RuggedCom RSG2488 User Manual

RuggedCom RSG2488 User Manual

Rugged operating system user guide
Hide thumbs Also See for RSG2488:
Table of Contents

Advertisement

Rugged Operating System (ROS)®
v4.0 User Guide
RUGGEDCOM RSG2488
April 5, 2013
www.RuggedCom.com

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the RSG2488 and is the answer not in the manual?

Questions and answers

Summary of Contents for RuggedCom RSG2488

  • Page 1 Rugged Operating System (ROS)® v4.0 User Guide RUGGEDCOM RSG2488 April 5, 2013 www.RuggedCom.com...
  • Page 2 RuggedCom has verified the contents of this manual against the hardware and/or software described. However, deviations between the product and the documentation may exist. RuggedCom shall not be liable for any errors or omissions contained herein or for consequential damages in connection with the furnishing, performance, or use of this material.
  • Page 3: Table Of Contents

    1.3 Available Services ........................7 1.4 SNMP Management Interface Base (MIB) Support ................. 8 1.4.1 Supported Standard MIBs ....................8 1.4.2 Supported Proprietary RuggedCom MIBs ................9 1.4.3 Supported Agent Capabilities ................... 10 1.5 SNMP Traps ..........................10 1.6 ModBus Management Support ....................12 1.6.1 ModBus Function Codes ....................
  • Page 4 Rugged Operating System (ROS)® RUGGEDCOM RSG2488 User Guide 1.7 Certificate and Key Requirements ....................21 1.8 Removable Memory ........................23 Chapter 2 Using ROS ......................2.1 Connecting to ROS ........................25 2.1.1 Connecting to ROS Through a Direct Connection .............. 25 2.1.2 Connecting to ROS Through the Network .................
  • Page 5 Rugged Operating System (ROS)® RUGGEDCOM RSG2488 User Guide 3.5.4 Uploading/Downloading Files Using an SFTP Server ............52 3.6 Managing Logs .......................... 53 3.6.1 Viewing Local Logs ......................53 3.6.2 Clearing Local Logs ......................54 3.6.3 Configuring the Local System Log ..................54 3.6.4 Managing Remote Logging ....................
  • Page 6 Rugged Operating System (ROS)® RUGGEDCOM RSG2488 User Guide 3.11.3 Managing RMON Events ....................87 3.11.3.1 Viewing a List of RMON Events ................87 3.11.3.2 Adding an RMON Event ..................87 3.11.3.3 Deleting an RMON Event ..................89 3.12 Upgrading/Downgrading Firmware ..................... 90 3.12.1 Upgrading Firmware ......................
  • Page 7 Rugged Operating System (ROS)® RUGGEDCOM RSG2488 User Guide 5.1.1.7 VLAN Advantages ....................114 5.1.2 Viewing a List of VLANs ....................115 5.1.3 Configuring VLANs for Ethernet Ports ................116 5.1.4 Managing Static VLANs ....................117 5.1.4.1 Viewing a List of Static VLANs ................117 5.1.4.2 Adding a Static VLAN ..................
  • Page 8 Rugged Operating System (ROS)® RUGGEDCOM RSG2488 User Guide 5.3.3 Configuring Priority to CoS Mapping ................152 5.3.4 Configuring DSCP to CoS Mapping ................153 5.4 Managing MAC Addresses ......................155 5.4.1 Viewing a List of MAC Addresses ................... 155 5.4.2 Configuring MAC Address Learning Options ..............155 5.4.3 Managing Static MAC Addresses ..................
  • Page 9: Preface

    User Guide Preface This guide describes the ROS v4.0 running on the RUGGEDCOM RSG2488 family of products. It contains instructions and guidelines on how to use the software, as well as some general theory. It is intended for use by network technical support personnel who are familiar with the operation of networks. It is also recommended for us by network and system planners, system programmers, and line technicians.
  • Page 10: System Requirements

    ○ Google Chrome ○ Iceweasel/IceCat (Linux Only) • Must have a working Ethernet interface compatible with at least one of the port types on the RUGGEDCOM device • The ability to configure an IP address and netmask on the computer’s Ethernet interface...
  • Page 11: Customer Support

    RUGGEDCOM RSG2488 User Guide Customer Support Customer support is available 24 hours, 7 days a week for all RuggedCom customers. For technical support or general information, please contact Customer Support at: Toll Free (North America): 1 866 922 7975 International: +1 905 856 5288 E-Mail: Support@RuggedCom.com...
  • Page 12 Preface RUGGEDCOM RSG2488 User Guide Customer Support...
  • Page 13: Introduction

    Section 1.8, “Removable Memory” Section 1.1 Overview Welcome to the ROS Software User Guide for the RSG2488. This Guide describes the wide array of carrier grade features made available by ROS (Rugged Operating System). These features include: Rugged Operating System (ROS) Features Cyber Security Features •...
  • Page 14: Security Recommendations And Considerations

    Introduction User Guide Section 1.2 Security Recommendations and Considerations The following describes important security-related recommendations and suggestions that should be considered before implementing the RSG2488 on any network: • Section 1.2.1, “Security Recommendations” • Section 1.2.2, “Key Files” Section 1.2.1...
  • Page 15: Key Files

    • Management of the configuration file, certificates and keys is the responsibility of the device owner. Before returning the device to RuggedCom for repair, make sure encryption is disabled (to create a cleartext version of the configuration file) and replace the current certificates and keys with temporary certificates and keys that can be destroyed upon the device's return.
  • Page 16 Chapter 1 RUGGEDCOM RSG2488 Introduction User Guide • RSA key pair, 512 to 2048 bits The RSA key pair used in the default certificate and in those generated by ROS uses a public key of 1024 bits in length. NOTE RSA keys smaller than 1024 bits in length are not recommended.
  • Page 17: Ssh Key Pairs

    > ssl.crt For information on creating SSL certificates for use with ROS in a Microsoft Windows environment, refer to the following RuggedCom application note: Creating/Uploading SSH Keys and SSL Certificates to ROS Using Windows. The following is an example of a self-signed SSL certificate generated by ROS:...
  • Page 18 Chapter 1 RUGGEDCOM RSG2488 Introduction User Guide • PEM format • DSA key pair, 512 to 2048 bits in length The DSA key pair used in the default key pair and in those generated by ROS uses a public key of 1024 bits in length.
  • Page 19: Available Services

    RUGGEDCOM RSG2488 Chapter 1 User Guide Introduction 50:06:b8:d3:f9:d4:9c:9c:75:84:5b:db:96:46:13: f0:32:f0:c5:cb:83:01:a8:ae:d1:5a:ac:68:fb:49: f9:b6:8b:d9:d6:0d:a7:de:ad:16:2b:23:ff:8e:f9: 3c:41:16:04:66:cf:e8:64:9e:e6:42:9a:d5:97:60: c2:e8:9e:f4:bc:8f:6f:e0 Section 1.3 Available Services The following table lists the services available under ROS. This table includes the following information: • Services The service supported by the device. • Port Number The port number associated with the service.
  • Page 20: Snmp Management Interface Base (Mib) Support

    Open Closed (configurable) Section 1.4 SNMP Management Interface Base (MIB) Support ROS supports a variety of standard MIBs, proprietary RuggedCom MIBs and Agent Capabilties MIBs, all for SNMP (Simple Network Management Protocol). • Section 1.4.1, “Supported Standard MIBs” • Section 1.4.2, “Supported Proprietary RuggedCom MIBs”...
  • Page 21: Supported Proprietary Ruggedcom Mibs

    Q-BRIDGE-MIB Definitions of Managed Objects for Bridges with Traffic Classes, Multicast Filtering, and Virtual LAN Extensions Section 1.4.2 Supported Proprietary RuggedCom MIBs ROS supports the following proprietary RuggedCom MIBs: Table 2: Proprietary RuggedCom MIBs File Name MIB Name Description ruggedcom.mib...
  • Page 22: Supported Agent Capabilities

    Chapter 1 RUGGEDCOM RSG2488 Introduction User Guide Section 1.4.3 Supported Agent Capabilities ROS supports the following agent capabilities for the SNMP agent: NOTE For information about agent capabilities for SNMPv2, refer to RFC 2580 [http://tools.ietf.org/html/ rfc2580]. Table 3: Supported Agent Capabilities...
  • Page 23 Generic traps carry information about events in their severity and description objects. They are sent at the same time an alarm is generated for the device. The following are examples of RuggedCom generic traps: NOTE Information about generic traps can be retrieved using the CLI command alarms. For more information about the alarms command, refer to Section 2.6.1, “Available CLI...
  • Page 24: Modbus Management Support

    RuggedCom devices support the following ModBus function codes for device management through ModBus: NOTE While RuggedCom devices have a variable number of ports, not all registers and bits apply to all products. Registers that are not applicable to a particular device return a zero (0) value. For example, registers referring to serial ports are not applicable to RuggedSwitch®...
  • Page 25: Modbus Memory Map

    RUGGEDCOM RSG2488 Chapter 1 User Guide Introduction Starting Address 2 Bytes 0x0000 to 0xFFFF Number of Input Registers 2 Bytes Bytes 0x0001 to 0x0079 Byte Count 1 Byte 2 x N Registers Value x 2 Bytes Value of the register...
  • Page 26: Ethernet Statistics

    Chapter 1 RUGGEDCOM RSG2488 Introduction User Guide Address #Registers Description (Reference Table in UI) Format 0100 Alarm 1 Alarm 0140 Alarm 2 Alarm 0180 Alarm 3 Alarm 01C0 Alarm 4 Alarm 0200 Alarm 5 Alarm 0240 Alarm 6 Alarm 0280...
  • Page 27 RUGGEDCOM RSG2488 Chapter 1 User Guide Introduction Address #Registers Description (Reference Table in UI) Format 0426 Port s5/p4 Statistics - Ethernet In Packets Uinst32 0428 Port s6/p1 Statistics - Ethernet In Packets Uinst32 042A Port s6/p2 Statistics - Ethernet In Packets...
  • Page 28 Chapter 1 RUGGEDCOM RSG2488 Introduction User Guide Address #Registers Description (Reference Table in UI) Format 0472 Port s7/p2 Statistics - Ethernet Out Packets Uinst32 0474 Port s8/p1 Statistics - Ethernet Out Packets Uinst32 0476 Port s8/p2 Statistics - Ethernet Out Packets...
  • Page 29: Modbus Memory Formats

    Port s8/p1 Statistics - Ethernet Out Packets Uinst32 04F6 Port s8/p2 Statistics - Ethernet Out Packets Uinst32 Section 1.6.3 ModBus Memory Formats The following ModBus memory formats are supported by RuggedCom: • Section 1.6.3.1, “Text” • Section 1.6.3.2, “Cmd” • Section 1.6.3.3, “Uint16”...
  • Page 30: Text

    Chapter 1 RUGGEDCOM RSG2488 Introduction User Guide • Section 1.6.3.6, “Alarm” • Section 1.6.3.7, “PSStatusCmd” • Section 1.6.3.8, “TruthValues” Section 1.6.3.1 Text The Text format provides a simple ASCII representation of the information related to the product. The most significant register byte of an ASCII characters comes first.
  • Page 31: Uint32

    0x00 0x02 The response depends on how many parts are available on the device. For example, if the maximum number of ports on a connected RuggedCom device is 20, the response would be similar to the following: 0x04 0x04 0xF2...
  • Page 32: Psstatuscmd

    Power Supply is functional (10 = 2) Power Supply is not functional (11 = 3) The values used for power supply status are derived from the RuggedCom-specific SNMP MIB. Reading the Power Supply Status from a Device Using PSStatusCmd To understand how to read the power supply status from a device using PSStatusCmd, consider a ModBus Request to read multiple registers from location 0x0043.
  • Page 33: Certificate And Key Requirements

    RUGGEDCOM RSG2488 Chapter 1 User Guide Introduction The response may look like: 0x04 0x02 0x00 0x01 The register's lower byte shows the FailSafe Relay status. In this example, the FailSafe Relay is energized. Reading the ErrorAlarm Status From a Device Using TruthValue To understand how to use the TruthValue format to read the ErrorAlarm status from a device, conside a ModBus request to read mulitple registers from location 0x0045.
  • Page 34 Chapter 1 RUGGEDCOM RSG2488 Introduction User Guide -----BEGIN CERTIFICATE----- MIIC9jCCAl+gAwIBAgIJAJh6rrehMt3iMA0GCSqGSIb3DQEBBQUAMIGuMQswCQYD VQQGEwJDQTEQMA4GA1UECBMHT250YXJpbzEQMA4GA1UEBxMHQ29uY29yZDESMBAG A1UEChMJUnVnZ2VkY29tMRkwFwYDVQQLExBDdXN0b21lciBTdXBwb3J0MSYwJAYD VQQDEx1XUy1NSUxBTkdPVkFOLlJVR0dFRENPTS5MT0NBTDEkMCIGCSqGSIb3DQEJ ARYVc3VwcG9ydEBydWdnZWRjb20uY29tMB4XDTEyMTAyMzIxMTA1M1oXDTE3MTAy MjIxMTA1M1owgZwxCzAJBgNVBAYTAlVTMRAwDgYDVQQIEwdPbnRhcmlvMRAwDgYD VQQHEwdDb25jb3JkMRIwEAYDVQQKEwlSdWdnZWRDb20xGTAXBgNVBAsTEEN1c3Rv bWVyIFN1cHBvcnQxFDASBgNVBAMTCzE5Mi4xNjguMS4yMSQwIgYJKoZIhvcNAQkB FhVTdXBwb3J0QHJ1Z2dlZGNvbS5jb20wgZ8wDQYJKoZIhvcNAQEBBQADgY0AMIGJ AoGBALfE4eh2aY+CE3W5a4Wz1Z1RGRP02COHt153wFFrU8/fFQXNhKlQirlAHbNT RSwcTR8ZFapivwYDivn0ogOGFXknYP90gv2oIaSVY08FqZkJW77g3kzkv/8Zrw3m W/cBsZJ8SyKLIDfy401HkHpDOle5NsQFSrziGUPjAOIvvx4rAgMBAAGjLDAqMAkG A1UdEwQCMAAwHQYDVR0OBBYEFER0utgQOifnrflnDtsqNcnvRB0XMA0GCSqGSIb3 DQEBBQUAA4GBAHtBsNZuh8tB3kdqR7Pn+XidCsD70YnI7w0tiy9yiRRhARmVXH8h 5Q1rOeHceri3JFFIOxIxQt4KgCUYJLu+c9Esk/nXQQar3zR7IQCt0qOABPkviiY8 c3ibVbhJjLpR2vNW4xRAJ+HkNNtBOg1xUlp4vOmJ2syYZR+7XAy/OP/S -----END CERTIFICATE----- -----BEGIN RSA PRIVATE KEY----- MIICXAIBAAKBgQC3xOHodmmPghN1uWuFs9WdURkT9Ngjh7ded8BRa1PP3xUFzYSp UIq5QB2zU0UsHE0fGRWqYr8GA4r59KIDhhV5J2D/dIL9qCGklWNPBamZCVu+4N5M 5L//Ga8N5lv3AbGSfEsiiyA38uNNR5B6QzpXuTbEBUq84hlD4wDiL78eKwIDAQAB AoGBAI2CXHuHg23wuk9zAusoOhw0MN1/M1jYz0k9aajIvvdZT3Tyd29yCADy8GwA eUmoWXLS/C4CcBqPa9til8ei3rDn/w8dveVHsi9FXjtVSYqN+ilKw+moMAjZy4kN /kpdpHMohwv/909VWR1AZbr+YTxaG/++tKl5bqXnZl4wHF8xAkEA5vwut8USRg2/ TndOt1e8ILEQNHvHQdQr2et/xNH4ZEo7mqot6skkCD1xmxA6XG64hR3BfxFSZcew Wr4SOFGCtQJBAMurr5FYPJRFGzPM3HwcpAaaMIUtPwNyTtTjywlYcUI7iZVVfbdx 4B7qOadPybTg7wqUrGVkPSzzQelz9YCSSV8CQFqpIsEYhbqfTLZEl83YjsuaE801...
  • Page 35: Removable Memory

    Section 1.8 Removable Memory The RSG2488 features a user-accessible microSD memory slot that supports a standard ISO/IEC 9293- compatible FAT (File Allocation Table) or FAT 32 file system on a microSD or microSDHC Flash card up to a capacity of 4GB.
  • Page 36 Chapter 1 RUGGEDCOM RSG2488 Introduction User Guide Removable Memory...
  • Page 37: Using Ros

    To establish a serial connection to the device, do the following: Connect a terminal or a computer running terminal emulation software to the RS232 serial console port on the device. For more information about the RS232 serial console port, refer to the RSG2488 Installation Guide.
  • Page 38: Connecting To Ros Through The Network

    Connect a terminal or a computer running terminal emulation software to the MGMT port on the device. For more information about the MGMT port, refer to the RSG2488 Installation Guide. Launch the SSH client on the terminal or computer and connect to admin@{ipaddress}, where {ipaddress} is the IP address for the MGMT port.
  • Page 39: Logging In

    RUGGEDCOM RSG2488 Chapter 2 User Guide Using ROS For more information about logging in to the device, refer to Section 2.2, “Logging In”. For more information about the Web interface, refer to Section 2.4, “Using the Web Interface”. Using a Terminal or Terminal Emulation Software A terminal or computer running terminal emulation software provides secure access to the console interface for ROS through a Telnet, RSH (Remote Shell) or SSH (Secure Shell) service.
  • Page 40: Logging Out

    Chapter 2 RUGGEDCOM RSG2488 Using ROS User Guide Guest Operator Admin Username: guest Username: operator Username: admin Password: guest Password: operator Password: admin CAUTION! To prevent unauthorized access to the device, make sure to change the default guest, operator, and admin passwords before commissioning the device.
  • Page 41: Using The Web Interface

    RUGGEDCOM RSG2488 Chapter 2 User Guide Using ROS Section 2.4 Using the Web Interface The Web interface is a Web-based Graphical User Interface (GUI) for displaying important information and controls in a Web browser. The interface is divided into three frames: the banner, the menu and the main frame.
  • Page 42: Using The Console Interface

    Chapter 2 RUGGEDCOM RSG2488 Using ROS User Guide Figure 6: Elements of a Typical Screen 1. Title 2. Parameters and/or Data 3. Access Level or Alarm Notification 4. Controls Section 2.5 Using the Console Interface The Console interface is a Graphical User Interface (GUI) organized as a series of menus. It is primarily accessible through a serial console connection, but can also be accessed through IP services, such as a Telnet, RSH (Remote Shell), or SSH (Secure Shell) session.
  • Page 43: Navigating The Interface

    RUGGEDCOM RSG2488 Chapter 2 User Guide Using ROS Figure 7: Console Interface (Example) 1. System Identification 2. Menus 3. Command Bar 4. Menu Name 5. Alarms Indicator NOTE They system identifier is user configurable. For more information about setting the system name, refer Section 4.1, “Configuring the System...
  • Page 44: Using The Command Line Interface

    Chapter 2 RUGGEDCOM RSG2488 Using ROS User Guide NOTE Before exiting a screen, ROS will automatically prompt the user to save any changes that have not been committed. Ctrl + I Inserts a new record. Ctrl + S Opens the CLI interface.
  • Page 45 RUGGEDCOM RSG2488 Chapter 2 User Guide Using ROS Command Description CAUTION! Misuse of the factory commands may corrupt the operational state of device and/or may permanently damage the ability to recover the device without manufacturer intervention. flashfiles { info filename |...
  • Page 46 Chapter 2 RUGGEDCOM RSG2488 Using ROS User Guide Command Description route Displays the gateway configuration. sfp port { base | alarms | diag | Displays SFP (Small Form Factor Pluggable) device information and diagnostics. If Optional calibr | thr | all | no parameter...
  • Page 47: Tracing Events

    RUGGEDCOM RSG2488 Chapter 2 User Guide Using ROS Command Description xmodem { send | receive } Opens an XModem session. filename Optional and/or required parameters include: • send sends the file to the client. • receive receives the file from the client.
  • Page 48: Enabling A Trace

    Chapter 2 RUGGEDCOM RSG2488 Using ROS User Guide Section 2.6.2.1 Enabling a Trace Tracing can be enabled on a per subsystem basis. However, some subsystems can only trace events on certain ports. To enable a trace, do the following: Log in to the device as an admin user and access the CLI shell. For more information about accessing the CLI shell, refer to Section 2.6, “Using the Command Line...
  • Page 49: Executing Commands Remotely Via Rsh

    RUGGEDCOM RSG2488 Chapter 2 User Guide Using ROS Example: >trace Log has been cleared 009.445 IGMP TX General Query, VLAN 1, gr. 000.000.000.000, to ports ALL VLAN PORTS 010.543 LINK Link 7 has risen. 000.550 STP TX port 7 RST BPDU: TCack 0 agg 1 lrn 0 fwd 0 role DP prop 1 TC 0 root 32768/0adc001000 cst 38, brdg 32768/0adc005000, prt 128/7 age 2.00, maxage 20, hello 2, fwddelay 15 V1Length 0...
  • Page 50: Finding The Correct Table

    Chapter 2 RUGGEDCOM RSG2488 Using ROS User Guide NOTE For a list of parameters available under the sql command, refer to Section 2.6.1, “Available CLI Commands”. The following sections describe in more detail how to use SQL commands: • Section 2.6.4.1, “Finding the Correct Table”...
  • Page 51 RUGGEDCOM RSG2488 Chapter 2 User Guide Using ROS IP Address Subnet IfIndex IfStats IfTime IfName 172.30.146.88 255.255.224.0 1001 17007888 2994 default 192.168.0.1 255.255.255.0 1002 17007672 3195 vlan1 2 records selected Retrieving Information About a Parameter from a Table Use the following command to retrieve information about a specific parameter from a table:...
  • Page 52: Changing Values In A Table

    Chapter 2 RUGGEDCOM RSG2488 Using ROS User Guide sql select from table where parameter = value [ { and | or } | parameter | = | value ...] Where: • table is the name of the table • parameter is the name of the parameter •...
  • Page 53: Using Rsh And Sql

    RUGGEDCOM RSG2488 Chapter 2 User Guide Using ROS sql default into table Where: • table is the name of the table Section 2.6.4.5 Using RSH and SQL The combination of remote shell scripting and SQL commands offers a means to interrogate and maintain a large number of devices.
  • Page 54: Viewing A List Of Flash Files

    Chapter 2 RUGGEDCOM RSG2488 Using ROS User Guide Section 2.7.1 Viewing a List of Flash Files To view a list of files currently stored in Flash memory, do the following: Log in to the device as an admin user and access the CLI shell. For more information about accessing the CLI shell, refer to Section 2.6, “Using the Command Line...
  • Page 55: Defragmenting The Flash File System

    Mechanical hazard — risk of damage to the device. Excessive use of BIST functions may cause increase wear on the device, which may void the warranty. Avoid using BIST functions unless instructed by a Siemens/RuggedCom representative. To access BIST mode, do the following: IMPORTANT! Do not connect the device to the network when it is in BIST mode.
  • Page 56: Accessing The Boot Loader

    Chapter 2 RUGGEDCOM RSG2488 Using ROS User Guide Disconnect the device from the network. Connect to ROS through the RS232 console connection and a terminal application. For more information, refer to Section 2.1.1, “Connecting to ROS Through a Direct Connection”.
  • Page 57: Device Management

    Section 3.1 Viewing Product Information During troubleshooting or when ordering new devices, RuggedCom personnel may request specific information about the device, such as the model, order code or serial number. To view information about the device, navigate to Diagnostics > View Product Information. The Product Information form appears.
  • Page 58: Viewing Cpu Diagnostics

    Main Version Synopsis: Any 47 characters Shows the version and build date of the main operating system software. Hardware ID Synopsis: { RSG2488 } Shows the type, part number, and revision level of the hardware. Section 3.2 Viewing CPU Diagnostics To view CPU diagnostic information useful for troubleshooting hardware and software performance, navigate to Diagnostics >...
  • Page 59 RUGGEDCOM RSG2488 Chapter 3 User Guide Device Management Figure 9: CPU Diagnostics Form 1. Running Time Box 2. CPU Usage Box 3. RAM Total Box 4. RAM Free Box 5. RAM Low Watermark Box 6. DMA RAM Free 7. DMA RAM Low Watermark Box 8.
  • Page 60: Viewing The Status Of The Power Supplies

    Chapter 3 RUGGEDCOM RSG2488 Device Management User Guide Section 3.3 Viewing the Status of the Power Supplies To view the current status of the power supplies, navigate to Diagnostics > Power Supply Status. The Power Supply Status table appears. Figure 10: Power Supply Status Table...
  • Page 61: Uploading/Downloading Files

    RUGGEDCOM RSG2488 Chapter 3 User Guide Device Management • SNMP Users • SNMP Security to Group Maps • SNMP Access • Time Zone • DST Offset • DST Rule To restore factory defaults, do the following: Navigate to Diagnostics > Load Factory Defaults. The Load Factory Defaults form appears.
  • Page 62: Uploading/Downloading Files Using Xmodem

    Chapter 3 RUGGEDCOM RSG2488 Device Management User Guide • main.bin – the main ROS application firmware image • boot.bin – the boot loader firmware image • fpga.xsvf – the FPGA firmware binary image • config.csv – the complete configuration database, in the form of a comma-delimited ASCII text file •...
  • Page 63: Uploading/Downloading Files Using A Tftp Client

    RUGGEDCOM RSG2488 Chapter 3 User Guide Device Management , launch the XMODEM transfer from the host computer. The device will indicate when the transfer is complete. The following is an example from the CLI shell of a successful XMODEM file transfer: >xmodem receive main.bin...
  • Page 64: Uploading/Downloading Files Using A Tftp Server

    Chapter 3 RUGGEDCOM RSG2488 Device Management User Guide Section 3.5.3 Uploading/Downloading Files Using a TFTP Server To updload or download a file using a TFTP server, do the following: IMPORTANT! TFTP does not define an authentication scheme. Any use of the TFTP client or server is considered highly insecure.
  • Page 65: Managing Logs

    RUGGEDCOM RSG2488 Chapter 3 User Guide Device Management Connecting to ros_ip... admin@ros_ip's password: sftp> put ROS-CF52_Main_v3-7-0.bin main.bin Uploading ROS-CF52_Main_v3-7-0.bin to /main.bin ROS-CF52_Main_v3-7-0.bin 100% 2139KB 48.6KB/s 00:44 sftp> Section 3.6 Managing Logs The crash (crashlog.txt) and system (syslog.txt) log files contain historical information about events that have occurred during the operation of the device.
  • Page 66: Clearing Local Logs

    Chapter 3 RUGGEDCOM RSG2488 Device Management User Guide Section 3.6.2 Clearing Local Logs To clear both the local crash and system logs, log in to the CLI shell and type: clearlogs To clear only the local system log, log in to the Web interface and do the following: Navigate to Diagnostics >...
  • Page 67: Managing Remote Logging

    RUGGEDCOM RSG2488 Chapter 3 User Guide Device Management Parameter Description The severity of the message that has been generated. Note that the severity level selected is considered the minimum severity level for the system. For example, if ERROR is selected, the system sends any syslog messages generated by Error, Critical, Alert and Emergency.
  • Page 68: Viewing A List Of Remote Syslog Servers

    Chapter 3 RUGGEDCOM RSG2488 Device Management User Guide Parameter Description The local UDP port through which the client sends information to the server(s). Click Apply. Section 3.6.4.2 Viewing a List of Remote Syslog Servers To view a list of known remote syslog servers, navigate to Administration > Configure Syslog > Configure Remote Syslog Server.
  • Page 69: Deleting A Remote Syslog Server

    RUGGEDCOM RSG2488 Chapter 3 User Guide Device Management Click InsertRecord. The Remote Syslog Server form appears. Figure 18: Remote Syslog Server Form 1. IP Address Box 2. UDP Port Box 3. Facility Box 4. Severity Box 5. Apply Button 6. Delete Button 7.
  • Page 70: Managing Ethernet Ports

    Chapter 3 RUGGEDCOM RSG2488 Device Management User Guide Figure 19: Remote Syslog Server Table Select the server from the table. The Remote Syslog Server form appears. Figure 20: Remote Syslog Server Form 1. IP Address Box 2. UDP Port Box 3.
  • Page 71: Controller Protection Through Link Fault Indication (Lfi)

    IEEE 802.3 standard, which means that some links partners may not support it. RuggedCom offers an advanced Link-Fault-Indication (LFI) feature for the links that do not have a native link partner notification mechanism. With LFI enabled, the device bases the generation of a link integrity signal upon its reception of a link signal.
  • Page 72: Viewing The Status Of Ports

    Chapter 3 RUGGEDCOM RSG2488 Device Management User Guide controller, it will stop generating a link signal. The controller will detect the link failure and failover to the backkup port. IMPORTANT! If both link partners have the LFI feature, it must not be enabled on both sides of the link. If it is enabled on both sides, the link will never be established, as each link partner will be waiting for the other to transmit a link signal.
  • Page 73: Viewing Statistics For All Ethernet Ports

    RUGGEDCOM RSG2488 Chapter 3 User Guide Device Management Parameter Description The port number as seen on the front plate silkscreen of the switch. Synopsis: Any 15 characters Name A descriptive name that may be used to identify the device conected on that port.
  • Page 74: Viewing Statistics For Specific Ethernet Ports

    Chapter 3 RUGGEDCOM RSG2488 Device Management User Guide Parameter Description The number of any type of erroneous packet. Section 3.7.4 Viewing Statistics for Specific Ethernet Ports To view statistics collected for specific Ethernet ports, navigate to Ethernet Stats > View Ethernet Port Statistics.
  • Page 75 RUGGEDCOM RSG2488 Chapter 3 User Guide Device Management Parameter Description The number of received good packets (Unicast+Multicast+Broadcast) and dropped packets. Synopsis: 0 to 18446744073709551615 OutPkts The number of transmitted good packets. TotalInOctets Synopsis: 0 to 18446744073709551615 The total number of octets of all received packets. This includes data octets of rejected and local packets which are not forwarded to the switching core for transmission.
  • Page 76: Clearing Statistics For Specific Ethernet Ports

    Chapter 3 RUGGEDCOM RSG2488 Device Management User Guide Parameter Description The number of received and transmitted packets with size of 65 to 127 octets. This includes received and transmitted packets as well as dropped and local received packets. This does not include rejected received packets.
  • Page 77: Configuring An Ethernet Port

    RUGGEDCOM RSG2488 Chapter 3 User Guide Device Management Figure 25: Clear Ethernet Port Statistics Form 1. Port Check Boxes 2. Confirm Button Select one or more Ethernet ports. Press Confirm. Section 3.7.6 Configuring an Ethernet Port To configure an Ethernet port, do the following: Navigate to Ethernet Ports >...
  • Page 78 Chapter 3 RUGGEDCOM RSG2488 Device Management User Guide Figure 27: Port Parameters Form 1. Port Box 2. Name Box 3. Media Box 4. State Box 5. AutoN Box 6. Speed Box 7. Dupx Box 8. FlowCtrl Box 9. LFI 10. Alarm Box 11.
  • Page 79: Configuring Port Mirroring

    RUGGEDCOM RSG2488 Chapter 3 User Guide Device Management Parameter Description Speed (in Megabit-per-second or Gigabit-per-second). If auto-negotiation is enabled, this is the speed capability advertised by the auto-negotiation process. If auto- negotiation is disabled, the port is explicitly forced to this speed mode.
  • Page 80 Chapter 3 RUGGEDCOM RSG2488 Device Management User Guide NOTE Invalid frames received on the source port will not be mirrored. These include CRC errors, oversize and undersize packets, fragments, jabbers, collisions, late collisions and dropped events. IMPORTANT! Before configuring port mirroring, note the following limitations: •...
  • Page 81: Configuring Link Detection

    RUGGEDCOM RSG2488 Chapter 3 User Guide Device Management Section 3.7.8 Configuring Link Detection To configure link detection, do the following: Navigate to Ethernet Ports > Configure Link Detection. The Link Detection form appears. Figure 29: Link Detection Form 1. Fast Link Detection Box 2.
  • Page 82: Resetting Ethernet Ports

    Chapter 3 RUGGEDCOM RSG2488 Device Management User Guide Parameter Description • OFF - Turning this parameter OFF will disable FAST LINK DETECTION completely. The switch will need a longer time to detect a link failure. This will result in a longer network recovery time of up to 2s.
  • Page 83: Configuring The Management Ip Interface

    RUGGEDCOM RSG2488 Chapter 3 User Guide Device Management Only one subnet is assigned to be the management subnet and can be used by management applications, such as Web Server, SSH, etc. NOTE Subnets must be specifically defined for each interface. Subnets must not be a part of another subnet configured on the device.
  • Page 84: Managing Switch Ip Interfaces

    Chapter 3 RUGGEDCOM RSG2488 Device Management User Guide Parameter Description Specifies the IP address of this device. An IP address is a 32-bit number that is notated by using four numbers from 0 through 255, separated by periods. Only a unicast IP address is allowed, which ranges from 1.0.0.0 to 233.255.255.255.
  • Page 85 RUGGEDCOM RSG2488 Chapter 3 User Guide Device Management Figure 34: Switch IP Interfaces Table 1. InsertRecord Click InsertRecord. The Switch IP Interfaces form appears. Figure 35: Switch IP Interfaces Form 1. IP Address Type Box 2. IP Address Box 3. Subnet Box 4.
  • Page 86: Deleting A Switch Ip Interface

    Chapter 3 RUGGEDCOM RSG2488 Device Management User Guide Parameter Description Specifies the IP subnet mask of this device. An IP subnet mask is a 32-bit number that is notated by using four numbers from 0 through 255, separated by periods. Typically, subnet mask numbers use either 0 or 255 as values (e.g.
  • Page 87: Viewing A List Of Ip Gateways

    RUGGEDCOM RSG2488 Chapter 3 User Guide Device Management IMPORTANT! The default gateway can be configured for a switch IP interface (on the management VLAN) or the management IP interface. When configured for a switch IP interface, the configuration will not change when the settings are reset to the factory defaults.
  • Page 88: Deleting An Ip Gateway

    Chapter 3 RUGGEDCOM RSG2488 Device Management User Guide Figure 39: IP Gateways Table 1. InsertRecord Click InsertRecord. The IP Gateways form appears. Figure 40: IP Gateways 1. Destination Box 2. Subnet Box 3. Gateway Box 4. Apply Button 5. Delete Button 6.
  • Page 89: Configuring Ip Services

    RUGGEDCOM RSG2488 Chapter 3 User Guide Device Management Figure 41: IP Gateways Table Select the IP gateway from the table. The IP Gateways form appears. Figure 42: IP Gateways Form 1. Destination Box 2. Subnet Box 3. Gateway Box 4. Apply Button 5.
  • Page 90 Chapter 3 RUGGEDCOM RSG2488 Device Management User Guide Figure 43: IP Services Form 1. Inactivity Timeout Box 2. Telnet Sessions Allowed Box 3. Web Server Users Allowed Box 4. TFTP Server Box 5. Modbus Address Box 6. RSH Server Box...
  • Page 91: Managing Remote Monitoring

    RUGGEDCOM RSG2488 Chapter 3 User Guide Device Management Click Apply. Section 3.11 Managing Remote Monitoring Remote Monitoring (RMON) is used to collect and view historical statistics related to the performance and operation of Ethernet ports. It can also record a log entry and/or generate and SNMP trap when the rate of occurence of a specified event is exceeded.
  • Page 92: Adding An Rmon History Control

    Chapter 3 RUGGEDCOM RSG2488 Device Management User Guide Section 3.11.1.2 Adding an RMON History Control To add an RMON history control, do the following: Navigate to Ethernet Stats > Configure RMON History Controls. The RMON History Controls table appears. Figure 45: RMON History Controls Table 1.
  • Page 93: Deleting An Rmon History Control

    RUGGEDCOM RSG2488 Chapter 3 User Guide Device Management Parameter Description The maximum number of buckets requested for this RMON collection history group of statistics. The range is 1 to 4000. The default is 50. Granted Buckets Synopsis: 0 to 65535 The number of buckets granted for this RMON collection history.
  • Page 94: Managing Rmon Alarms

    Chapter 3 RUGGEDCOM RSG2488 Device Management User Guide Figure 48: RMON History Controls Form 1. Index Box 2. Port Box 3. Requested Buckets Box 4. Granted Buckets Box 5. Interval Box 6. Owner Box 7. Apply Button 8. Delete Button 9.
  • Page 95: Viewing A List Of Rmon Alarms

    RUGGEDCOM RSG2488 Chapter 3 User Guide Device Management Figure 49: The Alarm Process There are two methods to evaluate a statistic in order to determine when to generate an event: delta and absolute. For most statistics, such as line errors, it is appropriate to generate an alarm when a rate is exceeded. The alarm defaults to the delta measurement method, which examines changes in a statistic at the end of each measurement period.
  • Page 96: Adding An Rmon Alarm

    Chapter 3 RUGGEDCOM RSG2488 Device Management User Guide Section 3.11.2.2 Adding an RMON Alarm To add an RMON alarm, do the following: Navigate to Ethernet Stats > Configure RMON Alarms. The RMON Alarms table appears. Figure 51: RMON Alarms Table 1.
  • Page 97 RUGGEDCOM RSG2488 Chapter 3 User Guide Device Management Parameter Description The SNMP object identifier (OID) of the particular variable to be sampled. Only variables that resolve to an ASN.1 primitive type INTEGER (INTEGER, Integer32,Counter32, Counter64, Gauge, or TimeTicks) may be sampled. A list of objects can be printed using shell command 'rmon'.
  • Page 98: Deleting An Rmon Alarm

    Chapter 3 RUGGEDCOM RSG2488 Device Management User Guide Click Apply. Section 3.11.2.3 Deleting an RMON Alarm To delete an RMON alarm, do the following: Navigate to Ethernet Stats > Configure RMON Alarms. The RMON Alarms table appears. Figure 53: RMON Alarms Table Select the alarm from the table.
  • Page 99: Managing Rmon Events

    RUGGEDCOM RSG2488 Chapter 3 User Guide Device Management Section 3.11.3 Managing RMON Events Remote Monitoring (RMON) events define behavior profiles used in event logging. These profiles are used by RMON alarms to send traps and log events. Each alarm may specify that a log entry be created on its behalf whenever the event occurs. Each entry may also specify that a notification should occur by way of SNMP trap messages.
  • Page 100 Chapter 3 RUGGEDCOM RSG2488 Device Management User Guide Figure 56: RMON Events Table 1. InsertRecord Click InsertRecord. The RMON Events form appears. Figure 57: RMON Events Form 1. Index Box 2. Type List 3. Community Box 4. Last Time Sent Box 5.
  • Page 101: Deleting An Rmon Event

    RUGGEDCOM RSG2488 Chapter 3 User Guide Device Management Parameter Description Description Synopsis: Any 127 characters A comment describing this event. Owner Synopsis: Any 127 characters Default: Monitor The owner of this event record. It is suggested to start this string withword 'monitor'.
  • Page 102: Upgrading/Downgrading Firmware

    Upgrading Firmware Upgrading ROS firmware, including the main, bootloader and FPGA firmware, may be necessary to take advantage of new features or bug fixes. Binary firmware images are available from RuggedCom. Visit www.RuggedCom.com to see which versions/updates are available or contact RuggedCom support.
  • Page 103: Resetting The Device

    RUGGEDCOM RSG2488 Chapter 3 User Guide Device Management IMPORTANT! Non-Controlled (NC) versions of ROS can not be downgraded to Controlled firmware versions. However, Controlled firmware versions can be downgraded to an NC firmware version. CAUTION! Do not downgrade the ROS boot version.
  • Page 104 Chapter 3 RUGGEDCOM RSG2488 Device Management User Guide Figure 60: Reset Device Form 1. Confirm Button Click Confirm. Resetting the Device...
  • Page 105: System Administration

    RUGGEDCOM RSG2488 Chapter 4 User Guide System Administration System Administration This chapter describes how to perform various administrative tasks related to device identification, user permissions, alarm configuration, certificates and keys, and more. It describes the following tasks: • Section 4.1, “Configuring the System Information”...
  • Page 106: Customizing The Login Screen (Web Interface Only)

    Chapter 4 RUGGEDCOM RSG2488 System Administration User Guide Parameter Description Default: Location The location can be used to indicate the physical location of the switch. It is displayed in the login screen as another means to ensure you are dealing with the desired switch.
  • Page 107 RUGGEDCOM RSG2488 Chapter 4 User Guide System Administration Default passwords are configured for each user type initially. It is strongly recommended that these be changed before the device is commissioned. NOTE Users can also be verified through a RADIUS or TACACS+ server. When enabled for authentication and authorization, the RADIUS or TACACS+ server will be used in the absence of any local settings.
  • Page 108 Chapter 4 RUGGEDCOM RSG2488 System Administration User Guide An alarm will generate if a weak password is configured. The weak password alarm can be disabled by the user. For more information about disabling alarms, refer to Section 4.4, “Managing Alarms”.
  • Page 109: Managing Alarms

    RUGGEDCOM RSG2488 Chapter 4 User Guide System Administration Parameter Description Related username is in field Admin Username; full read/write access to all settings and commands. Confirm Admin Password Synopsis: 15 character ASCII string Related username is in field Admin Username; full read/write access to all settings and commands.
  • Page 110: Viewing And Clearing Latched Alarms

    Chapter 4 RUGGEDCOM RSG2488 System Administration User Guide Figure 63: Alarms Table NOTE This same list is accessible through the Command Line Interface (CLI) using the alarms. For more information, refer to Section 2.6.1, “Available CLI Commands”. For information about modifying a pre-configured alarm, refer toSection 4.4.3, “Configuring an...
  • Page 111: Configuring An Alarm

    RUGGEDCOM RSG2488 Chapter 4 User Guide System Administration To clear the passive alarms from the list, do the following: Navigate to Diagnostics and click Clear Latched Alarms. The Clear Latched Alarms screen appears. Figure 65: Clear Latched Alarms Screen 1. Confirm Button Press Confirm.
  • Page 112 Chapter 4 RUGGEDCOM RSG2488 System Administration User Guide Figure 66: Alarms Table Select an alarm. The Alarms form appears. Figure 67: Alarms Form 1. Name Box 2. Level Box 3. Latch Box 4. Trap Box 5. Log Box 6. LED & Relay Box 7.
  • Page 113: Authentication Related Security Alarms

    RUGGEDCOM RSG2488 Chapter 4 User Guide System Administration Parameter Description Name Synopsis: Any 34 characters Default: sys_alarm The alarm name, as obtained through the alarms CLI command. Level Synopsis: { EMRG, ALRT, CRIT, ERRO, WARN, NOTE, INFO, DEBG } Severity level of the alarm: •...
  • Page 114: Security Alarms For Login Authentication

    Chapter 4 RUGGEDCOM RSG2488 System Administration User Guide Section 4.4.4.1 Security Alarms for Login Authentication ROS provides various logging options related to login authentication. A user can log into a ROS device in three different ways: Console, SSH or Telnet. ROS can log messages in the syslog, send a trap to notify an SNMP manager, and/or raise an alarm when a successful and unsuccessful login event occurs.
  • Page 115 RUGGEDCOM RSG2488 Chapter 4 User Guide System Administration Login attempts are logged regardless of how the user accesses the device (i.e. SSH, Web, Console, Telnet or RSH). However, when a user logs out, a message is only logged when the user is accessing the device through SSH, Telnet or Console.
  • Page 116: Managing The Configuration File

    When sharing a configuration file between devices, make sure both devices have the same passphrase configured. Otherwise, the configuration file will be rejected. NOTE Encryption must be disabled before the device is returned to RuggedCom or the configuration file is shared with Customer Support. IMPORTANT! Never downgrade the ROS software version beyond ROS v4.0 when encryption is enabled.
  • Page 117: Updating The Configuration File

    RUGGEDCOM RSG2488 Chapter 4 User Guide System Administration Figure 68: Data Storage Form 1. Encryption Options 2. Passphrase Box 3. Confirm Passphrase Box 4. Apply Button 5. Reload Button Configure the following parameter(s) as required: Parameter Description Synopsis: { On, Off } Encryption Enable/disable encryption of data in configuration file.
  • Page 118: Managing An Authentication Server

    Chapter 4 RUGGEDCOM RSG2488 System Administration User Guide ethPortCfg Port,Name,Media,State,AutoN,Speed,Dupx,FlowCtrl,LFI,Alarm, 1,Port 1,100TX,Enabled,On,Auto,Auto,Off,Off,On, Section 4.6 Managing an Authentication Server The following sections describe how to setup and configure an authentication server: • Section 4.6.1, “Managing RADIUS Authentication” • Section 4.6.2, “Managing TACACS+ Authentication”...
  • Page 119: Configuring The Radius Server

    RUGGEDCOM RSG2488 Chapter 4 User Guide System Administration Section 4.6.1.1 Configuring the RADIUS Server The Vendor-Specific attribute (or VSA) sent to the RADIUS server as part of the RADIUS request is used to determine the access level from the RADIUS server. This attribute may be configured within the RADIUS server...
  • Page 120: Managing Tacacs+ Authentication

    Chapter 4 RUGGEDCOM RSG2488 System Administration User Guide Configure the following parameter(s) as required: Parameter Description Server Synopsis: Any 8 characters Default: Primary This field tells whether this configuration is for a Primary or a Backup Server. IP Address Synopsis: ###.###.###.### where ### ranges from 0 to 255 The Server IP Address.
  • Page 121 RUGGEDCOM RSG2488 Chapter 4 User Guide System Administration Figure 71: TACACS Plus Server Table Select either Primary or Backup from the table and press Enter. The TACACS Plus Server form appears. Figure 72: TACACS Plus Server Form 1. Server Box 2.
  • Page 122: Configuring User Priviliges

    Chapter 4 RUGGEDCOM RSG2488 System Administration User Guide Section 4.6.2.2 Configuring User Priviliges Each TACACS+ authentication request includes a priv_lvl attribute that is used to grant access to the device. By default, the attribute uses the following ranges: • 15 represents the admin access level •...
  • Page 123: Setup And Configuration

    RUGGEDCOM RSG2488 Chapter 5 User Guide Setup and Configuration Setup and Configuration This chapter describes how to setup and configure the device for use on a network using the various features available in ROS. It describes the following tasks: •...
  • Page 124: Vlan Concepts

    Chapter 5 RUGGEDCOM RSG2488 Setup and Configuration User Guide Section 5.1.1 VLAN Concepts The following sections describe some of the concepts important to the implementation of VLANs in ROS: • Section 5.1.1.1, “Tagged vs. Untagged Frames” • Section 5.1.1.2, “Native VLAN”...
  • Page 125: Ingress And Egress Rules

    RUGGEDCOM RSG2488 Chapter 5 User Guide Setup and Configuration Trunk ports are part of the network and carry traffic for all VLANs between switches. Trunk ports are automatically members of all VLANs configured in the switch. The switch can 'pass through' traffic, forwarding frames received on one trunk port out of another trunk port. The trunk ports must be members of all VLANs that the 'pass through' traffic is part of, even if none of those VLANs are used on edge ports.
  • Page 126: Forbidden Ports List

    Chapter 5 RUGGEDCOM RSG2488 Setup and Configuration User Guide Section 5.1.1.6 Forbidden Ports List Each VLAN can be configured to exclude ports from membership in the VLAN using the forbidden ports list. For more information, refer to Section 5.1.4.2, “Adding a Static VLAN”.
  • Page 127: Viewing A List Of Vlans

    RUGGEDCOM RSG2488 Chapter 5 User Guide Setup and Configuration Administrative Convenience VLANs enable equipement moves to be handled by software reconfiguration instead of by physical cable management. When a host's physical location is changed, its connection point is often changed as well. With VLANs, the host's VLAN membership and priority are simply copied to the new port.
  • Page 128: Configuring Vlans For Ethernet Ports

    Chapter 5 RUGGEDCOM RSG2488 Setup and Configuration User Guide Figure 76: VLAN Summary Table If a VLANs are not listed, add static VLANs as needed. For more information, refer to Section 5.1.4.2, “Adding a Static VLAN”. Section 5.1.3 Configuring VLANs for Ethernet Ports When a VLAN ID is assigned to an Ethernet port, the VLAN appears in the VLAN Summary table where it can be further configured.
  • Page 129: Managing Static Vlans

    RUGGEDCOM RSG2488 Chapter 5 User Guide Setup and Configuration Parameter Description Port(s) Synopsis: Any combination of numbers valid for this parameter The port number as seen on the front plate silkscreen of the switch. Type Synopsis: { Edge, Trunk, } This parameter specifies how the port determines its membership in VLANs.
  • Page 130: Adding A Static Vlan

    Chapter 5 RUGGEDCOM RSG2488 Setup and Configuration User Guide Figure 79: Static VLANs Table If a static VLAN is not listed, add the VLAN. For more information, refer to Section 5.1.4.2, “Adding a Static VLAN”. Section 5.1.4.2 Adding a Static VLAN To add a static VLAN, do the following: Navigate to Virtual LANs >...
  • Page 131: Deleting A Static Vlan

    RUGGEDCOM RSG2488 Chapter 5 User Guide Setup and Configuration Configure the following parameter(s) as required: NOTE If IGMP Options is not enabled for the VLAN, both IGMP messages and multicast streams will be forwarded directly to all members of the VLAN. If any one member of the VLAN joins a multicast group, then all members of the VLAN will receive the multicast traffic.
  • Page 132: Managing Spanning Tree Protocol

    Chapter 5 RUGGEDCOM RSG2488 Setup and Configuration User Guide Figure 83: Static VLANs Form 1. VID Box 2. VLAN Name Box 3. Forbidden Ports Box 4. MSTI Box 5. Apply Button 6. Delete Button 7. Reload Button Click Delete. Section 5.2...
  • Page 133: Rstp States And Roles

    RUGGEDCOM RSG2488 Chapter 5 User Guide Setup and Configuration propagation of topology information throughout the network. RSTP also offers a number of other significant innovations, including: • Topology changes in RSTP can originate from and be acted upon by any designated bridges, leading to more rapid propagation of address information, unlike topology changes in STP, which must be passed to the root bridge before they can be propagated to the network.
  • Page 134 Chapter 5 RUGGEDCOM RSG2488 Setup and Configuration User Guide The learning state is entered when the port is preparing to play an active part in the network. The port learns addresses in this state but does not participate in frame transfer. In a network of RSTP bridges, the time spent in this state is usually quite short.
  • Page 135: Edge Ports

    RUGGEDCOM RSG2488 Chapter 5 User Guide Setup and Configuration A port is a Backup Port when it receives a better message from the LAN segment it is connected to, originating from another port on the same bridge. The port is a backup for another port on the bridge and will become active if that port fails.
  • Page 136: Bridge Diameter

    There is a relationship between the bridge diameter and the maximum age parameter. To achieve extended ring sizes, RuggedCom eRSTP™ uses an age increment of ¼ of a second. The value of the maximum bridge diameter is thus four times the configured maximum age parameter.
  • Page 137: Erstp

    RSTP for interoperability with commercial switches. For example, in a network comprised of 15 RuggedCom hardened Ethernet switch in a ring topology, the expected fault recovery time would be less than 75 ms (i.e. 5 ms x 15). However, with eRSTP, the worst case fault recovery time is less than 26 ms.
  • Page 138: Rstp Applications

    Chapter 5 RUGGEDCOM RSG2488 Setup and Configuration User Guide Section 5.2.2 RSTP Applications The following sections describe various applications of RSTP: • Section 5.2.2.1, “RSTP in Structured Wiring Configurations” • Section 5.2.2.2, “RSTP in Ring Backbone Configurations” • Section 5.2.2.3, “RSTP Port Redundancy”...
  • Page 139: Rstp In Ring Backbone Configurations

    Enable RSTP Fast Root Failover option. This is a proprietary feature of RuggedCom. In a mesh network with only RuggedCom devices in the core of the network, it is recommended to enable the RSTP Fast Root Failover option to minimize the network downtime in the event of a Root bridge failure.
  • Page 140 Chapter 5 RUGGEDCOM RSG2488 Setup and Configuration User Guide Figure 86: Example - Ring Backbone Configuration To design a ring backbone configuration with RSTP, do the following: Select the design parameters for the network. What are the requirements for robustness and network fail-over/recovery times? Typically, ring backbones are chosen to provide cost effective but robust network designs.
  • Page 141: Rstp Port Redundancy

    Disable RSTP Fast Root Failover option. This is a proprietary feature of RuggedCom. In ROS, the RSTP Fast Root Failover option is enabled by default. It is recommended to disable this feature when operating in a Ring network.
  • Page 142: Mstp Regions And Interoperability

    Chapter 5 RUGGEDCOM RSG2488 Setup and Configuration User Guide By design, MSTP processing time is proportional to the number of active STP instances. This means that MSTP will likely be significantly slower than RSTP. Therefore, for mission critical applications, RSTP should be considered a better network redundancy solution than MSTP.
  • Page 143: Mstp Bridge And Port Roles

    RUGGEDCOM RSG2488 Chapter 5 User Guide Setup and Configuration The CST (Common Spanning Tree) spans the entire bridged network, including MST regions and any connected STP or RSTP bridges. An MST region is seen by the CST as an individual bridge, with a single cost associated with its traversal.
  • Page 144: Benefits Of Mstp

    Chapter 5 RUGGEDCOM RSG2488 Setup and Configuration User Guide Role Description The Master Port, which is unique in an MSTP region, is the CIST Root Port of the CIST Regional Root, and provides the minimum cost path to the CIST Root for all MSTIs.
  • Page 145: Implementing Mstp On A Bridged Network

    RUGGEDCOM RSG2488 Chapter 5 User Guide Setup and Configuration Compatibility with STP and RSTP No special configuration is required for the bridges of an MST region to connect fully and simply to non-MST bridges on the same bridged network. Careful planning and configuration is, however, recommended in order to arrive at an optimal network.
  • Page 146 Chapter 5 RUGGEDCOM RSG2488 Setup and Configuration User Guide Figure 88: Bridge RSTP Parameters Form 1. State Options 2. Version Support List 3. Bridge Priority List 4. Hello Time Box 5. Max Age Time Box 6. Transmit Count 7. Forward Delay Box 8.
  • Page 147: Configuring Stp For Ethernet Ports

    RUGGEDCOM RSG2488 Chapter 5 User Guide Setup and Configuration Parameter Description Maximum number of BPDUs on each port that may be sent in one second. Larger values allow the network to recover from failed links/bridges more quickly. Forward Delay Synopsis: 4 to 30 s...
  • Page 148 Chapter 5 RUGGEDCOM RSG2488 Setup and Configuration User Guide Figure 90: Port RSTP Parameters Form 1. Port(s) Box 2. Enabled Options 3. Priority List 4. STP Cost Box 5. RSTP Cost Box 6. Edge Port List 7. Point to Point List 8.
  • Page 149: Configuring Erstp

    RUGGEDCOM RSG2488 Chapter 5 User Guide Setup and Configuration Parameter Description field set to "auto" to use the standard RSTP port costs as negotiated (20,000 for 1Gbps, 200,000 for 100 Mbps links and 2,000,000 for 10 Mbps links). For MSTP, this parameter applies to both external and internal path cost.
  • Page 150 (and may be relatively long) for any given mesh topology. This configuration parameter enables RuggedCom's enhancement to RSTP which detects a failure of the root switch and performs some extra RSTP processing steps, significantly reducing the network recovery time and making it deterministic.
  • Page 151: Viewing Global Statistics For Stp

    RUGGEDCOM RSG2488 Chapter 5 User Guide Setup and Configuration Parameter Description • In a single ring topology, this feature is not needed and should be disabled to avoid longer network recovery times due to extra RSTP processing. The Fast Root Failover algorithm must be supported by all switches in the network, including the root, to guarantee optimal performance.
  • Page 152 Chapter 5 RUGGEDCOM RSG2488 Setup and Configuration User Guide Figure 92: Bridge RSTP Statistics Form 1. Bridge Status 2. Bridge ID 3. Root ID 4. Root Port 5. Root Path Cost 6. Configured Hello Time 7. Learned Hello Time 8. Configured Forward Delay 9.
  • Page 153: Viewing Stp Statistics For Ethernet Ports

    RUGGEDCOM RSG2488 Chapter 5 User Guide Setup and Configuration Parameter Description Learned Hello Time Synopsis: 0 to 65535 The actual Hello time provided by the root bridge as learned in configuration messages. This time is used in designated bridges. Configured Forward Delay Synopsis: 0 to 65535 The configured Forward Delay time from the Bridge RSTP Parameters menu.
  • Page 154 Chapter 5 RUGGEDCOM RSG2488 Setup and Configuration User Guide Figure 93: Port RSTP Statistics Form 1. Port(s) 2. Status 3. Role 4. Cost 5. RX RSTs 6. TX RSTs 7. RX Configs 8. TX Configs 9. RX Tcns 10. TX Tcns 11.
  • Page 155: Managing Multiple Spanning Tree Instances

    RUGGEDCOM RSG2488 Chapter 5 User Guide Setup and Configuration Parameter Description Cost offered by this port. If the Bridge RSTP Parameters Cost Style is set to STP, 1Gbps ports will contribute 4, 100 Mbps ports will contribute 19 and 10 Mbps ports contribute a cost of 100.
  • Page 156 Chapter 5 RUGGEDCOM RSG2488 Setup and Configuration User Guide Figure 94: Bridge MSTI Statistics Form 1. Instance Box 2. Get Button This table displays the following information: Parameter Description Bridge Status Synopsis: { , Designated Bridge, Not Designated For Any LAN, Root Bridge } Spanning Tree status of the bridge.
  • Page 157: Viewing Statistics For Port Mstis

    RUGGEDCOM RSG2488 Chapter 5 User Guide Setup and Configuration Section 5.2.9.2 Viewing Statistics for Port MSTIs To view statistics for port MSTIs, navigate to Spanning Tree > View Port MSTI Statistics. The Port MSTI Statistics form appears. Figure 95: Port MSTI Statistics Form 1.
  • Page 158: Configuring The Mst Region Identifier

    Chapter 5 RUGGEDCOM RSG2488 Setup and Configuration User Guide Parameter Description even if the Cost style is set to RSTP, a port that migrates to STP will have its cost limited to a maximum of 65535. Desig Bridge ID Synopsis: $$ / ##-##-##-##-##-## where $$ is 0 to 65535, ## is 0 to FF Provided on the root ports of designated bridges, the Bridge Identifier of the bridge this port is connected to.
  • Page 159: Configuring A Global Msti

    RUGGEDCOM RSG2488 Chapter 5 User Guide Setup and Configuration Click Apply. Section 5.2.9.4 Configuring a Global MSTI To configure a global Multiple Spanning Tree Instance (MSTI) for the Spanning Tree Protocol (STP), do the following: Navigate to Spanning Tree > Configure Bridge MSTI Parameters. The Bridge MSTI Parameters form appears.
  • Page 160 Chapter 5 RUGGEDCOM RSG2488 Setup and Configuration User Guide Figure 98: Port MSTI Parameters Table Select an Ethernet port. The Port MSTI Parameters form appears. Figure 99: Port MSTI Parameters Form 1. Instance ID Box 2. Get Button 3. Port(s) Box 4.
  • Page 161: Clearing Spanning Tree Protocol Statistics

    RUGGEDCOM RSG2488 Chapter 5 User Guide Setup and Configuration Parameter Description set to "auto" to use the standard STP port costs as negotiated (4 for 1Gbps, 19 for 100 Mbps links and 100 for 10 Mbps links). For MSTP, this parameter applies to both external and internal path cost.
  • Page 162: Configuring Classes Of Service Globally

    Chapter 5 RUGGEDCOM RSG2488 Setup and Configuration User Guide 1. Inspection Phase In the inspection phase, the CoS priority of a received frame is determined from: • A specific CoS based upon the source and destination MAC address (as set in the Static MAC Address Table) •...
  • Page 163: Configuring Classes Of Service For Specific Ethernet Ports

    RUGGEDCOM RSG2488 Chapter 5 User Guide Setup and Configuration Figure 101: Global CoS Parameters Form 1. CoS Weighting Options 2. Apply Button 3. Reload Button Configure the following parameter(s) as required: Parameter Description CoS Weighting Synopsis: { 8:4:2:1, Strict }...
  • Page 164: Configuring Priority To Cos Mapping

    Chapter 5 RUGGEDCOM RSG2488 Setup and Configuration User Guide Figure 103: Port CoS Parameters Form 1. Port(s) Box 2. Default Priority Box 3. Inspect TOS Options 4. Alarm Button 5. Reload Button Configure the following parameter(s) as required: Parameter Description...
  • Page 165: Configuring Dscp To Cos Mapping

    RUGGEDCOM RSG2488 Chapter 5 User Guide Setup and Configuration Figure 104: Priority to CoS Mapping Table Select a priority level. The Priority to CoS Mapping form appears. Figure 105: Priority to CoS Mapping Form 1. Priority Box 2. CoS List 3.
  • Page 166 Chapter 5 RUGGEDCOM RSG2488 Setup and Configuration User Guide Figure 106: DSCP to CoS Mapping Table Select a dscp level. The DSCP to CoS Mapping form appears. Figure 107: DSCP to CoS Mapping Form 1. DSCP Box 2. CoS List 3.
  • Page 167: Managing Mac Addresses

    RUGGEDCOM RSG2488 Chapter 5 User Guide Setup and Configuration Parameter Description Class of Service assigned to received frames with the specified DSCP. Click Apply. Section 5.4 Managing MAC Addresses The following sections describe how to configure and manage MAC addresses: •...
  • Page 168: Managing Static Mac Addresses

    Chapter 5 RUGGEDCOM RSG2488 Setup and Configuration User Guide Navigate to MAC Address Tables > Configure MAC Address Learning Options. The MAC Address Learning Options form appears. Figure 109: MAC Address Learning Options Form 1. Aging Time Box 2. Age Upon Link Loss Options 3.
  • Page 169: Viewing A List Of Static Mac Addresses

    RUGGEDCOM RSG2488 Chapter 5 User Guide Setup and Configuration Section 5.4.3.1 Viewing a List of Static MAC Addresses To view a list of static MAC addresses configured on the device, navigate to MAC Address Tables > Configure Static MAC Addresses. The Static MAC Addresses table appears.
  • Page 170: Deleting A Static Mac Address

    Chapter 5 RUGGEDCOM RSG2488 Setup and Configuration User Guide Figure 112: Static MAC Addresses Form 1. MAC Address Box 2. VID Box 3. Port 4. Apply Button 5. Delete Button 6. Reload Button Configure the following parameter(s) as required: Parameter...
  • Page 171: Purging All Dynamic Mac Addresses

    RUGGEDCOM RSG2488 Chapter 5 User Guide Setup and Configuration Figure 113: Static MAC Addresses Table Select the MAC address from the table. The Static MAC Addresses form appears. Figure 114: Static MAC Addresses Form 1. MAC Address Box 2. VID Box 3.
  • Page 172: Managing The System Time

    Chapter 5 RUGGEDCOM RSG2488 Setup and Configuration User Guide Section 5.5 Managing the System Time The System Time Manager offers the following time-keeping and time synchronization features: • Local hardware time keeping and time zone management • SNTP time synchronization In addition to acting as a local clock, the System Time Manager can also configure the device to bean NTP server.
  • Page 173: Configuring The Ntp Server

    RUGGEDCOM RSG2488 Chapter 5 User Guide Setup and Configuration Parameter Description UTC-3:00 (Brasilia, Buenos Aires), UTC-2:00 (Mid Atlantic), UTC-1:00 (Azores), UTC-0:00 (Lisbon, London), UTC+1:00 (Berlin, Paris, Rome), UTC+2:00 (Athens, Cairo, Helsinki), ... } Default: UTC-5:00 (New York, Toronto) This setting allows for the conversion of UTC (Universal Coordinated Time) to local time.
  • Page 174: Managing Snmp

    Chapter 5 RUGGEDCOM RSG2488 Setup and Configuration User Guide Figure 118: NTP Server Form 1. Server Box 2. IP Address Box 3. Update Period Box 4. Apply Button 5. Reload Button Configure the following parameter(s) as required: Parameter Description Server...
  • Page 175: Managing Snmp Users

    RUGGEDCOM RSG2488 Chapter 5 User Guide Setup and Configuration • A group defines the access policy for a set of users • An access policy defines what SNMP objects can be accessed for (i.e. reading, writing and creating notifications) • A group determines the list of notifications its users can receive •...
  • Page 176: Adding An Snmp User

    Chapter 5 RUGGEDCOM RSG2488 Setup and Configuration User Guide Section 5.6.1.2 Adding an SNMP User Multiple users (up to a maximum of 32) can be configured for the local SNMPv3 engine, as well as SNMPv1 and SNMPv2c communities. NOTE When employing the SNMPv1 or SNMPv2c security level, the User Name parameter maps the community name with the security group and access level.
  • Page 177 RUGGEDCOM RSG2488 Chapter 5 User Guide Setup and Configuration NOTE ROS requires that all user passwords meet strict guidelines to prevent the use of weak passwords. When creating a new password, make sure it adheres to the following rules: • Must not be less than 6 characters in length.
  • Page 178: Deleting An Snmp User

    Chapter 5 RUGGEDCOM RSG2488 Setup and Configuration User Guide Parameter Description Confirm Priv Key Synopsis: 31 character ASCII string The secret encription key (password) that must be shared with SNMP client. If the key is not an emtpy string, it must be at least 6 characters long.
  • Page 179: Managing Security-To-Group Mapping

    RUGGEDCOM RSG2488 Chapter 5 User Guide Setup and Configuration Section 5.6.2 Managing Security-to-Group Mapping The following sections describe how to configure and manage security-to-group maps, refer to the following: • Section 5.6.2.1, “Viewing a List of Security-to-Group Maps” • Section 5.6.2.2, “Adding a Security-to-Group Map”...
  • Page 180: Deleting An Snmp Security Model

    Chapter 5 RUGGEDCOM RSG2488 Setup and Configuration User Guide Click InsertRecord. The SNMP Security to Group Maps form appears. Figure 126: SNMP Security to Group Maps Form 1. Security Model Box 2. Name Box 3. Group Box 4. Apply Button 5.
  • Page 181: Managing Snmp Groups

    RUGGEDCOM RSG2488 Chapter 5 User Guide Setup and Configuration Figure 128: SNMP Security to Group Maps Form 1. Security Model Box 2. Name Box 3. Group Box 4. Apply Button 5. Delete Button 6. Reload Button Click Delete. Section 5.6.3 Managing SNMP Groups Multiple SNMP groups (up to a maximum of 32) can be configured to have access to SNMP.
  • Page 182: Adding An Snmp Group

    Chapter 5 RUGGEDCOM RSG2488 Setup and Configuration User Guide Section 5.6.3.2 Adding an SNMP Group To add an SNMP group, do the following: Navigate to Administration > Configure SNMP > Configure SNMP Access. The SNMP Access table appears. Figure 130: SNMP Access Table 1.
  • Page 183: Deleting An Snmp Group

    RUGGEDCOM RSG2488 Chapter 5 User Guide Setup and Configuration Parameter Description The minimum level of security reqwuired in order to gain the access rights allowed by this entry. A security level of noAuthNoPriv is less than authNoPriv, which is less than authPriv.
  • Page 184: Managing Network Discovery

    Chapter 5 RUGGEDCOM RSG2488 Setup and Configuration User Guide Figure 133: SNMP Access Form 1. Group Box 2. Security Model Box 3. Security Level Box 4. ReadViewName Box 5. WriteViewName Box 6. NotifyViewName Box 7. Apply Button 8. Delete Button 9.
  • Page 185: Configuring Lldp Globally

    RUGGEDCOM RSG2488 Chapter 5 User Guide Setup and Configuration • Section 5.7.2, “Configuring LLDP for an Ethernet Port” • Section 5.7.3, “Viewing Global Statistics and Advertised System Information” • Section 5.7.4, “Viewing Statistics for LLDP Neighbors” • Section 5.7.5, “Viewing Statistics for LLDP Ports”...
  • Page 186: Configuring Lldp For An Ethernet Port

    Chapter 5 RUGGEDCOM RSG2488 Setup and Configuration User Guide Parameter Description Tx Delay Synopsis: 1 to 8192 s Default: 2 s The delay in seconds between successive LLDP frame transmissions initiated by value or status changed. The recommended value is set by the following formula: 1 <= txDelay <= (0.25 * Tx Interval)
  • Page 187: Viewing Global Statistics And Advertised System Information

    RUGGEDCOM RSG2488 Chapter 5 User Guide Setup and Configuration Parameter Description Enables LLDP protocol. Note that LLDP is enabled on a port when LLDP is enabled globally and along with enabling per port setting in Port LLDP Parameters menu. Port...
  • Page 188: Viewing Statistics For Lldp Neighbors

    Chapter 5 RUGGEDCOM RSG2488 Setup and Configuration User Guide Parameter Description Drops Synopsis: 0 to 4294967295 A number of times an entry was deleted from LLDP Neighbor Information Table because the information timeliness interval has expired. Ageouts Synopsis: 0 to 4294967295 A counter of all TLVs discarded.
  • Page 189: Viewing Statistics For Lldp Ports

    RUGGEDCOM RSG2488 Chapter 5 User Guide Setup and Configuration Section 5.7.5 Viewing Statistics for LLDP Ports To view statistics for LLDP ports, navigate to Network Discovery > Link Layer Discovery Protocol > View LLDP Statistics. The LLDP Statistics table appears.
  • Page 190 Chapter 5 RUGGEDCOM RSG2488 Setup and Configuration User Guide Viewing Statistics for LLDP Ports...
  • Page 191: Troubleshooting

    RUGGEDCOM RSG2488 Chapter 6 User Guide Troubleshooting Troubleshooting This chapter describes troubleshooting steps for common issues that may be encountered when using ROS or designing a network. It describes the following tasks: IMPORTANT! For further assistance, contact a Customer Service representative.
  • Page 192: Ethernet Ports

    Chapter 6 RUGGEDCOM RSG2488 Troubleshooting User Guide Problem Solution This problem will also occur if the gateway address is not configured and the switch tries to raise an SNMP trap to a host that is not on the local subnet.
  • Page 193 RUGGEDCOM RSG2488 Chapter 6 User Guide Troubleshooting Problem Solution promptly enter it back into service, beginning the cycle once again. The root port will flip back and forth between two ports on the switch. A computer or device is connected to a Is it possible that the RSTP edge setting for this port is set to false? If Edge is set to false, switch.
  • Page 194: Vlans

    Chapter 6 RUGGEDCOM RSG2488 Troubleshooting User Guide Section 6.4 VLANs The following describes common problems related to the VLANs. Problem Solution VLANs are not needed on the network. Can Yes. Simply leave all ports set to type edge and leave the native VLAN set to 1. This is the they be turned off? default configuration for the switch.

Table of Contents

Save PDF