Page 1
Rugged Operating System (ROS)® v4.0 User Guide RUGGEDCOM RSG2488 April 5, 2013 www.RuggedCom.com...
Page 2
RuggedCom has verified the contents of this manual against the hardware and/or software described. However, deviations between the product and the documentation may exist. RuggedCom shall not be liable for any errors or omissions contained herein or for consequential damages in connection with the furnishing, performance, or use of this material.
1.3 Available Services ........................7 1.4 SNMP Management Interface Base (MIB) Support ................. 8 1.4.1 Supported Standard MIBs ....................8 1.4.2 Supported Proprietary RuggedCom MIBs ................9 1.4.3 Supported Agent Capabilities ................... 10 1.5 SNMP Traps ..........................10 1.6 ModBus Management Support ....................12 1.6.1 ModBus Function Codes ....................
Page 4
Rugged Operating System (ROS)® RUGGEDCOM RSG2488 User Guide 1.7 Certificate and Key Requirements ....................21 1.8 Removable Memory ........................23 Chapter 2 Using ROS ......................2.1 Connecting to ROS ........................25 2.1.1 Connecting to ROS Through a Direct Connection .............. 25 2.1.2 Connecting to ROS Through the Network .................
Page 5
Rugged Operating System (ROS)® RUGGEDCOM RSG2488 User Guide 3.5.4 Uploading/Downloading Files Using an SFTP Server ............52 3.6 Managing Logs .......................... 53 3.6.1 Viewing Local Logs ......................53 3.6.2 Clearing Local Logs ......................54 3.6.3 Configuring the Local System Log ..................54 3.6.4 Managing Remote Logging ....................
Page 6
Rugged Operating System (ROS)® RUGGEDCOM RSG2488 User Guide 3.11.3 Managing RMON Events ....................87 3.11.3.1 Viewing a List of RMON Events ................87 3.11.3.2 Adding an RMON Event ..................87 3.11.3.3 Deleting an RMON Event ..................89 3.12 Upgrading/Downgrading Firmware ..................... 90 3.12.1 Upgrading Firmware ......................
Page 7
Rugged Operating System (ROS)® RUGGEDCOM RSG2488 User Guide 5.1.1.7 VLAN Advantages ....................114 5.1.2 Viewing a List of VLANs ....................115 5.1.3 Configuring VLANs for Ethernet Ports ................116 5.1.4 Managing Static VLANs ....................117 5.1.4.1 Viewing a List of Static VLANs ................117 5.1.4.2 Adding a Static VLAN ..................
Page 8
Rugged Operating System (ROS)® RUGGEDCOM RSG2488 User Guide 5.3.3 Configuring Priority to CoS Mapping ................152 5.3.4 Configuring DSCP to CoS Mapping ................153 5.4 Managing MAC Addresses ......................155 5.4.1 Viewing a List of MAC Addresses ................... 155 5.4.2 Configuring MAC Address Learning Options ..............155 5.4.3 Managing Static MAC Addresses ..................
User Guide Preface This guide describes the ROS v4.0 running on the RUGGEDCOM RSG2488 family of products. It contains instructions and guidelines on how to use the software, as well as some general theory. It is intended for use by network technical support personnel who are familiar with the operation of networks. It is also recommended for us by network and system planners, system programmers, and line technicians.
○ Google Chrome ○ Iceweasel/IceCat (Linux Only) • Must have a working Ethernet interface compatible with at least one of the port types on the RUGGEDCOM device • The ability to configure an IP address and netmask on the computer’s Ethernet interface...
RUGGEDCOM RSG2488 User Guide Customer Support Customer support is available 24 hours, 7 days a week for all RuggedCom customers. For technical support or general information, please contact Customer Support at: Toll Free (North America): 1 866 922 7975 International: +1 905 856 5288 E-Mail: Support@RuggedCom.com...
Page 12
Preface RUGGEDCOM RSG2488 User Guide Customer Support...
Section 1.8, “Removable Memory” Section 1.1 Overview Welcome to the ROS Software User Guide for the RSG2488. This Guide describes the wide array of carrier grade features made available by ROS (Rugged Operating System). These features include: Rugged Operating System (ROS) Features Cyber Security Features •...
Introduction User Guide Section 1.2 Security Recommendations and Considerations The following describes important security-related recommendations and suggestions that should be considered before implementing the RSG2488 on any network: • Section 1.2.1, “Security Recommendations” • Section 1.2.2, “Key Files” Section 1.2.1...
• Management of the configuration file, certificates and keys is the responsibility of the device owner. Before returning the device to RuggedCom for repair, make sure encryption is disabled (to create a cleartext version of the configuration file) and replace the current certificates and keys with temporary certificates and keys that can be destroyed upon the device's return.
Page 16
Chapter 1 RUGGEDCOM RSG2488 Introduction User Guide • RSA key pair, 512 to 2048 bits The RSA key pair used in the default certificate and in those generated by ROS uses a public key of 1024 bits in length. NOTE RSA keys smaller than 1024 bits in length are not recommended.
> ssl.crt For information on creating SSL certificates for use with ROS in a Microsoft Windows environment, refer to the following RuggedCom application note: Creating/Uploading SSH Keys and SSL Certificates to ROS Using Windows. The following is an example of a self-signed SSL certificate generated by ROS:...
Page 18
Chapter 1 RUGGEDCOM RSG2488 Introduction User Guide • PEM format • DSA key pair, 512 to 2048 bits in length The DSA key pair used in the default key pair and in those generated by ROS uses a public key of 1024 bits in length.
RUGGEDCOM RSG2488 Chapter 1 User Guide Introduction 50:06:b8:d3:f9:d4:9c:9c:75:84:5b:db:96:46:13: f0:32:f0:c5:cb:83:01:a8:ae:d1:5a:ac:68:fb:49: f9:b6:8b:d9:d6:0d:a7:de:ad:16:2b:23:ff:8e:f9: 3c:41:16:04:66:cf:e8:64:9e:e6:42:9a:d5:97:60: c2:e8:9e:f4:bc:8f:6f:e0 Section 1.3 Available Services The following table lists the services available under ROS. This table includes the following information: • Services The service supported by the device. • Port Number The port number associated with the service.
Open Closed (configurable) Section 1.4 SNMP Management Interface Base (MIB) Support ROS supports a variety of standard MIBs, proprietary RuggedCom MIBs and Agent Capabilties MIBs, all for SNMP (Simple Network Management Protocol). • Section 1.4.1, “Supported Standard MIBs” • Section 1.4.2, “Supported Proprietary RuggedCom MIBs”...
Q-BRIDGE-MIB Definitions of Managed Objects for Bridges with Traffic Classes, Multicast Filtering, and Virtual LAN Extensions Section 1.4.2 Supported Proprietary RuggedCom MIBs ROS supports the following proprietary RuggedCom MIBs: Table 2: Proprietary RuggedCom MIBs File Name MIB Name Description ruggedcom.mib...
Chapter 1 RUGGEDCOM RSG2488 Introduction User Guide Section 1.4.3 Supported Agent Capabilities ROS supports the following agent capabilities for the SNMP agent: NOTE For information about agent capabilities for SNMPv2, refer to RFC 2580 [http://tools.ietf.org/html/ rfc2580]. Table 3: Supported Agent Capabilities...
Page 23
Generic traps carry information about events in their severity and description objects. They are sent at the same time an alarm is generated for the device. The following are examples of RuggedCom generic traps: NOTE Information about generic traps can be retrieved using the CLI command alarms. For more information about the alarms command, refer to Section 2.6.1, “Available CLI...
RuggedCom devices support the following ModBus function codes for device management through ModBus: NOTE While RuggedCom devices have a variable number of ports, not all registers and bits apply to all products. Registers that are not applicable to a particular device return a zero (0) value. For example, registers referring to serial ports are not applicable to RuggedSwitch®...
RUGGEDCOM RSG2488 Chapter 1 User Guide Introduction Starting Address 2 Bytes 0x0000 to 0xFFFF Number of Input Registers 2 Bytes Bytes 0x0001 to 0x0079 Byte Count 1 Byte 2 x N Registers Value x 2 Bytes Value of the register...
Page 27
RUGGEDCOM RSG2488 Chapter 1 User Guide Introduction Address #Registers Description (Reference Table in UI) Format 0426 Port s5/p4 Statistics - Ethernet In Packets Uinst32 0428 Port s6/p1 Statistics - Ethernet In Packets Uinst32 042A Port s6/p2 Statistics - Ethernet In Packets...
Page 28
Chapter 1 RUGGEDCOM RSG2488 Introduction User Guide Address #Registers Description (Reference Table in UI) Format 0472 Port s7/p2 Statistics - Ethernet Out Packets Uinst32 0474 Port s8/p1 Statistics - Ethernet Out Packets Uinst32 0476 Port s8/p2 Statistics - Ethernet Out Packets...
Chapter 1 RUGGEDCOM RSG2488 Introduction User Guide • Section 1.6.3.6, “Alarm” • Section 1.6.3.7, “PSStatusCmd” • Section 1.6.3.8, “TruthValues” Section 1.6.3.1 Text The Text format provides a simple ASCII representation of the information related to the product. The most significant register byte of an ASCII characters comes first.
0x00 0x02 The response depends on how many parts are available on the device. For example, if the maximum number of ports on a connected RuggedCom device is 20, the response would be similar to the following: 0x04 0x04 0xF2...
Power Supply is functional (10 = 2) Power Supply is not functional (11 = 3) The values used for power supply status are derived from the RuggedCom-specific SNMP MIB. Reading the Power Supply Status from a Device Using PSStatusCmd To understand how to read the power supply status from a device using PSStatusCmd, consider a ModBus Request to read multiple registers from location 0x0043.
RUGGEDCOM RSG2488 Chapter 1 User Guide Introduction The response may look like: 0x04 0x02 0x00 0x01 The register's lower byte shows the FailSafe Relay status. In this example, the FailSafe Relay is energized. Reading the ErrorAlarm Status From a Device Using TruthValue To understand how to use the TruthValue format to read the ErrorAlarm status from a device, conside a ModBus request to read mulitple registers from location 0x0045.
Section 1.8 Removable Memory The RSG2488 features a user-accessible microSD memory slot that supports a standard ISO/IEC 9293- compatible FAT (File Allocation Table) or FAT 32 file system on a microSD or microSDHC Flash card up to a capacity of 4GB.
To establish a serial connection to the device, do the following: Connect a terminal or a computer running terminal emulation software to the RS232 serial console port on the device. For more information about the RS232 serial console port, refer to the RSG2488 Installation Guide.
Connect a terminal or a computer running terminal emulation software to the MGMT port on the device. For more information about the MGMT port, refer to the RSG2488 Installation Guide. Launch the SSH client on the terminal or computer and connect to admin@{ipaddress}, where {ipaddress} is the IP address for the MGMT port.
RUGGEDCOM RSG2488 Chapter 2 User Guide Using ROS For more information about logging in to the device, refer to Section 2.2, “Logging In”. For more information about the Web interface, refer to Section 2.4, “Using the Web Interface”. Using a Terminal or Terminal Emulation Software A terminal or computer running terminal emulation software provides secure access to the console interface for ROS through a Telnet, RSH (Remote Shell) or SSH (Secure Shell) service.
Chapter 2 RUGGEDCOM RSG2488 Using ROS User Guide Guest Operator Admin Username: guest Username: operator Username: admin Password: guest Password: operator Password: admin CAUTION! To prevent unauthorized access to the device, make sure to change the default guest, operator, and admin passwords before commissioning the device.
RUGGEDCOM RSG2488 Chapter 2 User Guide Using ROS Section 2.4 Using the Web Interface The Web interface is a Web-based Graphical User Interface (GUI) for displaying important information and controls in a Web browser. The interface is divided into three frames: the banner, the menu and the main frame.
Chapter 2 RUGGEDCOM RSG2488 Using ROS User Guide Figure 6: Elements of a Typical Screen 1. Title 2. Parameters and/or Data 3. Access Level or Alarm Notification 4. Controls Section 2.5 Using the Console Interface The Console interface is a Graphical User Interface (GUI) organized as a series of menus. It is primarily accessible through a serial console connection, but can also be accessed through IP services, such as a Telnet, RSH (Remote Shell), or SSH (Secure Shell) session.
RUGGEDCOM RSG2488 Chapter 2 User Guide Using ROS Figure 7: Console Interface (Example) 1. System Identification 2. Menus 3. Command Bar 4. Menu Name 5. Alarms Indicator NOTE They system identifier is user configurable. For more information about setting the system name, refer Section 4.1, “Configuring the System...
Chapter 2 RUGGEDCOM RSG2488 Using ROS User Guide NOTE Before exiting a screen, ROS will automatically prompt the user to save any changes that have not been committed. Ctrl + I Inserts a new record. Ctrl + S Opens the CLI interface.
Page 45
RUGGEDCOM RSG2488 Chapter 2 User Guide Using ROS Command Description CAUTION! Misuse of the factory commands may corrupt the operational state of device and/or may permanently damage the ability to recover the device without manufacturer intervention. flashfiles { info filename |...
Page 46
Chapter 2 RUGGEDCOM RSG2488 Using ROS User Guide Command Description route Displays the gateway configuration. sfp port { base | alarms | diag | Displays SFP (Small Form Factor Pluggable) device information and diagnostics. If Optional calibr | thr | all | no parameter...
RUGGEDCOM RSG2488 Chapter 2 User Guide Using ROS Command Description xmodem { send | receive } Opens an XModem session. filename Optional and/or required parameters include: • send sends the file to the client. • receive receives the file from the client.
Chapter 2 RUGGEDCOM RSG2488 Using ROS User Guide Section 2.6.2.1 Enabling a Trace Tracing can be enabled on a per subsystem basis. However, some subsystems can only trace events on certain ports. To enable a trace, do the following: Log in to the device as an admin user and access the CLI shell. For more information about accessing the CLI shell, refer to Section 2.6, “Using the Command Line...
Chapter 2 RUGGEDCOM RSG2488 Using ROS User Guide NOTE For a list of parameters available under the sql command, refer to Section 2.6.1, “Available CLI Commands”. The following sections describe in more detail how to use SQL commands: • Section 2.6.4.1, “Finding the Correct Table”...
Page 51
RUGGEDCOM RSG2488 Chapter 2 User Guide Using ROS IP Address Subnet IfIndex IfStats IfTime IfName 172.30.146.88 255.255.224.0 1001 17007888 2994 default 192.168.0.1 255.255.255.0 1002 17007672 3195 vlan1 2 records selected Retrieving Information About a Parameter from a Table Use the following command to retrieve information about a specific parameter from a table:...
Chapter 2 RUGGEDCOM RSG2488 Using ROS User Guide sql select from table where parameter = value [ { and | or } | parameter | = | value ...] Where: • table is the name of the table • parameter is the name of the parameter •...
RUGGEDCOM RSG2488 Chapter 2 User Guide Using ROS sql default into table Where: • table is the name of the table Section 2.6.4.5 Using RSH and SQL The combination of remote shell scripting and SQL commands offers a means to interrogate and maintain a large number of devices.
Chapter 2 RUGGEDCOM RSG2488 Using ROS User Guide Section 2.7.1 Viewing a List of Flash Files To view a list of files currently stored in Flash memory, do the following: Log in to the device as an admin user and access the CLI shell. For more information about accessing the CLI shell, refer to Section 2.6, “Using the Command Line...
Mechanical hazard — risk of damage to the device. Excessive use of BIST functions may cause increase wear on the device, which may void the warranty. Avoid using BIST functions unless instructed by a Siemens/RuggedCom representative. To access BIST mode, do the following: IMPORTANT! Do not connect the device to the network when it is in BIST mode.
Chapter 2 RUGGEDCOM RSG2488 Using ROS User Guide Disconnect the device from the network. Connect to ROS through the RS232 console connection and a terminal application. For more information, refer to Section 2.1.1, “Connecting to ROS Through a Direct Connection”.
Section 3.1 Viewing Product Information During troubleshooting or when ordering new devices, RuggedCom personnel may request specific information about the device, such as the model, order code or serial number. To view information about the device, navigate to Diagnostics > View Product Information. The Product Information form appears.
Main Version Synopsis: Any 47 characters Shows the version and build date of the main operating system software. Hardware ID Synopsis: { RSG2488 } Shows the type, part number, and revision level of the hardware. Section 3.2 Viewing CPU Diagnostics To view CPU diagnostic information useful for troubleshooting hardware and software performance, navigate to Diagnostics >...
Page 59
RUGGEDCOM RSG2488 Chapter 3 User Guide Device Management Figure 9: CPU Diagnostics Form 1. Running Time Box 2. CPU Usage Box 3. RAM Total Box 4. RAM Free Box 5. RAM Low Watermark Box 6. DMA RAM Free 7. DMA RAM Low Watermark Box 8.
Chapter 3 RUGGEDCOM RSG2488 Device Management User Guide Section 3.3 Viewing the Status of the Power Supplies To view the current status of the power supplies, navigate to Diagnostics > Power Supply Status. The Power Supply Status table appears. Figure 10: Power Supply Status Table...
RUGGEDCOM RSG2488 Chapter 3 User Guide Device Management • SNMP Users • SNMP Security to Group Maps • SNMP Access • Time Zone • DST Offset • DST Rule To restore factory defaults, do the following: Navigate to Diagnostics > Load Factory Defaults. The Load Factory Defaults form appears.
Chapter 3 RUGGEDCOM RSG2488 Device Management User Guide • main.bin – the main ROS application firmware image • boot.bin – the boot loader firmware image • fpga.xsvf – the FPGA firmware binary image • config.csv – the complete configuration database, in the form of a comma-delimited ASCII text file •...
RUGGEDCOM RSG2488 Chapter 3 User Guide Device Management , launch the XMODEM transfer from the host computer. The device will indicate when the transfer is complete. The following is an example from the CLI shell of a successful XMODEM file transfer: >xmodem receive main.bin...
Chapter 3 RUGGEDCOM RSG2488 Device Management User Guide Section 3.5.3 Uploading/Downloading Files Using a TFTP Server To updload or download a file using a TFTP server, do the following: IMPORTANT! TFTP does not define an authentication scheme. Any use of the TFTP client or server is considered highly insecure.
RUGGEDCOM RSG2488 Chapter 3 User Guide Device Management Connecting to ros_ip... admin@ros_ip's password: sftp> put ROS-CF52_Main_v3-7-0.bin main.bin Uploading ROS-CF52_Main_v3-7-0.bin to /main.bin ROS-CF52_Main_v3-7-0.bin 100% 2139KB 48.6KB/s 00:44 sftp> Section 3.6 Managing Logs The crash (crashlog.txt) and system (syslog.txt) log files contain historical information about events that have occurred during the operation of the device.
Chapter 3 RUGGEDCOM RSG2488 Device Management User Guide Section 3.6.2 Clearing Local Logs To clear both the local crash and system logs, log in to the CLI shell and type: clearlogs To clear only the local system log, log in to the Web interface and do the following: Navigate to Diagnostics >...
RUGGEDCOM RSG2488 Chapter 3 User Guide Device Management Parameter Description The severity of the message that has been generated. Note that the severity level selected is considered the minimum severity level for the system. For example, if ERROR is selected, the system sends any syslog messages generated by Error, Critical, Alert and Emergency.
Chapter 3 RUGGEDCOM RSG2488 Device Management User Guide Parameter Description The local UDP port through which the client sends information to the server(s). Click Apply. Section 3.6.4.2 Viewing a List of Remote Syslog Servers To view a list of known remote syslog servers, navigate to Administration > Configure Syslog > Configure Remote Syslog Server.
Chapter 3 RUGGEDCOM RSG2488 Device Management User Guide Figure 19: Remote Syslog Server Table Select the server from the table. The Remote Syslog Server form appears. Figure 20: Remote Syslog Server Form 1. IP Address Box 2. UDP Port Box 3.
IEEE 802.3 standard, which means that some links partners may not support it. RuggedCom offers an advanced Link-Fault-Indication (LFI) feature for the links that do not have a native link partner notification mechanism. With LFI enabled, the device bases the generation of a link integrity signal upon its reception of a link signal.
Chapter 3 RUGGEDCOM RSG2488 Device Management User Guide controller, it will stop generating a link signal. The controller will detect the link failure and failover to the backkup port. IMPORTANT! If both link partners have the LFI feature, it must not be enabled on both sides of the link. If it is enabled on both sides, the link will never be established, as each link partner will be waiting for the other to transmit a link signal.
RUGGEDCOM RSG2488 Chapter 3 User Guide Device Management Parameter Description The port number as seen on the front plate silkscreen of the switch. Synopsis: Any 15 characters Name A descriptive name that may be used to identify the device conected on that port.
Chapter 3 RUGGEDCOM RSG2488 Device Management User Guide Parameter Description The number of any type of erroneous packet. Section 3.7.4 Viewing Statistics for Specific Ethernet Ports To view statistics collected for specific Ethernet ports, navigate to Ethernet Stats > View Ethernet Port Statistics.
Page 75
RUGGEDCOM RSG2488 Chapter 3 User Guide Device Management Parameter Description The number of received good packets (Unicast+Multicast+Broadcast) and dropped packets. Synopsis: 0 to 18446744073709551615 OutPkts The number of transmitted good packets. TotalInOctets Synopsis: 0 to 18446744073709551615 The total number of octets of all received packets. This includes data octets of rejected and local packets which are not forwarded to the switching core for transmission.
Chapter 3 RUGGEDCOM RSG2488 Device Management User Guide Parameter Description The number of received and transmitted packets with size of 65 to 127 octets. This includes received and transmitted packets as well as dropped and local received packets. This does not include rejected received packets.
RUGGEDCOM RSG2488 Chapter 3 User Guide Device Management Figure 25: Clear Ethernet Port Statistics Form 1. Port Check Boxes 2. Confirm Button Select one or more Ethernet ports. Press Confirm. Section 3.7.6 Configuring an Ethernet Port To configure an Ethernet port, do the following: Navigate to Ethernet Ports >...
Page 78
Chapter 3 RUGGEDCOM RSG2488 Device Management User Guide Figure 27: Port Parameters Form 1. Port Box 2. Name Box 3. Media Box 4. State Box 5. AutoN Box 6. Speed Box 7. Dupx Box 8. FlowCtrl Box 9. LFI 10. Alarm Box 11.
RUGGEDCOM RSG2488 Chapter 3 User Guide Device Management Parameter Description Speed (in Megabit-per-second or Gigabit-per-second). If auto-negotiation is enabled, this is the speed capability advertised by the auto-negotiation process. If auto- negotiation is disabled, the port is explicitly forced to this speed mode.
Page 80
Chapter 3 RUGGEDCOM RSG2488 Device Management User Guide NOTE Invalid frames received on the source port will not be mirrored. These include CRC errors, oversize and undersize packets, fragments, jabbers, collisions, late collisions and dropped events. IMPORTANT! Before configuring port mirroring, note the following limitations: •...
RUGGEDCOM RSG2488 Chapter 3 User Guide Device Management Section 3.7.8 Configuring Link Detection To configure link detection, do the following: Navigate to Ethernet Ports > Configure Link Detection. The Link Detection form appears. Figure 29: Link Detection Form 1. Fast Link Detection Box 2.
Chapter 3 RUGGEDCOM RSG2488 Device Management User Guide Parameter Description • OFF - Turning this parameter OFF will disable FAST LINK DETECTION completely. The switch will need a longer time to detect a link failure. This will result in a longer network recovery time of up to 2s.
RUGGEDCOM RSG2488 Chapter 3 User Guide Device Management Only one subnet is assigned to be the management subnet and can be used by management applications, such as Web Server, SSH, etc. NOTE Subnets must be specifically defined for each interface. Subnets must not be a part of another subnet configured on the device.
Chapter 3 RUGGEDCOM RSG2488 Device Management User Guide Parameter Description Specifies the IP address of this device. An IP address is a 32-bit number that is notated by using four numbers from 0 through 255, separated by periods. Only a unicast IP address is allowed, which ranges from 1.0.0.0 to 233.255.255.255.
Page 85
RUGGEDCOM RSG2488 Chapter 3 User Guide Device Management Figure 34: Switch IP Interfaces Table 1. InsertRecord Click InsertRecord. The Switch IP Interfaces form appears. Figure 35: Switch IP Interfaces Form 1. IP Address Type Box 2. IP Address Box 3. Subnet Box 4.
Chapter 3 RUGGEDCOM RSG2488 Device Management User Guide Parameter Description Specifies the IP subnet mask of this device. An IP subnet mask is a 32-bit number that is notated by using four numbers from 0 through 255, separated by periods. Typically, subnet mask numbers use either 0 or 255 as values (e.g.
RUGGEDCOM RSG2488 Chapter 3 User Guide Device Management IMPORTANT! The default gateway can be configured for a switch IP interface (on the management VLAN) or the management IP interface. When configured for a switch IP interface, the configuration will not change when the settings are reset to the factory defaults.
RUGGEDCOM RSG2488 Chapter 3 User Guide Device Management Figure 41: IP Gateways Table Select the IP gateway from the table. The IP Gateways form appears. Figure 42: IP Gateways Form 1. Destination Box 2. Subnet Box 3. Gateway Box 4. Apply Button 5.
Page 90
Chapter 3 RUGGEDCOM RSG2488 Device Management User Guide Figure 43: IP Services Form 1. Inactivity Timeout Box 2. Telnet Sessions Allowed Box 3. Web Server Users Allowed Box 4. TFTP Server Box 5. Modbus Address Box 6. RSH Server Box...
RUGGEDCOM RSG2488 Chapter 3 User Guide Device Management Click Apply. Section 3.11 Managing Remote Monitoring Remote Monitoring (RMON) is used to collect and view historical statistics related to the performance and operation of Ethernet ports. It can also record a log entry and/or generate and SNMP trap when the rate of occurence of a specified event is exceeded.
Chapter 3 RUGGEDCOM RSG2488 Device Management User Guide Section 3.11.1.2 Adding an RMON History Control To add an RMON history control, do the following: Navigate to Ethernet Stats > Configure RMON History Controls. The RMON History Controls table appears. Figure 45: RMON History Controls Table 1.
RUGGEDCOM RSG2488 Chapter 3 User Guide Device Management Parameter Description The maximum number of buckets requested for this RMON collection history group of statistics. The range is 1 to 4000. The default is 50. Granted Buckets Synopsis: 0 to 65535 The number of buckets granted for this RMON collection history.
RUGGEDCOM RSG2488 Chapter 3 User Guide Device Management Figure 49: The Alarm Process There are two methods to evaluate a statistic in order to determine when to generate an event: delta and absolute. For most statistics, such as line errors, it is appropriate to generate an alarm when a rate is exceeded. The alarm defaults to the delta measurement method, which examines changes in a statistic at the end of each measurement period.
Chapter 3 RUGGEDCOM RSG2488 Device Management User Guide Section 3.11.2.2 Adding an RMON Alarm To add an RMON alarm, do the following: Navigate to Ethernet Stats > Configure RMON Alarms. The RMON Alarms table appears. Figure 51: RMON Alarms Table 1.
Page 97
RUGGEDCOM RSG2488 Chapter 3 User Guide Device Management Parameter Description The SNMP object identifier (OID) of the particular variable to be sampled. Only variables that resolve to an ASN.1 primitive type INTEGER (INTEGER, Integer32,Counter32, Counter64, Gauge, or TimeTicks) may be sampled. A list of objects can be printed using shell command 'rmon'.
Chapter 3 RUGGEDCOM RSG2488 Device Management User Guide Click Apply. Section 3.11.2.3 Deleting an RMON Alarm To delete an RMON alarm, do the following: Navigate to Ethernet Stats > Configure RMON Alarms. The RMON Alarms table appears. Figure 53: RMON Alarms Table Select the alarm from the table.
RUGGEDCOM RSG2488 Chapter 3 User Guide Device Management Section 3.11.3 Managing RMON Events Remote Monitoring (RMON) events define behavior profiles used in event logging. These profiles are used by RMON alarms to send traps and log events. Each alarm may specify that a log entry be created on its behalf whenever the event occurs. Each entry may also specify that a notification should occur by way of SNMP trap messages.
Page 100
Chapter 3 RUGGEDCOM RSG2488 Device Management User Guide Figure 56: RMON Events Table 1. InsertRecord Click InsertRecord. The RMON Events form appears. Figure 57: RMON Events Form 1. Index Box 2. Type List 3. Community Box 4. Last Time Sent Box 5.
RUGGEDCOM RSG2488 Chapter 3 User Guide Device Management Parameter Description Description Synopsis: Any 127 characters A comment describing this event. Owner Synopsis: Any 127 characters Default: Monitor The owner of this event record. It is suggested to start this string withword 'monitor'.
Upgrading Firmware Upgrading ROS firmware, including the main, bootloader and FPGA firmware, may be necessary to take advantage of new features or bug fixes. Binary firmware images are available from RuggedCom. Visit www.RuggedCom.com to see which versions/updates are available or contact RuggedCom support.
RUGGEDCOM RSG2488 Chapter 3 User Guide Device Management IMPORTANT! Non-Controlled (NC) versions of ROS can not be downgraded to Controlled firmware versions. However, Controlled firmware versions can be downgraded to an NC firmware version. CAUTION! Do not downgrade the ROS boot version.
Page 104
Chapter 3 RUGGEDCOM RSG2488 Device Management User Guide Figure 60: Reset Device Form 1. Confirm Button Click Confirm. Resetting the Device...
RUGGEDCOM RSG2488 Chapter 4 User Guide System Administration System Administration This chapter describes how to perform various administrative tasks related to device identification, user permissions, alarm configuration, certificates and keys, and more. It describes the following tasks: • Section 4.1, “Configuring the System Information”...
Chapter 4 RUGGEDCOM RSG2488 System Administration User Guide Parameter Description Default: Location The location can be used to indicate the physical location of the switch. It is displayed in the login screen as another means to ensure you are dealing with the desired switch.
Page 107
RUGGEDCOM RSG2488 Chapter 4 User Guide System Administration Default passwords are configured for each user type initially. It is strongly recommended that these be changed before the device is commissioned. NOTE Users can also be verified through a RADIUS or TACACS+ server. When enabled for authentication and authorization, the RADIUS or TACACS+ server will be used in the absence of any local settings.
Page 108
Chapter 4 RUGGEDCOM RSG2488 System Administration User Guide An alarm will generate if a weak password is configured. The weak password alarm can be disabled by the user. For more information about disabling alarms, refer to Section 4.4, “Managing Alarms”.
RUGGEDCOM RSG2488 Chapter 4 User Guide System Administration Parameter Description Related username is in field Admin Username; full read/write access to all settings and commands. Confirm Admin Password Synopsis: 15 character ASCII string Related username is in field Admin Username; full read/write access to all settings and commands.
Chapter 4 RUGGEDCOM RSG2488 System Administration User Guide Figure 63: Alarms Table NOTE This same list is accessible through the Command Line Interface (CLI) using the alarms. For more information, refer to Section 2.6.1, “Available CLI Commands”. For information about modifying a pre-configured alarm, refer toSection 4.4.3, “Configuring an...
RUGGEDCOM RSG2488 Chapter 4 User Guide System Administration To clear the passive alarms from the list, do the following: Navigate to Diagnostics and click Clear Latched Alarms. The Clear Latched Alarms screen appears. Figure 65: Clear Latched Alarms Screen 1. Confirm Button Press Confirm.
Page 112
Chapter 4 RUGGEDCOM RSG2488 System Administration User Guide Figure 66: Alarms Table Select an alarm. The Alarms form appears. Figure 67: Alarms Form 1. Name Box 2. Level Box 3. Latch Box 4. Trap Box 5. Log Box 6. LED & Relay Box 7.
RUGGEDCOM RSG2488 Chapter 4 User Guide System Administration Parameter Description Name Synopsis: Any 34 characters Default: sys_alarm The alarm name, as obtained through the alarms CLI command. Level Synopsis: { EMRG, ALRT, CRIT, ERRO, WARN, NOTE, INFO, DEBG } Severity level of the alarm: •...
Chapter 4 RUGGEDCOM RSG2488 System Administration User Guide Section 4.4.4.1 Security Alarms for Login Authentication ROS provides various logging options related to login authentication. A user can log into a ROS device in three different ways: Console, SSH or Telnet. ROS can log messages in the syslog, send a trap to notify an SNMP manager, and/or raise an alarm when a successful and unsuccessful login event occurs.
Page 115
RUGGEDCOM RSG2488 Chapter 4 User Guide System Administration Login attempts are logged regardless of how the user accesses the device (i.e. SSH, Web, Console, Telnet or RSH). However, when a user logs out, a message is only logged when the user is accessing the device through SSH, Telnet or Console.
When sharing a configuration file between devices, make sure both devices have the same passphrase configured. Otherwise, the configuration file will be rejected. NOTE Encryption must be disabled before the device is returned to RuggedCom or the configuration file is shared with Customer Support. IMPORTANT! Never downgrade the ROS software version beyond ROS v4.0 when encryption is enabled.
RUGGEDCOM RSG2488 Chapter 4 User Guide System Administration Figure 68: Data Storage Form 1. Encryption Options 2. Passphrase Box 3. Confirm Passphrase Box 4. Apply Button 5. Reload Button Configure the following parameter(s) as required: Parameter Description Synopsis: { On, Off } Encryption Enable/disable encryption of data in configuration file.
Chapter 4 RUGGEDCOM RSG2488 System Administration User Guide ethPortCfg Port,Name,Media,State,AutoN,Speed,Dupx,FlowCtrl,LFI,Alarm, 1,Port 1,100TX,Enabled,On,Auto,Auto,Off,Off,On, Section 4.6 Managing an Authentication Server The following sections describe how to setup and configure an authentication server: • Section 4.6.1, “Managing RADIUS Authentication” • Section 4.6.2, “Managing TACACS+ Authentication”...
RUGGEDCOM RSG2488 Chapter 4 User Guide System Administration Section 4.6.1.1 Configuring the RADIUS Server The Vendor-Specific attribute (or VSA) sent to the RADIUS server as part of the RADIUS request is used to determine the access level from the RADIUS server. This attribute may be configured within the RADIUS server...
Chapter 4 RUGGEDCOM RSG2488 System Administration User Guide Configure the following parameter(s) as required: Parameter Description Server Synopsis: Any 8 characters Default: Primary This field tells whether this configuration is for a Primary or a Backup Server. IP Address Synopsis: ###.###.###.### where ### ranges from 0 to 255 The Server IP Address.
Page 121
RUGGEDCOM RSG2488 Chapter 4 User Guide System Administration Figure 71: TACACS Plus Server Table Select either Primary or Backup from the table and press Enter. The TACACS Plus Server form appears. Figure 72: TACACS Plus Server Form 1. Server Box 2.
Chapter 4 RUGGEDCOM RSG2488 System Administration User Guide Section 4.6.2.2 Configuring User Priviliges Each TACACS+ authentication request includes a priv_lvl attribute that is used to grant access to the device. By default, the attribute uses the following ranges: • 15 represents the admin access level •...
RUGGEDCOM RSG2488 Chapter 5 User Guide Setup and Configuration Setup and Configuration This chapter describes how to setup and configure the device for use on a network using the various features available in ROS. It describes the following tasks: •...
Chapter 5 RUGGEDCOM RSG2488 Setup and Configuration User Guide Section 5.1.1 VLAN Concepts The following sections describe some of the concepts important to the implementation of VLANs in ROS: • Section 5.1.1.1, “Tagged vs. Untagged Frames” • Section 5.1.1.2, “Native VLAN”...
RUGGEDCOM RSG2488 Chapter 5 User Guide Setup and Configuration Trunk ports are part of the network and carry traffic for all VLANs between switches. Trunk ports are automatically members of all VLANs configured in the switch. The switch can 'pass through' traffic, forwarding frames received on one trunk port out of another trunk port. The trunk ports must be members of all VLANs that the 'pass through' traffic is part of, even if none of those VLANs are used on edge ports.
Chapter 5 RUGGEDCOM RSG2488 Setup and Configuration User Guide Section 5.1.1.6 Forbidden Ports List Each VLAN can be configured to exclude ports from membership in the VLAN using the forbidden ports list. For more information, refer to Section 5.1.4.2, “Adding a Static VLAN”.
RUGGEDCOM RSG2488 Chapter 5 User Guide Setup and Configuration Administrative Convenience VLANs enable equipement moves to be handled by software reconfiguration instead of by physical cable management. When a host's physical location is changed, its connection point is often changed as well. With VLANs, the host's VLAN membership and priority are simply copied to the new port.
Chapter 5 RUGGEDCOM RSG2488 Setup and Configuration User Guide Figure 76: VLAN Summary Table If a VLANs are not listed, add static VLANs as needed. For more information, refer to Section 5.1.4.2, “Adding a Static VLAN”. Section 5.1.3 Configuring VLANs for Ethernet Ports When a VLAN ID is assigned to an Ethernet port, the VLAN appears in the VLAN Summary table where it can be further configured.
RUGGEDCOM RSG2488 Chapter 5 User Guide Setup and Configuration Parameter Description Port(s) Synopsis: Any combination of numbers valid for this parameter The port number as seen on the front plate silkscreen of the switch. Type Synopsis: { Edge, Trunk, } This parameter specifies how the port determines its membership in VLANs.
Chapter 5 RUGGEDCOM RSG2488 Setup and Configuration User Guide Figure 79: Static VLANs Table If a static VLAN is not listed, add the VLAN. For more information, refer to Section 5.1.4.2, “Adding a Static VLAN”. Section 5.1.4.2 Adding a Static VLAN To add a static VLAN, do the following: Navigate to Virtual LANs >...
RUGGEDCOM RSG2488 Chapter 5 User Guide Setup and Configuration Configure the following parameter(s) as required: NOTE If IGMP Options is not enabled for the VLAN, both IGMP messages and multicast streams will be forwarded directly to all members of the VLAN. If any one member of the VLAN joins a multicast group, then all members of the VLAN will receive the multicast traffic.
RUGGEDCOM RSG2488 Chapter 5 User Guide Setup and Configuration propagation of topology information throughout the network. RSTP also offers a number of other significant innovations, including: • Topology changes in RSTP can originate from and be acted upon by any designated bridges, leading to more rapid propagation of address information, unlike topology changes in STP, which must be passed to the root bridge before they can be propagated to the network.
Page 134
Chapter 5 RUGGEDCOM RSG2488 Setup and Configuration User Guide The learning state is entered when the port is preparing to play an active part in the network. The port learns addresses in this state but does not participate in frame transfer. In a network of RSTP bridges, the time spent in this state is usually quite short.
RUGGEDCOM RSG2488 Chapter 5 User Guide Setup and Configuration A port is a Backup Port when it receives a better message from the LAN segment it is connected to, originating from another port on the same bridge. The port is a backup for another port on the bridge and will become active if that port fails.
There is a relationship between the bridge diameter and the maximum age parameter. To achieve extended ring sizes, RuggedCom eRSTP™ uses an age increment of ¼ of a second. The value of the maximum bridge diameter is thus four times the configured maximum age parameter.
RSTP for interoperability with commercial switches. For example, in a network comprised of 15 RuggedCom hardened Ethernet switch in a ring topology, the expected fault recovery time would be less than 75 ms (i.e. 5 ms x 15). However, with eRSTP, the worst case fault recovery time is less than 26 ms.
Chapter 5 RUGGEDCOM RSG2488 Setup and Configuration User Guide Section 5.2.2 RSTP Applications The following sections describe various applications of RSTP: • Section 5.2.2.1, “RSTP in Structured Wiring Configurations” • Section 5.2.2.2, “RSTP in Ring Backbone Configurations” • Section 5.2.2.3, “RSTP Port Redundancy”...
Enable RSTP Fast Root Failover option. This is a proprietary feature of RuggedCom. In a mesh network with only RuggedCom devices in the core of the network, it is recommended to enable the RSTP Fast Root Failover option to minimize the network downtime in the event of a Root bridge failure.
Page 140
Chapter 5 RUGGEDCOM RSG2488 Setup and Configuration User Guide Figure 86: Example - Ring Backbone Configuration To design a ring backbone configuration with RSTP, do the following: Select the design parameters for the network. What are the requirements for robustness and network fail-over/recovery times? Typically, ring backbones are chosen to provide cost effective but robust network designs.
Disable RSTP Fast Root Failover option. This is a proprietary feature of RuggedCom. In ROS, the RSTP Fast Root Failover option is enabled by default. It is recommended to disable this feature when operating in a Ring network.
Chapter 5 RUGGEDCOM RSG2488 Setup and Configuration User Guide By design, MSTP processing time is proportional to the number of active STP instances. This means that MSTP will likely be significantly slower than RSTP. Therefore, for mission critical applications, RSTP should be considered a better network redundancy solution than MSTP.
RUGGEDCOM RSG2488 Chapter 5 User Guide Setup and Configuration The CST (Common Spanning Tree) spans the entire bridged network, including MST regions and any connected STP or RSTP bridges. An MST region is seen by the CST as an individual bridge, with a single cost associated with its traversal.
Chapter 5 RUGGEDCOM RSG2488 Setup and Configuration User Guide Role Description The Master Port, which is unique in an MSTP region, is the CIST Root Port of the CIST Regional Root, and provides the minimum cost path to the CIST Root for all MSTIs.
RUGGEDCOM RSG2488 Chapter 5 User Guide Setup and Configuration Compatibility with STP and RSTP No special configuration is required for the bridges of an MST region to connect fully and simply to non-MST bridges on the same bridged network. Careful planning and configuration is, however, recommended in order to arrive at an optimal network.
Page 146
Chapter 5 RUGGEDCOM RSG2488 Setup and Configuration User Guide Figure 88: Bridge RSTP Parameters Form 1. State Options 2. Version Support List 3. Bridge Priority List 4. Hello Time Box 5. Max Age Time Box 6. Transmit Count 7. Forward Delay Box 8.
RUGGEDCOM RSG2488 Chapter 5 User Guide Setup and Configuration Parameter Description Maximum number of BPDUs on each port that may be sent in one second. Larger values allow the network to recover from failed links/bridges more quickly. Forward Delay Synopsis: 4 to 30 s...
Page 148
Chapter 5 RUGGEDCOM RSG2488 Setup and Configuration User Guide Figure 90: Port RSTP Parameters Form 1. Port(s) Box 2. Enabled Options 3. Priority List 4. STP Cost Box 5. RSTP Cost Box 6. Edge Port List 7. Point to Point List 8.
RUGGEDCOM RSG2488 Chapter 5 User Guide Setup and Configuration Parameter Description field set to "auto" to use the standard RSTP port costs as negotiated (20,000 for 1Gbps, 200,000 for 100 Mbps links and 2,000,000 for 10 Mbps links). For MSTP, this parameter applies to both external and internal path cost.
Page 150
(and may be relatively long) for any given mesh topology. This configuration parameter enables RuggedCom's enhancement to RSTP which detects a failure of the root switch and performs some extra RSTP processing steps, significantly reducing the network recovery time and making it deterministic.
RUGGEDCOM RSG2488 Chapter 5 User Guide Setup and Configuration Parameter Description • In a single ring topology, this feature is not needed and should be disabled to avoid longer network recovery times due to extra RSTP processing. The Fast Root Failover algorithm must be supported by all switches in the network, including the root, to guarantee optimal performance.
Page 152
Chapter 5 RUGGEDCOM RSG2488 Setup and Configuration User Guide Figure 92: Bridge RSTP Statistics Form 1. Bridge Status 2. Bridge ID 3. Root ID 4. Root Port 5. Root Path Cost 6. Configured Hello Time 7. Learned Hello Time 8. Configured Forward Delay 9.
RUGGEDCOM RSG2488 Chapter 5 User Guide Setup and Configuration Parameter Description Learned Hello Time Synopsis: 0 to 65535 The actual Hello time provided by the root bridge as learned in configuration messages. This time is used in designated bridges. Configured Forward Delay Synopsis: 0 to 65535 The configured Forward Delay time from the Bridge RSTP Parameters menu.
Page 154
Chapter 5 RUGGEDCOM RSG2488 Setup and Configuration User Guide Figure 93: Port RSTP Statistics Form 1. Port(s) 2. Status 3. Role 4. Cost 5. RX RSTs 6. TX RSTs 7. RX Configs 8. TX Configs 9. RX Tcns 10. TX Tcns 11.
RUGGEDCOM RSG2488 Chapter 5 User Guide Setup and Configuration Parameter Description Cost offered by this port. If the Bridge RSTP Parameters Cost Style is set to STP, 1Gbps ports will contribute 4, 100 Mbps ports will contribute 19 and 10 Mbps ports contribute a cost of 100.
Page 156
Chapter 5 RUGGEDCOM RSG2488 Setup and Configuration User Guide Figure 94: Bridge MSTI Statistics Form 1. Instance Box 2. Get Button This table displays the following information: Parameter Description Bridge Status Synopsis: { , Designated Bridge, Not Designated For Any LAN, Root Bridge } Spanning Tree status of the bridge.
RUGGEDCOM RSG2488 Chapter 5 User Guide Setup and Configuration Section 5.2.9.2 Viewing Statistics for Port MSTIs To view statistics for port MSTIs, navigate to Spanning Tree > View Port MSTI Statistics. The Port MSTI Statistics form appears. Figure 95: Port MSTI Statistics Form 1.
Chapter 5 RUGGEDCOM RSG2488 Setup and Configuration User Guide Parameter Description even if the Cost style is set to RSTP, a port that migrates to STP will have its cost limited to a maximum of 65535. Desig Bridge ID Synopsis: $$ / ##-##-##-##-##-## where $$ is 0 to 65535, ## is 0 to FF Provided on the root ports of designated bridges, the Bridge Identifier of the bridge this port is connected to.
RUGGEDCOM RSG2488 Chapter 5 User Guide Setup and Configuration Click Apply. Section 5.2.9.4 Configuring a Global MSTI To configure a global Multiple Spanning Tree Instance (MSTI) for the Spanning Tree Protocol (STP), do the following: Navigate to Spanning Tree > Configure Bridge MSTI Parameters. The Bridge MSTI Parameters form appears.
Page 160
Chapter 5 RUGGEDCOM RSG2488 Setup and Configuration User Guide Figure 98: Port MSTI Parameters Table Select an Ethernet port. The Port MSTI Parameters form appears. Figure 99: Port MSTI Parameters Form 1. Instance ID Box 2. Get Button 3. Port(s) Box 4.
RUGGEDCOM RSG2488 Chapter 5 User Guide Setup and Configuration Parameter Description set to "auto" to use the standard STP port costs as negotiated (4 for 1Gbps, 19 for 100 Mbps links and 100 for 10 Mbps links). For MSTP, this parameter applies to both external and internal path cost.
Chapter 5 RUGGEDCOM RSG2488 Setup and Configuration User Guide 1. Inspection Phase In the inspection phase, the CoS priority of a received frame is determined from: • A specific CoS based upon the source and destination MAC address (as set in the Static MAC Address Table) •...
RUGGEDCOM RSG2488 Chapter 5 User Guide Setup and Configuration Figure 101: Global CoS Parameters Form 1. CoS Weighting Options 2. Apply Button 3. Reload Button Configure the following parameter(s) as required: Parameter Description CoS Weighting Synopsis: { 8:4:2:1, Strict }...
Chapter 5 RUGGEDCOM RSG2488 Setup and Configuration User Guide Figure 103: Port CoS Parameters Form 1. Port(s) Box 2. Default Priority Box 3. Inspect TOS Options 4. Alarm Button 5. Reload Button Configure the following parameter(s) as required: Parameter Description...
RUGGEDCOM RSG2488 Chapter 5 User Guide Setup and Configuration Figure 104: Priority to CoS Mapping Table Select a priority level. The Priority to CoS Mapping form appears. Figure 105: Priority to CoS Mapping Form 1. Priority Box 2. CoS List 3.
Page 166
Chapter 5 RUGGEDCOM RSG2488 Setup and Configuration User Guide Figure 106: DSCP to CoS Mapping Table Select a dscp level. The DSCP to CoS Mapping form appears. Figure 107: DSCP to CoS Mapping Form 1. DSCP Box 2. CoS List 3.
RUGGEDCOM RSG2488 Chapter 5 User Guide Setup and Configuration Parameter Description Class of Service assigned to received frames with the specified DSCP. Click Apply. Section 5.4 Managing MAC Addresses The following sections describe how to configure and manage MAC addresses: •...
Chapter 5 RUGGEDCOM RSG2488 Setup and Configuration User Guide Navigate to MAC Address Tables > Configure MAC Address Learning Options. The MAC Address Learning Options form appears. Figure 109: MAC Address Learning Options Form 1. Aging Time Box 2. Age Upon Link Loss Options 3.
RUGGEDCOM RSG2488 Chapter 5 User Guide Setup and Configuration Section 5.4.3.1 Viewing a List of Static MAC Addresses To view a list of static MAC addresses configured on the device, navigate to MAC Address Tables > Configure Static MAC Addresses. The Static MAC Addresses table appears.
Chapter 5 RUGGEDCOM RSG2488 Setup and Configuration User Guide Figure 112: Static MAC Addresses Form 1. MAC Address Box 2. VID Box 3. Port 4. Apply Button 5. Delete Button 6. Reload Button Configure the following parameter(s) as required: Parameter...
RUGGEDCOM RSG2488 Chapter 5 User Guide Setup and Configuration Figure 113: Static MAC Addresses Table Select the MAC address from the table. The Static MAC Addresses form appears. Figure 114: Static MAC Addresses Form 1. MAC Address Box 2. VID Box 3.
Chapter 5 RUGGEDCOM RSG2488 Setup and Configuration User Guide Section 5.5 Managing the System Time The System Time Manager offers the following time-keeping and time synchronization features: • Local hardware time keeping and time zone management • SNTP time synchronization In addition to acting as a local clock, the System Time Manager can also configure the device to bean NTP server.
RUGGEDCOM RSG2488 Chapter 5 User Guide Setup and Configuration Parameter Description UTC-3:00 (Brasilia, Buenos Aires), UTC-2:00 (Mid Atlantic), UTC-1:00 (Azores), UTC-0:00 (Lisbon, London), UTC+1:00 (Berlin, Paris, Rome), UTC+2:00 (Athens, Cairo, Helsinki), ... } Default: UTC-5:00 (New York, Toronto) This setting allows for the conversion of UTC (Universal Coordinated Time) to local time.
Chapter 5 RUGGEDCOM RSG2488 Setup and Configuration User Guide Figure 118: NTP Server Form 1. Server Box 2. IP Address Box 3. Update Period Box 4. Apply Button 5. Reload Button Configure the following parameter(s) as required: Parameter Description Server...
RUGGEDCOM RSG2488 Chapter 5 User Guide Setup and Configuration • A group defines the access policy for a set of users • An access policy defines what SNMP objects can be accessed for (i.e. reading, writing and creating notifications) • A group determines the list of notifications its users can receive •...
Chapter 5 RUGGEDCOM RSG2488 Setup and Configuration User Guide Section 5.6.1.2 Adding an SNMP User Multiple users (up to a maximum of 32) can be configured for the local SNMPv3 engine, as well as SNMPv1 and SNMPv2c communities. NOTE When employing the SNMPv1 or SNMPv2c security level, the User Name parameter maps the community name with the security group and access level.
Page 177
RUGGEDCOM RSG2488 Chapter 5 User Guide Setup and Configuration NOTE ROS requires that all user passwords meet strict guidelines to prevent the use of weak passwords. When creating a new password, make sure it adheres to the following rules: • Must not be less than 6 characters in length.
Chapter 5 RUGGEDCOM RSG2488 Setup and Configuration User Guide Parameter Description Confirm Priv Key Synopsis: 31 character ASCII string The secret encription key (password) that must be shared with SNMP client. If the key is not an emtpy string, it must be at least 6 characters long.
RUGGEDCOM RSG2488 Chapter 5 User Guide Setup and Configuration Section 5.6.2 Managing Security-to-Group Mapping The following sections describe how to configure and manage security-to-group maps, refer to the following: • Section 5.6.2.1, “Viewing a List of Security-to-Group Maps” • Section 5.6.2.2, “Adding a Security-to-Group Map”...
Chapter 5 RUGGEDCOM RSG2488 Setup and Configuration User Guide Click InsertRecord. The SNMP Security to Group Maps form appears. Figure 126: SNMP Security to Group Maps Form 1. Security Model Box 2. Name Box 3. Group Box 4. Apply Button 5.
RUGGEDCOM RSG2488 Chapter 5 User Guide Setup and Configuration Figure 128: SNMP Security to Group Maps Form 1. Security Model Box 2. Name Box 3. Group Box 4. Apply Button 5. Delete Button 6. Reload Button Click Delete. Section 5.6.3 Managing SNMP Groups Multiple SNMP groups (up to a maximum of 32) can be configured to have access to SNMP.
Chapter 5 RUGGEDCOM RSG2488 Setup and Configuration User Guide Section 5.6.3.2 Adding an SNMP Group To add an SNMP group, do the following: Navigate to Administration > Configure SNMP > Configure SNMP Access. The SNMP Access table appears. Figure 130: SNMP Access Table 1.
RUGGEDCOM RSG2488 Chapter 5 User Guide Setup and Configuration Parameter Description The minimum level of security reqwuired in order to gain the access rights allowed by this entry. A security level of noAuthNoPriv is less than authNoPriv, which is less than authPriv.
RUGGEDCOM RSG2488 Chapter 5 User Guide Setup and Configuration • Section 5.7.2, “Configuring LLDP for an Ethernet Port” • Section 5.7.3, “Viewing Global Statistics and Advertised System Information” • Section 5.7.4, “Viewing Statistics for LLDP Neighbors” • Section 5.7.5, “Viewing Statistics for LLDP Ports”...
Chapter 5 RUGGEDCOM RSG2488 Setup and Configuration User Guide Parameter Description Tx Delay Synopsis: 1 to 8192 s Default: 2 s The delay in seconds between successive LLDP frame transmissions initiated by value or status changed. The recommended value is set by the following formula: 1 <= txDelay <= (0.25 * Tx Interval)
RUGGEDCOM RSG2488 Chapter 5 User Guide Setup and Configuration Parameter Description Enables LLDP protocol. Note that LLDP is enabled on a port when LLDP is enabled globally and along with enabling per port setting in Port LLDP Parameters menu. Port...
Chapter 5 RUGGEDCOM RSG2488 Setup and Configuration User Guide Parameter Description Drops Synopsis: 0 to 4294967295 A number of times an entry was deleted from LLDP Neighbor Information Table because the information timeliness interval has expired. Ageouts Synopsis: 0 to 4294967295 A counter of all TLVs discarded.
RUGGEDCOM RSG2488 Chapter 5 User Guide Setup and Configuration Section 5.7.5 Viewing Statistics for LLDP Ports To view statistics for LLDP ports, navigate to Network Discovery > Link Layer Discovery Protocol > View LLDP Statistics. The LLDP Statistics table appears.
Page 190
Chapter 5 RUGGEDCOM RSG2488 Setup and Configuration User Guide Viewing Statistics for LLDP Ports...
RUGGEDCOM RSG2488 Chapter 6 User Guide Troubleshooting Troubleshooting This chapter describes troubleshooting steps for common issues that may be encountered when using ROS or designing a network. It describes the following tasks: IMPORTANT! For further assistance, contact a Customer Service representative.
Chapter 6 RUGGEDCOM RSG2488 Troubleshooting User Guide Problem Solution This problem will also occur if the gateway address is not configured and the switch tries to raise an SNMP trap to a host that is not on the local subnet.
Page 193
RUGGEDCOM RSG2488 Chapter 6 User Guide Troubleshooting Problem Solution promptly enter it back into service, beginning the cycle once again. The root port will flip back and forth between two ports on the switch. A computer or device is connected to a Is it possible that the RSTP edge setting for this port is set to false? If Edge is set to false, switch.
Chapter 6 RUGGEDCOM RSG2488 Troubleshooting User Guide Section 6.4 VLANs The following describes common problems related to the VLANs. Problem Solution VLANs are not needed on the network. Can Yes. Simply leave all ports set to type edge and leave the native VLAN set to 1. This is the they be turned off? default configuration for the switch.
Need help?
Do you have a question about the RSG2488 and is the answer not in the manual?
Questions and answers