The contents of this document are provided ”as is”. Except as required by applicable law, no warranties of any kind, either express or implied, including, but not
limited to, the implied warranties of merchantability and fitness for a particular
purpose, are made in relation to the accuracy and reliability or contents of this
document. Westermo reserves the right to revise this document or withdraw it at
any time without prior notice.
Under no circumstances shall Westermo be responsible for any loss of data or
income or any special, incidental, and consequential or indirect damages howsoever caused. More information about Westermo can be found at the following
Internet address: http://www.westermo.com
Westermo provides an extensive set of network products for robust industrial
data communications, managed as well as unmanaged products. Westermo’s
products are found in diverse set of harsh environment applications, and where
robustness and reliability are vital properties.
This guide describes the extensive functionality of managed Westermo products
running the Westermo OS (WeOS).
1.2Getting Started
Please see www.westermo.com for the latest updated version of this document –
the WeOS Management Guide. There you can also find product User Guides, and
other support information for your product.
The dedicated User Guide of your product includes information on how to get
started with WeOS on your specific product. That is a good place to start if you
wish to do the least possible configuration of your switch (i.e., assign appropriate
IP settings) before putting it into your network infrastructure.
If the User Guide of your specific product lacks a section on how to get started
with WeOS, please visit the chapter 2 (Quick Start) of this document.
Westermo OS (WeOS) is a network operating system delivering an extensive set
of functionality including layer-2 (basic switching, VLAN, IGMP snooping, etc.),
layer-3 (routing, firewall, NAT, etc.), and higher-level services (DHCP, DNS, etc.).
Furthermore, WeOS provides easy management via a Web interface, via the associated WeConfig tool, and via a USB stick. To satisfy even more advanced customer needs, WeOS provides flexible management via a command line interface
(CLI), as well as via SNMP.
WeOS provides two levels of functionality, WeOS Standard and WeOS Extended.
Products running WeOS Standard are outstanding layer-2 switches suitable to
build reliable LAN infrastructures. Products running WeOS Extended extends the
WeOS functionality by adding routing capabilities and a rich set of related higher
level services (NAT, firewall, VPN, etc.).
1.4How to read this document
This guide is structured in the following parts:
Part I: This part gives general information on WeOS, and introduces the main
methods to manage a WeOS unit (WeConfig, Web, CLI and SNMP)1.
The information in Part I applies both to products running WeOS Standard
and WeOS Extended.
– Chapter 1 is this chapter.
– Chapter 2 describes how to get started with your WeOS product.
– Chapters 3 gives an overview of the different ways to manage a WeOS
unit. If you need recommendations of which method to use, please read
chapter 3.
– Chapters 4-5 present the WeOS Web and CLI support. Detailed informa-
tion for Web and CLI Management is provided in the later parts of the
document.
– Chapters 6 is the main source of information for WeOS SNMP support.
1
For information on how to configure a WeOS unit using a USB memory stick, see Chapter 7.
– Chapter 40-41 cover Modbus Gateway and Microlok Gateway support.
1.5Westermo products running WeOS
Below you find the list of Westermo products running WeOS, as well as references
to their respective User Guide:
Falcon: User Guide [41] (FDV-206-1D1S). (”Basis” platform)
Lynx: User Guides [46] (Lynx-L110/210) and [42] (Lynx-L106/206-F2G). (”Basis” platform)
Lynx-DSS: User Guides [43] (L108/208-F2G-S2), [44] (L105/205-S1), and
[45] (L106/206-S2). (”Basis” platform)
RedFox Industrial (RFI): User Guides [48] (”Corazon” platform) and [47] (”Atlas” platform)
RedFox Industrial Rack (RFIR): User Guide [49] (”Corazon” platform)
RedFox Rail (RFR): User Guide [50] (RFR-212-FB (”Corazon” platform), and
RFR-12-FB (”Atlas” platform)).
Wolverine: User Guides [37] (DDW-142), [38] (DDW-142-485), [39] (DDW-
225) and [40] (DDW-226). (”Basis” platform)
Viper: User Guides [51] (Viper-112/212 and Viper-112/212-T3G) and [52]
(Viper-112/212-P8 and Viper-112/212-T3G-P8) (”Basis” platform)
Note
Atlas, Basis and Corazon denote HW platforms used by different products.
Products utilising the same HW platform use the same kind of CPU, and have
the same amount of RAM and flash memory.
The WeOS functionality described in the Management Guide generally applies to
all Westermo products running WeOS of the appropriate software level (Standard
or Extended). However, where functionality assumes the presence of certain
hardware (such as a USB port), those functions are limited to products including
that hardware. The table below provides a summary of hardware differences affecting the availability of certain WeOS functions. For a more definite description
of hardware specifications you are referred to the dedicated User Guide of each
product (see section 1.5).
This section provides a guide to quickly get started with your switch. Only simple
configuration procedures will be covered1. The steps covered concern:
Get familiar with the factory default setting
Configuring an appropriate IP address
2.1Starting the Switch for the First Time
When booting the switch for the first time the switch will use the factory default
setting.
The factory default setting makes the switch operate as a manageable layer-2
switch, where all Ethernet ports belong to the same virtual LAN (VLAN)2.
Manageable: The switch is manageable via any of the Ethernet ports. To
manage the switch via an Ethernet port you need to know the IP address of
the switch (see table 2.1). For switches equipped with a console port, the
switch can as well be managed via that port without knowing the IP address
of the switch.
1
For more advanced settings, we refer to the remaining chapters of this guide as well as the
online help provided via the Web configuration tool and the Command Line Interface (CLI).
2
On Falcon series of switches, all Ethernet ports belong to the default VLAN (VLAN 1), while the
xDSL port belongs to a separate VLAN (VLAN 1006). That is, by factory default Falcon operates as
a router. See chapter 11 for more details.
Single VLAN: By default all ports on the switch will belong to the same VLAN.
Thus, devices connected to different ports of the switch should be able to
communicate with each other right away. For more advanced setups, the
ports of the switch can be grouped into different VLANs. In the factory default setting all ports belong to VLAN 1.
The default IP setting for the switch is as shown in table 2.1.
AddressNetmaskGateway
Primary IP addressDynamic (DHCP)(Dynamic)(Dynamic)
Secondary IP address192.168.2.200255.255.255.0Disabled
Table 2.1: Factory Default IP settings.
Thus, when you power up your WeOS unit with the factory configuration, you can
connect to it via two addresses:
The static IP address 192.168.2.200: This address is simplest to use if you
are setting up a single unit.
A dynamic address assigned by a DHCP server3(if present): This address
may be simplest to use if you want to connect and configure multiple new
WeOS units simultaneously.
Note
Before you put your switch into your production network you should change
its IP setting according to your network topology. How you change your IP
setting is described in the next section.
2.2Modifying the IP Setting
The switch can be configured with a static IP setting, or it can get its IP address
dynamically via DHCP. The latter case is useful if you are running a DHCP server
on the same LAN as the switch will be located.
WeOS provides several management tools, which will be presented further in
later chapters of this guide. In this chapter we limit the scope to describe how
these tools can be used to update the IP settings of the switch.
3
In addition, the unit will autoconfigure itself with a link-local address in the 169.254.x.x range,
where ’x’ is in interval 0-255. See section 19.2.6 for more information.
WeConfig: is Westermo’s Network configuration management tool (NCM)
made for commissioning and maintenance of components in a network.It
replaces the former Westermo tool known as IPConfig. For further information on WeConfig’s features and how to use the tool, see the WeConfig User
Guide[54].
Web: Configuration of IP settings via the Web interface is described in sec-
tion 2.2.1.
CLI: Configuration of IP settings via the Command Line Interface (CLI) is
described in section 2.2.2.
Hint
If you are not sure what IP address your switch has, use the WeConfig tool,
or the CLI via console method (section 2.2.2.1). If neither of these methods
work, please visit section 7.1.3 for information on how to conduct a factory
reset.
Host with Web browser.
PC IP address and netmask known, e.g.,
IP address 192.168.55.35 and netmask 255.255.255.0
To Internet or
company Intranet
Router
Ethernet portsConsole
Switch with default IP setting:
Default gateway: Disabled
IP address: 192.168.2.200
Netmask: 255.255.255.0
Should get the following settings:
IP address: 192.168.55.100
Netmask: 255.255.255.0
Default gateway: 192.168.55.1
WeOS switch
Version 4.17.0-0
2.2.1Using the Web Interface to Update the Switch IP Settings
To configure the IP settings via web your switch is required to be located on the
same IP subnet as your PC.
In this example the switch shall be assigned the IP address 192.168.55.100, netmask 255.255.255.0 and default gateway 192.168.55.1. To achieve this you must
(temporarily) change the IP address of the PC in order to be able to communicate
with the switch.
The steps to configure the IP settings via the web interface are as follows:
1. Connect your PC to the switch: Connect your PC to the switch as shown in
the figure above.
2. Modifying IP Settings on PC: The IP settings on the PC must be updated to
match the default settings on the switch, i.e., the PC should be assigned an
IP address on the 192.168.2.0/24 network, e.g.,
PC IP address: 192.168.2.1
PC Netmask: 255.255.255.0
3. Access switch via web browser: Open your web browser and enter URL
http://192.168.2.200 in the browser’s address field. You will be asked to
enter a username and a password. Use the factory default account settings
shown below:
4. Open the Network configuration page: Click on the Configuration topmenu and then on the Network sub-menu and then the Global settings
menu.
5. Configure Default Gateway: Now click the edit icon ( ) in the Global Settings
frame. The following page should appear.
Fill in the appropriate address in the Default Gateway field. In this example,
the default gateway is 192.168.55.1. Click the Apply button. Your switch is
configured with a new default gateway.
6. Open Interface Configuration Page: Click on the Configuration top-menu
and then on the Network sub-menu and then the Interface sub menu. In
the Interface page, click the edit icon ( ) on the row for the interface
named vlan1. The Interface Configuration Page will appear:
7. Configure Interface IP Settings: Enter the appropriate IP settings for your
switch. In this example we would:
(a) Set IP Address Method to static (radio button).
(b) Set Primary Address to 192.168.55.100 with 255.255.255.0 in the
Netmask field.
(c) Remove Secondary Address (192.168.2.200) using the trash icon ( ).
Click the Apply button and your switch is configured with a new IP address.
8. Reconfigure PC’s IP Settings: As the IP address is changed on the switch,
you cannot reach it from your PC any longer. To access the switch from the
PC, the PC’s IP settings must be changed again. In this case, we assume it
is changed back to its original settings:
PC IP address: 192.168.55.35
PC Netmask: 255.255.255.0
PC Default Gateway: 192.168.55.1
Further management of the switch can be performed via any of the available
management tools - WeConfig, Web, SSH/Telnet/CLI or SNMP.
Host with terminal emulation program.
PC IP address and netmask known, e.g.,
IP address 192.168.55.35 and netmask 255.255.255.0
To Internet or
company Intranet
Router
Ethernet portsConsole
Switch with default IP setting:
Default gateway: Disabled
IP address: 192.168.2.200
Netmask: 255.255.255.0
Should get the following settings:
IP address: 192.168.55.100
Netmask: 255.255.255.0
Default gateway: 192.168.55.1
WeOS switch
Version 4.17.0-0
2.2.2Using the CLI to Update the Switch IP Settings
The CLI can be accessed in three ways: via the console port (given that the switch
is equipped with a console port) or via the Ethernet ports using the Secure Shell
(SSH) or the Telnet protocol. Section 2.2.2.1 explains how to access the CLI via
the console port, and how to update the IP settings. Section 2.2.2.2 explains how
to access the CLI via SSH.
Access with Telnet is also possible, but this is not enabled by default on the
switch, and to use it you will first have to access it with one of the other methods
and enable this protocol for management. See Section 7.3.49 (CLI) for information on how to enable the Telnet service on the unit, and then Section 19.4 (Web)
or Section 19.6.6 for information on how to enable Telnet configuration via interface ”vlan1”.
2.2.2.1Accessing the CLI via the console port
For WeOS switches equipped with a console port, this port can be used to change
IP address of the switch.
1. Connect your PC to the switch: Connect your PC to the switch as shown in
Important notice for WeOS Switches equipped with a console port
See the User Guide of your specific product (section 1.5) for information
on what Diagnostic Cable to use when connecting to the console port
of your specific product.
Westermo OS Management Guide
Version 4.17.0-0
2. Terminal program: To communicate with the switch via the console port, you
need to use a terminal emulation program on your PC, such as Hypertermi-nal. Ask your system administrator if you need help to install or configure
your terminal emulation program.
The following settings should be used when connecting to the console port:
Console Port ParameterSetting
Data rate115200 bits/s
Data bits8
Stop bits1
ParityOff
Flow controlOff
3. Activating the console: When the switch has finished booting, you will be
asked to press the Enter key on your keyboard to activate the console.
4. Logging in: Now you will be asked to enter a username and thereafter a
password. For a switch using the factory default settings, use the following
login username and password:
Login username: admin
Password: westermo
Below you see a sample printout when logging in on a WeOS switch. (The
password is not ”echoed” back to the screen.)
Example
example login: admin
Password:
.--.--.--.-----.-----.------.-----.-.--.--------.-----.
| | | | -__|__--|
\__/\__/|
Robust Industrial Data Communications -- Made Easy
\\/ Westermo WeOS v4.15.0 4.15.0 -- Jun 16 19:10 CEST 2014
Type: ’help’ for help with commands, ’exit’ to logout or leave a context.
example:/#>
_____._____
__
| |__| |
| -__|_| . . |
_____|__
| |__|__|__|
_
| http://www.westermo.com
_____
|info@westermo.se
5. Listing IP address: Use the CLI command ”show iface” to list information
about network interfaces.
6. Changing IP address and netmask: To change the switch IP addressing mode
(”static” instead of ”DHCP”), set a static address and netmask, and to skip
secondary addresses, use CLI commands ”configure”, ”iface vlan1”,
”inet static”, ”address <IPV4ADDRESS/LEN>”, ”no address secondary”
and ”end” as shown below. This example is based on the setup in step 1,
and configures the switch with an address (192.168.55.100/24) on the same
IP subnet as the PC.
169.254.145.230/16
Example
example:/#> configure
example:/config/#> iface vlan1
example:/config/iface-vlan1/#> inet static
example:/config/iface-vlan1/#> address 192.168.55.100/24
example:/config/iface-vlan1/#> no address secondary
Remove all secondary IP addresses, are you sure (y/N)? y
Removing all secondary IPs!
example:/config/iface-vlan1/#> end
example:/config/#> end
Stopping DHCP Clients ...................................... [ OK ]
Configuration activated. Remember "copy run start" to save to flash (NVRAM).
example:/#> show iface
Press Ctrl-C or Q(uit) to quit viewer, Space for next page, <CR> for next line.
can be achieved using CLI commands ”configure”, ”ip”, ”route default
192.168.55.1 <IPADDRESS>”, and ”end” as shown below.
Example
example:/#> configure
example:/config/#> ip
example:/config/ip/#> route default 192.168.55.1
example:/config/ip/#> end
example:/config/#> end
Configuration activated. Remember "copy run start" to save to flash (NVRAM).
example:/#>
8. Save configuration: Although the configuration changes has been activated,
the running configuration must be stored to the startup configuration. Otherwise the changes will be lost if the switch is rebooted.
9. You are now done setting the IP address, subnet mask and default gateway
of your switch. Logout from the CLI using the ”logout” command.
Further management of the switch can be performed via any of the available
management tools - WeConfig, Web, SSH/Telnet/CLI or SNMP.
2.2.2.2Accessing the CLI via SSH
Configuring the IP settings via SSH/CLI is very similar to configuring them via the
console port. The major differences are:
The IP address of the PC must (temporarily) be changed in order to be able
to communicate with the switch, i.e., the PC should have an address on
network 192.168.2.0/24, e.g., 192.168.2.1/24.
After the IP settings have been changed on the switch, the PC is likely to
loose contact with the switch. The PC must therefore change its IP address
again, and login to the switch again in order to copy the running configuration to the startup configuration.
The steps to configure the IP settings via SSH/CLI are as follows:
1. Connect your PC to the switch: Connect your PC to the switch as shown in
the figure below. In this example we assume the switch will get IP address
Host with SSHv2 client.
PC IP address and netmask known, e.g.,
IP address 192.168.55.35 and netmask 255.255.255.0
To Internet or
company Intranet
Router
Ethernet portsConsole
Switch with default IP setting:
Default gateway: Disabled
IP address: 192.168.2.200
Netmask: 255.255.255.0
Should get the following settings:
IP address: 192.168.55.100
Netmask: 255.255.255.0
Default gateway: 192.168.55.1
WeOS switch
Version 4.17.0-0
192.168.55.100, netmask 255.255.255.0 and default gateway 192.168.55.1.
2. Modifying IP Settings on PC: The IP settings on the PC must be updated to
match the default settings on the switch, i.e., the PC should be assigned an
IP address on the 192.168.2.0/24 network, e.g.,
3. Connecting and Logging in: When connecting via SSH you will be asked to
enter a username and thereafter a password. For a switch using the factory
default settings, use the following login username and password:
Login username: admin
Password: westermo
The procedure to connect may vary slightly depending on what SSH client
you are using. The example below show the connection procedure using
Unix OpenSSH4. (On Windows one can use Putty5.)
Westermo OS Management Guide
Version 4.17.0-0
Example
user@pc:~$ ssh admin@192.168.2.200
The authenticity of host ’192.168.2.200 (192.168.2.200)’ can’t be established.
RSA key fingerprint is 6d:0c:f3:d3:28:d6:d8:43:bc:69:f8:d0:d6:a2:27:87.
Are you sure you want to continue connecting (yes/no)? yes
Warning: Permanently added ’192.168.2.200’ (RSA) to the list of known hosts.
admin@192.168.2.200’s password:
.--.--.--.-----.-----.------.-----.-.--.--------.-----.
| | | | -__|__--|
\__/\__/|
Robust Industrial Data Communications -- Made Easy
\\/ Westermo WeOS v4.15.0 4.15.0 -- Jun 16 19:10 CEST 2014
Type: ’help’ for help with commands, ’exit’ to logout or leave a context.
example:/#>
_____._____
4. Changing IP settings: The switch IP settings are changed with the same
commands as described when accessing the CLI via the console port (sec-
tion 2.2.2.1). In this example we assign IP address, netmask and default
gateway.
__
| |__| |
| -__|_| . . |
_____|__
| |__|__|__|
_
| http://www.westermo.com
_____
|info@westermo.se
Example
example:/#> configure
example:/config/#> iface vlan1
example:/config/iface-vlan1/#> inet static
example:/config/iface-vlan1/#> address 192.168.55.100/24
example:/config/iface-vlan1/#> no address secondary
Remove all secondary IP addresses, are you sure (y/N)? y
Removing all secondary IPs!
example:/config/iface-vlan1/#> end
example:/config/#> ip
example:/config/ip/#> route default 192.168.55.1
example:/config/ip/#> end
example:/config/#> end
The configuration is now changed, but not yet saved to the startup configuration. However, as the IP address is changed, the SSH connection will be
broken.
5. Logging in again to save configuration: To login again, the PC’s IP settings
must be changed again. In this case, we assume it is changed back to its
original settings:
We can then login again to copy the running configuration to startup configuration.
Example
user@pc:~$ ssh admin@192.168.55.100
The authenticity of host ’192.168.55.100 (192.168.55.100)’ can’t be established.
RSA key fingerprint is 6d:0c:f3:d3:28:d6:d8:43:bc:69:f8:d0:d6:a2:27:87.
Are you sure you want to continue connecting (yes/no)? yes
Warning: Permanently added ’192.168.55.100’ (RSA) to the list of known hosts.
admin@192.168.55.100’s password:
.--.--.--.-----.-----.------.-----.-.--.--------.-----.
| | | | -__|__--|
\__/\__/|
Robust Industrial Data Communications -- Made Easy
\\/ Westermo WeOS v4.15.0 4.15.0 -- Jun 16 19:10 CEST 2014
Type: ’help’ for help with commands, ’exit’ to logout or leave a context.
WeOS is managed and monitored using the following tools and interfaces:
WeConfig: is Westermo’s Network configuration management tool (NCM)
made for commissioning and maintenance of components in a network.It
replaces the former Westermo tool known as IPConfig. For further information on WeConfig’s features and how to use the tool, see the WeConfig User
Guide[54].
Web: The WeOS Web interface provides management of essential features.
The Web interface should satisfy the needs of all common use cases.
CLI: The WeOS Command Line Interface is an industry standard CLI, and
provides the most complete management support. The CLI is intended for
advanced users requiring fine grain control of the system.
In addition, WeOS provides device management via SNMP (v1/v2c/v3). A set of
standard MIBs and the WeOS private MIB are supported, as described in chap-
Discover WeOS DevicesX(X)(X)
Set Device IP AddressXXXX
Upgrade firmwareXXX
Common management tasksXXX
All management tasksX
Secure managementXXX
In the following sections the properties of the WeConfig tool, the Web Interface,
and the CLI are presented further. These sections give information about what
management tool to use for a specific need. For more information on SNMP we
refer to chapter 6.
3.1When to use the WeConfig tool
The Westermo configuration management tool, WeConfig, is used for basic configuration and maintenance of WeOS products. It is an ideal tool to upgrade
firmware and manage configuration files (backup and restore) of a large set of
WeOS devices. With WeConfig you to scan, discover and draw maps of the WeOS
devices in your network, and you can also conduct some basic configuration of
WeOS units, such as setting the IP address and the default gateway.
For further information on WeConfig’s features and how to use the tool, see the
WeConfig User Guide[54].
3.2When to use the Web Interface
The Web interface would be the management interface of choice for most users.
The main advantages of the Web Interface are:
Easy to use: The Web management interface provides an easy to use method
to manage the switch.
All common features: The web interface includes support for all essential
management features, and should therefore meet the needs of most users.
Secure management: The web interface can be accessed via regular HTTP
and secure HTTP (HTTPS). Secure management is also possible via the CLI
(SSHv2) and and SNMP (SNMPv3).
Discover other Westermo Switches: The Web contains a discovery service
(IPconfig) similar to what WeConfig provides. (Note, you must still be able
to login to one switch in order to make use of this service.)
To use the Web interface, you must know the IP address of your switch. To find
out the switch IP address you may need to use the WeConfig tool1, but once you
know it you can do the rest of the management via the Web interface.
The Web interface is introduced in chapter 4.
3.3When to use the Command Line Interface (CLI)
The WeOS CLI aims to serve advanced users. Furthermore, the CLI is the only
management tool which cannot be disabled.
Below we list the situations where the CLI is the most suitable management tool.
Complete set of management features: The CLI includes all the management features available on the switch. If you cannot accomplish your task
with any of the other management tools, the CLI may provide the feature
you need.
Discover other Westermo Switches: The CLI contains a discovery service
similar to what WeConfig provides, but more rudimentary.
Note
You must still be able to login to one switch in order to make use of this
service.
Secure management: To access the CLI you must either have physical access to the switch (console port), or use the Secure Shell (SSHv2) application
to access the CLI remotely. Secure management is also possible via the Web
interface (HTTPS) and SNMP (SNMPv3).
Configuration scripting: With a CLI it is possible to develop automatic configuration scripts, e.g., using the Expect automation and testing tool. Expect
extensions exist for many common scripting languages (Ruby, Perl, Tcl).
As with the Web interface, you must know the IP address of your switch before
you can access the CLI remotely via SSH (access via the console port is possible
1
For more information about finding the IP address of your switch we refer to the Getting Started
without knowing the switch IP address). To find out the switch IP address you may
need to use the WeConfig tool, but once you know it you can do the rest of the
management via SSH/CLI.
WeOS supports device management via web interface. Both HTTP and HTTPS
are supported. The design is optimised for style sheet and JavaScript2capable
web browsers. In addition, the design allows users to access the web interface
and all settings without a style sheet and JavaScript capable browser, but then
with less guidance and support from the user interface.
When using the Web Management Tool you have to be aware of the following:
Only one user can be logged in at a time (see section 4.2 for more information).
You are automatically logged out after ten (10) minutes of inactivity (see
section 4.2 for more information).
When you click Apply on a page, the settings on that page are immediately
activated.
When you click Apply on a page, all settings are stored in the startup configuration and therefore survive a reboot (see chapter 7 for more information).
Section 4.2 explains how to access the Web Management Tool and section 4.3
describes the web menu hierarchy. In section 4.3 the system overview web pages
are presented. Other pages and settings are described per topic in chapter 20
and following chapters.
1
1
For HTTPS server authentication, a self-signed certificate is used as of WeOS v4.17.0.
To access the switch through the web interface, enter the appropriate URL (e.g.,
the factory default IP-address http://192.168.2.200) in the address field of your
web-browser. You will then be presented to the login page where you fill in the
username and password, see figure 4.1.
Figure 4.1: Web login window
Currently there is only a single user account defined, the administrator user account. Note that it is the same user account used for login in CLI. Factory default
user account and password are as follows :
Login: admin
Password: westermo
Your web session will last for ten (10) minutes after your latest ”web action”.
Clicking a link or button at least every 10 minutes will let you keep the session
forever. The same goes for pages with an automatic refresh option, given that a
refresh interval of 10 minutes or shorter is selected.
Only one user at a time can be logged into the switch Web Management Tool. If a
new user tries to log in the currently logged in user will automatically be logged
out.
After logging in you will be redirected to the start page, see fig. 4.2. In the page
header you find the menus used to navigate between different tasks. The menu
consists of two rows, the top-menu row, and the sub-menu. For some items you
will be presented to a third level sub-menu below the second level sub-menu. Its
function is analogously to the second level sub-menu .
To navigate in the menu, click on the top-menu to reveal the associated sub-menu. Then click on the desired sub-menu item. For example, fig. 4.2 shows the
selection of top-menu Status and sub-menu Summary (i.e., Status ⇒ Summary).
Figure 4.2: Unit Summary - the first page after logging in.
The top-level menu structure is described below:
Status - This is where you find status information of the running system (port
status, protocol status, etc.)
Configuration - This is where you configure the unit
Maintenance - This is where you do firmware upgrades, configuration file
backups, view log files, manage port monitoring, etc.
Tools - Here you find various tools for trouble-shooting and other purposes
(e.g., ”ping”).
Pages where you can change settings generally contains an Apply and a Cancel
button, as shown in fig. 4.3. The semantics of the Apply and Cancel buttons are
provided below:
ApplyApplies the changes on the current page. Changes are applied
immediately (i.e., no reboot needed), and are also stored in
the startup configuration.
CancelDiscards changes and either returns to an overview page for
the context, or reloads current page and thus shows the current settings.
Figure 4.3: Sample web page containing Apply and Cancel buttons.
Pages with lists of ports may have additional information to display, e.g. if the
port is included in a port aggregate or bonded with PAF. This is indicated by
the background behind the port label is highlighted as shown in fig. 4.4. When
hovering a highlighted port the additional information is displayed in a pop-up.
Inside a drop-down menu, the ports are also highlighted, but no pop-ups are
presented.
To get more information about the switch you go to the detailed page shown in
fig. 4.6. This page contains more information on hardware (e.g. versions, article
number, etc.) and system status (e.g. memory usage and CPU load).
HostnameAn arbitrary name to identify this unit.
LocationAn arbitrary description to identify unit location.
ContactAn arbitrary description to identify a contact per-
son who has more information about management
of the unit and the network.
UptimeThe time passed since last reboot of the unit.
Base MAC AddressThe base MAC address defines the starting point of
the MAC address range used within the unit. This is
a unique number assigned to each unit.
System Default
Gateway Address
Article NumberThe article number for the unit.
Main Firmware
Version
Build DetailsThe build string of the currently running firmware.
Backup Firmware
Version
Main FPGA VersionThe version number of the FPGA software.
Boot Loader VersionThe version number of the boot loader software.
Serial NumberThe units serial number.
ProductThe product name.
ModelThe product model.
TypeDescription for the card in the specified slot.
Article No.The article number of the card in the specified slot.
Batch IDThe batch identification of the card in the specified
RevisionThe revision of the card in the specified slot.
Enabled Redun-
dancy Protocol(s)
VLANs With IGMPA list of VLANs on which IGMP is enabled.
The operational default gateway for all VLANs on the
unit. Either retrieved dynamically or set statically.
The version number of the main firmware.
The version number of the backup firmware.
slot.
A list of the redundancy protocols currently enabled
on the unit.
SNMPShows if SNMP support is enable or disabled.
AlarmsCurrently active port and FRNT alarms.
Link alarms are only shown for ports where link
alarm is enabled and link is down.FRNT alarms are
only shown for FRNT ports where link alarm is enabled and when the link is down.
To get more information about the system environment variables you go to the
environment page.
Temperature Shows system temperature i Celsius(C).
Load
Average
Memory
Usage (%)
DDM/DOM
SFPs
The load average is a standard Linux way of measuring system
load.
A snapshot of RAM (Random Access Memory) usage as percentage of total RAM.
1
Shows DDM/DOM diagnostics for each SFP.
The black bar for each graph represents the first value which
was read after boot up, and the blue bar is current value. The
DDM/DOM information will be polled for each SFP every twelfth
hour. Each graph will then be updated and can consist of up to
20 polled entries. By positioning the mouse over a graph, the
user will be presented with startup, max and min value. Please
note that each graph shows trend over time and not the absolute value, graphs for different SFP should not be compared.
1
DDM/DOM diagnostic information is only available for Westermo DDM SFPs, see the SFP
Transceiver Datasheet of your WeOS product (www.westermo.com).
This chapter introduces the command line interface (CLI) tool. Switches running
WeOS include a CLI similar to what is provided by other major vendors of network
equipment. The CLI provides a more complete set of management features than
the Web interface, the WeConfig tool or SNMP. Thus, when advanced management operations are required, the CLI is the management interface of choice.
The CLI can be accessed via the console port, or remotely via secure shell (SSHv2)
and Telnet1.
Section 5.1 introduces the CLI hierarchy and its various contexts. Section 5.2
explains how to access the CLI interface, and section 5.3 provides general information on how to use the CLI.
The last section (section 5.4) presents CLI commands available in all CLI contexts as well as their syntax. Other CLI commands are described per topic in the
chapters to follow.
5.1Overview of the WeOS CLI hierarchy
The WeOS CLI is organised in a hierarchical structure. For management purposes,
the use of a hierarchical structure limits the available commands to those relevant for a certain topic. This in turn simplifies switch operation.
1
Telnet server is by default disabled, see also section 7.3.49.
Fig. 5.1 shows an overview of the CLI hierarchy. When the user logs in as ”admin”
the user will enter the CLI with ”administrator” privileges in Admin Exec context.
(In addition to the ”admin” user, future versions of WeOS are likely to support a
”guest” account with limited privileges.)
Admin Exec context In Admin Exec context the user can execute a set of gen-
eral monitoring and diagnostic functions, and also manage configuration
files and firmware versions. From Admin Exec context the user can enter a
set of specific execution contexts, e.g., to view RMON statistics.
Global Configuration context From the Admin Exec context the user can enter
the Global Configuration context. In Global Configuration the user can configure device parameters of global significance, such as hostname and loca-tion of the device. From Global Configuration the user can reach contexts
specific to certain protocols or device entities such as port, vlan, interface,
and FRNT contexts.
A simple example on CLI usage is given below. There you can see how the CLI
prompt changes to match the current context.
Example
example:/#> configure
example:/config/#> vlan 100
example:/config/vlan-100/#> untagged 1,2
example:/config/vlan-100/#> end
example:/config/#> end
example:/#>
To login via the console port you need the username and password. Currently
there is only a single user account defined, the administrator user account. Factory default account and password:
Login: admin
Password: westermo
The same account is used for management via CLI and Web (see section 4). To
reset the administrator password to the default setting, see chapter 7.
5.2.1Accessing CLI via console port
For WeOS switches equipped with a console port, that port can be used to access
the CLI. (For information on which WeOS devices that have a console port, see
section 1.5.1).
Console cable
See the User Guide of your specific product (section 1.5) for information on
what Diagnostic Cable to use when connecting to the console port of your
specific product.
UNIX: There are different terminal emulation programs for different Unix
dialects. On Linux minicom is recommended.
The following console port settings are used:
Data rate115200 bits/s
Data bits8
Stop bits1
ParityNone
Flow controlNone
The example in below shows how to login via the console port using the PuTTY application. Once you have installed and started PuTTY, configure the appropriate
In this example, the switch is accessible via the logical port ”COM3”, but
the USB/serial adapter may be mapped to a different COM port on your PC.
Please check ”Ports (COM and LPT)” in the Windows ”Device Manager” to
get information on what COM port to specify.
When the appropriate serial settings have been configured, select the ”Session”
view. Select Serial as Connection type as shown in the figure below.
To start the serial connection, press the Open button. The figure below shows
the console prompt when logging in to the CLI via the console on a unit named
example.
The switch IP address can be found using the WeConfig tool, see the WeConfig
User Guide[54] (additional methods are listed in section 7.1.3).
The following example illustrates how to login to the switch using PuTTY from
a Windows based host system as user admin. In this example, the switch is a
WeOS switch with IP address 192.168.2.200 (the factory default IP address). See
section 5.2 for information about user accounts and passwords.
In the PuTTY session view, select SSH as Connection type, and enter the IP address of the switch (here 192.168.2.200).
Click the Open button to start the SSH session. You will be presented to a login
prompt (see below), and enter login admin and the associated password.
example login: admin
Password:
.--.--.--.-----.-----.------.-----.-.--.--------.-----.
| | | | -__|__--|
\__/\__/|
Robust Industrial Data Communications -- Made Easy
\\/ Westermo WeOS v4.15.0 4.15.0 -- Jun 16 19:10 CEST 2014
Type: ’help’ for help with commands, ’exit’ to logout or leave a context.
example:/#>
_____._____
__
| |__| |
| -__|_| . . |
_____|__
| |__|__|__|
_
| http://www.westermo.com
_____
|info@westermo.se
The CLI can be accessed remotely by using a Telnet client, in the same way
as using SSH. Of security reasons, use of Telnet is discouraged and therefore
disabled by default. In order to manage the unit via Telnet, you must first:
Enable the Telnet server via the CLI, see section 7.3.49.
Enable telnet management for the desired network interface(s) via the CLI
(see section 19.6.6).
When first entering the CLI you end up in the Admin Exec context. In the Admin
Exec you can view system status information using various ”show” commands,
upgrade system firmware, etc., as well as other functions, which do not affect the
system configuration.
To be able to modify the switch configuration you should enter the Global Con-
figuration context, by using the ”configure” command as shown below. From
the Global Configuration you are able to configure system parameters such as its
”hostname” or its ”date”.
Example
example:/#> configure
example:/config/#>
As described in section 5.3.2 you can reach other, specific configuration contexts
from the Global Configuration context.
Example
example:/#> configure
example:/config/#> vlan 100
example:/config/vlan-100/#> untagged 1/1,1/2
example:/config/vlan-100/#> end
example:/config/#> end
example:/#>
To get help on what commands are available in the current context, use the
”help” command (see example in fig. 5.2). First the context specific configu-
ration commands are shown, followed by the commands to show the current
configuration settings. At the end, commands available in all contexts are shown
(see also section 5.4.).
example:/config/vlan-100/#> help
Available Commands
==============================================================================
enableEnable, or disable this VLAN
name <ARG>Set name of VLAN
tagged <ARG>Set tagged ports
untagged <ARG>Set untagged ports
channel <ARG>Set VLAN channel interface
priority <ARG>Set VLAN priority, overrides port priority
igmpEnable, or disable IGMP Snooping
show enableShow if VLAN is active or not
show nameShow name of VLAN
show taggedShow tagged ports
show untaggedShow untagged ports
show channelShow VLAN channel interface
show priorityShow VLAN priority setting
show igmpShow IGMP Snooping status
no <ARG>Prefix, used to disable services or settings.
doShortcut to EXEC mode, e.g. do ping <IP>.
endSave settings and return to previous mode.
leaveSave settings and return to EXEC mode.
abortCancel all changes and leave this mode.
show <ARG>Show summary, or status.
repeat <ARG>Repeat next command every second, until Ctrl-C
help <ARG>This help text.
tutorialBrief introduction to the CLI
==============================================================================
<ARG> - Command takes argument(s), see help <command> for further information.
Short forms of commands are possible, see the tutorial for more help.
example:/config/vlan-100/#>
Figure 5.2: Use of the ”help” command to list available commands (here in the
VLAN context).
The ”help” command can also be used to get information on a specific command
as shown below.
Example
example:/config/vlan-100/#> help igmp
Syntax:
Description:
==============================================================================
The [no] keyword is when you want to disable a service or remove a property.
example:/config/vlan-100/#>
The CLI supports basic TAB-completion, which can come in handy when you do
not know the exact command name, e.g., writing ”fi[TAB]” within the IP context
will expand to ”firewall”.
TAB-completion is only able to expand the full command when there is no ambiguity. Otherwise the available alternatives will be listed.
Example
example:/#> d[TAB]
dodebugdatedirdelete
example:/#> d
Furthermore, when there is no ambiguity it is possible to use an abbreviation of
a command instead of the full command (i.e., without using TAB-completion).
Example
example:/#> con
example:/config/#>
5.3.2Entering and leaving CLI contexts
Fig. 5.3 gives a general overview of how to enter and leave the various context
in the CLI hierarchy. The commands to move between contexts are further discussed in the text below.
To enter Global Configuration context from Admin Exec context, the ”configure”
command is used. From Global Configuration context one can reach several specific configuration contexts, and the command to enter them is context specific,
e.g.,:
vlan <VID>Manage VLAN settings for VLAN with given VID.
port <PORT>Manage port settings for port with given PORT identifier.
interface <IFNAME>Manage settings for the given network interface.
By entering the Global Configuration context the user is able to interactively
change the device configuration, however, configuration changes will not take
effect until the user leaves the configuration contexts and returns to the Admin
Exec context via the ”end” or ”leave” commands.
When the user returns to Admin Exec context, the running-configuration of the
switch will be updated. To make the configuration changes permanent the running-
Figure 5.3: Moving between CLI contexts. Only a subset of the available contexts
is shown. Although not shown, the leave and logout commands can be used from
all contexts.
configuration should be saved to the startup-configuration using the ”copy” com-
mand, see also chapter 7.
It is also possible to leave the configuration contexts without updating the running-configuration. The commands to leave a context are listed below. More information on these and other general CLI commands can be found in section 5.4.
endConfirms configuration changes conducted in this context and
returns to the context immediately above. If issued within the
Global Configuration context, the user returns to the Admin
Exec context and the running-configuration is updated.
leaveConfirms configuration changes made and returns to Admin
Exec context. The running-configuration is updated.
Ctrl-ZAn alias for leave. Ends your configuration session and returns
The majority of the CLI commands are specific to a certain context, however,
there is a set of CLI commands available in all contexts. These commands are
explained further here. The ”configure” command used to enter the Global
Configuration context from the Admin Exec context, is also covered.
Usage Depending on context the ”no” command disables or resets a setting to
default.
Primarily used within configuration contexts to negate or disable a configuration setting, e.g., in port context ”no flow-control” disables flow control. For some commands, ”no” is used to reset to a default value, e.g., ”nopolling-interval” (NTP client context) sets the NTP polling-interval to its
default value (600 seconds).
The ”no” command can also be used to negate/disable certain commands
outside the configuration context, e.g., to disable debugging or port monitoring.
Usage Use the ”do <COMMAND>” to execute a COMMAND available in Admin Exec
context from any context.
For example, when located in Global Configuration context, the user could
run ”do show running-config” to see the running configuration, or run
”do ping 192.168.1.1” to ”ping” IP address 192.168.1.1.
Default values Not applicable
5.4.3End context
Syntax end
Context All contexts
Usage Leave this context and return to the context immediately above. If this
command is issued within any of the configuration contexts, the command
implies that the configuration changes conducted within that context are
confirmed. If the command is issued in the Global Configuration context,
the user returns to the Admin Exec context, and the running-configuration
is updated.
Default values Not applicable
5.4.4Leave context
Syntax leave
Context All contexts
Usage Leave this context and return to the Admin Exec context. If this command
is issued within any of the configuration contexts, the command implies
that the configuration changes conducted are confirmed, and the running-configuration is updated.
Usage Leave this context and return to the context immediately above. If this
command is issued within any of the configuration contexts, the command
implies that the configuration changes conducted within that context are
discarded. If the command is issued in the Global Configuration context,
the user returns to the Admin Exec context without updating the running-configuration.
Default values Not applicable
5.4.6Logout
Syntax logout
Context All contexts
Usage Logout from system. If this command is issued within any of the con-
figuration contexts, the command implies that the configuration changes
conducted are discarded, i.e., the running-configuration is not updated.
Default values Not applicable
5.4.7Repeat a command
Syntax repeat <COMMAND>
Context Admin Exec context
Usage Repeat COMMAND every second until Ctrl-C is pressed.
Usage Show help information specific to a certain context, or a specific com-
mand.
Default values If no COMMAND is specified, help information related to the cur-
rent context is shown.
5.4.9CLI tutorial
Syntax tutorial
Context All contexts
Usage Show CLI tutorial text.
Default values Not applicable
5.4.10Entering Global Configuration Context
When a user logs in to the CLI the user will enter the Admin Exec context. In
Admin Exec context the user can view status information and have access to
tools such as ping and traceroute, but is not able to perform any configuration.
To configure the device, the user can use the configure command to enter the
Global Configuration context.
Syntax configure [terminal]
Context Admin Exec context
Usage Enter global Configuration Context.
The optional terminal argument is a compatibility keyword, for advanced
users. It disables all safe guards (yes-or-no questions), making it possible to
paste-in configuration files into the terminal.
Pasting in configuration files can also be done with the copy command as
copy con run to copy console to running-config.
Default values Interactive mode (i.e. the ”terminal” argument does not apply
The Simple Network Management Protocol (SNMP) provides a standardised method
to manage and monitor IP devices remotely. The WeOS SNMP agent supports
SNMP v1, v2c and v3.
6.1Introduction and feature overview
Table 6.1 shows WeOS SNMP control features for the Web and CLI interfaces.
Further description of the SNMP support is presented in the sections 6.1.1-6.1.6.
If you are only interested in knowing how to manage SNMP features via the Web
or CLI, please visit sections 6.2 or 6.3 directly.
6.1.1SNMP introduction
The Simple Network Management Protocol (SNMP) provides a standardised method
to manage and monitor IP devices remotely. In SNMP a manager station can manage a set of status and configuration objects via an SNMP agent on the management unit. The WeOS SNMP agent supports SNMP v1, v2c and v3.
An SNMP manager:
can send SNMP GET messages to poll status and configuration information
from an SNMP agent.
can send SNMP SET messages to the SNMP agent to modify the device settings (or issue commands such as ’reboot’).
can get notified by an agent when specific events occur, such as link down
event, via SNMP TRAP messages.
The objects manageable via SNMP are defined in a management information base
(MIB). The WeOS MIB support aims at providing SNMP management primarily via
standard MIBs to enable easy integration with existing SNMP management tools.
In addition, WeOS includes an enterprise MIB (private MIB) to provide access to
MIB objects not available via the standard MIBs.
6.1.2SNMP Communities
An SNMP community is a relationship between the manager and managed station. It can be seen as a (very) basic authentication and authorisation mechanism
for SNMP v1 and v2c1. Three types of communities are supported:
Read community: The SNMP read community is used by a manager to read
SNMP MIB objects from a managed station.
Default read community: public
1
See section 6.1.4 for secure management using SNMPv3.
Figure 6.1: Sample SNMP setup, where one manager station controls two devices
by communicating with SNMP agents running on the managed devices.
Write community: The SNMP write community can be used to write (and
read) SNMP MIB objects to (from) a managed station. Thus, if the agent has
its write community enabled, it is possible to configure the switch via SNMP.
The write community is typically named ”private”.
Default write community: Disabled
Trap community: The SNMP trap community is used when an agent wants
to send a notification to the manager (SNMP Trap). The trap community is
typically named ”public”.
Default trap community: trap
Warning
Using the well-known community strings ”public” and ”private” could pose
a serious security problem.
6.1.3Trap Support
SNMP traps are only generated if there is at least one Trap Host (i.e., SNMP man-
agement station) defined. Up to three Trap Hosts can be defined. If two or more
Trap Hosts are configured, traps will be sent to all of them.
The WeOS SNMP trap support is integrated with the WeOS alarm handling system (see section 24.1). This means that you as an operator have fine-grained
control of which traps to send. All traps in the list below, except Coldstart and
lldpRemTablesChange, can be controlled via the alarm handling system.
Link Alarm: A trap is generated on link up or link down, given that Link Alarm
is enabled on that specific port (see sections 24.1.3 and 8.1.5).
Link Down OID: iso(1).org(3).dod(6).internet(1).snmpV2(6).snmpModules(3).
snmpMIB(1).snmpMIBObjects(1).snmpTraps(5).linkDown(3)
Link Up OID: iso(1).org(3).dod(6).internet(1).snmpV2(6).snmpModules(3).
snmpMIB(1).snmpMIBObjects(1).snmpTraps(5).linkUp(4)
Note
When a port is being reconfigured, link down and link up events are
likely to occur. If link-alarm is enabled on that port, a couple of SNMP
traps are likely to be generated as a side-effect of the port reconfiguration.
Cold Start: A trap is generated when a system comes up.
LFF Status: On units with SHDSL ports, a trap is generated when a unit
detects a change in the Link Fault Forward (LFF) status on a SHDSL port, i.e.,
if the remote end reports that its Ethernet port is up or down.
LFF Remote Up OID: iso(1).org(3).dod(6).internet(1).private(4).
PoE total power consumption: On units with Ethernet ports supporting
Power over Ethernet, traps are generated with the total consumed power
rises above (or falls below) a configurable threshold.
Power consumption above threshold OID: iso(1).org(3).dod(6).internet(1).
Power consumption below threshold OID: iso(1).org(3).dod(6).internet(1).
mgmt(2).mib-2(1).powerEthernetMIB(105).pethNotifications(0).
pethMainPowerUsageOffNotification(3)
Summary Alarm Status: The summary alarm status (summaryAlarmSta-
tus) follows the status of the ON LED:
– when the ON LED turns red, the summaryAlarmStatus has value Warn-
ing (1).
– when the ON LED turns green, the summaryAlarmStatus has value OK
(2).
It is possible to get SNMP traps when the summary Alarm Status changes
state (see section 24.3.16 for information of how to enable summary alarm
traps). When enabled, a summaryAlarmOK trap is sent when the ON LED
turns green, and a summaryAlarmWarning trap is sent when it turns red.
Summary Alarm OK OID: iso(1).org(3).dod(6).internet(1).private(4).
To manage a unit securely via SNMP, SNMPv3 should be used. SNMPv3 provides
privacy and integrity (per packet authentication) to the SNMP messages.
SNMPv3 introduces the notion of a SNMPv3 user, as opposed to the community
concept used in SNMPv1/v2c. The following parameters can be configured for an
SNMPv3 user.
Read-Only or Read-Write access: Defines whether the user should have read
access to the SNMP variables, or be able to read and modify them.
Security Mode: Three security modes are available:
– noAuthnoPriv: No security (i.e., neither authentication, nor encryption)
– authNoPriv: Authentication, but no privacy.
– authPriv: Authentication and Encryption
Note
As of WeOS v4.17.0, the WeOS SNMP agent accepts SNMP requests of
security level authNoPriv also for SNMPv3 users created at level auth-Priv. This feature is likely to be removed in future WeOS releases.
Encryption protocol: WeOS offers SNMPv3 data encryption using DES and
AES-128.
Authentication protocol: WeOS offers SNMPv3 data integrity using using
MD5 and SHA1.
Scope: A user can be restrained to only access a part of the MIB tree supported by the unit.
The encryption and authentication passwords are strings of 8-16 characters.
ASCII characters 33-126 except ’#’ (ASCII 35) are allowed.
A maximum of 8 SNMPv3 users can be defined, each with their own parameter
set.
6.1.4.1SNMPv3 example
This example illustrates the configuration of an SNMPv3 user on the a WeOS
switch. The user alice is grated read-only access to the full MIB tree. Security
Section 6.1.6 lists recommended SNMP management software. Those tools have
graphical user interfaces and should be straight forward to use. For a simple
test you could also use the (Unix) Net-SNMP ”snmpwalk” command. (Here it
is assumed that the switch is accessible on IP address 192.168.2.200 and the
”walk” is limited to the mib-2 system’s group).
RFC4836 MAU MIB: The dot3IfMauBasicGroup and dot3IfMauAutoNegGroup
of the MAU MIB are supported.
RFC3635 Ether-like Interface MIB: The dot3StatsTable is supported, enabling
monitoring of various error counters for Ethernet ports.
RFC4133 Entity MIB: The entityPhysical group of the Entity MIB is supported.
It can be used to read unit serial number, firmware version, etc.
RFC3433 Entity Sensor MIB: The Entity Sensor MIB can be used to monitor
the status of unit sensors for temperature, power supply, and ”digital-in”,
etc.
RFC 4319 HDSL2/SHDSL MIB: On products with SHDSL ports, the
hdsl2ShdslSpanConfTable, hdsl2ShdslSpanStatusTable,
hdsl2ShdslInventoryTable and hdsl2ShdslSpanConfProfileTable are supported
(read-only).
RFC 3621 Power Ethernet MIB: The PoE MIB is supported on products with
PoE ports.
IEEE 802.1AB LLDP MIB
RFC2787 VRRPv2 MIB: The vrrpOperations group is supported (read-only).
RFC6527 VRRPv3 MIB: The vrrpv3Operations group is supported (read-only).
6.1.5.2Private MIB
To use the WeOS private MIB, two Westermo specific MIB files should be loaded
into your SNMP management software (see section 6.1.6 for information on recommended management software):
WESTERMO-MIB: Defines the top level objects of the Westermo Private MIB
name space.
WESTERMO-WEOS-MIB: Defines the WeOS branch of the Westermo Private
MIB.
On the SNMP configuration page you will be presented to the current settings for
SNMP on your switch, see below. You may change the settings by editing the
page.
On the lower part of the page there is a list of SNMP v3 Users.
EnabledCheck the box to enable SNMP. If you have a
JavaScript enabled browser the other settings
will not be displayed unless you check this box.
Read CommunityA community identifier for read access. Leave
blank to disable read community.
Write CommunityA community identifier for read/write access.
Leave blank to disable write community.
Trap CommunityA community identifier for traps. Defaults to
community identifier trap.
Trap Host Address 1/2/3IP address of SNMP trap management station.
None, one , two or three addresses may be
filled in. Leave all blank to disable SNMP traps.
Usage Configure a SNMP Trap Host. Up to three trap hosts can be configured (is-
sue the ”trap-host” command multiple times with different IP addresses).
Use ”no host <IPV4ADDRESS>” to remove a trap-host and ”no host” to
remove all trap hosts.
Without any defined trap host, SNMP traps will not be sent.
Use ”show host” to show the configured SNMP Trap Hosts.
USERNAME: A text string defining the user. Max 32 characters. Valid
characters are ASCII 33-126 except ’#’ (ASCII 35).
Authentication: Achieve message integrity protection by specifying MD5
or SHA1 message authentication. The authentication password is a string
of 8-16 characters. ASCII characters 33-126 except ’#’ (ASCII 35) are
allowed.
Encryption: Achieve message privacy by specifying DES or AES128
message encryption. The encryption password is a string of 8-16 characters. ASCII characters 33-126 except ’#’ (ASCII 35) are allowed.
OIDTREE: Limit access to a certain branch of the supported MIB. Defaults to the whole tree (’1.’)
Use ”no rouser <USERNAME>” to remove a specific read-only user, or ”norouser” to remove all read-only users.
Use ”show rouser” show settings for configured SNMPv3 read-only users.
The table below summarises maintenance features available for the different
management tools. General descriptions of these features are presented in sec-
tions 7.1.1-7.1.10. If you are only interested in knowing how to manage mainte-
nance features via the Web or CLI, please visit sections 7.2 or 7.3 directly.
Other maintenance features
Show System Environment SensorsXX
Show System UptimeXX
Show Memory UsageXX
Show Running ProcessesX
Show Flash TableX
Update Flash Table
1
X-”-
7.1.1WeOS Firmware
A WeOS unit holds two types of firmware:
System firmware: The system firmware holds the operating system, which
is what we usually refers to when we say WeOS. For robustness purposes, a
WeOS unit typically holds two separate system firmware images.
age) contains the system firmware image loaded by default by the bootloader.
– Backup firmware image: The backup firmware image (also known as
backup image or secondary image) contains the system firmware image loaded in case an error is encountered while loading the primary
image.
1
Ability to update the flash partition table is only available on early RedFox units (Industrial and
Rail), where the flash partition table needs to be modified before upgrading to WeOS 4.3.0 or later.
See section 7.1.11 for details.
It is strongly recommended to use the same system firmware version for the primary and backup image. Thereby you ensure that
the backup firmware interprets the configuration file the same way
the primary firmware does.
For information on how to keep the primary and backup firmware synchronised, see section 7.1.1.2.
Bootloader: The bootloader firmware (or simply ”bootloader”) is the basic
firmware run to bootstrap the system. The bootloader will in turn load the
system firmware (trying the primary image first).
It is possible to upgrade both the system firmware (primary and secondary image) and the bootloader firmware. As of WeOS v4.17.0, the system firmware can
be upgraded via the Web or via the CLI, while the bootloader is only possible to
upgrade via the CLI.
Warning
There is no general guarantee that an older system firmware can be loaded
into the switch, i.e., downgrade is not generally guaranteed to work. However, if the firmware is downgraded for example from version 4.16.0 to
4.15.1, it is recommended to reboot the switch once the old firmware has
been installed.When the switch comes up with the old firmware (here
4.15.1), copy the factory default configuration to the running configuration.
See section 7.1.4 for more information on configuration files.
7.1.1.1Upgrading firmware and bootloader
Firmware and bootloader for WeOS products can be downloaded from www.westermo.
com.
The method to upgrade firmware and bootloader differs somewhat if the unit to
upgrade is running WeOS 4.13.1 (or later), as compared to units running releases
before 4.13.1.
Units running WeOS 4.13.1 or later: The WeOS firmware and bootloader can
be upgraded using a common ”pkg” file in WeOS 4.13.1 and later. This is
explained further in section 7.1.1.1.2.
WeOS releases older than 4.13.1 (e.g., WeOS 4.13.0 or 4.11.2) are unable to handle ”pkg” files.
Units running releases earlier than WeOS 4.13.1: When upgrading WeOS
units running older versions than WeOS 4.13.1 (e.g., WeOS 4.13.0 or 4.11.2),
there are individual firmware and bootloader files per WeOS product. This is
described in section 7.1.1.1.1.
Hint
If your unit is running a WeOS, e.g., WeOS4.12.0, and you wish to
upgrade using a ”pkg” installation file (e.g., ”WeOS-4.14.0.pkg”) you
first need to upgrade to WeOS 4.13.1 using the old method in sec-
tion 7.1.1.1.1.
Hint
If the switch reports lack of free memory when trying to upgrade the
firmware, try to disable non-essential services on the switch.
7.1.1.1.1Upgrading when running older firmware than WeOS 4.13.1
Before WeOS 4.13.1 the firmware installation file to use differed per product family. Similarly, there were different bootloader installation files per product. A
summary of name conventions is given in the table below:
If you run a release older than 4.13.1, and wish to upgrade to 4.14.0 or later,
where only ”pkg” files are supported, you must first upgrade to 4.13.1 (or some
Although any 4.13.x release from 4.13.1 and later can be used as intermediate release when upgrading to pkg files, it is recommended that you use the
most recent 4.13.x release. See www.westermo.com for download of WeOS
4.13 releases.
Below there are examples showing how to upgrade the primary firmware to a
WeOS 4.13 release with support for ”pkg” files (here ”4.13.4” is used) and bootloader via a FTP server (or TFTP server) at 192.168.3.10 on a WeOS Lynx unit.
Upgrading primary firmware via CLI on a Lynx (before WeOS 4.13.1). Here
we upgrade to WeOS 4.13.4 from a FTP server at 192.168.3.10.
7.1.1.1.2Upgrading when running WeOS 4.13.1 (or later)If you have
WeOS 4.13.1 or later installed, upgrading firmware or bootloader is simplified
in the sense that the same installation file (a ”pkg” file) is used for all types of
upgrades (bootfile or firmware) on any type of WeOS product.The table below
lists the firmware used upgrade system firmware and bootloader.
Product FamilySystem FirmwareBootloader Firmware
(Primary/Secondary Image)
All WeOS productsWeOS-X.X.X.pkgWeOS-X.X.X.pkg
(e.g., WeOS-4.17.0.pkg)(e.g., WeOS-4.17.0.pkg)
1
WeOS 4.13.1 and later 4.13.x releases are available both as ”img” and ”pkg” files, while only
”pkg” files are available from WeOS4.14.0 and onwards.
Thus, upgrading the primary (or secondary) system firmware image, or the bootloader will be done using the same (pkg) installation file.
Note
If you use TFTP for upgrading with ”pkg” files, make sure your TFTP server
supports large files as defined in RFC2347[22].
Note
Be aware that upgrade using TFTP may be much slower compared to the FTP
or HTTP methods. This is of particular concern if the link you are transfering
data through has high latency.Some examples are: ADSL/VDSL/SHDSL
links, 3G/4G links or accessing via VPN tunnel.
This is an effect of how the TFTP protocol works.Every data block
that is sent is ACKed by the other end, and the sender will wait for this ACK
before sending the next piece of data. FTP and HTTP use TCP for transfer,
and TCP has its sliding window algorithm that is much better suited for high
latency scenarios.
An example calculation of approximate transfer time for a high latency
link:
Let’s say the data is 50 Mbyte (PKG files are often larger than this) and the
latency, or round-trip-delay, is: 50 ms.
The standard TFTP block size is 512 bytes.
50 Mbyte divided in 512 byte sized blocks means 102400 blocks.
This translates to 5120 seconds at 50 ms per block, or 1 hour and 25
minutes!
Below you find CLI examples to illustrate upgrading firmware and bootloader
using ”pkg” files:
Upgrading firmware via CLI: Here we upgrade the primary firmware to ’WeOS
4.17.0 from a FTP server (or TFTP server) at 192.168.3.10.:
If your unit has an older version than WeOS 4.13.1 (e.g., WeOS 4.12.1), you
are not able to upgrade using WeOS ”pkg” installation files directly. You
first need to upgrade to WeOS 4.13.1 (or a later 4.13.x release) using the
methods described in section 7.1.1.1.1.
7.1.1.2Keeping Primary and Backup Firmware Synchronised
It is recommended to use the same version for primary and backup firmware.
This ensures that your unit will have same functionality if it boots on the backup
firmware as on the primary firmware.
Therefore, when upgrading the primary firmware, you are recommended to upgrade the backup firmware too. This section includes a 4-step example, where it
is assumed you wish to upgrade the primary firmware on a WeOS unit from WeOS
4.13.4 to WeOS 4.14.1, i.e., from image ”WeOS-4.13.4.pkg”2to ”WeOS-4.14.1.pkg”.
1. Prepare: (This step is not necessary if you did steps 3 and 4 during an earlier
upgrade, or if you have never upgraded your unit.)
Before upgrading the primary firmware, check that the backup firmware is
of the same version as the primary (here WeOS 4.13.4), and that the startup
configuration file is matching the firmware version.
(a) Startup Configuration file matching current firmware version (here WeOS
4.13.4): The simplest way to ensure that your startup configuration file
is in-line with the current firmware version is to click an Apply ”button” in the Web (e.g., Apply in the IGMP configuration page, see sec-
tion 18.2), or to run ”copy running-config startup-config” in the
CLI (see section 7.3.22).
Note
From WeOS 4.15.0 and onwards, this step is no longer necessary,
as the startup configuration will then automatically be updated inline with the current firmware version. See also section 7.1.4.
2
WeOS 4.13.1 and later 4.13.x releases are available both in ”pkg” and ”img” format.
(b) Verify that version of backup image is the same as the primary firmware:
To find out what firmware version you are using, see Detailed Sys-
tem Overview page in the Web (see section 4.4.2) or use the ”show
system-information” in the CLI (see section 7.3.2). In the example
below the primary firmware version is 4.13.4 and the backup is 4.9.2.
Example
example:/#> show system-information
System Information
===============================================================================
System Name: example
System Contact:
System Location:
System Timezone: Etc/UTC
Product Family: LynxModel: L210
Architecture: mxcBase MAC Address: 00:07:7c:10:de:80
Article number: 3643-0105-007Serial Number: 16975
Boot loader ver.: 4.11Active firmware: Main
Main firmware ver. : 4.13.4Backup firmware ver: 4.9.2
... (More info follows)
example:/#>
If the backup image is of a different version (as in the example above),
you should upgrade the backup firmware (to WeOS 4.13.4) before moving to step 2. To upgrade the backup firmware (to WeOS 4.13.4), either use the Web upgrade facility, see section 7.2.1, or use the CLI
”upgrade” command, see section 7.3.1. The example below shows an
upgrade of the backup firmware from a FTP/TFTP server at 192.168.3.10.
Updating RedBoot directory with new CRC ...
100% [====================================================================]
*******************************
| 57747k 0:00:00 ETA
Done.
example:/#>
2. Upgrade primary: To upgrade the primary firmware to WeOS 4.14.1, either
use the Web upgrade facility (see section 7.2.1), or use the CLI ”upgrade”
command from the CLI (see section 7.3.1). E.g., use ”upgrade primary
192.168.3.10 WeOS-4.14.1.pkg” to upgrade the primary firmware from a
FTP/TFTP server at 192.168.3.10. Compare with the example in step 1b.
Note
As you are running your unit on a primary firmware, upgrading the
primary firmware implies that the unit will automatically be rebooted
when the upgrade finishes.
3. Login and confirm configuration: At the end of the upgrade process, the
unit will reboot, using the new primary image if the upgrade procedure succeeded. After logging in again, do the following steps:
(a) Verify configuration: Verify that the unit works as expected, doing what-
ever tests you find necessary for your use case. If the unit does not
work as excepted, you should either consider downgrading to the previous version (here WeOS 4.13.4) or to inspect the running configuration
to find and correct the cause of your problems.
If you decide to downgrade, it is recommended to do that before changing or saving startup configuration for the new version
(WeOS 4.14.1), as there are no general guarantees that the older
WeOS version can interpret a later configuration file in exact the
same way.
(b) Make Startup Configuration file match the new firmware version (here
WeOS 4.14.1): (This is similar to step 1a, but now for the new firmware.)
If the unit works as expected, store the configuration in-line with the
new firmware (WeOS 4.14.1). The simplest way is to click an Apply
”button” in the Web (e.g., Apply in the IGMP configuration page, see
section 18.2), or to run ”copy running-config startup-config” in
the CLI (see section 7.3.22).
Note
From WeOS 4.15.0 and onwards, this step is no longer necessary,
as the startup configuration will then automatically be updated inline with the current firmware version. See also section 7.1.4.
4. Upgrade backup firmware: The last step is to upgrade the backup firmware
to the new WeOS version (here 4.14.1).For this you can use the Web
upgrade facility, see section 7.2.1, or the CLI ”upgrade” command, e.g.,
”upgrade secondary 192.168.3.10 WeOS-4.14.1.pkg” to upgrade the secondary firmware from a FTP/TFTP server at 192.168.3.10. Compare with the
example in step 1b.
During system bootstrap, the bootloader firmware is responsible for loading the
system firmware. This is described further in section 7.1.2.1.
As part of the bootstrap, the WeOS unit is also capable of conducting a cable factory reset (section 7.1.3.3. The configuration is typically read from flash (startup-
configuration file), but it is possible to retrieve the configuration from USB (sec-
tion 7.1.6-7.1.7), or via BOOTP. Options for controlling these and other bootstrap
related settings is covered in section 7.1.2.2.
7.1.2.1Loading System Firmware (WeOS)
The bootloader attempts to load the primary system firmware image, with fallback to loading the secondary system firmware if fails to load the primary firmware.
As described further below, different WeOS products use different bootloaders
(Barebox, U-boot or RedBoot).
The Barebox bootloader enables you to stop the bootstrap process (from console
port, press Ctrl-C at system startup), and enter an interactive boot-menu.
Example
Barebox Boot Menu
Access to the Barebox boot-menu can be password protected (section 7.1.2.2).
From the boot-menu you can select which system firmware image (WeOS) to
load (primary or secondary image on flash), but you can also choose to download
a firmware remotely via TFTP into RAM, by entering the rescue-mode (System
Recovery).
As of WeOS v4.17.0, use of BOOTP in the Barebox boot-menu (alternative
”3.”) is a technology preview.Use of TFTP (rescue mode) or BOOTP is
limited to Ethernet ports with ”internal PHY”; SFP ports can for example not
be used.
Do not enter the bootloader shell (option ”3.”) unless you know what you
are doing. Use of the bootloader shell is unsupported and can result in a
broken unit.
If Barebox fails to load both the primary and secondary firmware, it will enter
the rescue-mode, which you can access via the console port. As when entering
rescue-mode from the regular boot-menu, you can download a new firmware into
RAM via TFTP. Once the unit has booted, you can login and conduct a regular
firmware upgrade (storing the firmware to flash).
In rescue-mode, Barebox also provides a rescue console service (UDP network
console), which is useful if you do not have access to a console cable, or if your
WeOS product lacks a console port. The rescue console can be accessed using
any tool that can open a UDP socket, e.g., netcat on a Unix system ”nc -u -p6000 192.168.2.200 6000” if the default IP and UDP port numbers are used;
this assumes your PC has IP address 192.168.2.1. Section 7.1.2.2 gives more
information on configuration options related to the rescue console.
WeOS units run different types of bootloaders (Barebox, U-boot or RedBoot), and
the boot-menu and rescue-mode features described above only apply to Barebox. The following bootloaders are used by different the different WeOS product
platforms.
Atlas: Products based on the Atlas use the RedBoot bootloader
Basis: Products based on the Basis also use the RedBoot bootloader
Corazon: Products based on the Corazon use the U-boot or Barebox bootloader. Barebox is supported from WeOS 4.15.2, and is now the preferred
bootloader for Corazon products.
For information about what platform your product has, see section 4.4.2 (Web),
or section 7.3.2) (CLI), or see the product list in section 1.5.
If you wish to check what type of bootloader (Barebox, U-boot or RedBoot) your
unit runs, use the ”show partitions” command as described in section 7.3.55.
See section 7.1.1.1 for information on how to upgrade your bootloader.
7.1.2.2Bootstrap options
Configuration Boot Media: WeOS supports two methods to retrieve configu-
ration file(s): from the on-board flash (default), from TFTP server (by use of
BOOTP), and there are also options to deploy or restore configuration from
a USB stick.
– Flash: By default the WeOS unit boots using configuration files (startup-
configuration, VPN certificates, etc.) from the (on-board) flash. The
configuration on flash is also used as fall-back when other methods fail.
– BOOTP: It is possible to bootstrap the configuration using BOOTP. For
this you need a DHCP/BOOTP Server (section 22), and a TFTP Server,
holding the unit’s configuration file. As of WeOS v4.17.0, it is only possible to use BOOTP/TFTP to download the WeOS configuration file (certificates for IPsec, etc., can not be downloaded).
Note
Bootstrapping the configuration file using BOOTP is only possible
over the WeOS unit’s Ethernet ports.DSL ports (SHDSL, ADSL,
VDSL) can not be used.
– USB: It is possible to retrieve the configuration from a USB stick3by
utilising WeOS USB Auto-Backup & Restore (section 7.1.6) or WeOS USB
Deployment (section 7.1.6) functions4. These services have precedence
over bootstrapping from Flash and BOOTP, but can be disabled (see USB
Bootstrap Settings below).
BOOTP Bootstrap Settings: When using BOOTP as configuration boot media,
you can specify the BOOTP timeout (default 5 minutes), i.e., the maximum
time to wait for the BOOTP/TFTP configuration file download to succeed.
Fall-back is to use configuration on on-board flash.
By default, the downloaded configuration file is only stored in RAM. You can
manually store it to flash (e.g., by ”cp running-config startup-config”),
but you can also configure the WeOS to store the file to startup-config on
flash automatically after download.
USB Bootstrap Settings: During bootstrap, a WeOS unit checks if there is a
USB stick attached in order to restore section 7.1.6) or deploy (section 7.1.6)
a configuration from the USB stick.
3
See section 1.5.1 for WeOS products with USB interfaces, and section 7.1.5.1 for list of USB
sticks verified for use with WeOS.
4
As a technology preview feature, there is also a boot media option referred to as ”boot from
USB”. See WeOS release notes for more information on WeOS technology previews in general and
for specific information on the ”boot from USB” function.
– Timings: There are two timings related to Bootstrap and USB services:
*
Delayed USB backup/restore and USB deploy: (Non-configurable) A
USB media not plugged in (or detected) when the device boots up
can still be used to backup/restore or deploy the device configuration up to 30 seconds after power on.
*
USB bootstrap timeout: (Configurable) The USB bootstrap timeout
halts boot for specified number of seconds, waiting for USB media
to settle and be detected by the device. Before the timeout has
elapsed and no media has been detected the device is unreachable
with all ports remaining in blocking. Default: Disabled (i.e., zero
delay)
Hint
Setting a ”USB bootstrap timeout” is useful to avoid a situation
where the unit first applies the configuration from on-board flash,
and afterwards detects the USB stick and applies USB restore or
deploy (”Delayed USB backup/restore and USB deploy”).
– Enable/Disable: USB bootstrap services can be disabled. Disabling USB
bootstrap services implies disabling USB Deployment and automatic
USB Backup & Restore features. Manual backup and restore to/from
a USB stick is still possible. Default: Enabled
Warning
USB bootstrap services are enabled by default for ease of use and
robustness. However, it gives users with physical access to the
switch the opportunity to modify or retrieve the configuration without logging in. If unauthorised personnel have physical access to
the unit it is recommended to disable USB bootstrap services for
security purposes.
Below is an example of how to disable USB Bootstrap services.
Occasionally you may end up in a situation where you cannot access your switch:
Forgetting IP address: If you have forgotten what IP address you assigned to
your switch, you will no longer be able to access it remotely (Web, SSH, Telnet, SNMP). Section 7.1.3.1 presents different methods to find the IP address
of your switch.
Forgetting password: If you have forgotten the admin password you as-
signed to your switch, you should conduct either a factory reset or a pass-word reset. Both alternatives require that you have physical access to the
switch.
– Factory Reset: By resetting the switch to the factory default setting the
whole5switch configuration (including the ”admin” password)) will be
reset to its default values. That is, the ”admin” password will be reset
to ”westermo”, thus enabling you to login again.
The way to accomplish a factory reset may differ if the switch has a console port (section 7.1.3.2) or if it lacks a console port (section 7.1.3.3).
– Password Reset: On switches with a console port there is a possibility to
reset the ”admin” password to its default value (”westermo”) without
affecting the rest of the configuration, see section 7.1.3.2.
Misconfiguration: You may also lose the ability to access your switch remotely (Web, SSH, Telnet, SNMP, WeConfig) due to misconfiguration, e.g.,
by disabling all Ethernet ports, or moving them to a VLAN where the switch
has no IP address assigned. This case can be resolved by logging into the
switch via the console port, and change the configuration appropriately via
the CLI (see chapter 5 on information of how to access the CLI via the console port).
However, if the switch does not have a console port, you may need to conduct a factory reset as described in section 7.1.3.3.
5
Only configuration files on unit flash will be affected. Files on an attached USB stick (if present)
will not be affected.
The factory default IP setting enables you to access your switch via IP address
192.168.2.200, as well as via an address assigned via a DHCP server6(see ta-
ble 7.4).
AddressNetmaskGateway
Primary IP addressDynamic (DHCP)(Dynamic)(Dynamic)
Secondary IP address192.168.2.200255.255.255.0Disabled
Table 7.4: Factory Default IP settings.
If you have forgotten what IP address you assigned your switch there are several
methods to find it out:
1. WeConfig (from PC): The WeConfig tool is designed to scan for (Westermo)
switches on the local network. See the WeConfig User Guide[54] for details on how to use the WeConfig tool. This option is probably the simplest
method to find the IP address of a switch, but will not work if the IPConfig
service has been disabled on your switch (see section 7.3.46 for information
on how to enable/disable IPConfig on your switch).
2. IPConfig client (from switch): The WeOS CLI and the Web contain an IPConfig client scanning facility, thus if you are logged into a switch you are to
scan for neighbour switches. As in the previous step, switches can only be
discovered this way if they have the IPConfig service enabled.
3. Via console port: On switches equipped with a console port, the IP address of
the switch can be found using the switch Command Line Interface (CLI). See
chapter 5 for more information of how to use the CLI. (If you have forgotten
the admin password, please see section 7.1.3.2).
4. LLDP: If LLDP is enabled (section 7.1.9), WeOS announces its presence (including its IP address) in LLDP messages. Thus, an LLDP client (or simply a
network sniffer such as Wireshark7) can be used to discover the IP address
of the switch.
In case you are not able to discover the IP address by any of these methods,
conducting a factory reset will take the switch back to its original IP configuration
6
In addition, the unit will autoconfigure itself with a link-local address in the 169.254.x.x range,
where ’x’ is in interval 0-255. See section 19.2.6 for more information.
(as shown in table 7.4). See sections 7.1.3.2 and 7.1.3.3 for information on how
to conduct a factory reset.
7.1.3.2Password or Factory Reset via Console Port
For WeOS switches equipped with a console port, it is possible to conduct a factory reset or just a password reset using the special accounts (factory or pass-word). For security reasons, these special accounts can only be used via the
console port. For security hardening purposes, these two special accounts can be
disabled in the device’s boot context, in the CLI (see sections 7.3.10 and 7.3.11).
Admin password reset: It is possible to recover from a lost admin password
by using the following login and password from the console port. The admin
password will be reset to its default value (westermo), and thereby enable
you to login to the switch again.
– Login: password
– Password: reset
Factory reset: It is possible to reset the switch to factory default settings by
using the following login and password from the console port. The whole
switch configuration (including the admin password) will be reset to its factory default setting.
– Login: factory
– Password: reset
7.1.3.3Factory Reset without using Console Port
There is a mechanism to conduct a factory reset without using the console port
or being logged into the unit – this method is referred to as ”cable factory reset”.
Note
Depending on the type of product, cable factory reset is conducted by connecting one pair of Ethernet ports (single cable) or two pairs of Ethernet
ports (two cables) as shown in the table below.
8
8
Only configuration files on unit flash will be affected. Files on an attached USB stick (if present)
1. Power off the switch and disconnect all Ethernet cables (including copper
and fiber cables) and DSL cables.
2. Connect one pair (or two pairs) of Ethernet ports as described in the table
below. The ports need to be connected directly, i.e., not via a hub or switch.
Use a straight cable - not cross-over cable - when connecting a port pair.
Product/ModelEthernet Port Pair 1Ethernet Port Pair 2
Falcon
FDV-206-1D1Sport 1 ⇔ port 4port 2 ⇔ port 3
Lynx
L106/206-F2Gport 3 ⇔ port 6port 4 ⇔ port 5
L110/210port 3 ⇔ port 10port 6 ⇔ port 7
Lynx-DSS
L105/205-S1port 1 ⇔ port 4port 2 ⇔ port 3
L106/206-S2port 1 ⇔ port 4port 2 ⇔ port 3
L108/208-F2G-S2port 3 ⇔ port 6port 4 ⇔ port 5
RedFox Industrial
All RFI modelsport 1/1 ⇔ port 1/2Not applicable
RedFox Industrial Rack
All RFIR modelsport 1 ⇔ port 2Not applicable
RedFox Rail
RFR-12-FBport X1 ⇔ port X6port X2 ⇔ port X5
Viper
All Viper-12 modelsport X1 ⇔ port X6port X2 ⇔ port X5
Wolverine
DDW-142port 1 ⇔ port 2Not applicable
DDW-142-485port 1 ⇔ port 2Not applicable
DDW-225/226port 2/1 ⇔ port 2/4port 2/2 ⇔ port 2/3
3. Power on the unit.
4. Wait for the unit to start up. Control that the ON LED is flashing red. The
ON LED flashing indicates that the unit is now ready to be reset to factory
default. You now have the choice to go ahead with the factory reset, or to
skip factory reset and boot as normal.
Go ahead with factory reset: Acknowledge that you wish to conduct the
factory reset by unplugging (one of) the Ethernet cable(s). The ON LED
will stop flashing.
This initiates the factory reset process, and the unit will restart with
factory default settings.
Skip the factory reset: To skip the factory reset process, just wait for
approximately 30 seconds after the ON LED starts flashing RED without
unplugging (any of) the Ethernet cable(s). The switch will conduct a
normal boot with the existing settings.
7.1.4Configuration Files and Reboot
The system keeps three special configuration files:
Startup Configuration: The configuration file used by the switch after system
boot or reboot. The startup configuration is stored in non-volatile memory
(flash)9.
Note
From WeOS 4.15.0 and onwards, the startup configuration is verified to
be in-line with the syntax of the current firmware version upon system
boot. If there are deviations (which may be the case after a firmware
upgrade), the startup configuration is automatically updated.
Running Configuration: The configuration currently used by the switch. The
running configuration is kept in volatile memory (RAM).
The running configuration is identical to the startup configuration when configuration changes are made via the Web interface, the WeConfig tool or
SNMP. That is, when using these methods to manage the switch, a change
in the running configuration is immediately copied to the startup configura-tion.
In contrast, when managing the switch via the CLI, configuration changes
only affect the running configuration. Thus, to make CLI changes survive
a reboot, you must explicitly copy the running configuration to the startup
configuration.
Factory Default Configuration: The system keeps a factory default configuration file. The factory default file is kept in non-volatile memory (flash) and
cannot be overwritten. When the switch is shipped, and after factory reset,
9
As described in section 7.1.5, it is possible to keep several configuration files on flash. The
startup configuration file is actually a symbolic name for one of the stored configuration files.
the startup configuration file is identical to the factory default configuration
file.
In addition to these configuration files, it is possible (via CLI) to keep a set of additional configuration files on the switch, which enables easy swapping between
alternate configurations.
Warning
Configuring the switch via multiple management interfaces in parallel is discouraged, since it may lead to unexpected behaviour.
For example, consider the case when two users are accessing the switch at
the same time, one user via the CLI and another user via the Web interface:
Assume the ”CLI user” makes changes to the running configuration, but of
some reason do not wish to copy these changes to the startup configuration
(yet).
If the another user, the ”Web user”, applies a single change using the web
management tool, all the changes done to the running configuration (by the
”CLI user”) will be saved to the startup configuration. (Actually clicking the
Apply button, even without changing any values has the same affect.)
7.1.4.1Account password when loading a configuration file
Configuration files contain information on user account and (hashed) passwords,
e.g., for the ”admin” account. Thus, when loading a configuration file to the
switch (i.e., overwriting the startup-configuration or running-configuration), the
account passwords will also be replaced according to the setting in the new configuration file.
Warning
To copy a new configuration file to the running-config or startup-config while
keeping the existing user names and passwords, the lines in the new configuration file containing the ”username” command should be removed before
installing the new configuration file.
If you unintentionally happen to loose the admin password because you copied
a configuration file including an unknown admin password, see section 7.1.3 for
information on how to regain access to the switch.