59 |
|
|
2.2.3 |
DNP 3.0, Microlok, TIN and WIN Applications ................................................................ |
62 |
|
|
2.2.4 |
Transport Protocols ......................................................................................................... |
65 |
|
|
2.2.5 |
Force Half Duplex Mode of Operation............................................................................. |
66 |
|
|
2.3 |
Serial Protocol Configuration and Statistics ............................................................................ |
67 |
|
|
2.3.1 |
Serial Ports...................................................................................................................... |
68 |
|
|
2.3.2 |
Raw Socket ..................................................................................................................... |
70 |
|
|
2.3.3 |
Preemptive Raw Socket .................................................................................................. |
73 |
|
|
2.3.4 |
Modbus Server ................................................................................................................ |
75 |
|
|
2.3.5 |
Modbus Client ................................................................................................................. |
76 |
|
|
2.3.6 |
WIN and TIN.................................................................................................................... |
77 |
|
|
2.3.7 |
MicroLok.......................................................................................................................... |
79 |
|
|
2.3.8 |
DNP................................................................................................................................. |
80 |
|
|
2.3.9 |
Mirrored Bits .................................................................................................................... |
81 |
|
|
2.3.10 |
Device Addresses ........................................................................................................... |
83 |
|
|
2.3.11 |
Dynamic Device Addresses ............................................................................................ |
85 |
|
|
2.3.12 |
Links Statistics................................................................................................................. |
86 |
|
|
2.3.13 |
Connection Statistics....................................................................................................... |
87 |
|
|
2.3.14 |
Serial Port Statistics ........................................................................................................ |
88 |
|
|
2.3.15 |
Clearing Serial Port Statistics.......................................................................................... |
90 |
|
|
2.3.16 |
Resetting Serial Ports...................................................................................................... |
90 |
|
|
2.4 |
Troubleshooting ...................................................................................................................... |
91 |
|
3 |
Ethernet Ports ................................................................................................................................. |
93 |
||
|
3.1 |
Controller Protection Through Link-Fault-Indication (LFI) ....................................................... |
93 |
|
|
3.2 |
Ethernet Ports Configuration and Status................................................................................. |
95 |
|
|
3.2.1 |
Port Parameters .............................................................................................................. |
96 |
|
|
3.2.2 |
Port Rate Limiting............................................................................................................ |
99 |
|
|
3.2.3 |
Port Mirroring................................................................................................................. |
100 |
|
|
3.2.4 |
Link Detection Options .................................................................................................. |
102 |
|
|
3.2.5 |
PoE Parameters (when applicable)............................................................................... |
103 |
|
|
3.2.6 |
EoVDSL Parameters (when applicable)........................................................................ |
105 |
|
|
3.2.7 |
Port Status..................................................................................................................... |
108 |
|
|
|
|
Table Of Contents |
|
3.2.8 |
Resetting Ports .............................................................................................................. |
109 |
|
|
3.3 |
Troubleshooting .................................................................................................................... |
109 |
|
4 |
Ethernet Statistics ......................................................................................................................... |
111 |
||
|
4.1 |
Viewing Ethernet Statistics.................................................................................................... |
112 |
|
|
4.2 |
Viewing Ethernet Port Statistics ............................................................................................ |
114 |
|
|
4.3 |
Clearing Ethernet Port Statistics ........................................................................................... |
119 |
|
|
4.4 |
Remote Monitoring (RMON) ................................................................................................. |
120 |
|
|
4.4.1 |
RMON History Controls ................................................................................................. |
120 |
|
|
4.4.2 |
RMON History Samples ................................................................................................ |
122 |
|
|
4.4.3 |
RMON Alarms ............................................................................................................... |
125 |
|
|
4.5 |
RMON Events ....................................................................................................................... |
129 |
|
|
4.6 |
RMON Event Log .................................................................................................................. |
131 |
|
5 |
Spanning Tree .............................................................................................................................. |
133 |
||
|
5.1 |
RSTP Operation.................................................................................................................... |
133 |
|
|
5.1.1 |
RSTP States and Roles ................................................................................................ |
134 |
|
|
5.1.2 |
Edge Ports ..................................................................................................................... |
136 |
|
|
5.1.3 |
Point - to - Point and Multipoint Links ................................................................................ |
136 |
|
|
5.1.4 |
Path and Port Costs ...................................................................................................... |
136 |
|
|
5.1.5 |
Bridge Diameter ............................................................................................................ |
137 |
|
|
5.2 |
MSTP Operation ................................................................................................................... |
138 |
|
|
5.2.1 |
MST Regions and Interoperability ................................................................................. |
138 |
|
|
5.2.2 |
MSTP Bridge and Port Roles ........................................................................................ |
139 |
|
|
5.2.3 |
Benefits of MSTP .......................................................................................................... |
141 |
|
|
5.2.4 |
Implementing MSTP on a Bridged Network .................................................................. |
142 |
|
|
5.3 |
RSTP Applications ................................................................................................................ |
143 |
|
|
5.3.1 |
RSTP in Structured Wiring Configurations .................................................................... |
143 |
|
|
5.3.2 |
RSTP in Ring Backbone Configurations ....................................................................... |
144 |
|
|
5.3.3 |
RSTP Port Redundancy ................................................................................................ |
145 |
|
|
5.4 |
Spanning Tree Configuration ................................................................................................ |
146 |
|
|
5.4.1 |
Bridge RSTP Parameters .............................................................................................. |
147 |
|
|
5.4.2 |
Port RSTP Parameters .................................................................................................. |
150 |
|
|
5.4.3 |
MST Region Identifier .................................................................................................... |
153 |
|
|
5.4.4 |
Bridge MSTI Parameters ............................................................................................... |
154 |
|
|
5.4.5 |
Port MSTI Parameters ................................................................................................... |
155 |
|
|
5.5 |
Spanning Tree Statistics ....................................................................................................... |
157 |
|
|
5.5.1 |
Bridge RSTP Statistics .................................................................................................. |
157 |
|
|
5.5.2 |
Port RSTP Statistics ...................................................................................................... |
159 |
|
|
5.5.3 |
Bridge MSTI Statistics ................................................................................................... |
162 |
|
|
5.5.4 |
Port MSTI Statistics ....................................................................................................... |
163 |
|
|
5.6 |
Troubleshooting .................................................................................................................... |
166 |
|
6 |
VLANs |
........................................................................................................................................... |
169 |
|
|
6.1 |
VLAN ....................................................................................................................Operation |
169 |
|
|
6.1.1 ........................................................................................................... |
VLANs and Tags |
169 |
|
|
6.1.2 ....................................................................................... |
Tagged vs. Untagged Frames |
169 |
|
|
6.1.3 .................................................................................................................. |
Native VLAN |
169 |
|
|
6.1.4 ....................................................................................................... |
Management VLAN |
169 |
|
|
6.1.5 .......................................................................................... |
Edge and Trunk Port Types |
170 |
|
|
6.1.6 ................................................................................... |
VLAN Ingress and Egress Rules |
170 |
RS400 |
5 |
ROS™ v3.5 |
Table Of Contents
|
6.1.7 |
Forbidden Ports List ...................................................................................................... |
171 |
|
|
6.1.8 |
VLAN-aware and VLAN-unaware operation modes...................................................... |
171 |
|
|
6.1.9 |
GVRP (Generic VLAN Registration Protocol) ............................................................... |
172 |
|
|
6.1.10 |
QinQ (not supported in RS400 and RS8000/RS1600 families)..................................... |
173 |
|
|
6.2 |
VLAN Applications ................................................................................................................ |
175 |
|
|
6.2.1 |
Traffic Domain Isolation................................................................................................. |
175 |
|
|
6.2.2 |
Administrative Convenience.......................................................................................... |
176 |
|
|
6.2.3 |
Reduced Hardware ....................................................................................................... |
176 |
|
|
6.3 |
VLAN Configuration .............................................................................................................. |
177 |
|
|
6.3.1 |
Global VLAN Parameters .............................................................................................. |
177 |
|
|
6.3.2 |
Static VLANs ................................................................................................................. |
178 |
|
|
6.3.3 |
Port VLAN Parameters.................................................................................................. |
180 |
|
|
6.3.4 |
VLAN Summary............................................................................................................. |
182 |
|
|
6.4 |
Troubleshooting .................................................................................................................... |
183 |
|
7 |
Classes of Service ........................................................................................................................ |
185 |
||
|
7.1 |
CoS Operation ...................................................................................................................... |
185 |
|
|
7.1.1 |
Inspection Phase........................................................................................................... |
185 |
|
|
7.1.2 |
Forwarding Phase ......................................................................................................... |
186 |
|
|
7.2 |
CoS Configuration................................................................................................................. |
187 |
|
|
7.2.1 |
Global CoS Parameters ................................................................................................ |
187 |
|
|
7.2.2 |
Port CoS Parameters .................................................................................................... |
188 |
|
|
7.2.3 |
Priority to CoS Mapping ................................................................................................ |
189 |
|
|
7.2.4 |
DSCP to CoS Mapping.................................................................................................. |
191 |
|
|
7.2.5 |
CoS Access Priorities (RS8000 and RS1600 families only).......................................... |
192 |
|
8 |
Multicast Filtering .......................................................................................................................... |
195 |
||
|
8.1 |
IGMP ..................................................................................................................................... |
195 |
|
|
8.1.1 |
Router and Host IGMP Operation ................................................................................. |
195 |
|
|
8.1.2 |
Switch IGMP Operation................................................................................................. |
196 |
|
|
8.1.3 |
Combined Router and Switch IGMP Operation............................................................. |
198 |
|
|
8.2 |
Multicast Filtering Configuration and Status.......................................................................... |
200 |
|
|
8.2.1 |
Configuring IGMP Parameters ...................................................................................... |
200 |
|
|
8.2.2 |
Configuring Static Multicast Groups .............................................................................. |
202 |
|
|
8.2.3 |
Viewing IP Multicast Groups ......................................................................................... |
203 |
|
|
8.3 |
Troubleshooting .................................................................................................................... |
204 |
|
9 |
MAC Address Tables .................................................................................................................... |
207 |
||
|
9.1 |
Viewing MAC Addresses....................................................................................................... |
208 |
|
|
9.2 |
Configuring MAC Address Learning Options ........................................................................ |
209 |
|
|
9.3 |
Configuring Static MAC Address Table................................................................................. |
209 |
|
|
9.4 |
Purging MAC Address Table................................................................................................. |
211 |
|
10 |
Network Discovery .................................................................................................................... |
213 |
||
|
10.1 |
LLDP Operation .................................................................................................................... |
213 |
|
|
10.2 |
Network Discovery Menu ...................................................................................................... |
214 |
|
|
10.2.1 |
Global LLDP Parameters .............................................................................................. |
215 |
|
|
10.2.2 |
Port LLDP Parameters .................................................................................................. |
216 |
|
|
10.2.3 |
LLDP Global Remote Statistics ..................................................................................... |
217 |
|
|
10.2.4 |
LLDP Neighbor Information........................................................................................... |
218 |
|
|
10.2.5 |
LLDP Statistics .............................................................................................................. |
219 |
|
|
|
Table Of Contents |
11 |
PPP over Modem...................................................................................................................... |
221 |
|
11.1 |
PPP over Modem Operation ................................................................................................. |
221 |
|
11.1.1 Remote Dial-in For Monitoring ...................................................................................... |
221 |
||
11.1.2 |
Router Concentration .................................................................................................... |
222 |
|
11.1.3 Assigning IP Addresses For PPP.................................................................................. |
223 |
||
11.1.4 |
PAP/CHAP Authentication ............................................................................................ |
223 |
|
11.1.5 |
Static Routes ................................................................................................................. |
224 |
|
11.2 |
PPP Configuration................................................................................................................. |
225 |
|
11.2.1 |
Modem Settings ............................................................................................................ |
226 |
|
11.2.2 |
PPP Control................................................................................................................... |
227 |
|
11.2.3 |
PPP Users..................................................................................................................... |
229 |
|
11.2.4 |
PPP Statistics................................................................................................................ |
231 |
|
11.2.5 |
Clearing PPP Statistics ................................................................................................. |
233 |
|
11.2.6 |
Resetting PPP ............................................................................................................... |
233 |
|
11.3 |
Troubleshooting .................................................................................................................... |
234 |
|
12 |
Diagnostics................................................................................................................................ |
237 |
|
12.1 |
Using the Alarm System........................................................................................................ |
237 |
|
12.1.1 |
Active Alarms ................................................................................................................ |
238 |
|
12.1.2 |
Passive Alarms.............................................................................................................. |
238 |
|
12.1.3 Alarms and the Critical Failure Relay ............................................................................ |
238 |
||
12.1.4 Viewing and Clearing Alarms ........................................................................................ |
238 |
||
12.2 |
Viewing CPU Diagnostics ..................................................................................................... |
239 |
|
12.3 |
Viewing and Clearing the System Log .................................................................................. |
241 |
|
12.4 |
Viewing Product Information ................................................................................................. |
242 |
|
12.5 |
Loading Factory Default Configuration.................................................................................. |
243 |
|
12.6 |
Resetting the Device ............................................................................................................. |
243 |
|
13 |
Using the CLI Shell ................................................................................................................... |
245 |
|
13.1 |
Entering and Leaving the Shell ............................................................................................. |
245 |
|
13.2 |
Summary Of CLI Commands available in ROS™................................................................. |
245 |
|
13.2.1 Getting Help for a Command......................................................................................... |
246 |
||
13.2.2 |
Viewing Files ................................................................................................................. |
246 |
|
13.2.3 Pinging a Remote Device.............................................................................................. |
247 |
||
13.2.4 |
Tracing Events .............................................................................................................. |
247 |
|
13.2.5 Viewing DHCP Learned Information ............................................................................. |
249 |
||
13.2.6 Executing Commands Remotely Through RSH ............................................................ |
249 |
||
13.2.7 |
Resetting the Device ..................................................................................................... |
250 |
|
14 |
Upgrading Firmware and Managing Configurations.................................................................. |
251 |
|
14.1 |
Upgrading Firmware.............................................................................................................. |
251 |
|
14.1.1 Upgrading Firmware using XModem............................................................................. |
251 |
||
14.1.2 Upgrading Firmware Using a TFTP Client on Your Workstation................................... |
252 |
||
14.1.3 Upgrading Firmware Using ROS™ TFTP Client............................................................ |
253 |
||
14.2 |
Capturing Configurations ...................................................................................................... |
254 |
|
14.2.1 Capturing Configurations with XModem........................................................................ |
254 |
||
14.2.2 Capturing Configurations with TFTP ............................................................................. |
254 |
||
14.3 |
Using SQL Commands ......................................................................................................... |
255 |
|
14.3.1 |
Getting Started .............................................................................................................. |
255 |
|
14.3.2 Finding the Correct Table.............................................................................................. |
255 |
||
14.3.3 |
Retrieving Information ................................................................................................... |
256 |
RS400 |
7 |
ROS™ v3.5 |
Table Of Contents
14.3.4 Changing Values in a Table .......................................................................................... |
257 |
14.3.5 Setting Default Values in a Table .................................................................................. |
257 |
14.3.6 Using RSH and SQL ..................................................................................................... |
258 |
Appendix A - SNMP MIB Support......................................................................................................... |
259 |
Standard MIBs .................................................................................................................................. |
259 |
RuggedCom proprietary MIBs .......................................................................................................... |
260 |
Appendix B – SNMP Trap Summary .................................................................................................... |
261 |
Appendix C – List of Objects Eligible for RMON Alarms....................................................................... |
262 |
Appendix E – ModBus Management Support and Memory Map.......................................................... |
267 |
Modbus Memory Map ....................................................................................................................... |
268 |
Index ..................................................................................................................................................... |
273 |
|
Table Of Figures |
Table Of Figures |
|
Figure 1: Main Menu With Screen Elements Identified........................................................................... |
16 |
Figure 2: Log in to The Device with a Web Browser.............................................................................. |
19 |
Figure 3: Log in to The Device with a Web Browser (secure login banner)........................................... |
20 |
Figure 4: Main Menu via Web Server Interface ...................................................................................... |
21 |
Figure 5: Parameters Form Example...................................................................................................... |
22 |
Figure 6: Administration Menu................................................................................................................ |
24 |
Figure 7: IP Interfaces Table .................................................................................................................. |
25 |
Figure 8: IP Interfaces Form ................................................................................................................... |
26 |
Figure 9: IP Gateways Form................................................................................................................... |
28 |
Figure 10: IP Services Form ................................................................................................................... |
29 |
Figure 11: System Identification Form .................................................................................................... |
31 |
Figure 12: Passwords Form.................................................................................................................... |
32 |
Figure 13: Time and Date Form.............................................................................................................. |
34 |
Figure 14: SNMP User Table.................................................................................................................. |
36 |
Figure 15: SNMP User Form .................................................................................................................. |
37 |
Figure 16: SNMP Security to Group Maps Table.................................................................................... |
38 |
Figure 17: SNMP Security to Group Maps Form .................................................................................... |
38 |
Figure 18: SNMP Access Table.............................................................................................................. |
39 |
Figure 19: SNMP Access Form .............................................................................................................. |
40 |
Figure 20: RADIUS Server summary...................................................................................................... |
44 |
Figure 21: RADIUS Server Form ............................................................................................................ |
44 |
Figure 22: TACACS+ Server summary................................................................................................... |
46 |
Figure 23: TACACS+ Server Form ......................................................................................................... |
47 |
Figure 24: DHCP Relay Agent Form....................................................................................................... |
48 |
Figure 25: Local Syslog Form................................................................................................................. |
49 |
Figure 26: Remote Syslog Client Form................................................................................................... |
50 |
Figure 27: Remote Syslog Server Table................................................................................................. |
50 |
Figure 28: Remote Syslog Server Form ................................................................................................. |
51 |
Figure 29: Using A Router As A Gateway............................................................................................... |
52 |
Figure 30: Character Encapsulation ....................................................................................................... |
55 |
Figure 31: RTU Polling ........................................................................................................................... |
55 |
Figure 32: Broadcast RTU Polling .......................................................................................................... |
56 |
Figure 33: Permanent and Dynamic Master Connection Support .......................................................... |
57 |
Figure 34: Modbus Client and Server ..................................................................................................... |
59 |
Figure 35: Sources of Delay and Error in an End-to-End Exchange ...................................................... |
60 |
Figure 36: Source/Destination Two Way Communication ...................................................................... |
62 |
Figure 37: Optical loop topology ............................................................................................................. |
66 |
Figure 38: Serial Protocols Menu............................................................................................................ |
67 |
Figure 39: Serial Ports Table .................................................................................................................. |
68 |
Figure 40: Serial Ports Form................................................................................................................... |
68 |
Figure 41: Raw Socket Table ................................................................................................................. |
70 |
Figure 42: Raw Socket Form .................................................................................................................. |
71 |
Figure 43: Preemptive Raw Socket Table .............................................................................................. |
73 |
Figure 44: Preemptive Raw Socket Form............................................................................................... |
73 |
Figure 45: Modbus Server Table ............................................................................................................ |
75 |
Figure 46: Modbus Server Form ............................................................................................................. |
75 |
Figure 47: Modbus Client Form .............................................................................................................. |
76 |
RS400 |
9 |
ROS™ v3.5 |
Table Of Figures
Figure 48: WIN and TIN Form................................................................................................................. |
77 |
Figure 49: MicroLok Form....................................................................................................................... |
79 |
Figure 50: DNP Form.............................................................................................................................. |
80 |
Figure 51: Mirrored Bits Table ................................................................................................................ |
81 |
Figure 52: Mirrored Bits Form................................................................................................................. |
82 |
Figure 53: Device Address Table............................................................................................................ |
83 |
Figure 54: Device Address Form ............................................................................................................ |
84 |
Figure 55: Dynamic Device Address Table............................................................................................. |
85 |
Figure 56: Dynamic Device Address Form ............................................................................................. |
85 |
Figure 57: Links Statistics Table............................................................................................................. |
86 |
Figure 58: Links Statistics Form.............................................................................................................. |
87 |
Figure 59: Connection Statistics Table ................................................................................................... |
88 |
Figure 60: Serial Port Statistics Table..................................................................................................... |
89 |
Figure 61: Clear Serial Port Statistics Form............................................................................................ |
90 |
Figure 62: Reset Serial Port(s) Form...................................................................................................... |
90 |
Figure 63: Controller Protection Through LFI ......................................................................................... |
93 |
Figure 64: Ethernet Ports Menu.............................................................................................................. |
95 |
Figure 65: Port Parameters Table........................................................................................................... |
96 |
Figure 66: Port Parameters Form ........................................................................................................... |
96 |
Figure 67: Port Rate Limiting Table ........................................................................................................ |
99 |
Figure 68: Port Rate Limiting Form......................................................................................................... |
99 |
Figure 69: Port Mirroring Form.............................................................................................................. |
101 |
Figure 70: Link Detection Form............................................................................................................. |
102 |
Figure 71: Accessing PoE Parameters................................................................................................. |
103 |
Figure 72: PoE Parameters Table ........................................................................................................ |
103 |
Figure 73: PoE Parameters Form......................................................................................................... |
104 |
Figure 74: Accessing EoVDSL Parameters .......................................................................................... |
106 |
Figure 75: EoVDSL Parameters Table ................................................................................................. |
106 |
Figure 76: EoVDSL Parameters Form.................................................................................................. |
107 |
Figure 77: Port Status Table................................................................................................................. |
108 |
Figure 78: Ethernet Port Statistics Menu .............................................................................................. |
111 |
Figure 79: Ethernet Statistics Table...................................................................................................... |
112 |
Figure 80: Ethernet Port Statistics Table .............................................................................................. |
114 |
Figure 81: Ethernet Port Statistics Form............................................................................................... |
115 |
Figure 82: Clear Ethernet Port Statistics Form ..................................................................................... |
119 |
Figure 83: RMON History Controls Table ............................................................................................. |
120 |
Figure 84: RMON History Controls Form.............................................................................................. |
121 |
Figure 85: RMON History Samples Table............................................................................................. |
122 |
Figure 86: RMON History Samples Form ............................................................................................. |
123 |
Figure 87: The Alarm Process .............................................................................................................. |
126 |
Figure 88: RMON Alarms Table............................................................................................................ |
126 |
Figure 89: RMON Alarms Form ............................................................................................................ |
127 |
Figure 90: RMON Events Table............................................................................................................ |
129 |
Figure 91: RMON Events Form ............................................................................................................ |
130 |
Figure 92: RMON Event Log Table....................................................................................................... |
131 |
Figure 93: RMON Event Log Form ....................................................................................................... |
132 |
Figure 94: Bridge and Port States ........................................................................................................ |
134 |
Figure 95: Bridge and Port Roles ......................................................................................................... |
135 |
Figure 96: Example of a Structured Wiring Configuration..................................................................... |
143 |
Figure 97: Example of a Ring Backbone Configuration........................................................................ |
144 |
Figure 98: Port Redundancy................................................................................................................. |
145 |
|
Table Of Figures |
Figure 99: Spanning Tree Menu ........................................................................................................... |
146 |
Figure 100: Bridge RSTP Parameters Form......................................................................................... |
147 |
Figure 101: Port RSTP Parameter Table.............................................................................................. |
150 |
Figure 102: Port RSTP Parameter Form .............................................................................................. |
150 |
Figure 103: MST Region Identifier Table.............................................................................................. |
153 |
Figure 104: Bridge MSTI Parameters ................................................................................................... |
154 |
Figure 105: Port MSTI Parameter Table............................................................................................... |
155 |
Figure 106: Port MSTI Parameter Form ............................................................................................... |
155 |
Figure 107: Bridge RSTP Statistics Form............................................................................................. |
157 |
Figure 108: Port RSTP Statistics Table ................................................................................................ |
159 |
Figure 109: Bridge RSTP Parameters Form......................................................................................... |
160 |
Figure 110: Bridge MSTI Statistics Table ............................................................................................. |
162 |
Figure 111: Port MSTI Statistics Table ................................................................................................. |
163 |
Figure 112: Port MSTI Statistics Form.................................................................................................. |
164 |
Figure 113: Using GVRP ...................................................................................................................... |
173 |
Figure 114: Using QinQ Example ......................................................................................................... |
174 |
Figure 115: Multiple overlapping VLANs............................................................................................... |
175 |
Figure 116: Inter-VLAN Communications ............................................................................................. |
176 |
Figure 117: Virtual LANs Menu............................................................................................................. |
177 |
Figure 118: Global VLAN Parameters Form ......................................................................................... |
177 |
Figure 119: Static VLANs Table............................................................................................................ |
178 |
Figure 120: Static VLANs Form ............................................................................................................ |
178 |
Figure 121: Port VLAN Parameters Table ............................................................................................ |
180 |
Figure 122: Port VLAN Parameters Form............................................................................................. |
180 |
Figure 123: VLAN Summary Table....................................................................................................... |
182 |
Figure 124: Determining The CoS Of A Received Frame..................................................................... |
186 |
Figure 125: Classes Of Service Menu .................................................................................................. |
187 |
Figure 126: Global CoS Parameters Form ........................................................................................... |
187 |
Figure 127: Port CoS Parameter Table ................................................................................................ |
188 |
Figure 128: Port CoS Parameter Form................................................................................................. |
189 |
Figure 129: Priority to CoS Mapping Table........................................................................................... |
189 |
Figure 130: Priority to CoS Mapping Form ........................................................................................... |
190 |
Figure 131: TOS DSCP to CoS Mapping Table.................................................................................... |
191 |
Figure 132: TOS DSCP to CoS Mapping Form .................................................................................... |
191 |
Figure 133: CoS Access Priorities Table .............................................................................................. |
192 |
Figure 134: CoS Access Priorities Form............................................................................................... |
193 |
Figure 135: IGMP Operation Example 1............................................................................................... |
196 |
Figure 136: IGMP Operation Example 2............................................................................................... |
198 |
Figure 137: Multicast Filtering Menu..................................................................................................... |
200 |
Figure 138: IGMP Parameters Form..................................................................................................... |
200 |
Figure 139: Static Multicast Groups Table............................................................................................ |
202 |
Figure 140: Static Multicast Group Form .............................................................................................. |
202 |
Figure 141: IP Multicast Groups Table ................................................................................................. |
203 |
Figure 142: MAC Address Tables Menu............................................................................................... |
207 |
Figure 143: Address Table.................................................................................................................... |
208 |
Figure 144: MAC Address Learning Options Form............................................................................... |
209 |
Figure 145: Static MAC Address Table................................................................................................. |
210 |
Figure 146: Static MAC Address Form ................................................................................................. |
210 |
Figure 147: Network Discovery Menu................................................................................................... |
214 |
Figure 148: Global LLDP Parameters Form ......................................................................................... |
215 |
Figure 149: Port LLDP Parameters Table............................................................................................. |
216 |
RS400 |
11 |
ROS™ v3.5 |
Table Of Figures
Figure 150: Port LLDP Parameters Form ............................................................................................. |
216 |
Figure 151: LLDP Global Remote Statistics Form ................................................................................ |
217 |
Figure 152: LLDP Neighbor Information Table ..................................................................................... |
218 |
Figure 153: LLDP Statistics Table ........................................................................................................ |
219 |
Figure 154: Remote Dial-in For Monitoring........................................................................................... |
221 |
Figure 155: Router Concentration......................................................................................................... |
222 |
Figure 156: PPP Configuration Menu ................................................................................................... |
225 |
Figure 157: PPP Modem Settings Form ............................................................................................... |
226 |
Figure 158: PPP Control Form.............................................................................................................. |
227 |
Figure 159: PPP Users Table ............................................................................................................... |
229 |
Figure 160: PPP Users Form................................................................................................................ |
229 |
Figure 161: PPP Statistics Form........................................................................................................... |
231 |
Figure 162: Clear PPP Statistics Form ................................................................................................. |
233 |
Figure 163: Reset PPP Port Form ........................................................................................................ |
233 |
Figure 164: Gateway Collisions ............................................................................................................ |
235 |
Figure 165: Diagnostics Menu .............................................................................................................. |
237 |
Figure 166: Alarm Table ....................................................................................................................... |
238 |
Figure 167: CPU Diagnostics Form ...................................................................................................... |
239 |
Figure 168: Viewing the System Log .................................................................................................... |
241 |
Figure 169: Product Information Form.................................................................................................. |
242 |
Figure 170: Load Factory Defaults Dialog ............................................................................................ |
243 |
Figure 171: Reset Device Dialog .......................................................................................................... |
244 |
Figure 172: Displaying the list of available commands ......................................................................... |
245 |
Figure 173: Displaying help for a command ......................................................................................... |
246 |
Figure 174: Displaying Directory of a RuggedCom Device................................................................... |
246 |
Figure 175: Displaying Trace settings................................................................................................... |
248 |
Figure 176: Enabling Trace................................................................................................................... |
248 |
Figure 177: Starting Trace .................................................................................................................... |
249 |
Figure 178 Example of an Upgrade using XModem ............................................................................. |
251 |
Figure 179 Example of an Upgrade using a TFTP client on your workstation...................................... |
252 |
Figure 180 Example of an Upgrade using ROS™ TFTP Client............................................................. |
253 |
Figure 181 The SQL command and SQL help...................................................................................... |
255 |
Figure 182 Brief snippet of SQL command for finding the correct table name ..................................... |
256 |
Figure 183 Selecting a table ................................................................................................................. |
256 |
Figure 184 Select a parameter within a table ....................................................................................... |
256 |
Figure 185 Selecting rows in a table based upon parameter values .................................................... |
257 |
Figure 186 Selecting rows in a table based upon multiple parameter values....................................... |
257 |
Figure 187 Changing Values In A Table............................................................................................... |
257 |
Figure 188 Setting default values into a table....................................................................................... |
257 |
Figure 189 Using RSH and SQL........................................................................................................... |
258 |
Preface
Preface
This manual contains instructions, examples, guidelines, and general theory on how to use the Rugged Operating System (ROS™) management software.
Supported Platforms
ROS™ has been designed to work on many RuggedCom product hardware platforms. This ensures consistency of the user experience when migrating from one product model to another. In fact, a single ‘binary’ image supports all RuggedCom ROS™ based products that includes:
•RuggedSwitch™ i800, i801, i802, and i803
•RuggedSwitch™ RS8000 and RS1600
•RuggedSwitch™ RS900/RS930 with both ‘L’ (EoVDSL) and ‘W’ (WLAN) port variants
•RuggedSwitch™ RS900G/RS940G with Gigabit
•RuggedSwitch™ RS969/M969 waterproof with Gigabit
•RuggedSwitch™ RSG2100/M2100 and RSG2200/M2200 modular switches with Gigabit
•RuggedServer™ RS416, RS910 and RS920 modular servers
•RuggedServer™ RS400
•RuggedServer™ RMC30
Each product model has a subset of the entire ROS™ feature set. This manual is intended for use with the RS400 product model(s) and has been streamlined to only describe the relevant features.
Who Should Use This User Guide
This guide is to be used by network technical support personnel who are familiar with the operation of networks. Others who might find the book useful are network and system planners, system programmers and line technicians.
How Chapters are organized
The index of this guide has been prepared with:
•Entries to each of the “Features” sections of the manual
•Entries to each of the “Troubleshooting” sections of the manual (located at the end of each chapter)
•Entries to each of the Menus, organized by name
Document Conventions
This publication uses the following conventions:
Note: Means reader take note. Notes contain helpful suggestions or references to materials not contained in this guide.
It is recommended that you use this guide along with the following applicable documents:
RS400 |
13 |
ROS™ v3.5 |
Preface
•RS400 Installation Guide
•RuggedCom Fiber Guide
•RuggedCom Wireless Guide
•White paper: Rapid Spanning Tree in Industrial Networks
Applicable Firmware Revision
This guide is applicable to ROS™ software revision v3.5.x.
Firmware/User Guide Version Numbering System
ROS has a three-digit version numbering system of the form X.Y.Z where each digit is a number starting from zero. The 'X.Y' digits represent the functional version of ROS whereas the 'Z' digit represents firmware patches. The 'X' digit is incremented for major functional updates of the product. The 'Y' digit is incremented for minor functional updates of the product. The 'Z' digit is incremented for bug fixes, cosmetic enhancements and other minor issues.
User guides follow the same format. In general, a user guide will have the same 'X.Y' digits as the firmware to which it corresponds.
It is RuggedCom's policy to provide Web access to only the latest 'patch' release for a version of firmware. If you decide that an upgrade is merited, then getting all the fixes only makes sense. It is for this reason that release notes are created detailing all patches for a given functional version.
ROS™ v3.5 |
14 |
RS400 |
Administration
1 Administration
The Administration menu covers the configuration of administrative parameters of both device and network (local services availability, security methods employed, system identification and functionality related to the IP network):
•IP Address, Subnet Mask and Gateway Address (static or dynamically obtainable)
•Management VLAN
•Management Connection Inactivity Timeout
•TFTP Server Permissions
•System Identification
•Passwords
•Time and Date
•SNTP to keep the time and date synchronized
•SNMP Management
•Radius Server
•DHCP Relay Agent
•Remote Syslog
1.1The ROS™ User Interface
1.1.1 Using the RS232 Port to Access the User Interface
Attach a terminal (or PC running terminal emulation software) to the RS232 port. The terminal should be configured for 8 bits, no parity operation at 57.6 Kbps. Hardware and software flow control must be disabled. Select a terminal type of VT100.
Once the terminal is connected, pressing any key on the keyboard will prompt for the username and password to be entered.
The switch is shipped with a default administrator username “admin” and password “admin”. Once successfully logged in, the user will be presented with the main menu.
RS400 |
15 |
ROS™ v3.5 |
Administration
1.1.2 The Structure of the User Interface
The user interface is organized as a series of menus with an escape to a command line interface (CLI) shell. Each menu screen presents the switch name (as proved by the System Identification parameter), Menu Title, Access Level, Alarms indicator, Sub-Menus and Command Bar.
Sub-menus are entered by selecting the desired menu with the arrow keys and pressing the enter key. Pressing the escape key ascends to the parent menu.
Figure 1: Main Menu With Screen Elements Identified
The command bar offers a list of commands that apply to the currently displayed menu. These commands include:
•<CTRL> Z to display help on the current command or data item
•<CTRL> S to switch to the CLI shell
•<CTRL> U/D to jump to next/previous page of a status display
The main menu also provides a <CTRL> X command, which will terminate the session. This type of menu is accessible via serial consol, telnet session and SSH session.
1.1.3 Making Configuration Changes
When changing a data item the user selects the data item by the cursor keys and then pressing the enter key. The cursor will change position to allow editing of the data item.
ROS™ v3.5 |
16 |
RS400 |
Administration
Typing a new value after pressing enter always erases the old parameter value. The left and right cursor keys can be used to position the edit point without erasing the old parameter value. The up and down cursor keys can be used to cycle through the next higher and lower values for the parameter.
After the parameter has been edited, press enter again to change other parameters. When all desired parameters have been modified, press <CTRL> A to apply changes. The switch will automatically prompt you to save changes when you leave a menu in which changes have been made.
Some menus will require you to press <CTRL> I to insert a new record of information and <CTRL> L to delete a record.
1.1.4 Updates Occur In Real Time
All configuration and display menus present the values at the current instant, automatically updating if changed from other user interface sessions or SNMP. All statistics menus will display changes to statistics as they occur.
1.1.5 Alarm Indications Are Provided
Alarms are events for which the user is notified through the Diagnostics submenu. All configuration and display menus present an indication of the number of alarms (in the upper right hand corner of the screen) as they occur, automatically updating as alarms are posted and cleared.
1.1.6 The CLI Shell
The user interface provides a shell for operations that are more easily performed at the command line. You may switch back and forth from the menu system and shell by pressing <CTRL> S. For more information on the capabilities of the shell see the approapriate chapter of this guide.
1.2 The ROS™ Secure Shell Server
1.2.1 Using a Secure Shell to Access the User Interface
SSH (Secure Shell) is a network protocol which provides a replacement for insecure remote login and command execution facilities, such as telnet and remote shell. SSH encrypts traffic in both directions, preventing traffic sniffing and password theft.
SSH protocol version 2 is implemented in ROS. The authentication method is keyboard interactive password authentication. User name will not be verified in order to grant access to SSH server. The passwords to be used for login are configured in Password Table and user’s privileges are the same as for user logged in via the console port.
1.2.2 Using a Secure Shell to Transfer Files
ROS implements SFTP protocol over SSH to transfer files in secure manner. The file system is created in one directory only. Also, all the files are created in the system at startup time and can not be deleted, created, renamed. Files can be downloaded (upgraded) and uploaded (to be analyzed outside of the unit).
The implemented commands are: dir – a file directory
RS400 |
17 |
ROS™ v3.5 |
Administration
get – upload from the switch and download to PC put – upload from PC and download to PC
1.3 The ROS™ Web Server Interface
1.3.1 Using a Web Browser to Access the Web Interface
A web browser uses a secure communications method called Secure Socket Layer (SSL) to encrypt traffic exchanged with its clients. Web server guarantees that communications with the client is kept private. If client requires access via unsecure http port, it will be rerouted to the secure port. The access via SSL will be granted any client that provides the correct password.
Your browser may complain about SSL Certificate that Web server issues. It happens because the certificate that comes with the Web server is not issued by a recognized certificate authority. However, network traffic is still encrypted.
Start a web browser session and open a connection to the switch by entering a URL that specifies its hostname or IP address (e.g. http://179.1.0.45). Once the switch is contacted, start the login process by clicking on the “Login” link. The resulting page should be similar to that presented below:
ROS™ v3.5 |
18 |
RS400 |
Administration
Figure 2: Log in to The Device with a Web Browser
Enter the “admin” user name and the appropriate password for the admin user, and then click on the “LogIn” button. The switch is shipped with a default administrator password of “admin”. Once successfully logged in, the user will be presented with the main menu.
If the user wants to hide device information from the login screen, the ‘Login Banner’ option in the System Identification menu must be set to ‘secure’.
RS400 |
19 |
ROS™ v3.5 |
Administration
Figure 3: Log in to The Device with a Web Browser (secure login banner)
ROS™ v3.5 |
20 |
RS400 |
Administration
1.3.2 The Structure of the Web Interface
The user interface is organized as a series of linked web pages. The main menu provides the links and allows them to be expanded to display lower level pages for a particular configuration system.
Figure 4: Main Menu via Web Server Interface
Each web page presents the switch name (as proved by the System Identification parameter), Menu Title link and user’s access name or Alarms link if any alarms are reported.
The Menu title link takes you to a page that provides help for the configuration parameters provided by that page.
Alarms are events for which the user is notified by following the Alarms link (these alarms may also be viewed and cleared through the Diagnostics submenu). All configuration and display menus present an indication of the number of alarms (in the upper right hand corner of the screen) as they occur, automatically updating as alarms are posted and cleared.
1.3.3 Making Configuration Changes
When changing a data item the user selects the data item by selecting the field to edit with the mouse, entering a new value and clicking on the apply field. More than one parameter may be modified at a time.
RS400 |
21 |
ROS™ v3.5 |
Administration
Figure 5: Parameters Form Example
Some menus will require you to create or delete new records of information.
1.3.4 Updating Statistics Displays
You may click the refresh button to update statistics displays.
ROS™ v3.5 |
22 |
RS400 |
Administration
1.4 Administration Menu
The Administration menu provides ability to configure network and switch administration parameters.
RS400 |
23 |
ROS™ v3.5 |
Administration
Figure 6: Administration Menu
ROS™ v3.5 |
24 |
RS400 |
Administration
1.5 IP Interfaces
These parameters provide the ability to configure IP connection parameters such as address, network, and mask.
The user can configure an IP Interface for each subnet (VLAN). One of the interfaces is configured as management interface. IP services: TFTP server, SNMP server, Telnet server, SSH server, RSH server, Web server, authentication using RADIUS server, DHCP client, BOOTP client, DHCP relay agent will be available only via management interface. Different IP interfaces MUST NOT overlap, e.g. the subnet mask must be unique.
15 IP interfaces can be configured in the device. In VLAN unaware mode, and in devices that do not act as switches (as RMC30), only one IP interface can be configured.
On non-management interfaces, only static IP addresses can be assigned.
On management interface, the user can choose from the following IP Address type: Static, DHCP, BOOTP and Dynamic. Static IP Address type refers to the manual assignment of IP address while DHCP, BOOTP and Dynamic IP Address types refer to the automatic assignment of IP address.
DHCP is widely used in LAN environments to dynamically assign IP addresses from a centralized server, which reduces the overhead of administrating IP addresses.
BOOTP is a subset of the DHCP protocol. ROSTM supports transfer of a BOOTFILE via BOOTP. The BOOTFILE represents any valid ROSTM file such as config.csv. The name of BOOTFILE on the BOOTP server must match the corresponding ROSTM file.
The Dynamic IP Address type refers to a combination of the BOOTP and DHCP protocols. Starting with BOOTP, the system will try BOOTP and DHCP in a round-robin fashion until it will get a response from the corresponding server.
Figure 7: IP Interfaces Table
RS400 |
25 |
ROS™ v3.5 |
Administration
Figure 8: IP Interfaces Form
Note: The IP address and mask configured for management VLAN are not changed when resetting all configuration parameters to defaults and will be assigned to default VLAN ID of 1. Changes to the IP address take effect immediately. All IP connections in place at the time of an address change will be lost.
Type
Synopsis: { VLAN } Default: VLAN
Specifies the type of the interface for which this IP interface is created.
ID
Synopsis: 1 to 4094 Default: 1
Specifies the ID of the interface for which this IP interface is created. If interface type is VLAN, represents VLAN ID.
Mgmt
Synopsis: { No, Yes } Default: No
Specifies whether the IP interface is the device management interface.
IP Address Type
Synopsis: { Static, Dynamic, DHCP, BOOTP } Default: Static
Specifies whether the IP address is static or dynamically assigned via DHCP or BOOTP. Option
ROS™ v3.5 |
26 |
RS400 |
Administration
DYNAMIC is a common case of dynamically assigned IP address. It switches between BOOTP and DHCP until it gets the response from the relevant server. Must be static for non management interfaces
IP Address
Synopsis: ###.###.###.### where ### ranges from 0 to 255 Default: 192.168.0.1
Specifies the IP address of this device. An IP address is a 32-bit number that is notated by using four numbers from 0 through 255, separated by periods. Only a unicast IP address is allowed which ranges from 1.0.0.0 to 233.255.255.255
Subnet
Synopsis: ###.###.###.### where ### ranges from 0 to 255 Default: 255.255.255.0
Specifies the IP subnet mask of this device. An IP subnet mask is a 32-bit number that is notated by using four numbers from 0 through 255, separated by periods. Typically, subnet mask numbers use either 0 or 255 as values (e.g. 255.255.255.0) but other numbers can appear.
RS400 |
27 |
ROS™ v3.5 |
Administration
1.6 IP Gateways
These parameters provide the ability to configure gateways. A maximum of 10 gateways can be configured. When both the Destination and Subnet fields are both 0.0.0.0 (displayed as blank space), the gateway is a default gateway.
Figure 9: IP Gateways Form
Destination
Synopsis: ###.###.###.### where ### ranges from 0 to 255 Default: 0.0.0.0
Specifies the IP address of the destination device. An IP address is a 32-bit number that is notated by using four numbers from 0 through 255, separated by periods.
Subnet
Synopsis: ###.###.###.### where ### ranges from 0 to 255 Default: 0.0.0.0
Specifies the IP subnet mask of the destination. An IP subnet mask is a 32-bit number that is notated by using four numbers from 0 through 255, separated by periods. Typically, subnet mask numbers use either 0 or 255 as values (e.g. 255.255.255.0) but other numbers can appear.
Gateway
Synopsis: ###.###.###.### where ### ranges from 0 to 255 Default: 0.0.0.0
Specifies the gateway IP address. The gateway address must be on the same IP subnet as this device.
Note: The default gateway configuration will not be changed when resetting all configuration parameters to defaults.
ROS™ v3.5 |
28 |
RS400 |
Administration
1.7 IP Services
These parameters provide the ability to configure properties for IP services provided by the device.
Figure 10: IP Services Form
Inactivity Timeout
Synopsis: 1 to 60 or { Disabled } Default: 5 min
Specifies when the console will timeout and display the login screen if there is no user activity. A value of zero disables timeouts for console and Telnet users. For Web Server users maximum timeout value is limited to 30 minutes.
Telnet Sessions Allowed
Synopsis: 0 to 4 Default: 4
Limits the number of Telnet sessions. A value of zero prevents any Telnet access.
Web Server Users Allowed
Synopsis: 1 to 16 Default: 16
Limits the number of simultaneous web server users.
TFTP Server
Synopsis: { Disabled, Get Only, Enabled } Default: Get Only
As TFTP is a very insecure protocol, this parameter allows the user to limit or disable TFTP
RS400 |
29 |
ROS™ v3.5 |
Administration
Server access.
DISABLED |
- |
disables read and write access to TFTP Server |
GET ONLY |
- |
only allows to read files via TFTP Server |
ENABLED |
- |
allows to read and write files via TFTP Server |
ModBus Address
Synopsis: 1 to 254 or { Disabled } Default: Disabled
Determines the Modbus address to be used for Management through Modbus.
SSH Sessions Allowed
Synopsis: 1 to 4 Default: 4
Limits the number of SSH sessions.
RSH Server
Synopsis: { Disabled, Enabled } Default: Enabled
Disables/enables Remote Shell access.
ROS™ v3.5 |
30 |
RS400 |