Page 2
FOR USE WITH RODUCTS Version 1.13.3 – October 20, 2008 RuggedCom Disclaimer RuggedCom Inc. makes no warranty of any kind with regard to this material. 30 Whitmore Road Woodbridge, Ontario RuggedCom shall not be liable for errors contained herein or for...
About this User Guide This guide is concerned with aiding the user in the configuration and operation of the ® RuggedRouter using the RuggedCom command line, setup menu and web management interfaces. Specifically, this guide details aspects of: Accessing the User Interfaces •...
Means reader take note. Notes contain helpful suggestions or references to materials not contained in this guide. Helpful Hint This type of note often indicates useful shortcuts or methods employed by other RuggedCom customers. Quick Start Recommendations The following description is included to aid those users experienced with communications equipment that may wish to attempt to configure the router without fully reading the guide.
Page 5
21. If your router is equipped with ADSL interfaces, the Networking menu, ADSL sub-menu will allow you to configure them. See the chapter “Configuring PPPoE On ADSL” for more details. If you wish to use PPPOE with an external ADSL modem, the Networking menu, Ethernet sub-menu will configure it. RuggedCom...
Page 6
34. If your router is an RX1100 you may configure and activate the Snort Intrusion Detection system and the Gauntlet Security Appliance. If you decide to forward daily email summaries you must configure a mail forwarder in the Maintenance menu Miscellaneous sub-menu Outgoing Mail sub-menu. RuggedCom...
Page 7
36. Should you need to transfer files to or from the router, the Maintenance menu Upload/Download Files sub-menu will be useful. 37. Further concerns such as ensuring robustness, measuring and optimizing performance are dealt with by reading the guide fully. RuggedCom...
Obtaining Chassis Information .......................34 Chapter 2 - Webmin Configuration.....................35 Introduction............................35 Webmin Configuration Menu ......................35 IP Access Control ........................35 Ports And Addresses .......................36 Change Help Server........................36 Logging ............................37 Authentication ..........................38 Webmin Events Log ........................38 Chapter 3 - Configure Webmin Users....................39 Introduction............................39 RuggedCom...
Page 9
PPPoE On Native Ethernet Interfaces Fundamentals ..............58 Ethernet Configuration........................59 Ethernet Interfaces........................59 Editing Currently Active Interfaces ....................60 Virtual Interfaces ........................61 Virtual Lan Interfaces.......................61 Edit Boot Time Interfaces ......................61 PPPoE On Native Ethernet Interfaces..................62 Edit PPPoE Interface........................63 PPP Logs............................63 Current Routes & Interface Table....................64 RuggedCom...
Page 10
Upgrading Software ........................81 Chapter 9 - Configuring Frame Relay/PPP And DDS.................83 Introduction............................83 DDS Fundamentals........................83 Location Of Interfaces And Labeling..................83 LED Designations ........................83 DDS Configuration .........................84 DDS Network Interfaces......................84 Naming Of Logical Interfaces....................85 Editing A Logical Interface (Frame Relay) .................85 RuggedCom...
Page 11
Current Routes & Interface Table....................102 Chapter 12 - Configuring PPP and Cellular Modem.................103 Introduction............................103 PPP and Cellular Modem Fundamentals...................103 PPP Interface..........................103 Authentication, Addresses and DNS Servers ...............103 When the Modem Connects....................103 LED Designations .........................103 PPP Cellular Modem Configuration....................104 Cellular Modem Configuration....................104 RuggedCom...
Page 12
Traffic Control (TC) Fundamentals....................131 Traffic Control Example......................131 TC Interfaces..........................131 TC Classes..........................132 TC Rules..........................132 Traffic Control Configuration......................133 TC Interfaces (tcdevices)......................133 TC Classes..........................134 TC Rules............................136 Hints on optimizing the TC Rule table..................138 Chapter 15 - Configuring IPsec VPN ....................139 Introduction............................139 VPN Fundamentals ........................139 RuggedCom...
Page 13
Key OSPF And RIP Parameters....................154 Network Areas........................154 Router-ID..........................155 Hello Interval and Dead Interval....................155 Active/Passive Interface Default....................155 Redistributing Routes......................155 Link Detect..........................156 Configuring OSPF Link Costs....................156 OSPF Authentication......................156 RIP Authentication.........................156 OSPF And Antispoofing......................156 Administrative Distances.......................157 OSPF And VRRP Example Network..................157 Area And Subnets........................158 VRRP Operation........................158 RuggedCom...
Page 14
The VRRP Solution.......................177 VRRP Terminology.......................177 VRRP Configuration........................180 VRRP Main Menu........................180 VRRP Configuration Menu.......................180 Editing A VRRP Instance......................181 Editing A VRRP Group......................182 Viewing VRRP Instances Status ....................182 Chapter 19 - Configuring Traffic Prioritization ................183 Introduction............................183 Traffic Prioritization Fundamentals ..................183 Priority Queues........................183 Filters.............................183 RuggedCom...
Page 15
Serial Protocols Concepts And Issues..................201 Host And Remote Roles......................201 Use Of Port Redirectors......................201 Message Packetization......................201 Use of Turnaround Delays.....................202 TcpModBus Server Application....................202 Local Routing At The Server Gateway..................202 MultiMaster Capability......................202 TcpModbus Concepts And Issues....................202 Host And Remote Roles......................202 Port Numbers.........................203 Retransmissions........................203 RuggedCom...
Page 16
Multiple Subnets On Separate VLANs Using Option82 On One Switch......225 DHCP Configuration........................227 DHCP Server Main Menu......................227 DHCP Shared Network Configuration..................228 DHCP Subnet Configuration.....................229 DHCP Group Configuration......................230 DHCP Host Configuration......................230 DHCP Pool Configuration......................231 Chapter 25 - Configuring NTP ......................233 Introduction............................233 NTP Fundamentals ........................233 RuggedCom...
Page 17
IRIGB/IEEE1588 Main Menu....................246 General Configuration .......................246 IRIGB Configuration .........................247 IEEE1588 Configuration......................247 IRIGB Status..........................248 IEEE1588 Status........................248 IRIGB Log..........................248 Chapter 28 - Configuring the Intrusion Detection System..............249 Introduction............................249 Snort Fundamentals........................249 Which Interfaces To Monitor....................249 Snort Rules..........................249 Alerting Methods........................250 Performance And Resources....................250 IDS Configuration..........................251 RuggedCom...
Page 19
Appendix B - Re-Flashing Router Software ..................300 Appendix C - Installing Apache Web Server On Windows..............301 Appendix D - Installing IIS Web Server On Windows..............303 Appendix E - RADIUS Server Configuration...................304 FreeRadius..........................304 Windows Internet Authentication Service................304 Appendix F - VPN/L2TP Configuration in Windows...............307 Index..............................308 RuggedCom...
Figure 43: End To End Backup Example..................55 Figure 44: End To End Backup......................56 Figure 45: Ethernet Menu........................59 Figure 46: Current and Boot Time Ethernet Configuration.............59 Figure 47: Editing a Network Interface....................60 Figure 48: Creating a Virtual Interface....................61 Figure 49: Creating a Virtual Lan Interface..................61 RuggedCom...
Page 22
Figure 144: Link Backup Example....................171 Figure 145: Link Backup Main Menu....................172 Figure 146: Link Backup Configurations..................172 Figure 147: Edit Link Backup Configuration................173 Figure 148: Link Backup Log......................174 Figure 149: Link Backup Status.....................174 Figure 150: Test Link Backup......................174 Figure 151: VRRP Example......................178 RuggedCom...
Chapter 1 - Setting Up And Administering The Router Introduction This chapter familiarizes the user with the RuggedCom Serial Console interface, the RuggedRouter Setup script and signing on to the Web interface. This chapter describes the following procedures: Running the Setup Script •...
Signing-in as the rrsetup user will automatically enter the configuration shell shown below. Quitting the shell (with cancel, or by entering escape) will cause the connection to close. Figure 1: RuggedRouter Setup Main Menu The shell provides a number of configuration commands, described below. RuggedCom...
The Configure Default Gateway Settings command configures the default gateway. The Configure DNS Client Settings command configures the DNS server address. If the router is part of a domain, enter the domain name in the “Search Domain” field. Figure 4: RuggedRouter DNS Client Menu RuggedCom...
Enable Web Management to reflect the disabled state. Enabling a service automatically restarts it. Enabling And Disabling The Gauntlet Security Appliance The Gauntlet security Appliance requires a pass phrase unique to your network. This menu will configure it. Figure 6: Gauntlet Setup Menu RuggedCom...
The Set The Date, Time And Timezone command allows these parameters to be set. Figure 7: RuggedRouter Date/Time/Timezone Menu Once set, the router will account for Daylight Savings time. Displaying Hardware Information The Display Hardware Information command describes commissioned hardware. Figure 8: RuggedRouter Hardware Information Menu RuggedCom...
Initially, your RuggedRouter will have no previously saved configurations. The factory defaults will always be available. Once a configuration is selected the archive will be restored. After the configuration is restored, the router will reboot immediately. Figure 10: Selecting a previously made configuration RuggedCom...
Chapter 1 - Setting Up And Administering The Router The RuggedRouter Web Interface The RuggedCom Web interface is provided by an enhanced version of the popular Webmin interface. Using a Web Browser to Access the Web Interface Start a web browser session and open a connection to the router by entering a URL that specifies its hostname or IP address (e.g.
• icon signifies that clicking the entry will run a single menu. • icon logs out of Webmin. • The menu system entries are composed of the Webmin, System, Servers, Networking and Maintenance menus. RuggedCom...
Upgrade the router type to RX1100, • Upload/Download files to and from the router. • Using The LED Status Panel The LED status Panel provides the console port, indicates the status of hardware/software and can initiate a controlled reboot. RuggedCom...
Pressing the pushbutton for more than five seconds will reboot the router. Obtaining Chassis Information The chassis displays the hardware inventory at boot time. This information is captured in the /var/log/messages file after boot. The Web Management interface home page displays the chassis serial number. RuggedCom...
But Webmin will provide access to any client that provides the correct password, rendering it vulnerable to brute force attacks. The best way of addressing this problem is to restrict access to specific IP addresses or subnets. By default, IP access control allows all IP addresses to access Webmin. RuggedCom...
Webmin server from outside of your local network. If not, simply configure Webmin to listen on the local interface. By default, Webmin listens on TCP port 10000 for clients. It is possible to change this default behaviour. Change Help Server Figure 18: Webmin Configuration Menu, Change Help Server RuggedCom...
IP address for the client computer that performed an action. The Clear logfiles every...hours field causes Webmin to rotate its own logs and keep them from overfilling the disk with old logs. Currently, the Log actions by all users field should be left selected. RuggedCom...
Webmin Events Log Figure 21: Webmin Events Log This menu allows you to search the Webmin log for changes made by yourself or other administrators. RuggedCom...
A user successfully authenticated by the RADIUS server will have Webmin access corresponding to his/her privilege level, as configured for the user account on the RADIUS server. For information on how to configure user accounts on the RADIUS server, please refer to Appendix E - RADIUS Server Configuration RuggedCom...
Click the View login sessions button to view all current login sessions. Click the Password Restrictions button to set the password restriction rules. Note: The accounts managed from this menu are local to the RuggedRouter, and are not maintained on a RADIUS server, even if one is configured. RuggedCom...
Click on Session link under the Session ID column to cancel a session. Click the Webmin user link under the Webmin user column to display the Webmin user edit menu for that user. Click the View logs link to display logs for that Webmin user. RuggedCom...
If you do not have access to an Internet connection, but do have a UNIX / Linux system with PERL installed, access the local manual pages by typing: man perlreref man perlre man perlretut man perlrequick at the command line. Root privilege is not required to access manual pages. RuggedCom...
If you really want the router to remain powered but permanently inactive, you must issue the shutdown, connect a terminal to the serial port, wait for the router to enter the shutdown shell and issue a CTRL-C. Once again, if you accidentally shutdown the router it will restart after five minutes. RuggedCom...
This command changes only the root account password used to login to Webmin and the root account via the serial console or SSH. Scheduled Commands Figure 29: Scheduled Commands This menu allows you to schedule a command to run in the future. RuggedCom...
Finally, enter the command to execute in the Commands to execute field. Note that the command will remain scheduled after reboot. After the command is entered, the Scheduled Commands menu will display any commands and allow you cancel them. Figure 30: Scheduled Commands Displaying a Command RuggedCom...
Select the times the script is to run from the When to execute table (remember to check the selected button above any column you edit). The Active radio button at the top of the menu temporarily disables the job. After selecting the Create button, the Scheduled Cron Jobs menu will display the job. RuggedCom...
This menu provides a method to set the time and timezone of the router. Note: Changing the system may confuse protocols such as OSPF and RIP, which depend upon an accurate system time. If you use OSPF or RIP, changing the time from this menu will restart them. RuggedCom...
Page 50
® RuggedRouter User Guide This page intentionally blank RuggedCom...
Select the End To End Backup icon to configure an end to end backup connection. Select the Current Routing & Interface Table icon to view the routing table. The Apply Configuration button serves to restore the permanently saved changes and restart Ethernet networking. RuggedCom...
ICMP ECHO request packets if their destination address is a broadcast address. The Syncookie Protection field corresponds to the kernel tcp_syncookie setting. Setting Syncookie Protection to “yes” will cause the kernel to protect against SYN flood attacks. RuggedCom...
The first table of this menu configures the default gateway address. Note: Don't configure a default gateway if you plan to provide one from a WAN, PPPoE or modem interface. Don't manually configure configure the default gateway in the /etc/network/interfaces file, configure the default gateway from this menu. RuggedCom...
Routes” link will make the route permanent. Note: There are situations where manually entered routes should not be converted, e.g. routes dynamically added by IPsec and GRE tunnels. Making these routes permanent may cause the daemons that add them to fail. RuggedCom...
The Comment field shows the current status of the the routing. The Note field below the table shows current active interfaces. In order to start Multicast routing at each and every boot, you must enable it via the System folder, Bootup And Shutdown menu. RuggedCom...
This menu allows you to display and configure host addresses. Host addresses are useful when a non-changing IP address is often used or when DNS is not configured. Follow the Add a new host address link to add an address. RuggedCom...
1, the second router's gateway will still point towards Network A after a failure of the primary path. Packets from router 1 would reach router 2 through the secondary, but the responses would disappear in the black hole of the failed path. RuggedCom...
Current Routing & Interface Table This menu displays the current routing table and the state of the router's interfaces. Consult the Network Utilities chapter for details of this menu. RuggedCom...
• Ethernet Interface Fundamentals RuggedCom manufactures dual Ethernet Interface boards in a variety of formats. Some (most notably the optical interfaces) have the same outward appearance but different order numbers. A complete set of descriptions is displayed on the console during boot and can be found after boot in the file /var/cache/ruggedrouter/inventory.
Only one PPPoE interface can be created on each Ethernet Interface. Each PPPoE interface name is assigned internally. The name is “pppX”, where X is 10 plus the native Ethernet interface the PPPoE is created upon (e.g. a PPPoE on eth1 is ppp11). RuggedCom...
The entries in this table can also be used to temporarily disable or re-enable an interface. The Boot Time Configuration table router allows you make changes to the “permanent” configuration of any interface. RuggedCom...
The Proxy ARP fields display whether the interface has proxy-arp activated. The Media Type field displays the current media type. Copper interfaces may be configured to Auto-negotiable, 10 BaseT Half Duplex, 10 BaseT Full Duplex, 100 BaseT Half Duplex and 100 BaseT Full Duplex modes. RuggedCom...
Edit Boot Time Interfaces Figure 50: Editing a Boot Time Interface This menu allows you to make permanent changes to interfaces and to immediately apply those changes if desired. The Save button will save changes to the permanent configuration. RuggedCom...
The Interface Name field shows created PPPoE interfaces and provides a link to edit the existing configuration or create a new one. The MTU, Use Peer DNS and Default Route fields are the configured information for PPPoE interfaces. The Status field shows the current PPPoE link status. RuggedCom...
The Save button will update all of the changes. The current PPPoE link will be connected. The Delete button will delete the PPPoE interface, closing the current PPPoE link. PPP Logs Figure 53: Display PPP Logs RuggedCom...
This is mainly useful when trying to debug a PPP connection problem. Current Routes & Interface Table The table provided by this command is as described in the Networking menu, Network Utilities sub-menu. It is also provided here as a convenience. RuggedCom...
Equipment (CPE)). The DCE is responsible for managing the link, advertising connections to the DTE and switching packets between connections. The DTE raises individual connections and sends data on them. When using a T1/E1 line to access a public Frame Relay provider, configure the Router as a DTE. RuggedCom...
LEDs will indicate traffic and link status of the port. Consult the section “Using The LED Status Panel” to determine which LEDs correspond to the port. Included With T1E1 T1E1 includes wanpipemon, a utility that can capture traces from the T1E1 line. RuggedCom...
This can be done by editing the single initially configured channel and removing timeslots. The unassigned timeslots will be displayed on the main menu in a link that creates channels, as shown below. Figure 56: T1/E1 Network Interfaces After Channel Creation RuggedCom...
Channelized hardware allows more than one logical interface. The next part of the identifier indicates the channel the interface uses with a “c” followed by the lowest channel used. The final part of the identifier is either “ppp” or “fr” and the frame relay channel number. RuggedCom...
The Line Build Out field “tunes” the shape of the T1 pulses and adjusts their amplitude depending upon distances and the desired attenuation. E1 Settings The Framing and Line Decoding fields for E1 reflect the European variants. The Clocking field performs the same function as that described for T1. RuggedCom...
“Request”, EEK messages are sent every EEK Timer x T391 seconds. This timer may be configured from 1 to 100 periods in duration. Your network provider will inform you of what is proper for these parameters. RuggedCom...
Repetitive use of this button on other DLCIs assigned to the channel will free the channel up. Editing A Logical Interface (PPP) Figure 60: Edit Logical Interface (PPP) The Local Address, Netmask, Remote Address, Default Gateway and Description fields are as described in the previous section. RuggedCom...
YEL (Yellow Alarm) – This alarm is transmitted to the network and alerts it that a failure has been detected. OOF (Out of Frame) – This alarm signifies the occurrence of a particular density of framing error events. This alarm could signify that the wrong framing mode is configured. RuggedCom...
Chapter 7 - Configuring Frame Relay/PPP And T1/E1 Frame Relay Interface Statistics Figure 62: Frame Relay Statistics Note that the Frame Relay Trunk Statistics and Frame Relay Trunk Communications Errors tables are common to all Frame Relay DLCIs on the trunk. RuggedCom...
If the remote equipment is able to loop, the entire T1/E1 line can be verified. If the remote router is another RuggedCom router, a starting a line loopback will verify both cards and the line. This router will display the count of loopback frames as they arrive.
Note: The upgrade process requires upwards of 15 minutes for each PCI interface card. Because of the lengthy duration required to upgrade the interfaces, RuggedCom does not automatically perform the firmware upgrade. Instead, the scheduling of the upgrade is left to the user.
The RuggedRouter also indicates information about T3 ports on the LED Panel. A pair of LEDs will indicate traffic and link status of the port. Consult the section “Using The LED Status Panel” to determine which LEDs correspond to the port. RuggedCom...
Webmin names the logical interfaces for you (but allows you to provide a description). All interfaces start with a “w” to identify them as wan interfaces, followed by the interface number. The next part of the identifier is either “ppp” or “fr” and the frame relay DLCI number. RuggedCom...
Relay. The menu is composed of two tables. The first table provides link based configuration, which affect all DLCIs. The second table provides configuration parameters for individual DLCIs. After the first DLCI has been configured, revisiting that DLCI will display a menu that allows additional DLCIs to be configured. RuggedCom...
Frame Relay/PPP And T1/E1 chapter with the exception that T3 provides only AIS, LOS, OOF and YEL alarms. Current Routes & Interface Table The table provided by this command is as described in the Networking menu, Network Utilities sub-menu. It is also provided here as a convenience. RuggedCom...
If T3 port was upgraded in this way, the upgrade would fail as the T3 link was taken down. Instead, T3 software upgrades modify only the software on the disk. You must schedule a reboot in order to run the new version of T3 software. RuggedCom...
Page 84
® RuggedRouter User Guide This page intentionally blank RuggedCom...
CSU manages electrical levels, isolation and provides loopback to the TELCO. RuggedCom DDS port provides an integrated DTE, DSU and CSU. Location Of Interfaces And Labeling Unlike the Ethernet ports (which are statically located), the location of T1/E1, DDS and ADSL ports in your router depends upon the number of ports and how they were ordered.
Refresh this page link to update to the current status. The menu will change after assignment of a logical interface, providing links to logical interface and link statistics. Figure 75: DDS WAN Interfaces after logical interface assignment RuggedCom...
Figure 77: Edit Logical Interface (Frame Relay), multiple DLCIs The fields and buttons in this menu are the same as those described in the Editing A Logical Interface (Frame Relay) section of the Configuring Frame Relay/PPP And T1/E1 chapter. RuggedCom...
Link Statistics are provided through the “View Link Statistics” link at the bottom of each interface table. Frame Relay and PPP statistics are available through “(Statistics)” links under the interface name column of each interface table. Link Statistics Figure 79: DDS Link Statistics RuggedCom...
The remote equipment must be able to loop, allowing the entire entire line to be verified. If the remote equipment is another RuggedCom router, starting a line loopback will verify both cards and the line. DDS has no standard for performing digital loopback.
Page 90
® RuggedRouter User Guide This page intentionally blank RuggedCom...
Ethernet. As your PPPoE connection is established a PPP interface will be created. The name will be “pppX” where X is the same as the interface number. Use this interface name in firewall rules. RuggedCom...
ADSL card itself and the LED Panel. Four LEDs are associated with the line, next to the interface jack. Power (Green) indicates when the card is active and powered. Link (Green) indicates when the DSL link is established. RuggedCom...
The status of the physical interface, its corresponding logical interface and link statistics are provided. This menu presents connection statuses but does not update them in real time. Click on the Refresh this page link to update to the current status. RuggedCom...
MTU and use whatever it considers to be the default. Note: If the negotiated MTU is different from the requested MTU, a warning will be displayed on the Networking, ADSL menu. RuggedCom...
'other end' of the link and is usually assigned by the network administrator or Internet service provider. The Gateway IP Address field defines the IP address to use as the gateway for sending to other sites. This is usually the same as the Remote IP Address. RuggedCom...
If ADSL was upgraded in this way, the upgrade would fail as the ADSL link was taken down. Instead, ADSL software upgrades modify only the software on the disk. You must schedule a reboot in order to run the new version of ADSL software. RuggedCom...
PPP-Link will be green when the modem PPP link is established. It will flash while a connection is being established, or a console dial in session is active. PPP-Data will flash green when there is traffic on the PPP link. RuggedCom...
This menu allows you to display and configure the modem interface, PPP client and server connections. Modem Configuration Figure 86: Edit Internal Modem Configuration Figure 87: Edit External Modem Configuration These menus allow you to configure modem settings and usage features. RuggedCom...
Page 99
&P0 - Make/break ratio of 39/61 at 10 pulses/second. (default) &P1 - Make/break ratio of 33/67 at 10 pulses/second. &P2 - Make/break ratio of 39/61 at 20 pulses/second. &P3 - Make/break ratio of 33/67 at 20 pulses/second. Compression control %C0 - Disable data compression negotiation. RuggedCom...
To create a new connection click “Add new” link. To have the router automatically dial a connection at boot time and keep it always active, select which connection should be used from the drop down list of available connection profiles in the “Connect at boot” list. RuggedCom...
15 attempts is set when the country code is set to Australia when the setting is found to be either 0 or above 15. The Dial Interval field determines how many seconds to wait before re-initiating the link after it terminates. RuggedCom...
Add and the password will be updated on the existing entry. Note When RADIUS authentication is used, PPP user account information, with the exception of static routes, must instead be configured at the RADIUS server. See Appendix E - RADIUS Server Configuration for details. RuggedCom...
This page shows the latest log entries for incoming calls. This is mainly useful when trying to debug a problem with establishing incoming connections. Modem PPP Logs Figure 92: PPP Logs This page shows the PPP logs. This is mainly useful when trying to debug a PPP connection problem. RuggedCom...
This page shows a list of PPP connections. It shows who connected, when they connected and disconnected, the connection speed, and session traffic. Current Routes & Interface Table The table provided by this command is as described in the Networking menu, Network Utilities sub-menu. It is also provided here as a convenience. RuggedCom...
The RuggedRouter dedicates two LEDs to indicate cellular modem status: The leftmost LED of the bottom row (LED #29) is the “Line” LED. Solid Green indicates that a PPP link has been established. • Flashing green indicates that PPP link negotiation is in progress. • RuggedCom...
Figure 94: Cellular Modem Interface This menu allows you to display and configure the cellular modem interface. Cellular Modem Configuration Figure 95: Cellular Modem configuration This menu allows you to configure the cellular modem to connect to a wireless service provider. RuggedCom...
Network Registration Status displays the current registration status of the cellular modem with respect to the GSM/GPRS network. Registered/Home, Registered/roaming or Unregistered will be displayed depending on the current connection status. SIM Card Identification displays the ID of the SIM card currently installed in the cellular modem. RuggedCom...
If the password is not required, you can enter “none” in this field, or leave it blank. The Default Route checkbox enables automatically setting a default route using this interface whenever it connects. If this is your primary connection you probably want this option enabled. RuggedCom...
The Dial Interval field determines how many seconds to wait before re-initiating the link after it terminates. PPP Logs, PPP Connection Logs Refer to the chapter, “Configuring PPP and Modem” for information. Current Route and Interfaces Table Refer to the chapter, “Configuring PPP and Modem” for information. RuggedCom...
Page 110
® RuggedRouter User Guide This page intentionally blank RuggedCom...
The netfilter system uses rulesets, collections of packet classification rules that determine the outcome of examination of a specific packet. The rules are defined by iptables, a generic table structure syntax and utility program for the configuration and control of netfilter. RuggedCom...
NAT can be used in static and dynamic modes. Static NAT masks the private IP addresses by translating each internal address to a unique external address. Dynamic NAT translates all internal addresses to one (or more) external address(es). RuggedCom...
5) If your network interface IP is dynamically assigned, configure masquerading. 6) If your network interface IP is statically assigned, configure Source Network address Translation (SNAT). If a sufficient number of IP addresses are provided by the ISP, static NAT can be employed instead. RuggedCom...
Page 114
9) If you are supporting a VPN, add additional rules. 10) Check the configuration using the Shorewall Firewall menu, “Check Firewall” button. 11) Activate the firewall. It is usually a good idea to port scan the firewall after activation and verify that logging is functioning. RuggedCom...
Note: In order to improve security the router will create a zone “unusd” and unused interfaces to this zone when Shorewall starts. A policy is also installed that blocks access from “unusd” to all other zones. Interfaces are defined in the file /etc/shorewall/interfaces and are modified from the Network Interfaces menu. RuggedCom...
Note that order of policies is important. If the last rule of this example were entered first then no connections at all would be allowed. RuggedCom...
2) In this SNAT rule a static address of 66.11.180.161 is acquired from the ISP. Traffic from the subnet handled by eth2 should be translated to 66.11.180.161 as it sent to the Internet over ppp. The + at the end of “ppp+” causes Shorewall to match any ppp interface. RuggedCom...
The tcp or udp protocol type. Destination-Port The tcp/udp port the connection is destined for. Source-Port The tcp/udp port the connection originated from. Original- The destination IP address in the connection request as it was Destination-IP received by the firewall. RuggedCom...
The IPsec protocol operates on UDP port 500 and using protocols ah (Authentication Header) and Encapsulating Security Payload (ESP) protocols. The firewall must accept this traffic in order to allow IPsec. If the firewall serves as the VPN gateway, add the following rules: Action Source-Zone Destination-Zone Protocol Dest-Port ACCEPT ACCEPT ACCEPT RuggedCom...
IPSec traffic arriving at the firewall is directed to openswan, the IPSec daemon. Openswan then decrypts the traffic and forwards it back to shorewall on the same interface that originally received it. You will also need a rule to allow traffic to enter from this interface. ACCEPT RuggedCom...
Virtual Private Networking To A DMZ If the firewall is to pass the VPN traffic through to another device (e.g. a VPN device in a DMZ) then establish a DMZ zone and install the following rules. ACCEPT ACCEPT ACCEPT ACCEPT ACCEPT ACCEPT RuggedCom...
If the firewall starts cleanly, the menu appearance will change to that of the figure below. In order to start the firewall at each and every boot, you must enable it via the System folder, Bootup And Shutdown menu. RuggedCom...
Stopping the firewall will not disable it. Disable the firewall via the System folder, Bootup And Shutdown menu. The “Show Status” button presents a variety of information summarizing the status of the firewall and routing system. The “Check Firewall” button tests the current configuration to ensure it is valid. RuggedCom...
Note that if you delete a zone you should remove any rules that reference it. Note: There must be exactly one zone of type firewall. Do not delete this zone. You may also make changes by manually editing the zone file. Network Interfaces Figure 101: Firewall Network Interfaces RuggedCom...
TCP packets arriving on this interface. Checks include Null flags, SYN+FIN, SYN+RST and FIN+URG+PSH; these flag combinations are typically used for “silent” port scans. Packets failing these checks are logged according to the TCP_FLAGS_LOG_LEVEL option in /etc/shorewall/shorewall.conf and are disposed of according to the TCP_FLAGS_DISPOSITION option. RuggedCom...
Selecting the IPSEC zone Host Option field will identify that the traffic to host in this zone is encrypted. The Save and Delete buttons will allow you to edit or delete the zone host. You may also make changes by manually editing the policy RuggedCom...
The Limit field is the steady state rate and is of the form “X/sec” or “X/min” where X is the number of allowed rule followings. The Burst field denotes the largest permissible burst and defaults to five if not configured. RuggedCom...
The Except for networks field restricts traffic from the specified subnet. The SNAT address field is used to determine whether masquerading or SNAT is being performed. If checked, the entered IP address is used as a SNAT address. RuggedCom...
The Destination zone or port field specifies the requests destination zone. The Protocol field specifies the protocol (tcp, udp or icmp) to match. The Source ports and Destination ports fields specifies the requests tcp or udp port numbers to match. RuggedCom...
The External interface field specifies the interface to perform the translation upon. The No IP alias field is used to tell the firewall not create the IP alias for the external address if it has not been created on the external interface yet. RuggedCom...
Add field. Reorder the translations by clicking on the arrows under the Move field. Clicking on a link under the Interface field will allow you to edit or delete the rule, as shown below. You may also make changes by manually editing the rule file. RuggedCom...
Page 132
RuggedRouter® User Guide This page intentionally blank RuggedCom...
HTTP traffic gets at least 20% and at most 50%, and all other traffic should get what is left over but only up to 50% of the bandwidth. The three TC menus would be configured as follows: TC Interfaces Interface Inbound Outbound bandwidth bandwidth eth1 5000kbit 5000kbit RuggedCom...
We mark all packets with no other matching rule to 4 since that represents the default class (as defined in TC Classes). This allows explicit traffic control of even unspecified network connections. RuggedCom...
The Out bandwidth field specifies the maximum outbound bandwidth that the interface can handle. Outbound traffic above this rate is delayed or potentially dropped. Bandwidth is specified in either kilobytes per second (kbps), or kilobits per second (kbit). RuggedCom...
The Mark to match field specifies what mark value this TC Class will match. The mark may be in the range 1..255 in decimal or hex. The Minimum rate field specifies the minimum bandwidth allocated to this class. The Maximum rate field specifies the maximum bandwidth allocated to this class. RuggedCom...
Page 137
The tos= option field allows you to define a classifier for the given value/mask combination of an IP packet's TOS byte. Note ToS field matches take precedence over the assigned mark The Save button saves the class changes to the TC configuration. The Delete button delete the class from the TC configuration. RuggedCom...
Clicking on a link in the Mark column will allow you to edit or delete a traffic classification rule, as shown below. The Manually Edit File button also allows you to make direct changes to the TC Rules configuration file. RuggedCom...
A mask may again be specified in the / field, to apply to both marks prior to comparison. Mark and mask may be in the range 1..255 in decimal or hex. The Length field specifies the packet length or length range to match. RuggedCom...
Using the above structure for the TC Rules table, only the first packet of any tcp or udp connection will have to go through all the rules, while every following packet will have its mark restored by the first rule, and then CONTINUE, skipping potentially many matching rules in the remainder of the table. RuggedCom...
IP datagram. The resultant packet is composed of an new IP header, IPSec headers, old IP header and IP payload. Tunnel mode is most commonly used between gateways, the gateway acting as a proxy for the hosts behind it. RuggedCom...
DES pass. 3DES is the most CPU intensive cipher. AES – The Advanced Encryption Standard protocol cipher uses a 128-bit • block and 128, 192 or 256-bit keys. This is the most secure protocol in use today, and is much preferred to 3DES due to its efficiency. RuggedCom...
ARP for that interface. This will cause the router to respond to ARP requests on behalf of the client and direct traffic to it over its connection. IPSec relies upon the following protocols and ports: RuggedCom...
Note that in the unlikely event that IPsec uses multiple network interfaces, a stop of any of those interfaces will cause all tunnels to stop. IPsec may have to be manually restarted after configuring network interfaces when multiple tunnels exist. RuggedCom...
The “Add a new IPsec VPN connection” link creates a new connection and its icon. The “Import connection from file” link creates new connections from imported data. Select the Server Configuration icon to configure server parameters. Select the Preshared Keys icon to create, delete and edit pre-shared keys. RuggedCom...
The Network interfaces for IPsec table configures the association between ipsec interfaces and the real interfaces upon which they become available. If the Default field is selected, Openswan will use its current default (Default route interface at the time of writing) to associate the named ipsec interface with. RuggedCom...
Select the links under the “Remote Address” column to edit or delete a secret key. The menu will not allow more than one entry to have a specific pair of IP addresses. The menu will not allow a password shorter than eight characters in length. RuggedCom...
The first section (IPsec VPN Connection Details) describes parameters relating to the connection itself. The next two sections (Left System's Settings, Right System's Settings) describe IP networking parameters and RSA signatures at each peer. These two sections are identical and are described once. RuggedCom...
The Perfect Forward Secrecy fields will enable PFS, causing keys to be exchanged in a manner which provides attackers that have compromised a key with no advantage in decoding previously intercepted packets or with subsequent packets. Not all clients support PFS. RuggedCom...
Configuration menu, Current Routing & Interface Table icon . A default route will be indicated by a “default” in the Destination column. Export Configuration Selecting the “Export Configuration” button provides a means to capture the connection specification in such a way as to be importable at the remote router. RuggedCom...
At least one set of values must match between the left- and right-hand side VPN devices. This is also frequently referred to as the Phase 1 parameters, because the key exchange process is the first thing to occur in establishing a VPN. RuggedCom...
Ensure that the the Certificate Authority generates certificates with a reasonable life and generates keys of at least 1024 bits in length. RuggedCom...
Enable IPSec from the Bootup and Shutdown menu. Visit the IPSec VPN menu and generate a public key. Visit the Server Configuration menu and associate the ipsec0 interface with the desired interface the connection will arrive on (here w1ppp). Create a connection for the clients. Set the parameters as follows: RuggedCom...
Ethernet interface that hosts the local network (here eth1) via the Networking Menu, Ethernet sub-menu boot time entry Proxy ARP setting. When a host on eth1 arps for the remote client address, the router will answer on behalf of the client. RuggedCom...
For fast convergence and recovery, OSPF is a much better choice. RIP is a fairly old routing protocol and has mostly been superseded by OSPF. RuggedCom...
The subnets at a particular router can be added to its OSPF Area. The router will advertise these subnets to all routers in its area. Note: OSPF areas must be designed such that no single link failure will cause the network to be split into two disjoint networks. RuggedCom...
Routes for subnets which are directly connected to the router but are not part of the OSPF area or RIP network can be advertised if “redistribute connected” is enabled in the OSPF or RIP Global Parameters. Static routes and other routes handled by the kernel can also be redistributed if redistribute kernel is enabled. RuggedCom...
If for example two routers are connected by lower speed wan and higher speed Ethernet links, packets on subnets native to the wan will still be forwarded via Ethernet because of cost. If antispoofing is enabled, the packet will be discarded at the peer OSPF router. RuggedCom...
2 and the switched network represent a remote site in which the routers supply a redundant gateway to the hosts via VRRP and the T1/E1 links supply a redundant network connection to the rest of the network. Figure 130: OSPF and VRRP Example RuggedCom...
Router 1 will fall back to the Router 1 – Router 2 wan link. Note that it would not be useful to leave the Ethernet 1.1.2.0/24 subnets out of the area and turn on redistribute connected as OSPF would not use the subnets for routing. RuggedCom...
The Core menu configures link related items such as link-detect and link cost. The RIP and OSPF menu configure these protocols for each interface. Enable Protocols Figure 132: Enable Protocols Menu This menu enables RIP and OSPF for dynamic routing. RuggedCom...
By default it uses the highest IP assigned to an interface on the router. It is recommended that this value be set to a unique fixed IP on each router. RuggedCom...
This menu contains the configuration and status of OSPF on the router. The OSPF Global Parameters, OSPF Interfaces and Network Areas menus configure OSPF. The Status and View OSPF Configuration menu display the actual status and configuration file contents of OSPF. RuggedCom...
Standard follows RFC2178, Cisco and IBM follow RFC3509. Shortcut is covered by the draft-ietf-ospf-shortcut-abr-00.txt document. Standard requires all ABRs to have a backbone connection. The other three methods allow for ABRs that do not have a backbone connection. RuggedCom...
Page 165
By default it uses the highest IP assigned to an interface on the router. It is recommended that this value be set to a unique fixed IP on each router. RuggedCom...
The Message Digest Keys fields allows for addition and deletion of keys to use for areas connected to this interface when authentication is set to message-digest. RuggedCom...
This status menu shows various pieces of information about the current OSPF status. The status of each interface is shown, the current database, the current OSPF neighbors and the current OSPF routing table. View OSPF Configuration This menu shows the current configuration file of OSPF. RuggedCom...
This is used by the telnet interface of ripd to control access to the configuration. The Telnet Password field sets the password to be used for telnet access to ripd. This is used as the login password of ripd when locally telnetting to port 2604 of the router. RuggedCom...
A key consists of a key string, which is the value used for authentication. It also has the optional lifetime to accept RIP messages with the key, and the optional lifetime to send RIP messages with that key. RuggedCom...
Some network topologies with rings of routers will still have some issues with aging out dead routes even with split horizon enabled but they will still age out faster. If fast network recovery is desired, use OSPF. RuggedCom...
This status menu shows various pieces of information about the current RIP status. The status of each interface is shown, the current database, the current RIP neighbors and the current RIP routing table. View RIP Configuration This menu shows the current configuration file of RIP. RuggedCom...
Page 172
® RuggedRouter User Guide This page intentionally blank RuggedCom...
In this way, failures of network links within the cloud are discovered. It is essential that the host always respond to the ping. Another option is to configure a dummy address within the router and ping that address. Figure 144: Link Backup Example RuggedCom...
This menu displays existing main:backup link relationships. Following the links under the Name field to an existing pair will edit them or adds a new one. The Apply Configuration button will apply changes by restarting the link backup daemon. RuggedCom...
The Main path down timeout field specifies the number of seconds the main trunk must be down before starting the backup trunk. The Main path up timeout field specifies the number of seconds the main trunk must have returned to service before stopping the backup trunk. RuggedCom...
Figure 150: Test Link Backup The test link backup menu tests a link backup by discarding all data received on the main interface. This convinces the daemon that the main trunk is unusable and forces it to fail over to the backup trunk. RuggedCom...
Page 177
Add to this a time that will allow time to navigate the Webmin menus to observe that Link Backup status, link states, and routing are all as expected before, during, and after the Link Backup test. RuggedCom...
Page 178
® RuggedRouter User Guide This page intentionally blank RuggedCom...
VRRP Terminology Each physical router running VRRP is known as a VRRP Router. Two or more VRRP Routers can be configured to form a “Virtual Router”. Each VRRP Router may participate in one or more Virtual Routers. RuggedCom...
Note that both routers can always be reached by the hosts at their “real” IP addresses. Two or more VRRP instances can be assigned to be in the same VRRP Group, in which case, they can failover together. RuggedCom...
These unsolicited ARPs teach the hosts and switches in the network of the current MAC address and port associated with the VRIP. The router will issue a second set of ARPs after the time specified by the Gratuitous ARP delay. RuggedCom...
The VRRP instances under the Name column define virtual IP groups. Clicking on a link will allow you to edit that instance. The VRRP groups under the Group Name column define virtual IP groups. Clicking on a link will allow you to add members to that group. RuggedCom...
The Virtual IP netmask prefix field configures the prefix of Virtual IP address netmask. The Save button saves the virtual instance. The Delete button deletes the virtual instance. After you save or delete an instance you must restart the daemon to action your change. RuggedCom...
The entries under the VRRP Interface State column reflect the link state of the interface that the instance runs upon. The entries under the Monitored Interface State column reflect the link state of the monitored interface or “none” if an interface is not configured. RuggedCom...
Type of Service (TOS) bits in its IP header are examined and used. It is possible to match on source and destination IP address/mask pairs, source and destination port numbers and protocols. The 0.0.0.0/0 address/mask matches any IP address. RuggedCom...
Descriptions Priority Queue Normal Service Normal Minimize Monetary Cost Maximize Reliability Normal MR+MMC Normal Maximize Throughput MT+MMC MT+MR MT+MR+MMC Minimize Delay High MD+MMC High MD+MR High MD+MR+MMC High MD+MT Normal MD+MT+MMC Normal MD+MT+MR Normal MD+MT+MR+MMC Normal RuggedCom...
Finally, note that the final traffic filter essentially suppresses TOS inspection by directing all unmatched traffic onto the “low” queue. RuggedCom...
Add field. You may also edit a manually created queue by following its link under the Queue Name column, and edit a filter by following it's “Edit” link. RuggedCom...
/etc/services file. This setting matches both udp and tcp ports, unless the Protocol field specifies udp or tcp. The Protocol field specifies a protocol to match against, currently either tcp, udp, icmp, ospf, vrrp or ipsec. The Target Queue field selects one of the available priority queues. RuggedCom...
RuggedCom recommends that the transmit queue length be left at its minimum default value of 1. Higher values, however, may strike a balance between latency an performance.
You may also set a cost for the tunnel. If another method of routing between Router1 and Router2 becomes available, the tunneled packets will flow through the lowest cost route. You can optionally restrict the packets by specifying the local egress device (in the case of router1, w1ppp). RuggedCom...
Note: Each tunnel must have a unique combination of local and remote addresses, or it will not be activated. The Cost field configures the routing cost associated with networking routing that directs traffic through the tunnel. The cost will default to zero if left unset. RuggedCom...
Page 193
The Local Egress Port configures a port to bind the tunnel to. If set, tunneled packets will only be routed via this port and will not be able to escape to another device when the route the to endpoint changes. RuggedCom...
Page 194
® RuggedRouter User Guide This page intentionally blank RuggedCom...
The lower part of the menu provides quick pinging, tracerouting and lookup of hosts. The upper part leads to menus providing more configurable options for these commands. Additionally, Ethernet, WAN and Serial port tracing is provided. A summary of interface statistics and the current routing table is provided. RuggedCom...
This can make ping behave very slowly if DNS is not properly configured. The Use ICMP instead of UDP? field causes traceroute to probe with ICMP packets. The How many Hops? field limits the maximum number of hops that traceroute will attempt to map. RuggedCom...
Frame Relay Interfaces and Serial server interfaces. The latter two menus will appear only if you have configured Frame Relay or Serial server interfaces. Tcpdump A Network Interface Figure 170: Tcpdump Menu The Interface to capture on field specifies the interface to show traffic on. RuggedCom...
The Maximum packets captured and Maximum capture time fields limits the amount of traffic captured. Serial Trace A Serial Server Port Figure 172: Serial Server Port Trace Menu The Trace on ports fields specify the serial port to show traffic on. RuggedCom...
Note that detailed statistics for T3, T1/E1, DDS and ADSL are available within the menus that configure those interfaces. Current Routing & Interface Table Figure 174: Current Routing & Interface Table RuggedCom...
The entries under the MTU field reflect the Maximum Transmission Unit size for the interface. The entries under the Txqueuelen field reflect the transmit queue length for the interface. RuggedCom...
Tracing Serial Port activity • Serial IP Port Features RuggedCom Serial IP provides the following features: Raw Socket Protocol -A means to transport streams of characters from one • serial port on the router, to a specific remote IP address and TCP port.
The host will sequentially poll each RTU. Each poll received by the host server is forwarded (i.e. broadcast) to all of the remote servers. All RTUs will receive the request and the appropriate RTU will issue a reply. The reply is returned to the host server, where it is forwarded to the host. RuggedCom...
This is usually the only packetizer selected when supporting ModBus communications. Finally, the server will always packetize and forward on a full packet, i.e. when the number of characters fills its communications buffer (1024 bytes). RuggedCom...
RTU. TcpModbus Concepts And Issues Host And Remote Roles Client gateways (such as that implemented by the RuggedRouter) always make the TCP connection to the Server Gateway. The Server Gateway can only accept a connection. RuggedCom...
RTU fails to respond to requests. Native TcpModbus polling packages will want to receive these messages. Immediate indication of a failure can accelerate recovery sequences and reduce the need for long timeouts. RuggedCom...
Steps 5-8 represent the case where the request is responded to by the RTU and is forwarded successfully to the master. It includes the “think time” for the RTU to process the request and build the response. RuggedCom...
Using the figures from the above paragraph, the server being busy would increase the end-to-end delay from 1000 to 1350 ms. The preceding analysis suggests that the Master should time-out at some time after 1350 ms from the start of transmission. RuggedCom...
IP Addresses in the DNP Device Address Table (whether learned or statically configured). When a DNP broadcast message is received from the IP network, it is transmitted on all local serial ports configured as DNP ports. RuggedCom...
If any of your serial ports are configured as RawSocket protocol, this menu will configure them. The Serial Protocols Statistics menu will show you the status and statistics for any established sessions. The Line Trace menu will provide a line activity trace for the serial ports. RuggedCom...
This menu configures the serial settings and electrical protocol associated with a serial port. Changes are made immediately. RawSocket Menu Figure 179: Raw Socket Menu This menu configures the Raw Socket settings for each port. Changes are made immediately. RuggedCom...
19200 Kbps and 256 char times + 192 ms at baud rates above 19200 Kbps. You may specify a larger value if you think your RTU will take longer to complete transmission than the calculated time. RuggedCom...
IP host. The address may be in the range 1 to 65520. Note that both local and remote serial ports must be properly configured. The Rem IP field configures the IP address of the remote host that provides a connection to the DNP device with the configured address. RuggedCom...
DNP device, i.e. the DNP device is attached to the serial port of remote IP host, the value of this parameter is 'Unknown'. Device Address Table This table displays all currently known active DNP devices. RuggedCom...
The Raw Socket Packet Errors field reflect the number of times that a network message was received and could not be enqueued at the serial port because of output buffering constraints. This is usually symptomatic of a remote peer that uses a higher baud rate or local flow control. RuggedCom...
Note: Specifying large numbers of ports, entries and capture times can result in a great deal of output. Specifying a large capture time may require the web page to wait that interval if activity is infrequent. RuggedCom...
Ethernet is inspected in order to determine which GOOSE group they are in. The frames are then encapsulated in network headers and forwarded (with MAC source and destination addresses intact) to the network as GOOSE packets. IEC61850 recommends that the MAC destination address should be in the range 01:0c:cd:01:00:00 to 01:0c:cd:01:01:ff. RuggedCom...
The GOOSE Tunnels and GOOSE Statistics menu configures and display statistics for these tunnels. The Activity Trace menu will provide a protocol trace. When enabled, any configuration changes may be made to take effect by selecting the Restart Layer 2 Tunnels daemon button. RuggedCom...
Figure 188: GOOSE Menu This menu configures a GOOSE tunnel. The Ethernet Interface field configures suitable (i.e. VLAN eligible) interfaces to listen for GOOSE frames upon. You may set this field to “none” if the intent is simply to relay network packets. RuggedCom...
The Refresh button will cause the page to be reloaded. The Continuous Display button will cause the browser to continuously reload the page showing the differences in statistics from the last display. The difference is not a real time rate in bytes or packets per second. RuggedCom...
The RTT Measurement field displays Beacon messages used for RTT measurement. Note: Specifying large numbers of ports, entries and capture times can result in a great deal of output. Specifying a large capture time may require the web page to wait that interval if activity is infrequent. RuggedCom...
Page 222
® RuggedRouter User Guide This page intentionally blank RuggedCom...
(a single physical networks for which distinct subnets of hosts coexist and request addresses) and groups. The meaning of each option is the same in each case, while the type of target determines which clients it applies to. RuggedCom...
Page 224
Server name: The hostname of the boot server. This only applies to • network booted clients. Lease length for BOOTP clients: How long the IP assigned to a BOOTP • client should be considered valid. RuggedCom...
2) Click 'add a subnet', and configure it for network address 192.168.1.0 with netmask 255.255.255.0. 3) Set the assigned address range to 192.168.1.101 - 192.168.1.200. 4) Click 'Create' then edit the subnet just created and click 'Edit Client Options'. 5) Set default routers to 192.168.1.1 and save. RuggedCom...
3) Enable the 'Disable NAK of option82 clients for this subnet?' option to prevent confusing some DHCP clients due to the client being on the same network as the DHCP server and the DHCP relay agent (the switch). 4) Save it then edit the subnet just created and click 'Edit Client Options'. RuggedCom...
12) Set the remote id to the switch MAC address (00:0A:DC:11:22:00 in this case). 13) Set the circuit id to the switches circuit id identifier to the port (00:01:00:02 for VLAN 1 port 2 on a RuggedCom switch). 14) Click 'Create'. 15) Click 'Save'.
Page 228
18) Set the remote id to the switch MAC address (00:0A:DC:11:22:00 in this case). 19) Set the circuit id to the switches circuit id identifier to the port (00:02:00:02 for VLAN 2 port 2 on a RuggedCom switch). 20) Click 'Create'. 21) Click 'Save'.
The Start Server button starts the server to check the configuration. To permanently enable DHCP you should enable it in the bootup and shutdown menu. The Apply Changes button applys new settings to the running DHCP server. Use this after making any changes to the configuration. RuggedCom...
The Network name field is a unique name to assign to the shared network. It could be the name of the interface the shared network is on, for example. Within a shared network you can great subnets, hosts, and groups of hosts. RuggedCom...
The Subnet description field is used to describe the subnet as desired. The Network address and Netmask fields of the subnet help to specify the span of assigned addresses. Within a subnet you can great hosts, groups of hosts, and address pools. RuggedCom...
Within a group you can create hosts. DHCP Host Configuration Figure 195: DHCP Host Configuration The Host description field is used to describe the host as desired. The Host name field is the unique name to refer to the host within the DHCP configuration. RuggedCom...
The Clients to allow/deny field can be used to control which clients can get IP address from the pool. See documentation for dhcpd3 for syntax and allowed values. Very rarely needed. The Allow unknown clients setting already handles the most common use of this option. RuggedCom...
Page 234
® RuggedRouter User Guide This page intentionally blank RuggedCom...
UDP offers. The NTP protocol uses port UDP port 123. Note that if your router employs a firewall and acts as a client it must open UDP port 123. Additionally, if the router acts as a server the firewall must allow connection requests on port 123 as well. RuggedCom...
NTP daemon about its current state and to request changes in that state. The ntptrace utility is a utility trace a chain of NTP servers back to the primary source. The ntp-keygen utility can be used to generate secure public keys for authentication. RuggedCom...
Set the Broadcast Client option to “Yes” if you wish to act on NTP broadcast messages. The default multicast address used for NTP is 224.0.1.1. Select a custom multicast address with the Custom address field if you wish to use a different addresses. RuggedCom...
NTP servers menu. The per-peer configuration information is as described in the previous menu. Viewing NTP Status Figure 200: NTP Status The NTP Status menu displays possible sources and currently used reference clocks RuggedCom...
The Number of Satellites shows how many satellites are currently being tracked by the GPS module. The Tracked Satellite Status table shows the ID and signal strength of tracked satellites. Viewing The GPS Log Figure 203: GPS Log The GPS Log menu displays the log of recent GPS events. RuggedCom...
Figure 204: SSH Server Note that the SSH server is enabled by default and may be disabled via the System folder, Bootup And Shutdown menu. When enabled, any configuration changes may be made to take effect by selecting the Apply Changes button. RuggedCom...
The Allow TCP forwarding field specifies whether TCP forwarding is permitted. If this option is set, clients on a remote network can tunnel TCP connections to machines on the RuggedRouter's network. RuggedCom...
ID is not recognized. By default, login is allowed for all groups. The account selector ( ) button can be user to build up a list of allowable groups. The Deny users and Deny members of groups fields specify users and groups to deny connections to. RuggedCom...
Page 244
® RuggedRouter User Guide This page intentionally blank RuggedCom...
Ethernet. The RuggedRouter provides a special hardware assisted PTP capability as provided by the RuggedCom PTP card. When used in conjunction with the cards Global Positioning System (GPS) receiver, the router can provide nanosecond accuracy via IEEE1588.
UTC format, broadcast at the start of each second. The RuggedRouter complies to IRIG Standard 200-04 generating formats IRIGB002 and IRIGB003 (PWM) and IRIGB122 and IRIGB123 (AM). RuggedCom...
When GPS returns, the time will be stepped back to the GPS reference clock. GPS Cable compensation GPS signals received by the antenna will be delayed in time depending upon the type and length of the cable to the router. This delay will introduce inaccuracy in the calculated time and position. RuggedCom...
The Reference Clock Selection field selects the order in which to prefer reference clocks. The Cable Compensation field specifies the value, in nanoseconds, that will be used to compensate for the cable type and length. The compensation is done using integer nanosecond values. Fractional decimal values will be truncated. RuggedCom...
The Treat NTP sync'd grandmaster as stratum field assigns the stratum number when grandmaster clock synchronized with remote NTP server but not GPS. The Treat Local Clock sync'd grandmaster as stratum field assigns the stratum number when grandmaster clock synchronized with local clock but not NTP server or GPS. RuggedCom...
The current local time on the router, the IEEE1588 status, IEEE1588 and UTC time, the offset from master in seconds, the master IP/MAC address and grandmaster MAC address are provided. IRIGB Log Figure 214: IRIGB GPS Status This page reflects reference clock changes in IRIG-B. RuggedCom...
The main Snort IDS menu provides the capability to disable individual and groups of rules. It is also possible to add unique rules to the database and to replace the existing set of rules with more experimental rules from the community. RuggedCom...
The router is capable of recording about 300 entries/second to the local syslog and 500 entries/second to the alert file. Alerts at rates exceeding the above rates will not be recorded. Snort will require 5 Mbytes of system memory to start with an additional 15 Mbytes of memory for each interface monitored. RuggedCom...
Figure 215: Snort Main Menu part 1 The Global Configuration menu section configures parameters that apply to all interfaces. Interfaces Figure 216: Snort Main Menu part 2 The Interfaces section selects the interfaces Snort will monitor. You must restart Snort after changing interfaces. RuggedCom...
It is possible to add your own rule, or one obtained from the open source community (e.g. www.bleedingsnort.com). Rule Lookup by SID The Look Up Rule button accepts a SID and displays its rule. You may elect to disable the rule or learn more information about it. RuggedCom...
Figure 220: Snort Preprocessors Preprocessors are plug-in modules that operate on the captured packets. Preprocessors perform a variety of transformations to make it easier for snort to classify packets. The configuration of preprocessors is beyond the scope of this user guide. RuggedCom...
Edit Config File Snort is extremely flexible and not all capabilities have been described in this user guide. This menu provides the user with the ability to make raw configuration changes to the snort configuration file from within Webmin. RuggedCom...
An alert filter is a user defined configuration to define the forwarders destination of active alerts. Any active alerts with Renotify Interval set to non-zero value and matches with the filter level will be forwarded to the defined forwarder destination. Alert Main Menu Figure 222: Alert Main Menu RuggedCom...
The Default Filter Level for Command Line configures the lowest alert level to show when user login by console or ssh. The Save button saves all changes of general configuration. The Create New Filter button allows you to create a new forwarder filter for active alerts. RuggedCom...
The Create New Definition button allows you to create a user defined alert definition entry. Click on one of the link under the Codepoint column allows you to change the configuration for that alert definition entry. RuggedCom...
The Parameters for Shell table allows user to configure additional parameters if the alert definition entry type is Shell. The Sample Interval configures how often should the system run configured shell command to get a sample. The Command configures the shell command to run. RuggedCom...
Page 261
The Falling Threshold configures the value that will trigger an event when the value of the variable decreases past this value. The Startup configures the condition that will cause the initial event. RuggedCom...
Industrial Defender Agent by: Configuring the IP addresses of the SEM unit and RuggedRouter • Launching a key exchange sequence with the SEM • Helping to configure remote system logging operation • RuggedCom...
SEM unit, and then click Obtain a new key. In case of error, e.g. a password mismatch, an error message to that effect will be shown at the top of the page. Figure 229: Industrial Defender Configuration - key obtained RuggedCom...
Industrial Defender Agent itself by enabling the idefender entry in the Bootup and Shutdown menu. A properly configured SEM unit will now be receiving data from the RuggedRouter. Please note that when the idefender process is stopped, the remote syslog entry to the SEM unit is automatically removed. RuggedCom...
IPv4 Visit the Network Interfaces sub-menu and assign interfaces to the zones. For • example, eth1 = net, eth2 = loc. Visit the Default Policies sub-menu and assign the following policies: Source zone Destination zone Policy ACCEPT ACCEPT DROP RuggedCom...
Gauntlet. Note that exposing any protocol or networked service has the potential of being a security risk and should not be done without good reason. Contact RuggedCom support for assistance if you wish to add other rules to the set recommended here.
The status menu provides a list of validated open connections. Figure 230: Gauntlet Security Appliance Menu Upgrading Gauntlet During an upgrade, the Gauntlet daemon may be required to restart. During the upgrade all existing Gauntlet protected connections will be closed. RuggedCom...
Note the following caveats: Chassis specific items such as serial number, hardware inventory and • MAC addresses are not saved, Log and history files are not saved, • Information stored in the root and user accounts are not saved. • RuggedCom...
The Save Archive Configuration to field specifies the configuration server hostname (or IP address) and the directory in which to save configuration archives. The Save Webmin Configuration to field specifies the configuration server hostname (or IP address) and the directory in which to save Webmin configuration archives. RuggedCom...
300 seconds. The timeout mechanism will be in place from the time the user presses the Start Configuration Rollback Monitoring button until he eventually goes back to the Configuration Rollback menu and presses the Accept Current Configuration button: Figure 235: Configuration Rollback menu ready to accept changes RuggedCom...
The Archives to upload fields select archives to upload to the router. The Browse... button will allow you to select an archive. Applying the Upload to Router button will upload the specified archive to the router. Archive Backup RuggedCom...
Otherwise Internet Explorer will rename the file after uploading, preventing its use in a subsequent archive restore. Archive Restore The restore process begins by selecting an archive to restore from. Following an archive link will restore the archive and reboot the router. RuggedCom...
The latestarchive and factorydefault archives are always able to be restored. Click on one of the links under Archive Name to start the restore. Starting the restore results in the following display. Figure 240: Start Restore To begin the restoring process, click the Start Restore button. RuggedCom...
Following the links under File Name column will show a files difference between the two targets. The difference will be shown by two methods. The difference between the two targets will be first be shown in a side by side scrollable comparison. RuggedCom...
Note that the copying configurations may not make any actual operating changes until the systems that own them are restarted. If the source archive has a file that is not present in the Current Configuration, it is possible to view that file and then copy it into Current Configuration. RuggedCom...
Bootup And Shutdown menu. Note: Prior to ROX 1.10.0, SNMP was manually configured used the com2sec, group, view and access directives. If so configured, the SNMP menu will prompt you to convert the configuration to one it can manage. RuggedCom...
Figure 247: Network Addressing Configuration Menu, Addresses to listen on The table of Addresses to listen on includes the list of currently configured and active IP addresses, and whether the address is currently listened on. The New field allows for the addition of other IP addresses. RuggedCom...
Figure 249: Access Control Menu, SNMP V3 The second part of the Access control menu allows creation and deletion of V3 users. The User Name field selects the name of the new user. The Access field determines whether the community is read-only or read/write. RuggedCom...
The SNMP V1 and V2c Trap Destinations part of the menu allows the creation and deletion of trap destinations. The Type field specifies the exchange used with this destination, either V1 trap, V2c trap or V2c inform. The IP address and Trap Community fields specifies the receivers IP address and community name. RuggedCom...
The Engine ID parameter is necessary for inform type notification destinations only, and must be configured by the trap receiver in order to receive these notifications. The Minimum Security, Authentication Protocol, Authentication Passphrase, Privacy Protocol and Privacy Passphrase fields are as described above. RuggedCom...
The MIB module for managing UDP implementations. SNMP-VIEW-BASED-ACM-MIB View-based Access Control Model for SNMP. SNMP-FRAMEWORK-MIB The SNMP Management Architecture MIB. SNMP-MPD-MIB The MIB for Message Processing and Dispatching. SNMP-USER-BASED-SM-MIB The management information definitions for the SNMP User-based Security Model. RuggedCom...
RuggedRouter will wait for a response. An authentication request could thus require up to the sum of the timeouts of all configured servers. The user has the option of designating different servers to authenticate either LOGIN, PPP or WEMBIN services separately or in combination. RuggedCom...
Figure 254: RADIUS Authentication Server Parameters This menu configures, tests and deletes RADIUS server entries. The Hostname/IP field configures the server IP address. The Port Number fields selects the default port number of 1812 or selects another specific port. RuggedCom...
Page 284
The Shared Secret field configures the unique password used by this server. The time Timeout field selects the maximal time to wait before trying the next server. The Service field configures whether the server authenticates LOGIN, WEBMIN, PPP LOGIN or any combination of these types. RuggedCom...
The Hostname field specifies the hostname to be written into the email header upon transmission. Helpful Hint You can generate emails from scheduled commands and scripts with “(echo "To: ops@myco"; echo -e "Subject: Hello!\n"; some-command) | sendmail -t”. RuggedCom...
The last power down time reflects the time power was removed from the chassis as a result of a power failure, commanded reboot or an watchdog initiated reboot. System alarms will be generated for out-of-range parameters and watchdog initiated reboots. RuggedCom...
RuggedRouter implements PoE mode A, supplying up to 400mA at up to 48V on pins 3 and 6 (T568A pair 2) and return on pins 1 and 2 (T568A pair 3). Figure 257: PoE pinout on 10/100BaseT port RuggedCom...
The Voltage, Current and Power columns show the voltage, current and power value (in unit of Volt, mill Ampere and Walt, respectively) when there is power delivery on this port. The Status column shows whether there is any error detected on this port. RuggedCom...
– This log catches reports of critical failures. There should never • be any messages in this log. Your RuggedCom support representative may ask you to inspect this file. kern.log – This log contains messages issued by the kernel (the most •...
System Logs sub-menu. Finally, you may forward all information to the remote logger by creating a new system log entry and specifying “All” Facilities and all priorities, and checking the Syslog server on field with an appropriate address. RuggedCom...
The major release number Y is increased when important new features are added. This is called a “Major” release. The minor release number Z is increased when minor functionality is added or bug repairs are made. This is called a “Minor” release. RuggedCom...
Automatic Upgrade It can be programmed to check a server on your network at a specific time each day, upgrading to the newest release. RuggedCom understands that some administrators may wish to pre-test package upgrades on specific machines before performing a network wide upgrade.
If you configure this field with a major/minor/patch release number such as “rr1.7.2”, the router will only upgrade from that release. The Bandwidth Limiting selector allows you to select the bandwidth available for upgrading software. RuggedCom...
Webmin will automatically restart after the upgrade completes, after which time you may log back in. Installing A New Package Figure 266: Installing A New Package The Install A New Package feature uploads and installs packages to the router. RuggedCom...
Log File of Last Upgrade” button on the Software Upgrade System page. Example of a post-upgrade script: The following post-upgrade script will send an email notification when upgrade completes (assuming SMTP is configured properly). #!/bin/bash echo "Subject: Software upgrade for Release rr1.9.0 on `hostname` completed" > /tmp/mail echo "To: controlcenter@ruggedcom.com" >> /tmp/mail echo "Software upgrade for Release rr1.9.0 on `hostname` completed at `date`" >> /tmp/mail echo >> /tmp/mail cat /tmp/mail | ssmtp controlcenter@ruggedcom.com rm f /tmp/mail...
You may specify the files path directly or click on the browse button to open a file search dialog box. Select the file to upload and close the dialog box. Then click the Upload to your host button. RuggedCom...
11.If using a firewall, configure and start the firewall before attaching the router to the public network. Configure the firewall to accept connections from a specific domain. 12. Configure remote system logging to forward all logs to a central location. RuggedCom...
Page 298
® RuggedRouter User Guide This page intentionally blank RuggedCom...
This host must be able to act as a web server or ftp server. The host must also be able to access the RuggedCom web site in order to download new releases of software from RuggedCom.
User Guide Upgrading The Repository RuggedRouter releases are obtained from the RuggedCom web site as ZIP files. Download the ZIP file to your regular and/or test release directories and unzip them. You may delete the original ZIP file if desired.
Administrators should also be wary of routers which concentrate locally connected routers as the upgrade bandwidth consumed on the network link could reach the sum of all bandwidth limiting settings. Routers using Frame Relay with CIR under-subscription may also encounter lengthier downloads because of retransmission. RuggedCom...
The release process involves the following steps: 1. The re-flashable image file is downloaded from RuggedCom to a web server. 2. The router to re-flash is attached via one of its Ethernet ports to the web server (either directly or via a network), configured and tested.
A number of customers have asked for advice and instructions on setting up a web server on Windows. RuggedCom recommends the Apache web server, because it is secure, robust, easy to install and configure as well as being able to be installed on a wide variety of Windows platforms.
Page 304
User Guide Return to the web browser used earlier to verify Apache and refresh the screen. It should now reflect the contents of your RuggedRouter release directory. You should now be able to perform an upgrade from a router. RuggedCom...
Visit the router you wish to upgrade and visit the Maintenance menu, Upgrade System sub-menu. Click on the Change Server button and set the Repository Server field (e.g. http:// 192.168.0.1/ruggedcom). Set the Release Version field to rr1. Save the configuration and return to the Maintenance menu. Set the Only show which packages would be upgraded radio button to No and click on the Upgrade Now button to start the upgrade.
Specific field, “privilege-level”, which is used by Webmin to assign assign specific capabilities to Webmin users on a per user basis. Currently, the only privilege-level is that of “root”, but RuggedCom will be introducing additional levels in upcoming releases. FreeRadius The following steps to add Vendor-Specific attributes to the freeradius RADIUS server.
2; in the Attribute format listbox, select String, in the Attribute value editbox, input the desired privilege level (in the above case, it is operator, in your case, currently you should input root). Figure 275: IAS Window – Configure VSA (RFC compliant) RuggedCom...
11. Click the “OK” button to save the Properties settings. 12. Now you are back to “Connect” window; enter your user name and password to begin the connection. More information about how to import a certificate in Windows XP/2000 can be found at the link: http://www.jacco2.dds.nl/networking/openswan-l2tp.html#Certificates RuggedCom...
Page 315
Index Policy Vs Route Based........................140 Preshared Keys..........................145 Public Key ..........................145 Server Configuration........................144 Showing Status..........................149 VRRP..............................Fundamentals..........................177 keepalived...........................177 wanpipemon............................196 Web Interface............................31 Router Software..........................300 Web Server.............................303 RuggedCom...
Need help?
Do you have a question about the RuggedRouter RX1000 and is the answer not in the manual?
Questions and answers