Ruggedcom Comandos
Ruggedcom Comandos
Work Instruction
Applicability
9
Document Status
Version
Date Reviewed
Prepared by
Reviewed by
Endorsed
Approved
1.0
4 February 2011
P Dunning/Signal
Standards Engineer
Manager Standards
Exec Manager
SS&P
Amendment Record
Version
Date Reviewed
1.0
4 February 2011
Clause
Description of Amendment
To support RuggedCom RS400 type approval.
Contents
1
Introduction ................................................................................................... 3
1.1
Purpose ................................................................................................... 3
1.2
Scope ..................................................................................................... 3
1.3
Definitions ............................................................................................... 3
Administration .......................................................................................... 4
2.2
Serial Protocols....................................................................................... 11
Version 1.0
2.3
2.4
2.5
VLANs .................................................................................................. 20
2.6
2.7
Multicast Filtering.................................................................................... 23
2.8
2.9
3.2
Firmware ...................................................................................................... 29
Page 2 of 29
Introduction
1.1
Purpose
This work instruction details requirements for the set up and configuration of the RuggedCom
RS400 for use with Microlok II and/or Phoenix signals control systems.
1.2
Scope
It is primarily directed for use with Microlok Interlockings using a fibre redundant ring
system within ARTC but it is not necessarily limited to that use.
This document should be used in conjunction with a detailed Network design.
This document also describes other relevant information or limitations.
1.3
Definitions
The following definitions are used within this document:
Version 1.0
Page 3 of 29
CONFIGURATION SETTINGS
2.1
Administration
IP Interfaces (ipIfCfg)
Provide the ability to configure IP interfaces.
1 of 16 entries used.
Type
Synopsis: { VLAN }
Default: VLAN
Specifies the type of the interface for which this IP interface is created.
ID
Synopsis: 1 to 4094
Default: 1 (Default is native VLAN) (Assigned as per the network design)
Specifies the ID of the interface for which this IP interface is created. If interface type is VLAN,
represents VLAN ID.
Mgmt
Synopsis: { No, Yes }
Default: No ( This setting is required to be turned on for access to management via Ethernet)
Specifies whether the IP interface is the device management interface.
IP Address Type
Synopsis: { Static, Dynamic, DHCP, BOOTP }
Default: Static
Specifies whether the IP address is static or dynamically assigned via DHCP or BOOTP. Option
DYNAMIC is a common case of dynamically assigned IP address. It switches between BOOTP and
DHCP until it gets the response from the relevant server.
Must be static for non management interfaces
IP Address
Synopsis: ###.###.###.### where ### ranges from 0 to 255
Default: 192.168.0.1
(Assigned as per the network design)
Specifies the IP address of this device. An IP address is a 32-bit number that is notated by using four
numbers from 0 through 255, separated by periods. Only a unicast IP address is allowed which
ranges from 1.0.0.0 to 233.255.255.255
Subnet
Synopsis: ###.###.###.### where ### ranges from 0 to 255
Default: 255.255.255.0
(Assigned as per the network design)
Specifies the IP subnet mask of this device. An IP subnet mask is a 32-bit number that is notated by
using four numbers from 0 through 255, separated by periods. Typically, subnet mask numbers use
either 0 or 255 as values (e.g. 255.255.255.0) but other numbers can appear.
IP Gateways (GatewayCfg)
Provide the ability to configure gateways.
1 of 10 entries used. Multiple Path can be set
Destination
Synopsis: ###.###.###.### where ### ranges from 0 to 255
Default:
(Assigned as per the network design)
Specifies the IP address of destination network or host. For default gateway, both the destination
and subnet are 0.
Subnet
Synopsis: ###.###.###.### where ### ranges from 0 to 255
Default:
(Assigned as per the network design)
Specifies the destination IP subnet mask. For default gateway, both the destination and subnet are
0.
Gateway
Synopsis: ###.###.###.### where ### ranges from 0 to 255
Version 1.0
Page 4 of 29
Default:
(Assigned as per the network design)
Specifies the gateway to be used to reach the destination.
IP Services (ipServices)
Provide the ability to configure IP connection parameters such as address, network mask and
gateway, and other IP services provided by the device.
Inactivity Timeout
Synopsis: 1 min to 60 min or { Disabled }
Default: 5 min
Specifies when the console will timeout and display the login screen if there is no user activity. A
value of zero disables timeouts for console and Telnet users. For Web Server users maximum
timeout value is limited to 30 minutes.
Telnet Sessions Allowed
Synopsis: 0 to 4
Default: 4
Limits the number of Telnet sessions. A value of zero prevents any Telnet access.
Web Server Users Allowed
Synopsis: 1 to 16
Default: 16
Limits the number of simultaneous web server users.
TFTP Server
Synopsis: { Disabled, Get Only, Enabled } (used by Maintenance Tools)
Default: Get Only
As TFTP is a very insecure protocol, this parameter allows user to limit or disable TFTP Server
access.
DISABLED - disables read and write access to TFTP Server
GET ONLY - only allows to read files via TFTP Server
ENABLED - allows to read and write files via TFTP Server
ModBus Address
Synopsis: 1 to 254 or { Disabled }
Default: Disabled
Determines the Modbus address to be used for Management through Modbus.
SSH Sessions Allowed
Synopsis: 1 to 4
Default: 4
Limits the number of SSH sessions.
RSH Server
Synopsis: { Disabled, Enabled }
Default: Enabled
Disables/enables Remote Shell access.
Page 5 of 29
enter name, phone number, email, etc. It is displayed in the login screen so that this person may be
contacted should help be required.
Login Banner
Synopsis: { Standard, Custom }
Default: Standard
Provides ability to select what banner to display on login screen.
User can configure device to display standard version of Ruggedcom banner, or the custom banner
text provided in the file banner.txt.
Passwords (passwordCfg)
Provides ability to configure usernames&passwords and authorization/authentication type. Passwords
and usernames can be up to fifteen characters long and must not contain spaces. Three groups of
passwords and names can be programmed, which correspond to three access levels.
Auth Type
Synopsis: { Local, RADIUS, TACACS+, RADIUSorLocal, TACACS+orLocal }
Default: Local
(Assigned as per the network design)
Password can be authenticated using locally configured values, or remote RADIUS or TACACS+
server. Setting value to any of combinations that involve RADIUS or TACACS+ require Security
Server Table to be configured.
Settings:
Local - authentication from local Password Table
RADIUS - authentication using RADIUS server
TACACS+ - authentication using TACACS+ server
RADIUSOrLocal - authentication using RADIUS.
If server can not be reached, authenticate
from local Password Table
TACACS+OrLocal - authentication using TACACS+.
If server can not be reached, authenticate
from local Password Table
Page 6 of 29
This setting determines how frequently the (S)NTP server is polled for a time update. If the server
cannot be reached, three attempts are made at one minute intervals and then an alarm is generated
at which point the programmed rate is resumed.
Time Source (TimeSyncSrc)
Provides ability to configure the device time source.
Primary Time Source
Synopsis: { LOCAL CLK, IRIGB, NTP Server }
Default: NTP Server
To select primary time source for the device. Possible values are LOCAL CLK (local clock), IRIGB and
NTP Server. Change in time source might result in step change in time.
SNMP
SNMP Users (snmpV3UsersCfg)
Page 7 of 29
Provides ability to map configuration of security model and security name into a group
name, which is used to define an access control policy.
1 of 32 entries used.
Security Model
Synopsis: { snmpV1, snmpV2c, snmpV3 }
(4site uses v2)
Default: snmpV3
The Security Model that provides name referenced in this table.
Name
Synopsis: Any 32 characters
Default:
The user name which is mapped by this entry to the specified group name.
Group
Synopsis: Any 32 characters
Default:
The group name to which the security model and name belong. This name is used as index
to SNMPv3 VACM Access Table.
SNMP Access (snmpV3AccessCfg)
Version 1.0
Page 8 of 29
This parameter identifies the MIB tree(s) to which this entry authorizes write access. If the
value is noView, then no write access is granted.
NotifyViewName
Synopsis: { noView, V1Mib, allOfMib }
Default: noView
This parameter identifies the MIB tree(s) to which this entry authorizes access for
notifications. If the value is noView, then no access for notifications is granted.
(NOT USED)
These parameters provide the ability to configure RADIUS server for management and
802.1x authentication.
RADIUS Server (radiusCfg)
Server
Synopsis: Any 8 characters
Default: Primary
This field tells whether this configuration is for a Primary or a Backup Server
IP Address
Synopsis: ###.###.###.### where ### ranges from 0 to 255
Default:
The Server IP Address.
Auth UDP Port
Synopsis: 1 to 65535
Default: 1812
The authentication Port on server.
Auth Key
Synopsis: 31 character ascii string
Default:
The authentication key to be shared with server.
Confirm Auth Key
Synopsis: 31 character ascii string
The authentication key to be shared with server.
(NOT USED)
These parameters provide the ability to configure TACACS+ server for device access
control.
TACACS Plus Server (tacPlusCfg)
Server
Synopsis: Any 8 characters
Default: Primary
This field tells whether this configuration is for a Primary or a Backup Server
IP Address
Synopsis: ###.###.###.### where ### ranges from 0 to 255
Default:
The Server IP Address.
Auth TCP Port
Synopsis: 1 to 65535
Default: 49
The authentication Port on server.
Auth Key
Synopsis: 31 character ascii string
Default: mySecret
The authentication key to be shared with server.
Version 1.0
Page 9 of 29
(NOT USED)
Provides the ability to configure the switch to act as DCHP Relay Agent (using DHCP Option
82).
DHCP Server Address
Synopsis: ###.###.###.### where ### ranges from 0 to 255
Default:
IP address of the DHCP server to which DHCP queries will be forwarded from this Relay
Agent.
DHCP Client Ports
Synopsis: Any combination of numbers valid for this parameter
Default: None
Ports where DHCP clients are connected.
Examples:
All - all ports of the switch can have DHCP clients connected.
2,4-6,8 - ports 2,4,5,6 and 8 can have DHCP clients connected
Syslog
Local Syslog (LocalSyslogLevelCfg)
This parameter provide the ability to configure syslog client port number.
UDP Port
Synopsis: 1025 to 65535 or { 514 }
Default: 514
The local UDP port through which client sends information to server(s).
(NOT USED)
Provides the ability to configure syslog server IP address, port number, facility name and
severity level.
0 of 5 entries used.
Remote Syslog Server (RemoteSyslogConfig)
IP Address
Synopsis: ###.###.###.### where ### ranges from 0 to 255
Default:
Syslog server IP Address.
UDP Port
Synopsis: 1025 to 65535 or { 514 }
Default: 514
The UDP port number on which remote server listens.
Facility
Synopsis: { USER, LOCAL0, LOCAL1, LOCAL2, LOCAL3, LOCAL4, LOCAL5, LOCAL6, LOCAL7
}
Default: LOCAL7
Version 1.0
Page 10 of 29
Syslog facility name - { USER, LOCAL0, LOCAL1, LOCAL2, LOCAL3, LOCAL4, LOCAL5,
LOCAL6, LOCAL7 }.
Severity
Synopsis: { EMERGENCY, ALERT, CRITICAL, ERROR, WARNING, NOTICE, INFORMATIONAL
, DEBUGGING }
Default: DEBUGGING
Syslog severity level - {EMERGENCY, ALERT, CRITICAL, ERROR, WARNING, NOTICE,
INFORMATIONAL, DEBUGGING}.
2.2
Serial Protocols
The Ruggedcom serial ports will be configured generally for three purposes.
1. Microlok Vital Data
2. Microlok Non-Vital
3. Microlok Maintenance Port.
These parameters provide the ability to configure a protocol to be supported on the serial port and
serial port settings.
Port
Synopsis: 1 to 4
Default: 1 (Assigned as per the network design)
The port number as seen on the front plate silkscreen of the switch.
Name
Synopsis: Any 15 characters
Default: Port 1
(Assigned as per the network design)
A descriptive name that may be used to identify the device connected on that port.
Protocol
Synopsis: { None, RawSocket, ModbusServer, ModbusClient, DNP, WIN, TIN, Microlok, MirroredBits,
PreemptRawSocket }
Default: None
The serial protocol supported on this serial port.
(Assigned as per the network design)
Dependant on intended use of port
Microlok = Vital Microlok
RawSocket = Non-Vital Microlok or Microlok Maintenance
Type
Synopsis: { RS232, RS485, RS422 }
Default: RS232
A serial port interface type.
(Assigned as per the network design)
Dependant on connected Microlok port.
ForceHD
Synopsis: { On, Off }
Default: Off
Enables forcing half duplex mode of operation. While sending data out of the serial port all received
data are ignored. This mode of operation is available only on ports that operate in full duplex mode.
Baud
Synopsis: 100 to 230400
Default: 9600
The baud rate at which to operate the port.
(Assigned as per the network design)
Dependant on Microlok port configuration Baud rate
Version 1.0
Page 11 of 29
Data Bits
Synopsis: { 7, 8 }
Default: 8
The number of data bits to operate the port with.
Stop
Synopsis: { 1, 1.5, 2 }
Default: 1
The number of stop bits to operate the port with.
Parity
Synopsis: { None, Even, Odd }
Default: None
The parity to operate the port with.
Turnaround
Synopsis: 0 ms to 1000 ms
Default: 0 ms
The amount of delay (if any) to insert between the transmissions of individual messages out the
serial port.
DSCP
Synopsis: 0 to 63
Default: 0
DSCP - to set the DS byte in the IP header. DS byte setting is supported in the egress direction only.
Configure Protocols
Protocol (rawsockPortCfg)
These parameters provide the ability to configure RawSocket settings for ports. If no ports appear,
then a RawSocket protocol must first be assigned to the port in the Configure Serial Protocol menu
This sets the raw socket protocol settings. Use for Microlok Non-Vital Microlok Maintenance.
Port
Synopsis: 1 to 4
Default: 1 (Assigned as per the network design)
The port number as seen on the front plate silkscreen of the switch.
Pack Char
Synopsis: 0 to 255 or { Off }
246
Default: 2
The character that can be used to force forwarding of accumulated data to the network. If a
packetization character is not configured, accumulated data will be forwarded based upon the
packetization timeout parameter.
Pack Timer
Synopsis: 3 ms to 1000 ms
Default: 10 ms
The delay from the last received character until when data is forwarded.
Pack Size
Synopsis: 64 to 1400 or { Maximum }
Default: Maximum
Maximum number of bytes received from serial port to be packed in one IP packet.
Flow Control
Synopsis: { None, XON/XOFF }
Default: None
Whether to use XON-XOFF flowcontrol on the port.
Transport
Synopsis: { TCP, UDP }
Default: TCP
The network transport used to transport protocol data over IP network.
Call Dir
Synopsis: { In, Out, Both }
Default: In
Version 1.0
Page 12 of 29
Page 13 of 29
Default: 60000
A local port number on which protocol listens to UDP datagrams or TCP connections.
Link Stats
Synopsis: { Disabled, Enabled }
Default: Enabled
Enables links statistics collection for protocol.
DSCP
Synopsis: 0 to 63
Default: 0
DSCP - to set the DS byte in the IP header. DS byte setting is supported in the egress direction only.
Device Address Table (sdaConfigTable)
2.3
Ethernet Ports
Version 1.0
Page 14 of 29
Port
Synopsis: 1 to 4
Default: 0 (Assigned as per the network design)
The port number as seen on the front plate silkscreen of the switch.
Name
Synopsis: Any 15 characters
Default: Port x
(Assigned as per the network design)
A descriptive name that may be used to identify the device connected on that port.
Media
Dependant on Port
Synopsis: { 100TX, 10FL, 100FX, 1000X, 1000T, 802.11g, EoVDSL, 100TX }
The type of the port media.
Ports 1 and 2 (Fibre) = 100FX
Ports 3 and 4 (Copper) = 100TX
State
Synopsis: { Disabled, Enabled }
Default: Enabled
Disabling a port will prevent all frames from being sent and received on that port. Also, when
disabled link integrity signal is not sent so that the link/activity LED will never be lit. You may want
to disable a port for troubleshooting or to secure it from unauthorized connections.
(Assigned as per the network design)
Any port that is not in use can be disabled if unauthorised use is desired.
AutoN
Synopsis: { On, Off }
Default: On
Enable or disable IEEE 802.3 auto-negotiation. Enabling auto-negotiation results in speed and duplex
being negotiated upon link detection; both end devices must be auto-negotiation compliant for the
best possible results. 10Mbps and 100Mbps fibre optic media do not support auto-negotiation so
these media must be explicitly configured to either half or full duplex. Full duplex operation requires
that both ends are configured as such or else severe frame loss will occur during heavy network
traffic
Speed
Synopsis: { Auto, 10M, 100M }
Default: Auto
Speed (in Megabit-per-second or Gigabit-per-second). If auto-negotiation is enabled, this is the
speed capability advertised by the auto-negotiation process. If auto-negotiation is disabled, the port
is explicitly forced to this speed mode.
AUTO means advertise all supported speed modes.
Dupx
Synopsis: { Auto, Half, Full }
Default: Auto
Duplex mode. If auto-negotiation is enabled, this is the duplex capability advertised by the autonegotiation process. If auto-negotiation is disabled, the port is explicitly forced to this duplex mode.
AUTO means advertise all supported duplex modes.
FlowCtrl
Synopsis: { On, Off }
Default: Off
Flow Control is useful for preventing frame loss during times of severe network traffic. Examples of
this include multiple source ports sending to a single destination port or a higher speed port bursting
to a lower speed port.
When the port is half-duplex it is accomplished using 'backpressure' where the switch simulates
collisions causing the sending device to retry transmissions according to the Ethernet backoff
algorithm. When the port is full-duplex it is accomplished using PAUSE frames which causes the
sending device to stop transmitting for a certain period of time.
LFI
Synopsis: { Off }
Default: Off
Enabling Link-Fault-Indication (LFI) inhibits transmitting link integrity signal when the receive link
Version 1.0
Page 15 of 29
has failed. This allows the device at far end to detect link failure under all circumstances.
NOTE: this feature must not be enabled at both ends of a link.
Alarm
Synopsis: { On, Off }
Default: On
Disabling link state alarms will prevent alarms and LinkUp and LinkDown SNMP traps from being sent
for that port.
Page 16 of 29
2.4
Spanning Tree
Page 17 of 29
Root and Designated bridges can be configured for a particular topology. The bridge with the lowest
priority will become root. In the event of a failure of the root bridge, the bridge with the next lowest
priority will then become root. Designated bridges that (for redundancy purposes) service a common
LAN also use priority to determine which bridge is active. In this way careful selection of Bridge
Priorities can establish the path of traffic flows in normal and abnormal conditions.
Hello Time
Synopsis: 1 s to 10 s
Default: 2 s
Time between configuration messages issued by the root bridge. Shorter hello times result in faster
detection of topology changes at the expense of moderate increases in STP traffic.
Default used under general conditions but may be changed under design requirements
Max Age Time
Synopsis: 6 s to 40 s 28s
Default: 20 s
The time for which a configuration message remains valid after being issued by the root bridge.
Configure this parameter with care when many tiers of bridges exist, or slow speed links (such as
those used in WANs) are part of the network
Default used under general conditions but may be changed under design requirements
Transmit Count
Synopsis: 3 to 100
Default: 32
Maximum number of configuration messages on each port that may be sent in a special event (such
as recovering from a failure or bringing up a new link). After the maximum number of messages is
reached, RSTP will be limited to 1 message per second. Larger values allow the network to recover
from failed links more quickly. If RSTP is being used in a ring architecture the transmit count should
be larger than the number of switches in the ring.
Default used under general conditions but may be changed under design requirements
Forward Delay
Synopsis: 4 s to 30 s
Default: 15 s
The amount of time a bridge spends learning MAC addresses on a rising port before beginning to
forward traffic. Lower values allow the port to reach the forwarding state more quickly, but at the
expense of flooding unlearned addresses to all ports.
Max Hops
Synopsis: 6 to 40
Default: 20
This parameter is only relevant for MSTP - ignore it otherwise.
This parameter specifies the maximum possible bridge diameter inside an MST region. MSTP BPDUs
propagating inside an MST region carry a time-to-live parameter decremented by every switch that
propagates the BPDU. If the maximum number of hops inside the region exceeds the configured
maximum, BPDUs may be discarded due to their time-to-live information.
Default used under general conditions but may be changed under design requirements
Cost Style
Synopsis: { STP (16 bit), RSTP (32 bit) }
Default: STP (16 bit)
This parameter selects the style of link costs to employ. STP uses 16-bit path costs based upon
1x10E9/link speed (4 for 1Gbps, 19 for 100 Mbps and 100 for 10 Mbps) whereas RSTP uses 32-bit
costs based upon 2x10E13/link speed (20,000 for 1Gbps, 200,000 for 100 Mbps and 2,000,000 for
10 Mbps).Note that RSTP link costs are used only when the bridge version support is set to allow
RSTP and the port does not migrate to STP.
BPDU Guard Timeout
Synopsis: 1 s to 86400 s or { Until reset, Don't shutdown }
Default: Don't shutdown
The RSTP standard does not address network security. RSTP must process every received BPDU and
take an appropriate action. This opens a way for an attacker to influence RSTP topology by injecting
RSTP BPDUs into the network.
Version 1.0
Page 18 of 29
BPDU Guard is a feature that protects the network from BPDUs received by a port where RSTP
capable devices are not expected to be attached. If a BPDU is received by a port for which 'Edge'
parameter is set to 'TRUE' or RSTP is disabled, the port will be shutdown for the time period
specified by this parameter.
DON'T SHUTDOWN - BPDU Guard is disabled
UNTIL RESET - port will remain shutdown until the port reset command is issued by the user
Version 1.0
Page 19 of 29
Point to Point
Synopsis: { False, True, Auto }
Default: Auto
RSTP uses a peer to peer protocol that provides for rapid transitioning on point-to-point links. This
protocol is automatically turned off in situations where multiple STP bridges communicate over a
shared (non point-to-point) LAN. The bridge will automatically take point-to-point to be true when
the link is found to be operating full duplex. The point-to-point parameter allows this behaviour or
overrides it, forcing point-to-point to be true or false. Force the parameter true when the port
operates a point-to-point link but cannot run the link full duplex. Force the parameter false when the
port operates the link full duplex, but is still not point to point (e.g. a full duplex link to an
unmanaged bridge that concentrates two other STP bridges).
(Assigned as per the network design) AUTO NOT TO BE USED
PORTS CONTAINED IN RING SHOULD BE SET TO TRUE
Restricted Role
Synopsis: True or False
Default: False
A Boolean value set by management. If TRUE causes the Port not to be selected as Root Port for the
CIST or any MSTI, even it has the best spanning tree priority vector. Such a Port will be selected as
an Alternate Port after the Root Port has been selected. This parameter should be FALSE by default.
If set, it can cause lack of spanning tree connectivity. It is set by a network administrator to prevent
bridges external to a core region of the network influencing the spanning tree active topology,
possibly because those bridges are not under the full control of the administrator.
Restricted TCN
Synopsis: True or False
Default: False
A Boolean value set by management. If TRUE causes the Port not to propagate received topology
change notifications and topology changes to other Ports. This parameter should be FALSE by
default. If set it can cause temporary loss of connectivity after changes in a spanning trees active
topology as a result of persistent incorrectly learned station location information. It is set by a
network administrator to prevent bridges external to a core region of the network, causing address
flushing in that region, possibly because those bridges are not under the full control of the
administrator or MAC_Operational for the attached LANs transitions frequently.
2.5
VLANs
VLAN-aware
Synopsis: { No, Yes }
Default: Yes
Set either VLAN-aware or VLAN-unaware mode of operation.
Version 1.0
Page 20 of 29
Default:
Provides a description of the VLAN purpose (for example, Engineering VLAN).
Generally VLANS NOT USED with no entries
May be assigned with appropriate network design
Forbidden Ports
Synopsis: Any combination of numbers valid for this parameter
Default: None
Ports that are disallowed to be members of the VLAN.
Examples:
None - all ports of the switch are allowed to be members of the VLAN
2,4-6,8 - all ports except ports 2,4,5,6 and 8 are allowed to be members of the VLAN
IGMP
Synopsis: { On, Off }
Default: Off
Enable or disable IGMP Snooping on the VLAN.
MSTI
Synopsis: 0 to 16
Default: 0
This parameter is only valid for Multiple Spanning Tree Protocol (MSTP) and has no effect, if MSTP is
not used.
The parameter specifies Multiple Spanning Tree Instance (MSTI) the VLAN should be mapped to.
Version 1.0
Page 21 of 29
GVRP
Synopsis: { Disabled, Adv Only, Adv&Learn }
Default: Disabled
Configures GVRP (Generic VLAN Registration Protocol) operation on the port. There are several GVRP
operation modes:
DISABLED - the port is not capable of any GVRP processing.
ADVERTISE ONLY - the port will declare all VLANs existing in the switch (configured or learned) but
will not learn any VLANs.
ADVERTISE & LEARN - the port will declare all VLANs existing in the switch (configured or learned)
and can dynamically learn VLANs.
Only Trunk ports are GVRP capable.
2.6
Class of Service
NOT USED
Version 1.0
Page 22 of 29
CoS
Synopsis: { Normal, Medium, High, Crit }
Default: Normal
CoS assigned to received tagged frames with the specified IEEE 802.1p priority value.
2.7
Multicast Filtering
Version 1.0
Page 23 of 29
The port number as seen on the front plate silkscreen of the switch (or a list of ports, if aggregated
in a port trunk).
GMRP
Synopsis: { Disabled, Adv Only, Adv&Learn }
Default: Disabled
Configures GMRP (GARP Multicast Registration Protocol) operation on the port. There are several
GMRP operation modes:
DISABLED - the port is not capable of any GMRP processing.
ADVERTISE ONLY - the port will declare all MCAST addresses existing in the switch (configured or
learned) but will not learn any MCAST addresses.
ADVERTISE & LEARN - the port will declare all MCAST Addresses existing in the switch (configured or
learned) and can dynamically learn MCAST addresses.
ENTRIES for all Firmware versions prior to 3-8-2 (See Section 5 Firmware)
01-00-0C-00-00-00
01-00-0C-CC-CC-CC
AB-00-00-02-00-00
VID
Synopsis: 1 to 4094
Default: 1
VLAN Identifier of the VLAN upon which the multicast group operates.
CoS
Synopsis: { Normal, Medium, High, Crit }
Default: Normal
Specifies what Class Of Service is assigned to the multicast group frames
Ports
Synopsis: Any combination of numbers valid for this parameter
Default: None
Ports to which the multicast group traffic is forwarded.
2.8
MAC Address
Page 24 of 29
switch will still be forwarding traffic to that port, thus preventing that traffic from reaching its
destination via the new network topology. This parameter allows to age-out all MAC addresses
learned on a failed port immediately upon link failure detection.
NOT USED
MAC Address
Synopsis: ##-##-##-##-##-## where ## ranges 0 to FF
Default: 00-00-00-00-00-00
MAC address that is to be statically configured.
VID
Synopsis: 1 to 4094
Default: 1
VLAN Identifier of the VLAN upon which the MAC address operates.
Port
Synopsis: 1 to 4
Default: 1
Enter the port number upon which the device with this address is located.
CoS
Synopsis: { Normal, Medium, High, Crit }
Default: Normal
Set this parameter to prioritize the traffic for specified address.
2.9
Network Discovery
Global LLDP Parameters (lldpGlobalCfg)
State
Synopsis: { Disabled, Enabled }
Default: Enabled
Enables LLDP protocol. Note that LLDP is enabled on a port when LLDP is enabled globally
and along with enabling per port setting in Port LLDP Parameters menu.
Tx Interval
Synopsis: 5 s to 32768 s
Default: 30 s
The interval at which LLDP frames are transmitted on behalf of this LLDP agent.
Tx Hold
Synopsis: 2 to 10
Default: 4
The multiplier of the Tx Interval parameter that determines the actual time-to-live (TTL)
value used in a LLDPDU. The actual TTL value can be expressed by the following formula:
TTL = MIN(65535, (Tx Interval * Tx Hold))
Reinit Delay
Synopsis: 1 s to 10 s
Default: 2 s
The delay in seconds from when the value of Admin Status parameter of a particular port
becomes 'Disabled' until re-initialization will be attempted.
Tx Delay
Synopsis: 1 s to 8192 s
Default: 2 s
The delay in seconds between successive LLDP frame transmissions initiated by value or
status changed. The recommended value is set by the following formula:
1 <= txDelay <= (0.25 * Tx Interval)
Version 1.0
Page 25 of 29
Version 1.0
Page 26 of 29
Default: Off
Enables sending SNMP trap for this alarm.
Log
Synopsis: { On, Off }
Default: Off
Enables logging occurrence of this alarm in syslog.txt.
Dependent on Setting in Section 4 ALARM SETTINGS
LED&Relay
Synopsis: { On, Off }
Default: Off
Enables LED and fail safe relay control for this alarm. If latching is not enabled, this field will remain
disabled as well.
Dependent on Setting in Section 4 ALARM SETTINGS
Refresh Time
Synopsis: 0 s to 60 s
Default: 60 s
Refreshing time for this alarm.
3.1
Types of Alarms:
Active Alarms
Active alarms are ongoing. They signify states of operation that are not in accordance with normal
operation. Examples of active alarms include links that should be up but are not or error rates that
are continuously exceeding a certain threshold.
Active alarms are removed (cleared) either by solving the original cause of the alarm or by explicitly
clearing the alarm itself.
Passive alarms
Passive alarms are historic in nature. They signify events that represented abnormal conditions in
the past, and do not affect the current operational status. Examples of passive alarms include
authentication failures or error rates that temporarily exceeded a certain threshold.
Passive alarms are cleared through the Clear Alarms option under the diagnostics menu. RMON
generated alarms are passive.
These alarms will be indicated through the Train Control System. Therefore careful consideration
needs to be made in which alarms are enabled so that superfluous alarms are not displayed.
Note
Alarms are volatile in nature. All alarms (active and passive) are cleared at start up.
Version 1.0
Page 27 of 29
3.2
Recommended Configuration
The recommended Alarm configuration is based on suitability of alarms for the maintainer and
operator. There are two forms of Ruggedcom alarms are conveyed. These are through Relay and
SNMP. Relay is generally conveyed to the Train Control System. SNMP can be conveyed to other
alarm management systems. Relay method should convey most critical alarms which would impact
on the system. All other alarms should be logged and conveyed through other methods.
Alarms (alarmsCfg)
Name -
Version 1.0
Name
Latch
Trap
Log
LED&Relay
OFF
OFF
OFF
OFF
OFF
OFF
OFF
OFF
ON
OFF
OFF
OFF
OFF
OFF
OFF
OFF
OFF
OFF
OFF
OFF
OFF
OFF
OFF
OFF
OFF
OFF
OFF
OFF
OFF
OFF
OFF
OFF
OFF
OFF
OFF
OFF
OFF
OFF
OFF
OFF
OFF
OFF
ON
ON
ON
ON
ON
ON
ON
ON
ON
ON
ON
ON
ON
ON
ON
ON
ON
ON
ON
ON
ON
OFF
OFF
OFF
OFF
OFF
OFF
OFF
OFF
ON
OFF
OFF
OFF
OFF
OFF
OFF
OFF
OFF
OFF
OFF
OFF
OFF
Refresh
Time
60 s
60 s
60 s
60 s
60 s
60 s
60 s
60 s
60 s
60 s
60 s
60 s
60 s
60 s
60 s
60 s
60 s
60 s
60 s
60 s
60 s
Page 28 of 29
Firmware
Firmware Versions prior to ROS v3.7.1 are not to be used.
Firmware Versions prior to ROS v3.8.2 must have Static Multicast Groups (Section 3.7) configured as
below
MAC Address
Synopsis: ##-##-##-##-##-## where ## ranges 0 to FF
01-00-0C-00-00-00
01-00-0C-CC-CC-CC
AB-00-00-02-00-00
VID
VLAN Identifier of the VLAN upon which the multicast group operates.
As per Section 3.5 (VLANs)
CoS
Specifies what Class Of Service is assigned to the multicast group frames
Normal
Ports
Ports to which the multicast group traffic is forwarded.
None
Version 1.0
Page 29 of 29