Home

Rugged Operating System - (ROS®) v3.7.0 User Guide

image

Contents

1. RuggedSwitch RUGGEDCOM SWITCH MIB Defines Agent Capabilities for Ruggedcom Switches RuggedServer RUGGEDCOM SERVER MIB Defines Agent Capabilities for RuggedMC30 RUGGEDCOM MC30 MIB Ruggedcom Servers Defines Agent Capabilities for RMC30 RuggedcomTraps RUGGEDCOM TRAPS MIB Generic Traps Group Power Supply Trap Group Notifications Group RcSyslInfo RUGGEDCOM SYS INFO MIB System Error Objects Group System Status Objects Group System Objects Temperature Group System Status Power Supply Group System Info Device Info Group ROS v3 7 0 User Guide 240 RS900LWG RS930LW Appendix B SNMP Trap Summary Appendix B SNMP Trap Summary Appendix B SNMP Trap Summary The switch generates the standard traps summarized in the following table e from IF MIB linkDown linkUp e from SNMPv2 MIB authenticationFailure coldStart e from BRIDGE MIB newRoot topologyChage e from RMON MIB risingAlarm fallingAlarm e from LLDP MIB IldpRemoteTablesChange The switch also generates the proprietary traps which are summarized in this document with their severity levels These traps are described in the RC TRAPS MIB genericTrap powerSupplyTrap e swUpgradeTrap e cfgChangeTrap Generic Traps carry information about event in severity and description objects They are sent at the time an alarm is generated for the device The following are examples of RuggedCom Generic Traps along with the severity of each in br
2. ROS v3 7 0 User Guide 71 RS900LWG RS930LW 3 Ethernet Statistics Log out Ethernet Port Statistics Back Port bh InOctets 3673103 SS OutOctets 2640768 InPkts e35 OutPkts Base TotallnOctets 5716606 t t TotallnPkts lse i iti t S S InBroadcasts e 0 C C i InMulticasts ba CRCAlignErrors Wu OversizePkts DR Fragments br Jabbers ooo Collisions ooo LateCollisions ooo Pkt64 Octets Daag Pkt6Sto127Octets ken o Pkti28to255Octets Jee Pkt256to51 1Octets Ge Pkt512to10230ctets 8 _ Pkt1024to1536Octets hn DropEvents pooo OutMulticasts bas 272C O OutBroadcasts Ges UndersizePkts ooo Reload Figure 3 4 Ethernet Port Statistics Form Port Synopsis 1 to maximum port number The port number as seen on the front plate silkscreen of the switch InOctets Synopsis 0 to 18446744073709551615 ROS v3 7 0 User Guide 72 RS900LWG RS930LW 3 Ethernet Statistics The number of octets in both received packets Unicast Multicast Broadcast and dropped packets OutOctets Synopsis 0 to 18446744073709551615 The number of octets in transmitted packets InPkts Synopsis 0 to 18446744073709551615 The number of received good packets Unicast Multicast Broadcast and dropped packets OutPkts Synopsis 0 to 18446744073709551615 The number of transmitted good packets TotallnOctets Synopsis 0 to 18446744073709551615 The total number of octets of all
3. A list of MAC address of wireless units which are part of the MAC filter 7 2 5 RADIUS Parameters The RADIUS Parameters form provides the ability to configure wireless LAN RADIUS attributes such as server IP address port number and shared secret Log out Radius Parameters San Back Server IP Address 192 168 0 1 Server l Port 1812 Shared Secret Apply Figure 7 13 RADIUS Parameter Menu Server IP Address Synopsis where ranges from 0 to 255 Default 192 168 0 1 The IP address of the RADIUS server Server Port Synopsis 1 to 65535 Default 1812 The Port number of the RADIUS server Shared Secret Synopsis Any 48 characters Default This is an ASCII string between 8 and 48 characters This secret is shared between the Access Point and the RADIUS server 7 2 6 Advanced Parameters The Advanced Parameters forms provide the ability to configure advanced wireless LAN attributes such as data rate power and QoS ROS v3 7 0 User Guide 154 RS900LWG RS930LW 7 Wireless LAN AP Advanced Parameters Log out Back Advanced Parameters Data Rate best v Power E WDS Disable Enable WM Disable O Enable Short Preamble Disable Enable Distance 300 Figure 7 14 AP Advanced Parameter Form Client Bridge and Client IP Bridge Advanced Parameters Figure 7 15 Client Bridge and Client IP Bridge Advanced Par
4. UTC 2 00 Mid Atlantic UTC 1 00 Azores UTC 0 00 Lisbon London UTC 1 00 Berlin Paris Rome UTC 2 00 Athens Cairo Helsinki UTC 3 00 Baghdad Moscow UTC 3 30 Teheran UTC 4 00 Abu Dhabi Kazan Muscat UTC 4 30 Kabul UTC 5 00 Islamabad Karachi UTC 5 30 Calcutta New Delhi UTC 5 45 Kathmandu UTC 6 00 Almaty Dhaka UTC 6 30 Rangoon UTC 7 00 Bangkok Hanoi UTC 8 00 Beijing Hong Kong UTC 9 00 Seoul Tokyo UTC 9 30 Adelaide Darwin UTC 10 00 Melbourne Sydney UTC 11 00 Magadan New Caledonia TC 12 00 Auckland Fiji Default UTC 0 00 Lisbon London This setting enables the conversion of UTC Universal Coordinated Time to local time NTP Server Address Synopsis where ranges from 0 to 255 Default This parameter specifies the IP address of an S NTP server Simple Network Time Protocol programming an address of 0 0 0 0 disables SNTP requests This device is an SNTP client which may connect to only one server If a server address is programmed then a manual setting of the time will be overwritten at the next update period NTP Update Period Synopsis 1 to 1440 Default 60 min This setting determines how frequently the S NTP server is polled for a time update If the server cannot be reached three attempts are made at one minute intervals and then an alarm is generated at which point the programmed rate is resumed 1 10 2 Config
5. 0 16 32 48 64 80 96 112 128 144 160 176 194 208 224 240 Default 128 Selects the STP port priority Ports of the same cost that attach to a common LAN will select the port to be used based on the port priority STP Cost Synopsis 0 to 65535 or Auto Default Auto Selects the cost to use in cost calculations when the Cost Style parameter is set to STP in the Bridge RSTP Parameters configuration Setting the cost manually provides the ability to preferentially select specific ports to carry traffic over others Leave this field set to auto to use the standard STP port costs as negotiated 4 for 1Gbps 19 for 100 Mbps links and 100 for 10 Mbps links For MSTP this parameter applies to both external and internal path cost RSTP Cost Synopsis 0 to 2147483647 or Auto Default Auto Selects the cost to use in cost calculations when the Cost Style parameter is set to RSTP in the Bridge RSTP Parameters configuration Setting the cost manually provides the ability to preferentially select specific ports to carry traffic over others Leave this field set to auto to use the standard RSTP port costs as negotiated 20 000 for 1Gbps 200 000 for 100 Mbps links and 2 000 000 for 10 Mbps links For MSTP this parameter applies to both external and internal path cost ROS v3 7 0 User Guide 116 RS900LWG RS930LW 5 Spanning Tree 5 5 Spanning Tree Statistics 5 5 1 Bridge RSTP Statistics Log out Brid
6. 13 Diagnostics 13 5 Loading Factory Default Configuration The Load Factory Defaults menu is used to reset the unit s configuration to its factory default Optionally it is possible to exclude parameters that affect basic connectivity and SNMP management from the reset in order to be able to remain in communication with the device Specifically configuration items in the following categories are not affected by a selective configuration reset e IP Interfaces e IP Gateways e SNMP Users e SNMP Security to Group Maps e SNMP Access The menu presents a choice of whether to reset all or only the selected set of configuration parameters to their factory default values access Log out Load Factory Defaults admit Back Defaults Choice fNone Apply Reload Figure 13 8 Load Factory Defaults Dialog Defaults Choice Synopsis None Selected All This parameter allows the user to choose to load defaults to Selected tables i e excluding those listed above which would preserve configuration of the tables that are critical for basic communication and switch management applications or to force All tables to default settings Note It is possible to explicitly reset configuration items in the exceptional categories listed above to their default values by using the sql command Please refer to the section entitled Upgrading Firmware and Managing Configurations 13 6 Resetting the
7. 16 21 19 Date May 29 2007 Time Zone UTC 5 00 New York Toronto NTP Server Address NTP Update Period 60 min Figure 1 15 Time and Date Form Device time date and time zone can be set via this form The device can also be configured to periodically contact an S NTP server to correct any drift in the onboard clock Each ROS based device unit can act as a unicast SNTP server and or SNTP client The SNTP server will respond to the unicast SNTP requests received from the units where its address is configured as NTP Server Address The server itself can be synchronized with higher level NTP server Note If it is desired that NTP provide the time reference for the unit the Time Source parameter must be set to NTP Server in the Time Source Selection menu Time Synopsis HH MM SS This parameter enables both the viewing and setting of the local time Date Synopsis MMM DD YYYY This parameter enables both the viewing and setting of the local date Time Zone Synopsis UTC 12 00 Eniwetok Kwajalein UTC 11 00 Midway Island Samoa UTC 10 00 Hawaii UTC 9 00 Alaska UTC 8 00 Los Angelos Vancouver UTC 7 00 Calgary Denver UTC 6 00 Chicago Mexico City ROS v3 7 0 User Guide 33 RS900LWG RS930LW 1 Administration UTC 5 00 New York Toronto UTC 4 00 Caracas Santiago UTC 3 30 Newfoundland UTC 3 00 Brasilia Buenos Aires
8. A Boundary Port connected to an STP bridge will send only STP BPDUs One connected to an RSTP bridge need not refrain from sending MSTP BPDUs This is made possible by the fact that the MSTP carries the CIST Regional Root Identifier in the field that RSTP parses as the Designated Bridge Identifier 5 2 3 Benefits of MSTP Despite the fact that MSTP is configured by default to arrive automatically at a spanning tree solution for each configured MSTI advantages may be gained from influencing the topology of MSTIs in an MST region The fact that the Bridge Priority and each port cost are configurable per MSTI see sections Section 5 4 4 Bridge MSTI Parameters and Section 5 4 5 Port MSTI Parameters makes it possible to control the topology of each MSTI within a region Load Balancing MST can be used to balance data traffic load among sets of VLANs enabling more complete utilization of a multiply interconnected bridged network ROS v3 7 0 User Guide 101 RS900LWG RS930LW 5 Spanning Tree A bridged network controlled by a single spanning tree will block redundant links by design in order to avoid harmful loops Using MSTP however any given link may have a different blocking state for each spanning tree instance MSTI as maintained by MSTP Any given link therefore might be in blocking state for some VLANS and in forwarding state for other VLANs depending on the mapping of VLANs to MSTIs It is possible to con
9. Port Synopsis 1 to maximum port number The port number as seen on the front plate silkscreen of the switch State Synopsis Down Up The port link status InOctets Synopsis 0 to 4294967295 The number of octets in received good packets Unicast Multicast Broadcast and dropped packets OutOctets Synopsis 0 to 4294967295 The number of octets in transmitted good packets InPkts Synopsis 0 to 4294967295 The number of received good packets Unicast Multicast Broadcast and dropped packets OutPkts Synopsis 0 to 4294967295 ROS v3 7 0 User Guide 70 RS900LWG RS930LW 3 Ethernet Statistics The number of transmitted good packets ErrorPkts Synopsis 0 to 4294967295 The number of any type of erroneous packet 3 2 Viewing Ethernet Port Statistics Ethernet port statistics provide a detailed view of the traffic This is useful when the exact source of error or traffic mix needs to be determined Log out Ethernet Port Statistics Back 3673103 2640768 56235 33462 5716606 88166 2536 _ AE H H H 0 H 658288463 1287504977 1443028 5295204 659288463 1443028 11041 0 1353466121 690097031 5109227 1793529 1353634643 5110189 2586099 960891 2686153 273140867 21093 3624240 2686793 21103 20561 o 29330820 141833588 330643 895172 29336111 330722 200874 59062 0 0 E 0 E 0 0 H 0 0 0 0 H 0 eleleleleleleloe P loon Let fro Figure 3 3 Ethernet Port Statistics Table
10. Rugged Operating System ROS v3 7 0 User Guide For use with RS900LWG RS930LW July 16 2009 Rugged Operating System Rugged Operating System ROS v3 7 0 User Guide Copyright 2009 RuggedCom Inc ALL RIGHTS RESERVED Dissemination or reproduction of this document or evaluation and communication of its contents is not authorized except where expressly permitted Violations are liable for damages All rights reserved particularly for the purposes of patent application or trademark registration This document contains proprietary information which is protected by copyright All rights are reserved No part of this document may be photocopied reproduced or translated to another language without the prior written consent of RuggedCom Inc Disclaimer Of Liability We have checked the contents of this manual against the hardware and software described However deviations from the description cannot be completely ruled out RuggedCom shall not be liable for any errors or omissions contained herein or for consequential damages in connection with the furnishing performance or use of this material The information given in this document is reviewed regularly and any necessary corrections will be included in subsequent editions We appreciate any suggested improvements We reserve the right to make technical improvements without notice Registered Trademarks RuggedServer RuggedWireless RuggedCom Discovery Prot
11. The number of times TCP connections have made a direct transition to the SYN RCVD state from the LISTEN state tcpAttemptFails The number of times TCP connections have made a direct transition to the CLOSED state from either the SYN SENT or the SYN RCVD plus the number of times TCP connections have made a direct transition to the LISTEN state from the SYN RCVD tcpEstabResets The number of times TCP connections have made a direct transition to the CLOSED state from either the ESTABLISHED state or the CLOSE WAIT state tcpCurrEstab The number of TCP connections for which the current state is either ESTABLISHED or CLOSE WAIT tcpInSegs The total number of segments received including those received in error tcpOutSegs The total number of segments sent including those on current connections but excluding those containing only retransmitted bytes tcpRetransSegsDescr The total number of segments retransmitted that is the number of TCP segments transmitted containing one or more previously transmitted bytes udpInDatagrams udpNoPorts The total number of UDP datagrams received and delivered to UDP users The total number of received UDP datagrams for which there was no application at the destination port udpInErrors The number of received UDP datagrams that could not be delivered for reasons other than the lack of an application at the destination port udpOutDatagrams The number of sent UDP
12. am pinging the switch but it is not responding am sure the switch is receiving the ping because its port LEDs are flashing and the statistics menu shows the pings What is going on Is the switch being pinged through a router If so the switch gateway address must be configured The following figure illustrates the problem RuggedSwitch RuggedRouter Workstation 192 168 0 1 10 0 0 2 192 168 0 2 10 0 0 1 Figure 1 34 Using A Router As A Gateway The router is configured with the appropriate IP subnets and will forward the ping from the workstation to the switch When the switch responds however it will not know which of its interfaces to use in order to reach the workstation and will drop the response Programming a gateway of 10 0 0 1 will cause the switch to forward unresolvable frames to the router This problem will also occur if the gateway address is not configured and the switch tries to raise an SNMP trap to a host that is not on the local subnet ROS v3 7 0 User Guide 50 RS900LWG RS930LW 2 Ethernet Ports 2 Ethernet Ports ROS Ethernet port control provides the following features Configuring port physical parameters Configuring link alarms traps for the port Configuring port rate limiting Using Port Mirroring Cable Diagnostics Viewing port status Resetting all or some ports Using Link Fault Indication LFI 2 1 Controller Protection Through Link Fault Indication LFI
13. e Configure Global WYLAN Parameters Configure Static VLANs e Confiqure Port VLAN Parameters e View VLAN Summary e Port Security Classes of Service e Multicast Filtering MAC Address Tables Diagnostics Figure 6 5 Virtual LANs Menu 6 3 1 Global VLAN Parameters Global VLAN Parameters access admin VLAN aware No Yes fe Apply Reload Figure 6 6 Global VLAN Parameters Form VLAN aware Synopsis No Yes Default Yes Set either VLAN aware or VLAN unaware mode of operation Note Do not attempt to change the VLAN aware parameter of the managed switch by applying a configuration CSV file update Configuration file updates are used to apply bulk changes to the current configuration of a switch Instead a change to this individual parameter MUST first be applied separately from any other table i e parameter changes In other words configuration file updates should exclude the VLAN aware parameter ROS v3 7 0 User Guide 136 RS900LWG RS930LW 6 VLANs 6 3 2 Static VLANs Static VLANs Management VAN None gr SCADA IEDs None oh 11 Metering IEDs None On Protection IEDs 3 6 Log out Back InsertRecord Figure 6 7 Static VLANs Table R access Log out Static VLANs Grein Back VID 12 VLAN Name Protection IEDs Forbidden Ports None IGMP Of Ono MSTI 0 Figure 6 8 Static VLANs Form VI
14. v3 7 0 User Guide 205 RS900LWG RS930LW 12 Network Discovery access admin Main Menu Administration Ethernet Ports Ethernet Stats Link Agaregation Spanning Tree Virtual LANs Port Security Classes of Service Multicast Filtering MAG Address Tables Network Discovery e Link Layer Discovery Protocol e Configure Global LLDP Parameters Configure Port LLDP Parameters View LLDP Global Remote Statistics View LLDP Neighbor Information View LLDP Statistics e RuggedCom Discovery Protocol Diagnostics Figure 12 2 Network Discovery Menu ROS v3 7 0 User Guide 206 RS900LWG RS930LW 12 Network Discovery 12 3 1 1 Global LLDP Parameters access admin Global LLDP Parameters State Disabled Enabled Tx Interval 30s Tx Hold 4 Reinit Delay Tx Delay Apply Reload Figure 12 3 Global LLDP Parameters Form State Synopsis Disabled Enabled Default Enabled Enables the LLDP protocol Note that LLDP is enabled on a port when LLDP is enabled globally and along with enabling per port setting in Port LLDP Parameters menu Tx Interval Synopsis 5 to 32768 Default 30 s The interval at which LLDP frames are transmitted on behalf of this LLDP agent Tx Hold Synopsis 2 to 10 Default 4 The multiplier of the Tx Interval parameter that determines the actual time to live TTL value used in a LLDPDU The actual TTL value can be expressed by the following formula TTL MIN 65535 Tx In
15. Back ke kat e fon LS Ico l CH Figure 9 4 Port CoS Parameter Form access Log out Port CoS Parameters sarin Back Port s H Default Pri T Inspect TOS No Yes Apply Reload Figure 9 5 Port CoS Parameter Form Port s Synopsis 1 to maximum port number ROS v3 7 0 User Guide 177 RS900LWG RS930LW 9 Classes of Service The port number as seen on the front plate silkscreen of the switch or a list of ports if aggregated in a port trunk Default Pri Synopsis 0 to 7 Default 0 This parameter allows prioritization of the frames received on this port that are not prioritized based on the frames contents e g priority field in the VLAN tag DiffServ field in the IP header prioritized MAC address Inspect TOS Synopsis No Yes Default No This parameter enables or disables parsing of the Type Of Service TOS field in the IP header of the received frames to determine the Class of Service that should be assigned When TOS parsing is enabled the switch will use the Differentiated Services bits in the TOS field 9 2 3 Priority to CoS Mapping access admin Priority to CoS Mappin Figure 9 6 Priority to CoS Mapping Table ROS v3 7 0 User Guide 178 RS900LWG RS930LW 9 Classes of Service ZS 7 access Log out Priority to CoS Mappin ae Back O ority i CoS Normal D Apply Reload Figure 9 7
16. Default AP Configure the wireless interface as an Access Point AP a Client Bridge or Client IP Bridge Client Bridge mode integrates the functions of an 802 11 station and an Ethernet Bridge Client IP Bridge mode integrates the functions of an 802 11 station and an Ethernet IP Bridge A Client Bridge bridges all Ethernet traffic by incorporating RuggedCom specific extensions A Client IP Bridge only bridges IP and ARP traffic without affecting the standard IEEE 802 11 station functionality As a result a Client IP Bridge can work with any third party AP Note The only configuration difference between the Client Bridge and Client IP Bridge modes is the setting of Operational Mode parameter Note For ROS use in general it is entirely acceptable to modify several fields i e parameters on a page and then update the entire page configuration with a single Apply command The Operational Mode parameter is an exception to this rule make sure to Apply any change to the Operational Mode as a separate step apart from any other ROS v3 7 0 User Guide 147 RS900LWG RS930LW 7 Wireless LAN parameter changes This is because there are many underlying dependencies between the Operational Mode of the RuggedWireless operation and other related parameters RFMAC A 48 bit 802 11 wireless address assigned to the wireless interface This serves as the BSSID Basic Service Set
17. GVRP aware Adv amp Learn B Port B4 GVRP aware Adv amp Learn Port E1 GVRP aware Adv only Adv Only Edge Switch Edge Switch A E Port A2 Edge Port PVID 7 Port E2 Edge Port PVID 20 End Node A GVRP unaware Figure 6 1 Using GVRP An example of using GVRP 6 1 10 End Node E GVRP Unaware Adv amp Learn Port C1 GVRP aware Adv only Edge Switch C Port C2 Edge Port PVID 7 End Node C GVRP Unaware Ports A2 and C2 are configured with PVID 7 and port E2 is configured with PVID 20 End Node D is GVRP aware and is interested in VLAN 20 hence VLAN 20 is advertised by it towards switch D D2 becomes member of VLAN 20 Ports A1 and C1 advertise VID 7 and ports B1 and B2 become members of VLAN 7 Ports D1 and B1 advertise VID 20 and ports B3 B4 and D1 become members of VLAN 20 PVLAN Edge PVLAN Edge Protected VLAN Edge port refers to a feature of the switch whereby multiple VLAN Edge ports on a single device are effectively isolated from one another All VLAN Edge ports in a switch that are configured as protected in this way are prohibited from sending frames to each other but are still allowed to send frames to other non protected ports within the same VLAN This protection extends to all traffic on the VLAN unicast multicast or broadcast Note that this feature is strictly local to the switch PVLAN Edge p
18. Normal z Ports Noe Apply Delete Reload Figure 10 7 Static Multicast Group Form MAC Address Synopsis where ranges 0 to FF Default 00 00 00 00 00 00 A multicast group MAC address VID Synopsis 1 to 4094 Default 1 The VLAN Identifier of the VLAN upon which the multicast group operates CoS Synopsis Normal Medium High Crit ROS v3 7 0 User Guide 192 RS900LWG RS930LW 10 Multicast Filtering Default Normal Specifies what Class Of Service is assigned to the multicast group frames Ports Synopsis Any combination of numbers valid for this parameter Default None The ports to which the multicast group traffic is forwarded 10 3 3 Viewing IP Multicast Groups IP Multicast Groups 224 1 0 2 01 00 5E 01 00 02 238 0 40 6 e e 01 00 5E 00 28 06 Lt Figure 10 8 IP Multicast Groups Table VID Synopsis 0 to 65535 The VLAN Identifier of the VLAN upon which the multicast group operates IP Address Synopsis where ranges from 0 to 255 The multicast group IP address Joined Ports Synopsis Any combination of numbers valid for this parameter All ports that subscribed to the multicast group traffic Router Ports Synopsis Any combination of numbers valid for this parameter All ports that have been manually configured or dynamically discovered by observing router specific traffic as ports that
19. Port Synopsis 1 to maximum port number Default 1 The port number as seen on the front plate silkscreen of the switch Requested Buckets Synopsis 1 to 4000 Default 50 The maximum number of buckets requested for this RMON collection history group of statistics The range is 1 to 4000 The default is 50 Granted Buckets Synopsis 0 to 65535 The number of buckets granted for this RMON collection history This field is not editable Interval Synopsis 1 to 3600 Default 1800 The number of seconds in over which the data is sampled for each bucket The range is 1 to 3600 The default is 1800 Owner Synopsis Any 127 characters Default Monitor The owner of this record It is suggested to start this string with the word monitor 3 4 2 RMON History Samples History samples for a particular record in the RMON History Control Table are displayed by selecting a particular record and view option The index of the record will be included in the resulting menu title of the sample screen The table will present a series of samples The sample number starts with one and increases by one with each new log entry The oldest samples are deleted in favor of new samples when the allotted buckets are used The StartTime field provides the system time when the measurement interval started The remaining fields provide the counts for each statistic as measured in the sample period Statistics collection begins whenever the History Control record i
20. Port Redundancy 106 Ring Backbone Configurations 104 Statistics Bridge 117 Statistics Port 119 Structured Wiring Configurations 103 Troubleshooting 125 S SNMP Management 36 SQL Default Command 237 Info Command 236 Select Command 236 Update Command 237 Using Commands 235 From Clause 236 Where Clause 237 Syslog 47 T TACACS 44 Time Synchronization 32 Troubleshooting Multicast Filtering 195 V VLAN Configuration 135 Configuring Static VLANs 137 Displaying VLANs 140 Edge Type 129 GVRP 131 Ingress and Egress Rules 130 Management VLAN 129 Native 128 Operation 128 Port Parameters 138 PVLAN Edge 132 QinQ 133 Tagging 128 Troubleshooting 141 Trunk Type 129 W WLAN Client Bridge 144 165 166 Client IP Bridge 145 165 Configuration 146 DHCP 157 Diversity 163 Microsoft Windows 162 Operation 143 PSK Pre Shared Key 164 RADIUS 154 164 RSSI 164 Spanning Tree 166 Troubleshooting and F A Q 162 WDS 165 ROS v3 7 0 User Guide 259 RS900LWG RS930LW
21. RSIP Applications se e rea EE e e EEEE AEEA 103 5 3 1 RSTP in Structured Wiring Configurations ccccceeeeeeeeeeeeeeeeeeenneeeeee 103 5 3 2 RSTP in Ring Backbone Configurations s esessseesserrsssrrnrerernrrssrrreserrnene 104 ROS v3 7 0 User Guide 4 RS900LWG RS930LW Rugged Operating System 5 3 3 IAS IP Port Redundangy EE 106 5 4 Spanning Tree Configuration EEN 106 5 4 1 Bridge RSTP Parameters ugeet 108 5 4 2 Port RS UP NEE 110 5 4 3 MST Region Identifier secicesecsceezzsnncecereres rg ed neevesrpaeetechadieenneuiedentenetee 113 5 4 4 Bridge MSTI Parameters AAR 114 5 4 5 Port MSTI Parameters seceieseactapisatecteceicoredonidascndnilateeass interes etchant ate 115 5 5 Spanning Tree Statistics bss hake ct E edel 117 5 5 1 Bridge AS TP EE E 117 BD IPO sre le tal SCS EE 119 5 5 3 Bridge MSTI Statistics ENEE ZENNER SEENEN 121 5 5 4 Port ERR 123 5 6 Troubleshooting EE 125 SERVA EAN K A AE E are EE Ee 128 6 1 VLAN Operation oinn a e a A AE ERE A aa aE 128 EN MEANS and o KC EE 128 6 1 2 Tagged vs Untagged Me EE 128 EN fe 11DA E WEE 128 6 1 4 Management VAN g0eieebgdeiegteeEk ed 129 6 1 5 Edge and Trunk Port Types gege Eet SE deer ee 129 6 1 6 VLAN Ingress and Egress Rules ccecccceesseeeeececeeeeeeeeeeeeneeeeeeeeeeseseneees 130 6 1 7 Forbidden Ports EE 130 6 1 8 VLAN aware and VLAN unaware Operation Modes ssssssseeesssrrnreersreereee 130 6 1 9 GVRP GARP VLAN Reg
22. all MAC addresses learned on a failed port immediately upon link failure detection 11 3 Configuring Static MAC Address Table Static MAC addresses are usually configured when the user wishes to enforce port security if supported Static MAC addresses are also configured when a device can receive but cannot transmit frames Prioritized MAC addresses are configured when traffic to or from a specific device on a LAN segment is to be assigned a higher CoS priority than other devices on that LAN segment ROS v3 7 0 User Guide 200 RS900LWG RS930LW 11 MAC Address Tables Log out Static MAC Address Table Keen Back InsertRecord 00 0A DC 00 11 00 4 6 Crit 00 04 DC FE 00 80 1 Learn Normal Figure 11 4 Static MAC Address Table Static MAC Address Table MAC Address 00 00 00 00 00 00 VID H Port fi CoS Normal Crit Delete Reload Figure 11 5 Static MAC Address Form MAC Address Synopsis where ranges 0 to FF Default 00 00 00 00 00 00 A MAC address that is to be statically configured VID Synopsis 1 to 1000 Default 1 The VLAN Identifier of the VLAN upon which the MAC address operates Port Synopsis 1 to maximum port number or Learn Default Learn Enter the port number upon which the device with this address is located If the port should be auto learned set this parameter to Learn ROS v3 7 0 User Guide 201 RS90
23. such as a PC or IED and carries traffic on a single pre configured VLAN the native VLAN Trunk Type Trunk ports are part of the network and carry traffic for all VLANs between switches Trunk ports are automatically members of all VLANs configured in the switch The switch can pass through traffic forwarding frames received on one trunk port out another trunk port The trunk ports must be members of all the VLANs the pass through traffic is part of even if none of those VLANs are used on edge ports Frames transmitted out of the port on all VLANs other than the port s native VLAN are always sent tagged Note Sometimes it may be desirable to manually restrict the traffic on the trunk to a certain group of VLANs For example when the trunk connects to a device such as a Layer 3 router that supports a subset of the available VLANs The trunk port can be prevented from being a member of the VLAN by including it in the VLAN s Forbidden Ports list Port Type VLANs Supported PVID Format Usage VLAN Unaware networks All frames are Untagged sent and received without the need for VLAN Edge 1 Native Configured tags VLAN Aware networks VLAN traffic Tagged domains are enforced on a single VLAN Switch to Switch connections VLANs must be manually created and administered or can be dynamically learned through GVRP Trunk All Configured Tagged or Untagged Multiple VLAN end devices Implement con
24. 255 255 255 0 but other numbers can appear 1 6 IP Gateways These parameters provide the ability to configure gateways A maximum of 10 gateways can be configured When both the Destination and Subnet fields are both 0 0 0 0 displayed as blank space the gateway is a default gateway access admin Log out IP Gateways Back InsertRecord 49 46 8 0 99 N SG 255 255 0 0 11 22 33 44 Figure 1 10 IP Gateways Form Destination Synopsis where ranges from 0 to 255 Default 0 0 0 0 Specifies the IP address of the destination device An IP address is a 32 bit number that is notated by using four numbers from 0 through 255 separated by periods Subnet Synopsis where ranges from 0 to 255 ROS v3 7 0 User Guide 26 RS900LWG RS930LW 1 Administration Default 0 0 0 0 Specifies the IP subnet mask of the destination An IP subnet mask is a 32 bit number that is notated by using four numbers from 0 through 255 separated by periods Typically subnet mask numbers use either 0 or 255 as values e g 255 255 255 0 but other numbers can appear Gateway Synopsis where ranges from 0 to 255 Default 0 0 0 0 Specifies the gateway IP address The gateway address must be on the same IP subnet as this device Note The default gateway configuration will not be changed when resetting all configuration parameters to defaults 1
25. 5 4 1 Bridge RSTP Parameters Note Static VLANs must be used in an MSTP configuration GVRP is not supported in this case 5 3 RSTP Applications 5 3 1 RSTP in Structured Wiring Configurations RSTP allows you to construct structured wiring systems in which connectivity is maintained in the event of link failures For example a single link failure of any of links A through N in Figure 5 3 Example of a Structured Wiring Configuration would leave all the ports of bridges 555 through 888 connected to the network Figure 5 3 Example of a Structured Wiring Configuration ROS v3 7 0 User Guide 103 RS900LWG RS930LW 5 Spanning Tree Procedure 5 1 Design Considerations for RSTP in Structured Wiring Configurations 1 Select the design parameters for the network What are the requirements for robustness and network fail over recovery times Are there special requirements for diverse routing to a central host computer Are there any special port redundancy requirements Identify required legacy support Are STP bridges used in the network These bridges do not support rapid transitioning to forwarding If these bridges are present can they be re deployed closer to the network edge Identify edge ports and ports with half duplex shared media restrictions Ports that connect to host computers IEDs and controllers may be set to edge ports in order to guarantee rapid transitioning to forwarding as well as to
26. 7 IP Services These parameters provide the ability to configure properties for IP services provided by the device IP Services access admin Back Inactivity Timeout Disabled Telnet Sessions Allowed 4 Web Server Users Allowed 16 TFTP Server Enabled ModBus Address Disabled SSH Sessions Allowed 4 RSH Server Disabled Enabled Figure 1 11 IP Services Form Inactivity Timeout Synopsis 1 to 60 or Disabled Default 5 min ROS v3 7 0 User Guide 27 RS900LWG RS930LW 1 Administration Specifies when the console will timeout and display the login screen if there is no user activity A value of zero disables timeouts for console and Telnet users For Web Server users maximum timeout value is limited to 30 minutes Telnet Sessions Allowed Synopsis 0 to 4 Default 4 Limits the number of Telnet sessions A value of zero prevents any Telnet access Web Server Users Allowed Synopsis 1 to 16 Default 16 Limits the number of simultaneous web server users TFTP Server Synopsis Disabled Get Only Enabled Default Get Only As TFTP is a very insecure protocol this parameter allows the user to limit or disable TFTP Server access DISABLED disables read and write access to TFTP Server GET ONLY only allows reading of files via TFTP Server ENABLED allows reading and writing of files via TFTP Server ModBus Address Synopsis 1 to 254 or Disabled Default Disab
27. D FlowCtl of on C LFI of fe Alarm ot On fe Apply Reload Figure 2 4 Port Parameters Form Port Synopsis 1 to maximum port number Default 0 The port number as seen on the front plate silkscreen of the switch Name Synopsis Any 15 characters Default Not installed A descriptive name that may be used to identify the device connected to that port Media Synopsis 100TX 10FL 100FX 1000X 1000T The type of the port s media State Synopsis Disabled Enabled Default Enabled Disabling a port will prevent all frames from being sent and received on that port Also when disabled link integrity pulses are not sent so that the link activity LED will never be lit You may want to disable a port for troubleshooting or to secure it from unauthorized connections AutoN Synopsis Off On Default On ROS v3 7 0 User Guide 54 RS900LWG RS930LW 2 Ethernet Ports Enable or disable IEEE 802 3 auto negotiation Enabling auto negotiation results in speed and duplex mode being negotiated upon link detection both end devices must be auto negotiation compliant for the best possible results 10Mbps and 100Mbps fiber optic media do not support auto negotiation so these media must be explicitly configured to either half or full duplex mode Full duplex operation requires both ends to be configured as such or else severe frame loss will occur during heavy network traffic Speed Synopsis Auto 10M
28. Identifier for the AP This is a read only parameter ETHMAC The 48 bit Ethernet address assigned to the wired interface This is a read only parameter IP Address Synopsis where ranges from 0 to 255 Default 192 168 0 2 The IP address assigned to the wireless interface Subnet Mask Synopsis where ranges from 0 to 255 Default 255 255 255 0 The IP subnet mask assigned to the wireless interface Gateway Synopsis where ranges from 0 to 255 Default 192 168 0 1 The IP address of the wireless interface default gateway The gateway and IP address of wireless interface must be on the same IP subnet 7 2 2 Network Parameters The Network Parameters forms provide the ability to configure wireless LAN network attributes such as wireless mode SSID and RF channel AP Network Parameters access admin Network Parameters Wireless Mode auto Y Network Name SSID RuggedCom RF Channel 1 13 auto ze Suppress SSID Disable Enable O Figure 7 6 AP Network Parameter Form ROS v3 7 0 User Guide 148 RS900LWG RS930LW 7 Wireless LAN Client Bridge and Client IP Bridge Network Parameters access admin Network Parameters Wireless Mode auto v Primary Network SSID1 Secondary Network 1 SSID2 Secondary Network 2 SSID3 RuggedCom Figure 7 7 Client Bridge and Clien
29. Modern industrial controllers often feature backup Ethernet ports used in the event of a link failure When these interfaces are supported by media such as fiber that employ separate transmit and receive paths the interface can be vulnerable to failures that occur in only one of the two paths Refer to the following figure While the link between switch A and the controller functions normally the controller holds the backup link down Switch B learns that it must forward frames towards switch A in order to reach the controller Unfortunately if the transmission path from the controller to switch A fails switch A will still generate link signals to the controller The controller will still detect link to switch A and will not fail over to the backup port To Remainder of Network Switch A Switch B Figure 2 1 Controller Protection Through LFI ROS v3 7 0 User Guide 51 RS900LWG RS930LW 2 Ethernet Ports To overcome this problem there should be a way of notifying the link partner in case a link integrity signal stopped being received from it Such a way natively exists in some link media but not in others e Auto Negotiating links 100Base TX 1000Base T 1000Base X auto negotiation built in feature a special flag called Remote Fault Indication is set in the transmitted auto negotiation signal e 100Base FX links Far End Fault Indication FEFI is a standard feature defined by the IEEE 802 3 standard for this lin
30. Note that changing the time source may produce a step change in the time seen via any of the clock outputs 1 10 4 Time Sync Status This menu provides summary information on the status of the time synchronization subsystem Time Sync Status admin access LOCAL CLK Figure 1 18 Time Sync Status Menu Time Source Displays the currently selected time source Possible values are IRIGB NTP Server and LOCAL CLK local clock ROS v3 7 0 User Guide 35 RS900LWG RS930LW 1 Administration IRIGB Status Displays the status of the IRIG B clock source Note that this field is not displayed at all if IRIG B input hardware is not installed in the device 1 11 SNMP Management ROS supports Simple Network Management Protocol Version 3 SNMPv3 This protocol provides secure access to devices by a combination of authentication and encrypting packets over the network The security features provided are message integrity ensuring that a packet has not been tampered with in transit e authentication determining the message is from a valid source e encryption scrambling the contents of a packet to prevent it from being seen by an unauthorized source SNMPv3 provides security models and security levels A security model is an authentication strategy that is set up for a user and the group in which the user resides A security level is a permitted level of security within a security model A combination of
31. Once a configuration file has been successfully transferred to a ROS device irrespective of the transfer method the device will reset itself automatically Note that this behavior differs from that when upgrading firmware files where a reset command must be issued by the administrator Security Considerations The same limitations apply to writing config csv to the ROS device that apply to firmware images Refer to section Section 15 1 Upgrading Firmware for details on the permissions necessary to write the ROS configuration file 15 3 Backing Up ROS System Files All of the same file transfer mechanisms discussed in the preceding sections may also be used to transfer files from a ROS device as well as to update firmware or configuration files It might ROS v3 7 0 User Guide 234 RS900LWG RS930LW 15 Firmware Upgrade and Configuration Management be desirable in addition to creating an archive of the device s firmware files to back up the configuration database config csv or system log file syslog txt on a regular basis Type dir at the ROS CLI for a listing and description of files on the ROS device An example of backing up a file using SFTP follows For descriptions on the use of the other file transfer mechanisms please refer to the examples in Section 15 1 Upgrading Firmware Note that only the direction of file transfer changes 15 3 1 Backing Up Files Using SFTP This method requires th
32. Ports oP ON e NOD Pick a particular port for which calibration is needed Connect an Ethernet cable with a known length e g 50m to the port Do not connect the other end of the cable to any link partner Run cable diagnostics a few times on the port OPEN fault should be detected Find the average distance to the OPEN fault recorded in the log and compare it to the known length of the cable The difference can be used as the calibration value Enter the calibration value and run cable diagnostics a few more times The distance to the OPEN fault should now be at a similar distance to the actual cable length The distance to the fault for the selected port is now calibrated 2 2 5 Link Detection Options Link Detection access admin Fast Link Detection On_withPortGuard DI Apply Reload Figure 2 10 Link Detection Form Fast Link Detection Synopsis Off On On_withPortGuard Default On_withPortGuard This parameter provides system protection against a faulty end device generating an improper link integrity signal When a faulty end device or a mismatched fiber port is connected to the unit a large number of continuous link state changes can be reported in a short period of time This high rate of link state changes can render the system unresponsive Three different settings are available for this parameter e ON_withPortGuard This is the recommended setting With this setting an extended period gt two
33. RS930LW 7 Wireless LAN 7 3 7 4 Wireless becomes unresponsive after modifying wireless parameters It is necessary to restart the WLAN interface after modifying wireless parameters Most WLAN parameters only require a Quick Reset to take effect and it is also acceptable for the user to issue a single WLAN reset command even after several i e multiple WLAN parameters may have been changed The following options are supported Full Reset Apply reset to both the RF and Ethernet interfaces of WLAN duration is approx 70 seconds Quick Reset Apply reset only to the RF interface of WLAN duration is approx 11 seconds 7 3 8 WLAN Firmware feature dependencies The following table shows the dependencies between ROS and WLAN firmware revisions and new features introduced during relevant releases ROS Version WLAN Version WLAN Feature Introduced ROS 3 4 WLAN 1 5 AP Client Bridge ROS 3 5 WLAN 1 6 Client IP Bridge DHCP Server Note The table provides a reference to illustrate the correspondence between ROS firmware versions WLAN firmware versions and the introduction of specific WLAN operating feature modes The ROS and WLAN firmware revisions are accessible though the User Interface ROS v3 7 0 User Guide 167 RS900LWG RS930LW 8 Port Security 8 Port Security ROS Port Security provides you with the following features e Authorizing network access
34. RSTP protocol for this port per the configuration in the STP Configuration menu STP may be disabled for the port ONLY if the port does not attach to an STP enabled bridge in any way Failure to meet this requirement WILL result in an undetectable traffic loop in the network A better alternative to disabling the port is to leave STP enabled but to configure the port as an edge port A good candidate for disabling STP would be a port that services only a single host computer Priority Synopsis 0 16 32 48 64 80 96 112 128 144 160 176 194 208 224 240 Default 128 Selects the STP port priority Ports of the same cost that attach to a common LAN will select the port to be used based upon the port priority STP Cost Synopsis 0 to 65535 or Auto ROS v3 7 0 User Guide 111 RS900LWG RS930LW 5 Spanning Tree Default Auto Selects the cost to use in cost calculations when the Cost Style parameter is set to STP in the Bridge RSTP Parameters configuration Setting the cost manually provides the ability to preferentially select specific ports to carry traffic over others Leave this field set to auto to use the standard STP port costs as negotiated 4 for 1Gbps 19 for 100 Mbps links and 100 for 10 Mbps links For MSTP this parameter applies to both external and internal path cost RSTP Cost Synopsis 0 to 2147483647 or Auto Default Auto Selects the cost to use in cost calculations when the Cost Sty
35. a security model and security level will determine which security mechanism is employed when handling an SNMP packet Note the following about SNMPv3 protocol e each user belongs to a group a group defines the access policy for a set of users e an access policy defines what SNMP objects can be accessed for reading writing and creating notifications a group determines the list of notifications its users can receive a group also defines the security model and security level for its users 1 11 1 SNMP Users These parameters provide the ability to configure users for the local SNMPv3 engine Note that if the security level employed is SNMPv1 or SNMPv2 User Name represents a community name for authentication or sending traps Up to 32 entries can be configured SNMP Users access admin Log out Back InsertRecord Read noAuth noPriv Trap __192 168 0 20 HMACMD5 CC DES traps _mytraps manager 192 168 0 20 HMACMD5 CBC DES manager mymanager ublic 192 168 0 20 noAuth noPriv Figure 1 19 SNMP User Table ROS v3 7 0 User Guide 36 RS900LWG RS930LW 1 Administration access admin SNMP Users Name manager IP Address Auth Protocol noAuth HMACMDS Priv Protocol noPriv Q CBC DES Auth Key manager Priv Key mymanager Figure 1 20 SNMP User Form Name Synopsis Any 32 characters Default initial The name of the
36. across both local devices connected to the switched ports and the IEEE 802 11 BSS domains 7 1 2 RuggedWireless Client IP Bridge operation The RuggedWireless Client Bridge operating mode is designed to operate with a complementary RuggedWireless AP configuration There is no guarantee otherwise of interoperability between the Client Bridge and a third party AP It is assumed that a RuggedWireless Client Bridge will be partnered with a RuggedWireless AP device capable of supporting the WDS extensions needed by the Client Bridge The reason is that there is no single standard approach to handling Layer 2 bridging over an IEEE 802 11 wireless network As an alternative to the RuggedWireless Client Bridge mode of operation RuggedCom has introduced a RuggedWireless Client IP Bridge mode The Client IP Bridge mode uses native IEEE 802 11 standards without any proprietary extensions so that a RuggedCom IEEE 802 11 client can interoperate with any vendor s IEEE 802 11 compliant AP This Client IP Bridge mode utilizes bi directional layer 2 NAT to allow traffic flow between the Client IP Bridge Distribution System and the AP Distribution system This enables wired devices located behind both the STA and the AP to exchange IP traffic The RuggedWireless Client IP Bridge includes the integration of the following components e 802 11 infrastructure mode STA e Bi directional Layer 2 NAT ROS v3 7 0 User Guide 145 R
37. aeaa aa aa Sien eek 119 5 16 Port RS E ENT FON EE 119 5 17 Bridge MSTI Statistics NEE 121 5 18 Port MSTI Statistics EE 123 5 19 Port MS Th Statistics FON EE 123 Eh USING eege degen EE 132 6 2 Using QiNQ Example iiai eegee ia eui octet deseneteresht as EENET EEA EA EAE NEES 133 6 3 Multiple Overlapping VLANS EEN 134 6 4 Inter VLAN Communications 2 cisstei sched Dated eovsdeanssatvvactiadersgteeadcamasastust thate ru Teteuteicanctas 135 6 5 Virtual LANS Men sis stecekdevnesiveiee Zeen na e e veel as Pecan a a e n 136 6 6 Global VLAN Parameters Enn opereiert ENEE 136 ROS v3 7 0 User Guide 10 RS900LWG RS930LW Rugged Operating System Olt Static VLANS EE 137 685 SlallG VLANS ROM EE 137 6 9 Port VLAN Parameters Table icc tecsecsicpauivanioeacteeds ait EES agers adi ERAN 138 6 10 Port VLAN Parameters Eet setiotee is accsdeavucep tess dE SE eege 139 6 11 VLAN Summary Table isie eae cee detceachersteuaeignenrd den ea eE OS a KEE ERREEN 141 7 1 Typical IEEE 802 11 Infrastructure Basic Service Set component dagram 144 7 2 RuggedWireless Client Bridge Infrastructure Basic Service Set extensions diagrami EE 145 7 3 RuggedWireless Client IP Bridge Infrastructure Basic Service Set diagram 146 7 4 Wireless LAN EE 146 7 5 Addressing Parameters Form 5 c005 oxehes Ree EueedeeEEAEEEASENEeCeEEEE 147 7 6 AP Network Parameter Ern eene gege beet eer 148 7 7 Client Bridge and Client IP Bridge Ne
38. are available at the command line of ROS based RuggedSwitch and RuggedServer devices alarms Displays list of available alarms Usage alarms all all display all alarm instances default empty display one instance of each alarm type clearalarms Clears all alarms clearethstats Clears Ethernet statistics for one or more port s clearethstats ports all ports comma separated port numbers e g 1 3 5 7 all all ports clearlogs Clears the system and crash logs cls Clears the screen delay Pause a specified number of milliseconds dir Prints file directory listing echo Echoes the specified message to the screen exit Terminate this command line session help help command name command name Name of command for which to get help If no command is specified a list of all available commands is displayed along with a brief description of each one ipconfig Displays IP configuration login Login to the shell i e set the access level logout Logout of the shell ping Usage ping dest count timeout dest Target IP address count Number of echo requests to send default is 4 timeout Timeout in milliseconds to wait for each reply range is 2 5000 default is 300 milliseconds reset Perform a hard reset of the switch resetport Reset one or more Ethernet ports which may be useful for forcing re negotiation of speed and duplex or in situations where the lin
39. attempt was made to find a route to forward them to that final destination In entities which do not act as IP routers this counter will include only those packets which were Source Routed via this entity and the Source route option processing was successful ipInUnknownProtos The number of locally addressed datagrams received successfully but discarded because of an unknown or unsupported protocol ipInDiscards The number of input IP datagrams for which no problems were encountered to prevent their continued processing but which were discarded e g for lack of buffer space Note that this counter does not include any datagrams discarded while awaiting reassembly ipInDelivers ipOutRequests The total number of input datagrams successfully delivered to IP user protocols including ICMP The total number of IP datagrams which local IP user protocols including ICMP supplied to IP in requests for transmission Note that this counter does not include any datagrams counted in ipForwDatagrams ipOutDiscards The number of output IP datagrams for which no problem was encountered to prevent their transmission to their destination but which were discarded e g for lack of buffer space Note that this counter would include datagrams counted in ipForwDatagrams if any such packets met this discretionary discard criterion ipFragOKs The number of IP datagrams that have been successfully fragmented at this ent
40. crosses a threshold In this case set the measurement period type to absolute 1 Alarms Log out RMON Alarms Back InsertRecord ifOutOctets 2 11800 11790 Figure 3 11 RMON Alarms Table ROS v3 7 0 User Guide 82 RS900LWG RS930LW 3 Ethernet Statistics Log out RMON Alarms 1 Alarms Index 1 Variable lifOutOctets 2 Rising Thr 11800 Falling ARE Thr 11790 Value 390 Type absolute delta Interval 5 Startup Alarm Rising Event Falling Ke Event Owner Monitor CHE Figure 3 12 RMON Alarms Form Index Synopsis 1 to 65535 Default 2 The index of this RMON Alarm record Variable Synopsis SNMP Object Identifier up to 39 characters Default ifOutOctets 2 The SNMP object identifier OID of the particular variable to be sampled Only variables that resolve to an ASN 1 primitive type INTEGER INTEGER Integer32 Counter32 Counter64 Gauge or TimeTicks may be sampled A list of objects can be printed using shell command mon The OID format objectName index1 index2 where index format depends on index object type Rising Thr Synopsis 0 to 2147483647 Default 11800 ROS v3 7 0 User Guide 83 RS900LWG RS930LW 3 Ethernet Statistics A threshold for the sampled variable When the current sampled variable value is greater than or equal to this threshold and the value at the last sampling interval was less than
41. datagrams rcDeviceStsTemperature ipInReceives The temperature measured in the device The total number of input datagrams received from interfaces including those received in error ipInHdrErrors The number of input datagrams discarded due to errors in their IP headers including bad checksums version number mismatch other format errors time to live exceeded errors discovered in processing their IP options etc ROS v3 7 0 User Guide 242 RS900LWG RS930LW Appendix C List of Objects Eligible for RMON Alarms ipInAddrErrors The number of input datagrams discarded because the IP address in their header s destination field was not a valid address to be received at this entity This count includes invalid addresses and addresses of unsupported Classes For entities which are not IP routers and therefore do not forward datagrams this counter includes datagrams discarded because the destination address was not a local address ipOutNoRoutes ipForwDatagrams The number of IP datagrams discarded because no route could be found to transmit them to their destination Note that this counter includes any packets counted in ipForwDatagrams which meet this no route criterion Note that this includes any datagrams which a host cannot route because all of its default routers are down The number of input datagrams for which this entity was not their final IP destination as a result of which an
42. generic PPP authentication protocol and supports various authentication methods 802 1X defines a protocol for communication between the Supplicant and the Authenticator EAP over LAN EAPOL RuggedSwitch communicates with the Authentication Server using EAP over RADIUS Supplicant Authenticator Authentication Server EAPOL Start EAP Request Identity EAP Response Identity RADIUS Access Request EAP Request RADIUS Access Challenge EAP Response credentials RADIUS Access Request EAP Success RADIUS Access Accept Figure 8 2 802 1X Packet Exchange Note The switch supports authentication of one host per port Note If the host s MAC address is configured in the Static MAC Address Table it will be authorized even if the host authentication is rejected by the authentication server ROS v3 7 0 User Guide 169 RS900LWG RS930LW 8 Port Security 8 2 Port Security Configuration The Port Security menu is accessible from the main menu S access Log out g Main Menu admin e Administration e Ethernet Ports e Ethernet Statistics e Spanning Tree e Virtual LANs e Port e Configure Port Security e Configure 802 1 Parameters e Classes of Service e Multicast Filtering e MAC Address Tables Diagnostics Figure 8 3 Port Security Menu 8 2 1 Port Security Parameters Port Security access admin AN None Dont shutdown Unsecur
43. have its cost limited to a maximum of 65535 Desig Bridge ID Synopsis where is 0 to 65535 is 0 to FF ROS v3 7 0 User Guide 124 RS900LWG RS930LW 5 Spanning Tree Provided on the root ports of designated bridges the Bridge Identifier of the bridge this port is connected to 5 6 Troubleshooting Problem One When I connect a new port the network locks up The port status LEDs are flashing madly Occasionally the network seems to experience a lot of flooding All the ports seem to experience significant traffic The problem lasts a few seconds and then goes away One of my switches displays a strange behavior where the root port hops back and forth between two switch ports and never settles down Is it possible that one of the switches in the network or one of the ports on a switch in the network has STP disabled and accidentally connects to another switch If this has occurred then a traffic loop has been formed If the problem appears to be transient in nature it is possible that ports that are part of the spanning tree have been configured as edge ports After the link layers have come up on edge ports STP will directly transition them perhaps improperly to the forwarding state If an RSTP configuration message is then received the port will be returned to blocking A traffic loop may be formed for the length of time the port was in forwarding If one of the switches appears to fli
44. highly recommended to disable the spanning tree protocol on the WLAN port otherwise the WLAN interface might not perform as expected under certain conditions Please see the Spanning Tree section of the ROS User Guide for details 7 3 7 Configuration changes 7 3 7 1 Unable to change the WLAN Operational Mode parameter For ROS use in general it is entirely acceptable to modify several fields i e parameters on a page and then update the entire page configuration with a single Apply command The Operational Mode parameter is an exception to this rule Make sure to Apply any change to the Operational Mode as a separate step apart from any other parameter changes This is because there are many underlying dependencies between the Operational Mode of the RuggedWireless operation and other related parameters 7 3 7 2 Unable to wirelessly ping ANY devices located on the wired side of the Client Bridge The WDS parameter must be enabled on the Access Point AP device to support RuggedWireless station s configured for Client Bridging functionality 7 3 7 3 Unable to apply ANY wireless parameter changes It is important to make sure that the current WLAN status is indicating the Running state before attempting to modify any WLAN parameter For example no WLAN parameter will be correctly updated while the current WLAN status indicates the Booting state ROS v3 7 0 User Guide 166 RS900LWG
45. i e either being added to or removed from the port trunk 2 Configure the port trunk on both switches 3 Double check the port trunk configuration on both switches 4 Reconnect or re enable the ports If the port trunk is being configured while the ports are not disconnected or disabled the port will be disabled for a few seconds automatically Note The IEEE 802 3ad Link Aggregation standard requires all physical links in the port trunk to run at the same speed and in full duplex mode If this requirement is violated the performance of the port trunk will drop The switch will raise an appropriate alarm if such a speed duplex mismatch is detected Note RSTP dynamically calculates the path cost of the port trunk based on its aggregated bandwidth However if the aggregated ports are running at different speeds the path cost may not be calculated correctly Note Enabling RSTP is the best way for handling link redundancy in switch to switch connections composed of more than one physical link If RSTP is enabled and increased bandwidth is not required Link Aggregation should not be used because it may lead to a longer fail over time ROS v3 7 0 User Guide 91 RS900LWG RS930LW 4 Link Aggregation 4 2 Link Aggregation Configuration The Link Aggregation menu is accessible from the main menu Main Menu Administration Ethernet Ports Ethernet Statistics Link Aggregation a
46. in the added extra tag is the PVID of the frame s ingress port VLAN tag is always stripped from frames ingressing this port PVID Synopsis 1 to 4094 Default 1 The Port VLAN Identifier specifies the VLAN ID associated with untagged and 802 1p priority tagged frames received on this port Frames tagged with a non zero VLAN ID will always be associated with the VLAN ID retrieved from the frame tag ROS v3 7 0 User Guide 139 RS900LWG RS930LW 6 VLANs Modify this parameter with care By default the switch is programmed to use VLAN 1 for management and every port on the switch is programmed to use VLAN 1 If you modify a switch port to use a VLAN other than the management VLAN devices on that port will not be able to manage the switch PVID Format Synopsis Untagged Tagged Default Untagged Specifies whether frames transmitted out of the port on its native VLAN specified by the PVID parameter will be tagged or untagged GVRP Synopsis Adv amp Learn Adv Only Disabled Default Disabled Configures GVRP Generic VLAN Registration Protocol operation on the port There are several GVRP operation modes DISABLED the port is not capable of any GVRP processing ADVERTISE ONLY the port will declare all VLANs existing in the switch configured or learned but will not learn any VLANs ADVERTISE amp LEARN the port will declare all VLANs existing in the switch configured or learned and can
47. is no need to propagate the exact VLAN to instance mapping in the BPDUs because switches only need to know whether they are in the same region as a neighbor Therefore only this 16 octet digest created from the VLAN to instance mapping is sent in BPDUs 5 4 4 Bridge MSTI Parameters Log out Bridge MSTI Parameters Noa Back Instance ID 1 GET Bridge Priority 32768 ze Figure 5 11 Bridge MSTI Parameters Instance ID Synopsis 0 to 16 Default 1 The Instance ID refers to the MSTI Multiple Spanning Tree Instance ID Specify an Instance ID and select GET in order to load the parameters of the page corresponding to the selected MSTI Changes to parameters that are subsequently applied will apply to the selected Instance ID Note Bridge Parameters for the IST MSTI zero are accessible via the Bridge RSTP Parameters menu see section Section 5 4 1 Bridge RSTP Parameters Bridge Priority Synopsis 0 4096 8192 12288 16384 20480 24576 28672 32768 36864 40960 45056 49152 53248 57344 61440 Default 32768 Bridge Priority provides a way to control the topology of the STP connected network The desired Root and Designated bridges can be configured for a particular topology The bridge with the lowest priority will become root In the event of a failure of the root bridge the bridge with the next lowest priority will then become root Designated bridges that for redundancy purposes service a common
48. link to multicast routers MAC Address Synopsis where ranges 0 to FF The multicast MAC address corresponding to the group multicast IP address ROS v3 7 0 User Guide 193 RS900LWG RS930LW 10 Multicast Filtering 10 3 4 Configuring GMRP Log out Port GMRP Parameters admin Back Port s GMRP al Adv amp Learn LS Adv amp Learn E Adv amp Learn H Disabled 5 Disabled 6 Disabled Fi Disabled Figure 10 9 GMRP Port Summary access Log out Port GMRP Parameters Admin Back Port s D GMRP Adv amp Learn 7 Apply Reload Figure 10 10 Port GMRP Parameters Port s Synopsis Any combination of numbers valid for this parameter The port number as seen on the front plate silkscreen of the switch or a list of ports if aggregated in a port trunk GMRP Synopsis Disabled Adv Only Adv Learn Default Disabled ROS v3 7 0 User Guide 194 RS900LWG RS930LW 10 Multicast Filtering Configures GMRP GARP Multicast Registration Protocol operation on the port There are three GMRP modes of operation DISABLED the port is not capable of any GMRP processing ADVERTISE ONLY the port will declare all MCAST addresses existing in the switch configured or learned but will not learn any MCAST addresses ADVERTISE amp LEARN the port will declare all MCAST Addresses existing in the switch configured or learned and can dynamically learn MC
49. lower CoS frames are to be transmitted only after all higher CoS frames have been serviced 9 2 CoS Configuration The Classes Of Service menu is accessible from the main menu ROS v3 7 0 User Guide 175 RS900LWG RS930LW 9 Classes of Service Main Menu e Administration e Ethernet Ports e Ethernet Statistics e Spanning Tree e Virtual LANs e Classes of Service e Configure Global CoS Parameters e Configure Port CoS Parameters e Configure Priority to CoS Mappin e Configure DSCP to CoS Mappin e Multicast Filtering e MAC Address Tables Diagnostics Figure 9 2 Classes Of Service Menu 9 2 1 Global CoS Parameters Log out Global CoS Parameters access KEE admin Back CoS Weighting 84 2 1 Strict Apply Reload Figure 9 3 Global CoS Parameters Form CoS Weighting Synopsis 8 4 2 1 Strict Default 8 4 2 1 During traffic bursts frames queued in the switch pending transmission on a port may have different CoS priorities This parameter specifies weighting algorithm for transmitting different priority CoS frames Examples 8 4 2 1 8 Critical 4 High 2 Medium and 1 Normal priority CoS frame ROS v3 7 0 User Guide 176 RS900LWG RS930LW 9 Classes of Service Strict lower priority CoS frames will be only transmitted after all higher priority CoS frames have been transmitted 9 2 2 Port CoS Parameters access Log out Port CoS Parameters sania
50. minutes of excessive link state changes reported by a port will prompt the Port Guard feature to disable Fast Link Detection on that port permanently and to raise an alarm By disabling Fast Link Detection on the port excessive link state changes can no longer consume a substantial amount of system resources Note however that if Fast Link Detection is disabled the port will need a longer time to detect a link failure If the port is part of a spanning tree this could result in a longer network recovery time of up to two seconds Once Port Guard has disabled Fast Link Detection on a particular port the user can re enable it by clearing the alarm e ON In certain special cases where prolonged frequent link state change constitutes legitimate link operation using this setting prevents the system from disabling Fast Link ROS v3 7 0 User Guide 63 RS900LWG RS930LW 2 Ethernet Ports Detection on the port in question If excessive link state changes persist for more than two minutes on a particular port an alarm will be generated to warn about the observed bouncing link If the condition of excessive link state changes is resolved later on the alarm will be cleared automatically Since this option does not disable Fast Link Detection a persistent bouncing link could affect the response time of the system This setting should be used with caution e OFF Turning this parameter OFF will disable Fast Link Detection completely The sw
51. name which is used to define an access control policy Up to 32 entries can be configured Log out SNMP Security to Group Maps Se Back InsertRecord Conte CT mee Ten snmp 2c public v2notifs snmpVv3 Read read3 snmpVv3 Trap traps3 snmpv3 manager v3 Figure 1 21 SNMP Security to Group Maps Table SNMP Security to Group Maps access admin SecurityModel snmpV2c D Name public Group v2notits Delete Reload Figure 1 22 SNMP Security to Group Maps Form ROS v3 7 0 User Guide 38 RS900LWG RS930LW 1 Administration SecurityModel Synopsis snmpVl snmpV2c snmpV3 Default snmpV3 The Security Model that provides the name referenced in this table Name Synopsis Any 32 characters Default The user name which is mapped by this entry to the specified group name Group Synopsis Any 32 characters Default The group name to which the security model and name belong This name is used as an index to the SNMPv3 VACM Access Table 1 11 3 SNMP Access These parameters provide the ability to configure access rights for groups To determine whether access is allowed one entry from this table needs to be selected and the proper view name from that entry must be used for access control checking View names are predefined e noView access is not allowed e V1Mib SNMPv3 MIBs excluded e allOfMibs all supported MIBs are included access Log out SNM
52. network configuration and other identifying information e Respond to a basic set of control commands e Perform basic device configuration LLDP Operation The IEEE standard 802 1AB Link Layer Discovery Protocol LLDP describes a protocol that can simplify the troubleshooting of complex networks and can be used by Network Management Systems NMS to obtain and monitor detailed information about a network s topology LLDP data are made available via SNMP through support of LLDP MIB LLDP is aneighbor discovery protocol It defines a standard method for Ethernet network devices such as switches and routers to advertise information about themselves to other nodes on the network and to store the information they discover Details such as device configuration device capabilities and device identification can be advertised using this protocol LLDP agent operation is typically implemented as two modules the LLDP transmit module and LLDP receive module The LLDP transmit module when enabled sends the local device s information at regular intervals in 802 1AB standard format Whenever the transmit module is disabled it transmits an LLDPDU LLDP data unit with a time to live TTL TLV containing 0 in the information field This enables remote devices to remove the information associated with the local device in their databases The LLDP receive module when enabled receives remote devices information and updates its LLDP database of remote
53. occurs Each entry may also specify that a notification should occur by way of SNMP trap messages In this case the user for the trap message is given as parameter Community Two traps are defined risingAlarm and fallingAlarm RMON Events 1 Alarms Log out Back InsertRecord 1 logAndTrap public 0 days 00 10 41 Monitoring outgo on port 2 Figure 3 13 RMON Events Table ROS v3 7 0 User Guide 85 RS900LWG RS930LW 3 Ethernet Statistics RMON Events 1 Alarms Back Index 1 Type logAndTrap Community public Last Time Sent Description Monitoring outgoing trafic on port 2 0 days 00 06 06 Owner Monitor Figure 3 14 RMON Events Form Index Synopsis 1 to 65535 Default 2 The index of this RMON Event record Type Synopsis none log snmpTrap logAndTrap Default logAndTrap The type of notification that the probe will make about this event In the case of log an entry is made in the RMON Log table for each event In the case of snmp_trap an SNMP trap is sent to one or more management stations Community Synopsis Any 31 characters Default public If the SNMP trap is to be sent it will be sent to the SNMP community specified by this string Last Time Sent Synopsis DDDD days HH MM SS The time from last reboot at the time this event entry last generated an event If this entry has not generated any events this value will be 0 Description S
54. of its segments in order to determine whether at least one consumer still subscribes to a given stream If it receives no responses within a given timeout period usually two query intervals the router will prune the multicast stream from the given segment A more usual method of pruning occurs when consumers wishing to unsubscribe issue an IGMP leave group message The router will immediately issue a group specific membership query to determine whether there are any remaining subscribers of that group on the segment After the last consumer of a group has un subscribed the router will prune the multicast stream from the given segment 10 1 2 Switch IGMP Operation The IGMP Snooping feature provides a means for switches to snoop i e watch the operation of routers respond with joins leaves on the behalf of consumer ports and to prune multicast streams accordingly There are two modes of IGMP that the switch can be configured to assume active and passive ROS v3 7 0 User Guide 183 RS900LWG RS930LW 10 Multicast Filtering Active Mode ROS IGMP supports routerless mode of operation When such a switch is used without a multicast router it is able to function as if it is a multicast router sending IGMP general queries Passive Mode When such a switch is used in a network with a multicast router it can be configured to run Passive IGMP This mode prevents the switch from sending the queries that can confuse t
55. parameter For example no WLAN parameter will be correctly updated while the current WLAN status indicates the Booting state Client Status Synopsis Not Associated Associated Auth is in progress Provides status information related to the client for example whether it is associated with an access point WLAN Up Time Synopsis Any 32 characters ROS v3 7 0 User Guide 161 RS900LWG RS930LW 7 Wireless LAN Provides information about WLAN up time WLAN Version Synopsis Any 48 characters Provides information about WLAN firmware version Associated Station Synopsis 0 to 64 Provides information about the number of connected station s RF Transmitter Synopsis Disable Enable This parameter allow user to enable disable RF transmitter TFTP Server Address Synopsis where ranges from 0 to 255 The IP address of the TFTP server where new WLAN firmware is located Please note that the WLAN interface and the TFTP server must be on the same IP subnet Software Upgrade Synopsis Start Starts the WLAN software upgrade procedure Please note that WLAN software upgrade will take approximately 15 minutes to complete WLAN Reset Synopsis Full reset Quick reset Provides software controlled interface reset functionality The WLAN interface must be restarted to activate any newly saved WLAN parameter s The result of the lt WLAN reset gt command is to restart the wireless
56. reduce the number of topology change notifications in the network Ports with half duplex shared media restrictions require special attention in order to guarantee that they do not cause extended fail over recovery times Choose the root bridge and backup root bridge carefully The root bridge should be selected to be at the concentration point of network traffic Locate the backup root bridge adjacent to the root bridge One strategy that may be used is to tune the bridge priority to establish the root bridge and then tune each bridge s priority to correspond to its distance from the root bridge Identify desired steady state topology Identify the desired steady state topology taking into account link speeds offered traffic and QOS Examine of the effects of breaking selected links taking into account network loading and the quality of alternate links Decide upon port cost calculation strategy Select whether fixed or auto negotiated costs should be used Select whether the STP or RSTP cost style should be used Calculate and configure priorities and costs Implement the network and test under load 5 3 2 RSTP in Ring Backbone Configurations RSTP may be used in ring backbone configurations where rapid recovery from link failure is required In normal operation RSTP will block traffic on one of the links for example as indicated by the double bars through link H in Figure 5 4 Example of a Ring Backbone Configuration In
57. routerless mode and issue general membership queries as if it is the router Processing Joins If host C1 desires to subscribe to the multicast streams for both P1 and P2 it will generate two joins The join from C1 on VLAN 2 will cause the switch to immediately initiate its own join to multicast router 1 and to issue its own join as a response to queries The join from C1 for VLAN 3 will cause the switch to immediately begin forwarding multicast traffic from P2 to C2 Processing Leaves When host C1 decides to leave a multicast group it will issue a leave request to the switch The switch will poll the port to determine if C1 is the last member of the group on that port If C1 is the last or only member the group will immediately be pruned from the port Should host C1 leave the multicast group without issuing a leave group message and then fail to respond to a general membership query the switch will stop forwarding traffic after two queries When the last port in a multicast group leaves the group or is aged out the switch will issue an IGMP leave report to the router 10 2 GMRP GARP Multicast Registration Protocol The GARP Multicast Registration Protocol GMRP is an application of the Generic Attribute Registration Protocol GARP that provides a mechanism at Layer 2 for managing multicast group membership in a bridged Layer 2 network It allows Ethernet switches and end stations to register and unregister membership i
58. silkscreen of the switch txPeriod Synopsis 1 to 65535 Default 30 s The time to wait for the Supplicant s EAP Response Identity packet before retransmitting an EAP Request Identity packet quietPeriod Synopsis 0 to 65535 Default 60 s The period of time not to attempt to acquire a Supplicant after the authorization session failed reAuthEnabled Synopsis No Yes Default No Enables or disables periodic re authentication reAuthPeriod Synopsis 60 to 86400 Default 3600 s The time between periodic re authentication of the Supplicant reAuthMax Synopsis 1 to 10 Default 2 The number of re authentication attempts that are permitted before the port becomes unauthorized suppTimeout Synopsis 1 to 300 Default 30 s The time to wait for the Supplicant s response to the authentication server s EAP packet serverTimeout Synopsis 1 to 300 Default 30 s The time to wait for the authentication server s response to the Supplicant s EAP packet maxReq Synopsis 1 to 10 Default 2 The maximum number of times to retransmit the authentication server s EAP Request packet to the Supplicant before the authentication session times out ROS v3 7 0 User Guide 173 RS900LWG RS930LW 9 Classes of Service 9 Classes of Service ROS CoS provides the following features e Support for 4 Classes of Service e Ability to prioritize traffic by ingress port e Ability to prioritize traffic by the priority field in 802 1Q
59. such that its first instance occurs only for rising falling or all threshold excessions The ability to configure upper and lower thresholds on the value of a measured statistic provides for the ability to add hysteresis to the alarm generation process If the value of the measured statistic over time is compared to a single threshold alarms will be generated each time the statistic crosses the threshold If the statistic s value fluctuates around the threshold an alarm can be generated every measurement period Programming different upper and lower thresholds eliminates spurious alarms The statistic value must travel between the thresholds before alarms can be generated The following figure illustrates the very different patterns of alarm generation resulting from a statistic sample and the same sample with hysteresis applied ROS v3 7 0 User Guide 81 RS900LWG RS930LW 3 Ethernet Statistics Time Alarms 4 t s 8 Kai 1 Figure 3 10 The Alarm Process There are two methods to evaluate a statistic in order to determine when to generate an event these are the delta and absolute methods For most statistics such as line errors it is appropriate to alarm when a rate is exceeded The alarm record defaults to the delta measurement method which examines changes in a statistic at the end of each measurement period It may be desirable to alarm when the total or absolute number of events
60. systems When new or updated information is received the receive module initiates a timer for the valid duration indicated by the TTL TLV in the received LLDPDU A remote system s information is removed from the database when an LLDPDU is received from it with TTL TLV containing 0 in its information field ROS v3 7 0 User Guide 203 RS900LWG RS930LW 12 Network Discovery Note LLDP is implemented to keep a record of only one device per Ethernet port Therefore if there are multiple devices sending LLDP information to a switch port on which LLDP is enabled information about the neighbor on that port will change constantly 12 2 RCDP Operation The purpose of the RuggedCom Discovery Protocol is to support the deployment of ROS based devices that have not been configured since leaving the factory Unconfigured ROS devices all have the default IP Layer 3 address Connecting more than one of them on a Layer 2 network means that one cannot use standard IP based configuration tools to configure them The behavior of IP based mechanisms such as the web interface SSH telnet or SNMP will all be undefined Since RCDP operates at Layer 2 it can be used to reliably and unambiguously address multiple devices even though they may share the same IP configuration RuggedCom s RuggedExplorer is a lightweight standalone Windows application that supports RCDP It is capable of discovering identifying and performing basic configu
61. tags e Ability to prioritize traffic based on its source or destination MAC address e Ability to prioritize traffic by the TOS field in the IP header 9 1 CoS Operation 9 1 1 CoS provides the ability to expedite the transmission of certain frames and port traffic over others The CoS of a frame can take on one of four values Normal Medium High or Critical The default policies of the switch enforce a Normal CoS for all traffic Note Use the highest supported CoS with caution as it is always used by the switch for handling network management traffic such as RSTP BPDUs If this CoS is used for regular network traffic upon traffic bursts it may result in loss of some network management frames which in its turn may result in loss of connectivity over the network The CoS feature has two main phases inspection and forwarding Inspection Phase In the inspection phase the CoS priority of a received frame is determined from e The priority field in 802 1Q tags e The Differentiated Services Code Point DSCP component of the Type Of Service TOS field if the frame is IP e The default CoS for the port e A specific CoS based upon the source and destination MAC address as set in the Static MAC Address Table Note that a frame s CoS will be determined once the first examined parameter is found in the frame Received frames are first examined to determine if their destination or source MAC address is found in th
62. the root bridge the bridge with the next lowest priority will then become the root Designated bridges that for redundancy purposes service a common LAN also use priority to determine which bridge is active In this way careful selection of Bridge Priorities can establish the path of traffic flows in normal and abnormal conditions Hello Time Synopsis 1 to 10 Default 2 s The time between configuration messages issued by the root bridge Shorter hello times result in faster detection of topology changes at the expense of moderate increases in STP traffic Max Age Time Synopsis 6 to 40 Default 20 s The time for which a configuration message remains valid after being issued by the root bridge Configure this parameter with care when many tiers of bridges exist or when slow speed links such as those used in WANs are part of the network Transmit Count Synopsis 3 to 100 Default 32 The maximum number of configuration messages on each port that may be sent in a special event such as recovering from a failure or bringing up a new link After the maximum number of messages is reached RSTP will be limited to one message per second Larger values allow the network to recover from failed links more quickly If RSTP is being used in a ring architecture the transmit count should be larger than the number of switches in the ring Forward Delay Synopsis 4 to 30 Default 15 s The amount of time a bridge spends learning MAC addresses on a rising po
63. the server with specified IP address tftp TFTP client executes command on server specified by IP address trace trace command type Displays the contents of a text file version Prints software versions xmodem Upload or download a file to the switch Figure 14 1 Displaying The List Of Available Commands 14 2 Obtaining Help For A Command Help related to the usage of a particular command may be obtained by entering help command name lt CR gt at the shell prompt gt help type Displays the contents of a text file Enter dir for a directory listing of files TYPE filename Figure 14 2 Displaying Help For A Command 14 3 Viewing Files RuggedCom devices maintain a number of volatile and non volatile files These files can aid in the resolution of problems and serve as a useful gauge of the device s health 14 3 1 Listing Files Enter dir lt CR gt to obtain a complete list of files and a description of each Note Each file has associated attributes as described under the Attr column in dir command Files marked R are readable i e may be uploaded by the user Files marked W are writable ROS v3 7 0 User Guide 224 RS900LWG RS930LW 14 Using the CLI Shell i e may be modified downloaded by the user Files marked B are binary files i e may be upgraded by the user The most useful files include config csv crashlog txt and syslog txt These files may be
64. this threshold a single event will be generated A single event will also be generated if the first sample created after this record is greater than or equal to this threshold and the associated startup alarm is equal to rising After a rising alarm is generated another such event will not be generated until the sampled value falls below this threshold and reaches the value of FallingThreshold Falling Thr Synopsis 0 to 2147483647 Default 11790 A threshold for the sampled variable When the current sampled variable value is less than or equal to this threshold and the value at the last sampling interval was greater than this threshold a single event will be generated A single event will also be generated if the first sample created after this record is less than or equal to this threshold and the associated startup alarm is equal to falling After a falling alarm is generated another such event will not be generated until the sampled value rises above this threshold and reaches the value of RisingThreshold Value Synopsis 0 to 2147483647 The value of a monitored object during the last sampling period The presentation of the value depends on the sample type absolute or delta Type Synopsis absolute delta Default delta The method of sampling the selected variable and calculating the value to be compared against the thresholds The value of the sample type can be absolute or delta Interval Synopsis 0
65. to 2147483647 Default 5 The number of seconds during which the data is sampled and compared with the rising and falling thresholds Startup Alarm Synopsis rising falling risingOrFalling Default risingOrFalling The alarm that may be sent when this record is first created if the condition for raising an alarm is met The value of a startup alarm can be rising falling or risingOrFalling Rising Event Synopsis 0 to 65535 Default 1 The index of the event that is used when a falling threshold is crossed If there is no corresponding entry in the Event Table then no association exists In particular if this value is zero no associated event will be generated Falling Event Synopsis 0 to 65535 ROS v3 7 0 User Guide 84 RS900LWG RS930LW 3 Ethernet Statistics Default 1 The index of the event that is used when a rising threshold is crossed If there is no corresponding entry in the Event Table then no association exists In particular if this value is zero no associated event will be generated Owner Synopsis Any 127 characters Default Monitor The owner of this record It is suggested to start this string with the word monitor 3 5 RMON Events The RMON Events Table stores profiles of behavior used in event logging These profiles are used by RMON Alarm records to send traps and to log events Each record may specify that an alarms log entry be created on its behalf whenever the event
66. to generate multi path signals 7 3 2 5 How does distance between the AP and station affect RF link quality Any wireless receiver can become saturated if the signal is too strong This commonly occurs if the wireless station is located too close 1 to 2 meters to the access point Simply lowering the TX power on the AP and Client Bridge or alternatively increasing the distance between the two units should resolve this problem 7 3 2 6 RSSI Received Signal Strength Indication Received Signal Strength Indication RSSI is a measurement of the power present in the received radio signal not of the signal quality In general an RSSI http madwifi org wiki UserDocs RSSI value of 10 or less represents a weak signal although the hardware can often still decode low data rate signals An RSSI http madwifi org wiki UserDocs RSSI value of 20 or so is an acceptable signal level An RSSI value of 40 or more is very strong signal and will easily support 54MBit s operation The RSSI http madwifi org wiki UserDocs RSSI value will fluctuate with time due to interference channel fading etc 7 3 3 Security 7 3 3 1 PSK Pre Shared Key During the association phase if the user notices that station s status is toggling between association and dis association states then it is likely due to a mismatch in the pre shared keys between the AP and station s The user should confirm that the pre shared key Passphrase or WEP ke
67. top right corner of all menu screens There are two broad types of alarms active and passive alarms 13 1 1 Active Alarms Active alarms are ongoing They signify states of operation that are not in accordance with normal operation Examples of active alarms include links that should be up but are not or error rates that are continuously exceeding a certain threshold ROS v3 7 0 User Guide 213 RS900LWG RS930LW 13 Diagnostics Active alarms are removed cleared either by solving the original cause of the alarm or by explicitly clearing the alarm itself 13 1 2 Passive Alarms Passive alarms are historic in nature They signify events that represented abnormal conditions in the past and do not affect the current operational status Examples of passive alarms include authentication failures or error rates that temporarily exceeded a certain threshold Passive alarms are cleared through the Clear Alarms option under the diagnostics menu RMON generated alarms are passive 13 1 3 Alarms and the Critical Failure Relay All active alarms will immediately de energize the critical fail relay thus signifying a problem The relay will be re energized when the last outstanding active alarm is cleared Note Alarms are volatile in nature All alarms active and passive are cleared at startup 13 1 4 Configuring Alarms ROS provides a means for selectively configuring alarms in fine grained detail Some notes on al
68. try again with IPv4 Configuration of WPA2 authentication options is supported in Windows Vista Please visit the Microsoft web site for up to date information 7 3 1 3 Windows 2000 In order to add 802 1X functionality to Windows 2000 a subset of features was taken from Windows XP Computers running Windows 2000 only support IEEE 802 1X authentication for wired and wireless network adapters using the Microsoft 802 1X Authentication Client a capability included with Service Pack 4 https www microsoft com windows2000 downloads servicepacks default mspx in order to configure a wireless client computer running Windows 2000 you must use the wireless configuration tool provided by your wireless network adapter manufacturer Please see the instructions for the wireless configuration tool to configure 802 11 encryption and authentication settings Please note that WPA WPA2 options are not supported in Windows 2000 Please visit the Microsoft web site for up to date information 7 3 2 RF Link 7 3 2 1 What type of diversity is applied in the RuggedWireless models The type of diversity used is called receiver diversity whereby a dual antenna configuration will ensure optimum performance in high multi path environments such as warehouses offices and other typically indoor installations The receiver will have the benefit of being able to select between two antennae while the transmitter will utilize a single antenna 7 3 2
69. user This is the User based Security Model dependent security ID IP Address Synopsis where ranges from 0 to 255 Default The IP address of the user s SNMP management station if it is configured to receive traps and notifications Auth Protocol Synopsis noAuth HMACMD5 Default noAuth An indication of whether messages sent on behalf of this user to from the SNMP engine can be authenticated and if so the type of authentication protocol which is used Priv Protocol Synopsis noPriv CBC DES Default noPriv An indication of whether the messages sent on behalf of this user to from the SNMP engine can be protected from disclosure and if so the type of privacy protocol which is used Auth Key Synopsis 31 character ASCII string Default None The secret authentication key password that must be shared with an SNMP client ROS v3 7 0 User Guide 37 RS900LWG RS930LW 1 Administration Confirm Auth Key Synopsis 31 character ASCII string Default None Confirm input of the Auth Key above Priv Key Synopsis 31 character ASCII string Default None The secret encryption key password that must be shared with an SNMP client Confirm Priv Key Synopsis 31 character ASCII string Default None Confirm input of the Priv Key above 1 11 2 SNMP Security to Group Maps Entries in this table map configuration of security model and security name user into a group
70. version of iflnOctets ifHCOutOctets The total number of bytes transmitted out of the interface This object is a 64 bit version of ifOutOctets ifHCInMulticastPkts The total number of good packets received that were directed to multicast address ifHCOutMulticastPkts The total number of packets transmitted that were directed to multicast address This object is a 64 bit version of ifOutMulticastPkts dot1dBasePortMtuExceededDiscards The number of frames discarded by this port due to an excessive size dot1dTpPortInFrames The number of frames that have been received by this port from its segment dot1dTpPortOutFrames The number of frames that have been transmitted by this port to its segment etherStatsDropEvents The number of received packets that are dropped due to lack of receive buffers etherStatsOctets The number of bytes in received good packets Unicast Multicast Broadcast and dropped packets etherStatsPkts The number of received good packets Unicast Multicast Broadcast and dropped packets etherStatsBroadcastPkts The number of good Broadcast packets received etherStatsMulticastPkts The number of good Multicast packets received ROS v3 7 0 User Guide 244 RS900LWG RS930LW Appendix C List of Objects Eligible for RMON Alarms etherStatsCRCAlignErrors The number of packets received which meet all the following conditions 1 Packet data l
71. 0 User Guide 215 RS900LWG RS930LW 13 Diagnostics access admin Alarms Name Excessive failed login attempts Level WARN Latch Une Off Trap Onze Off Log One Off LED amp Relay f Off Refresh Time Apply Delete Reload Figure 13 3 Alarm Configuration Form Name Synopsis Any 34 characters Default sys_alarm The alarm name e g as obtained via CLI alarms Level Synopsis EMRG ALRT CRIT ERRO WARN NOTE INFO DEBG Severity level of the alarm e EMERG The device has had a serious failure that caused a system reboot e ALERT The device has had a serious failure that did not cause a system reboot e CRITICAL The device has a serious unrecoverable problem e ERROR The device has a recoverable problem that does not seriously affect operation e WARNING Possibly serious problem affecting overall system operation e NOTIFY Condition detected that is not expected or not allowed e INFO Event which is a part of normal operation e g cold start user login etc e DEBUG Intended for factory troubleshooting only Latch Synopsis On Off Default Off Enables latching occurrence of this alarm in the Alarms Table Trap Synopsis On Off Default Off ROS v3 7 0 User Guide 216 RS900LWG RS930LW 13 Diagnostics Enables sending an SNMP trap for this alarm Log Synopsis On Off Default Off Enables logging the occurrence of this alarm in
72. 0LW 5 Spanning Tree 5 4 1 Bridge RSTP Parameters Log out Bridge RSTP Parameters pret Back State Disabled Enabled Version Support bert x eRSTP i l Enhancements oO On Bridge Priority 32768 v Hello Time 2s Max Age Time 20s Transmit Count 32 Forward Delay 15s a Max Hops 20 Cost Style STP 16 bit RSTP 32 bit O te vee Don t shutdown Timeout Figure 5 7 Bridge RSTP Parameters Form State Synopsis Disabled Enabled Default Enabled Enable STP RSTP MSTP for the bridge globally Note that for STP RSTP MSTP to be enabled on a particular port it must be enabled both globally and per port Version Support Synopsis STP RSTP MSTP Default RSTP Selects the version of Spanning Tree Protocol to support one of STP Rapid STP or Multiple STP eRSTP Enhancements Synopsis Off On Default On ROS v3 7 0 User Guide 108 RS900LWG RS930LW 5 Spanning Tree Enable disable RuggedCom proprietary eRSTP enhanced RSTP enhancements Bridge Priority Synopsis 0 4096 8192 12288 16384 20480 24576 28672 32768 36864 40960 45056 49152 53248 57344 61440 Default 32768 Bridge Priority provides a way to control the topology of the STP connected network The desired Root and Designated bridges can be configured for a particular topology The bridge with the lowest priority will become the root In the event of a failure of
73. 0LWG RS930LW 11 MAC Address Tables CoS Synopsis Normal Medium High Crit Default Normal Set this parameter to prioritize the traffic for a specified address 11 4 Purging MAC Address Table This command removes all dynamic entries from the MAC address table The only negative impact of this operation is that it causes flooding while addresses are relearned ROS v3 7 0 User Guide 202 RS900LWG RS930LW 12 Network Discovery 12 12 1 Network Discovery ROS supports two different Layer 2 protocols for automated network discovery LLDP the Link Layer Discovery Protocol and RCDP the RuggedCom Discovery Protocol LLDP is an IEEE standard protocol IEEE 802 11AB which allows a networked device to advertise its own basic networking capabilities and configuration ROS is capable of advertising and collecting network information via LLDP LLDP functionality in ROS includes the ability to e Enable or disable LLDP reception and transmission per port or for the whole device e View LLDP statistics e View neighbor information e Report LLDP neighbor information via SNMP RCDP the RuggedCom Discovery Protocol is designed primarily for the initial deployment of unconfigured RuggedCom networking devices In response to RCDP commands and queries from an application such as RuggedExplorer which supports RCDP ROS has the ability to e Enable or disable RCDP functionality e Report its basic
74. 100M 1G Default Auto Speed in Megabit per second or Gigabit per second If auto negotiation is enabled this is the speed capability advertised by the auto negotiation process If auto negotiation is disabled the port is set to this speed AUTO means advertise all supported speed modes Dupx Synopsis Auto Half Full Default Auto Duplex mode If auto negotiation is enabled this is the duplex capability advertised by the auto negotiation process If auto negotiation is disabled the port is set to this duplex mode AUTO means advertise all supported duplex modes Flow Control Synopsis Off On Default Off Flow Control is useful for preventing frame loss during times of severe network traffic Examples of this include multiple source ports sending to a single destination port or a higher speed port bursting to a lower speed port When the port is in half duplex mode it is accomplished using backpressure where the switch simulates collisions causing the sending device to retry transmissions according to the Ethernet back off algorithm When the port is full duplex it is accomplished using PAUSE frames which cause the sending device to stop transmitting for a certain period of time LFI Synopsis Off On Default Off Enabling Link Fault Indication LFI inhibits transmission of the link integrity signal when the receiving link has failed This enables the device at far end to detect link failure under all ci
75. 2 Can disable antenna 2 RX Do need to install a terminator It is entirely optional to use the second RX antenna You do not need to install a terminator on the connector if the second antenna is unused 7 3 2 3 How are received signals computed on the two RX antennae Does it add both paths The RuggedWireless models use a simple heuristic in support of the receiver diversity It will simply choose the stronger signal on the two antennas It does not add both signal paths together this type of summation cannot be done without a MIMO multiple input multiple output configuration The RuggedWireless family does not support MIMO at this time ROS v3 7 0 User Guide 163 RS900LWG RS930LW 7 Wireless LAN 7 3 2 4 Will the performance be affected by using an external directional antenna TX RX and leaving the original antenna2 RX in place You are certainly free to connect both antennae externally The idea behind the dual antenna receiver diversity feature is that by using two antennae we effectively increase the capture surface of the receive antenna This does not increase the antenna gain but it does allow for better reception in the presence of multi path signals In practice multi path signals are observed in indoor environments where there tend to be more obstructions in the path of the radio line of sight In outdoor scenarios it is expected that there are fewer obstructions and opportunities for reflections
76. 2 1D 2004 RSTP reduces network recovery times to just milliseconds and optimizes RSTP operation for various scenarios ROS supports IEEE 802 1D 2004 RSTP RSTP States and Roles RSTP bridges have roles to play either root or designated One bridge the Root Bridge is the logical center of the network All other bridges in the network are Designated bridges RSTP also assigns each port of the bridge a state and a role The RSTP state describes what is happening at the port in relation to address learning and frame forwarding The RSTP role basically describes whether the port is facing the center or the edges of the network and whether it can currently be used There are three RSTP states Discarding Learning and Forwarding The discarding state is entered when the port is first put into service The port does not learn addresses in this state and does not participate in frame transfer The port looks for RSTP traffic in order to determine its role in the network When it is determined that the port will play an active part in the network the state will change to learning Forwarding Timer Expires Or Active RSTP Handshake has Occurred Learning BPDUS indicate i port should not Forwarding Timer Expires be active Or Active RSTP Handshake Discarding Link rises or falls RSTP Disabled in any state Disabled RSTP Enabled Figure 5 1 Bridge and Port States ROS v3 7 0 User Guide 95 RS900LWG RS9
77. 20 13 5 Loading Factory Default Configuration cas tecscomevaee ies ebtestetdaanonsedensenees 221 13 6 Resetting The Device sasemet nui riots eso eiei aaaea aiia uted teats th aecatunien ed 221 14 Using the CLI TTT 223 14 1 Summary Of CLI Commands available in DOG 223 14 2 Obtaining Help For A Command EE E 224 ae Ee AAE a N E A E E E ee ee 224 TASA TST EE 224 14 3 2 Viewing and Clearing Log Files AEN 225 14 4 Pinging a Remote DEIER aenneren eege 225 14 5 Tracing EVENIS serisine ana eaae o p oiai pices cond OEE need erate 226 14 517 Enabling Tra e dee E EE 227 14 52 Starting Trace eege de eie araea a a SEENEN DEEN 227 14 6 Viewing DHCP Learned Information EEN 228 14 7 Executing Commands Remotely Through RSH sssssssssssesssssrrnssssrnnerserrsssrrrnsrrrene 228 14 8 Resetting rn CEET 229 15 Firmware Upgrade and Configuration Management sssssssseessnrsserrrneerrnerrsrerrssrrrnn 230 15 Ee ele te Wu EE 230 15 1 1 Upgrading Firmware Using XModem 231 15 1 2 Upgrading Firmware Using the ROS TFTP Server cccceeeseeeeeeeeeees 232 15 1 3 Upgrading Firmware Using the ROS TFTP Client c ceeeeeseeeeeeees 232 15 1 4 Upgrading Firmware Using SFTP asscitadceinedaetastiindnaeindetnce 233 15 2 Updating Config rati M EE 233 15 3 Backing Up ROS System Files 2 nhc cccreidees ecisteae tants devessecctnedespicnseneessceeessheeats 234 15 3 1 Backing Up Files Using SFTP siscccccsccenesecethecaku
78. 3 Viewing IP Multicast Groups 2cciscccecis cevesteesiaeevavec crvnesninscaentcelevaaierecdeieseets 193 10 3 4 Configuring GMRP eebe SCENE Ee EE E 194 10 4 TroubleshoOtihg EE 195 TI MAC Address TaDles eege 198 11 1 Viewing MAC AGG6SSES 3 ulcmcesencs iesctacceaeiiec taeda cteeesccttansca iver veeddecetbea teceaeaemnna 199 11 2 Configuring MAC Address Learning Options cceeceeeeeeeeeeeeeeeeeeeeteeteeeeeteneees 200 11 3 Configuring Static MAC Address Table AAR 200 11 4 Purging MAC Address EC 202 12 Network Re e EE 203 2 he EDP EEN sits exten EE ee ho Aan EE 203 12 2 RODP Operation aie eeoa a aa a a a a a a ia R 204 12 3 Network Discovery Menu Ge sgege de Eiegeg ed See ZER ainda 204 ch Ee l ger ee Eege 205 ROS v3 7 0 User Guide 6 RS900LWG RS930LW Rugged Operating System 123 2 GDP Config ratidM seirer ei aaeeei ae EE 212 dn DIAGNOSING sie ia ne eebe gege eebe 213 13 1 Using the Alarm System oseraies 213 Wedd sc Active Alar EE 213 13 1 2 Passive ALANIS E 214 13 1 3 Alarms and the Critical Failure Relay ccccecccseeeeeeeeeeeeeeeeeeeeeeeeneeeeees 214 t3 1 4 C ntiguring Alarms steieren e a a a aaia 214 13 1 5 Viewing and Clearing Alarms EE 217 13 2 Viewing CPU WE e e EE 218 13 3 Viewing and Clearing the System Log ssssessesssesssenressrrrnreernnrrstrrnserrnnsrrrnnnernnne 219 13 4 Viewing Product Information ed ECKER oncedeteesbaaydaatauaiaenebedienad unalone 2
79. 30LW 5 Spanning Tree Role The learning state is entered when the port is preparing to play an active part in the network The port learns addresses in this state but does not participate in frame transfer In a network of RSTP bridges the time spent in this state is usually quite short RSTP bridges operating in STP compatibility mode will spend six to 40 seconds in this state After learning the bridge will place the port in the forwarding state The port both learns addresses and participates in frame transfer while in this state Note ROS introduces two more states Disabled and Link Down Introduced purely for purposes of management these states may be considered subclasses of the RSTP Discarding state The Disabled state refers to links for which RSTP has been disabled The Link Down state refers to links for which RSTP is enabled but are currently down There are four RSTP port roles Root Designated Alternate and Backup If the bridge is not the root bridge it must have a single Root Port The Root Port is the best i e quickest way to send traffic to the root bridge RP Root Port DP Designated Port AP Alternate Port BP Backup Port 1 Designated Designated Bridge Bridge 2 3 2 Figure 5 2 Bridge and Port Roles A port is alternate when it receives a better message from another bridge on the LAN segment it is connected to The message that an Alternate Port receives is b
80. 6 Priority to CoS Mapping Labor eege Seege GE deeg 178 9 7 Priority to CoS Mapping Fom ugweteisete ud eet niceaateriatnmninlanet acini 179 9 8 TOS DSCP to CoS Mapping RA EC 180 9 9 TOS DSCP to CoS Mapping FORM RE 180 10 1 IGMP Operation Example EE EE 183 10 2 IGMP Operation Example 2 aicccscccteasniercidacawsdieautaiganeeandeitvsagliasdaaeigene tinh ENEE 185 10 3 Example UNS WT BEE 188 10 4 Multicast Filtering Menu geneesou de ch ENEEd ed E 190 10 5 IGMP Parameters FOrm ee EE EENS 190 10 6 Static Multicast Groups Table sacse secieihectecescisac creasicvnasae Selec ege EENS eases 192 167s Static Multicast Group Form EE 192 10 8 IP Multicast Groups Tallen ees 193 ROS v3 7 0 User Guide 11 RS900LWG RS930LW Rugged Operating System 10 9 GMRP Pont Summary EE 194 10 10 Port GMRP EE 194 10 11 Multicast Group Summary ecEEIRLEEREeEN EES NEEN ENEE ENEE 195 11 1 MAG Address Tables ET UE 198 11 2 Address EE 199 11 3 MAC Address Learning Options FOrm sssssssssssessseessserrsserrnnrrrnnntssrrrnsrrrnnnrtnnnnrsnnnnsnet 200 11 4 Static MAC Address Table cvciicciccsccsctcecsee ob caatesdeteenegeicarenensdedesetecncs vets ageemeide ceeeateaietes 201 NR Static MAG Address FON EE 201 12 1 Network Discovery Main Menu 2 dde geesde Nee eer Mie dude dees ons 205 EE nl Ee EE 206 12 3 Global LLDP Parameters Form Ces deele geed 207 12 4 Port ELDP Parameters Table imnari a aie e an ie 208 12 5 Port LEDP Para
81. ADIUS server Auth Key Synopsis 31 character ASCII string Default None The authentication key shared with the RADIUS server It is used to encrypt any passwords that are sent between the switch and the RADIUS server Confirm Auth Key Synopsis 31 character ASCII string Default None Confirm input of the above authentication key 1 13 TACACS TACACS Terminal Access Controller Access Control System Plus is a TCP based access control protocol that provides authentication authorization and accounting services to routers network access servers and other networked computing devices via one or more centralized servers It is based on but is not compatible with the older TACACS protocol TACACS has generally replaced its predecessor in more recently built or updated networks although TACACS and XTACACS are still used on many older networks Note that RuggedCom s TACACS client implementation always has encryption enabled 1 13 1 User Login Authentication and Authorization A TACACS server can be used to authenticate and authorize access to the device s services such as HMI via Serial Console Telnet SSH RSH Web Server see Password Configuration User name and Password are sent to the configured TACACS Server Two TACACS servers Primary and Secondary are configurable per device If the primary server is not reachable the device will automatically fall back to the secondary server to complete the autho
82. AST addresses b access Multicast Group Summary admin 01 00 00 55 22 22 1 2 Figure 10 11 Multicast Group Summary VID Synopsis 0 to 65535 The VLAN Identifier of the VLAN upon which the multicast group operates MAC Address Synopsis where ranges 0 to FF The multicast group MAC address Static Ports Synopsis Any combination of numbers valid for this parameter Ports that joined this group statically through static configuration in Static MAC Table and to which the multicast group traffic is forwarded GMRP Dynamic Ports Synopsis Any combination of numbers valid for this parameter Ports that joined this group dynamically through GMRP Application and to which the multicast group traffic is forwarded 10 4 Troubleshooting Problem One When start a multicast traffic feed it is always distributed to all members of the VLAN ROS v3 7 0 User Guide 195 RS900LWG RS930LW 10 Multicast Filtering Is IGMP enabled for the VLAN Multicasts will be distributed to all members of the VLAN unless IGMP is enabled Problem Two Computers on my switch receive the multicast traffic just fine but can t get the stream through a connected router Is the port used to connect the router included in the Router Ports list To determine whether the multicast stream is being delivered to the router run the Ethernet Statistics menu View Ethernet Statistics command Verify that the tr
83. Com Please check the RuggedCom web site www RuggedCom com for the availability of updates to ROS firmware or contact RuggedCom support ROS v3 7 0 User Guide 230 RS900LWG RS930LW 15 Firmware Upgrade and Configuration Management Firmware upgrades may be performed using any of the transfer methods and protocols listed under File Transfer Mechanisms above Applying the Upgrade Binary firmware images transferred to the ROS based device are stored in non volatile memory and require a device reset in order to take effect The version ROS shell command will display any firmware updates that are pending Currently running firmware is labeled Current pending upgrades are labeled Next gt version Current ROS CF52 Boot Software v2 14 0 Sep 29 2008 13 25 Current ROS CF52 Main Software v3 6 0 Oct 03 2008 09 33 Next ROS CF52 Main Software v3 7 0 Jun 02 2009 08 36 ROS firmware is provided as a compressed installation image When this compressed image is run for the first time it decompresses itself and reinstalls the decompressed image to Flash memory Subsequent device reboots will use the decompressed image Security Considerations File transfers using methods that require ROS login authentication namely Xmodem SFTP and the ROS TFTP client are subject to the following conditions e transfers from the ROS based device may be performed by any user with login privileges e transfers to the ROS based de
84. Configuring the switch s MAC Address Aging time e Configuring static MAC addresses The MAC Address Tables menu is accessible from the main menu S access Log out K g Main Menu admin Administration Ethernet Ports Ethernet Statistics Spanning Tree Virtual LANs Port Security Classes of Service Multicast Filtering MAC Address Tables N e View MAC Addresses e Configure MAC Address Learning Options e Configure Static MAC Address Table e Purge MAC Address Table Diagnostics Figure 11 1 MAC Address Tables Menu ROS v3 7 0 User Guide 198 RS900LWG RS930LW 11 MAC Address Tables 11 1 Viewing MAC Addresses MAC Addresses MAC Address VIDPortType CoS 00 00 85 05 94 C4 1 4 Dynamic Normal 00 04 23 AE FO 14 Dynamic Normal 00 04 DC 01 01 E2 Dynamic Normal 00 0D 88 4E 6B CF Dynamic Normal _00 0E A6 2C EE C4 Dynamic Normal 00 0E A6 68 3F DF Dynamic Normal _00 50 22 B4 DC BD Dynamic Normal 00 E0 18 BB B4 CA Dynamic Normal n Ee Bw WW cai blIbibIblblIbI Figure 11 2 Address Table MAC Address Synopsis where ranges 0 to FF A MAC address learned by the switch VID Synopsis 0 to 65535 The VLAN Identifier of the VLAN upon which the MAC address operates Port Synopsis 0 to 65535 or Multi Local The port on which MAC address has been learned MULTI multicast address so there is no switch port associated wit
85. D Synopsis 1 to 4094 Default 1 The VLAN Identifier is used to identify the VLAN in tagged Ethernet frames according to IEEE 802 1Q VLAN Name Synopsis Any 19 characters Default The VLAN name provides a description of the VLAN purpose for example Engineering VLAN ROS v3 7 0 User Guide 137 RS900LWG RS930LW 6 VLANs Forbidden Ports Synopsis Any combination of numbers valid for this parameter Default None These are ports that are not allowed to be members of the VLAN Examples None all ports of the switch are allowed to be members of the VLAN 2 4 6 8 all ports except ports 2 4 5 6 and 8 are allowed to be members of the VLAN IGMP Synopsis Off On Default Off This parameter enables or disables IGMP Snooping on the VLAN MSTI Synopsis 0 to 16 Default 0 This parameter is only valid for Multiple Spanning Tree Protocol MSTP and has no effect if MSTP is not used The parameter specifies the Multiple Spanning Tree Instance MSTI to which the VLAN should be mapped Note If IGMP Snooping is not enabled for the VLAN both IGMP messages and multicast streams will be forwarded directly to all members of the VLAN If any one member of the VLAN joins a multicast group then all members of the VLAN will receive the multicast traffic 6 3 3 Port VLAN Parameters Port VLAN Parameters Trunk 1 Untagged Disabled Edge 1 Untagged Disabled Edge 1 Untagged Disabled Edge 1 Untagged Disabled Untagge
86. DP Port Synopsis 1025 to 65535 or 514 Default 514 The local UDP port through which the client sends information to the server s 1 15 3 Configuring the Remote Syslog Server access Log out Remote Syslog Server a Back InsertRecord _192 168 0 1 514 LOCAL7 DEBUGGING 192 168 3 1 514 USER WARNING Figure 1 32 Remote Syslog Server Table access Log out Remote Syslog Server SEN Back IP Address UDP Port 514 Facility LOCAL7 sl Severity DEBUGGING M Apply Delete Reload Figure 1 33 Remote Syslog Server Form IP Address Synopsis where ranges from 0 to 255 Default Syslog server IP Address UDP Port Synopsis 1025 to 65535 or 514 ROS v3 7 0 User Guide 49 RS900LWG RS930LW 1 Administration Default 514 The UDP port number on which the remote server listens Facility Synopsis USER LOCALO LOCAL1 LOCAL2 LOCAL3 LOCAL4 LOCALS LOCAL6 LOCAL7 Default LOCAL7 Syslog facility name USER LOCALO LOCAL1 LOCAL2 LOCAL3 LOCAL4 LOCAL5 LOCAL6 LOCAL Severity Synopsis EMERGENCY ALERT CRITICAL ERROR WARNING NOTICE INFORMATIONAL DEBUGGING Default DEBUGGING Syslog severity level EMERGENCY ALERT CRITICAL ERROR WARNING NOTICE INFORMATIONAL DEBUGGING 1 16 Troubleshooting Problem One have configured the IP address and a gateway
87. Device This operation will close all open Telnet connections and warm start the device after the user has confirmed the reset operation from the Reset Device option ROS v3 7 0 User Guide 221 RS900LWG RS930LW 13 Diagnostics Reset Device Back You are about to reset device Confirm Figure 13 9 Reset Device Dialog ROS v3 7 0 User Guide 222 RS900LWG RS930LW 14 Using the CLI Shell 14 Using the CLI Shell 14 1 ROS Command Line Interface CLI support enables e Execution of commands from a CLI shell e Remote execution of commands using RSH or SSH e Switching between the CLI shell and the menu system Note Different commands may be available to users at different login session security levels quest operator or administrator The ROS CLI shell may be accessed from a terminal session to the device A terminal session may be established in one of three ways e Direct cable via RS 232 e Remote via RSH e Remote via SSH When a terminal session is first established to the ROS device the user interface presented will be the full screen menu interface Please refer to Section Section 1 1 The ROS User Interface for more detail on the menu interface The Command Line Interface CLI shell may be accessed from any menu by pressing lt Ctrl S gt Any menu operation in progress such as changing a configuration parameter will be terminated You may return to the
88. ER A positive SNR margin of 6 dB or more is needed to ensure reliable service with unknown impairments and temperature variations 2 2 Port Status Port Status access admin Back PortName Link Speed Duplex 1 Porti up 100M Full 2 Po up 100M Full 3 Pont Up 100M ryt A Port4 Down 5 Ports up 100M Full le Pong Up 10M Half 7 Port up 100M Full 8 100M Figure 2 14 Port Status Table Port Synopsis 1 to maximum port number The port for which status is provided Name Synopsis Any 15 characters ROS v3 7 0 User Guide 67 RS900LWG RS930LW 2 Ethernet Ports A descriptive name that may be used to identify the device connected to that port Link Synopsis Down Up The port s link status Speed Synopsis 10 100 1000 The port s current speed Duplex Synopsis Half Full The port s current duplex status 2 2 8 Resetting Ports This command performs a reset of the specified Ethernet ports This action is useful for forcing re negotiation of speed and duplex mode or in situations where the link partner has latched into an inappropriate state 2 3 Troubleshooting Problem One One of my links seems to be fine at low traffic levels but starts to fail as traffic rates increase One of my links pings OK but has problems with FTP SQL HTTP A possible cause of intermittent
89. Empty e E E E T ge Enge etegeg 20 1 4 Main Menu via Web Server Interface o nssnnseeeesnnnesserreserrnrrrrrnressrrrrnerrnnnnernennssernnserenn nt 21 1 5 Web Page Header Showing Alarms Link cccceeeeeeeeeeeeeeeeeeeeeeeeeeeeseaaeeeeeeeeeeeneeneeees 21 1 6 Parameters Form Example ss secu csi tecesersa line cenc ceased eadhs teecticande dates ease caetexentdaiciavacsvewbeesteeebes 22 1 7 Administration Kleer eege AE RE 23 1 8 e EE 24 ET Beta FON E 25 1 10 IP Gateways FOrm eege 26 Tel de IP Services FOM EE 27 1 12 System Identification FOrm E 29 t43 Passwords POW E 30 1 14 Time Synchronization Men AANEREN 32 1215 Time and Date FOr EE 33 1 16 S6rial POM MGA EE 34 1 17 Time Source Selection Men ENEE 35 1 18 Ke 35 1 19 SNMP User E 36 n SNMP User FOM sismonsinnrnniiain a E Ea a 37 1 21 SNMP Security to Group Maps Table AEN 38 1 22 SNMP Security to Group Maps Form sssssssssessssssrseeseneessserrrserrnnrernnnresrtrrssrrrnntrrnnnnnrnnnesene 38 1 23 SNMP ACCESS E 39 1 24 SNMP EE 40 1 25 RADIUS Server Summary saxcxrzcrcteanecracersgenstcnaaassenenneasbstecsnaustaieetenteiaanatceneenenaiecenasncens 43 1 26 RADIUS Server Form sicccsccccesscscscccssssssssssccssensnecsiseseesacceaddeseccanssnntsaasansusinsieceasaatssuncacans 43 1 27 TACACS Server SUMMATY sisisi ai RE ed eee ENEA EAEE AREA KAET ude ate 45 1 28 TACAC S Server FOM erinin tee nee eee a E Eaa ee et 45 1 29 DHCP Relay Agent FOrm serebncvsecntanestaxsd
90. False Any value other than the suggested values does not affect the requested operation E g Write Multiple Registers request to clear alarms in the device 0x10 0x00 0x80 0x00 0x01 2 OxFF 0x00 FF 00 for register 00 80 would clear the system alarms 00 00 would not clear any alarms Response may look like 0x10 0x00 0x80 0x00 0x01 D 1 3 Uint16 Standard Modbus 16 bit register D A Uint32 Standard 2 Modbus 16 bit registers First register would hold higher 16 bits of the value and seconds register would hold lower 16 bits from the 32 bit value D 1 5 PortCmd Descriptive bit layout 1 Requested Action is True 0 bit Requested Action is false per port PortCmd at this time provides a bit layout of max of 32 ports hence utilizing 2 Modbus registers First Modbus register corresponds to ports 1 16 Second Modbus register corresponds to ports 17 32 for a particular action Bits that do not apply to a particular product are always set to zero See example for details Bit Value 1 Requested action is true e g This particular port is Up Bit Value 0 Requested action is false e g The particular port is Down Read Data from device using PortCmd E g A Modbus Request to read multiple registers from location Ox03FE 0x04 0x03 OxFE 0x00 0x02 Response would depend on the device as on how many ports are available on the d
91. ISTs in all MST regions The CIST therefore spans the entire bridged network reaching into each MST region via the latter s IST to reach every bridge on the network 5 2 2 MSTP Bridge and Port Roles 5 2 2 1 Bridge Roles CIST Root The CIST Root is the elected root bridge of the CIST Common and Internal Spanning Tree which spans all connected STP and RSTP bridges and MSTP regions CIST Regional Root The root bridge of the IST within an MST region The CIST Regional Root is the bridge within an MST region with the lowest cost path to the CIST Root Note that the CIST Regional Root will be at the boundary of an MST region Note also that it is possible for the CIST Regional Root to be the CIST Root MSTI Regional Root The root bridge for an MSTI within an MST region A root bridge is independently elected for each MSTI in an MST region 5 2 2 2 Port Roles Each port on an MST bridge may have more than one role depending on the number and topology of spanning tree instances defined on the port CIST Port Roles e The Root Port provides the minimum cost path from the bridge to the CIST Root via the CIST Regional Root If the bridge itself happens to be the CIST Regional Root the Root Port is also ROS v3 7 0 User Guide 100 RS900LWG RS930LW 5 Spanning Tree the Master Port for all MSTIs See below and provides the minimum cost path to a CIST Root located outside the region e A Designated Port provides the mini
92. LAN also use priority to determine which bridge is active In this way careful selection of Bridge Priorities can establish the path of traffic flows in both normal and abnormal conditions ROS v3 7 0 User Guide 114 RS900LWG RS930LW 5 Spanning Tree 5 4 5 Port MSTI Parameters access admin Port MSTI Parameters Back Instance ID n eer 128 Auto Auto 128 Auto Auto Auto Auto 128 Auto Auto fe loo Ro Ny co Figure 5 12 Port MSTI Parameter Table access admin Port MSTI Parameters Instance ID Port s A Priority 128 oi STP Cost Auto RSTP Cost Auto Figure 5 13 Port MSTI Parameter Form Instance ID Synopsis 0 to 16 Default 1 ROS v3 7 0 User Guide 115 RS900LWG RS930LW 5 Spanning Tree The Instance ID refers to the MSTI Multiple Spanning Tree Instance ID Specify an Instance ID and select GET in order to load parameters corresponding to the selected MSTI Changes to parameters that are subsequently applied will apply to the selected Instance ID Note Port Parameters for the IST MSTI zero are accessible via the Port RSTP Parameters menu see section Section 5 4 2 Port RSTP Parameters Port s Synopsis Any combination of numbers valid for this parameter The port number as seen on the front plate silkscreen of the switch or a list of ports if aggregated in a port trunk Priority Synopsis
93. P Access admin Back InsertRecord ReadViewName WriteViewName NotifyiewName snmp 3 noAuthNoPriv allOmMib allofib noview snmpv3 authNoPriv allOfMib noView noView snmp 3 authPriv noview noview allOfMib snmp 2c noAuthNoPriv noview noview Y1 Mib Figure 1 23 SNMP Access Table ROS v3 7 0 User Guide 39 RS900LWG RS930LW 1 Administration SNMP Access access admin Back Group SecurityModel snmpv3 SecurityLevel authPriv gt ReadviewName naView zl WriteViewName noView R NotifviewName allOfMib zl Apply Delete Reload Figure 1 24 SNMP Access Form Group Synopsis Any 32 characters Default The group name to which the security model and name belong This name is used as an index to the SNMPv3 VACM Access Table SecurityModel Synopsis snmpVl snmpV2c snmpV3 Default snmpV3 In order to gain the access rights allowed by this entry the configured security model must be in use SecurityLevel Synopsis noAuthNoPriv authNoPriv authPriv Default noAuthNoPriv The minimum level of security required in order to gain the access rights allowed by this entry A security level of noAuthNoPriv is less than authNoPriv which is less than authPriv ReadViewName Synopsis noView V1Mib allOfMib Default noView This parameter identifies the MIB tree s to which this entry authorizes read access If the value is noView then read access will not
94. Priority to CoS Mapping Form Priority Synopsis 0 to 7 Default 0 This is a value of the IEEE 802 1p priority CoS Synopsis Normal Medium High Crit Default Normal This is a CoS assigned to received tagged frames with the specified IEEE 802 1p priority value ROS v3 7 0 User Guide 179 RS900LWG RS930LW 9 Classes of Service 9 2 4 DSCP to CoS Mapping DSCP to CoS Mapping Normal Normal Normal Normal Normal Normal Normal Normal Normal Normal Normal Normal Normal Maral DSCP D SC E 3 4 ca 6 7 8 9 H Ls No Figure 9 8 TOS DSCP to CoS Mapping Table access Log out DSCP to CoS Mapping sarin DSCP fo CoS Normal D Apply X Reload Figure 9 9 TOS DSCP to CoS Mapping Form DSCP Synopsis 0 to 63 Default 0 This is a Differentiated Services Code Point DSCP a value of the 6 bit DiffServ field in the Type Of Service TOS field of the IP header ROS v3 7 0 User Guide 180 RS900LWG RS930LW 9 Classes of Service CoS Synopsis Normal Medium High Crit Default Normal This is a Class of Service assigned to received frames with the specified DSCP ROS v3 7 0 User Guide 181 RS900LWG RS930LW 10 Multicast Filtering 10 Multicast Filtering 10 1 ROS Multicast Filtering provides the following features e Support for up to 256 Multicast Groups either static or dynamic e Ability to prioritiz
95. S and supports up to 5 collectors syslog servers ROS Remote Syslog provides the ability to configure e IP address es of collector s e Source UDP port e Destination UDP port per collector e Syslog source facility ID per collector same value for all ROS modules ROS v3 7 0 User Guide 47 RS900LWG RS930LW 1 Administration e Filtering severity level per collector in case different collectors are interested in syslog reports with different severity levels 1 15 1 Configuring Local Syslog The local syslog configuration enables users to control what level of syslog information will be logged Only messages of a severity level equal to or greater than the configured severity level are written to the syslog txt file in the unit access Log out Local Syslog pres Back Local Syslog Level DEBUGGING D Apply Reload Figure 1 30 Local Syslog Form Local Syslog Level Synopsis EMERGENCY ALERT CRITICAL ERROR WARNING NOTICE INFORMATIONAL DEBUGGING Default DEBUGGING Syslog severity level EMERGENCY ALERT CRITICAL ERROR WARNING NOTICE INFORMATIONAL DEBUGGING 1 15 2 Configuring Remote Syslog Client access Log out Remote Syslog Client GE Back UDP Port 514 Apply Reload Figure 1 31 Remote Syslog Client Form ROS v3 7 0 User Guide 48 RS900LWG RS930LW 1 Administration U
96. S900LWG RS930LW 7 Wireless LAN Distribution System Infrastructure BSS IP Distribution System Figure 7 3 RuggedWireless Client IP Bridge Infrastructure Basic Service Set diagram Note The Client IP Bridge only bridged IP and ARP traffic 7 2 WLAN Configuration The Wireless LAN menu is accessible from the main menu Log out KL k e e e e e e e e e Administration WLAN Interface oe e e e e e Addressing Parameters Network Parameters Security Parameters MAC Filtering Radius Parameters Advanced Parameters DHCP Parameters Association Information Miscellaneous Parameters Ethernet Ports Ethernet Statistics Link Aqqregation Spanning Tree Virtual LANs Port Security Classes of Service Multicast Filtering MAC Address Tables Network Discovery Diagnostics Figure 7 4 Wireless LAN Menu access admin ROS v3 7 0 User Guide 146 RS900LWG RS930LW 7 Wireless LAN The following sections describe the menus that configure the different aspects of the WLAN subsystem 7 2 1 Addressing Parameters Log out Addressing Parameters phere Back Operational Mode AP e RFMAC 00 0A DC BE FO E0 ETHMAC 00 0A DC E0 00 05 IP Address 192 168 0 2 Subnet Mask 255 255 255 0 Gateway 192 168 0 1 Apply Figure 7 5 Addressing Parameters Form Operational Mode Synopsis AP Client Bridge Client IP Bridge
97. S930LW 1 Administration OS Rugged Operating System Rugged Operating System v3 3 0 May 28 2007 22 02 Copyright c RuggedCom 200 All rights reserved System Name 138766701 Location Location Contact Contact Product RS400 HI FLM 3D M MAC Address 00 04 DC 00 00 07 Serial Number 0123456769 Enter User Name Enter Password goahead WEBSERVER Figure 1 2 Log in to The Device with a Web Browser Enter the admin user name and the appropriate password for the admin user and then click on the LogIn button The switch is shipped with a default administrator password of admin Once successfully logged in the user will be presented with the main menu H the user wants to hide the device information from the login screen the Login Banner option in the System Identification menu must be set to Custom and the desired data to be displayed should be uploaded to the device as the file banner txt ROS v3 7 0 User Guide 19 RS900LWG RS930LW 1 Administration ROS Rugged Operating System Rugged Operating System Copyright c RuggedCom 2008 All rights reserved Enter User Name Enter Password i S goahead WEBSERVER Figure 1 3 Log In To The Device With A Web Browser Custom Login Banner banner ixt Empty 1 3 2 The Structure of the Web Interface The user interface is organized as a series of linked web pages The main
98. The left and right cursor keys can be used to position the edit point without erasing the old parameter value The up and down cursor keys can be used to cycle through the next higher and lower values for the parameter After the parameter has been edited press enter again to change other parameters When all desired parameters have been modified press lt Ctrl A gt to apply changes The switch will automatically prompt you to save changes when you leave a menu in which changes have been made Some menus will require you to press lt Ctrl l gt to insert a new record of information and lt Ctrl L gt to delete a record ROS v3 7 0 User Guide 16 RS900LWG RS930LW 1 Administration 1 1 4 Updates Occur In Real Time All configuration and display menus present the current values automatically updating if changed from other user interface sessions or SNMP All statistics menus will display changes to statistics as they occur 1 1 5 Alarm Indications Are Provided Alarms are events for which the user is notified through the Diagnostics sub menu All configuration and display menus present an indication of the number of alarms in the upper right hand corner of the screen as they occur automatically updating as alarms are posted and cleared 1 1 6 The CLI Shell The user interface provides a Command Line Interface shell for operations that are more easily performed at the command line You may switch back and forth from the me
99. ULE Name Groups Supported RFC 1907 SNMPv2 MIB SNMP Group SNMP Community Group SNMP Set Group System Group SNMP Basic Notifications Group RFC 2863 IF MIB General Information Group VHC Packet Group Counter Discontinuity Group Link Up Down Notification Group RFC 2011 IP MIB IP Group ICMP Group RFC 2012 TCP MIB TCP Group RFC 2013 UDP MIB UDP Group RFC 2819 RMON MIB Ethernet Statistics Group History Groups History Control Group and Ethernet History Group Alarm Group Event Group RFC 4188 BRIDGE MIB Base Bridge Group Base Port Group STP Bridge Group STP Port Group TP Bridge Group TP FDB Group TP Group Notification Group RFC 4318 RSTP MIB Bridge Group Port Group RFC 4363 Q BRIDGE MIB qBridge Base Group qBridge Fdb Unicast Group qBridge Fdb Multicast Group ROS v3 7 0 User Guide 239 RS900LWG RS930LW Appendix A SNMP MIB Support RFC MODULE Name Groups Supported qBridge VLAN Group qBridge VLAN Static Group qBridge Port Group LLDP MIB LLDP MIB LLDP Config Group LLDP Config Rx Group LLDP Config Tx Group LLDP Stats Rx Group LLDP Stats Tx Group LLDP Local System Group LLDP Remote System Group LLDP Notifications Group RFC 3414 SNMP USER BASED SM MIB Basic Group RFC 3415 SNMP VIEW BASED ACM MIB Basic Group A 2 RuggedCom proprietary MIBs Proprietary MIB MODULE Name Groups Supported
100. Uint32 0486 2 Port 4 Statistics Ethernet In Octets R Uint32 0488 2 Port 5 Statistics Ethernet In Octets R Uint32 048A 2 Port 6 Statistics Ethernet In Octets R Uint32 048C 2 Port 7 Statistics Ethernet In Octets R Uint32 048E 2 Port 8 Statistics Ethernet In Octets R Uint32 0490 2 Port 9 Statistics Ethernet In Octets R Uint32 0492 2 Port 10 Statistics Ethernet In Octets R Uint32 0494 2 Port 11 Statistics Ethernet In Octets R Uint32 0496 2 Port 12 Statistics Ethernet In Octets R Uint32 0498 2 Port 13 Statistics Ethernet In Octets R Uint32 049A 2 Port 14 Statistics Ethernet In Octets R Uint32 049C 2 Port 15 Statistics Ethernet In Octets R Uint32 049E 2 Port 16 Statistics Ethernet In Octets R Uint32 04A0 2 Port 17 Statistics Ethernet In Octets R Uint32 04A2 2 Port 18 Statistics Ethernet In Octets R Uint32 04A4 2 Port 19 Statistics Ethernet In Octets R Uint32 04A6 2 Port 20 Statistics Ethernet In Octets R Uint32 04C0 2 Port 1 Statistics Ethernet Out Octets R Uint32 Address Registers Description R W Format 04C2 2 Port 2 Statistics Ethernet Out Octets R Uint32 0404 2 Port 3 Statistics Ethernet Out Octets R Uint32 04C6 2 Port 4 Statistics Ethernet Out Octets R Uint32 04C8 2 Port 5 Statistics Ethernet Out Octets R Uint32 04CA 2 Port 6 Statistics Ethernet Out Octets R Uint32 04CC 2 Port 7 Statistics Ethernet Out Octets R Uint32 04CE 2 Port 8 Statistics Ethernet Out Octets R Uint32 04D0 2 Port 9 Statistics Eth
101. a specific command Commands clauses table and column names are all case insensitive DEFAULT Sets all records in a table s to factory defaults DELETE Allows for records to be deleted from a table HELP Provides help for any SQL command or clause INFO Displays a variety of information about the tables in the database ROS v3 7 0 User Guide 235 RS900LWG RS930LW 15 Firmware Upgrade and Configuration Management INSERT Allows for new records to be inserted into a table SAVE Saves the database to non volatile memory storage SELECT Queries the database and displays selected records UPDATE Allows for existing records in a table to be updated 15 4 2 Finding the Correct Table Many SQL commands operate upon specific tables in the database and require the table name to be specified Navigating the menu system to the desired menu and pressing lt Ctrl Z gt will show the name of the table The menu name and the corresponding database table name will be cited Another way to find a table name is to run the sql info tables command This command also displays menu names and their corresponding database table names depending upon the features supported by the device Table Description alarms Alarms cpuDiags CPU Diagnostics ethPortCfg Port Parameters ethPortStats Ethernet Statistics ethPortStatus Port Status ipCfg IP Services 15 4 3 Retrieving Information Retrieving a Tabl
102. ackets e heap error alert e NTP server failure notification e real time clock failure error e failed password warning e MAC address not learned by switch fabric error e BootP client TFTP transfer failure error e received looped back BPDU error received two consecutive confusing BPDUs on port forcing down error e GVRP failed to learn too many VLANs warning ROS v3 7 0 User Guide 241 RS900LWG RS930LW Appendix C List of Objects Eligible for RMON Alarms Appendix C List of Objects Eligible for RMON Alarms The following table lists ROS database objects which are eligible for RMON alarms snmpInPkts The number of messages delivered to the SNMP Agent snmpInBadVersions snmp InBadCommunityNames The total number of SNMP messages which were delivered to the SNMP Agent and were for an unsupported SNMP version The total number of SNMP messages delivered to the SNMP Agent which used a unknown SNMP community name snmp InBadCommunityNames The total number of SNMP messages delivered to the SNMP Agent which represented an SNMP operation which was not allowed by the SNMP community named in the message snmpInASNParseErrs The total number of ASN 1 or BER errors encountered by the SNMP Agent decoding received SNMP messages tcpActiveOpens tcpPassiveOpens The number of times TCP connections have made a direct transition to the SYN SENT state from the CLOSED state
103. affic count transmitted to the router is the same as the traffic count received from the multicasting source Problem Three The video stream at one of my end stations is of pretty poor quality Video serving is a resource intensive application Because it uses isochronous workload data must be fed at a prescribed rate or end users will see glitches in the video Networks that carry data from the server to the client must be engineered to handle this heavy isochronous workload Video streams can consume large amounts of bandwidth Features and capacity of both server and network including routers bridges switches and interfaces impact the streams You should not exceed 60 of the maximum interface bandwidth For example if using a 10 Mbps Ethernet you should run a single multicasting source at no more than 6 Mbps or two sources at 3 Mbps Router ports will carry the traffic of all multicast groups so it is especially important to consider these ports in your design Note that multicasting will definitely introduce latency in all traffic on the network Plan your network carefully in order to account for capacity and latency concerns Problem Four Multicast streams of some groups are not forwarded properly Some segments without subscribers receive the traffic while some segments with subscribers don t Ensure that you do not have a situation where different multicast groups have multicast IP addresses that map to the same mult
104. ake note Notes contain helpful suggestions or references to materials not contained in this guide It is recommended that you use this guide along with the following applicable documents e RS900LWG RS930LW Family Installation Guide e RuggedCom Fiber Guide e RuggedCom Wireless Guide e White paper Rapid Spanning Tree in Industrial Networks Applicable Firmware Revision This guide is applicable to ROS software revisions v3 7 x Firmware User Guide Version Numbering System ROS has a three digit version numbering system of the form X Y Z where each digit is a number starting from zero The X Y digits represent the functional version of ROS whereas the Z digit represents firmware patches The X digit is incremented for major functional updates of the product The vi digit is incremented for minor functional updates of the product The Z digit is incremented for bug fixes cosmetic enhancements and other minor issues User guides follow the same format In general a user guide will have the same X Y digits as the firmware to which it corresponds It is RuggedCom s policy to provide Web access to only the latest patch release for a version of firmware If you decide that an upgrade is merited then getting all the fixes only makes sense It is for this reason that release notes are created detailing all patches for a given functional version ROS v3 7 0 User Guide 14 RS900LWG RS930LW 1 Administration 1 Admi
105. ameter Form Data Rate Advanced Parameters Data Rate best v Power 20 WMM Disable Enable Short Preamble Disable Enable Distance 300 Synopsis best 1 2 11 12 18 24 36 access admin access admin ROS v3 7 0 User Guide 155 RS900LWG RS930LW 7 Wireless LAN Default best This parameter allows the user to control the data link rate of the wireless interface in Mbps Power Synopsis 1 to 20 Default 20 This parameter allows the user to limit the maximum RF transmission power through a series of discrete steps WDS Synopsis Disable Enable Default Enable This parameter allows the user to enable disable the Wireless Distribution System WDS support WDS is simply a mechanism for constructing 802 11 frames using the 4 address format Note The WDS parameter must be enabled on the Access Point AP device to support RuggedWireless station s configured for Client Bridging functionality WMM Synopsis Disable Enable Default Enable Enable Wireless Multimedia Mode WMM otherwise known as QoS support for the wireless interface In the presence of DS DiffServ field in an IP datagram the mapping will be as follows e DSCP DiffServ Code Point 0x08 and 0x10 are mapped to Background e DSCP 0x20 and 0x28 are mapped to Video e DSCP 0x30 and 0x38 are mapped to Voice e All other DSCP are mapped
106. ameter allows this behavior or overrides it forcing point to point to be true or false Force the parameter true when the port operates a point to point link but cannot run the link in full duplex mode Force the parameter false when the port operates the link in full duplex mode but is still not point to point e g a full duplex link to an unmanaged bridge that concentrates two other STP bridges Restricted Role Synopsis True or False Default False A boolean value set by management If TRUE causes the Port not to be selected as the Root Port for the CIST or any MSTI even if it has the best spanning tree priority vector Such a Port will be selected as an Alternate Port after the Root Port has been selected This parameter should be FALSE by default If set it can cause a lack of spanning tree connectivity It is set by a network administrator to prevent bridges that are external to a core region of the network from influencing the spanning tree active topology This may be necessary for example if those bridges are not under the full control of the administrator ROS v3 7 0 User Guide 112 RS900LWG RS930LW 5 Spanning Tree Restricted TCN Synopsis True or False Default False A boolean value set by management If TRUE it causes the Port not to propagate received topology change notifications and topology changes to other Ports If set it can cause temporary loss of connectivity after changes in a spanning tree s a
107. and xmodem receive main bin lt CR gt When ROS responds with Press Ctrl X to cancel begin your Xmodem transmission using the means provided by your terminal software After the file transfer has been completed the device will provide an indication that the file has been transferred successfully The transcript of a sample exchange looking at the ROS CLI follows gt xmodem receive main bin Press Ctrl X to cancel Receiving data now C Received 1428480 bytes Closing file main bin main bin transferred successfully If possible select the XModem 1K protocol for transmission otherwise select XModem The device must be reset in order for the new software to take effect If you want to reset the device immediately enter reset lt CR gt The device will reboot within a few seconds 15 1 2 Upgrading Firmware Using the ROS TFTP Server This method requires that the binary image file of the main ROS application firmware along with TFTP client software be available on a computer with a network connection to the ROS device to be upgraded Note The TFTP Server parameter in IP Services Configuration controls how a TFTP client can access the device s built in TFTP server A setting of Disabled prevents all access Get Only allows retrieval of files only and Enabled allows both storing and retrieval of files Ensure that this parameter is set appropriately for the type of access you wi
108. anges from 0 to 255 Default This parameter gives the user the ability to configure the IP address of DNS server attribute within the DHCP server configuration Lease Time Synopsis 1 to 43200 Default 60 min This parameter gives the user the ability to configure the lease time attribute within the DHCP server configuration 7 2 8 Association Information The Association Information table provides detailed information on multiple wireless links with associated registered station s if the unit is configured as an AP Otherwise if the device is configured as a client this table will reflect the information of the single link to the associated AP ROS v3 7 0 User Guide 158 RS900LWG RS930LW 7 Wireless LAN access admin Association Information O0 Oa de fffe 04 1 54M 35 11136 Figure 7 17 Association Information Table Displayed information includes e MAC address the address of associated registered station e Channel Channel number in use e Rate Current data rate e RSSI Received Signal Strength Indication value RSSI is a measurement of the power present in a received RF signal e Tx Seq Transmitter sequence number e Rx Seq Receiver sequence number e Security Security setting 7 2 9 Miscellaneous Parameters The Miscellaneous Parameters forms provide the ability to perform miscellaneous tasks such as software upgrade display wireless interface status system
109. arm configuration in ROS e Alarms at levels CRITICAL or ALERT are not configurable nor can they be disabled e The Level field is read only the preconfigured alarm level is not a configurable option e Alarms cannot be added to or deleted from the system e Alarm configuration settings changed by a user will be saved in the configuration file e The alarms CLI command lists all alarms configurable and non configurable ROS v3 7 0 User Guide 214 RS900LWG RS930LW 13 Diagnostics Log out Alarms access admin Back _InsertRecord BPDU Guard activated ERRO On On On On 60s EE J 25 Om On On On Tops l e INFO Off On On Of 60s Excessive taled oginatemps WARN On On On on eos GVAP cannot lear more VLANs WARN On_ On On On fis IEEE1588 alarm ERRO On On On On Jens Inconsistent spendin unk JERRO On On On on Is Invalid configuration SS JERRO On On Off On Jens Link up down WARNIOn On On On jis ee INFo on on on or Jos Mac address authorzalion GE 120 on E E JWARN On On On On Os Mcast CPU filtering fable full WARN On_ On on on eos INTP server unreachable WARN On On On Ion 60s EE EES JERRO On On On On Jens SNMP authentication failed wan cn On On Of 60s STP Evens INFO fot OR On ot Os LTACACS responseinvalid WARN On On On On es Figure 13 2 Alarm Configuration Table ROS v3 7
110. at SFTP client software be available on a computer with a network connection to the ROS device that one wishes to back up Establish an SFTP connection with administrative privileges to the ROS device Begin transferring the desired file from the device An example of using an SFTP session to create a local backup of the ROS main firmware image to a Linux workstation follows user3lhost sftp admin3lros_ip Connecting to ros_ip admin3lros_ip s password sftp gt get main bin Downloading main bin main bin 100 2139KB 48 7KB s 00 44 sftp gt All files in ROS may be backed up using an SFTP session with administrative privileges 15 4 Using SQL Commands The ROS provides an SQL like command facility that allows expert users to perform several operations not possible under the user interface namely e Restoring the contents of a specific table but not the whole configuration to their factory defaults e Search tables in the database for specific configurations e Make changes to tables predicated upon existing configurations When combined with RSH SQL commands provide a means to query and configure large numbers of devices from a central location 15 4 1 Getting Started SQL information is obtainable via the CLI shell SQL command gt sql The SQL command provides an sql like interface for manipulating all system configuration and status parameters Entering SQL HELP command name displays detailed help for
111. ata are entered num_msgs number of datagrams within time interval time_interval basic interval in ms to send num_msgs telnet Usage telnet dest dest Server s IP address NOTE lt Ctrl C gt closes telnet session tftp Usage tftp server cmd fsource fdest server Remote TFTP server s IP address cmd put upload or get download fsource Source filename dest Destination filename NOTE lt Ctrl C gt stops a tftp transfer trace Starts event tracing Run trace for more help type Displays the contents of a text file Enter dir for a directory listing of files ROS v3 7 0 User Guide 256 RS900LWG RS930LW Appendix E Command Line Listing type filename version Prints software versions xmodem xmodem direction filename direction send send file to client receive receive file from client filename Enter dir for list of all filenames ROS v3 7 0 User Guide 257 RS900LWG RS930LW Index Index A Alarms Active Alarms 213 Critical Failure Relay 214 Passive Alarms 214 Using Alarms 213 C CLI Shell Command clearlogs 225 dir 224 help 224 ipconfig 228 ping 225 reset 229 Summary 223 trace 226 type 225 Configuration Update 233 CoS Configuration 175 CoS Classes of Service Operation 174 DSCP 180 CoS Configuration 170 D DHCP Relay 46 Diagnostics CPU Diagnostics 218 Product Information 220 System Log 219 E Ethernet Cabl
112. ation In other words the wireless network model expects that only the AP device will be connected to a wired LAN i e fixed end distribution service while each station will represent an individual stand alone remote client with a single network address Examples of a typical IEEE802 11 station device include PDAs mobile gaming consoles e g Sony PSP and laptop PCs The RuggedWireless network model extends the IEEE802 11 infrastructure mode functionality to provide seamless wireless connectivity to multiple network devices connected to the switched wired LAN side of a single wireless station device In this way full Layer 2 traffic bridging is achieved between the switched wired LAN on the AP device and the switched wired LAN on the Client Bridge device while communicating over a wireless medium The RuggedWireless Client Bridge extensions include the integration of the following components e 802 11 infrastructure mode STA ROS v3 7 0 User Guide 144 RS900LWG RS930LW 7 Wireless LAN e WDS Wireless Distribution System and e Ethernet bridging functionality single wireless STA bridging multiple wired devices Infrastructure BSS Distribution i s Distribution System media _ System Figure 7 2 RuggedWireless Client Bridge Infrastructure Basic Service Set extensions diagram Note The Client Bridge always supports a bridged single network
113. ative privileges to the ROS device to be upgraded Begin a transfer to the device specifying a destination filename of main bin An SFTP client utility will provide an indication that the file was transferred properly but again it is recommended to also query the device directly in order to verify successful transfer A sample SFTP session to upgrade the ROS main firmware image from a Linux workstation follows user host sftp admin ros_ip Connecting to ros_ip admin ros_ip s password sftp gt put ROS CF52_Main_v3 7 0 bin main bin Uploading ROS CF52_Main_v3 7 0 bin to main bin ROS CF52_Main_v3 7 0 bin 100 2139KB 48 6KB s 00 44 sftp 15 2 Updating Configuration ROS maintains its complete configuration in an ASCII text file in CSV Comma Separated Value format All configuration changes whether they are performed using the web interface console interface CLI SNMP or SQL are stored in this one file The file named config csv may be read from and written to the ROS device in all the same ways that firmware image files can as described in the preceding sections The configuration file may be copied from the unit and used ROS v3 7 0 User Guide 233 RS900LWG RS930LW 15 Firmware Upgrade and Configuration Management as a backup to be restored at a later date Configuration files from different units may be compared using standard text processing tools The transfer mechanisms supported for the update of config cs
114. be granted WriteViewName Synopsis noView V1Mib allOfMib Default noView This parameter identifies the MIB tree s to which this entry authorizes write access If the value is noView then write access will not be granted ROS v3 7 0 User Guide 40 RS900LWG RS930LW 1 Administration NotifyViewName Synopsis noView V1Mib allOfMib Default noView This parameter identifies the MIB tree s to which this entry authorizes access for notifications If the value is noView then access for notifications will not be granted 1 12 RADIUS RADIUS Remote Authentication Dial In User Service is used to provide centralized authentication and authorization for network access ROS assigns a privilege level of Admin Operator or Guest to a user who presents a valid user name and password The number of users who can access the ROS server is ordinarily dependent on the number of user records which can be configured on the server itself ROS can also however be configured to pass along the credentials provided by the user to be remotely authenticated by a RADIUS server In this way a single RADIUS server can centrally store user data and provide authentication and authorization service to multiple ROS servers needing to authenticate connection attempts 1 12 1 RADIUS overview RADIUS described in RFC 2865 http tools ietf org html rfc2865 is a UDP based protocol is used for carrying authentication authorization and c
115. bility In addition to supporting multiple spanning trees in a network of MSTP capable bridges MSTP is capable of interoperating with bridges that support only RSTP or legacy STP without requiring any special configuration An MST region may be defined as the set of interconnected bridges whose MST Region Identification is identical see section Section 5 4 3 MST Region Identifier The interface between MSTP bridges and non MSTP bridges or between MSTP bridges with different MST Region Identification information becomes part of an MST Region boundary Bridges outside an MST region will see the entire region as though it were a single R STP bridge the internal detail of the MST region is hidden from the rest of the bridged network In support of this MSTP maintains separate hop counters for spanning tree information exchanged at the MST region boundary versus that propagated inside the region For information received at the MST region boundary the R STP Message Age is incremented only once Inside the region a separate Remaining Hop Count is maintained one for each spanning tree instance The external Message Age parameter is referred to the R STP Maximum Age Time whereas the internal Remaining Hop Counts are compared to an MST region wide Maximum Hops parameter An MSTI Multiple Spanning Tree Instance is one of sixteen independent spanning tree instances that may be defined in an MST region not including the IST see b
116. bridge The status may be root or designated This field may display Not designated For Any LAN if the bridge is not the designated bridge for any of its ports Bridge ID Synopsis where is 0 to 65535 is 0 to FF Bridge Identifier of this bridge Root ID Synopsis where is 0 to 65535 is 0 to FF Bridge Identifier of the root bridge Root Port Synopsis 0 to 65535 or lt empty string gt If the bridge is designated this is the port that provides connectivity towards the root bridge of the network Root Path Cost Synopsis 0 to 4294967295 The total cost of the path to the root bridge composed of the sum of the costs of each link in the path If custom costs have not been configured 1Gbps ports will contribute a cost of four 100 Mbps ports will contribute 19 and 10 Mbps ports will contribute 100 to this figure For the CIST instance of MSTP this is an external root path cost which is the cost of the path from the IST root i e regional root bridge to the CST root i e network global root bridge Total Topology Changes Synopsis 0 to 65535 A count of topology changes in the network as detected on this bridge through link failures or as signaled from other bridges Excessively high or rapidly increasing counts signal network problems ROS v3 7 0 User Guide 122 RS900LWG RS930LW 5 Spanning Tree 5 5 4 Port MSTI Statistics Port MSTI Stati
117. ce eeeeeeteeeeeeeeeeeeeeeeeeeeeeteaeeeeeees 165 7 3 6 Spanning Tree over WLAN sz rates eessen eat 166 7 3 1 Config ration changes isere ooet Ara e An anaa AEE E Mle a 166 7 3 8 WLAN Firmware feature dependences 167 8 POM TEE 168 Bob ROM Security E AUN EE 168 8 1 1 Static MAC address based authorization ccccceeeeeeeeeeeeeeeeeeeeeeeeeeeeeneees 168 8 1 2 IEEE 802 1X Authentication ed egene Eege EE dE 168 8 2 Port Security Configuration sue geed EE 170 8 2 1 Port Security EE 170 Bie 2 BOA AY E 172 9 Classes of Service xin Set acdc eege geb eech 174 BL COS Operation ane eege 174 9 1 1 Inspection NEE 174 GEN EE re le Le RE 175 9 2 CoS lee Ee 175 9 2 1 Global CoS Parameters use gedet eden dei 176 9 22 POM GoS Parameters ege e CES 177 9 2 3 Priority to GOS E Te ue EE 178 9 2 4 DSCP to CoS Mapping EE 180 10 M lticast Fitering WEE 182 ten KE Il 182 10 1 1 Router and Host IGMP Operation EEN 182 10 1 2 Switch IGMP Operation EE 183 10 1 3 Combined Router and Switch IGMP Operation sssssesseeeeeenneeserrrneererreeree 185 10 2 GMRP GARP Multicast Registration Protocol AA 186 10 2 1 GMRP le 187 10 3 Multicast Filtering Configuration and Status cceeeeeeeeeeeeeeeeeeeneeeeeeteeeeene 189 10 3 1 Configuring IGMP Parameters si s 2 csceesicoctaviisttdendanictequncectenaieecnuanceed 190 10 3 2 Configuring Static Multicast Groups gea etegeehr See eschiedreegengbegeee eben 192 10 3
118. ce time e The switch will immediately issue IGMP queries if in IGMP Active mode to obtain potential new group membership information e The switch can be configured to flood multicast streams temporarily out of all ports that are not configured as RSTP Edge Ports 10 1 3 Combined Router and Switch IGMP Operation This section describes the additional challenges of multiple routers VLAN support and switching Producer P1 resides upon VLAN 2 while P2 resides upon VLAN 3 Consumer C1 resides upon both VLANs whereas C2 and C3 reside upon VLANs 3 and 2 respectively Router 2 resides upon VLAN 2 presumably to forward multicast traffic to a remote network or act as a source of multicast traffic itself Multicast Router 2 Figure 10 2 IGMP Operation Example 2 In this example we will assume that all the devices agree that router 1 is the querier for VLAN 2 and router 2 is simply a non querier In this case the switch will periodically receive queries from router 1 and thus maintain the information concerning which of its ports links to the multicast ROS v3 7 0 User Guide 185 RS900LWG RS930LW 10 Multicast Filtering router However the switch port that links to router 2 must be manually configured as a router port Otherwise the switch will send neither multicast streams nor joins leaves to router 2 Note that VLAN 3 does not have an external multicast router The switch should be configured to operate in its
119. cific currently defined as the following ROS v3 7 0 User Guide 41 RS900LWG RS930LW 1 Administration vendor ID RuggedCom Inc enterprise number 15004 assigned by the Internet Assigned Numbers Authority IANA string sub attribute containing specific values subtype 1 vendor s name subtype length 11 total length of sub attribute of subtype 1 ASCII string RuggedCom Two RADIUS servers Primary and Secondary are configurable per device If the Primary Server is not reachable the device will automatically fall back to the Secondary server to complete the authorization process The vendor specific attribute is used to determine the access level from the server which may be configured at the RADIUS server with the following information e Vendor ID RuggedCom Inc enterprise number 15004 assigned by Internet Assigned Numbers Authority IANA e Sub attribute Format String e Vendor Assigned Sub Attribute Number 2 e Attribute value any one of admin operator guest Note If no access level is received in the response packet from the server then no access will be granted to the user An Example of a RuggedCom Dictionary for a FreeRADIUS server VENDOR RuggedCom 15004 BEGIN VENDOR RuggedCom ATTRIBUTE RuggedCom Privilege level 2 string END VENDOR RuggedCom Sample entry for user admin Adding Users admin Auth Type Local User Password admin RuggedCom Privi
120. come of non queriers participating only forward multicast traffic Switches running in Active IGMP mode participate in the querier election like multicast routers e When the querier election process is complete the switch simply relays IGMP queries received from the querier e When sending IGMP packets the switch uses its own IP address if it has one for the VLAN on which packets are sent or an address of 0 0 0 0 if it doesn t have an assigned IP address Note IGMP Snooping switches perform multicast pruning using a multicast frames destination MAC multicast address which depends on the group IP multicast address IP address W X Y Z ROS v3 7 0 User Guide 184 RS900LWG RS930LW 10 Multicast Filtering corresponds to MAC address 01 00 5E XX YY XX where XX is the lower 7 bits of X and YY and ZZ are simply Y and Z coded in hexadecimal One can note that IP multicast addresses such as 224 1 1 1 and 225 1 1 1 will both map onto the same MAC address 01 00 5E 01 01 01 This is indeed a problem for which the IETF Network Working Group currently has offered no solution Users are advised to be aware of and avoid this problem IGMP and RSTP An RSTP change of topology can render the routes selected to carry multicast traffic as incorrect This results in lost multicast traffic If RSTP detects change in the network topology IGMP will take some actions to avoid loss of multicast connectivity and reduce network convergen
121. count of configuration change notification messages received on this port Excessively high or rapidly increasing counts signal network problems TX Tens Synopsis 0 to 4294967295 The count of configuration messages transmitted from this port Desig Bridge ID Synopsis H where is 0 to 65535 is 0 to FF Provided on the root ports of designated bridges the Bridge Identifier of the bridge this port is connected to operEdge Synopsis True or False Whether or not the port is operating as an edge port 5 5 3 Bridge MSTI Statistics Bridge MSTI Statistics Instance ID 1 GET Bridge Status Root Bridge Bridge ID 32768 00 0A DC 00 41 74 Root ID 32768 00 0A DC 00 41 74 Root Part Root Path Cost 0 Ges Topology i anges L Figure 5 17 Bridge MSTI Statistics Form Instance ID Synopsis 0 to 16 ROS v3 7 0 User Guide 121 RS900LWG RS930LW 5 Spanning Tree Default 1 The Instance ID refers to the MSTI Multiple Spanning Tree Instance ID Specify an Instance ID and select GET in order to load parameters corresponding to the selected MSTI Note Bridge Statistics for the IST MSTI zero are accessible via the Bridge RSTP Statistics menu see section Section 5 5 1 Bridge RSTP Statistics Bridge Status Synopsis lt empty string gt Designated Bridge Not Designated For Any LAN Root Bridge Spanning Tree status of the
122. ct mode gt sql select from ethportcfg where Media_Type Auto_Select Port Name Status Media Type Flow Control FEFI Link Alarms 5 Port 7 Enabled Auto Select Enabled Disabled Enabled 6 Port 8 Enabled Auto Select Disabled Disabled Enabled 2 records selected It is also possible to select rows based on multiple parameters using and and or operations between comparisons in the where clause For example gt sql select from ethportcfg where Media_Type Auto_Select and Flow_control Disabled Port Name Status Media Type Flow Control FEFI Link Alarms 6 Port 8 Enabled Auto Select Disabled Disabled Enabled 1 records selected 15 4 4 Changing Values in a Table The where clause can be used to select rows in a table and to modify the fields in that row As an example suppose that it is desirable to identify all ports on the device operating in 100 Mbps full duplex mode with flow control disabled and to enable flow control on these ports gt sql update ethportcfg set flow_control enabled where media_type Auto_Select and flow_control disabled 1 records updated 15 4 5 Setting Default Values in a Table It is sometimes desirable to restore one table to its factory defaults without modifying the remainder of the configuration The sql default command allows an individual table to be defaulted gt sql default into ethportcfg 15 4 6 Using RSH and SQL The combination of remote shell sc
123. ctive topology as a result of persistent incorrectly learned station location information It is set by a network administrator to prevent bridges that are external to a core region of the network from causing address flushing in that region This may be necessary for example if those bridges are not under the full control of the administrator or if the MAC_Operational status parameter for the attached LANs transitions frequently 5 4 3 MST Region Identifier access admin MST Region Identifier Name 00 04 DC 00 41 74 Revision Level 0 Digest AC36177F50283CD4B83821 D8AB26L Figure 5 10 MST Region Identifier Form Name Synopsis Any 32 characters Default 00 0A DC 00 41 74 Variable length text string You must configure an identical region name on all switches you want to be in the same MST region Revision Level Synopsis 0 to 65535 Default 0 Use this parameter if you want to create a new region from a subset of switches in a current region while maintaining the same region name Digest Synopsis 32 hex characters This is a read only parameter and should be only used for network troubleshooting In order to ensure consistent VLAN to instance mapping it is necessary for the protocol to be able to ROS v3 7 0 User Guide 113 RS900LWG RS930LW 5 Spanning Tree exactly identify the boundaries of the MST regions For that purpose the characteristics of the region are included in BPDUs There
124. cts the data item by selecting the field to edit with the mouse entering a new value and clicking on the apply field More than one parameter may be modified at a time ROS v3 7 0 User Guide 21 RS900LWG RS930LW 1 Administration IP Services access admin Inactivity Timeout Disabled ep Telnet Sessions Allowed Web Server Users Allowed 16 TFTP Server Enabled ModBus Address Disabled SSH Sessions Allowed a RSH Server Disabled Enabled Figure 1 6 Parameters Form Example Some menus will require you to create or delete new records of information 1 3 4 Updating Statistics Displays You may click the refresh button to update statistics displays 1 4 Administration Menu The Administration menu provides ability to configure network and switch administration parameters ROS v3 7 0 User Guide 22 RS900LWG RS930LW 1 Administration oe access a admin e Administration e Configure IP Interfaces e Configure IP Gateways e Configure IP Services e Configure System Identification e Configure Passwords e Configure Time and Date e Configure SNMP e Configure SNMP Users e Configure SNMP Security to Group Maps e Configure SNMP Access e Configure Security Server e Configure RADIUS Server e Configure TACACS Server e Configure DHCP Relay Agent e Configure Syslog e Configure Local Syslo e Configure Remote Syslog Cli
125. d 1000 Kbps Broadcast Disabled 1000 Kbps Broadcast Disabled 1000 Kbps Broadcast Disabled 10 1000 Kbps Broadcast Disabled ko eo Jen on as oo so Figure 2 5 Port Rate Limiting Table ROS v3 7 0 User Guide 56 RS900LWG RS930LW 2 Ethernet Ports se Lie a access Log out Port Rate Limiting admin Back Port fi Ingress Limit 1000Kbps lyngress Frames Broadcast sl Egress Limit Disabled Apply Reload Figure 2 6 Port Rate Limiting Form Port Synopsis 1 to maximum port number Default 1 The port number as seen on the front plate silkscreen of the switch Ingress Limit Synopsis 62 to 256000 Kbps or Disabled Default 1000 Kbps The rate at which received frames of the type described by the ingress frames parameter will start to be discarded by the switch Ingress Frames Synopsis Broadcast Multicast All Default Broadcast This parameter specifies the types of frames to rate limit on this port It applies only to received frames BROADCAST only broadcast frames will be limited MULTICAST all multicast frames including broadcast will be limited ALL all frames both multicast and unicast will be limited Egress Limit Synopsis 62 to 256000 Kbps or Disabled Default Disabled The maximum rate at which the switch will transmit multicast broadcast and unicast frames on this port The switch w
126. d Disabled Edge 1 Untagged Disabled Edge 1 Untagged Disabled Edge 1 Untagged Disabled kel Jak ES eo kal m CH a D Figure 6 9 Port VLAN Parameters Table ROS v3 7 0 User Guide 138 RS900LWG RS930LW 6 VLANs Port VLAN Parameters ists tg SS e e an admin Port s Type Edge PVID 1 PVID Format Untagged Tagged GVRP Disabled Apply Reload Figure 6 10 Port VLAN Parameters Form Port s Synopsis Any combination of numbers valid for this parameter The port number as seen on the front plate silkscreen of the switch or a list of ports if aggregated in a port trunk Type Synopsis Edge Trunk PVLANEdge QinQ Default Edge This parameter specifies how the port determines its membership in VLANs There are few types of ports Edge the port is only a member of one VLAN its native VLAN specified by the PVID parameter Trunk the port is automatically a member of all configured VLANs Frames transmitted out of the port on all VLANs except the port s native VLAN will be always tagged It can also be configured to use GVRP for automatic VLAN configuration PVLANEdge the port is only a member of one VLAN its native VLAN specified by the PVID parameter and does not forward traffic to other PVLANedge ports within the same VLAN QinQ the port is a trunk port using double VLAN tagging or nested VLANs An extra VLAN tag is always added to all frames egressing this port VID
127. d duplex settings are aggregated If auto negotiation is used make sure it is resolved to the same speed for all ports in the port trunk e To geta value of an Ethernet statistics counter for the port trunk add the values of the counter of all ports in the port trunk ROS v3 7 0 User Guide 90 RS900LWG RS930LW 4 Link Aggregation 4 1 2 Link Aggregation Limitations A port mirroring target port can not be member of a port trunk However a port mirroring source port can be member of a port trunk A port working in QinQ mode cannot be a member of a port trunk DHCP Relay Agent Client port cannot be a member of a port trunk Load balancing between the links of a bundle is randomized and may not be ideal For instance if three 100Mbs links are aggregated the resulting bandwidth of the port trunk may not be precisely 300Mbs A Static MAC Address should not be configured to reside on an aggregated port it may cause some frames destined for that address to be dropped A secure port cannot be a member of a port trunk Note The port trunk must be properly configured on both sides of the aggregated link In switch to switch connections if the configuration of both sides does not match i e some ports are mistakenly not included in the port trunk it will result in a loop So the following procedure is strongly recommended to configure a port trunk 1 Disconnect or disable all the ports involved in the configuration
128. designated for i e carries traffic towards the root for the LAN it is connected to Root The single port on the bridge which provides connectivity towards the root bridge Backup The port is attached to a LAN that is serviced by another port on the bridge It is not used but is standing by Alternate The port is attached to a bridge that provides connectivity to the root bridge It is not used but is standing by Cost Synopsis 0 to 4294967295 Cost offered by this port If the Bridge RSTP Parameters Cost Style is set to STP 1Gbps ports will contribute a cost of four 100 Mbps ports will contribute 19 and 10 Mbps ports contribute 100 If the Cost Style is set to RSTP 1Gbps will contribute 20 000 100 Mbps ports will contribute a cost of 200 000 and 10 Mbps ports contribute a cost of 2 000 000 Note that even if the Cost Style is set to RSTP a port that migrates to STP will have its cost limited to a maximum of 65535 RX RSTs Synopsis 0 to 4294967295 The count of RSTP configuration messages received on this port TX RSTs Synopsis 0 to 4294967295 The count of RSTP configuration messages transmitted on this port RX Configs Synopsis 0 to 4294967295 The count of STP configuration messages received on this port TX Configs Synopsis 0 to 4294967295 ROS v3 7 0 User Guide 120 RS900LWG RS930LW 5 Spanning Tree The count of STP configuration messages transmitted on this port RX Tcns Synopsis 0 to 4294967295 The
129. dge and other third party AP equipment 7 3 4 3 Client IP Bridge When the RS900W is configured as a Client IP Bridge there is a limit to the number of device addresses which can be connected to the wired switch ports and bridged by the single wireless client e Number of devices bridged by a single Client IP Bridge unit 31 devices L2 addresses Note The RuggedWireless Client IP Bridge configuration is designed to bridge only IP and ARP traffic 7 3 4 4 Differences between Client Bridge and Client IP Bridge Client Bridge Client IP Bridge Configuration The Operational Mode parameter in the WLAN Addressing Menu is used to choose either Client Bridge or Client IP Bridge Traffic Forwarding Any Ethernet encapsulated protocol IP and ARP only supported Interoperability Works with RuggedWireless AP only Works with any AP 7 3 5 Compatibility and Interoperability 7 3 5 1 What is WDS Where is it used WDS stands for Wireless Distribution System The WDS material describes de facto i e industry accepted extensions to the IEEE 802 11 frame format Fundamentally it extends the IEEE 802 11 MAC frame format from a conventional three address field format to one which utilizes ROS v3 7 0 User Guide 165 RS900LWG RS930LW 7 Wireless LAN four address fields The ultimate use of the additional fourth address field however remains unspecified within WDS and so implem
130. dynamically learn VLANs Only Trunk ports are GVRP capable 6 3 4 VLAN Summary There are actually three ways that a VLAN can be created in the switch Explicit A VLAN is explicitly configured in the Static VLANs list Implicit A VLAN ID is a parameter required for different feature configurations e g Port VLAN Parameters Static MAC Addresses IP Interface Type and ID When such a parameter is set to some VLAN ID value appropriate VLAN is automatically created if it does not yet exist Dynamic A VLAN learned through GVRP Note Not explicitly created VLAN is always created with IGMP Snooping disabled If it is desirable for IGMP to be used on that VLAN it should be created as a Static VLAN with IGMP enabled All VLANs regardless of the way they were created are shown in the VLAN Summary ROS v3 7 0 User Guide 140 RS900LWG RS930LW 6 VLANs VLAN Summary Figure 6 11 VLAN Summary Table VID Synopsis 1 to 4094 The VLAN Identifier is used to identify the VLAN in tagged Ethernet frames according to IEEE 802 1Q Untagged Ports Synopsis Any combination of numbers valid for this parameter All ports that are untagged members of the VLAN Tagged Ports Synopsis Any combination of numbers valid for this parameter All ports that are tagged members of the VLAN 6 4 Troubleshooting Problem One don t need VLANs at all How do turn them off Simply leave all ports set to typ
131. e 2 Gs MAC None Dont sbutdown 1 address 3 Staticmac 1 60s Autolearning over 1 address 4 Off None Dont shutdown Unsecure D Off None Dont shutdown Unsecure le of None Dontshutdown Unsecure Z 802 1X None Dont shutdown Unauthorized Connecting a None Dontshutdown Unsecure Figure 8 4 Port Security Parameters Table ROS v3 7 0 User Guide 170 RS900LWG RS930LW 8 Port Security P access Log out Port Security adni Back Port H Security Off M Autolearn None Shutdown Time Don tshutdown Status Unsecure Apply Reload Figure 8 5 Port Security Parameters Form Port Synopsis 1 to maximum port number Default 0 The port number as seen on the front plate silkscreen of the switch Security Synopsis Off Static MAC 802 1X Default Off Enables or disables the port s security feature Two types of port access control are available Static MAC address based With this method authorized MAC address es should be configured in the Static MAC Address table If some MAC addresses are not known in advance or it is not known to which port they will be connected there is still an option to configure the switch to auto learn certain number of MAC addresses Once learned they don t age out until the unit is reset or the link goes down IEEE 802 1X standard authentication Autolearn Synopsis 1 to maximum number or None Default None Specifies the maximu
132. e Edge and leave the native VLAN set to 1 This is the default configuration for the switch Problem Two have added two VLANs 2 and 3 made a number of ports members of these VLANS Now I need some of the devices in one VLAN to send messages to some devices in the other VLAN If the devices need to communicate at the physical address layer they must be members of the same VLAN If they can communicate in a Layer 3 fashion i e using a protocol such as IP or IPX you can use a router The router will treat each VLAN as a separate interface which will have its own associated IP address space ROS v3 7 0 User Guide 141 RS900LWG RS930LW 6 VLANs Problem Three have a network of thirty switches for which wish to restrict management traffic to a separate domain What is the best way of doing this while still staying in contact with these switches At the switch where the management station is located configure a port to use the new management VLAN as its native VLAN Configure a host computer to act as a temporary management station At each switch configure the management VLAN to the new value As each switch is configured you will immediately lose contact with it but should be able to re establish communications from the temporary management station After all switches have been taken to the new management VLAN configure the ports of all attached management devices to use the new VLAN Note Establish
133. e The SQL select subcommand is used to retrieve table information The command sql select from tablename provides a summary of the parameters within the table as well as their values gt sql select from ipcfg IP Address Type IP Address Subnet Gateway Management VLAN Inactivity Timeout Telnet Sessions Allowed Web Server Users Allowed TFTP Server ModBus Address SSH Sessions Allowed Static 10 90 0 2 255040 0 1 Disabled 8 16 Get Only Disabled 8 1 records selected Retrieving a Parameter from a Table SQL select command may be used to retrieve a particular parameter from a table SQL command sql select parameter_name from tablename is used for this purpose The parameter name is always the same as those displayed in the menu system If the parameter name has spaces in it e g IP Address the spaces must be replaced with underscores or the name must be quoted gt sql select ip address from ipcfg IP Address 192 168 0 8 1 records selected ROS v3 7 0 User Guide 236 RS900LWG RS930LW 15 Firmware Upgrade and Configuration Management Retrieving a Table with the Where Clause It is useful to be able to display specific rows of a table predicated upon the row having parameters of a specific value Addition of where clause to the select statement will limit the results returned For example suppose that it is desirable to identify all ports on the device operating in Auto Sele
134. e selected port e Fail the number of times that cable diagnostics failed on the selected port e Total the total number of times that cable diagnostics have been attempted on the selected port 2 2 4 1 Running Cable Diagnostics To start cable diagnostics on a port ROS v3 7 0 User Guide 61 RS900LWG RS930LW 2 Ethernet Ports 1 Connect a Category 5 or better quality cable to the port under test PUT 2 Connect the other end of the cable to a similar network port For example connect 100BASE T port to a 100BASE T port 1O00BASE T port to a 1000BASE T port 3 Configure the PUT s Runs count 4 Configure the PUT s cable diagnostics State to Started To stop cable diagnostics on a port 1 Configure the PUT s cable diagnostics state to Stopped Diagnostics may be stopped at any point If a stop is issued in the middle of a diagnostics run it will nevertheless run to completion and the results will be updated Note Both the port under test PUT or partner port PT can be configured to be either in Enabled mode with auto negotiation or in Disabled mode Other modes may interfere with the cable diagnostics procedure and are not recommended 2 2 4 2 Interpreting Cable Diagnostics Results Four different conditions are reported for the state of a cable under examination e Good No fault is detected on the tested cable e Open Opened cable pair s is are detected on the tested cable e Short Sh
135. e 19 and 10 Mbps ports will contribute 100 For the CIST instance of MSTP this is an external root path cost which is the cost of the path from the IST root i e regional root bridge to the CST root i e network global root bridge Configured Hello Time Synopsis 0 to 65535 The configured Hello time from the Bridge RSTP Parameters menu Learned Hello Time Synopsis 0 to 65535 The actual Hello time provided by the root bridge as learned in configuration messages This time is used in designated bridges Configured Forward Delay Synopsis 0 to 65535 The configured Forward Delay time from the Bridge RSTP Parameters menu Learned Forward Delay Synopsis 0 to 65535 The actual Forward Delay time provided by the root bridge as learned in configuration messages This time is used in designated bridges Configured Max Age Synopsis 0 to 65535 The configured Maximum Age time from the Bridge RSTP Parameters menu Learned Max Age Synopsis 0 to 65535 The actual Maximum Age time provided by the root bridge as learned in configuration messages This time is used in designated bridges Total Topology Changes Synopsis 0 to 65535 A count of topology changes in the network as detected on this bridge through link failures or as signaled from other bridges Excessively high or rapidly increasing counts signal network problems ROS v3 7 0 User Guide 118 RS900LWG RS930LW 5 Spanning Tree 5 5 2 Port RSTP Statistics Port RSTP Statist
136. e Configure Port Trunks Spanning Tree Virtual LANs Classes of Service Multicast Filtering MAC Address Tables Diagnostics Figure 4 3 Link Aggregation Menu 4 2 1 Configuring Port Trunks Log out Port Trunks Back InsertRecord E 3x100Mlbs link 2 5 6 Figure 4 4 Port Trunk Table ROS v3 7 0 User Guide 92 RS900LWG RS930LW 4 Link Aggregation Port Trunks Trunk ID H Trunk Name 3x1 OOMbs link Ports 25 6 Apply Delete Reload Figure 4 5 Port Trunk Form Trunk ID Synopsis 1 to maximum number of port trunks Default 1 Trunk number It doesn t affect port trunk operation in any way and is only used for identification Trunk Name Synopsis Any 19 characters Default Provides a description of the aggregated link purpose Ports Synopsis Any combination of numbers valid for this parameter Default None List of ports aggregated in the trunk ROS v3 7 0 User Guide 93 RS900LWG RS930LW 5 Spanning Tree 5 Spanning Tree The RuggedSwitch family of Ethernet switches provides the latest in IEEE standard Spanning Tree functionality including e Industry standard support of Rapid Spanning Tree 802 1D 2004 which features a compatibility mode with legacy STP 802 1D 1998 Industry standard support of Multiple Spanning Trees 802 1Q 2005 which is interoperable with both RSTP and legacy STP e RuggedCom RSTP feature enhancements eRSTP Superio
137. e Diagnostics 59 Link Detection 63 Loss of Link Management 51 Port Configuration 51 52 Port Mirroring 58 Port Rate Limiting 56 Resetting Ports 68 Troubleshooting Ports 68 F Factory Default Configuration Loading 221 Firmware SFTP Upgrade 233 TFTP Client Upgrade 232 TFTP Server Upgrade 232 Upgrade 230 XModem Upgrade 231 G GMRP 186 Configuration 194 Example 187 Joining 186 Leaving 187 l IGMP 182 Active and Passive Mode 183 Configuration 190 Consumers and Producers 182 general membership query 183 group specific membership query 183 leave group message 183 membership report 183 Operation 182 Interface 15 L Layer 3 switches Using 128 LLDP Configuration 204 M MAC Addresses Configuring 200 Learning Options 200 Purging 202 Viewing 199 MSTP Benefits 101 Boundary Port 101 CIST 100 CST 100 Implementing 102 IST 100 Master Port 101 MSTI 99 Operation 98 Region 99 Multicast Filtering 182 ROS v3 7 0 User Guide 258 RS900LWG RS930LW Index Configuration 189 Static Configuration 192 N Network Discovery 203 RCDP 204 P Passwords 29 R RADIUS 41 Reset Device 221 RMON 75 RMON Event Configuration 85 ROS RS232 Console Interface 15 Secure Shell Server 17 Web Server 18 RSH 228 RSTP Bridge Diameter 98 Bridge Parameters 108 Edge Ports 97 Operation 94 Path Costs 97 Point To Point Links 97 Port Parameters 110
138. e Layer 2 features e g STP VLAN CoS Multicast Filtering treat a port trunk as a single link e If STP puts an aggregated port in blocking forwarding it does it for the whole port trunk e If one of the aggregated ports joins leaves a multicast group e g via IGMP or GMRP all other ports in the trunk will join leave too e Any port configuration parameter e g VLAN CoS change will be automatically applied to all ports in the trunk e Configuration status parameters of the secondary ports will not be shown and their port numbers will be simply listed next to the primary port number in the appropriate configuration status Ul sessions For example Port CoS Parameters 1 10 No 2 5 6 0 No 3 0 No 4 0 No Fi 0 No 8 0 9 0 10 0 Figure 4 2 Displaying Port Trunk Secondary Ports in Layer 2 Feature Configuration e When a secondary port is added to a port trunk it inherits all the configuration settings of the primary port When this secondary port is removed from the port trunk the settings it had previous to the aggregation are restored e Physical layer features e g physical link configuration link status rate limiting Ethernet statistics will still treat each aggregated port separately e Physical configuration status parameters will NOT be automatically applied to other ports in the trunk and will be displayed for each port as usual e Make sure that only ports with the same speed an
139. e Static MAC Address Table If yes the CoS configured for the static MAC address is used If neither destination or source MAC address is in the Static MAC Address Table the frame ROS v3 7 0 User Guide 174 RS900LWG RS930LW 9 Classes of Service is then examined for 802 1Q tags and the priority field is mapped to a CoS If a tag is not present the frame is examined to determine if it is an IP frame If the frame is IP and inspecting TOS is enabled the CoS is determined from the DSCP field If the frame is not IP or inspecting TOS is disabled the default CoS for the port is used Received Frame MAC Address in To CoS Static MAC Address No Na Use Gg Queues of Table Egress Ports Use TOS DSCP Use DSCP to CoS Mapping Use Priority to CoS Mapping Use CoS Configured for the MAC address Figure 9 1 Determining The CoS Of A Received Frame After inspection the frame is the forwarded to the egress port for transmission 9 1 2 Forwarding Phase The inspection phase results in the CoS of individual frames being determined When these frames are forwarded to the egress port they are collected into one of the priority queues according to the CoS assigned to each frame CoS weighting selects the degree of preferential treatment that is attached to different priority queues The ratio of the number of higher CoS to lower CoS frames transmitted can be programmed If desired the user can program
140. e a Static Multicast Group via Class of Service e Industry standard support of IGMP RFC 1112 RFC 2236 versions 1 and 2 in active and passive roles e Support of IEEE 802 1Q 2005 standard GMRP GARP Multicast Registration protocol e Ability to enable or disable IGMP on a per VLAN basis e Multicast routers may be statically configured or dynamically recognized by IGMP e Routerless IGMP operation ROS performs Multicast Filtering using the following methods e Static Multicast Groups e Internet Group Management Protocol IGMP snooping e IEEE standard GARP Multicast Registration protocol GMRP Note ROS IGMP Snooping supports multicast routers using IGMP version 2 and hosts using either IGMP version 1 or 2 IGMP IGMP is used by IP hosts to report their host group memberships to multicast routers As hosts join and leave specific multicast groups streams of traffic are directed to or withheld from that host The IGMP protocol operates between multicast routers and IP hosts When an unmanaged switch is placed between multicast routers and their hosts the multicast streams will be distributed to all ports This may introduce significant traffic onto ports that do not require it and receive no benefit from it RuggedCom products with IGMP Snooping enabled will act upon IGMP messages sent from the router and the host restricting traffic streams to the appropriate LAN segments 10 1 1 Router and Host IGMP Operat
141. ed Figure 14 4 Displaying Trace Settings ROS v3 7 0 User Guide 226 RS900LWG RS930LW 14 Using the CLI Shell 14 5 1 Enabling Trace Tracing can be enabled on a per subsystem basis Obtain detailed information about individual subsystems by entering trace subsystem_name lt CR gt Some subsystems offer a mechanism to enable tracing only on certain ports gt trace stp trace stp syntax stp all verbose packets decodes STP Logging is disabled gt trace stp all STP Logging all conditions on port si gt trace link link changes LINK changes gt trace link syntax stats allon alloff LINK Logging is disabled gt trace link changes Figure 14 5 Enabling Trace 14 5 2 Starting Trace ports port_number all To start trace enter trace lt CR gt All historical trace messages may be displayed using trace noclear lt CR gt Since this may include many messages it may be more desirable to use the trace clear lt CR gt command instead This command will automatically clear the trace buffer as it starts the trace ROS v3 7 0 User Guide 227 RS900LWG RS930LW 14 Using the CLI Shell gt trace stp all STP Logging is disabled gt trace stp decodes STP Logging decodes gt trace stp port 7 STP Logging decodes on port s 7 gt trace link changes LINK changes gt trace Log
142. elow An MSTI is created by mapping a set of VLANs in ROS via the VLAN configuration to a given MSTI ID The same mapping must be configured on all bridges that are intended to be part of the MSTI Moreover all VLAN to MSTI mappings must be identical for all bridges in an MST region Note ROS supports 16 MSTIs in addition to the IST Each MSTI has a topology that is independent of every other Data traffic originating from the same source and bound to the same destination but on different VLANs on different MSTIs may therefore travel a different path across the network ROS v3 7 0 User Guide 99 RS900LWG RS930LW 5 Spanning Tree IST An MST region always defines an IST Internal Spanning Tree The IST spans the entire MST region and carries all data traffic that is not specifically allocated by VLAN to a specific MSTI The IST is always computed and is defined to be MSTI zero The IST is also the extension inside the MST region of the CIST see below which spans the entire bridged network inside and outside of the MST region and all other RSTP and STP bridges as well as any other MST regions CST The CST Common Spanning Tree spans the entire bridged network including MST regions and any connected STP or RSTP bridges An MST region is seen by the CST as an individual bridge with a single cost associated with its traversal CIST The CIST Common and Internal Spanning Tree is the union of the CST and the
143. ength is between 64 and 1536 bytes inclusive 2 Packet has invalid CRC 3 Collision Event has not been detected 4 Late Collision Event has not been detected etherStatsUndersizePkts The number of received packets which meet all the following conditions 1 Packet data length is less than 64 bytes 2 Collision Event has not been detected 3 Late Collision Event has not been detected 4 Packet has valid CRC etherStatsOversizePkts The number of packets received with data length greater than 1536 bytes and valid CRC etherStatsFragments The number of packets received which meet all the following conditions 1 Packet data length is less than 642 Collision Event has not been detected 3 Late Collision Event has not been detected 4 CRC invalid etherStatsJabbers The total number of packets received that were longer than 1518 bytes and had either a bad Frame Check Sequence or Alignment Error etherStatsCollisions The best estimate of the total number of collisions on this Ethernet segment etherStatsPkts64Octets The total number of received packets that were 64 bytes long etherStatsPkts65to127Octets The total number of received packets that were between 65 and 127 bytes long etherStatsPkts128to255Octets The total number of received packets that were between 128 and 255 bytes long etherStatsPkts256to51 1Octets etherStatsPkts512to10230ctets The total number of received packets that were be
144. ent e Configure Remote Syslog Server e Ethernet Ports e Ethernet Statistics e Link Aggregation e Spanning Tree e Virtual LANs e Port Security e Classes of Service e Multicast Filtering e MAC Address Tables e Network Discove e Diagnostics Figure 1 7 Administration Menu 1 5 IP Interfaces These parameters provide the ability to configure IP connection parameters such as address network and mask The user can configure an IP interface for each subnet VLAN One of the interfaces is configured to be the management interface IP services TFTP server SNMP server Telnet server SSH server RSH server Web server authentication using a RADIUS server DHCP client BOOTP ROS v3 7 0 User Guide 23 RS900LWG RS930LW 1 Administration client or DHCP relay agent A DHCP relay agent will be available only via the management interface Different IP interfaces must not overlap i e the subnet mask must be unique 15 IP interfaces can be configured in the device In VLAN unaware mode and in devices that do not act as switches as RMC30 only one IP interface can be configured On non management interfaces only static IP addresses can be assigned On the management interface the user can choose from the following IP Address types Static DHCP BOOTP and Dynamic Static IP Address type refers to the manual assignment of an IP address while DHCP BOOTP and Dynamic IP Address types refer to the automatic a
145. ent security access policies Multi VLAN hosts can assign different traffic types to different VLANs VLAN 3 O Switch 1 VLAN 2 Switch 2 Switch 3 VLAN 4 Figure 6 3 Multiple Overlapping VLANs ROS v3 7 0 User Guide 134 RS900LWG RS930LW 6 VLANs 6 2 2 Administrative Convenience VLANs enable equipment moves to be handled by software reconfiguration instead of by physical cable management When a host s physical location is changed its connection point is often changed as well With VLANs the host s VLAN membership and priority are simply copied to the new port 6 2 3 Reduced Hardware Without VLANs traffic domain isolation requires using separate bridges for separate networks VLANs eliminate the need for separate bridges The number of network hosts may often be reduced Often a server is assigned to provide services for independent networks These hosts may be replaced by a single multi homed host supporting each network on its own VLAN This host can perform routing between VLANs VLAN 2 199 85 245 1 25 VLAN 3 199 85 245 128 26 VLAN 4 199 85 245 192 26 Figure 6 4 Inter VLAN Communications 6 3 VLAN Configuration The Virtual LANs menu is accessible from the main menu ROS v3 7 0 User Guide 135 RS900LWG RS930LW 6 VLANs Main Menu access admin e Administration e Ethernet Ports a Ethernet Statistics e Spanning Tree E e Virtual LANs
146. entations relying on WDS tend to be vendor specific RuggedWireless relies on WDS features to implement the Client Bridging mode of operation It is important to note that the WDS features must be present in both the Access Point AP unit as well as the Client Bridge unit over the wireless network This effectively means that in order for the RuggedWireless Client Bridge units to operate correctly it must be partnered with a RuggedWireless AP unit 7 3 5 2 What is the Client Bridge mode of operation The RuggedWireless Client Bridge operating mode allows for the construction of a single bridged wireless network consisting of one IP addressed subnet applied between the AP and every wirelessly associated Client Bridge The network extends to each individually connected end point device that is attached to the Client Bridge switched ports In summary a common distribution system is maintained across the wireless medium by Layer 2 bridging between the Ethernet switched ports i e backhaul LAN of the AP and the Ethernet switched ports i e device LAN on the Client Bridge The RuggedWireless Client Bridge operational mode will only be correctly supported by a RuggedWireless AP unit 7 3 6 Spanning Tree over WLAN The spanning tree protocols STP RSTP MSTP are designed for fixed wired networks these protocols are not well suited for wireless point to multipoint bridging It is
147. ernet Out Octets R Uint32 04D2 2 Port 10 Statistics Ethernet Out Octets R Uint32 04D4 2 Port 11 Statistics Ethernet Out Octets R Uint32 04D6 2 Port 12 Statistics Ethernet Out Octets R Uint32 04D8 2 Port 13 Statistics Ethernet Out Octets R Uint32 04DA 2 Port 14 Statistics Ethernet Out Octets R Uint32 04DC 2 Port 15 Statistics Ethernet Out Octets R Uint32 04DE 2 Port 16 Statistics Ethernet Out Octets R Uint32 04E0 2 Port 17 Statistics Ethernet Out Octets R Uint32 04E2 2 Port 18 Statistics Ethernet Out Octets R Uint32 04E4 2 Port 19 Statistics Ethernet Out Octets R Uint32 04E6 2 Port 20 Statistics Ethernet Out Octets R Uint32 ROS v3 7 0 User Guide 250 RS900LWG RS930LW Appendix D ModBus Management Support and Memory Map Address Registers Description Reference Table in Ul R W Format SERIAL STATISTICS table Name uartPortStatus 0600 2 Port 1 Statistics Serial In characters R Uint32 0602 2 Port 2 Statistics Serial In characters R Uint32 0604 2 Port 3 Statistics Serial In characters R Uint32 0606 2 Port 4 Statistics Serial In characters R Uint32 0640 2 Port 1 Statistics Serial Out characters R Uint32 0642 2 Port 2 Statistics Serial Out characters R Uint32 0644 2 Port 3 Statistics Serial Out characters R Uint32 0646 2 Port 4 Statistics Serial Out characters R Uint32 0680 2 Por
148. ess can be configured without a port number being explicitly specified In this case the configured MAC address will be automatically authorized on the port where it is detected This allows devices to be connected to any secure port on the switch without requiring any reconfiguration e The switch can also be programmed to learn and thus authorize a pre configured number of the first source MAC addresses encountered on a secure port This enables the capture of the appropriate secure addresses when first configuring MAC address based authorization on a port Those MAC addresses are automatically inserted into the Static MAC Address Table and remain there until explicitly removed by the user 8 1 2 IEEE 802 1X Authentication The IEEE 802 1X standard defines a mechanism for port based network access control and provides a means of authenticating and authorizing devices attached to LAN ports ROS v3 7 0 User Guide 168 RS900LWG RS930LW 8 Port Security Although 802 1X is mostly used in wireless networks this method is also implemented in wired switches The 802 1X standard defines three major components of the authentication method Supplicant Authenticator and Authentication server Switch Server Supplicant Authenticator Figure 8 1 802 1X General Topology LAN Authentication Server RuggedSwitch supports the Authenticator component 802 1X makes use of Extended Authentication Protocol EAP which is a
149. et EEGEN 26 EE 27 1 8 Syste Jerta sicccsernasasesda nan Eed oe Ronee teed 28 E ee E 29 1 10 Wiele Oe 32 1 10 1 Configuring Time and Date EEN 33 1 40 2 Configuring IRIG EE 34 1 10 3 Time Source Selection EE 35 1 10 4 an 35 1 11 SNMP Kiatreoermengt sgeugenigesrteu ees 36 UK ETA 36 1 11 2 SNMP Security to Group Maps ssc ccet take dectetaesdte seers a cade easel ea cheetecidaaes 38 Dig KE Ee 39 at e E 41 1212 13 RADIUS QV Ore ssccisiciteitecessecedcienistediseadeteienaea canna iacmarenieie ena eee 41 1 12 2 User Login Authentication and Authorization AA 41 1 12 3 802 1X Authentication E 42 1 12 4 Radius Server Configuration ssesssseeessserreeserrresrtresssrrnnerrnnnnnrrnrnssrrrnneren nne 43 113 TACACS p oinn E R E E RE RRN 44 1 13 1 User Login Authentication and Authorization AA 44 1 13 2 TACACS Server Configuration EEN 45 ROS v3 7 0 User Guide 3 RS900LWG RS930LW Rugged Operating System 1 14 DACP Relay e EE 46 Ted SVS OC EE 47 1 15 1 Configuring Local Syslog eege EENS EL Ee 48 1 15 2 Configuring Remote Syslog Client esbsrereesegtegekgeheferas AE deene CEEac 48 1 15 3 Configuring the Remote Syslog Server ENNEN 49 TIe dee Eeer e EE 50 2 Ethernet EE 51 2 1 Controller Protection Through Link Fault Indication LFI c ceceeeeeeeeseeeeeeeetneeees 51 2 2 Ethernet Ports Configuration and Status ENNEN 52 Ee e Ee 53 2 2 2 Sen d Rate Elle e BEE 56 2 23 FO MER EE Sek sk ons samme Seay aude ep
150. et all the following conditions 1 Packet data length is greater that 1536 octets 2 Packet has invalid CRC Collisions Synopsis 0 to 4294967295 The number of received packets for which Collision Event has been detected LateCollisions Synopsis 0 to 4294967295 The number of received packets for which Late Collision Event has been detected Pkt64Octets Synopsis 0 to 4294967295 The number of received and transmitted packets with size of 64 octets This includes received and transmitted packets as well as dropped and local received packets This does not include rejected received packets Pkt65to127Octets Synopsis 0 to 4294967295 The number of received and transmitted packets with a size of 65 to 127 octets This includes received and transmitted packets as well as dropped and local received packets This does not include rejected received packets Pkt128to255Octets Synopsis 0 to 4294967295 The number of received and transmitted packets with a size of 128 to 257 octets This includes received and transmitted packets as well as dropped and local received packets This does not include rejected received packets Pkt256to511Octets Synopsis 0 to 4294967295 The number of received and transmitted packets with a size of 256 to 511 octets This includes received and transmitted packets as well as dropped and local received packets This does not include rejected received packets Pkt512to10230ctets Synopsis 0 to 4294967295 The number of received a
151. etter than the port itself would generate but not good enough to convince it to become the Root Port The port becomes the alternate to the current Root Port and will become the new Root Port should the current Root Port fail The Alternate Port does not participate in the network ROS v3 7 0 User Guide 96 RS900LWG RS930LW 5 Spanning Tree A port is a Backup Port when it receives a better message from the LAN segment it is connected to originating from another port on the same bridge The port is a backup for another port on the bridge and will become active if that port fails The Backup Port does not participate in the network 5 1 2 Edge Ports A port may be designated an Edge Port if it is directly connected to an end station As such it cannot create bridging loops in the network and can thus directly transition to forwarding skipping the listening and learning stages Edge ports that receive configuration messages immediately lose their Edge Port status and become normal spanning tree ports A loop created on an improperly connected edge port is thus quickly repaired Because an Edge Port services only end stations topology change messages are not generated when its link toggles 5 1 3 Point to Point and Multipoint Links RSTP uses a peer peer protocol called Proposing Agreeing to ensure transitioning in the event of a link failure This protocol is point to point and breaks down in multipoint situations i e when mo
152. ettings but can reset alarms clear statistics and logs e admin user can change all the settings and run commands access Passwords 2 SE admin Auth Type Local RADIUS O Guest Username quest Guest Password Operator Username operator Operator Password operator Admin Username admin Admin Password admin Figure 1 13 Passwords Form Auth Type Synopsis Local RADIUS TACACS RADIUSorLocal TACACS orLocal Default Local Password authentication can be performed using locally configured values a remote RADIUS server or a remote TACACS server Setting this value to one of the combinations that includes RADIUS or TACACS requires that the Security Server Table be configured e Local authentication from the local Password Table ROS v3 7 0 User Guide 30 RS900LWG RS930LW 1 Administration e RADIUS authentication using a RADIUS server e TACACS authentication using a TACACS server e RADIUSOrLocal authentication using RADIUS If the server cannot be reached authenticate from the local Password Table e TACACS OrLocal authentication using TACACS If the server cannot be reached authenticate from the local Password Table Guest Username Synopsis 15 character ASCII string Default guest Related password is in the Guest Password field view only cannot change settings or run any commands Guest Password Synopsis 15 character ASCII stri
153. evice E g If Max number of ports on RuggedCom device to which you are talking to is 20 Response may look like ROS v3 7 0 User Guide 252 RS900LWG RS930LW Appendix D ModBus Management Support and Memory Map 0x04 0x04 OxF2 0x76 0x00 0x05 In the above response bytes 3 and 4 refer to register 1 i e register at location OXO3FE indicating port status of ports 1 16 and Byte 5 and 6 representing register 2 at location OxO3FF would refer to port status from 17 32 though in this case since device has only 20 ports so byte 6 would contain the status for ports 17 20 starting from right to left Rest of the bits in register 2 corresponding to non existing ports would be zero Performing write actions on the device using PortCmd Write multiple register request to clear Ethernet port statistics 0x10 0x00 0x83 0x00 0x01 2 0x55 0x76 0x00 0x50 Bit value 1 implies clear Ethernet statistics on a corresponding port Bit value 0 corresponding to a port means do nothing Response may look like 0x10 0x00 0x81 0x00 0x02 D 1 6 Alarm This format is also another form of text description This text corresponds to the alarm description from the table holding all the alarms Similar to the Text format this format would also have ASCII representation of alarms Please note that alarms are stacked in RuggedCom device in the sequence of their occu
154. ge RSTP Statistics Se Back Bridge Status Designated Bridge Bridge ID 32768 00 0A DC 00 41 74 Root ID 32768 00 04 DC 00 10 51 Root Port 2 Root Path Cost 19 Configured Hello Time 2 Learned Hello Time 2 Configured Forward Delay 15 Learned Forward Delay 15 Configured Max Age 20 Learned Max Age EU Total Topology Changes 15 Figure 5 14 Bridge RSTP Statistics Form Bridge Status Synopsis lt empty string gt Designated Bridge Not Designated For Any LAN Root Bridge Spanning Tree status of the bridge The status may be root or designated This field may display Not designated For Any LAN if the bridge is not the designated bridge for any of its ports Bridge ID Synopsis where is 0 to 65535 is 0 to FF Bridge Identifier of this bridge Root ID Synopsis where is 0 to 65535 is 0 to FF ROS v3 7 0 User Guide 117 RS900LWG RS930LW 5 Spanning Tree Bridge Identifier of the root bridge Root Port Synopsis 0 to 65535 or lt empty string gt If the bridge is designated this is the port that provides connectivity towards the root bridge of the network Root Path Cost Synopsis 0 to 4294967295 The total cost of the path to the root bridge composed of the sum of the costs of each link in the path If custom costs have not been configured 1Gbps ports will contribute a cost of four 100 Mbps ports will contribut
155. ge with the lowest ID is elected as the root bridge After startup when all bridges agree on the root bridge s ID the path cost is used to select root ports If the path costs of candidates for the root port are the same the ID of the peer bridge is used to select the port Finally if candidate root ports have the same path cost and peer bridge ID the port ID of the peer bridge is used to select the root port In all cases the lower ID path cost or port ID is selected as the best ROS v3 7 0 User Guide 97 RS900LWG RS930LW 5 Spanning Tree When the link auto negotiation method is used the port cost is derived from the speed of the link This method is useful when a well connected network has been established It can be used when the designer is not too concerned with the resultant topology as long as connectivity is assured Manual configuration is useful when the exact topology of the network must be predictable under all circumstances The path cost can be used to establish the topology of the network exactly as the designer intends STP vs RSTP Costs The IEEE 802 1D 1998 specification limits port costs to values of 1 to 65536 It recommends that a path cost corresponding to the 1x109 link speed be used Designed at a time when 9600 bps links were state of the art this method breaks down in modern use as the method cannot represent a link speed higher than a gigabit per second In order to remedy this problem in future ap
156. gnificant innovations including e Topology changes in RSTP can originate from and be acted upon by any designated bridges leading to more rapid propagation of address information unlike topology changes in STP which must be passed to the root bridge before they can be propagated to the network e RSTP explicitly recognizes two blocking roles Alternate and Backup Port which are included in computations of when to learn and forward STP however recognizes only one state Blocking for ports that should not forward e RSTP bridges generate their own configuration messages even if they fail to receive any from the root bridge This leads to quicker failure detection STP by contrast must relay configuration ROS v3 7 0 User Guide 94 RS900LWG RS930LW 5 Spanning Tree 5 1 1 State messages received on the root port out its designated ports If an STP bridge fails to receive a message from its neighbor it cannot be sure where along the path to the root a failure occurred e RSTP offers edge port recognition allowing ports at the edge of the network to forward frames immediately after activation while at the same time protecting them against loops While providing much better performance than STP IEEE 802 1w RSTP still required up to several seconds to restore network connectivity when a topology change occurred A revised and highly optimized RSTP version was defined in the IEEE standard 802 1D 2004 edition IEEE 80
157. h this MAC address Type Synopsis Static Dynamic This describes how the MAC address has been learned by the switch STATIC the address has been learned as a result of a Static MAC Address Table configuration or some other management activity and can not be automatically unlearned or relearned by the switch DYNAMIC The address has been automatically learned by the switch and can be automatically unlearned CoS Synopsis Normal Medium High Crit ROS v3 7 0 User Guide 199 RS900LWG RS930LW 11 MAC Address Tables Specifies what Class Of Service is assigned to frames carrying this address as source or destination address 11 2 Configuring MAC Address Learning Options Log out MAC Address Learning Options aaa Back Aging Time 300 s Age Upon Link Loss No Yes Apply Reload Figure 11 3 MAC Address Learning Options Form Aging Time Synopsis 15 to 800 Default 300 s This parameter configures the time that a learned MAC address is held before being aged out Age Upon Link Loss Synopsis No Yes Default Yes When a link failure and potentially a topology change occurs the switch may have some MAC addresses previously learned on the failed port As long as those addresses are not aged out the switch will still be forwarding traffic to that port thus preventing that traffic from reaching its destination via the new network topology This parameter allows the aging out of
158. has been cleared 009 445 IGMP TX General Query VLAN 1 gr 000 000 000 000 to ports ALL VLAN PORTS 010 543 LINK Link 7 has risen 000 550 RSTP TX port 7 RST BPDU TCack 0 agg 1 lrn 0 fwd 0 role DP prop 1 TC 0 root 32768 0adc001000 cst 38 brdg 32768 0adc005000 prt 128 7 age 2 00 maxage 20 hello 2 fwddelay 15 ViLength 0 000 557 RSTP RX port 7 RST BPDU TCack 0 agg 1 lrn 0 fwd 0 role DP prop 1 TC 0 root 32768 0adc004000 cst 0 brdg 32768 0adc004000 prt 128 14 age 0 00 maxage 20 hello 2 fwddelay 15 ViLength 0 Figure 14 6 Starting Trace Note The trace package includes the forward subsystem a remote reporting facility intended to be used only under the direction of RuggedCom service personnel 14 6 Viewing DHCP Learned Information The CLI command ipconfig lt CR gt will provide the current IP address subnet mask and default gateway This command provides the only way of determining these values when DHCP is used 14 7 Executing Commands Remotely Through RSH The Remote Shell RSH facility can be used from a workstation to cause the product to act upon commands as if they were entered at the CLI prompt The syntax of the RSH command is usually of the form rsh ipaddr 1 auth_token command_string where e ipaddr The address or resolved name of the RuggedCom device auth_token The authentication token which for ROS rsh is the user name guest operator or admin and corresponding password se
159. he VLAN tagged untagged format of the mirrored frames e Network management frames such as RSTP GVRP etc may not be mirrored e Switch management frames generated by the switch such as Telnet HTTP SNMP etc may not be mirrored Port Mirroring Figure 2 7 Port Mirroring Form Port Mirroring Disabled Enabled Source Ports Eg 146 Source Ports Ingr ans Target Port B Apply Reload ROS v3 7 0 User Guide 58 RS900LWG RS930LW 2 Ethernet Ports Port Mirroring Synopsis Disabled Enabled Default Disabled Enabling port mirroring causes all frames received and transmitted by the source port s to be transmitted out of the target port Source Ports Egr Synopsis Any combination of numbers valid for this parameter Default None Ethernet ports whose egress traffic is to be mirrored to the target port Source Ports Ingr Synopsis Any combination of numbers valid for this parameter Default None Ethernet ports whose ingress traffic is to be mirrored to the target port Target Port Synopsis 1 to maximum port number Default 1 The port to which selected traffic is mirrored A monitoring device should be connected to the target port 2 2 4 Cable Diagnostics ROS is able to perform cable diagnostics per Ethernet port and to view the results Warning When cable diagnostics are performed on a port any established network link on the port will be dropped and normal ne
160. he router causing it to stop issuing IGMP queries Note A switch running in passive mode requires the presence of a multicast router or it will not be able to forward multicast streams at all If no multicast routers are present at least one IGMP Snooping switch must be configured for Active IGMP mode to make IGMP functional IGMP Snooping Rules e When a multicast source starts multicasting the traffic stream will be immediately blocked on segments from which joins have not been received The switch will always forward all multicast traffic to the ports where multicast routers are attached unless configured otherwise Packets with a destination IP multicast address in the 224 0 0 X range which are not IGMP are always forwarded to all ports This behavior is based on the fact that many systems do not send joins for IP multicast addresses in this range while still listening to such packets The switch implements proxy reporting i e membership reports received from downstream are summarized and used by the switch to issue its own reports The switch will only send IGMP membership reports out of those ports where multicast routers are attached because sending membership reports to hosts could result in unintentionally preventing a host from joining a specific group Multicast routers use IGMP to elect a master router known as the querier the one with the lowest IP address is elected to be the querier all other routers be
161. icast MAC address The switch forwarding operation is MAC address based and will not work properly for several groups mapping to the same MAC address Problem Five Computers on my switch issue join requests but don t receive multicast streams from a router Is your multicast router running IGMP version 2 It must run IGMP version 2 in order for IGMP Snooping to operate properly ROS v3 7 0 User Guide 196 RS900LWG RS930LW 10 Multicast Filtering Problem Six connect or disconnect some switch ports and multicast goes everywhere Is IGMP broken No it may be a proper switch behavior When the switch detects a change in the network topology through RSTP it acts to avoid loss of multicast traffic if configured to do so it starts forwarding all multicast traffic to all ports that are not RSTP Edge ports because they may potentially link to routers This may result in some undesired flooding of multicast traffic which will stop after a few minutes however it guarantees that all devices interested in the traffic will keep receiving it without a break Note that the same behavior will be observed when the switch resets or when IGMP Snooping is being enabled for the VLAN ROS v3 7 0 User Guide 197 RS900LWG RS930LW 11 MAC Address Tables 11 MAC Address Tables ROS MAC address table management provides you with the following features e Viewing learned MAC addresses e Purging MAC Address Entries e
162. ice the default gateway must be programmed 14 5 Tracing Events The CLI trace command provides a means to trace the operation of various protocols supported by the device Trace provides detailed information including RSTP packet decodes IGMP activity and MAC address displays Note Tracing has been designed to provide detailed information to expert users Note that all tracing is disabled upon device startup In order to display the current trace settings and discover the systems that are being traced enter the CLI command trace trace Supported commands noclear Starts the log without clearing it first alloff Disables all trace subsystems from tracing allon Enables all flags in all trace subsystems stp Traces STP operations link Displays switch fabric statistics mac Displays MAC Events forward Forwards trace messages to an IP UDP address igmp Displays IGMP Snooping events gvrp Displays GVRP events webs Traces Web Server connections dhcpra Traces DHCP Relay Agent 802 1X Traces 802 1X PAE ip Traces IP communications Enter trace command for more information on a particular command STP Logging all conditions on port s 1 10 INK Logging is disabled MAC Logging is disabled FORW IP 0 0 0 0 UDP 0 OFF IGMP Logging is disabled GVRP Logging is disabled WEBS Logging is disabled DHCPRA Logging is disabled 802 1X Logging is disabled IP Logging is disabl
163. ics 1 Forwarding Designated 19 0 0 0 0 0 2 Forwarding Root 19 D DU 0 0 D 2 Discarding Alternate 19 0 0 DU 0 0 A Discarding Alternate 19 D 0 0 0 0 Figure 5 15 Port RSTP Statistics Table Sot access Port RSTP Statistics admin Port s fh Status Forwarding Role Designated Cost 200000 RX RSTs TX RSTs RX Configs TX Configs RX Tens TX Tens Desig Bridge ID operEdge False Reload Figure 5 16 Port RSTP Statistics Form Port s Synopsis Any combination of numbers valid for this parameter ROS v3 7 0 User Guide 119 RS900LWG RS930LW 5 Spanning Tree The port number as seen on the front plate silkscreen of the switch or a list of ports if aggregated in a port trunk Status Synopsis Disabled Listening Learning Forwarding Blocking Link Down Discarding The status of this port in the Spanning Tree This may be one of the following Disabled STP is disabled on this port Link Down STP is enabled on this port but the link is down Discarding The link is not used in the STP topology but is standing by Learning The port is learning MAC addresses in order to prevent flooding when it begins forwarding traffic Forwarding The port is forwarding traffic Role Synopsis lt empty string gt Root Designated Alternate Backup Master The role of this port in the Spanning Tree This may be one of the following Designated The port is
164. ill discard frames in order to meet this rate if required ROS v3 7 0 User Guide 57 RS900LWG RS930LW 2 Ethernet Ports 2 2 3 Port Mirroring Port mirroring is a troubleshooting tool that copies or mirrors all traffic received or transmitted on a designated port to another mirror port If a protocol analyzer were attached to the target port the traffic stream of valid frames on any source port is made available for analysis Select a target port that has a higher speed than the source port Mirroring a 100 Mbps port onto a 10 Mbps port may result in an improperly mirrored stream Frames will be dropped if the full duplex rate of frames on the source port exceeds the transmission speed of the target port Since both transmitted and received frames on the source port are mirrored to the target port frames will be discarded if the sum traffic exceeds the target port s transmission rate This problem reaches its extreme in the case where traffic on a 100 Mbps full duplex port is mirrored onto a 10 Mbps half duplex port Note Invalid frames received on the source port will not be mirrored These include CRC errors oversize and undersize packets fragments jabbers collisions late collisions and dropped events 2 2 3 1 Port Mirroring Limitations e Traffic will be mirrored onto the target port only if the target port is a member of the same VLANs as the source port e The target port may sometimes incorrectly show t
165. includes e RuggedSwitch i800 i801 i802 and i803 e RuggedSwitch RS8000 and RS1600 e RuggedSwitch RS900 RS930 with both L EoVDSL and W WLAN port variants e RuggedSwitch RS900G RS940G with Gigabit e RuggedSwitch RS969 M969 waterproof with Gigabit e RuggedSwitch RSG2100 M2100 and RSG2200 M2200 modular switches with Gigabit Ethernet e RuggedSwitch RSG2300 modular switch with Gigabit Ethernet e RuggedServer RS416 RS910 and RS920 modular servers e RuggedServer RS400 e RuggedServer RMC30 Each product model has a subset of the entire ROS feature set This manual is intended for use with the RS900LWG RS930LW product family and has been streamlined to only describe the relevant features Who Should Use This User Guide This guide is to be used by network technical support personnel who are familiar with the operation of networks Others who might find the book useful are network and system planners system programmers and line technicians How Chapters are organized The index of this guide has been prepared with e Entries to each of the Features sections of the manual e Entries to each of the Troubleshooting sections of the manual located at the end of each chapter e Entries to each of the Menus organized by name Document Conventions This publication uses the following conventions ROS v3 7 0 User Guide 13 RS900LWG RS930LW Preface Note Means reader t
166. ing a management domain is often accompanied with the establishment of an IP subnet specifically for the managed devices ROS v3 7 0 User Guide 142 RS900LWG RS930LW 7 Wireless LAN 7 Wireless LAN Note Applicable to RuggedWireless RS900W model s only ROS RuggedWireless provides the following Wireless LAN WLAN features e IEEE 802 11b g compliant e Operating Modes e Access Point Infrastructure topology e Client Bridge STA with WDS 4 address frame bridging e Client IP Bridge STA with Ethernet IP and Ethernet ARP bridging e Security e WPA2 802 11i AES with CCMP e WPA RC4 with TKIP e WEP in Access Point mode only e WiFi MultiMedia WMM QoS support e Subset of IEEE 802 11e e Provides basic traffic prioritization e Four categories Voice Video Best Effort and Background e Data Rates e IEE802 11b 11 5 5 2 1 Mbps with automatic fallback e IEE802 11g 54 48 36 24 18 12 9 6 Mbps with automatic fallback e Receiver Diversity e Dual antennas ensure optimum performance in high multi path environments such as warehouses offices and other typically indoor installations 7 1 WLAN Operation A typical IEEE 802 11 infrastructure network consists of four major physical components e Stations STA e Access Point AP e Wireless media e Distribution System ROS v3 7 0 User Guide 143 RS900LWG RS930LW 7 Wireless LAN 7 1 1 Infras
167. ing when it begins forwarding traffic Forwarding The port is forwarding traffic Role Synopsis lt empty string gt Root Designated Alternate Backup Master The role of this port in the Spanning Tree This may be one of the following Designated The port is designated for i e carries traffic towards the root for the LAN it is connected to Root The single port on the bridge which provides connectivity towards the root bridge Backup The port is attached to a LAN that is serviced by another port on the bridge It is not used but is standing by Alternate The port is attached to a bridge that provides connectivity to the root bridge It is not used but is standing by Master Only exists in MSTP The port is an MST region boundary port and the single port on the bridge which provides connectivity for the Multiple Spanning Tree Instance towards the Common Spanning Tree root bridge i e this port is the root port for the Common Spanning Tree Instance Cost Synopsis 0 to 4294967295 Cost offered by this port If the Bridge RSTP Parameters Cost Style is set to STP 1Gbps ports will contribute a cost of four 100 Mbps ports will contribute 19 and 10 Mbps ports contribute If the Cost Style is set to RSTP 1Gbps will contribute 20 000 100 Mbps ports will contribute a cost of 200 000 and 10 Mbps ports contribute a cost of 2 000 000 Note that even if the Cost Style is set to RSTP a port that migrates to STP will
168. interface with the new parameter s in effect Note Most WLAN parameters only require a Quick Reset to take effect and it is also acceptable for the user to issue a single WLAN reset command even after several i e multiple WLAN parameters may have been changed The following options are supported Full Reset Apply reset to both the RF wireless and Ethernet interfaces of WLAN duration is approximately 70 seconds Normally used for troubleshooting only Quick Reset Apply reset only to the RF wireless interface of WLAN duration is approximately 10 seconds 7 3 WLAN Troubleshooting and F A Q 7 3 1 Microsoft Windows 7 3 1 1 Windows XP Configuration of WPA2 authentication options are not supported in Windows XP by default In order to support WPA2 functionality in Windows XP you will need e Windows XP Service Pack 2 and e Windows XP WPA2 patch ROS v3 7 0 User Guide 162 RS900LWG RS930LW 7 Wireless LAN Please visit the Microsoft web site for up to date information 7 3 1 2 Windows Vista In Windows Vista IPv6 is enabled by default which may create station association problems The user must ensure that the Distribution System is IPv6 capable For example it must support DHCPv 6 if your Vista client is configured for dynamic address assignment If you notice association problems during the IP address assignment phase then disable the IPv6 configuration reboot Windows Vista and
169. ion The network shown in Figure 10 1 IGMP Operation Example 1 provides a simple example of the use of IGMP One producer IP host P1 is generating two IP multicast streams M1 and M2 There are four potential consumers of these streams C1 through C4 The multicast router discovers which host wishes to subscribe to which stream by sending general membership queries to each of the segments ROS v3 7 0 User Guide 182 RS900LWG RS930LW 10 Multicast Filtering M2y AM Multicast Membershi a Membership Query Router embership Query M2 Membership Report M1 Membership Report ON Figure 10 1 IGMP Operation Example 1 In this example the general membership query sent to the C1 C2 segment is answered by a membership report indicating the desire to subscribe to a stream M2 The router will forward the M2 stream onto the C1 C2 segment In a similar fashion the router discovers that it must forward M1 onto segment C3 C4 Note Membership reports are also referred to as joins A consumer may join any number of multicast groups issuing a membership report for each group When a host issues a membership report other hosts on the same network segment that also require membership to the same group suppress their own requests since they would be redundant In this way the IGMP protocol guarantees that the segment will issue only one join for each group The router periodically queries each
170. ion Management connection with administrative privileges to the ROS device to be upgraded i e via RS232 telnet or SSH Enter the CLI shell and run the TFTP client command to receive the firmware image for example tftp lt TFTP server gt get lt remote filename gt main bin where e TFTP server is the IP address of the TFTP server remote filename is the name of the binary image file of the main ROS application firmware residing in the TFTP server outgoing directory Verify as above the successful transfer via the ROS CLI version command A sample transcript from the ROS CLI gt tftp 10 0 0 1 get ROS CF52_Main_v3 7 0 bin main bin FTP CMD main bin transfer ok Please wait closing file FTP CMD main bin loading succesful gt version Current ROS CF52 Boot Software v2 14 0 Sep 29 2008 13 25 Current ROS CF52 Main Software v3 6 0 Oct 03 2008 09 33 Next ROS CF52 Main Software v3 7 0 Jun 02 2009 08 36 15 1 4 Upgrading Firmware Using SFTP This method requires that the binary image file of the main ROS application firmware along with SFTP client software be available on a computer with a network connection to the ROS device to be upgraded SFTP is the Secure File Transfer Protocol also known as the SSH File Transfer Protocol a file transfer mechanism that uses SSH to encrypt every aspect of file transfer between a networked client and server Establish an SFTP connection with administr
171. is VLAN Default VLAN Specifies the type of the interface for which this IP interface is created Synopsis 1 to 4094 Default 1 Specifies the ID of the interface for which this IP interface is created If the interface type is VLAN this represents the VLAN ID Mgmt Synopsis No Yes Default No Specifies whether the IP interface is the device management interface IP Address Type Synopsis Static Dynamic DHCP BOOTP Default Static ROS v3 7 0 User Guide 25 RS900LWG RS930LW 1 Administration Specifies whether the IP address is static or is dynamically assigned via DHCP or BOOTP The Dynamic option automatically switches between BOOTP and DHCP until it receives a response from the relevant server The Static option must be used for non management interfaces IP Address Synopsis where ranges from 0 to 255 Default 192 168 0 1 Specifies the IP address of this device An IP address is a 32 bit number that is notated by using four numbers from 0 through 255 separated by periods Only a unicast IP address is allowed which ranges from 1 0 0 0 to 233 255 255 255 Subnet Synopsis where ranges from 0 to 255 Default 255 255 255 0 Specifies the IP subnet mask of this device An IP subnet mask is a 32 bit number that is notated by using four numbers from 0 through 255 separated by periods Typically subnet mask numbers use either 0 or 255 as values e g
172. is used to encrypt any passwords that are sent from the switch to the TACACS server Confirm Auth Key Synopsis 31 character ASCII string Default None Confirm input of the above authentication key 1 14 DHCP Relay Agent A DHCP Relay Agent is a device that forwards DHCP packets between clients and servers when they are not on the same physical LAN segment or IP subnet The feature is enabled if the DHCP server IP address and a set of access ports are configured DHCP Option 82 provides a mechanism for assigning an IP Address based on the location of the client device in the network Information about the client s location can be sent along with the DHCP request to the server The DHCP server makes a decision about an IP Address to be assigned based on this information DHCP Relay Agent takes the broadcast DHCP requests from clients received on the configured access port and inserts the relay agent information option Option 82 into the packet Option 82 contains the VLAN ID 2 bytes and the port number of the access port 2 bytes the circuit ID sub option and the switch s MAC address the remote ID sub option This information uniquely defines the access port s position in the network The DHCP Server supporting DHCP option 82 sends a unicast reply and echoes Option 82 The DHCP Relay Agent removes the Option 82 field and broadcasts the packet to the port from which the original request was received These parameters p
173. iscarded TLVsUnknown Synopsis 0 to 4294967295 The number of all TLVs received on the port that are not recognized by the LLDP local agent 12 3 2 RCDP Configuration access RCDP Parameters admin RCDP Discovery Disabled Enabled Apply Reload Figure 12 9 LLDP Neighbor Information Table RCDP Discovery Synopsis Disabled Enabled Default Enabled Disables Enables Device Discovery through RuggedCom Proprietary RCDP ROS v3 7 0 User Guide 212 RS900LWG RS930LW 13 Diagnostics 13 Diagnostics ROS provides the following diagnostics features e Alarm System to view and clear alarms e Viewing and clearing the system log e Viewing CPU diagnostics e Viewing the product information e Loading the factory default configuration e Resetting the device The Diagnostics menu is accessible from the main menu Main Menu Administration Ethernet Ports Ethernet Statistics Spanning Tree Virtual LANs Port Security Classes of Service Multicast Filtering MAC Address Tables Diagnostics View Alarms Clear Alarms View System Log Clear System Log View CPU Diagnostics View Product Information Load Factory Default Configuration Reset Device Files Transfer Figure 13 1 Diagnostics Menu 13 1 Using the Alarm System Alarms are the occurrence of events of interest that are logged by the device If alarms have occurred the device will indicate the number of alarms in the
174. istration Protocol c cccecceeeeeeeeeeeeeeeeeeeeeeeeeeeees 131 Oat lOve P VLAN BOG EE 132 Le OO EE 133 6 2 VLAN Weeer EE 134 6 2 1 Traffic Domain E te BEE 134 6 2 2 Administrative Convenience EEN 135 6 2 3 Reduced Ee EE 135 6 3 VLAN CoOnTIQUIATION sed EEN EES cde eather 135 6 3 1 Global VLAN Parameters ee Ee 136 6 3 2 Static WIGAN E 137 6 3 3 Port VLAN Re 138 6 3 4 VLAN Summer desna a A E EEE EE E E AEEA 140 6 4 TOUDISSMO OUI G EE 141 ER Wireless RE 143 7 1 WLAN Operation EE 143 7 1 1 RuggedWireless extensions for Client Bridge operation eee 144 7 1 2 RuggedWireless Client IP Bridge Operation ccceeeeeeteeeeeeteeeeeeeees 145 7 2 Ree e RE 146 7 2 1 Addressing Sean 147 7 2 2 Network Parameters sssesssssssssrrrrneseseeeessassssnsterrrrnnnnnonrrnnnnnnnnunnnrnnnnnneeeeeee 148 7 2 9 SGCUrity E EE 150 12 4 MAGCFiltering EE 152 7 2 5 RADIUS Parameters 20 5 chs Setar Se goo a a en eae eae cake 154 7 2 6 Advanced Parameters edd ee es ceed pessvaailesal ENEE ENN 154 72 a WLAN DACP En EE 157 7 2 8 Association Information RE 158 ROS v3 7 0 User Guide 5 RS900LWG RS930LW Rugged Operating System 7 2 9 Miscellaneous Parameters EE 159 7 3 WLAN Troubleshooting and F A Q EEN 162 7 3 1 Microsoft Windows EE 162 E En een ae er A A Ea 163 73 9 SEENEN Aeaee eE E EE eege 164 7 3 4 Network len te 164 7 3 5 Compatibility and Interoperability 0 0 0 ce
175. itch will need a longer time to detect a link failure This will result in a longer network recovery time of up to two seconds This option should only be used if fast link failure detection is not needed Note When Fast Link Detection is enabled the system prevents link state change processing from consuming all available CPU resources If Port Guard is not used however it is possible for almost all available CPU time to be consumed by frequent link state changes which could have a negative impact on overall system responsiveness 2 2 6 EOVDSL Parameters when applicable From the switching functionality point of view Ethernet over VDSL EoVDSL ports function the same way as 10 100Base TX Ethernet ports The VDSL interface is only used as a media to transfer regular Ethernet frames However the link throughput and the link establishment procedure are different According to the VDSL standard one of the VDSL link partners is required to operate as a LT Line Termination or Master device while the second link partner operates as a NT Network Termination or Slave Two types of VDSL ports are currently supported by ROS The first one is Universal VDSL and the second one is Long reach VDSL The Universal VDSL port provides symmetric upstream and downstream throughput and is generally more suitable for higher throughput connection which spans a shorter distance lt 2 5km The Long reach VDSL port provides asymmetric upstream do
176. ity ipFragCreates The number of IP datagram fragments that have been generated as a result of fragmentation at this entity ipFragFails The number of IP datagrams that have been discarded because they needed to be fragmented at this entity but could not be e g because their Don t Fragment flag was set ipReasmFails The number of IP datagrams successfully reassembled ipRasmReqds The number of IP fragments received which needed to be reassembled at this entity ifInOctets ifOutOctets The total number of bytes received on the interface including framing characters The total number of bytes transmitted out of the interface iflnDiscards The number of received packets that are dropped due to lack of receive buffers iflnUcastPkts The number of packets delivered by this sub layer to a higher sub layer which were not addressed to a multicast or broadcast address at this sub layer ROS v3 7 0 User Guide 243 RS900LWG RS930LW Appendix C List of Objects Eligible for RMON Alarms ifOutUcastPkts The total number of transmitted packets which were not addressed to a multicast or broadcast address iflnNUcastPkts The number of packets delivered by this sub layer to a higher sub layer which were addressed to a multicast or broadcast address at this sub layer ifOutNUcastPkts The total number of transmitted packets which were addressed to a mul
177. k partner has latched into an inappropriate state RESETPORT ports all ports comma separated port numbers e g 1 3 5 7 all all ports will be reset ROS v3 7 0 User Guide 255 RS900LWG RS930LW Appendix E Command Line Listing rmon Displays names of RMON alarm eligible objects route Displays gateway configuration spuriouscount Displays User Spurious Interrupt count sql The SQL command provides an sql like interface for manipulating all system configuration and status parameters Entering SQL HELP command name displays detailed help for a specific command Commands clauses table and column names are all case insensitive DEFAULT Sets all records in a table s to factory defaults DELETE Allows for records to be deleted from a table HELP Provides help for any SQL command or clause INFO Displays a variety of information about the tables in the database INSERT Enables new records to be inserted into a table SAVE Saves the database to non volatile memory storage SELECT Queries the database and displays selected records UPDATE Enables existing records in a table to be updated sudp Usage sudp ip_addr ip_port size num_msgs time_interval This command sends test UDP broadcast datagram via source IP port to dest IP port Parameters are defined as follows ip_addr destination IP address ip_port source destination IP port size number of bytes in UDP datagram ignored if d
178. k type The feature includes e Transmitting FEFI transmitting modified link integrity signal in case a link failure is detected i e no link signal is received from the link partner e Detecting FEFI indicating link loss in case FEFI signal is received from the link partner e 10Base FL links no standard support As one can see from the above 10Base FL links have no native link partner notification mechanism Also FEFI support in 100Base FX links is optional according to the IEEE 802 3 standard which means that some link partners may not support it RuggedCom offers an advanced Link Fault Indication LFI feature for the links where no native link partner notification mechanism is available With the LFI enabled the device bases generation of a link integrity signal upon its reception of a link signal In the diagram above if switch A fails to receive a link signal from the controller it will stop generating a link signal The controller will detect the link failure and switch to the backup port The switch can also be configured to flush the MAC address table for the controller port see MAC Address Tables section Frames destined for the controller will be flooded to switch B where they will be forwarded to the controller after the controller transmits its first frame Note If both link partners are capable of the LFI it MUST NOT be enabled on both sides of the link If it is enabled on both sides the link will never be e
179. le parameter is set to RSTP in the Bridge RSTP Parameters configuration Setting the cost manually provides the ability to preferentially select specific ports to carry traffic over others Leave this field set to auto to use the standard RSTP port costs as negotiated 20 000 for 1Gbps 200 000 for 100 Mbps links and 2 000 000 for 10 Mbps links For MSTP this parameter applies to both external and internal path cost Edge Port Synopsis False True Auto Default Auto Edge ports are ports that do not participate in the Spanning Tree but still send configuration messages Edge ports transition directly to frame forwarding without any listening and learning delays The MAC tables of Edge ports do not need to be flushed when topology changes occur in the STP network Unlike an STP disabled port accidentally connecting an edge port to another port in the spanning tree will result in a detectable loop The Edgeness of the port will be switched off and the standard RSTP rules will apply until the next link outage Point to Point Synopsis False True Auto Default Auto RSTP uses a peer to peer protocol that provides rapid transitioning on point to point links This protocol is automatically turned off in situations where multiple STP bridges communicate over a shared non point to point LAN The bridge will automatically take point to point to be true when the link is found to be operating in full duplex mode The point to point par
180. led Determines the Modbus address to be used for Management through Modbus SSH Sessions Allowed Synopsis 1 to 4 Default 4 Limits the number of SSH sessions RSH Server Synopsis Disabled Enabled Default Enabled Disables enables Remote Shell access 1 8 System Identification The system identification is displayed in the sign on screen and in the upper left hand corner of all ROS screens ROS v3 7 0 User Guide 28 RS900LWG RS930LW 1 Administration Gg e access Log out System Identification anes Back System Name System Name Location location Contact Contact gt Login Banner Full Secure Apply Reload Figure 1 12 System Identification Form System Name Synopsis Any 19 characters Default System Name The system name is displayed in all ROS menu screens This can make it easier to identify the switches within your network provided that all switches are given a unique name Location Synopsis Any 49 characters Default Location The location can be used to indicate the physical location of the switch It is displayed in the login screen as another means to ensure you are dealing with the desired switch Contact Synopsis Any 49 characters Default Contact The contact can be used to help identify the person responsible for managing the switch You can enter name phone number email etc It is displayed in the login screen so that this person may be contacted sho
181. lege level admin 1 12 3 802 1X Authentication A RADIUS server may also be used to authenticate access on ports with 802 1 X security support Attributes sent to the RADIUS server in a RADIUS Request are user name derived from client s EAP identity response e NAS IP address e service type framed e framed MTU 1500 maximum size of EAP frame which is the size of an Ethernet frame ROS v3 7 0 User Guide 42 RS900LWG RS930LW 1 Administration e EAP message vendor specific attribute as described above RADIUS messages are sent as UDP messages The switch and the RADIUS server must use the same authentication and encryption key 1 12 4 Radius Server Configuration access Log out RADIUS Server aan Back Primary 10 1 1 1 1812 mysecret1 Backup 10 2 1 1 1812 mySecret2 Figure 1 25 RADIUS Server Summary access Log out RADIUS Server ERR Back Server Primary IP Address 10 1 1 1 Auth UDP Port 1812 Auth Key mysecrett Figure 1 26 RADIUS Server Form Server Synopsis Any 8 characters ROS v3 7 0 User Guide 43 RS900LWG RS930LW 1 Administration Default Primary This field tells whether this configuration is for a primary or a backup server IP Address Synopsis where ranges from 0 to 255 Default The RADIUS server IP Address Auth UDP Port Synopsis 1 to 65535 Default 1812 The authentication UDP Port on the R
182. length of time since the device was last powered on Total Powered Time Synopsis DDDD days HH MM SS The cumulative powered up time of the device CPU Usage Synopsis 0 to 100 The percentage of available CPU cycles used for device operation as measured over the last second RAM Total Synopsis 0 to 4294967295 The total number of bytes of RAM in the system RAM Available Synopsis 0 to 4294967295 The total number of bytes of RAM still available Temperature Synopsis 32768 to 32767 C The temperature of the CPU board ROS v3 7 0 User Guide 218 RS900LWG RS930LW 13 Diagnostics 13 3 Viewing and Clearing the System Log The system log records various events including reboots user sign ins alarms and configuration saves sysloq txt 3 Alarms Back May 19 11 52 54 273 INFO System and crash logs cleared May 19 11 53 28 492 INFO Port 1 is up May 19 11 53 28 569 WARN Port 1 is down May 19 11 53 30 234 INFO Admin logged in May 19 11 57 37 995 INFO Port 1 is up May 19 11 57 38 415 WARN Port 1 is down May 19 11 57 48 001 INFO Port 1 is up May 19 11 57 48 333 WARN Port 1 is down May 19 11 58 16 817 INFO Admin logged out May 19 12 01 31 626 INFO Admin logged out May 19 12 04 13 254 INFO Admin logged in May 19 12 09 31 259 INFO Admin logged out May 19 15 13 38 427 WARN Port6 is down May 19 15 13 41 979 INFO Port6 is up May 19 15 13 42 174 WARN Port 6 is down May 19 15 21 48 445 INFO Port6 is up Ma
183. less IEEE 802 11 BSS sides of the AP network Recall that the AP always supports a bridged single network across both backhaul and IEEE 802 11 BSS domains DHCP Parameters access admin DHCP Parameters Server Disable Enable Start Of IP Pool 192 168 0 3 Size Of IP Pool 10 Subnet 255 255 255 0 Gateway DNS IP Address Lease Time 60 min Figure 7 16 DHCP Parameter Form Server Synopsis Disable Enable Default Disable This parameter allows the user to enable disable the DHCP server functionality ROS v3 7 0 User Guide 157 RS900LWG RS930LW 7 Wireless LAN Start Of IP Pool Synopsis Ei RE where ranges from 0 to 255 Default 192 168 0 3 This parameter gives the user the ability to configure the lower boundary of an IP address pool within the DHCP server configuration Size Of IP Pool Synopsis 1 to 64 Default 10 This parameter gives the user the ability to configure the number of addresses in the IP address pool within the DHCP server configuration Subnet Synopsis where ranges from 0 to 255 Default 255 255 255 0 This parameter gives the user the ability to configure the IP subnet mask attribute within the DHCP server configuration Gateway Synopsis where ranges from 0 to 255 Default This parameter gives the DNS IP Address Synopsis where r
184. lifies the job of SCADA System integrators who can now easily use this feature to retrieve basic info from RuggedCom devices via a familiar protocol Predominantly read only status information is provided though a few writable registers exist to provide operator commands The PDU format defined for the ModBus protocol is Function Code Data The following ModBus function codes are supported by RuggedCom for device management through ModBus 1 Read Input Registers or Read Holding Registers 0x04 or 0x03 for which the Modbus PDU would look like Request Function code 1 Byte 0x04 0x03 Starting Address 2 Bytes 0x0000 to OxFFFF Number of Input Registers 2 Bytes 0x0001 to 0x007D Response Function code 1 Byte 0x04 0x03 Byte Count 1 Byte 2 x N Input Registers N X2 Bytes N Quantity of Input Registers 2 Write Multiple Registers 0x10 Request Function code 1 Byte 0x10 Starting Address 2 Bytes 0x0000 to OxFFFF Number of Registers 2 Bytes 0x0001 to 0x0079 Byte Count 1 Byte 2 x N Registers Value N x 2 Bytes Value of the register N Quantity of Input Registers Response Function code 1 Byte 0x10 Starting Address 2 Bytes 0x0000 to OxFFFF Number of Registers 2 Bytes 1 to 121 0x79 ROS v3 7 0 User Guide 247 RS900LWG RS930LW Appendix D ModBus Management Support and Memory Map Note
185. lt in circumstances where the link broken is the sole link to the root bridge and the secondary root bridge is poorly chosen The worst of all possible designs occurs when the secondary root bridge is located at the farthest edge of the network from the root In this case a configuration message will have to propagate out to the edge and then back in order to reestablish the topology Problem Four My network is composed of a ring of bridges of which two connected to each other are managed and the rest are unmanaged Why does the RSTP protocol work quickly when break a link between the managed bridges but not in the unmanaged bridge part of the ring A properly operating unmanaged bridge is transparent to STP configuration messages The managed bridges will exchange configuration messages through the unmanaged bridge part of the ring as if it is non existent When a link in the unmanaged part of the ring fails however the managed bridges will only be able to detect the failure through timing out of hello messages Full connectivity will require three hello times plus two forwarding times to be restored Problem Five The switch is up and running and working fine Then start a certain application and the network becomes unstable After stop the application the network goes back to running normally RSTP sends its configuration messages using the highest possible priority level If CoS is configured to allow traffic flows at the highest
186. m number of MAC addresses that can be dynamically learned on the port If there are static addresses configured on the port the actual number of addresses allowed to be learned is this number minus the number of the static MAC addresses Shutdown Time Synopsis 1 to 86400 s or Until reset Don t shutdown Default Don t shutdown Specifies for how long to shut down the port if a security violation occurs ROS v3 7 0 User Guide 171 RS900LWG RS930LW 8 Port Security Status Synopsis View only string of 31 characters Describes the security status of the port 8 2 2 802 1X Parameters 802 1 Parameters access admin Back Port txPeriod quietPeriod reAuthEnabled reAuthPeriod reauthMax suppTimeout server Timeout maxReq 1 30s 60s No 600s 2 2 2 30s 60s No Os 2 2 3 30s 60s No 3600 2 2 4 30s 60s No 3600s 2 2 5 30s 60s No 3600 2 2 6 30s 60s No 3600s 2 2 z 30s 60s No 3600 2 2 CS 2 db Figure 8 6 802 1X Parameters Table Log out 802 1X Parameters access admin Back Port fi tPeriod Bos quietPeriod 60s reAuthEnabled No Yes C reAuthPeriod 3600 s reauthMac 2 suppTimeout Bos serverTimeout 30s machen 2 Apply Reload Figure 8 7 802 1X Parameters Form ROS v3 7 0 User Guide 172 RS900LWG RS930LW 8 Port Security Port Synopsis 1 to maximum port number Default 1 The port number as seen on the front plate
187. mation until it fills holding approximately 3 megabytes of characters The clearlogs command resets these logs It is recommended to run clearlogs command after every firmware upgrade 14 4 Pinging a Remote Device The ping command sends an ICMP echo request to a remotely connected device For each reply received the round trip time is displayed The command ping lt IP address gt will send a small number of pings to the device with this IP address and display the results The ping command can be used to verify connectivity to the next connected device It is a useful tool for testing commissioned links This command also includes the ability to send a specific number of pings with a specified time for which to wait for a response ROS v3 7 0 User Guide 225 RS900LWG RS930LW 14 Using the CLI Shell The specification of a large number of pings and a short response time can flood a link stressing it more than a usual ping sequence The command ping 192 168 0 1 500 2 can be used to issue 500 pings each separated by two milliseconds to the next device If the link used is of high quality then no pings should be lost and the average round trip time should be small Note The device to be pinged must support ICMP echo Upon commencing the ping an ARP request for the MAC address of the device is issued If the device to be pinged is not on the same network as the device pinging the other dev
188. ment e IRIG B input and output e Generic PPS Pulse Per Second output e SNTP time synchronization In addition to the local clock and existing SNTP client server IRIG B may be configured to serve as the unit s master clock source The Configure Time Sync option within the ROS Administration menu fully configures time keeping functions on a ROS based device e Administration Configure IP Interfaces Configure IP Gateways Configure IP Services Configure System Identification Configure Passwords Configure Time Sync e Configure Time and Date e Configure Time Source e View Time Sync Status Figure 1 14 Time Synchronization Menu IRIG B Fundamentals The Inter Range Instrumentation Group IRIG IRIG B standard details the format of a signal encoding which contains the current day hour minute and second in UTC format broadcast at the start of each second The IRIG B daughter card available in the RS416v2 complies with IRIG Standard 200 04 and is capable of generating formats IRIGBOO2 and IRIGB003 PWM Generic PPS Pulse Per Second Interface The serial IRIG B daughter card also be configured to provide a generic PPS signal on the serial connectors on the RS416v2 A pulse with a duration of 1 millisecond is output every second at the beginning of the second ROS v3 7 0 User Guide 32 RS900LWG RS930LW 1 Administration 1 10 1 Configuring Time and Date access Log out Time and Date admin Back Time
189. menu provides the links at the top level of the menu hierarchy and allows them to be expanded to display lower level links for each configuration subsystem ROS v3 7 0 User Guide 20 RS900LWG RS930LW 1 Administration Log out Main Menu Administration Ethernet Ports Ethernet Statistics Spanning Tree Virtual LANs Port Security Classes of Service Multicast Filtering MAC Address Tables Diagnostics Figure 1 4 Main Menu via Web Server Interface access admin Every web page in the menu system has a common header section which contains e The System Name as configured in the System Identification menu is displayed in the top banner in between elements of the RuggedCom logo e A Log out link at left and immediately below the banner terminates the current web session e A Back link at left and below Log out links back to the previously viewed page e The menu title in the center of the page and below the banner is a link to a context sensitive help page e The access level e g access admin is displayed by default at the right of the page and below the banner If however any alarms are pending the text will be replaced with a link which displays the number of pending alarms Following this link displays a table of pending alarms Port Parameters Figure 1 5 Web Page Header Showing Alarms Link 1 3 3 Making Configuration Changes 3 Alarms When changing a data item the user sele
190. menu system by pressing lt Ctrl S gt again or by entering exit lt CR gt at the shell prompt This chapter describes a selection of the most useful commands in detail For a complete list of available commands please refer to Appendix E Command Line Listing Summary Of CLI Commands available in ROS Type help lt CR gt to see the list of commands available at the current session access level ROS v3 7 0 User Guide 223 RS900LWG RS930LW 14 Using the CLI Shell gt help alarms Displays list of available alarms clearalarms Clears all alarms clearethstats Clears statistics for specified Ethernet port s clearlogs Clears the system and crash logs cls Clears the screen delay Pause a specified number of milliseconds dir Prints file directory listing echo Echoes the specified message to the screen exit Terminate this command line session help Print listing of all commands ipconfig Displays IP configuration login Login to the shell i e set the access level logout Logout of the shell ping Pings specified IP address reset Perform a hard reset of the switch resetport Resets specified switch port s rmon Displays names of RMON alarm eligible objects route Displays gateway configuration spuriouscount Displays User Spurious Interrupt count sql SQL like commands for setting viewing system parameters sudp Sends UDP msgs to 192 168 0 255 telnet Telnet to
191. meters EE 208 12 6 LLDP Global Remote Statistics Form sssseeessenneseserneennrrererressrrrrnerennnertnnntssrernseerrnn ee 209 12 7 LLDP Neighbor Information Table AAA 210 12 8 LEDP Statistics EE 211 12 9 LLDP Neighbor Information E EE 212 13 14 Diagnostics MONO WEE 213 13 2 Alarm Configuration Tale scpsscteeeietied dE AEENAE REN deed 215 13 3 Alarm Config ration HORM EE 216 TA Eu RE 217 13 5 CPU Diagnostics Form E 218 13 6 Viewing the System Log o 0 seek deen elite Wan kl eae 219 E sy deen erte RN FON EE 220 13 8 Load Factory Defaults Dialog EE 221 13 9 Reset Device Dialog EE 222 14 1 Displaying The List Of Available Commands s sssnsseeeseseessserreserrnnerrnnresrerrssrrrnnerrrne 224 14 2 Displaying Help eene WEE 224 14 3 Displaying The Directory Of A ROS Device ssssssseseessseresssrrrrerrrnreettnesssrrrnserrnnnernnne 225 14 4 Displaying te EE 226 14 5 Enabling Trace eege eege eege 227 TAG Starting EE 228 ROS v3 7 0 User Guide 12 RS900LWG RS930LW Preface Preface This manual contains instructions examples guidelines and general theory on how to use the Rugged Operating System ROS management software Supported Platforms ROS has been designed to work on many RuggedCom product hardware platforms This ensures consistency of the user experience when migrating from one product model to another In fact a single binary image supports all RuggedCom ROS based products that
192. mum cost path from an attached LAN via the bridge to the CIST Regional Root e Alternate and Backup Ports have the same sense that they do in RSTP described in Section 5 1 1 RSTP States and Roles under Roles but relative to the CIST Regional Root MSTI Port Roles For each MSTI on a bridge e The Root Port provides the minimum cost path from the bridge to the MSTI Regional Root if the bridge itself is not the MSTI Regional Root e A Designated Port provides the minimum cost path from an attached LAN via the bridge to the MSTI Regional Root e Alternate and Backup Ports have the same sense that they do in RSTP described in Section 5 1 1 RSTP States and Roles under Roles but relative to the MSTI Regional Root The Master Port which is unique in an MST region is the CIST Root Port of the CIST Regional Root and provides the minimum cost path to the CIST Root for all MSTIs Boundary Ports A Boundary Port is a port on a bridge in an MST region that connects to either of 1 a bridge belonging to a different MST region or 2 a bridge supporting only RSTP or legacy STP A Boundary Port blocks or forwards all VLANs from all MSTIs and the CIST alike A Boundary Port may be e The CIST Root Port of the CIST Regional Root and therefore also the MSTI Master Port e A CIST Designated Port CIST Alternate Backup Port or Disabled At the MST region boundary the MSTI Port Role is the same as the CIST Port Role
193. n parameter Menu Title Access Level Alarms indicator Sub Menus and Command Bar Sub menus are entered by selecting the desired menu with the arrow keys and pressing the enter key Pressing the escape key returns you to the parent menu ROS v3 7 0 User Guide 15 RS900LWG RS930LW 1 Administration system Identification Menu Name Access Level Alarms Indicator System Name Main Menu admin access Ethernet Ports Ethernet Statistics Link Aggregation Spanning Tree Virtual LANs Port Security Classes of Service Multicast Filtering MAC Address Tables Diagnostics Shell X Logout Sub Menus Figure 1 1 Main Menu With Screen Elements Identified Command The command bar offers a list of commands that apply to the currently displayed menu These commands include e lt Ctrl Z gt to display help on the current command or data item e lt Ctrl S gt to switch to the CLI shell e lt Ctrl Up Down gt to jump to next previous page of a status display The main menu also provides a lt Ctrl X gt command which will terminate the session This type of menu is accessible via serial console telnet session and SSH session 1 1 3 Making Configuration Changes When changing a data item the user selects the data item by the cursor keys and then pressing the enter key The cursor will change position to allow editing of the data item Typing a new value after pressing enter always erases the old parameter value
194. n GARP the Generic Attribute Registration Protocol to automatically distribute VLAN configuration information in a network Each switch in a network needs only to be configured with VLANs it requires locally it dynamically learns the rest of the VLANs configured elsewhere in the network via GVRP A GVRP aware end station configured for a particular VLAN ID can be connected to a trunk on a GVRP aware switch and automatically become part of the desired VLAN When a switch sends GVRP BPDUs out of all GVRP enabled ports GVRP BPDUs advertise all the VLANs known to that switch configured manually or learned dynamically through GVRP to the rest of the network When a GVRP enabled switch receives a GVRP BPDU advertising a set of VLANs the receiving port becomes a member of those advertised VLANs and the switch begins advertising those VLANs via all the GVRP enabled ports other than the port on which the VLANs were learned To improve network security using VLANs GVRP enabled ports may be configured to prohibit the learning of any new dynamic VLANs but at the same time be allowed to advertise the VLANs configured on the switch ROS v3 7 0 User Guide 131 RS900LWG RS930LW 6 VLANs Port A1 GVRP aware End Node D GVRP aware Port D2 GVRP Adv amp Learn Port D1 GVRP aware Adv amp Learn Port B1 GVRP aware Edge Switch D Port B3 GVRP aware Adv amp Learn Core Switch Port B2
195. n multicast groups with other switches on a LAN and for that information to be disseminated to all switches in the LAN that support Extended Filtering Services GMRP is an industry standard protocol first defined in IEEE 802 1D 1998 and extended in IEEE 802 1Q 2005 GARP was defined in IEEE 802 1D 1998 and updated in 802 1D 2004 Note that GMRP provides similar functionality at Layer 2 to that which IGMP described in the preceding sections provides at Layer 3 Joining a Multicast Group In order to join a multicast group an end station transmits a GMRP join message The switch that receives the join message adds the port through which the message was received to the multicast group specified in the message It then propagates the join message to all other hosts in the VLAN one of which is expected to be the multicast source When a switch transmits GMRP updates from GMRP enabled ports all of the multicast groups known to the switch whether configured manually or learned dynamically through GMRP are advertised to the rest of network ROS v3 7 0 User Guide 186 RS900LWG RS930LW 10 Multicast Filtering As long as one host on the Layer 2 network has registered for a given multicast group traffic from the corresponding multicast source will be carried on the network Traffic multicast by the source is only forwarded by each switch in the network to those ports from which it has received join messages for the mul
196. n send or receive frames If Edge is set to true the bridge will transition the port directly to forwarding upon link up Another possible explanation is that some links in the network run in half duplex mode RSTP uses a peer to peer protocol called Proposal Agreement to ensure transitioning in the event of a link ROS v3 7 0 User Guide 125 RS900LWG RS930LW 5 Spanning Tree failure This protocol requires full duplex operation When RSTP detects a non full duplex port it cannot rely on Proposal Agreement protocol and must make the port transition the slow i e STP way If possible configure the port for full duplex operation Otherwise configure the port s point to point setting to true Either one will allow the Proposal Agreement protocol to be used Problem Three When test your switch by deliberately breaking a link it takes a long time before I can poll devices past the switch thought RSTP was supposed to be fast What is happening Is it possible that some ports participating in the topology have been configured to STP mode or that the port s point to point parameter is set to false STP and multipoint ports converge slowly after failures occur Is it possible that the port has migrated to STP If the port is connected to the LAN segment by shared media and STP bridges are connected to that media then convergence after link failure will be slow Delays on the order of tens or hundreds of milliseconds can resu
197. nd transmitted packets with a size of 512 to 1023 octets This includes received and transmitted packets as well as dropped and local received packets This does not include rejected received packets Pkt1024to1536Octets Synopsis 0 to 4294967295 The number of received and transmitted packets with a size of 1024 to 1536 octets This includes received and transmitted packets as well as dropped and local received packets This does not include rejected received packets ROS v3 7 0 User Guide 74 RS900LWG RS930LW 3 Ethernet Statistics DropEvents Synopsis 0 to 4294967295 The number of received packets that are dropped due to lack of receive buffers OutMulticasts Synopsis 0 to 18446744073709551615 The number of transmitted multicast packets This does not include broadcast packets OutBroadcasts Synopsis 0 to 18446744073709551615 The number of transmitted broadcast packets UndersizePkts Synopsis 0 to 18446744073709551615 The number of received packets which meet all the following conditions 1 Packet data length is less than 64 octets 2 Collision Event has not been detected 3 Late Collision Event has not been detected 4 Packet has valid CRC OutUcastPkts Synopsis 0 to 18446744073709551615 The number of transmitted unicast packets 3 3 Clearing Ethernet Port Statistics Clear Ethernet Port Statistics Port1 Port2 Port3 Port4 D Port5 Port6 Port Port8 Port9 Po
198. nded that network analysis and planning inform the steps of configuring the VLAN and MSTP parameters in particular Begin with a set of MSTP capable Ethernet bridges and MSTP disabled For each bridge in the network 1 Configure and enable RSTP see sections Section 5 4 1 Bridge RSTP Parameters and Section 5 4 2 Port RSTP Parameters Note that the Max Hops parameter in the Bridge RSTP Parameters menu is the maximum hop count for MSTP 2 Create the VLANs that will be mapped to MSTIs see the sections on VLAN Configuration 3 Map VLANs to MSTIs via the VLAN Configuration menus Note that MSTP need not be enabled in order to map a VLAN to an MSTI Note also that this mapping must be identical for each bridge that is to belong to the MST region 4 Configure a Region Identifier and Revision Level Note that these two items must be identical for each bridge in the MST region see section Section 5 4 3 MST Region Identifier ROS v3 7 0 User Guide 102 RS900LWG RS930LW 5 Spanning Tree 5 Verify that the Digest field in the MST Region Identifier menu is identical for each bridge in the MST region If it is not then the set of mappings from VLANs to MSTIs differs 6 Configure Bridge Priority per MSTI see section Section 5 4 4 Bridge MSTI Parameters 7 Configure Port Cost and Priority per port and per MSTI see section Section 5 4 5 Port MSTI Parameters 8 Enable MSTP see section Section
199. nected to Port C2 receives the Group 2 multicast 10 3 Multicast Filtering Configuration and Status The Multicast Filtering menu is available from the main menu ROS v3 7 0 User Guide 189 RS900LWG RS930LW 10 Multicast Filtering Log out Main Menu e Administration e Ethernet Ports e Ethernet Statistics e Link Aggregation e Spanning Tree e Virtual LANs e Port Security Classes of Service e Multicast Filtering e Configure IGMP Parameters access admin e Configure Port GMRP Parameters e Configure Static Multicast Groups e View IP Multicast Groups e View Multicast Group Summary MAC Address Tables e Network Discovery e Diagnostics Figure 10 4 Multicast Filtering Menu 10 3 1 Configuring IGMP Parameters Note that the activation of IGMP on a per VLAN basis is configured using Static VLANs Back IGMP Parameters Mode Passive Active C Query Interval en S Router Ports None Router Forwarding Off On RSTP Flooding Off On Apply Reload Figure 10 5 IGMP Parameters Form ROS v3 7 0 User Guide 190 RS900LWG RS930LW 10 Multicast Filtering Mode Synopsis Passive Active Default Passive Specifies IGMP mode PASSIVE the switch passively snoops IGMP traffic and never sends IGMP queries ACTIVE the switch generates IGMP queries if no queries from a better candidate for being the querier are detected for a while Query I
200. nections to end devices that support multiple VLANs at the same time ROS v3 7 0 User Guide 129 RS900LWG RS930LW 6 VLANs 6 1 6 VLAN Ingress and Egress Rules Ingress Rules These are the VLAN ingress rules i e the rules applied to all frames when they are received by the switch Frame received SC Tagged Priority This does not depend on ingress port s VLAN Untagged Tagged VID 0 configuration parameters valid VID VLAN ID associated with the frame PVID PVID VID in the tag Frame dropped due to its tagged untagged format No No No Frame dropped if frame associated with VLAN not N A N A Yes configured or learned in the switch Frame dropped if ingress port is nota member of the VLAN N A N A No the frame is associated with Egress Rules 6 1 7 6 1 8 These are the VLAN egress rules i e the rules applied to all frames when they are transmitted by the switch Frame sent On egress port s On other VLAN Egress port type native VLAN Port is a member Port is not a of the VLAN member of the VLAN Edge According to the N A frame is dropped Trunk egress port s PVID Tagged dropped Format parameter 99 pE Forbidden Ports List Each VLAN can be configured to exclude ports from membership in the VLAN VLAN aware and VLAN unaware Operation Modes The native operation mode for an IEEE 802 1Q compliant switch is VLAN aware E
201. nfiguring RMON Events e Viewing collected RMON Event logs The Ethernet Statistics menu is accessible from the main menu access Log out Main Menu admi Administration Ethernet Ports Ethernet Statistics View Ethernet Statistics View Ethernet Port Statistics Clear Ethernet Port Statistics Configure RMON History Controls Configure RMON Alarms Configure RMON Events S e e e Link Aggregation Spanning Tree d LANs Port Security Classes of Service Multicast Filtering MAC Address Tables Diagnostics L E e e e e Figure 3 1 Ethernet Port Statistics Menu 3 1 Viewing Ethernet Statistics This table provides basic Ethernet statistics information which is reset periodically every few seconds This traffic view is useful when the origin and destination of a traffic flow need to be determined ROS v3 7 0 User Guide 69 RS900LWG RS930LW 3 Ethernet Statistics Log out Ethernet Statistics access admin Back Port State InOctets OutOctets InPkts OutPkts ErrorPkts 1 Down 0 0 0 0 0 2 Up 1484 6044 12 18 0 3 Down 0 0 0 0 0 4 Up 128 0 2 0 0 6 Down 0 0 0 0 0 8 Down 0 0 0 0 0 H Down 0 0 0 0 0 10 Down 0 0 0 0 0 11 Down 0 0 0 0 0 113 Up 0 128 0 2 0 14 Up 0 192 0 3 0 115 Up 10 128 0 2 0 16 Up 0 128 0 2 0 LZ Up 10 192 0 3 0 18 Down 0 0 0 0 0 19 Up O 192 0 3 0 20 Up 192 D 3 0 0 Figure 3 2 Ethernet Statistics Table Figure 2 Ethernet Statistics Table
202. ng Default guest Related user name is in the Guest Username field view only cannot change settings or run any commands Confirm Guest Password Synopsis 15 character ASCII string Default None Confirm the input of the above Guest Password Operator Username Synopsis 15 character ASCII string Default operator Related password is in the Oper Password field cannot change settings can reset alarms statistics logs etc Operator Password Synopsis 15 character ASCII string Default operator Related user name is in the Oper Username field cannot change settings can reset alarms statistics logs etc Confirm Operator Password Synopsis 15 character ASCII string Default None Confirm the input of the above Operator Password Admin Username Synopsis 15 character ASCII string Default admin Related password is in the Admin Password field full read write access to all settings and commands Admin Password Synopsis 15 character ASCII string Default admin ROS v3 7 0 User Guide 31 RS900LWG RS930LW 1 Administration Related user name is in the Admin Username field full read write access to all settings and commands Confirm Admin Password Synopsis 15 character ASCII string Default None Confirm the input of the above Admin Password 1 10 Time Synchronization ROS supports e Local hardware time keeping and time zone manage
203. nistration The Administration menu covers the configuration of administrative parameters of both device and network local services availability security methods employed system identification and functionality related to the IP network e IP Address Subnet Mask and Gateway Address static or dynamically obtainable e Management VLAN e Management Connection Inactivity Timeout e TFTP Server Permissions e System Identification e Passwords e Time and Date e SNTP to keep the time and date synchronized e SNMP Management e Radius Server e DHCP Relay Agent e Remote Syslog 1 1 The ROS User Interface 1 1 1 Using the RS232 Port to Access the User Interface Attach a terminal or PC running terminal emulation software to the RS232 port The terminal should be configured for 8 bits no parity operation at 57 6 Kbps Hardware and software flow control must be disabled Select a terminal type of VT100 Once the terminal is connected pressing any key on the keyboard will prompt for the user name and password to be entered The switch is shipped with a default administrator user name admin and password admin Once successfully logged in the user will be presented with the main menu 1 1 2 The Structure of the User Interface The user interface is organized as a series of menus with an escape to a command line interface CLI shell Each menu screen presents the switch name as provided by the System Identificatio
204. nterval Synopsis 10 to 3600 Default 60 s The time interval between IGMP queries generated by the switch Note This parameter also affects the Group Membership Interval i e the group subscriber aging time therefore it takes effect even in PASSIVE mode Router Ports Synopsis Any combination of numbers valid for this parameter Default None This parameter specifies ports that connect to multicast routers If you do not configure known router ports the switch may be able to detect them however it is advisable to pre configure them Router Forwarding Synopsis Off On Default On This parameter specifies whether multicast streams will be always forwarded to multicast routers RSTP Flooding Synopsis Off On Default Off This parameter specifies whether multicast streams will be flooded out of all RSTP non edge ports upon topology change detection Such flooding is desirable if guaranteed multicast stream delivery after topology change is most important ROS v3 7 0 User Guide 191 RS900LWG RS930LW 10 Multicast Filtering 10 3 2 Configuring Static Multicast Groups x i access Log out Static Multicast Groups gegen Back InsertRecord pe vn cos pos 01 00 5E 00 04 00 4 Normal 5 7 9 O1 A0 F4 01 00 70 1 High 48 01 A0 F4 01 20 F5 1 Normal 1 3 6 Figure 10 6 Static Multicast Groups Table Static Multicast Groups MAC Address 00 00 00 00 00 00 VID Poo N CoS
205. nu system and shell by pressing lt Ctrl S gt For more information on the capabilities of the shell please refer to Chapter 14 Using the CLI Shell 1 2 The ROS Secure Shell Server 1 2 1 Using a Secure Shell to Access the User Interface SSH Secure Shell is a network protocol which provides a replacement for insecure remote login and command execution facilities such as telnet and remote shell SSH encrypts traffic in both directions preventing traffic sniffing and password theft SSH protocol version 2 is implemented in ROS The authentication method is keyboard interactive password authentication A user logged in via SSH has the same privileges as one logged in via the console port 1 2 2 Using a Secure Shell to Transfer Files ROS implements an SFTP server via SSH to transfer files securely The file system visible on the RuggedSwitch has a single directory The files in it are created at startup time and can be neither deleted nor renamed Existing files can be downloaded from the switch For example firmware images may be downloaded for backup and log files may be downloaded for analysis Some files may be overwritten by uploading a file of the same name to the switch as would be done in order to upgrade the firmware The implemented commands are dir Is list directory contents get download a file from the switch put upload a file to the switch ROS v3 7 0 User Guide 17 RS900LWG RS930LW 1 Administra
206. ocol RCDP RuggedExplorer Enhanced Rapid Spanning Tree Protocol eRSTP are trademarks of RuggedCom Inc Rugged Operating System ROS and RuggedSwitch are registered trademarks of RuggedCom Inc Other designations in this manual might be trademarks whose use by third parties for their own purposes would infringe the rights of the owner Warranty Five 5 years from date of purchase return to factory For warranty details visit www ruggedcom com or contact your customer service representative Contacting RuggedCom Corporate Headquarters US Headquarters Europe Headquarters RuggedCom Inc RuggedCom RuggedCom 30 Whitmore Road 1930 Harrison St Suite 209 Unit 41 Aztec Centre Woodbridge Ontario Hollywood Florida Aztec West Almondsbury Bristol Canada L4L 724 USA 33020 United Kingdom BS32 4TD Tel 905 856 5288 Tel 954 922 7938x103 Tel 44 1454 203 404 Fax 905 856 1995 Fax 954 922 7984 Fax 44 1454 203 403 Toll free 1 888 264 0006 Toll free 1 888 264 0006 Email RuggedSales RuggedCom com Technical Support Toll Free North America 1 866 922 7975 International 1 905 856 5288 Email Support RuggedCom com Web www RuggedCom com Rugged Operating System Table of Contents LEE 13 Supported Platforms attente EEAtee 13 Who Should Use This User Guide ENNEN 13 How Chapters are organized EE 13 Document S01 g 02 EE 13 Applicable Firmwa
207. of the cable diagnostic parameters for the port as indicated below Port Synopsis 1 to X The port number as seen on the front plate silkscreen of the switch State Started Stopped or N A Start or stop cable diagnostics on the selected port If a port does not support cable diagnostics State will be reported as N A Runs Synopsis 0 to 65535 The total number of times that cable diagnostics are to be performed on the selected port If set to 0 cable diagnostics will be performed until diagnostics are stopped explicitly Calib Synopsis 100 0 m to 100 0 m The calibration value can be used to adjust the estimated distance to the fault Refer to Calibrating Estimated Distance To Fault for details on setting this parameter Good Synopsis 0 to 65535 The number of times that GOOD TERMINATION no fault has been detected on the cable pairs of the selected port Open Synopsis 0 to 65535 The number of times that OPEN has been detected on the cable pairs of the selected port Short Synopsis 0 to 65535 The number of times that SHORT has been detected on the cable pairs of the selected port Imped Synopsis 0 to 65535 The number of times that IMPEDANCE MISMATCH has been detected on the cable pairs of the selected port Pass Fail Total Synopsis 0 to 65535 0 to 65535 0 to 65535 This field summarizes the results of the cable diagnostics performed so far e Pass the number of times that cable diagnostics were completed successfully on th
208. om which the TCNs are arriving Sign on to the switch at the other end of the link attached to that port Repeat this step until the switch generating the TCNs is found i e the switch that is itself not receiving a large number of TCNs Determine the problem at that switch ROS v3 7 0 User Guide 127 RS900LWG RS930LW 6 VLANs 6 VLANs ROS provides the following VLAN features e Support for up to 255 VLANs e Configurable port native VLAN e Port modes of operation tailored to edge devices such as a PC or IED and to network switch interconnections e A default setting that ensures configuration free connectivity in certain scenarios e Ability to force either tagged or untagged operation on the port native VLAN e Ability to switch between VLAN aware and VLAN unaware modes of operation e GARP VLAN Registration Protocol GVRP e Double VLAN tagging or QinQ e Configurable management VLAN 6 1 VLAN Operation 6 1 1 VLANs and Tags A virtual LAN or VLAN is a group of devices on one or more LAN segments that communicate as if they were attached to the same physical LAN segment VLANs are extremely flexible because they are based on logical instead of physical connections When VLANs are introduced all traffic in the network must belong to one or another VLAN Traffic on one VLAN cannot pass to another except through an internetwork router or Layer 3 switch A VLAN tag is the identification information that is pre
209. onfiguration information between a Network Access Server which desires to authenticate its links and a shared Authentication Server RADIUS is also used also widely utilized in conjunction with 802 1x for port security using EAP See Appendix A A RADIUS server can act as a proxy client to other RADIUS servers or other kinds of authentication servers Unlike TACACS authorization and authentication functionality is supported by RADIUS in the same packet frame TACACS actually separates authentication from authorization into separate packets On receiving an authentication authorization request from a client in an Access Request packet the RADIUS server checks the conditions configured for received username password combination in the user database If all the conditions are met the list of configuration values for the user is placed into an Access Accept packet These values include the type of service e g SLIP PPP Login User and all the necessary values to deliver the desired service 1 12 2 User Login Authentication and Authorization A RADIUS server can be used to authenticate and authorize access to the device s services such as HMI via Serial Console Telnet SSH RSH Web Server see Password Configuration ROS implements a RADIUS client which uses the Password Authentication Protocol PAP to verify access Attributes sent to a RADIUS server are user name user password service type Login vendor spe
210. only receive LLDP frames e disabled the local LLDP agent can neither transmit nor receive LLDP frames Notifications Synopsis Disabled Enabled Default Disabled Enabling notifications will allow the LLDP agent to send notifications and generate alarms for the port 12 3 1 3 LLDP Global Remote Statistics access admin LLDP Global Remote Statistics Inserts Deletes Drops Ageouts Reload Figure 12 6 LLDP Global Remote Statistics Form Inserts Synopsis 0 to 4294967295 The number of times an entry was inserted into the LLDP Neighbor Information Table Deletes Synopsis 0 to 4294967295 ROS v3 7 0 User Guide 209 RS900LWG RS930LW 12 Network Discovery The number of times an entry was deleted from the LLDP Neighbor Information Table Drops Synopsis 0 to 4294967295 The number of times an entry was deleted from the LLDP Neighbor Information Table because the information timeliness interval has expired Ageouts Synopsis 0 to 4294967295 The number of all TLVs discarded 12 3 1 4 LLDP Neighbor Information LLDP Neighbor Information access admin z oo oa Dc 0B 59 40 r sfrcsw5 RSG2100 R RMHI XXX 3 000ADC A0 A8 C0 00 0A DC 10 A8 C0 localhost localdoma Linux 2 6 26 2 gx1 5 00 0A DC 10 A8 C0 00 0A DC 10 A8 C1 localhostlocaldoma Linux 2 6 26 2 gx1 Figure 12 7 LLDP Neighbor Information Table Port Synopsis 0 to 4294967295 The local port associated with this entry Chas
211. operation is that of a duplex mismatch If one end of the link is fixed to full duplex and the peer auto negotiates the auto negotiating end falls back to half duplex operation At lower traffic volumes the link may display few if any errors As the traffic volume rises the fixed negotiation side will begin to experience dropped packets while the auto negotiating side will experience collisions Ultimately as traffic loads approach 100 the link will become entirely unusable Note The ping command with flood options is a useful tool for testing commissioned links The command ping 192 168 0 1 500 2 can be used to issue 500 pings each separated by two milliseconds to the next switch If the link used is of high quality then no pings should be lost and the average round trip time should be small Problem Two am trying to use the LFI protection feature but my links won t even come up Is it possible that the peer also has LFI enabled If both sides of the link have LFI enabled then both sides will withhold link signal generation from each other ROS v3 7 0 User Guide 68 RS900LWG RS930LW 3 Ethernet Statistics 3 Ethernet Statistics ROS Ethernet Statistics provide you with the following abilities e Viewing basic Ethernet statistics e Viewing and clearing detailed Ethernet statistics e Configuring RMON History control e Viewing collected RMON History samples e Configuring RMON Alarms e Co
212. ort cable pair s is are detected on the tested cable e Imped Impedance Mismatch is detected on the tested cable The corresponding counts for each of these status conditions indicates the number of occurrences of each type of fault For a typical no fault Category 5 cable plugged into a 100BASE T port Good will be incremented by two after every run of cable diagnostics once for each cable pair used by a 100BASE T port Note that for a 1000BASE T port four cable pairs will be tested and so Good will be incremented by four after every successful run For a fault condition an estimated distance to the fault will be calculated and recorded in the system log For detailed information about which cable pair has been detected to have experienced which type of fault and the corresponding distance to the fault please refer to the system log file Note The Runs parameter cannot be changed while cable diagnostics are running on a port In order to change the value stop the diagnostic run on the port change the Runs parameter and restart diagnostics On ports that do not support cable diagnostics N A will be shown as the cable diagnostics state and any settings made to the Runs and Calibration fields will be discarded 2 2 4 3 Calibrating Estimated Distance To Fault Take the following steps to calibrate the Calib parameter the estimated distance to fault ROS v3 7 0 User Guide 62 RS900LWG RS930LW 2 Ethernet
213. orts are not prevented from communicating with ports off the switch whether protected remotely or not ROS v3 7 0 User Guide 132 RS900LWG RS930LW 6 VLANs 6 1 11 QinQ QinQ is also known as double VLAN tagging or as Nested VLANs It is used to overlay a private Layer 2 network over a public Layer 2 network A large network service provider for example might have several clients whose networks each use multiple VLANs It is likely that the VLAN IDs used by these different client networks would conflict with one another were they mixed together in the provider s network Using double VLAN tagging each client network could be further tagged using a client specific VID at the edges where the clients networks are connected to the network service provider s infrastructure Frames ingressing an edge port of the service provider switch are tagged with VIDs of the customer s private network When those frames egress the switch s QinQ enabled port into the service provider network the switch always adds an extra tag called outer tag on top of the frames original VLAN tag called inner tag and the outer tag VID is the PVID of the frames ingress edge port This means that traffic from an individual customer is tagged with his unique VID and is thus segregated from other customers traffic Within the service provider network switching is based on the VID in the outer tag When double tagged frames leave the service
214. p the root from one port to another the problem may be one of traffic prioritization See problem five Another possible cause of intermittent operation is that of an auto negotiation mismatch If one end of the link is fixed to full duplex mode and the peer auto negotiates the auto negotiating end will fall back to half duplex operation At lower traffic the volumes the link may display few if any errors As the traffic volume rises the fixed negotiation side will begin to experience dropped packets while the auto negotiating side will experience collisions Ultimately as traffic loads approach 100 the link will become entirely unusable At this point RSTP will not be able to transmit configuration messages over the link and the spanning tree topology will break down If an alternate trunk exists RSTP will activate it in the place of the congested port Since activation of the alternate port often relieves the congested port of its traffic the congested port will once again become reliable RSTP will promptly enter it back into service beginning the cycle once again The root port will flip back and forth between two ports on the switch Problem Two My PC IED Device is connected to your switch After reset the switch it takes a long time before it comes up Is it possible that the RSTP edge setting for this port is set to false If Edge is set to false the bridge will make the port go through two forward delay times before the port ca
215. parated by a comma For example to run a command as user admin with password secret the token would be admin secret command_string The ROS shell command to execute The access level corresponding to the user name selected must support the given command ROS v3 7 0 User Guide 228 RS900LWG RS930LW 14 Using the CLI Shell Any output from the command will be returned to the workstation submitting the command Commands that start interactive dialogs such as trace cannot be used 14 8 Resetting the Device The CLI command reset lt CR gt can be used to reset the device ROS v3 7 0 User Guide 229 RS900LWG RS930LW 15 Firmware Upgrade and Configuration Management 15 Firmware Upgrade and Configuration Management ROS provides flexible powerful mechanisms for the bulk update and backup of system firmware and of the configuration database The ROS firmware and configuration database are represented as files in the internal file system and bulk update and backup consist of simply transferring files to and from the ROS device by one of the several means provided ROS also implements an SQL command language in order to provide the flexibility and power of a database model when configuring ROS based devices Files Of Interest The files in ROS that may be updated and backed up are described below e main bin the main ROS application firmware image Upgrades to ROS are made via updates
216. plications the IEEE 802 1w specification limits port costs to values of 1 to 200000 with a path cost corresponding to the 2x1012 link speed RuggedCom bridges support interoperability with legacy STP bridges by selecting the style to use In practice it makes no difference which style is used as long as it is applied consistently across the network or if costs are manually assigned 5 1 5 Bridge Diameter The bridge diameter is the maximum number of bridges between any two possible points of attachment of end stations to the network The bridge diameter reflects the realization that topology information requires time to propagate hop by hop through a network If configuration messages take too long to propagate end to end through the network the result will be an unstable network There is a relationship between the bridge diameter and the maximum age parameter To achieve extended ring sizes RuggedCom eRSTP uses an age increment of 1 4 of a second The value of the maximum bridge diameter is thus four times the configured maximum age parameter Note Raise the value of the maximum age parameter if implementing very large bridged networks or rings 5 2 MSTP Operation The Multiple Spanning Tree MST algorithm and protocol provide greater control and flexibility than RSTP and legacy STP MSTP Multiple Spanning Tree Protocol is an extension of RSTP whereby multiple spanning trees may be maintained on the same bridged ne
217. priority level and these traffic flows burst continuously to 100 of the line bandwidth STP may be disrupted It is therefore advised not to use the highest CoS Problem Six After bring up a new port the root moves on to that port and don t want it to The port that want to become root won t do so ROS v3 7 0 User Guide 126 RS900LWG RS930LW 5 Spanning Tree Is it possible that the port cost is incorrectly programmed or that auto negotiation derives an undesired value Inspect the port and path costs with each port active as root Problem Seven My IED Controller doesn t work with your switch Certain low CPU bandwidth controllers have been found to behave less than perfectly when they receive unexpected traffic Try disabling STP for the port If the controller fails around the time of a link outage then there is the remote possibility that frame disordering or duplication may be the cause of the problem Try setting the root port of the failing controller s bridge to STP Problem Eight My network runs fine with your switch but occasionally lose polls to my devices Inspect network statistics to determine whether the root bridge is receiving TCNs around the time of observed frame loss It may be possible that you have problems with intermittent links in your network Problem Nine I m getting a lot of TCNs at the root where are they coming from Examine the RSTP port statistics to determine the port fr
218. provider network they egress a QinQ enabled port of another switch The switch strips the outer tag while associating the frames with the VID extracted from it before stripping Thus the frames are switched to appropriate edge ports i e to appropriate customers Customer 2 Customer 1 Qing PVID X Network Service PVID X Switch 1 Provider Switch 2 PVID Y Infrastructure Customer 1 Customer 2 Figure 6 2 Using QinQ Example Note QinQ can only be enabled on one switch port at a time ROS v3 7 0 User Guide 133 RS900LWG RS930LW 6 VLANs Note Some RuggedSwitch models only support QinQ if all edge ports are configured with the same PVID In this case a dedicated switch must be assigned to each customer 6 2 VLAN Applications 6 2 1 Traffic Domain Isolation VLANs are most often used for their ability to restrict traffic flows between groups of devices Unnecessary broadcast traffic can be restricted to the VLAN that requires it Broadcast storms in one VLAN need not affect users in other VLANs Hosts on one VLAN can be prevented from accidentally or deliberately assuming the IP address of a host on another VLAN By configuring the management VLAN a management domain can be established that restricts the number of users able to modify the configuration of the network The use of creative bridge filtering and multiple VLANs can carve seemingly unified IP subnets into multiple regions policed by differ
219. psis 0 to 4294967295 The number of good packets Unicast Multicast Broadcast and dropped packets received InBroadcasts Synopsis 0 to 4294967295 The number of broadcast packets received InMulticasts Synopsis 0 to 4294967295 The number of multicast packets received CRCAlignErrors Synopsis 0 to 4294967295 The number of packets received that meet all the following conditions 1 Packet data length is between 64 and 1536 octets inclusive 2 Packet has invalid CRC 3 Collision Event has not been detected 4 Late Collision Event has not been detected UndersizePkts Synopsis 0 to 4294967295 The number of received packets that meet all the following conditions 1 Packet data length is less than 64 octets 2 Collision Event has not been detected 3 Late Collision Event has not been detected 4 Packet has valid CRC OversizePkts Synopsis 0 to 4294967295 The number of packets received with data length greater than 1536 octets and valid CRC Fragments Synopsis 0 to 4294967295 The number of packets received that meet all the following conditions 1 Packet data length is less than 64 octets 2 Collision Event has not been detected 3 Late Collision Event has not been detected 4 Packet has invalid CRC Jabbers Synopsis 0 to 4294967295 The number of packets that meet all the following conditions 1 Packet data length is greater that 1536 octets 2 Packet has invalid CRC Collisions Synopsis 0 to 4294967295 ROS v3 7 0 U
220. r performance RSTP will recognize a link failure and put an alternate port into forwarding within milliseconds e RSTP may be enabled on a per port basis Ports may be configured as edge ports which allow rapid transitioning to the forwarding state for non STP hosts e Path costs may be hard configured or determined by port speed negotiation in either the STP or RSTP style Full bridge and port status displays provide a rich set of tools for performance monitoring and debugging Note Historically a device implementing STP on its ports has been referred to as a bridge RuggedCom uses the terms bridge and switch synonymously e SNMP manageable including newRoot and topologyChange traps 5 1 RSTP Operation The 802 1D Spanning Tree Protocol STP was developed to enable the construction of robust networks that incorporate redundancy while pruning the active topology of the network to prevent loops While STP is effective it requires that frame transfer halt after a link outage until all bridges in the network are guaranteed to be aware of the new topology Using the values recommended by 802 1D this period lasts 30 seconds The Rapid Spanning Tree Protocol RSTP IEEE 802 1w was a further evolution of the 802 1D Spanning Tree Protocol It replaced the settling period with an active handshake between bridges that guarantees the rapid propagation of topology information throughout the network RSTP also offers a number of other si
221. ration of ROS based devices via RCDP The features supported by RCDP include e Discovery of ROS based devices over a Layer 2 network e Retrieval of basic network configuration ROS version order code and serial number e Control of device LEDs for easy physical identification e Configuration of basic identification networking and authentication parameters Note RCDP is not compatible with VLAN based network configurations For correct operation of RuggedExplorer no VLANs tagged or untagged must be configured All VLAN configuration items must be at their default settings Note ROS responds to RCDP requests only it does not under any circumstances initiate any RCDP based communication 12 3 Network Discovery Menu The main Network Discovery menu links to configuration menus for both LLDP and RCDP ROS v3 7 0 User Guide 204 RS900LWG RS930LW 12 Network Discovery e access Main Menu admin Administration Ethernet Ports Ethernet Stats Link Aggregation Spanning Tree Virtual LANs Port Security Classes of Service Multicast Filtering MAC Address Tables Network Discovery e Link Layer Discovery Protocol e RuggedCom Discovery Protocol Diagnostics Figure 12 1 Network Discovery Main Menu 12 3 1 LLDP Menu The LLDP menu is used to configure LLDP on the switch globally and per port to exchange LLDP information with neighbors and to view LLDP information and statistics ROS
222. rcumstances Note This feature must not be enabled at both ends of a link Link Alarms Synopsis Off On Default On Disabling link state alarms will prevent alarms and LinkUp and LinkDown SNMP traps from being sent for that port ROS v3 7 0 User Guide 55 RS900LWG RS930LW 2 Ethernet Ports Note If one end of the link is fixed to a specific speed and duplex type and the peer auto negotiates there is a strong possibility that the link will either fail to raise or raise with the wrong settings on the auto negotiating side The auto negotiating peer will fall back to half duplex operation even when the fixed side is full duplex Full duplex operation requires that both ends are configured as such or else severe frame loss will occur during heavy network traffic At lower traffic volumes the link may display few if any errors As the traffic volume rises the fixed negotiation side will begin to experience dropped packets while the auto negotiating side will experience excessive collisions Ultimately as traffic load approaches 100 the link will become entirely unusable These problems can be avoided by always configuring ports to the appropriate fixed values 2 2 2 Port Rate Limiting Port Rate Limiting 1000 Kbps Broadcast Disabled 1000 Kbps Broadcast Disabled 1000 Kbps Broadcast Disabled 1000 Kbps Broadcast Disabled 1000 Kbps Broadcast Disabled 1000 Kbps Broadcast Disable
223. re Revision ENEE 14 Firmware User Guide Version Numbering System cceeeeeeeeeeeeeeeeeeeeeneeeeeeseneeeeesaas 14 1s elle E e EE 15 1 1 The ROS User e 15 1 1 1 Using the RS232 Port to Access the User Interface ssnseseeeeeeseeeereresene 15 1 1 2 The Structure of the User Interface AAA 15 1 1 3 Making Configuration Changes use EEERESEERENEREEEERREEREEEESEEEEREENESEEEKENRSEH 16 1 1 4 Updates Occur In Real Un 17 1 1 5 Alarm Indications Are Provided wiicc cacsiacicinescencnnesnenigcecismmedsleetiavaninctineaiines 17 AB Get Cer Rn E 17 1 2 The ROS Secure Shell Server sssccssciesctecsssveasvecesiaies seassanteeaceeeiaceasenenenteneneensenn ne 17 1 2 1 Using a Secure Shell to Access the User Interface ccceceeeeeeeeeteeeeeeeees 17 1 2 2 Using a Secure Shell to Transfer Files ccecceeeeeeeeeeeeeeeeeeeeeeeeeeeeeeenaeeeees 17 1 3 The ROS Web Server Interface AAA 18 1 3 1 Using a Web Browser to Access the Web Interface 0 ccccessseeeeeeeeeeeeees 18 1 3 2 The Structure of the Web Interface sssicersdencecccesssccesvs senecceriiaeteersnestanscintnertes 20 1 3 3 Making Configuration Changes sssssseesssseeeserrssrrnrerennntsstrrssetrnnnrennnneenne 21 1 3 4 Updating Statistics Displays cece ee eeeeneeeeeeceeeeeeeeeeeeeeeeaeeeeeeenaaeerene 22 14 Administration Kleng scccccisssschecesentennsaseebhaxsiaunecisigiodecenteinda need ENEAN E R ENE 22 1 5 PnterlaC EE 23 ebe P AVON Se
224. re than two bridges operate on a shared media link If RSTP detects this circumstance based upon the porte half duplex state after link up it will switch off Proposing Agreeing The port must transition through the learning and forwarding states spending one forward delay in each state There are circumstances in which RSTP will make an incorrect decision about the point to point state of the link simply by examining the half duplex status namely e The port attaches only to a single partner but through a half duplex link e The port attaches to a shared media hub through a full duplex link The shared media link attaches to more than one RSTP enabled bridge In such cases the user may configure the bridge to override the half duplex determination mechanism and force the link to be treated in the proper fashion 5 1 4 Path and Port Costs The STP path cost is the main metric by which root and designated ports are chosen The path cost for a designated bridge is the sum of the individual port costs of the links between the root bridge and that designated bridge The port with the lowest path cost is the best route to the root bridge and is chosen as the root port How Port Costs Are Generated Port costs can be generated either as a result of link auto negotiation or manual configuration In actuality the primary determinant for root port selection is the root bridge ID Bridge ID is important mainly at network startup when the brid
225. received packets This includes data octets of rejected and local packets which are not forwarded to the switching core for transmission It should reflect all the data octets received on the line TotallnPkts Synopsis 0 to 18446744073709551615 The number of received packets This includes rejected dropped local and packets which are not forwarded to the switching core for transmission It should reflect all packets received on the line InBroadcasts Synopsis 0 to 18446744073709551615 The number of Broadcast packets received InMulticasts Synopsis 0 to 18446744073709551615 The number of Multicast packets received CRCAlignErrors Synopsis 0 to 4294967295 The number of packets received which meet all the following conditions 1 Packet data length is between 64 and 1536 octets inclusive 2 Packet has invalid CRC 3 Collision Event has not been detected 4 Late Collision Event has not been detected OversizePkts Synopsis 0 to 4294967295 The number of packets received with data length greater than 1536 octets and valid CRC Fragments Synopsis 0 to 4294967295 The number of packets received which meet all the following conditions 1 Packet data length is less than 64 octets 2 Collision Event has not been detected ROS v3 7 0 User Guide 73 RS900LWG RS930LW 3 Ethernet Statistics 3 Late Collision Event has not been detected 4 Packet has invalid CRC Jabbers Synopsis 0 to 4294967295 The number of packets which me
226. ripting and SQL commands offers a means to interrogate and maintain a large number of devices Consistency of configuration across sites may be verified by this method The following presents a simple example where the devices to interrogate are drawn from the file Devices C gt type Devices 10 0 1 1 JE OH 10 0 1 3 ROS v3 7 0 User Guide 237 RS900LWG RS930LW 15 Firmware Upgrade and Configuration Management c gt for F Si in devices do rsh Si l admin admin sql select from ethportcfg where flow_control disabled C gt rsh 10 0 1 1 l1 admin admin sql select from ethportcfg where flow_control disabled Port Name Status Media Type Flow Control FEFI Link Alarms 5 Port 5 Enabled Auto Select Disabled Disabled Enabled 1 records selected C gt rsh 10 0 1 2 1 admin admin sql select from ethportcfg where flow_control disabled 0 records selected C gt rsh 10 0 1 3 1 admin admin sql select from ethportcfg where flow_control disabled Port Name Status Media Type Flow Control FEFI Link Alarms 3 Port 2 Enabled Auto Select Disabled Disabled Enabled f Port 7 Enabled Auto Select Disabled Disabled Enabled 8 Port 8 Enabled Auto Select Disabled Disabled Enabled 13 Port 13 Enabled Auto Select Disabled Disabled Enabled 4 records selected Ch ROS v3 7 0 User Guide 238 RS900LWG RS930LW Appendix A SNMP MIB Support Appendix A SNMP MIB Support A 1 Standard MIBs RFC MOD
227. rise modes 7 2 4 MAC Filtering access Log out R admin e Administration e WLAN Interface Addressing Parameters Network Parameters Security Parameters MAC Filtering eee e MAC Filter Control e MAC Filter Table Radius Parameters Advanced Parameters DHCP Parameters Association Information Miscellaneous Parameters ee e e Figure 7 10 MAC Filtering Menu ROS v3 7 0 User Guide 152 RS900LWG RS930LW 7 Wireless LAN MAC Filter Control The MAC Filter Control form provides the ability to configure the policy of the WLAN MAC filter access admin MAC Filter Control Control Open Figure 7 11 MAC Filter Control Form Control Synopsis Open Allow Deny Default Open This parameter allows users to control the MAC filter policy The choices are listed below Open MAC filtering is not performed Allow Only allow specified MACs in the list Deny Only deny specified MACs in the list MAC Filter Table The MAC Filter Table provides the ability to configure the wireless LAN MAC filter table such as inserting or deleting a device s MAC address in the table access Log out MAC Filter Table ore Back InsertRecord Table empty Figure 7 12 MAC Filter Table ROS v3 7 0 User Guide 153 RS900LWG RS930LW 7 Wireless LAN MAC Address Synopsis where ranges 0 to FF Default 00 00 00 00 00 00
228. rization process e The TACACS standard priv_lvI attribute will be used to grant access to the device priv_lvl 15 represents an access level of admin 1 lt priv_lvl lt 15 represents an access level of operator i e any value from 2 to 14 priv_lvl 1 represents an access level of guest ROS v3 7 0 User Guide 44 RS900LWG RS930LW 1 Administration Note If an access level is not received in the response packet from the server then access will not be granted to the user 1 13 2 TACACS Server Configuration access Log out TACACS Server erae Back Primary 10 10 1 1 tacPlusSecret1 Backup 10 11 1 1 e tacPlusSecret2 Figure 1 27 TACACS Server Summary access Log out TACACS Server ie Back Server Primary IP Address 10 10 1 1 Auth TCP Port Auth Key tacPlusSecret Figure 1 28 TACACS Server Form ROS v3 7 0 User Guide 45 RS900LWG RS930LW 1 Administration Server Synopsis Any 8 characters Default Primary This field indicates whether this configuration is for a primary or a backup server IP Address Synopsis where ranges from 0 to 255 Default The TACACS server IP Address Auth TCP Port Synopsis 1 to 65535 Default 49 The authentication TCP Port on the TACACS server Auth Key Synopsis 31 character ASCII string Default The authentication key shared with the TACACS server It
229. rnet In Packets R Uint32 0406 2 Port 4 Statistics Ethernet In Packets R Uint32 ROS v3 7 0 User Guide 248 RS900LWG RS930LW Appendix D ModBus Management Support and Memory Map Address Registers Description Reference Table in Ul R W Format 0408 2 Port 5 Statistics Ethernet In Packets R Uint32 040A 2 Port 6 Statistics Ethernet In Packets R Uint32 040C 2 Port 7 Statistics Ethernet In Packets R Uint32 040E 2 Port 8 Statistics Ethernet In Packets R Uint382 0410 2 Port 9 Statistics Ethernet In Packets R Uint32 0412 2 Port 10 Statistics Ethernet In Packets R Uint32 0414 2 Port 11 Statistics Ethernet In Packets R Uint32 0416 2 Port 12 Statistics Ethernet In Packets R Uint32 0418 2 Port 13 Statistics Ethernet In Packets R Uint32 041A 2 Port 14 Statistics Ethernet In Packets R Uint32 041C 2 Port 15 Statistics Ethernet In Packets R Uint32 041E 2 Port 16 Statistics Ethernet In Packets R Uint32 Address Registers Description R W Format 0420 2 Port 17 Statistics Ethernet In Packets R Uint32 0422 2 Port 18 Statistics Ethernet In Packets R Uint32 0424 2 Port 19 Statistics Ethernet In Packets R Uint32 0426 2 Port 20 Statistics Ethernet In Packets R Uint32 0440 2 Port 1 Statistics Ethernet Out Packets R Uint32 0442 2 Port 2 Statistics Ethernet Out Packets R Uint32 0444 2 Port 3 Stati
230. rovide the ability to configure the switch to act as a relay agent for DHCP Option 82 ROS v3 7 0 User Guide 46 RS900LWG RS930LW 1 Administration The DHCP Relay Agent is communicating to the server on a management interface The agent s IP address is the address configured for the management interface access Log out DHCP Relay Agent Sich Back DHCP Server Address 1192 168 0 165 DHCP Client Ports 2 4 Reload Figure 1 29 DHCP Relay Agent Form DHCP Server Address Synopsis where ranges from 0 to 255 Default This parameter specifies the IP address of the DHCP server to which DHCP queries will be forwarded from this relay agent DHCP Client Ports Synopsis Any combination of numbers valid for this parameter Default None This parameter specifies ports where DHCP clients are connected Examples e All all ports of the switch can have DHCP clients connected e 2 4 6 8 ports 2 4 5 6 and 8 can have DHCP clients connected 1 15 Syslog The syslog provides users with the ability to configure local and remote syslog connections The remote syslog protocol defined in RFC 3164 is a UDP IP based transport that enables a device to send event notification messages across IP networks to event message collectors also known as syslog servers The protocol is simply designed to transport these event messages from the generating device to the collector The syslog client resides in RO
231. rrences So first alarm on the stack would be Alarm1 next latched alarm in the device is Alarm 2 and so on User has capability of seeing first 8 alarms from the stack if they exist Zero value is sent if an alarm does not exist D 1 7 PSStatusCmd Descriptive bit layout for providing the status of available power supplies in the unit Bits 0 4 of lower byte of the register are used for this purpose Bits 0 1 Power Supply 1 Status Bits 2 3 Power supply 2 Status Rest of the bits in the register do not provide any system status info at this time Interpretation of the values 01 Power Supply not present 1 10 Power Supply is functional 2 11 Power Supply is not functional 3 Values used for presenting power supply status have been derived from RuggedCom specific MIB for SNMP ROS v3 7 0 User Guide 253 RS900LWG RS930LW Appendix D ModBus Management Support and Memory Map Read Power Supply Status from device using PSStatusCmd E g A Modbus Request to read multiple registers from location 0x0043 0x04 0x00 0x43 0x00 0x01 Response may look like 0x02 0x00 Ox0A 0x04 In the above response lower byte of the register shows status of power supplies As per the response both power supplies in the unit are functional ROS v3 7 0 User Guide 254 RS900LWG RS930LW Appendix E Command Line Listing Appendix E Command Line Listing The following commands
232. rt before beginning to forward traffic Lower values allow the port to reach the forwarding state more quickly but at the expense of flooding unlearned addresses to all ports Max Hops Synopsis 6 to 40 Default 20 This parameter is only relevant for MSTP ignore it otherwise This parameter specifies the maximum possible bridge diameter inside an MST region MSTP BPDUs propagating inside an MST region carry a time to live parameter that is decremented by every switch that propagates ROS v3 7 0 User Guide 109 RS900LWG RS930LW 5 Spanning Tree the BPDU If the maximum number of hops inside the region exceeds the configured maximum BPDUs may be discarded due to their time to live information Cost Style Synopsis STP 16 bit RSTP 32 bit Default STP 16 bit This parameter selects the style of link costs to employ STP uses 16 bit path costs based upon 1x10EQ9 link speed 4 for 1Gbps 19 for 100 Mbps and 100 for 10 Mbps whereas RSTP uses 32 bit costs based upon 2x10E13 link speed 20 000 for 1Gbps 200 000 for 100 Mbps and 2 000 000 for 10 Mbps Note that RSTP link costs are used only when the bridge version support is set to allow RSTP and the port does not migrate to STP BPDU Guard Timeout Synopsis 1 to 86400 s or Until reset Don t shutdown Default Don t shutdown The RSTP standard does not address network security RSTP must process every received BPDU and take an appropriate action This opens a way for an at
233. rti0 Portti Portt2 TI Port13 TI Portti Portt5 Portt6 l Apply Figure 3 5 Clear Ethernet Port Statistics Form This command clears Ethernet ports statistics for one or more Ethernet ports Ports are chosen by checking the corresponding boxes 3 4 Remote Monitoring RMON The RuggedSwitch Remote Monitor RMON package provides the following capabilities ROS v3 7 0 User Guide 75 RS900LWG RS930LW 3 Ethernet Statistics e The ability to collect and view historical statistics in order to review performance and operation of Ethernet ports e The ability to record a log entry and or generate an SNMP trap when the rate of occurrence of a specified event is exceeded 3 4 1 RMON History Controls The RMON History Controls table programs the switch to take samples of the RMON MIB history statistics of an Ethernet port at regular intervals P access Log out RMON History Controls amii Back InsertRecord 1800 Monitor e 20 Monitor 4 D Figure 3 6 RMON History Controls Table access Log out RMON History Controls admin Back Index EI Port Requested Buckets Granted Buckets Interval 20 Owner Monitor Figure 3 7 RMON History Controls Form ROS v3 7 0 User Guide 76 RS900LWG RS930LW 3 Ethernet Statistics Index Synopsis 1 to 65535 Default 1 The index of this RMON History Control record
234. s 25 3 25 3 Mos 20 1 20 1 Mbs 15 4 15 4 Mbs 10 1 10 1 Mbs 5 1 5 1 Mbs 2 7 2 7 Mbs 1 2 1 2 Mbs Synopsis Long reach VDSL Auto 40 0 20 3 Mbs 25 3 5 1 Mbs 20 1 0 5 Mbs 15 2 0 5 Mbs 10 1 0 5 Mbs 5 1 0 5 Mbs 2 2 0 5 Mps 1 2 0 5 Mbs 0 5 0 2 Mbs Default Auto Specify required down stream Master to Slave and up stream Slave to Master bit rate If this parameter is set to Auto the system will automatically find the highest rate supported for the given media If this parameter is set to a fixed value the system will only try to achieve the specified rate ROS v3 7 0 User Guide 66 RS900LWG RS930LW 2 Ethernet Ports Note Depending on the actual physical link it may not be possible to achieve the configured fixed bit rate In that case the system will fall back to some default low rate link just to provide basic connectivity Link Synopsis Down Scan Up Status parameter indicates if optimal VDSL link is established While establishing the optimal link the device is scanning different VDSL profiles for signal quality to find the profile with the highest throughput Link Rate DS US Synopsis Any 14 characters Status parameter actual VDSL down stream Master to Slave and up stream Slave to Master bit rate SNR Mrgn Synopsis Any 9 characters Status parameter VDSL signal to noise ratio SNR margin The SNR margin is the computed SNR minus the SNR required for 10e 7 bit error rate B
235. s created and when the switch is initialized As new samples are added the window is automatically updated ROS v3 7 0 User Guide 77 RS900LWG RS930LW 3 Ethernet Statistics access admin RMON History 2 Samples 0 days 00 00 04 0 days 00 00 24 0 days 00 00 44 0 days 00 01 04 0 days 00 01 24 0 days 00 01 44 0 days 00 02 04 oO E cl E oo GA El oO GA NM L E LA E 6 Pa CO OO OO OH LO Figure 3 8 RMON History Samples Table ROS v3 7 0 User Guide 78 RS900LWG RS930LW 3 Ethernet Statistics Log out RMON History 2 Samples ania Back Sample 4 i StartTime 0 days 00 01 04 DropE vents 0 InOctets 13768 InPkts 131 InBroadcasts 9 InMulticasts 10 CRCAlignErrors 0 UndersizePkts 0 OversizePkts fl Fragments 0 Jabbers 0 Collisions o Utilization 0 Figure 3 9 RMON History Samples Form Sample Synopsis 0 to 4294967295 The sample number taken for this history record StartTime Synopsis DDDD days HH MM SS The system elapsed time when started interval over which this sample was measured DropEvents Synopsis 0 to 4294967295 The number of received packets that are dropped due to lack of receive buffers InOctets Synopsis 0 to 4294967295 The number of octets in good packets Unicast Multicast Broadcast and dropped packets received ROS v3 7 0 User Guide 79 RS900LWG RS930LW 3 Ethernet Statistics InPkts Syno
236. s ivcsicc cccetieestieacisadeceakeuactisisnananncasennaeeaeees baeeteatetaeeeandens 78 3 9 RMON History Samples e LEE 79 3 10 The Alarm ProG SS uniin a a se araen eaa ea heer ten g a ee 82 3 11 RMON Alarms 1 elt EE 82 3 12 AMON Alanis Eegenen terest EEN ee ee 83 Blo RMON Events Table egene ee Seen ee ee EE tebe 85 3 14 RMON Ru Et EE 86 3 15 RMON ul eg KEE 87 3 16 RMON Event Log FOM agessetciere dE ele EE 87 AN Late e Ee Ee ee 89 4 2 Displaying Port Trunk Secondary Ports in Layer 2 Feature Configuration ccce 90 4 3 Link Aggregation Menu EE 92 44 Pot MUNK Ta le a at iene aan a ENEE dee dE REENEN aR Ea a EN 92 4 5 ROrt Ro le FOM EE 93 5 t Bridge and Port States EE 95 5 2 Bridgeand ee 96 5 3 Example of a Structured Wiring Configuration seesssseeesssernserrrnnertnresssrrrnserrnnnnrnnnnesnne 103 5 4 Example of a Ring Backbone Configuration s ssssssessssrrneeerserrsrrressrrrrnerrnnnnsrtnrnssrennnet 105 5 5 Port RedundaNCy EE 106 5 6 Spanning Tree E 107 5 7 Bridge RSTP Parameters FOrm cssie ccess gic cecshescdeareelecanennte EEN dE EEN ege 108 5 8 Pon RSTP Parameter Table EE 110 5 9 Pont RSTP Parameter Ger EE 111 5 10 MST Region Identifier Fom uk 113 5 11 Bridge MSTI Parameters gute dE REESEN EES EENEG 114 5 12 Port MSTI Parameter Table EEN 115 5 13 Port MSTI Parameter Form ornoen aeee a a taetae 115 5 14 Bridge AS TP Statistics Form NEE 117 5 15 Port ASTP Statistics Table irsi naa eee
237. sent in frames in order to support VLAN operation 6 1 2 Tagged vs Untagged Frames Tagged frames are frames with 802 1Q VLAN tags that specify a valid VLAN identifier VID Untagged frames are frames without tags or frames that carry 802 1p Prioritization tags only having prioritization information and a VID of 0 Frames with a VID 0 are also called priority tagged frames When a switch receives a tagged frame it extracts the VID and forwards the frame to other ports in the same VLAN 6 1 3 Native VLAN Each port is assigned a native VLAN number the Port VLAN ID PVID When an untagged frame ingresses a port it is associated with the port s native VLAN By default when the switch transmits a frame on the native VLAN it sends the frame untagged The switch can be configured to transmit frames on the native VLAN tagged ROS v3 7 0 User Guide 128 RS900LWG RS930LW 6 VLANs 6 1 4 Management VLAN Management traffic like all traffic on the network must belong to a specific VLAN The management VLAN is configurable and always defaults to VLAN 1 This VLAN is also the default native VLAN for all ports thus allowing all ports the possibility of managing the product Changing the management VLAN can be used to restrict management access to a specific set of users 6 1 5 Edge and Trunk Port Types Each port can be configured to take on a type of Edge or Trunk Edge Type An Edge port attaches to a single end device
238. ser Guide 80 RS900LWG RS930LW 3 Ethernet Statistics The number of received packets for which Collision Event has been detected Utilization Synopsis 0 to 100 The best estimate of the mean physical layer network utilization on this interface during this sampling interval in percent 3 4 3 RMON Alarms The RMON Alarm table configures the switch to examine the state of a specific statistical variable The record of this table contains an upper and a lower threshold for legal values of the statistic in a given interval This provides the ability to detect events occurring more quickly than a specified maximum rate or less quickly than a specified minimum rate When a statistic value s rate of change exceeds its limits an internal alarm of INFO level is always generated Internal alarms can be viewed using the Diagnostics menu View Alarms command Additionally a statistic threshold crossing can result in further activity The RMON Alarm record can be configured to point to a particular RMON Event Record which can generate an SNMP trap an entry in the switch s event log or both The RMON Event Record can steer alarms towards different users defined in SNMP Users table The alarm record can point to a different event record for each of the thresholds so combinations such as trap on rising threshold or trap on rising threshold log and trap on falling threshold are possible Each RMON alarm may be configured
239. sh to perform Enable TFTP transfers to the ROS device as noted above Begin a TFTP transfer in binary mode to the device specifying a destination filename of main bin A TFTP client utility will provide an indication that the file was transferred properly but it is recommended to also query the device directly in order to verify successful transfer Establish a console session to the ROS device using RS232 telnet or SSH and enter the version command as described in Applying the Upgrade above If the transfer was successful the version of the firmware file that was transferred will appear as the Next firmware version i e that will appear after the next reset The transcript of a sample TFTP transfer looking at a DOS Windows CLI follows C gt tftp i 10 1 0 1 put C files ROD CF52_Main_v3 7 0 bin main bin Transfer successful 1428480 bytes in 4 seconds 375617 bytes s 15 1 3 Upgrading Firmware Using the ROS TFTP Client This method requires that the binary image file of the main ROS application firmware along with a correctly configured TFTP server be available on a computer with a network connection to the ROS device to be upgraded Identify the IP address of the host providing the TFTP server capability Ensure that the firmware revision to be downloaded e g ROS CF52_Main_v3 7 0 bin is present there Establish a console ROS v3 7 0 User Guide 232 RS900LWG RS930LW 15 Firmware Upgrade and Configurat
240. sisld Synopsis Any 19 characters Chassis Id information received from a remote LLDP agent Portld Synopsis Any 19 characters Port Id information received from a remote LLDP agent SysName Synopsis Any 19 characters System Name information received from a remote LLDP agent SysDesc Synopsis Any 19 characters System Descriptor information received from a remote LLDP agent ROS v3 7 0 User Guide 210 RS900LWG RS930LW 12 Network Discovery 12 3 1 5 LLDP Statistics access LLDP Statistics ageet RTE EE ET EE Ee d Mi ee E E e lf e S Io JI 80516 80349 0 B 161032 CH EECH mpa aaa i oe El ET iS pre im esd i lee 80516 80349 jo jo t6i0s2a 0 Figure 12 8 LLDP Statistics Table Port Synopsis 1 to 9 The port number as seen on the front plate silkscreen of the switch FrmDrop Synopsis 0 to 4294967295 The number of all LLDP frames discarded ErrFrm Synopsis 0 to 4294967295 The number of all LLDPDUs received with detectable errors Frmin Synopsis 0 to 4294967295 The number of all LLDPDUs received FrmOut Synopsis 0 to 4294967295 The number of all LLDPDUs transmitted Ageouts Synopsis 0 to 4294967295 The number of times that a neighbor s information has been deleted from the LLDP remote system MIB because the txinfoTTL timer has expired TLVsDrop Synopsis 0 to 4294967295 ROS v3 7 0 User Guide 211 RS900LWG RS930LW 12 Network Discovery The number of all TLVs d
241. son s Nudie a dogs deans eet 58 224A Cable DIAGNOSTICS sarees on Seefe ea En deed Kee ates 59 2 2 5 Link Detection Options Ae ee hein fated ead age 63 2 2 6 EoVDSL Parameters when applicable cccceeceeeeeeeeeeeeeeeeeeeeeeeeeenaeeeeee 64 22l EE 67 2 2 8 Resetting POMS os is Eege 68 Se NEOUDIOSNOOQUNO eege geet e ie dare 68 3 unn EE EE 69 3 1 Ee RE EE 69 3 2 Viewing Ethernet Port Statistics Abu 71 3 3 Clearing Ethernet Port Statistics ku 75 3 4 Remote Monitoring RMON eege SEENEN en aie 75 3 4 1 RMON History Controls ege et ebe 76 3 4 2 RMON History ele 77 3 4 3 RMON RE EE 81 3 5 RMON EE 85 3 0 RMON Event Log EE 87 A CnK AggregatiON EE 89 4 1 Link Aggregation Operation ENNEN 89 4 1 1 Link Aggregation Rules c2ccccrsscstsscepennteasePeetbeea ed caacaeiaslatsclevesteeed eect adele eects 89 4 1 2 Link Aggregation Limitations EE 91 4 2 Link Aggregation Re ne H Le EE 92 4 2 1 Configuring Port Trunks EE 92 Bi SPAMMING EE 94 RE le e GE 94 5 11 RSTP States and D TER 95 BAZ BOOS POMS sata aca sae ae ae sane Se teat E stead Nk de 97 5 1 3 Point to Point and Multipoint LINKS 2 eekii Edge ein ENEE edd 97 E E RE le EE 97 5 4 5 lee RENE 98 5 ZAMS UP MOMG e EE 98 5 2 1 MST Regions and Interoperability Au 99 5 2 2 MSTP Bridge and Port e 100 5 2 3 Benefits OT IMS TP erresen eree ee ei n E A e a E eS 101 5 2 4 Implementing MSTP on a Bridged Network ssssessssssessssseresssrrnnerrnersrrerssere 102 5 3
242. ssignment of an IP address DHCP is widely used in LAN environments to dynamically assign IP addresses from a centralized server which reduces the overhead of administrating IP addresses BOOTP is a subset of the DHCP protocol ROS supports the transfer of a BOOTFILE via BOOTP The BOOTFILE represents any valid ROS file such as config csv The name of BOOTFILE on the BOOTP server must match the corresponding ROS file The Dynamic IP Address type refers to a combination of the BOOTP and DHCP protocols Starting with BOOTP the system will try BOOTP and DHCP in a round robin fashion until it receives a response from the corresponding server access Log out IP Interfaces oe Back InsertRecord VLAN 1 Yes Static 192 168 0 30 255 255 255 0 255 255 0 0 Figure 1 8 IP Interfaces Table ROS v3 7 0 User Guide 24 RS900LWG RS930LW 1 Administration access Log out IP Interfaces admin Back Type VLAN ID 2 Mgmt Noo Yes O IP Address Type Static Baj IP Address 10 2 0 4 Subnet 255 255 0 0 Gateway Figure 1 9 IP Interfaces Form Note The IP address and mask configured for the management VLAN are not changed when resetting all configuration parameters to defaults and will be assigned a default VLAN ID of 1 Changes to the IP address take effect immediately All IP connections in place at the time of an IP address change will be lost Type Synops
243. stablished because each side will permanently wait for its partner to transmit a link signal 2 2 Ethernet Ports Configuration and Status The Ethernet Ports menu is accessible from the main menu ROS v3 7 0 User Guide 52 RS900LWG RS930LW 2 Ethernet Ports Main Menu e Administration e Ethernet Ports Configure Port Parameters Confiqure Port Rate Limiting Configure Port Mirroring Configure Link Detection View Port Status Reset Portis Ethernet Statistics Spanning Tree Virtual LANs Port Security Classes of Service N Multicast Filtering MAC Address Tables Diagnostics Figure 2 2 Ethernet Ports Menu 2 2 1 Port Parameters Port Parameters access admin 1 Pong 100TX Enabled Auto Auto Off Off o LG Pont 1 00TX Enabled o Auto Auto Off Off T 3 Pont 100TX Enabled On Auto Auto Off Off On 4 Port4 100TX Enabled On Auto Auto Off O On 5 Pot5 100Tx Enabled On Auto Auto Off Oo On e Pote 100Tx Enabled On Auto Auto Of Off On z7 Port7 100Fx Enabled of 100M Full of Off On 8 Ports 100FX Enabled Off 100M Full Off Figure 2 3 Port Parameters Table ROS v3 7 0 User Guide 53 RS900LWG RS930LW 2 Ethernet Ports Log out Port Parameters access admin Back Port P Name Port2 Media 100TX State Disabled Enabled Auton of C on Speed Auto D Dupx Auto
244. steaverecedesanetiatentimentdawerebcenminartdzetinaiieeceanaiadict 47 1 30 Local Syslog FON EE 48 1 31 Remote Syslog Client FOr EE 48 1 32 Remote Syslog E e 49 1 33 Remote Syslog Server EE 49 1 34 Using A Router As A Gateway AEN 50 2 1 Controller Protection Through LFI scciscioctsssassteden ceteantvendiees dices tedsnonteearexeeciachapesaimaneeeas 51 2 2 Ethernet POs Men sirarni avi deed 53 2 3 Port Parameters EEN 53 2 4 Port Parameters FOrm E 54 2 5 Port Rate Limiting Table sciscsscarutectinsiinerianiiuanes a a RE a R E NE 56 2 6 Port Rate Limiting FOT WEE 57 2 7 Port Mirroring FOM enger EE 58 2 8 Cable Re e EE VE 60 2 9 Cable Diagnostics Parameters Form Au 60 2 10 Unk Detection FONN ere eee eee errr eer A E ee a ETa 63 2 11 Accessing EoVDSL EE 65 ROS v3 7 0 User Guide 9 RS900LWG RS930LW Rugged Operating System 212 EOVDSL Parameters Table sri enter a an ET R E Naa AEEA diva ERAEN EAE eK ESE 65 2 13 EoVDSL Parameters e te EE 66 214 PORE Status En EE 67 3 1 Ethernet Port Statistics ENEE eendeitege EE 69 3 2 Ethernet Statistics Table edsegstag ter edeesgeug rek EdeeECeAE Sg EEEdhEE eege deg 70 3 3 Ethernet Port Statistics Table seccacg sie cx ccna dense dee Ee dE 71 3 4 Ethernet Port Statistics Form deetzadese rage dE ENEE AEN 72 3 5 Clear Ethernet Port Statistics Form itch leet ee eran lah Ee 75 3 6 RMON History Eine EE 76 3 7 RMON History Controls FORM WEE 76 3 8 RMON History Samples Table sia
245. stics Back Instance ID 1 1 Forwarding Designated 0 2 Forwarding Master 19 3 Discarding Alternate 19 A Discarding Alternate O Figure 5 18 Port MSTI Statistics Table Port MSTI Statistics access admin Instance ID _ GET Port s 2 Status Forwarding Role Master Cast 19 Desig Bridge ID Figure 5 19 Port MSTI Statistics Form Instance ID Synopsis 1 to 16 Default 1 ROS v3 7 0 User Guide 123 RS900LWG RS930LW 5 Spanning Tree The Instance ID refers to the MSTI Multiple Spanning Tree Instance ID Specify an Instance ID and select GET in order to load parameters corresponding to the selected MSTI Note Port Statistics for the IST MSTI zero are accessible via the Port RSTP Statistics menu see section Section 5 5 2 Port RSTP Statistics Port s Synopsis Any combination of numbers valid for this parameter The port number as seen on the front plate silkscreen of the switch or a list of ports if aggregated in a port trunk Status Synopsis Disabled Listening Learning Forwarding Blocking Link Down Discarding The status of this port in the Spanning Tree This may be one of the following Disabled STP is disabled on this port Link Down STP is enabled on this port but the link is down Discarding The link is not used in the STP topology but is standing by Learning The port is learning MAC addresses in order to prevent flood
246. stics Ethernet Out Packets R Uint32 0446 2 Port 4 Statistics Ethernet Out Packets R Uint32 0448 2 Port 5 Statistics Ethernet Out Packets R Uint32 044A 2 Port 6 Statistics Ethernet Out Packets R Uint32 044C 2 Port 7 Statistics Ethernet Out Packets R Uint32 044E 2 Port 8 Statistics Ethernet Out Packets R Uint32 0450 2 Port 9 Statistics Ethernet Out Packets R Uint32 0452 2 Port 10 Statistics Ethernet Out Packets R Uint32 0454 2 Port 11 Statistics Ethernet Out Packets R Uint32 0456 2 Port 12 Statistics Ethernet Out Packets R Uint32 0458 2 Port 13 Statistics Ethernet Out Packets R Uint32 045A 2 Port 14 Statistics Ethernet Out Packets R Uint32 045C 2 Port 15 Statistics Ethernet Out Packets R Uint32 045E 2 Port 16 Statistics Ethernet Out Packets R Uint32 0460 2 Port 17 Statistics Ethernet Out Packets R Uint32 0462 2 Port 18 Statistics Ethernet Out Packets R Uint32 0464 2 Port 19 Statistics Ethernet Out Packets R Uint32 0466 2 Port 20 Statistics Ethernet Out Packets R Uint32 0480 2 Port 1 Statistics Ethernet In Octets R Uint32 0482 Port 2 Statistics Ethernet In Octets R Uint32 ROS v3 7 0 User Guide 249 RS900LWG RS930LW Appendix D ModBus Management Support and Memory Map Address Registers Description Reference Table in Ul R W Format 0484 2 Port 3 Statistics Ethernet In Octets R
247. stteceeteedneseansnnldeageseetbereueet eae 235 15 45 SIG SQLCommandS psiapi an Sec peda E O E a a Ea eee 235 EE WE BE nr WEE 235 15 4 2 Finding the Correct EE 236 15 4 3 Retrieving Information sissube iesccsvcnensetsiaceasdendenatvade cehensedseavedeedaaesttececseetaendes 236 15 4 4 Changing Values in EE 237 15 4 5 Setting Default Values in a Table AEN 237 15 4 6 Using RSH and SQL EE 237 A SNMP MIB SUpport keiher Eege ee AER E et 239 Ak Standard WME BP tas eat ae DL tata wee cies Misa saa saya ei Bet creat aaa che eels 239 A 2 RuggedCom proprietary MIBS Au 240 B SNMP Trap Summary EE 241 C List of Objects Eligible for RMON Alarms nsssssseeeessnesssserrsssrrnrerrrnnrssrrrnserrnnnrennnnssrernsset 242 D ModBus Management Support and Memory Map ssssssssssessssnrrsssrrnnerrrnrrsrnrrsssrrnnnerrnnnrsrene 247 D 1 Modbus Memory Map EE 248 ROS v3 7 0 User Guide 7 RS900LWG RS930LW Rugged Operating System Re Ma KEE 251 Be Berne nee WEE 251 D Wes IR Stiet Ee ea A T 252 Ref ER ll EE 252 RRE e an Le EE 252 DAB SALA cis socks he EE 253 Drot PSStatus tre eebe ess oe nies ele aes Ed eebe dE 253 SE ln Tt E Ee WEE 255 LC EE 258 ROS v3 7 0 User Guide 8 RS900LWG RS930LW Rugged Operating System L st of Figures 1 1 Main Menu With Screen Elements Identified AAA 16 1 2 Log in to The Device with a Web Browser Akku 19 1 3 Log In To The Device With A Web Browser Custom Login Banner banner txt
248. syslog txt LED amp Relay Synopsis On Off Default Off Enables LED and fail safe relay control for this alarm If latching is not enabled this field will remain disabled Refresh Time Synopsis 0 s to 60 s Default 60 s Refreshing time for this alarm 13 1 5 Viewing and Clearing Alarms Alarms are displayed in the order in which they occurred even if the real time clock was incorrect at the time of the alarm Alarms 2 Alarms Back CRIT Jul 28 22 12 a cl WARN Jul 28 22 28 Pont was down Figure 13 4 Alarm Table Level Synopsis EMRG ALRT CRIT ERRO WARN NOTE INFO DEBG Severity level of alarm refer to Level above for a detailed breakdown of the levels Time Synopsis MMM DD HH MM Time of first occurrence of the alarm Description Synopsis Any 127 characters Description of the alarm gives details about the frequency of the alarm if it has occurred again since the last clear ROS v3 7 0 User Guide 217 RS900LWG RS930LW 13 Diagnostics Alarms can be cleared from the Clear Alarms option 13 2 Viewing CPU Diagnostics CPU Diagnostics access admin Back Running Time 0 days 03 03 00 Total Powered Time 39 days 18 26 54 CPU Usage b RAM Total fie777216 RAM Available 668757 Temperature Bec id Reload Figure 13 5 CPU Diagnostics Form Running Time Synopsis DDDD days HH MM SS The
249. t 1 Statistics Serial In Packets R Uint32 0682 2 Port 2 Statistics Serial In Packets R Uint32 0684 2 Port 3 Statistics Serial In Packets R Uint32 0686 2 Port 4 Statistics Serial In Packets R Uint32 06CO 2 Port 1 Statistics Serial Out Packets R Uint32 06C2 2 Port 2 Statistics Serial Out Packets R Uint32 06C4 2 Port 3 Statistics Serial Out Packets R Uint32 06C6 2 Port 4 Statistics Serial Out Packets R Uint32 D 1 1 Text Simple ASCII representation of the information related to the product ASCII characters most significant byte of register comes first E g Read Multiple Registers request to read Product Identification from location 0x0000 0x04 0x00 0x00 0x00 0x08 Response may look like 0x04 0x10 0x53 0x59 0x53 0x54 0x45 0x4D 0x20 0x4E 0x41 Ox4D 0x45 0x00 0x00 0x00 0x00 0x00 Byte 3 until the end of the response above contains the ASCII representation of the product identification SYSTEM NAME Since the length of this field is smaller than eight registers the rest of the field are filled with zeros D 1 2 Cmd This format is used to instruct the device to set the output to either true or false The most significant byte comes first FF 00 hex requests output to be True ROS v3 7 0 User Guide 251 RS900LWG RS930LW Appendix D ModBus Management Support and Memory Map 00 00 hex requests output to be
250. t IP Bridge Network Parameter Form Wireless Mode Synopsis auto 11b 11g Default auto This parameter allows the user to select the wireless mode that is running on the wireless network The choices are auto allows Access Point to select the wireless mode 11b 802 116 mode only up to 11 Mbps 11g 802 11g mode with 802 11b compatibility up to 54 Mbps Network Name SSID Synopsis Any 32 characters Default RuggedCom The SSID Service Set IDentifier is a unique name between 3 and 32 characters which is used to identify the wireless network Primary Network SSID1 Secondary Network 1 SSID2 Secondary Network 2 SSID3 Synopsis Any 32 characters Default RuggedCom The SSID Service Set Dentifier is a unique name between three and 32 characters which is used to identify the wireless network The client supports up to three wireless networks Primary Secondary 1 and Secondary 2 For example if the Primary Network is unavailable ROS v3 7 0 User Guide 149 RS900LWG RS930LW 7 Wireless LAN the client will try to connect to Secondary 1 network and so on RuggedCom wireless networks achieve simple redundancy through this technique RF Channel Synopsis auto 1 2 3 4 5 6 7 8 9 10 11 12 13 Default auto Select the appropriate channel from the channel list All devices in the same BSSID must communicate on the same channel in order to function correctly Select a channel number or
251. tacker to influence RSTP topology by injecting RSTP BPDUs into the network BPDU Guard is a feature that protects the network from BPDUs received by a port where RSTP capable devices are not expected to be attached If a BPDU is received by a port for which Edge parameter is set to TRUE or RSTP is disabled the port will be shutdown for the time period specified by this parameter DON T SHUTDOWN BPDU Guard is disabled UNTIL RESET port will remain shutdown until the port reset command is issued by the user 5 4 2 Port RSTP Parameters Log out Port RSTP Parameters seri Back A Enabled 126 Auto Auto Auto Auto a Enabled 128 Auto Auto Auto Auto 13 Enabled 126 Auto Auto Auto Auto 4 Enabled 128 Auto Auto Auto Auto Figure 5 8 Port RSTP Parameter Table ROS v3 7 0 User Guide 110 RS900LWG RS930LW 5 Spanning Tree access Log out Port RSTP Parameters admin Back Port s Enabled Disabled Enabled Priority 128 d STP Cost uto RSTP Cost uto Edge Port Auto gt Point to Point Auto xf Restricted Role False Restricted TCN False Apply Reload Figure 5 9 Port RSTP Parameter Form Port s Synopsis Any combination of numbers valid for this parameter The port number as seen on the front plate silkscreen of the switch or a list of ports if aggregated in a port trunk Enabled Synopsis Disabled Enabled Default Enabled Enabling STP activates the STP or
252. teSystemsData objects because the information timeliness interval has expired I dpStatsRemTablesinserts The number of times the complete set of information has been inserted into tables contained in lldpRemoteSystemsData ROS v3 7 0 User Guide 245 RS900LWG RS930LW Appendix C List of Objects Eligible for RMON Alarms I dpStatsRemTablesDeletes The number of times the complete set of information has been deleted from tables contained in IldpRemoteSystemsData objects I dpStatsRemTablesDrops IidpStatsRemTablesAgeouts The number of times the complete set of information could not be entered into tables contained in lldoRemoteSystemsData objects because of insufficient resources The number of times the complete set of information has been deleted from tables contained in IldpRemoteSystemsData objects because the information timeliness interval has expired dot1qVlanNumDeletes The number of times a VLAN entry has been deleted from the dotiqVlanCurrentTable for any reason If an entry is deleted then inserted and then deleted this counter will be incremented by 2 ROS v3 7 0 User Guide 246 RS900LWG RS930LW Appendix D ModBus Management Support and Memory Map Appendix D ModBus Management Support and Memory Map ModBus management support in RuggedCom devices provides the user with a simple interface with basic status information Support for this protocol simp
253. ted in Figure 10 3 Example using GMRP there are two multicast sources S1 and S2 multicasting to Multicast Groups 1 and 2 respectively A network of five switches including one core Switch B connects the sources to two hosts H1 and H2 which receive the multicast streams from S1 and S2 respectively ROS v3 7 0 User Guide 187 RS900LWG RS930LW 10 Multicast Filtering Por G MRP ayer Sdv4 Lean Pon amp GMRP awae Ady Learn Por Bl GMRP ever MRP aware Pot Cl G MRP Ava Adv amp Leam Edge Switch C PortC2 G MAP awae Ady amp bam Pont EL G MRP Awa e Ady amp leam PortAl GMRP Aware Adv onbe Leam Pon amp 2 MU bicast Group 1 H2 S2 H4 D m d GMRP Avare Adwe eer SMRP unaware 3 MRP Urawa re Multba st Giwup 2 Legend O Multicast Host Multicast Source Figure 10 3 Example using GMRP Joining the Multicast Groups The sequence of events surrounding the establishment of membership for the two Multicast Groups on the example network is as follows e Host H1 is GMRP unaware but needs to see traffic for Multicast Group 1 Port E2 on Switch E therefore is statically configured to forward traffic for Multicast Group 1 e Switch E advertises membership in Multicast Group 1 to the network through Port E1 making Port B4 on Switch B a member of Multicast Group 1 e Switch B propagates the join message causing Port D1 on Switch D
254. ted this log entry ROS v3 7 0 User Guide 88 RS900LWG RS930LW 4 Link Aggregation 4 Link Aggregation Link Aggregation is also known as port trunking or port bundling ROS provides you with the following Link Aggregation features e Support for up to 15 port trunks Note The actual maximum number of port trunks depends on the number of ports in the switch at least two ports are required to compose a port trunk e Up to 8 ports can be aggregated in one port trunk e Highly randomized load balancing between the aggregated links based on both source and destination MAC addresses of the forwarded frames 4 1 Link Aggregation Operation Link Aggregation provides you with the ability to aggregate several Ethernet ports into one logical link port trunk with higher bandwidth Link Aggregation can be used for two purposes e To obtain increased linearly incremental link bandwidth e To improve network reliability by creating link redundancy If one of the aggregated links fails the switch will balance the traffic between the remaining links fy Switch 1 __ _ __ E r Figure 4 1 Link Aggregation Examples 4 1 1 Link Aggregation Rules e Any port can belong to only one port trunk at a time ROS v3 7 0 User Guide 89 RS900LWG RS930LW 4 Link Aggregation e The aggregated port with the lowest port number is called the Port Trunk Primary Port Other ports in the trunk are called Secondary Ports
255. terval Tx Hold Reinit Delay Synopsis 1 to 10 Default 2 s The delay in seconds from when the value of Admin Status parameter of a particular port becomes Disabled until re initialization will be attempted Tx Delay Synopsis 1 to 8192 Default 2 s ROS v3 7 0 User Guide 207 RS900LWG RS930LW 12 Network Discovery The delay in seconds between successive LLDP frame transmissions initiated by value or status changed The recommended value is set according to the following formula 1 lt txDelay lt 0 25 Tx Interval 12 3 1 2 Port LLDP Parameters access Port LLDP Parameters admin t et i rxTx Disabled 3 2 rxTx Disabled 3 rxTx Disabled 5 Disabled 6 txTx Disabled 8 rxTx Disabled_ 9 Jet Disabled rxTx Disabled 5 Figure 12 4 Port LLDP Parameters Table access Port LLDP Parameters Cda Port Admin Status rxtx D Notifications Disabled Enabled Apply Reload Figure 12 5 Port LLDP Parameters Form ROS v3 7 0 User Guide 208 RS900LWG RS930LW 12 Network Discovery Port Synopsis 1 to 9 Default 1 The port number as seen on the front plate silkscreen of the switch Admin Status Synopsis rxTx txOnly rxOnly Disabled Default rxTx e rxTx the local LLDP agent can both transmit and receive LLDP frames through the port e txOnly the local LLDP agent can only transmit LLDP frames e rxOnly the local LLDP agent can
256. that as RuggedCom devices have a variable number of ports not all registers and bits apply to all products Registers that are not applicable to a given product return zero value E g registers referring to serial ports are not applicable to RuggedSwitch products D 1 Modbus Memory Map Address Registers Description Reference Table in Ul R W Format PRODUCT INFO table Name ProductInfo 0000 16 Product Identification R Text 0010 32 Firmware Identification R Text 0040 1 Number of Ethernet Ports R Uint16 0041 1 Number of Serial Ports R Uint16 0042 1 Number of Alarms R Uint16 0043 1 Power Supply Status R PSStatusCmd PRODUCT WRITE REGISTERS table Name various tables 0080 1 Clear Alarms WwW Cmd 0081 2 Reset Ethernet Ports WwW PortCmd 0083 2 Clear Ethernet Statistics W PortCmd 0085 2 Reset Serial Ports W PortCmd 0087 2 Clear Serial Port Statistics W PortCmd ALARMS table Name alarms 0100 64 Alarm 1 R Alarm 0140 64 Alarm 2 R Alarm 0180 64 Alarm 3 R Alarm 01C0 64 Alarm 4 R Alarm 0200 64 Alarm 5 R Alarm 0240 64 Alarm 6 R Alarm 0280 64 Alarm 7 R Alarm 02C0 64 Alarm 8 R Alarm ETHERNET PORT STATUS table Name ethPortStats O3FE 2 Port Link Status R PortCmd ETHERNET STATISTICS table Name rmonStats 0400 2 Port 1 Statistics Ethernet In Packets R Uint32 0402 2 Port 2 Statistics Ethernet In Packets R Uint32 0404 2 Port 3 Statistics Ethe
257. the auto option to scan and choose the best available channel Suppress SSID Synopsis Disable Enable Default Disable This option will enable or disable suppression of the SSID information sent by the wireless Access Point 7 2 3 Security Parameters The Security Parameters Forms provide the ability to configure wireless LAN security attributes such as authentication encryption and keying AP Security Parameters Security Parameters weesen admin Authentication Mode Encryption Algorithm none auto w Passphrase WEP Key Group Key Renewal 600 sec Figure 7 8 AP Security Parameter Form ROS v3 7 0 User Guide 150 RS900LWG RS930LW 7 Wireless LAN Client Bridge and Client IP Bridge Security Parameters access admin Security Parameters Authentication none e Encryption none Passphrase Figure 7 9 Client Bridge and Client IP Bridge Security Parameter Form Authentication Mode Synopsis none wep 802 1x wpa wpa psk wpa2 wpa2 psk wpa auto wpa auto psk Default none This parameter allows the user to select the authentication mode The choices are listed below none No authentication wep WEP as an authentication algorithm Encryption algorithm must also be set to WEP Only available in Access Point mode 802 1 X 802 1X based authentication with RADIUS client and server running on backend wpa WPAv1 authentica
258. the event of a failure on link D bridge 444 will unblock link H Bridge 333 will communicate with the network through link F ROS v3 7 0 User Guide 104 RS900LWG RS930LW 5 Spanning Tree Figure 5 4 Example of a Ring Backbone Configuration Procedure 5 2 Design Considerations for RSTP in Ring Backbone Configurations 1 Select the design parameters for the network What are the requirements for robustness and network fail over recovery times Typically ring backbones are chosen to provide cost effective but robust network designs Identify required legacy support and ports with half duplex shared media restrictions These bridges should not be used if network fail over recovery times are to be minimized Identify edge ports Ports that connect to host computers IEDs and controllers may be set to edge ports in order to guarantee rapid transitioning to forwarding as well as to reduce the number of topology change notifications in the network Choose the root bridge The root bridge can be selected to equalize either the number of bridges number of stations or amount of traffic on either of its legs It is important to realize that the ring will always be broken in one spot and that traffic always flows through the root Assign bridge priorities to the ring The strategy that should be used is to assign each bridge s priority to correspond to its distance from the root bridge If the root bridge is assigned the lo
259. ticast group Leaving a Multicast Group Periodically the switch sends GMRP queries in the form of a leave all message If a host either a switch or an end station wishes to remain in a multicast group it reasserts its group membership by responding with an appropriate join request Otherwise it can either respond with a leave message or simply not respond at all If the switch receives a leave message or receives no response from the host for a timeout period the switch removes the host from the multicast group GMRP Protocol Notes Since GMRP is an application of GARP transactions take place using the GARP protocol GMRP defines the following two Attribute Types e The Group Attribute Type used to identify the values of group MAC addresses e The Service Requirement Attribute Type used to identify service requirements for the group Service Requirement Attributes are used to change the receiving port s multicast filtering behavior to one of the following e Forward All Multicast group traffic in the VLAN or e Forward All Unknown Traffic Multicast Groups for which there are no members registered in the device ina VLAN If GMRP is disabled on the RuggedSwitch then GMRP PDUs received by the switch will be forwarded like any other traffic but if GMRP is enabled on at least one of the ports then GMRP packets will be processed by the switch and not forwarded 10 2 1 GMRP Example In the example depic
260. ticast or broadcast address ifInErrors The number of received packets that contained errors preventing them from being deliverable to a higher layer protocol iflnMulticastPkts The total number of good packets received that were directed to multicast address ifOutMulticastPkts The total number of packets transmitted that were directed to multicast address iflnBroadcastPkts The total number of good packets received that were directed to the broadcast address ifOutBroadcastPkts The total number of packets transmitted that were directed to the broadcast address ifHCInUcastPkts The number of packets delivered by this sub layer to a higher sub layer which were not addressed to a multicast or broadcast address at this sub layer This object is a 64 bit version of ifInUcastPkts ifOutUcastPkts The total number of transmitted packets which were not addressed to a multicast or broadcast address This object is a 64 bit version of ifOutUcastPkts ifHCInBroadcastPkts The total number of good packets received that were directed to the broadcast address This object is a 64 bit version of iflnBroadcastPkts ifHCOutBroadcastPkts The total number of packets transmitted that were directed to the broadcast address This object is a 64 bit version of ifOutBroadcastPkts ifHCInOctets The total number of bytes received on the interface including framing characters This object is a 64 bit
261. tion The files that may be overwritten via SFTP upload are main bin main ROS firmware image boot bin RuggedSwitch bootloader image config csv ROS configuration file fpga xsvf FPGA configuration file 1 3 The ROS Web Server Interface 1 3 1 Using a Web Browser to Access the Web Interface A web browser uses a secure communications method called SSL Secure Socket Layer to encrypt traffic exchanged with its clients The web server guarantees that communications with the client are kept private If the client requests access via an insecure HTTP port it will be rerouted to the secure port Access to the web server via SSL will be granted to a client that provides a valid user name password pair Note It can happen that upon connecting to the ROS web server a web browser may report that it cannot verify the authenticity of the server s certificate against any of its known certificate authorities This is expected and it is safe to instruct the browser to accept the certificate Once the browser accepts the certificate all communications with the web server will be secure Start a web browser session and open a connection to the switch by entering a URL that specifies its host name or IP address e g http 179 1 0 45 Once in contact with the switch start the login process by clicking on the Login link The resulting page should be similar to that presented below ROS v3 7 0 User Guide 18 RS900LWG R
262. tion type Enterprise wpa psk WPAv1 PSK authentication type Personal wpa2 WPAv2 authentication type Enterprise wpa2 psk WPAv2 PSK authentication type Personal wpa auto WPAv1 or WPAv2 authentication type Enterprise wpa auto psk WPAv1 or WPAv2 authentication type Personal Note The RuggedWireless Client Bridge supports none WPA PSK and WPA2 PSK options only Encryption Algorithm Synopsis auto wep tkip aes Default auto ROS v3 7 0 User Guide 151 RS900LWG RS930LW 7 Wireless LAN This parameter allows the user to select the encryption algorithm which will be used in conjunction with the authentication mode WEP is not available in client mode Note The Advanced Encryption Standard AES support is present only in WPA2 and WPA2 PSK authentication modes only Passphrase Synopsis Any 48 characters Default The Passphrase is an ASCII string between 8 and 48 characters in length It only applies when the authentication mode is WPA WPA2 Personal WEP Key Synopsis Any 26 characters Default This parameter allows the user to configure a WEP key of length 10 hex digits or 26 hex digits This only applies when the authentication mode is WEP Group Key Renewal Synopsis 1 to 2147483640 Default 600 sec This parameter determines how often in seconds the group key should be changed It only applies when the authentication mode is WAP WPA2 either Personal or Enterp
263. to Best Effort Short Preamble Synopsis Disable Enable Default Enable Control the length of the preamble block in the frames during the wireless communication This parameter must be disabled for 802 1 1b devices Distance Synopsis 300 to 15000 Default 300 This parameter allows the user to optimize the wireless communication parameters for running wireless links over long distances The configured distance in meters is measured between the AP and the farthest station Note All WLAN devices on a network must have approximately the same distance parameters setting for optimal performance ROS v3 7 0 User Guide 156 RS900LWG RS930LW 7 Wireless LAN 7 2 7 WLAN DHCP Server The Dynamic Host Configuration Protocol DHCP is a service designed to provide network configuration information to clients that request it If a DHCP server is configured to serve a network segment client network devices that are able to perform a DHCP request need not be configured by operator intervention Instead they will acquire an IP address and subnet mask at minimum and optionally a gateway and DNS server among other optional parameters from the DHCP server RuggedWireless implements lightweight DHCP server functionality as described below Note When the RuggedWireless unit is configured for Access Point AP operational mode DHCP responds to client requests from both the wired backhaul and the wire
264. to become a member of Multicast Group 1 Note that ports A1 and C1 also become members ROS v3 7 0 User Guide 188 RS900LWG RS930LW 10 Multicast Filtering e Host H2 is GMRP aware and sends a join request for Multicast Group 2 to Port C2 which thereby becomes a member of Group 2 e Switch C propagates the join message causing Port B2 on Switch B and Port A1 on Switch A to become members of Multicast Group 2 Note that ports D1 and E1 also become members Multicast Traffic on the Network Once GMRP based registration has propagated through the network as described above multicasts from S1 and S2 can reach their destinations as described in the following e Source S1 transmits multicast traffic to Port D2 which is forwarded via Port D1 which has previously become a member of Multicast Group 1 e Switch B forwards the Group 1 multicast via Port B4 towards Switch E e Switch E forwards the Group 1 multicast via Port E2 which has been statically configured for membership in Multicast Group 1 e Host H1 connected to Port E2 thus receives the Group 1 multicast e Source S2 transmits multicast traffic to Port A2 which is then forwarded via port A1 which has previously become a member of Multicast Group 2 e Switch B forwards the Group 2 multicast via Port B2 towards Switch C e Switch C forwards the Group 2 multicast via Port C2 which has previously become a member of Group 2 e Ultimately Host H2 con
265. to this file e boot bin the boot loader firmware image In normal practice the boot loader does not require updating e fpga xsvf the FPGA firmware binary image also not normally updated config csv the complete configuration database in the form of a comma delimited ASCII text file File Transfer Mechanisms Several mechanisms are available to transfer these files to and from a ROS based device e Xmodem using the ROS CLI over a telnet or RS232 console session e TFTP client using the ROS CLI in a console session and a remote TFTP server e TFTP server from a remote TFTP client e SFTP secure FTP over SSH from a remote SFTP client Console Sessions 15 1 Console sessions may be established depending on the settings in the IP Services menu by the following means e RS232 direct RS232 serial connection to the ROS device e telnet remote terminal protocol via TCP IP unencrypted e RSH Remote SHell the remote login shell protocol via TCP IP unencrypted e SSH Secure SHell the standard remote login shell protocol via TCP IP Both authentication and session are encrypted Upgrading Firmware Upgrading ROS firmware may sometimes be necessary in order to take advantage of new features or bug fixes In normal circumstances only the main ROS application firmware is updated the boot loader and FPGA firmware remain invariant The main ROS application firmware image is a binary file available from Rugged
266. trol the spanning tree solution for each MSTI especially the set of active links for each tree by manipulating per MSTI the bridge priority and the port costs of links in the network If traffic is allocated judiciously to multiple VLANs redundant interconnections in a bridged network which using a single spanning tree would have gone unused can now be made to carry traffic Isolation of Spanning Tree Reconfiguration A link failure in an MST region that does not affect the roles of Boundary ports will not cause the CST to be reconfigured nor will the change affect other MST regions This is due to the fact that MSTP information does not propagate past a region boundary MSTP versus PVST An advantage of MSTP over the Cisco Systems Inc proprietary PVST protocol is the ability to map multiple VLANs onto a single MSTI Since each spanning tree requires processing and memory the expense of keeping track of an increasing number of VLANs increases much more rapidly for PVST than for MSTP Compatibility with STP and RSTP No special configuration is required for the bridges of an MST region to connect fully and simply to non MST bridges on the same bridged network Careful planning and configuration is however recommended in order to arrive at an optimal network 5 2 4 Implementing MSTP on a Bridged Network It is recommended that the configuration of MSTP on a network proceed in the sequence outlined below Naturally it is also recomme
267. tructure BSS Distribution System a Client Figure 7 1 Typical IEEE 802 11 Infrastructure Basic Service Set component diagram The following are some key characteristics of all IEEE 802 11 infrastructure networks e Infrastructure BSS Basic Service Set represents the RF coverage area of AP e All communication inside the infrastructure BSS goes through the AP e All Stations in a wireless network are identified by a unique 48 bit IEEE 802 MAC addresses e If a station STA wants to access the network resource it must first associate with an Access Point Association is the process by which a station joins an 802 11 network it is logically equivalent to plugging in the network cable on an Ethernet switch e Standard 802 11 stations normally act as communications end points i e with no bridging functionality a single wireless STA supporting only a single network device Note The AP always supports a bridged single Layer 2 network across both backhaul distribution system and the wireless IEEE 802 11 BSS domains RuggedWireless extensions for Client Bridge operation The IEEE802 11 definition of a wireless station limits the station context to a single endpoint in a wireless network The interaction between a single associated station and an IEEE802 11 Access Point AP in infrastructure mode does not support Layer 2 bridging of traffic for wired devices located behind a wireless st
268. ts sub menu Main Menu access factory e Administration Ethernet Ports Configure Port Parameters Configure Port Rate Limiting Configure Port Mirroring e Configure View EoVDSL Parameters e Configure Link Detection View Port Status Reset Port s Ethernet Statistics Link Aggregation Spanning Tree Figure 2 11 Accessing EoVDSL Parameters access Log out EoVDSL Parameters adain Back 7 Slave Auto Down 9 wan Master Auto Down Figure 2 12 EoVDSL Parameters Table ROS v3 7 0 User Guide 65 RS900LWG RS930LW 2 Ethernet Ports access Log out EoVDSL Parameters SE Back Port 7 Type LR Mode Slave Set Rate DS US Auto DI Link Down Link Rate DS US SNR Mrgn Apply Reload Figure 2 13 EoVDSL Parameters Form Port Synopsis 1 to maximum port number Default Depends on the particular product 3 for RS920L 7 for RS930L 9 for RS9XX etc The port number as seen on the front plate silkscreen of the switch Type Synopsis Univ LR The type of VDSL port Supported types Universal and Long Reach Mode Synopsis Master Slave Default Master Specify if the port should operate as a VDSL Master or Slave Note that for Long reach VDSL port Mode is predetermined by hardware and cannot be changed by user Set Rate DS US Synopsis Universal VDSL Auto 35 2 35 2 Mbs 30 2 30 2 Mb
269. tween 256 and 511 bytes long The total number of received packets that were between 512 and 1023 bytes long etherStatsPkts1024to1518Octets The total number of received packets that were between 1024 and 1518 bytes long I dpStatsRxPortFramesDiscardedTotal The number of LLDP frames received by this LLDP agent on the indicated port and then discarded for any reason This counter can provide an indication that LLDP header formatting problems may exist with the local LLDP agent in the sending system or that LLDPDU validation problems may exist with the local LLDP agent in the receiving system I dpStatsRxPortFramesErrors I dpStatsRxPortFramesTotal The number of invalid LLDP frames received by this LLDP agent on the indicated port while this LLDP agent is enabled The number of valid LLDP frames received by this LLDP agent on the indicated port while this LLDP agent is enabled I dpStatsRxPortTLVsDiscardedTotal The number of LLDP TLVs discarded for any reason by this LLDP agent on the indicated port I dpStatsRxPortTLVsUnrecognizedTotal The number of LLDP TLVs received on the given port that are not recognized by this LLDP agent on the indicated port I dpStatsRxPortAgeoutsTotal The counter that represents the number of age outs that occurred on a given port An age out is the number of times the complete set of information advertised by a neighbour has been deleted from tables contained in lldp Remo
270. twork Data traffic The RSTP algorithm is as follows STP configuration messages contain age information Messages transmitted by the root bridge have an age of 0 As each subsequent designated bridge transmits the configuration message it must increase the age by at least 1 second When the age exceeds the value of the maximum age parameter the next bridge to receive the message immediately discards it ROS v3 7 0 User Guide 98 RS900LWG RS930LW 5 Spanning Tree 5 2 1 MSTI is allocated to one or another of several spanning trees by mapping one or more VLANs onto the network Note The sophistication and utility of the Multiple Spanning Tree implementation on a given bridged network is proportional to the amount of planning and design invested in configuring MSTP If MSTP is activated on some or all of the bridges in a network with no additional configuration the result will be a fully and simply connected network but at best the result will be the same as a network using only RSTP Taking full advantage of the features offered by MSTP requires a potentially large number of configuration variables to be derived from an analysis of data traffic on the bridged network and from requirements for load sharing redundancy and path optimization Once these parameters have all been derived it is also critical that they are consistently applied and managed across all bridges in an MST region MST Regions and Interopera
271. twork Parameter Form ccecesteeeeeeeeeeeeeeeees 149 7 8 AP Security Parameter EE 150 7 9 Client Bridge and Client IP Bridge Security Parameter Form ssssssssesernssssseeessrrrsssrrrnene 151 PAO MAG Filtering WSR EE 152 Yat MAG Filter Control POT EE 153 F2 MA INE Ee EE 153 7 13 RADIUS Parameter Menu sccusisies Heethigebaetaphlnatieninionxde tans eile deen done 154 7 14 AP Advanced Parameter FOrm ec s ctsiges ice Sue ege ae as 155 7 15 Client Bridge and Client IP Bridge Advanced Parameter Form csceeseeeeeeeeeeereees 155 7 16 DHCP Parameter FOrm EE 157 7 17 Association Information Table i i0sccachcctteestiesondscedeia eee eerste 159 7 18 AP Miscellaneous Parameters Form ccccceeeeeseeeneceeeeeeeseseeeeeeeeeeeeseesseeenseneeeees 160 7 19 Client Bridge and Client IP Bridge Miscellaneous Parameter Form sssssssessseeeseeresen 161 8 1 802 1X General Topology ET 169 8 2 802 1X Packet Exchange geen anie EE 169 8 3 Port Sec rity Men omasa a e a ean Ae send E IE AR R EE 170 8 4 Port Security Parameters Table ENNEN 170 8 5 Port Security Parameters FOr ENEE 171 8 6 802 1 Parameters Table ccs ccescicraslete ed d et SEENEN ee eELAEE 172 8 7 2 802 1X Parameters e EE 172 9 1 Determining The CoS Of A Received Frame AAA 175 9 2 Classes Of Service EE 176 9 3 Global CoS Parameters Form enee esgCEdA Eed EES EAECEENeE 176 9 4 P r CoS Parameter EE 177 9 5 Port CoS Parameter e E 177 9
272. twork traffic will not be able to pass through either the Port Under Test or the Partner Port Please be aware of the potential network interruption that could be triggered by running cable diagnostics After the cable diagnostics finish the original network port settings for both the Port Under Test and the Partner Port are restored along with any established link ROS v3 7 0 User Guide 59 RS900LWG RS930LW 2 Ethernet Ports e access Cable Diagnostics Parameters PER Pore te Runs Calib i Stoppeaj0 0 0m 3_ Stopped O___ 0 0 m 5 Stoppeajo on jo jo jo jo ooo amp Sioppedjo oom jo fo jo jo oo Z Stoppedj0 _ 0 0m jo jo jo Jo ooo 8 Stoppedo 0 0m jo jo jo jo 908 9 Na jo 00m jo jo jo Jo nood Open Shor ec Total 2 Stopped oom jo jo jo jo ooo Jo jo Jo ooo o jo o Jo B ii Figure 2 8 Cable Diagnostics Table R access Cable Diagnostics Parameters amiki Port 6 State Stopped Started Runs 0 Calib 0 0m Good 0 Open 0 Short 0 Imped 0 Pass Fail Total Apply Reload Figure 2 9 Cable Diagnostics Parameters Form The Cable Diagnostics Table screen pictured above lists the current value of the following parameters for all Ethernet ports Clicking on a port number in the table brings up the Cable ROS v3 7 0 User Guide 60 RS900LWG RS930LW 2 Ethernet Ports Diagnostics Form for the corresponding port This form can be used to set certain
273. uld help be required Login Banner Synopsis Standard Custom Default Standard Provides the ability to customize the banner displayed on the login screen Either the standard RuggedCom ROS banner may be displayed or if Custom is selected the contents of a file named banner txt uploaded to the device will be used as a login banner 1 9 Passwords These parameters provide the ability to configure parameters for authorized and authenticated access to the device s services HMI via Serial Console Telnet SSH RSH Web Server Access ROS v3 7 0 User Guide 29 RS900LWG RS930LW 1 Administration to the switch can be authorized and authenticated via RADIUS or TACACS servers or using locally configured passwords that are configured per user name and access level Note that access via the Serial Console is always authorized first using local settings If a local match is not found RADIUS TACACS will be used if enabled For all other services if RADIUS TACACS is enabled for authentication and authorization the local setting will be used only if configured To access the unit the user name and password must be provided Three user names and passwords can be configured They correspond to three access levels which provide or restrict access to change settings and execute various commands within the device e guest users can view most settings but may not change settings or run commands e operator cannot change s
274. up time WLAN firmware version enable disable RF transmitter and interface reset ROS v3 7 0 User Guide 159 RS900LWG RS930LW 7 Wireless LAN AP Miscellaneous Parameters WLAN Status Running Log out Miscellaneous Parameters WLAN Up Time 19 04 11 access admin WLAN S WLAN FS 1 6 APP 1 6 Betal 0 Version Associated Station e Disable Enable Transmitter US nable TFTP Server Address o Software Upgrade Start O WLAN Reset _ _ E wech Figure 7 18 AP Miscellaneous Parameters Form ROS v3 7 0 User Guide 160 RS900LWG RS930LW 7 Wireless LAN Client Bridge and Client IP Bridge Miscellaneous Parameters Log out Miscellaneous Parameters keem Back WLAN Runnin Status g ieni Associated RuggedCom Status WLAN Up 23 58 33 Time WLAN WLAN FS 1 6 APP 1 6 Betal0 Version RF Transmitter Disable O Enable TFTP Server Address Software Goode Start O WLAN p Reset Apply Figure 7 19 Client Bridge and Client IP Bridge Miscellaneous Parameter Form WLAN Status Synopsis Booting Running Cmd Processing Software Upgrade This parameter reflects the current status of the wireless interface This is a read only parameter Note DI It is very important to make sure that the current WLAN status is indicating the Running state before attempting to modify any WLAN
275. uring IRIG B IRIG B functionality is configured via the serial port setup menu since it is implemented on the same connectors System Name Serial Ports 1 ALARMS Name Protocol Data Bits Stop Parity Turnaround SCP IRIGB Figure 1 16 Serial Port Menu A new field IRIGB has been added to the Serial Ports configuration menu which sets the operational mode of IRIGB port ROS v3 7 0 User Guide 34 RS900LWG RS930LW 1 Administration IRIGB Synopsis PWM PPS Off Default Off Selects the output mode of the IRIG B pin on the corresponding serial port PWM Pulse Width Modulation mode complies with IRIG Standard 200 04 generating formats IRIGBOO2 and IRIGBOOS3 In PPS mode a pulse with a duration of 1 millisecond is output every second at the beginning of the second IRIG B as Reference Clock IRIG B can be configured to act as a reference clock for the PTP and NTP system The following are required to activate this functionality e IRIG B daughter card is installed presently only RS416 supports this card e Select IRIGB as a time source in the Time Source Ul 1 10 3 Time Source Selection Time Source admin access LOCAL CLK Figure 1 17 Time Source Selection Menu Primary Time Source Synopsis LOCAL CLK IRIGB NTP Server Default NTP Server Selects the time source that will drive the local clock and provide the reference for time protocols for which the device can act as a server
276. using Static MAC Address Table e Authorizing network access using IEEE 802 1X authentication e Configuring IEEE 802 1X authentication parameters e Detecting port security violation attempt and performing appropriate actions 8 1 Port Security Operation 8 1 1 Port Security or Port Access Control provides the ability to filter or accept traffic from specific MAC addresses Port Security works by inspecting the source MAC addresses of received frames and validating them against the list of MAC addresses authorized on the port Unauthorized frames will be filtered and optionally the port that receives the frame will be shut down permanently or for a period of time An alarm will be raised indicating the detected unauthorized MAC address Frames to unknown destination addresses will not be flooded through secure ports Note Port security is applied at the edge of the network in order to restrict admission to specific devices Do not apply port security on core switch connections ROS supports several MAC address authorization methods described below Static MAC address based authorization e With this method the switch validates the source MAC addresses of received frames against the contents in the Static MAC Address Table e Also ROS supports a highly flexible Port Security configuration which provides a convenient means for network administrators to use the feature in various network scenarios e A Static MAC addr
277. v are the same as for ROS firmware image files e Xmodem using the ROS CLI over a console session e TFTP client using the ROS CLI in a console session and a remote TFTP server e TFTP server from a remote TFTP client e SFTP secure FTP over SSH from a remote SFTP client Please refer to the preceding section Section 15 1 Upgrading Firmware for examples of the use of each of these mechanisms for transferring a file to a ROS device Configuration File Format The format of the configuration file makes it simple to apply a wide variety of tools to the task of maintaining ROS configuration Among the applications that may be used to manipulate ROS configuration files are e Any text editing program capable of reading and writing ASCII files e Difference patching tools e g the UN X diff and patch command line utilities e Source Code Control systems e g CVS SVN ROS also has the ability to accept partial configuration updates It is possible to for example update only the parameters for a single Ethernet port Transferring a file containing only the following lines to a ROS device will result in an update of the parameters for Ethernet port 1 without changing any other parameters of the device s configuration Port Parameters ethPortCfg Port Name Media State AutoN Speed Dupx FlowCtrl LEI Alarm 1 Port 1 100TX Enabled On Auto Auto Off O On Applying the Configuration Update
278. ven if a specific network architecture does not use VLANs ROS default VLAN settings allow the switch still to operate in a VLAN aware mode while providing functionality required for almost any network application However the IEEE 802 1Q standard defines a set of rules that must be followed by all VLAN aware switches for example e Valid VID range is 1 to 4094 VID 0 and VID 4095 are invalid e Each frame ingressing a VLAN aware switch is associated with a valid VID e Each frame egressing a VLAN aware switch is either untagged or tagged with a valid VID this means priority tagged frames with VID 0 are never sent out by a VLAN aware switch It turns out that some applications have requirements conflicting with the IEEE 802 1Q native mode of operation e g some applications explicitly require priority tagged frames to be received by end devices ROS v3 7 0 User Guide 130 RS900LWG RS930LW 6 VLANs To ensure the required operation in any possible application scenario and provide full compatibility with legacy VLAN unaware devices RuggedSwitch can be configured to work in a VLAN unaware mode In that mode e Frames ingressing a VLAN unaware switch are not associated with any VLAN e Frames egressing a VLAN unaware switch are sent out unmodified i e in the same untagged 802 1Q tagged or priority tagged format as they were received 6 1 9 GVRP GARP VLAN Registration Protocol GVRP is a standard protocol built o
279. vice may only be performed by those with administrator privileges The exception is that the SFTP server does not support transmission of the firmware or configuration file using anything less than administrator privileges File transfers in both directions that make use of the ROS TFTP server do not require authentication since TFTP does not define an authentication scheme Instead the TFTP server must be enabled from the IP Services Configuration Menu when it is needed Note It is recommended to use the ROS TFTP server or any TFTP server only on a secure network owing to TFTP s lack of an authentication scheme Even so and especially in a production environment it is also recommended to leave the TFTP server enabled for only as long as it is needed The following sections describe briefly how to upgrade the main application firmware using each of the mechanisms provided by ROS 15 1 1 Upgrading Firmware Using XModem This method requires that the binary image file of the main ROS application firmware along with serial terminal or telnet software and the ability to do Xmodem transfers be available on a computer with an RS232 or network connection respectively to the ROS device to be upgraded ROS v3 7 0 User Guide 231 RS900LWG RS930LW 15 Firmware Upgrade and Configuration Management Establish a console connection with administrative privileges either via the RS232 port or via telnet Enter the ROS comm
280. viewed by using the type command specifying the desired filename gt dir Directory of RuggedSwitch Free files 21 of 32 Free handles 31 of 32 Free blocks 1024 of 1024 Block size 4096 Filename Size Hdls Blks Attr Description dir txt 0 1 1 R Listing of files and attributes boot bin 342930 0 0 RWB Boot firmware main bin 1424310 0 0 RWB Operating system firmware fpga xsvf 55921 0 D RWB FPGA programming file binary file factory txt 161 0 0 RW Factory data parameters config csv 8555 0 D RW System settings config bak 8555 0 0 RW System settings backup crashlog txt 0 0 D RW Log of debilitating system events syslog txt 3105 0 D RW Log of system events sdram bin 16777216 0 O R B Image of entire SDRAM memory flash bin 4194304 0 O R B Image of entire Flash memory Figure 14 3 Displaying The Directory Of A ROS Device 14 3 2 Viewing and Clearing Log Files The crashlog txt and syslog txt files contain historical information about events that have occurred The crashlog txt file will contain debugging information related to problems that might have resulted in unplanned restarts of the device or which may effect the device operation A file size of 0 bytes indicates that no untoward events have occurred The syslog txt file contains a record of significant events including startups configuration modifications firmware upgrades and database re initializations due to feature additions Syslog txt file will accumulate infor
281. west priority of 0 the bridges on either side should use a priority of 4096 and the next bridges 8192 and so on As there are 16 levels of bridge priority available this method provides for up to 31 bridges in the ring Implement the network and test under load ROS v3 7 0 User Guide 105 RS900LWG RS930LW 5 Spanning Tree 5 3 3 RSTP Port Redundancy Figure 5 5 Port Redundancy In cases where port redundancy is essential RSTP allows more than one bridge port to service a LAN For example if port 3 is designated to carry the network traffic of LAN A port 4 will block Should an interface failure occur on port 3 port 4 would assume control of the LAN 5 4 Spanning Tree Configuration The Spanning Tree menu is accessible from the main menu ROS v3 7 0 User Guide 106 RS900LWG RS930LW 5 Spanning Tree Log out Administration Serial Protocols Ethernet Ports Ethernet Statistics Link Aggregation Spanning Tree Configure Bridge RSTP Parameters Configure Por RSTP Parameters View Bridge RSTP Statistics View Pont RSTP Statistics Configure MST Region Identifier Configure Bridge MSTI Parameters Configure Port MSTI Parameters View Bridge MSTI Statistics View Port MSTI Statistics Virtual LANs Port Security Classes of Service Multicast Filtering MAC Address Tables Network Discovery Diaqnostics Figure 5 6 Spanning Tree Menu access admin ROS v3 7 0 User Guide 107 RS900LWG RS93
282. wnstream throughput and is generally more suitable for lower throughput connection which spans a longer distance up to 4km Note that a Universal VDSL port master or slave must be connected to another Universal VDSL port slave or master The same requirement applies to Long reach VDSL ports as well Connection between Universal VDSL ports and Long reach VDSL ports is not supported While master slave mode can be modified on Universal VDSL ports the operating mode of all Long reach VDSL ports is predetermined by hardware As a result master slave mode cannot be modified on Long reach VDSL ports When the EoVDSL link is initially established the ROS EoVDSL Master device automatically scans several different VDSL profiles while measuring Signal to Noise Ratio SNR Eventually the profile with the highest throughput where the SNR is still high enough to guarantee reliable communication the required SNR values are specified by the VDSL standard will be selected by ROS Even after locking onto the optimum profile ROS will remain continuously monitoring the signal quality and if the link quality should drop below an acceptable limit ROS will automatically shift downward to a lower throughput profile thus maintaining high channel reliability although sacrificing link throughput ROS v3 7 0 User Guide 64 RS900LWG RS930LW 2 Ethernet Ports The EoVDSL configuration and status parameters can be accessed from the Ethernet Por
283. y used on AP and station s are the same 7 3 3 2 RADIUS Server Requirement for IEEE 802 11 The RADIUS Remote Authentication Dial In User Service server used must support the Extensible Authentication Protocol EAP according to RFC3579 7 3 4 Network limitations 7 3 4 1 Access Point When the RS900W is configured as an AP there is a limit to the number of wireless client stations which can be associated as a given time ROS v3 7 0 User Guide 164 RS900LWG RS930LW 7 Wireless LAN e No wireless link encryption 63 wireless client stations e With WPA WPA2 using AES enabled 60 wireless client stations e With WPA WPA2 using TKIP enabled 30 wireless client stations Be aware that in a wireless infrastructure network all wireless clients will share the limited available wireless bandwidth so that client link performance will decrease for all clients as additional clients become associated 7 3 4 2 Client Bridge When the RS900W is configured as a Client Bridge there is a limit to the number of devices addresses which can be connected to the wired switch ports and bridged by the single wireless client e Number of devices bridged by a single Client Bridge unit 31 devices L2 addresses Note The RuggedWireless_ Client Bridge configuration is designed to operate with RuggedWireless AP configuration RuggedCom does not guarantee interoperability between the RuggedWireless Client Bri
284. y 19 15 21 48 818 WARN Port6 is down Figure 13 6 Viewing the System Log The system log will continue to accumulate information until it becomes full There is enough room in the file to accumulate logs for months or years under normal operation The Clear System Log option will clear the system log Clearing the log is recommended after a firmware upgrade ROS v3 7 0 User Guide 219 RS900LWG RS930LW 13 Diagnostics 13 4 Viewing Product Information Product Information access admin Back wa KEES Address 129 9A DC 01 04 60 Order EE Code RS8000T hi mm ms N Serial nzasa Number 123456769 Boot Boot a 250 May 31 2005 13 56 Main Main Long Dec 19 2005 18 06 Hardware JRSMCPU2 40 00 0026 Rev AT Reload Figure 13 7 Product Information Form MAC Address Synopsis where ranges 0 to FF Shows the unique MAC address of the device Order Code Synopsis 31 characters Shows the order code of the device Serial Number Synopsis 31 characters Shows the serial number of the device Boot Version Synopsis 47 characters Shows the version and the build date of the boot loader software Main Version Synopsis 47 characters Shows the version and build date of the main operating system software Hardware ID Synopsis 47 characters Shows the type part number and revision level of the hardware ROS v3 7 0 User Guide 220 RS900LWG RS930LW
285. ynopsis Any 127 characters Default Monitoring outgoing traffic on port 2 A comment describing this event Owner Synopsis Any 127 characters ROS v3 7 0 User Guide 86 RS900LWG RS930LW 3 Ethernet Statistics Default Monitor The owner of this event record It is suggested to start this string with the word monitor 3 6 RMON Event Log Event logs for a particular record in the RMON Events Table can be viewed by selecting a particular record and view option The index of the record will be included in the resulting menu title of the log table Log out Rmon Event 1 Log 1 Alarms Back oe RMON alarm 1 rising 4 0 days 00 06 01 fOutOctets 2 RMON alarm 1 falling 0 days 00 06 08 itoutoctets 2 3 0 days 00 09 21 RMON alarm 1 rising d EE E E LS o days 00 10 31 avon aarm 1 nising P LEE ES aa GILT Z 0 days 00 11 46 RMON alarm 1 rising ifOutOctets 2 Figure 3 15 RMON Event Log Table Rmon Event 1 Log 1 Alarms Back Log H LogTime O days 00 06 01 LogDescription RMON alarm 1 rising ifOutOctets 2 WS Figure 3 16 RMON Event Log Form ROS v3 7 0 User Guide 87 RS900LWG RS930LW 3 Ethernet Statistics Log Synopsis 0 to 4294967295 The index log taken for this log record LogTime Synopsis DDDD days HH MM SS The system elapsed time when this log was created LogDescription Synopsis Any 49 characters The description of the event that activa

Download Pdf Manuals

image

Related Search

Related Contents

  MAX SN883RH2 Use and Care Manual  Poulan 180200 Lawn Mower User Manual  sujets TFE 2009  Targus Portable notebook stand with Chill Hub  Installation- and Operating Instructions  User Manual Pollux EN INT  “i Test Subsystem W  NS-STR514 Guía del usuario Receptor estéreo AM/FM  TURBO TIMER USER`S MANUAL  

Copyright © All rights reserved.
DMCA: DMCA_mwitty#outlook.com.