RuggedCom RS400 User Manual

Rugged Operating System
(ROS)
v3.5 User Guide
For use with:
RS400
Copyright
COPYRIGHT © 2008 RuggedCom Inc. ALL RIGHTS RESERVED
Dissemination or reproduction of this document, or evaluation and communication of its contents, is not authorized except where expressly permitted. Violations are liable for damages. All rights reserved, particularly for the purposes of patent application or trademark registration.
This document contains proprietary information, which is protected by copyright. All rights are reserved. No part of this document may be photocopied, reproduced or translated to another language without the prior written consent of RuggedCom Inc.
Disclaimer of liability
We have checked the contents of this manual against the hardware and software described. However, deviations from the description cannot be completely ruled out.
RuggedCom shall not be liable for any errors or omissions contained herein or for consequential damages in connection with the furnishing, performance, or use of this material.
The information given in this document is reviewed regularly and any necessary corrections will be included in subsequent editions. We appreciate any suggested improvements. We reserve the right to make technical improvements without notice.
Registered Trademarks
RuggedSwitch™ and RuggedServer™ are registered trademarks of RuggedCom Inc. Other designations in this manual might be trademarks whose use by third parties for their own purposes would infringe the rights of the owner.
Warranty
Five (5) years from date of purchase, return to factory. For warranty details, visit www.ruggedcom.com or contact your customer service representative.
Contacting RuggedCom
Corporate Headquarters US Headquarters Europe Headquarters
RuggedCom Inc. 30 Whitmore Road Woodbridge, Ontario Canada, L4L 7Z4
Tel: (905) 856-5288 Fax: (905) 856-1995 Toll-free: 1 (888) 264-0006
RuggedCom 1930 Harrison St., Suite-307 Hollywood, Florida USA, 33020
Tel: (954) 922-7975 Fax: (954) 922-7984 Toll-free: 1 (866) 922-7975
Email: RuggedSales@RuggedCom.com
Technical Support
Toll Free (North America): 1 (866) 922-7975 International: +1 (905) 856-5288 Email: Support@RuggedCom.com
Web: www.RuggedCom.com
RuggedCom Unit 41, Aztec Centre, Aztec West, Almondsbury, Bristol United Kingdom BS32 4TD
Tel: +44 1454 203 404 Fax: +44 1454 203 403
Table Of Contents
Table Of Contents
Table Of Contents.....................................................................................................................................3
Table Of Figures .......................................................................................................................................9
Preface ...................................................................................................................................................13
Supported Platforms ...........................................................................................................................13
Who Should Use This User Guide ......................................................................................................13
How Chapters are organized ..............................................................................................................13
Document Conventions.......................................................................................................................13
Applicable Firmware Revision.............................................................................................................14
Firmware/User Guide Version Numbering System .............................................................................14
1 Administration .................................................................................................................................15
1.1 The ROS User Interface.......................................................................................................15
1.1.1 Using the RS232 Port to Access the User Interface .......................................................15
1.1.2 The Structure of the User Interface .................................................................................16
1.1.3 Making Configuration Changes .......................................................................................16
1.1.4 Updates Occur In Real Time ...........................................................................................17
1.1.5 Alarm Indications Are Provided .......................................................................................17
1.1.6 The CLI Shell...................................................................................................................17
1.2 The ROS Secure Shell Server .............................................................................................17
1.2.1 Using a Secure Shell to Access the User Interface.........................................................17
1.2.2 Using a Secure Shell to Transfer Files............................................................................17
1.3 The ROS Web Server Interface ...........................................................................................18
1.3.1 Using a Web Browser to Access the Web Interface........................................................18
1.3.2 The Structure of the Web Interface .................................................................................21
1.3.3 Making Configuration Changes .......................................................................................21
1.3.4 Updating Statistics Displays ............................................................................................22
1.4 Administration Menu ...............................................................................................................23
1.5 IP Interfaces ............................................................................................................................25
1.6 IP Gateways............................................................................................................................28
1.7 IP Services ..............................................................................................................................29
1.8 System Identification ...............................................................................................................31
1.9 Passwords...............................................................................................................................32
1.10 Time and Date.........................................................................................................................34
1.11 SNMP Management................................................................................................................36
1.11.1 SNMP Users....................................................................................................................36
1.11.2 SNMP Security to Group Maps .......................................................................................38
1.11.3 SNMP Access .................................................................................................................39
1.12 RADIUS...................................................................................................................................42
1.12.1 RADIUS overview............................................................................................................42
1.12.2 User Login Authentication and Authorization ..................................................................42
1.12.3 802.1X Authentication (not supported in RS400, N/A for RMC30)..................................43
1.12.4 Radius Server Configuration ...........................................................................................44
1.13 TACACS+ ...............................................................................................................................46
1.13.1 User Login Authentication and Authorization ..................................................................46
1.13.2 TACACS+ Server Configuration......................................................................................46
RS400 3 ROS™ v3.5
Table Of Contents
1.14
DHCP Relay Agent (N/A for RMC30)......................................................................................48
1.15 Syslog .....................................................................................................................................49
1.15.1 Configuring Local Syslog.................................................................................................49
1.15.2 Configuring Remote Syslog Client ..................................................................................50
1.15.3 Configuring Remote Syslog Server .................................................................................50
1.16 Troubleshooting ......................................................................................................................52
2 Serial Protocols ...............................................................................................................................53
2.1 Serial Protocols Overview .......................................................................................................53
2.1.1 ‘Raw Socket’ protocol features........................................................................................53
2.1.2 ‘Preemptive Raw Socket’ protocol features.....................................................................53
2.1.3 ‘Modbus’ protocol features ..............................................................................................54
2.1.4 ‘DNP’ protocol features ...................................................................................................54
2.1.5 ‘Microlok’ protocol features..............................................................................................54
2.1.6 ‘WIN’ protocol features ....................................................................................................54
2.1.7 ‘TIN’ protocol features .....................................................................................................54
2.2 Serial Protocols Operation ......................................................................................................55
2.2.1 Serial Encapsulation Applications ...................................................................................55
2.2.2 Modbus Server and Client Applications ..........................................................................59
2.2.3 DNP 3.0, Microlok, TIN and WIN Applications ................................................................62
2.2.4 Transport Protocols .........................................................................................................65
2.2.5 Force Half Duplex Mode of Operation.............................................................................66
2.3 Serial Protocol Configuration and Statistics ............................................................................67
2.3.1 Serial Ports......................................................................................................................68
2.3.2 Raw Socket .....................................................................................................................70
2.3.3 Preemptive Raw Socket ..................................................................................................73
2.3.4 Modbus Server ................................................................................................................75
2.3.5 Modbus Client .................................................................................................................76
2.3.6 WIN and TIN....................................................................................................................77
2.3.7 MicroLok..........................................................................................................................79
2.3.8 DNP.................................................................................................................................80
2.3.9 Mirrored Bits ....................................................................................................................81
2.3.10 Device Addresses ...........................................................................................................83
2.3.11 Dynamic Device Addresses ............................................................................................85
2.3.12 Links Statistics.................................................................................................................86
2.3.13 Connection Statistics .......................................................................................................87
2.3.14 Serial Port Statistics ........................................................................................................88
2.3.15 Clearing Serial Port Statistics ..........................................................................................90
2.3.16 Resetting Serial Ports......................................................................................................90
2.4 Troubleshooting ......................................................................................................................91
3 Ethernet Ports .................................................................................................................................93
3.1 Controller Protection Through Link-Fault-Indication (LFI) .......................................................93
3.2 Ethernet Ports Configuration and Status.................................................................................95
3.2.1 Port Parameters ..............................................................................................................96
3.2.2 Port Rate Limiting............................................................................................................99
3.2.3 Port Mirroring.................................................................................................................100
3.2.4 Link Detection Options ..................................................................................................102
3.2.5 PoE Parameters (when applicable)...............................................................................103
3.2.6 EoVDSL Parameters (when applicable)........................................................................105
3.2.7 Port Status.....................................................................................................................108
Table Of Contents
3.2.8
Resetting Ports..............................................................................................................109
3.3 Troubleshooting ....................................................................................................................109
4 Ethernet Statistics .........................................................................................................................111
4.1 Viewing Ethernet Statistics....................................................................................................112
4.2 Viewing Ethernet Port Statistics ............................................................................................114
4.3 Clearing Ethernet Port Statistics ...........................................................................................119
4.4 Remote Monitoring (RMON) .................................................................................................120
4.4.1 RMON History Controls.................................................................................................120
4.4.2 RMON History Samples ................................................................................................122
4.4.3 RMON Alarms ...............................................................................................................125
4.5 RMON Events .......................................................................................................................129
4.6 RMON Event Log ..................................................................................................................131
5 Spanning Tree ..............................................................................................................................133
5.1 RSTP Operation....................................................................................................................133
5.1.1 RSTP States and Roles ................................................................................................134
5.1.2 Edge Ports.....................................................................................................................136
5.1.3 Point-to-Point and Multipoint Links................................................................................136
5.1.4 Path and Port Costs ......................................................................................................136
5.1.5 Bridge Diameter ............................................................................................................137
5.2 MSTP Operation ...................................................................................................................138
5.2.1 MST Regions and Interoperability .................................................................................138
5.2.2 MSTP Bridge and Port Roles ........................................................................................139
5.2.3 Benefits of MSTP ..........................................................................................................141
5.2.4 Implementing MSTP on a Bridged Network ..................................................................142
5.3 RSTP Applications ................................................................................................................143
5.3.1 RSTP in Structured Wiring Configurations ....................................................................143
5.3.2 RSTP in Ring Backbone Configurations .......................................................................144
5.3.3 RSTP Port Redundancy ................................................................................................145
5.4 Spanning Tree Configuration ................................................................................................146
5.4.1 Bridge RSTP Parameters..............................................................................................147
5.4.2 Port RSTP Parameters..................................................................................................150
5.4.3 MST Region Identifier....................................................................................................153
5.4.4 Bridge MSTI Parameters...............................................................................................154
5.4.5 Port MSTI Parameters...................................................................................................155
5.5 Spanning Tree Statistics .......................................................................................................157
5.5.1 Bridge RSTP Statistics ..................................................................................................157
5.5.2 Port RSTP Statistics......................................................................................................159
5.5.3 Bridge MSTI Statistics ...................................................................................................162
5.5.4 Port MSTI Statistics.......................................................................................................163
5.6 Troubleshooting ....................................................................................................................166
6 VLANs ...........................................................................................................................................169
6.1 VLAN Operation ....................................................................................................................169
6.1.1 VLANs and Tags ...........................................................................................................169
6.1.2 Tagged vs. Untagged Frames.......................................................................................169
6.1.3 Native VLAN..................................................................................................................169
6.1.4 Management VLAN .......................................................................................................169
6.1.5 Edge and Trunk Port Types ..........................................................................................170
6.1.6 VLAN Ingress and Egress Rules...................................................................................170
RS400 5 ROS™ v3.5
Table Of Contents
6.1.7
Forbidden Ports List ......................................................................................................171
6.1.8 VLAN-aware and VLAN-unaware operation modes......................................................171
6.1.9 GVRP (Generic VLAN Registration Protocol) ...............................................................172
6.1.10 QinQ (not supported in RS400 and RS8000/RS1600 families).....................................173
6.2 VLAN Applications ................................................................................................................175
6.2.1 Traffic Domain Isolation.................................................................................................175
6.2.2 Administrative Convenience..........................................................................................176
6.2.3 Reduced Hardware .......................................................................................................176
6.3 VLAN Configuration ..............................................................................................................177
6.3.1 Global VLAN Parameters ..............................................................................................177
6.3.2 Static VLANs .................................................................................................................178
6.3.3 Port VLAN Parameters..................................................................................................180
6.3.4 VLAN Summary.............................................................................................................182
6.4 Troubleshooting ....................................................................................................................183
7 Classes of Service ........................................................................................................................185
7.1 CoS Operation ......................................................................................................................185
7.1.1 Inspection Phase...........................................................................................................185
7.1.2 Forwarding Phase .........................................................................................................186
7.2 CoS Configuration.................................................................................................................187
7.2.1 Global CoS Parameters ................................................................................................187
7.2.2 Port CoS Parameters ....................................................................................................188
7.2.3 Priority to CoS Mapping ................................................................................................189
7.2.4 DSCP to CoS Mapping..................................................................................................191
7.2.5 CoS Access Priorities (RS8000 and RS1600 families only)..........................................192
8 Multicast Filtering ..........................................................................................................................195
8.1 IGMP .....................................................................................................................................195
8.1.1 Router and Host IGMP Operation .................................................................................195
8.1.2 Switch IGMP Operation.................................................................................................196
8.1.3 Combined Router and Switch IGMP Operation.............................................................198
8.2 Multicast Filtering Configuration and Status..........................................................................200
8.2.1 Configuring IGMP Parameters ......................................................................................200
8.2.2 Configuring Static Multicast Groups ..............................................................................202
8.2.3 Viewing IP Multicast Groups .........................................................................................203
8.3 Troubleshooting ....................................................................................................................204
9 MAC Address Tables ....................................................................................................................207
9.1 Viewing MAC Addresses.......................................................................................................208
9.2 Configuring MAC Address Learning Options ........................................................................209
9.3 Configuring Static MAC Address Table.................................................................................209
9.4 Purging MAC Address Table.................................................................................................211
10 Network Discovery ....................................................................................................................213
10.1 LLDP Operation ....................................................................................................................213
10.2 Network Discovery Menu ......................................................................................................214
10.2.1 Global LLDP Parameters ..............................................................................................215
10.2.2 Port LLDP Parameters ..................................................................................................216
10.2.3 LLDP Global Remote Statistics.....................................................................................217
10.2.4 LLDP Neighbor Information...........................................................................................218
10.2.5 LLDP Statistics ..............................................................................................................219
Table Of Contents
11
PPP over Modem ......................................................................................................................221
11.1 PPP over Modem Operation .................................................................................................221
11.1.1 Remote Dial-in For Monitoring ......................................................................................221
11.1.2 Router Concentration ....................................................................................................222
11.1.3 Assigning IP Addresses For PPP ..................................................................................223
11.1.4 PAP/CHAP Authentication ............................................................................................223
11.1.5 Static Routes .................................................................................................................224
11.2 PPP Configuration.................................................................................................................225
11.2.1 Modem Settings ............................................................................................................226
11.2.2 PPP Control...................................................................................................................227
11.2.3 PPP Users .....................................................................................................................229
11.2.4 PPP Statistics ................................................................................................................231
11.2.5 Clearing PPP Statistics .................................................................................................233
11.2.6 Resetting PPP ...............................................................................................................233
11.3 Troubleshooting ....................................................................................................................234
12 Diagnostics................................................................................................................................237
12.1 Using the Alarm System........................................................................................................237
12.1.1 Active Alarms ................................................................................................................238
12.1.2 Passive Alarms..............................................................................................................238
12.1.3 Alarms and the Critical Failure Relay ............................................................................238
12.1.4 Viewing and Clearing Alarms ........................................................................................238
12.2 Viewing CPU Diagnostics .....................................................................................................239
12.3 Viewing and Clearing the System Log ..................................................................................241
12.4 Viewing Product Information .................................................................................................242
12.5 Loading Factory Default Configuration..................................................................................243
12.6 Resetting the Device .............................................................................................................243
13 Using the CLI Shell ...................................................................................................................245
13.1 Entering and Leaving the Shell .............................................................................................245
13.2 Summary Of CLI Commands available in ROS™.................................................................245
13.2.1 Getting Help for a Command.........................................................................................246
13.2.2 Viewing Files .................................................................................................................246
13.2.3 Pinging a Remote Device..............................................................................................247
13.2.4 Tracing Events ..............................................................................................................247
13.2.5 Viewing DHCP Learned Information .............................................................................249
13.2.6 Executing Commands Remotely Through RSH ............................................................249
13.2.7 Resetting the Device .....................................................................................................250
14 Upgrading Firmware and Managing Configurations..................................................................251
14.1 Upgrading Firmware..............................................................................................................251
14.1.1 Upgrading Firmware using XModem .............................................................................251
14.1.2 Upgrading Firmware Using a TFTP Client on Your Workstation...................................252
14.1.3 Upgrading Firmware Using ROS TFTP Client............................................................253
14.2 Capturing Configurations ......................................................................................................254
14.2.1 Capturing Configurations with XModem ........................................................................254
14.2.2 Capturing Configurations with TFTP .............................................................................254
14.3 Using SQL Commands .........................................................................................................255
14.3.1 Getting Started ..............................................................................................................255
14.3.2 Finding the Correct Table ..............................................................................................255
14.3.3 Retrieving Information ...................................................................................................256
RS400 7 ROS™ v3.5
Table Of Contents
14.3.4
14.3.5 Setting Default Values in a Table ..................................................................................257
14.3.6 Using RSH and SQL .....................................................................................................258
Appendix A - SNMP MIB Support .........................................................................................................259
Standard MIBs ..................................................................................................................................259
RuggedCom proprietary MIBs ..........................................................................................................260
Appendix B – SNMP Trap Summary ....................................................................................................261
Appendix C – List of Objects Eligible for RMON Alarms.......................................................................262
Appendix E – ModBus Management Support and Memory Map..........................................................267
Modbus Memory Map .......................................................................................................................268
Index .....................................................................................................................................................273
Changing Values in a Table ..........................................................................................257
Table Of Figures
Table Of Figures
Figure 1: Main Menu With Screen Elements Identified...........................................................................16
Figure 2: Log in to The Device with a Web Browser..............................................................................19
Figure 3: Log in to The Device with a Web Browser (secure login banner)...........................................20
Figure 4: Main Menu via Web Server Interface ......................................................................................21
Figure 5: Parameters Form Example......................................................................................................22
Figure 6: Administration Menu................................................................................................................24
Figure 7: IP Interfaces Table ..................................................................................................................25
Figure 8: IP Interfaces Form ...................................................................................................................26
Figure 9: IP Gateways Form...................................................................................................................28
Figure 10: IP Services Form ...................................................................................................................29
Figure 11: System Identification Form ....................................................................................................31
Figure 12: Passwords Form....................................................................................................................32
Figure 13: Time and Date Form..............................................................................................................34
Figure 14: SNMP User Table..................................................................................................................36
Figure 15: SNMP User Form ..................................................................................................................37
Figure 16: SNMP Security to Group Maps Table....................................................................................38
Figure 17: SNMP Security to Group Maps Form ....................................................................................38
Figure 18: SNMP Access Table..............................................................................................................39
Figure 19: SNMP Access Form ..............................................................................................................40
Figure 20: RADIUS Server summary......................................................................................................44
Figure 21: RADIUS Server Form ............................................................................................................44
Figure 22: TACACS+ Server summary...................................................................................................46
Figure 23: TACACS+ Server Form .........................................................................................................47
Figure 24: DHCP Relay Agent Form.......................................................................................................48
Figure 25: Local Syslog Form.................................................................................................................49
Figure 26: Remote Syslog Client Form...................................................................................................50
Figure 27: Remote Syslog Server Table.................................................................................................50
Figure 28: Remote Syslog Server Form .................................................................................................51
Figure 29: Using A Router As A Gateway...............................................................................................52
Figure 30: Character Encapsulation .......................................................................................................55
Figure 31: RTU Polling ...........................................................................................................................55
Figure 32: Broadcast RTU Polling ..........................................................................................................56
Figure 33: Permanent and Dynamic Master Connection Support ..........................................................57
Figure 34: Modbus Client and Server .....................................................................................................59
Figure 35: Sources of Delay and Error in an End-to-End Exchange ......................................................60
Figure 36: Source/Destination Two Way Communication ......................................................................62
Figure 37: Optical loop topology .............................................................................................................66
Figure 38: Serial Protocols Menu............................................................................................................67
Figure 39: Serial Ports Table ..................................................................................................................68
Figure 40: Serial Ports Form...................................................................................................................68
Figure 41: Raw Socket Table .................................................................................................................70
Figure 42: Raw Socket Form ..................................................................................................................71
Figure 43: Preemptive Raw Socket Table ..............................................................................................73
Figure 44: Preemptive Raw Socket Form...............................................................................................73
Figure 45: Modbus Server Table ............................................................................................................75
Figure 46: Modbus Server Form.............................................................................................................75
Figure 47: Modbus Client Form ..............................................................................................................76
RS400 9 ROS™ v3.5
Table Of Figures
Figure 48: WIN and TIN Form.................................................................................................................77
Figure 49: MicroLok Form.......................................................................................................................79
Figure 50: DNP Form..............................................................................................................................80
Figure 51: Mirrored Bits Table ................................................................................................................81
Figure 52: Mirrored Bits Form.................................................................................................................82
Figure 53: Device Address Table............................................................................................................83
Figure 54: Device Address Form ............................................................................................................84
Figure 55: Dynamic Device Address Table.............................................................................................85
Figure 56: Dynamic Device Address Form .............................................................................................85
Figure 57: Links Statistics Table.............................................................................................................86
Figure 58: Links Statistics Form..............................................................................................................87
Figure 59: Connection Statistics Table ...................................................................................................88
Figure 60: Serial Port Statistics Table.....................................................................................................89
Figure 61: Clear Serial Port Statistics Form............................................................................................90
Figure 62: Reset Serial Port(s) Form......................................................................................................90
Figure 63: Controller Protection Through LFI .........................................................................................93
Figure 64: Ethernet Ports Menu..............................................................................................................95
Figure 65: Port Parameters Table...........................................................................................................96
Figure 66: Port Parameters Form ...........................................................................................................96
Figure 67: Port Rate Limiting Table ........................................................................................................99
Figure 68: Port Rate Limiting Form.........................................................................................................99
Figure 69: Port Mirroring Form..............................................................................................................101
Figure 70: Link Detection Form.............................................................................................................102
Figure 71: Accessing PoE Parameters.................................................................................................103
Figure 72: PoE Parameters Table ........................................................................................................103
Figure 73: PoE Parameters Form.........................................................................................................104
Figure 74: Accessing EoVDSL Parameters ..........................................................................................106
Figure 75: EoVDSL Parameters Table .................................................................................................106
Figure 76: EoVDSL Parameters Form ..................................................................................................107
Figure 77: Port Status Table.................................................................................................................108
Figure 78: Ethernet Port Statistics Menu ..............................................................................................111
Figure 79: Ethernet Statistics Table......................................................................................................112
Figure 80: Ethernet Port Statistics Table ..............................................................................................114
Figure 81: Ethernet Port Statistics Form...............................................................................................115
Figure 82: Clear Ethernet Port Statistics Form .....................................................................................119
Figure 83: RMON History Controls Table .............................................................................................120
Figure 84: RMON History Controls Form..............................................................................................121
Figure 85: RMON History Samples Table.............................................................................................122
Figure 86: RMON History Samples Form .............................................................................................123
Figure 87: The Alarm Process ..............................................................................................................126
Figure 88: RMON Alarms Table............................................................................................................126
Figure 89: RMON Alarms Form ............................................................................................................127
Figure 90: RMON Events Table............................................................................................................129
Figure 91: RMON Events Form ............................................................................................................130
Figure 92: RMON Event Log Table.......................................................................................................131
Figure 93: RMON Event Log Form .......................................................................................................132
Figure 94: Bridge and Port States ........................................................................................................134
Figure 95: Bridge and Port Roles .........................................................................................................135
Figure 96: Example of a Structured Wiring Configuration.....................................................................143
Figure 97: Example of a Ring Backbone Configuration........................................................................144
Figure 98: Port Redundancy.................................................................................................................145
Table Of Figures
Figure 99: Spanning Tree Menu ...........................................................................................................146
Figure 100: Bridge RSTP Parameters Form.........................................................................................147
Figure 101: Port RSTP Parameter Table..............................................................................................150
Figure 102: Port RSTP Parameter Form ..............................................................................................150
Figure 103: MST Region Identifier Table..............................................................................................153
Figure 104: Bridge MSTI Parameters ...................................................................................................154
Figure 105: Port MSTI Parameter Table...............................................................................................155
Figure 106: Port MSTI Parameter Form ...............................................................................................155
Figure 107: Bridge RSTP Statistics Form.............................................................................................157
Figure 108: Port RSTP Statistics Table ................................................................................................159
Figure 109: Bridge RSTP Parameters Form.........................................................................................160
Figure 110: Bridge MSTI Statistics Table .............................................................................................162
Figure 111: Port MSTI Statistics Table .................................................................................................163
Figure 112: Port MSTI Statistics Form..................................................................................................164
Figure 113: Using GVRP ......................................................................................................................173
Figure 114: Using QinQ Example .........................................................................................................174
Figure 115: Multiple overlapping VLANs...............................................................................................175
Figure 116: Inter-VLAN Communications .............................................................................................176
Figure 117: Virtual LANs Menu.............................................................................................................177
Figure 118: Global VLAN Parameters Form .........................................................................................177
Figure 119: Static VLANs Table............................................................................................................178
Figure 120: Static VLANs Form ............................................................................................................178
Figure 121: Port VLAN Parameters Table ............................................................................................180
Figure 122: Port VLAN Parameters Form.............................................................................................180
Figure 123: VLAN Summary Table .......................................................................................................182
Figure 124: Determining The CoS Of A Received Frame.....................................................................186
Figure 125: Classes Of Service Menu ..................................................................................................187
Figure 126: Global CoS Parameters Form ...........................................................................................187
Figure 127: Port CoS Parameter Table ................................................................................................188
Figure 128: Port CoS Parameter Form.................................................................................................189
Figure 129: Priority to CoS Mapping Table...........................................................................................189
Figure 130: Priority to CoS Mapping Form ...........................................................................................190
Figure 131: TOS DSCP to CoS Mapping Table....................................................................................191
Figure 132: TOS DSCP to CoS Mapping Form ....................................................................................191
Figure 133: CoS Access Priorities Table ..............................................................................................192
Figure 134: CoS Access Priorities Form...............................................................................................193
Figure 135: IGMP Operation Example 1...............................................................................................196
Figure 136: IGMP Operation Example 2...............................................................................................198
Figure 137: Multicast Filtering Menu.....................................................................................................200
Figure 138: IGMP Parameters Form.....................................................................................................200
Figure 139: Static Multicast Groups Table............................................................................................202
Figure 140: Static Multicast Group Form ..............................................................................................202
Figure 141: IP Multicast Groups Table .................................................................................................203
Figure 142: MAC Address Tables Menu...............................................................................................207
Figure 143: Address Table....................................................................................................................208
Figure 144: MAC Address Learning Options Form...............................................................................209
Figure 145: Static MAC Address Table.................................................................................................210
Figure 146: Static MAC Address Form .................................................................................................210
Figure 147: Network Discovery Menu...................................................................................................214
Figure 148: Global LLDP Parameters Form .........................................................................................215
Figure 149: Port LLDP Parameters Table.............................................................................................216
RS400 11 ROS™ v3.5
Table Of Figures
Figure 150: Port LLDP Parameters Form .............................................................................................216
Figure 151: LLDP Global Remote Statistics Form ................................................................................217
Figure 152: LLDP Neighbor Information Table .....................................................................................218
Figure 153: LLDP Statistics Table ........................................................................................................219
Figure 154: Remote Dial-in For Monitoring...........................................................................................221
Figure 155: Router Concentration.........................................................................................................222
Figure 156: PPP Configuration Menu ...................................................................................................225
Figure 157: PPP Modem Settings Form ...............................................................................................226
Figure 158: PPP Control Form..............................................................................................................227
Figure 159: PPP Users Table ...............................................................................................................229
Figure 160: PPP Users Form................................................................................................................229
Figure 161: PPP Statistics Form...........................................................................................................231
Figure 162: Clear PPP Statistics Form .................................................................................................233
Figure 163: Reset PPP Port Form ........................................................................................................233
Figure 164: Gateway Collisions ............................................................................................................235
Figure 165: Diagnostics Menu ..............................................................................................................237
Figure 166: Alarm Table .......................................................................................................................238
Figure 167: CPU Diagnostics Form ......................................................................................................239
Figure 168: Viewing the System Log ....................................................................................................241
Figure 169: Product Information Form..................................................................................................242
Figure 170: Load Factory Defaults Dialog ............................................................................................243
Figure 171: Reset Device Dialog ..........................................................................................................244
Figure 172: Displaying the list of available commands.........................................................................245
Figure 173: Displaying help for a command .........................................................................................246
Figure 174: Displaying Directory of a RuggedCom Device...................................................................246
Figure 175: Displaying Trace settings...................................................................................................248
Figure 176: Enabling Trace...................................................................................................................248
Figure 177: Starting Trace ....................................................................................................................249
Figure 178 Example of an Upgrade using XModem.............................................................................251
Figure 179 Example of an Upgrade using a TFTP client on your workstation......................................252
Figure 180 Example of an Upgrade using ROS TFTP Client.............................................................253
Figure 181 The SQL command and SQL help......................................................................................255
Figure 182 Brief snippet of SQL command for finding the correct table name .....................................256
Figure 183 Selecting a table .................................................................................................................256
Figure 184 Select a parameter within a table .......................................................................................256
Figure 185 Selecting rows in a table based upon parameter values ....................................................257
Figure 186 Selecting rows in a table based upon multiple parameter values.......................................257
Figure 187 Changing Values In A Table...............................................................................................257
Figure 188 Setting default values into a table.......................................................................................257
Figure 189 Using RSH and SQL...........................................................................................................258
Preface
Preface
This manual contains instructions, examples, guidelines, and general theory on how to use the Rugged Operating System (ROS™) management software.
Supported Platforms
ROS™ has been designed to work on many RuggedCom product hardware platforms. This ensures consistency of the user experience when migrating from one product model to another. In fact, a single ‘binary’ image supports all RuggedCom ROS™ based products that includes:
RuggedSwitch™ i800, i801, i802, and i803
RuggedSwitch™ RS8000 and RS1600
RuggedSwitch™ RS900/RS930 with both ‘L’ (EoVDSL) and ‘W’ (WLAN) port variants
RuggedSwitch™ RS900G/RS940G with Gigabit
RuggedSwitch™ RS969/M969 waterproof with Gigabit
RuggedSwitch™ RSG2100/M2100 and RSG2200/M2200 modular switches with Gigabit
RuggedServer™ RS416, RS910 and RS920 modular servers
RuggedServer™ RS400
RuggedServer™ RMC30
Each product model has a subset of the entire ROS™ feature set. This manual is intended for use with the RS400 product model(s) and has been streamlined to only describe the relevant features.
Who Should Use This User Guide
This guide is to be used by network technical support personnel who are familiar with the operation of networks. Others who might find the book useful are network and system planners, system programmers and line technicians.
How Chapters are organized
The index of this guide has been prepared with:
Entries to each of the “Features” sections of the manual
Entries to each of the “Troubleshooting” sections of the manual (located at the end of each
chapter)
Entries to each of the Menus, organized by name
Document Conventions
This publication uses the following conventions:
Note: Means reader take note. Notes contain helpful suggestions or references to materials not
contained in this guide.
It is recommended that you use this guide along with the following applicable documents:
RS400 13 ROS™ v3.5
Preface
RS400 Installation Guide
RuggedCom Fiber Guide
RuggedCom Wireless Guide
White paper: Rapid Spanning Tree in Industrial Networks
Applicable Firmware Revision
This guide is applicable to ROS™ software revision v3.5.x.
Firmware/User Guide Version Numbering System
ROS has a three-digit version numbering system of the form X.Y.Z where each digit is a number starting from zero. The 'X.Y' digits represent the functional version of ROS whereas the 'Z' digit represents firmware patches. The 'X' digit is incremented for major functional updates of the product. The 'Y' digit is incremented for minor functional updates of the product. The 'Z' digit is incremented for bug fixes, cosmetic enhancements and other minor issues.
User guides follow the same format. In general, a user guide will have the same 'X.Y' digits as the firmware to which it corresponds.
It is RuggedCom's policy to provide Web access to only the latest 'patch' release for a version of firmware. If you decide that an upgrade is merited, then getting all the fixes only makes sense. It is for this reason that release notes are created detailing all patches for a given functional version.
ROS™ v3.5 14 RS400
Administration
1 Administration
The Administration menu covers the configuration of administrative parameters of both device and network (local services availability, security methods employed, system identification and functionality related to the IP network):
IP Address, Subnet Mask and Gateway Address (static or dynamically obtainable)
Management VLAN
Management Connection Inactivity Timeout
TFTP Server Permissions
System Identification
Passwords
Time and Date
SNTP to keep the time and date synchronized
SNMP Management
Radius Server
DHCP Relay Agent
Remote Syslog
1.1 The ROS User Interface
1.1.1 Using the RS232 Port to Access the User Interface
Attach a terminal (or PC running terminal emulation software) to the RS232 port. The terminal should be configured for 8 bits, no parity operation at 57.6 Kbps. Hardware and software flow control must be disabled. Select a terminal type of VT100.
Once the terminal is connected, pressing any key on the keyboard will prompt for the username and password to be entered.
The switch is shipped with a default administrator username “admin” and password “admin”. Once successfully logged in, the user will be presented with the main menu.
RS400 15 ROS™ v3.5
Administration
1.1.2 The Structure of the User Interface
The user interface is organized as a series of menus with an escape to a command line interface (CLI) shell. Each menu screen presents the switch name (as proved by the System Identification parameter), Menu Title, Access Level, Alarms indicator, Sub-Menus and Command Bar.
Sub-menus are entered by selecting the desired menu with the arrow keys and pressing the enter key. Pressing the escape key ascends to the parent menu.
Figure 1: Main Menu With Screen Elements Identified
The command bar offers a list of commands that apply to the currently displayed menu. These commands include:
<CTRL> Z to display help on the current command or data item
<CTRL> S to switch to the CLI shell
<CTRL> U/D to jump to next/previous page of a status display
The main menu also provides a <CTRL> X command, which will terminate the session. This type of menu is accessible via serial consol, telnet session and SSH session.
1.1.3 Making Configuration Changes
When changing a data item the user selects the data item by the cursor keys and then pressing the enter key. The cursor will change position to allow editing of the data item.
ROS™ v3.5 16 RS400
Administration
Typing a new value after pressing enter always erases the old parameter value. The left and right cursor keys can be used to position the edit point without erasing the old parameter value. The up and down cursor keys can be used to cycle through the next higher and lower values for the parameter.
After the parameter has been edited, press enter again to change other parameters. When all desired parameters have been modified, press <CTRL> A to apply changes. The switch will automatically prompt you to save changes when you leave a menu in which changes have been made.
Some menus will require you to press <CTRL> I to insert a new record of information and <CTRL> L to delete a record.
1.1.4 Updates Occur In Real Time
All configuration and display menus present the values at the current instant, automatically updating if changed from other user interface sessions or SNMP. All statistics menus will display changes to statistics as they occur.
1.1.5 Alarm Indications Are Provided
Alarms are events for which the user is notified through the Diagnostics submenu. All configuration and display menus present an indication of the number of alarms (in the upper right hand corner of the screen) as they occur, automatically updating as alarms are posted and cleared.
1.1.6 The CLI Shell
The user interface provides a shell for operations that are more easily performed at the command line. You may switch back and forth from the menu system and shell by pressing <CTRL> S. For more information on the capabilities of the shell see the approapriate chapter of this guide.
1.2 The ROS Secure Shell Server
1.2.1 Using a Secure Shell to Access the User Interface
SSH (Secure Shell) is a network protocol which provides a replacement for insecure remote login and command execution facilities, such as telnet and remote shell. SSH encrypts traffic in both directions, preventing traffic sniffing and password theft.
SSH protocol version 2 is implemented in ROS. The authentication method is keyboard interactive password authentication. User name will not be verified in order to grant access to SSH server. The passwords to be used for login are configured in Password Table and user’s privileges are the same as for user logged in via the console port.
1.2.2 Using a Secure Shell to Transfer Files
ROS implements SFTP protocol over SSH to transfer files in secure manner. The file system is created in one directory only. Also, all the files are created in the system at startup time and can not be deleted, created, renamed. Files can be downloaded (upgraded) and uploaded (to be analyzed outside of the unit).
The implemented commands are:
dir – a file directory
RS400 17 ROS™ v3.5
Administration
get – upload from the switch and download to PC put – upload from PC and download to PC
1.3 The ROS Web Server Interface
1.3.1 Using a Web Browser to Access the Web Interface
A web browser uses a secure communications method called Secure Socket Layer (SSL) to encrypt traffic exchanged with its clients. Web server guarantees that communications with the client is kept private. If client requires access via unsecure http port, it will be rerouted to the secure port. The access via SSL will be granted any client that provides the correct password.
Your browser may complain about SSL Certificate that Web server issues. It happens because the certificate that comes with the Web server is not issued by a recognized certificate authority. However, network traffic is still encrypted.
Start a web browser session and open a connection to the switch by entering a URL that specifies its hostname or IP address (e.g. h the login process by clicking on the “Login” link. The resulting page should be similar to that presented below:
ttp://179.1.0.45). Once the switch is contacted, start
ROS™ v3.5 18 RS400
Administration
Figure 2: Log in to The Device with a Web Browser
Enter the “admin” user name and the appropriate password for the admin user, and then click on the “LogIn” button. The switch is shipped with a default administrator password of “admin”. Once successfully logged in, the user will be presented with the main menu.
If the user wants to hide device information from the login screen, the ‘Login Banner’ option in the System Identification menu must be set to ‘secure’.
RS400 19 ROS™ v3.5
Administration
Figure 3: Log in to The Device with a Web Browser (secure login banner)
ROS™ v3.5 20 RS400
Administration
1.3.2 The Structure of the Web Interface
The user interface is organized as a series of linked web pages. The main menu provides the links and allows them to be expanded to display lower level pages for a particular configuration system.
Figure 4: Main Menu via Web Server Interface
Each web page presents the switch name (as proved by the System Identification parameter), Menu Title link and user’s access name or Alarms link if any alarms are reported.
The Menu title link takes you to a page that provides help for the configuration parameters provided by that page.
Alarms are events for which the user is notified by following the Alarms link (these alarms may also be viewed and cleared through the Diagnostics submenu). All configuration and display menus present an indication of the number of alarms (in the upper right hand corner of the screen) as they occur, automatically updating as alarms are posted and cleared.
1.3.3 Making Configuration Changes
When changing a data item the user selects the data item by selecting the field to edit with the mouse, entering a new value and clicking on the apply field. More than one parameter may be modified at a time.
RS400 21 ROS™ v3.5
Administration
Figure 5: Parameters Form Example
Some menus will require you to create or delete new records of information.
1.3.4 Updating Statistics Displays
You may click the refresh button to update statistics displays.
ROS™ v3.5 22 RS400
Administration
1.4 Administration Menu
The Administration menu provides ability to configure network and switch administration parameters.
RS400 23 ROS™ v3.5
Administration
Figure 6: Administration Menu
ROS™ v3.5 24 RS400
Administration
1.5 IP Interfaces
These parameters provide the ability to configure IP connection parameters such as address, network, and mask.
The user can configure an IP Interface for each subnet (VLAN). One of the interfaces is configured as management interface. IP services: TFTP server, SNMP server, Telnet server, SSH server, RSH server, Web server, authentication using RADIUS server, DHCP client, BOOTP client, DHCP relay agent will be available only via management interface. Different IP interfaces MUST NOT overlap, e.g. the subnet mask must be unique.
15 IP interfaces can be configured in the device. In VLAN unaware mode, and in devices that do not act as switches (as RMC30), only one IP interface can be configured.
On non-management interfaces, only static IP addresses can be assigned.
On management interface, the user can choose from the following IP Address type: Static, DHCP, BOOTP and Dynamic. Static IP Address type refers to the manual assignment of IP address while DHCP, BOOTP and Dynamic IP Address types refer to the automatic assignment of IP address.
DHCP is widely used in LAN environments to dynamically assign IP addresses from a centralized server, which reduces the overhead of administrating IP addresses.
TM
BOOTP is a subset of the DHCP protocol. ROS The BOOTFILE represents any valid ROS
TM
the BOOTP server must match the corresponding ROS
supports transfer of a BOOTFILE via BOOTP.
file such as config.csv. The name of BOOTFILE on
TM
file.
The Dynamic IP Address type refers to a combination of the BOOTP and DHCP protocols. Starting with BOOTP, the system will try BOOTP and DHCP in a round-robin fashion until it will get a response from the corresponding server.
Figure 7: IP Interfaces Table
RS400 25 ROS™ v3.5
Administration
Figure 8: IP Interfaces Form
Note: The IP address and mask configured for management VLAN are not changed when resetting all
configuration parameters to defaults and will be assigned to default VLAN ID of 1. Changes to the IP address take effect immediately. All IP connections in place at the time of an address change will be lost.
Type
Synopsis: { VLAN } Default: VLAN
Specifies the type of the interface for which this IP interface is created.
ID
Synopsis: 1 to 4094 Default: 1
Specifies the ID of the interface for which this IP interface is created. If interface type is VLAN, represents VLAN ID.
Mgmt
Synopsis: { No, Yes } Default: No
Specifies whether the IP interface is the device management interface.
IP Address Type
Synopsis: { Static, Dynamic, DHCP, BOOTP } Default: Static
Specifies whether the IP address is static or dynamically assigned via DHCP or BOOTP. Option
ROS™ v3.5 26 RS400
Administration
DYNAMIC is a common case of dynamically assigned IP address. It switches between BOOTP and DHCP until it gets the response from the relevant server. Must be static for non management interfaces
IP Address
Synopsis: ###.###.###.### where ### ranges from 0 to 255 Default: 192.168.0.1
Specifies the IP address of this device. An IP address is a 32-bit number that is notated by using four numbers from 0 through 255, separated by periods. Only a unicast IP address is allowed which ranges from 1.0.0.0 to 233.255.255.255
Subnet
Synopsis: ###.###.###.### where ### ranges from 0 to 255 Default: 255.255.255.0
Specifies the IP subnet mask of this device. An IP subnet mask is a 32-bit number that is notated by using four numbers from 0 through 255, separated by periods. Typically, subnet mask numbers use either 0 or 255 as values (e.g. 255.255.255.0) but other numbers can appear.
RS400 27 ROS™ v3.5
Administration
1.6 IP Gateways
These parameters provide the ability to configure gateways. A maximum of 10 gateways can be configured. When both the Destination and Subnet fields are both 0.0.0.0 (displayed as blank space), the gateway is a default gateway.
Figure 9: IP Gateways Form
Destination
Synopsis: ###.###.###.### where ### ranges from 0 to 255 Default: 0.0.0.0
Specifies the IP address of the destination device. An IP address is a 32-bit number that is notated by using four numbers from 0 through 255, separated by periods.
Subnet
Synopsis: ###.###.###.### where ### ranges from 0 to 255 Default: 0.0.0.0
Specifies the IP subnet mask of the destination. An IP subnet mask is a 32-bit number that is notated by using four numbers from 0 through 255, separated by periods. Typically, subnet mask numbers use either 0 or 255 as values (e.g. 255.255.255.0) but other numbers can appear.
Gateway
Synopsis: ###.###.###.### where ### ranges from 0 to 255 Default: 0.0.0.0
Specifies the gateway IP address. The gateway address must be on the same IP subnet as this device.
Note: The default gateway configuration will not be changed when resetting all configuration parameters
to defaults.
ROS™ v3.5 28 RS400
Administration
1.7 IP Services
These parameters provide the ability to configure properties for IP services provided by the device.
Figure 10: IP Services Form
Inactivity Timeout
Synopsis: 1 to 60 or { Disabled } Default: 5 min
Specifies when the console will timeout and display the login screen if there is no user activity. A value of zero disables timeouts for console and Telnet users. For Web Server users maximum timeout value is limited to 30 minutes.
Telnet Sessions Allowed
Synopsis: 0 to 4 Default: 4
Limits the number of Telnet sessions. A value of zero prevents any Telnet access.
Web Server Users Allowed
Synopsis: 1 to 16 Default: 16
Limits the number of simultaneous web server users.
TFTP Server
Synopsis: { Disabled, Get Only, Enabled } Default: Get Only
As TFTP is a very insecure protocol, this parameter allows the user to limit or disable TFTP
RS400 29 ROS™ v3.5
Administration
Server access. DISABLED - disables read and write access to TFTP Server GET ONLY - only allows to read files via TFTP Server ENABLED - allows to read and write files via TFTP Server
ModBus Address
Synopsis: 1 to 254 or { Disabled } Default: Disabled
Determines the Modbus address to be used for Management through Modbus.
SSH Sessions Allowed
Synopsis: 1 to 4 Default: 4
Limits the number of SSH sessions.
RSH Server
Synopsis: { Disabled, Enabled } Default: Enabled
Disables/enables Remote Shell access.
ROS™ v3.5 30 RS400
Loading...
+ 245 hidden pages